Int. J. Dependable Trust. Inf. Syst.最新文献

筛选
英文 中文
Security and Trust of Public Key Cryptography for HIP and HIP Multicast HIP和HIP组播公钥加密的安全性和可信度
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2011-07-01 DOI: 10.4018/jdtis.2011070102
C. AmirK., H. Forsgren, Kaj Grahn, T. Karvi, G. Pulkkis
{"title":"Security and Trust of Public Key Cryptography for HIP and HIP Multicast","authors":"C. AmirK., H. Forsgren, Kaj Grahn, T. Karvi, G. Pulkkis","doi":"10.4018/jdtis.2011070102","DOIUrl":"https://doi.org/10.4018/jdtis.2011070102","url":null,"abstract":"Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified. Security and Trust of Public Key Cryptography for HIP and HIP Multicast","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126020640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data 消费者隐私保护与消费者数据营销的伦理困境分析
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2011-07-01 DOI: 10.4018/jdtis.2011070104
Utpal Bose
{"title":"Analyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data","authors":"Utpal Bose","doi":"10.4018/jdtis.2011070104","DOIUrl":"https://doi.org/10.4018/jdtis.2011070104","url":null,"abstract":"Rapid transformation in marketing information technologies has enabled corporations to build ample consumer databases and analyze those using sophisticated data-mining techniques to obtain extensive knowledge about those consumers’ personal life styles and private matters. Considering that the United States Federal Trade Commission (FTC) has relied on fair information principles to guide privacy regulation and left it relatively unregulated, the burden of practicing consumer privacy lies mostly on the marketers who have to follow ethical behavior and maintain consumer privacy. In this paper the authors analyze the ethical nature of corporate decision making on matters of selling consumer data using the normative theories of business ethics and suggests approaches that balance the corporate goals of raising financial gains with the obligations they have to their stakeholders – mainly their customers. The authors also discuss the challenges faced in carrying out the analysis. Analyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130979638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of Information Security Controls in Organizations by Grey Relational Analysis 基于灰色关联分析的组织信息安全控制评价
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2011-07-01 DOI: 10.4018/JDTIS.2011070103
A. R. Otero, A. Ejnioui, C. Otero, G. Tejay
{"title":"Evaluation of Information Security Controls in Organizations by Grey Relational Analysis","authors":"A. R. Otero, A. Ejnioui, C. Otero, G. Tejay","doi":"10.4018/JDTIS.2011070103","DOIUrl":"https://doi.org/10.4018/JDTIS.2011070103","url":null,"abstract":"In an era where dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by is becoming critical. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation and prioritization of information security controls in organizations. Research efforts have resulted in various methodologies developed to deal with the ISC assessment problem. A closer look at these traditional methodologies highlights various weaknesses that can prevent effective assessments of information security controls in organizations. This research proposes a novel approach using Grey Relational Analysis to quantify the importance of each information security control taking into account organizations’ goals and objectives. Through a case study, the approach is proven successful in providing a way for measuring the quality of information security controls based on multiple application-specific criteria.","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127741127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Cloud Computing in Case-Based Pedagogy: An Information Systems Success Perspective 基于案例教学法的云计算:一个信息系统成功的视角
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2011-07-01 DOI: 10.4018/jdtis.2011070101
Charlie C. Chen
{"title":"Cloud Computing in Case-Based Pedagogy: An Information Systems Success Perspective","authors":"Charlie C. Chen","doi":"10.4018/jdtis.2011070101","DOIUrl":"https://doi.org/10.4018/jdtis.2011070101","url":null,"abstract":"Case-based pedagogy has evolved as an important tool for enhancing students’ analytical thinking and problem solving skills, as well as fostering the ability to make decisions under conditions of uncertainty. Due to the rapid development of technologies that allow collaboration and interaction despite geographic and temporal distances, educators are investigating the viability of emerging technologies such as cloud computing as platforms for case-based pedagogical techniques. This paper utilizes information systems (IS) success theory as the foundation of a study to examine case-based pedagogy in a cloud-computing environment. A three-week field experiment followed by a post-test survey is conducted in order to validate hypothesized relationships among cloud computing information quality, cloud computing system quality, cloud computing use, performance expectation in case-based pedagogy, and cloud computing critical mass. Results suggest that information quality has significant influence on not only use of cloud computing for case-based pedagogy, but also increases performance expectation and leads to critical mass. The findings of this study suggest that cloud computing is a viable platform for case-based pedagogy. Cloud Computing in CaseBased Pedagogy: An Information Systems Success Perspective","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117246571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Selecting Secure Web Applications Using Trustworthiness Benchmarking 使用可信赖基准选择安全的Web应用程序
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2011-04-01 DOI: 10.4018/jdtis.2011040101
Afonso Araújo Neto, M. Vieira
{"title":"Selecting Secure Web Applications Using Trustworthiness Benchmarking","authors":"Afonso Araújo Neto, M. Vieira","doi":"10.4018/jdtis.2011040101","DOIUrl":"https://doi.org/10.4018/jdtis.2011040101","url":null,"abstract":"The multiplicity of existing software and component alternatives for web applications, especially in open source communities, has boosted interest in suitable benchmarks, able to assist in the selection of candidate solutions, concerning several quality attributes. However, the huge success of performance and dependability benchmarking contrasts the small advances in security benchmarking. Traditional vulnerability/attack detection techniques can hardly be used alone to benchmark security, as security depends on hidden vulnerabilities and subtle properties of the system and its environment. A comprehensive security benchmarking process should consist of a two-step process: elimination of flawed alternatives followed by trustworthiness benchmarking. In this paper, the authors propose a trustworthiness benchmark based on the systematic collection of evidences that can be used to select one among several web applications, from a security point-of-view. They evaluate this benchmark approach by comparing its results with an evaluation conducted by a group of security experts and programmers. Results show that the proposed benchmark provides security rankings similar to those provided by human experts. In fact, although experts may take days to gather the information and rank the alternative web applications, the benchmark consistently provides similar results in a matter of few minutes. DOI: 10.4018/jdtis.2011040101 2 International Journal of Dependable and Trustworthy Information Systems, 2(2), 1-16, April-June 2011 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. tics (e.g., performance, availability, security) (Gray, 1993). Computer industry holds a reputed infrastructure for performance evaluation, where the Transaction Processing Performance Council (TPC) (http://www.tpc.org) benchmarks are recognized as one of the most successful benchmarking initiatives of the overall computer industry. Furthermore, the concept of dependability benchmarking has gained ground in the last few years, having already led to the proposal of dependability benchmarks for operating systems, web servers, databases and transactional systems in general (Kanoun & Spainhower, 2005). Security, however, has been largely absent from previous efforts, in a clear disparity to performance and dependability. Theoretically, a security benchmark would provide a metric (or small set of metrics) able to characterize the degree to which security goals are met in the system under testing (Payne, 2006), allowing developers and administrators to compare alternatives and make informed decisions. No clear methodology to accomplish this has been proposed so far. Traditional security metrics are hard to define and compute (Torgerson, 2007), as they involve making isolated estimations about the ability of an unknown individual (e.g., a hacker) to discover and maliciously exploit an unknown system character","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130112479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
First Experiment on Modeling Safety LifeCycle Process in Railway Systems 铁路系统安全生命周期过程建模首次试验
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2011-04-01 DOI: 10.4018/jdtis.2011040102
B. Hamid, H. Zhang, Jacob Geisel, David González
{"title":"First Experiment on Modeling Safety LifeCycle Process in Railway Systems","authors":"B. Hamid, H. Zhang, Jacob Geisel, David González","doi":"10.4018/jdtis.2011040102","DOIUrl":"https://doi.org/10.4018/jdtis.2011040102","url":null,"abstract":"The conception and design of Resource Constrained Embedded Systems (RCES) is an inherently complex endeavor. Non-functional requirements from security and dependability are exacerbate this complexity. Model-Driven Engineering (MDE) is a promising approach for the design of trusted systems, as it bridges the gap between design issues and implementation concerns. The purpose of process models is to document and communicate processes, as well as reuse them. Thus, processes can be better taught and executed. However, most useful metamodels are activity-oriented, and the required concepts of safety lifecycle, such as validation, cannot be easily modeled. In this paper, the authors propose a safety-oriented process metamodel that extends exiting framework to support all safety control requirements. A new safety lifecycle development processes technique has been built to ease its use in a building process of system/ software applications with safety support. As a proof of concept, the feasibility of the approach has been evaluated with an example. The example is an engineering process for building industry control systems with safety requirements for software and hardware resources. A prototype implementation of the approach is provided and applied to the example of industry control systems in the railway domain. DOI: 10.4018/jdtis.2011040102 18 International Journal of Dependable and Trustworthy Information Systems, 2(2), 17-39, April-June 2011 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. putational processing power constraints. They can be found in many application sectors such as automotive, aerospace, and home control (Hamid, Desnos, Grepet, & Jouvray, 2010). They are in many types of devices, like sensors, automotive electronic control units, intelligent switches, and home appliances such as washing machines and smart-meters. In addition, they have different form factors (e.g., standalone systems, peripheral subsystems, and main computing systems). Computing resources of RCES, e.g., memory, tasks, and buffers, are generally statically determined. The generation of RCES therefore involves specific software building processes. These processes are often error-prone because they are not fully automated, even if some level of automatic code generation or even model driven engineering support is applied. Furthermore, many RCES also have assurance requirements, ranging from very strong levels involving certification (e.g., DO178 and IEC-61508 for safety-relevant embedded systems development) to lighter levels based on industry practices. The development of these systems by traditional processes is no longer applicable and the need for new methods is necessary to design and provide software for resources constrained embedded systems (RCES) correct by construction. We seek a mechanism which allows a safe, easier and fast RCES development process. To cope with the g","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131312323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Security and Firewall Technology: A Step to Safety of National IT Vision 网络安全与防火墙技术:迈向国家IT安全愿景的一步
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2011-04-01 DOI: 10.4018/jdtis.2011040103
A. Obiniyi, Ezugwu E. Absalom, Mohammed Dikko
{"title":"Network Security and Firewall Technology: A Step to Safety of National IT Vision","authors":"A. Obiniyi, Ezugwu E. Absalom, Mohammed Dikko","doi":"10.4018/jdtis.2011040103","DOIUrl":"https://doi.org/10.4018/jdtis.2011040103","url":null,"abstract":"With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously. DOI: 10.4018/jdtis.2011040103 International Journal of Dependable and Trustworthy Information Systems, 2(2), 40-60, April-June 2011 41 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. advantage of getting classified data, and the use of network resources can vanish leading to inefficient or lack of productivity. Establishments now have continual upsurge dependence on their information and communication systems as the nerve to day-to-day functions and for future stratagem of activities and thus have a lot of security problems to solve, this entails intranets and Internet. However the majority of network security threats originate from within the establishment, there is a growing threat of outside intrusion. This menace is escalated by connection of private (corporate) networks to public networks such as the Internet. In order to lessen the risk of outside parties having access to a private network, a firewall technology is implemented. Possibly it is best to explain first what a firewall is not: a firewall is not simply a router, host device, or groups of device that makes available security to a network. To a great extent, a firewall is a method of security; it assists in carrying out a larger security policy that states the services and accesses to be permitted. It is the provision of that policy in terms of a network setup, one or more host systems, routers, and other security measures such as advanced user identification in place of static passwords. The major reason for firewall system is to regulate access to or from guarded networks. It carries out a network access policy by strengthening the link to pass through the firewall, where they can be scrutinized and appraised. A firewall system can be a router, a personal compu","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125580231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Incorporating Social Trust into Design Practices for Secure Systems 将社会信任融入安全系统的设计实践
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2010-10-01 DOI: 10.4018/jdtis.2010100101
P. Cofta, H. Lacohée, Paul Hodgson
{"title":"Incorporating Social Trust into Design Practices for Secure Systems","authors":"P. Cofta, H. Lacohée, Paul Hodgson","doi":"10.4018/jdtis.2010100101","DOIUrl":"https://doi.org/10.4018/jdtis.2010100101","url":null,"abstract":"Companies are increasingly dependent on modern information and communication technology (ICT), yet the successful adoption of ICT systems stubbornly hovers at only around 50%, adding disappointment to business losses. Trust (both inter-personal and technology-related) has significant explanatory power when it comes to technology adoption, but only as part of a systematic methodology. Therefore, understanding more fully the interaction between human process and technology by adding the richness of socio-technical considerations to the design process of ICT systems should significantly improve adoption rates. At the same time, trust-based design has to demonstrate the (often neglected) business value of trust. ‘Designing for trust’, discussed in this chapter, is a design framework that consolidates trust governance and security management. Trust governance is a complete proposition that makes trust relevant to business practices, including the design and deployment of ICT systems. Trust governance incorporates the business justification of trust with an analytical framework, and a set of relevant tools and methods, as well as a maturity model. This chapter discusses how ‘designing for trust’ leverages trust governance into the design practices of ICT systems by complementing security-based methodologies, demonstrating the value of this approach. DOI: 10.4018/978-1-61520-837-1.ch010 2 International Journal of Dependable and Trustworthy Information Systems, 1(4), 1-24, October-December 2010 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. 2006) adding frustration and damaged reputation to lost investment and missed revenues. While analysing the reasons for such a lack of success, it is apparent that failures can often be attributed to the lack of social adoption of such new systems. This lack of adoption often originates in inappropriately designed and applied security measures (Cranor and Garfinkel, 2005), that are either too lax (so that they expose vulnerabilities) or too stringent (so that they inspire creative rejection), or finally, they may be appropriate in strength but entirely ignore established practices. Note that quite often such security measures are designed in full accordance with requirements or specifications, yet they miss the importance of the social context of practical application (Lippert & Davis, 2006). A system that fails to achieve adoption represents a business loss, but a system that is not fully or willingly adopted represents a significant security vulnerability, specifically if users of such a system are set to circumvent security controls by means of creative social practices. For example, even the most sophisticated access control does not provide security if users choose to use their access cards according to their perception of social relationships (and value systems) rather than according to security policies (Collins, 2007), ","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132504480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mobile Trusted Computing Based on MTM 基于MTM的移动可信计算
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2010-10-01 DOI: 10.4018/jdtis.2010100102
Jan-Erik Ekberg
{"title":"Mobile Trusted Computing Based on MTM","authors":"Jan-Erik Ekberg","doi":"10.4018/jdtis.2010100102","DOIUrl":"https://doi.org/10.4018/jdtis.2010100102","url":null,"abstract":"Trusted computing (TC) denotes a set of security-related hardware and software mechanisms that make a computing device work in a consistent manner, even in the presence of external attacks. For personal computers, TC typically is interpreted to be a software architecture designed around the trusted platform module (TPM), a hardware chip residing on the motherboard and implemented according to the specifications of the Trusted Computing Group (Trusted Computing Group, 2008A). In embedded devices, the state-of-the art in terms of hardware security and operating systems is significantly different from what is present on personal computers. So to stimulate the take-up of TCG technology on handsets as well, the recently approved mobile trusted module (MTM) specification (Trusted Computing Group, 2008B) defines new interfaces and adaptation options that match the requirements of the handset business ecosystem, as well as the hardware in use in the embedded domain. This chapter provides an overview of a few hardware security architectures (in handsets) to introduce the reader to the problem domain. The main focus of the text is in introducing the MTM specification – by first presenting its main functional concepts, and then by adapting it to one of the hardware architectures first described, essentially presenting a plausible practical deployment. The author also presents a brief security analysis of the MTM component, and a few novel ideas regarding how the (mobile) trusted module can be extended, and be made more versatile.","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121415173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Human-Machine Trust Interaction: A Technical Overview 人机信任交互:技术综述
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2010-10-01 DOI: 10.4018/jdtis.2010100104
Conghui Liu
{"title":"Human-Machine Trust Interaction: A Technical Overview","authors":"Conghui Liu","doi":"10.4018/jdtis.2010100104","DOIUrl":"https://doi.org/10.4018/jdtis.2010100104","url":null,"abstract":"Improving user’s trust appropriately could help in designing an intelligent system and make it work effectively, especially with the fast growth of Web-base technology. This chapter introduces the solutions of improving user’s trust in human-machine interaction (HMI), especially for electronic commerce (e-commerce). The author firstly reviews the concept of trust and the main factors that affects the appropriateness of user’s trust in human-machine interaction, such as the properties of machine systems, the properties of human, and context. On the basis of these, the author further discusses the current state, challenges, problems and limitations of establishing and improving the user’s trust in human-machine interaction. Finally, the author summarizes and evaluates the existing solutions for improving the user’s trust appropriately in e-commerce environment. DOI: 10.4018/978-1-61520-682-7.ch020 62 International Journal of Dependable and Trustworthy Information Systems, 1(4), 61-74, October-December 2010 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. computer-human interaction. Human-machine interaction shows massive potential to improve human performance and enhance safety. However, it is not uniformly beneficial to people. If trust is not properly considered, there are maybe machine-assisted accidents caused by humanmachine interaction. If users trust the capability of the machine even when it does not perform the task perfectly, the disaster could occur. For example the autopilot crashed the Airbus A320 (Sparaco, 1995). In addition, if people refute to utilize the machine even when it could achieve the goal very well, the advanced benefits of using the machine will be lost. Such an improper relationship between human and machine can be described in terms of over-trusting or under-trusting of machines. These are illustrated in Figure 1. Over-trusting (too trusting) and under-trusting (not trusting enough) can lead to user misusing and disusing the machine (Parasuraman & Riley, 1997). Reducing over-trusting and under-trusting in the machine system is a very important issue in human-machine interaction. Appropriate trust can improve greatly human-machine interaction. Ideally, the human should maintain a correctly calibrated level of trust that matches the objective capability of the machine system. How to calibrate the user’s trust to an appropriate level? It is essential to understand the factors influencing trust in human-machine interaction. This book chapter studies the factors influencing the user’s trust in human-machine interaction. We believe understanding this issue is important for us to develop human’s trust in the machine system at an appropriate level, neither too high nor too low. Firstly, the concept of trust and the factors influencing the user’s trust in human-machine interaction are introduced. We further discuss the issues, problems and ","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115405601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信