信任之路:社会技术环境下信息安全和信任形成模型

Duncan J Greaves, Harjit Sekhon, A. García-Pérez
{"title":"信任之路:社会技术环境下信息安全和信任形成模型","authors":"Duncan J Greaves, Harjit Sekhon, A. García-Pérez","doi":"10.1049/icp.2021.2402","DOIUrl":null,"url":null,"abstract":"1 Purpose The purpose of this research is to fill a gap in the existing literature for new models that deal with computational trust, for example in developing trust protocols, trust metrics and the place of trust in cybersecurity strategies [1]. Many models of trust and cybersecurity are based on cognitive assessments of risk prior to delegation of tasks, although it is known that trust and risk are associated [2]. Where delegation takes place without trust it is actions that influence the formation of trust, not the other way around. We argue that action shapes trust and is not merely a product of a process. It is known that consumers may delegate action to organisations as long as the perceived risks are lowered, and the inverted-U theory of trust [3] demonstrates that low trust marketplaces are regulated by guarantees that reduce the need for trust. Conversely, highly regulated marketplaces manage the rules of conduct to reduce the role of social trust. Therefore, trust is only necessary where the transaction types fall between these two poles and eliciting this trust can lead to competitive advantage [6]. This work utilises a model to operationalise the concepts in the Theory of Planned Behaviour (TPB) [7,8] to measure how information security and task delegation drive consumers to trusting behaviour by increasing their perceived control and lowering perceived risks.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Pathways to Trust: A Model of Information Security and Trust Formation in Socio-Technical Environments Structured Abstract\",\"authors\":\"Duncan J Greaves, Harjit Sekhon, A. García-Pérez\",\"doi\":\"10.1049/icp.2021.2402\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"1 Purpose The purpose of this research is to fill a gap in the existing literature for new models that deal with computational trust, for example in developing trust protocols, trust metrics and the place of trust in cybersecurity strategies [1]. Many models of trust and cybersecurity are based on cognitive assessments of risk prior to delegation of tasks, although it is known that trust and risk are associated [2]. Where delegation takes place without trust it is actions that influence the formation of trust, not the other way around. We argue that action shapes trust and is not merely a product of a process. It is known that consumers may delegate action to organisations as long as the perceived risks are lowered, and the inverted-U theory of trust [3] demonstrates that low trust marketplaces are regulated by guarantees that reduce the need for trust. Conversely, highly regulated marketplaces manage the rules of conduct to reduce the role of social trust. Therefore, trust is only necessary where the transaction types fall between these two poles and eliciting this trust can lead to competitive advantage [6]. This work utilises a model to operationalise the concepts in the Theory of Planned Behaviour (TPB) [7,8] to measure how information security and task delegation drive consumers to trusting behaviour by increasing their perceived control and lowering perceived risks.\",\"PeriodicalId\":254750,\"journal\":{\"name\":\"Competitive Advantage in the Digital Economy (CADE 2021)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Competitive Advantage in the Digital Economy (CADE 2021)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/icp.2021.2402\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Advantage in the Digital Economy (CADE 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/icp.2021.2402","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本研究的目的是填补现有文献中处理计算信任的新模型的空白,例如开发信任协议、信任指标和信任在网络安全策略中的地位[1]。许多信任和网络安全模型都是基于在委派任务之前对风险的认知评估,尽管我们知道信任和风险是相关的[2]。在没有信任的情况下进行授权,是行动影响了信任的形成,而不是相反。我们认为,行动塑造信任,而不仅仅是一个过程的产物。众所周知,只要感知风险降低,消费者可能会将行动委托给组织,而信任的倒u理论[3]表明,低信任市场受到降低信任需求的保证的监管。相反,高度监管的市场管理着行为规则,以减少社会信任的作用。因此,只有当交易类型处于这两个极点之间时,信任才有必要,而激发这种信任可以带来竞争优势[6]。这项工作利用一个模型来操作计划行为理论(TPB)中的概念[7,8],以衡量信息安全和任务授权如何通过增加他们的感知控制和降低感知风险来驱动消费者的信任行为。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Pathways to Trust: A Model of Information Security and Trust Formation in Socio-Technical Environments Structured Abstract
1 Purpose The purpose of this research is to fill a gap in the existing literature for new models that deal with computational trust, for example in developing trust protocols, trust metrics and the place of trust in cybersecurity strategies [1]. Many models of trust and cybersecurity are based on cognitive assessments of risk prior to delegation of tasks, although it is known that trust and risk are associated [2]. Where delegation takes place without trust it is actions that influence the formation of trust, not the other way around. We argue that action shapes trust and is not merely a product of a process. It is known that consumers may delegate action to organisations as long as the perceived risks are lowered, and the inverted-U theory of trust [3] demonstrates that low trust marketplaces are regulated by guarantees that reduce the need for trust. Conversely, highly regulated marketplaces manage the rules of conduct to reduce the role of social trust. Therefore, trust is only necessary where the transaction types fall between these two poles and eliciting this trust can lead to competitive advantage [6]. This work utilises a model to operationalise the concepts in the Theory of Planned Behaviour (TPB) [7,8] to measure how information security and task delegation drive consumers to trusting behaviour by increasing their perceived control and lowering perceived risks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信