메뉴 건너뛰기




Volumn 81, Issue 3, 2001, Pages 635-664

Securing trust online: Wisdom or oxymoron?

(1)  Nissenbaum, Helen a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0035637350     PISSN: 00068047     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (119)

References (104)
  • 1
    • 0039694124 scopus 로고    scopus 로고
    • note
    • This paper is an outgrowth of a collaborative project with Edward Felten and Batya Friedman, and owes much to them. The work was supported by grants from the National Science Foundation, SBR-9729447 and SBR-9806234. I am enormously grateful to colleagues for probing questions and suggestions: Tamar Frankel, Jeroen van den Hoven, Rob Kling, and Mark Poster; for editorial and research assistance: Beth Kolko, Helen Moffett, Michael Cohen, and Hyeseung Song, Sayumi Takahashi, and Robert Young. Earlier versions of the paper were presented at: Computer Ethics: Philosophical Enquiry 2000, New York University School of Law: Conference on A Free Information Ecology, and Boston University School of Law: Conference on Trust Relationships.
  • 2
    • 0003714340 scopus 로고    scopus 로고
    • COMMISSION ON INFO. SYS. TRUSTWORTHINESS, NATIONAL RESEARCH COUNCIL, TRUST IN CYBERSPACE 1 ("The widespread interconnection of networked information systems allows outages and disruptions to spread from one system to others; it enables attacks to be waged anonymously and from a safe distance . . . .")
    • See, e.g., COMMISSION ON INFO. SYS. TRUSTWORTHINESS, NATIONAL RESEARCH COUNCIL, TRUST IN CYBERSPACE 1 (Fred B. Schneider, ed. 1999) (hereinafter TRUST IN CYBERSPACE) ("The widespread interconnection of networked information systems allows outages and disruptions to spread from one system to others; it enables attacks to be waged anonymously and from a safe distance . . . .")
    • (1999) Trust in Cyberspace
    • Schneider, F.B.1
  • 3
    • 84937258919 scopus 로고    scopus 로고
    • Security: The achilles heel of electronic commerce
    • See, e.g., James P. Backhouse, Security: The Achilles Heel of Electronic Commerce, 35 SOC'Y 28, 28 (1998) (discussing security issues in e-commerce); Donna L. Hoffman et al., Building Consumer Trust Online, COMM. OF THE ACM Apr. 1999, at 80, 80 (addressing the trust issues between consumers and businesses in e-commerce); Robert Moskowitz, Ask Yourself: In Whom Can You Really Trust?, NETWORK COMPUTING 1, ¶ 1 (Jun. 15 1998) 〈http://www.networkcomputing.com/911/911colmoskowitz.html〉 (discussing the doubts that plague e-commerce); Pauline Ratnasingham, Implicit Trust Levels in EDI Security, 2 J. INTERNET SECURITY, 1, ¶ 1 (1999) 〈http://www.addsecure.net/jisec/1999-02.htm〉 (arguing that trust is an "important antecedent" for successful business relationships); Karl Salnoske, Building Trust in Electronic Commerce, 100 BUSINESS CREDIT 24, 24 (Jan. 1998) 〈http://www.nacm.org/bcmag/bcarchives/1998/articlesl998/jan/jan98art2. html〉 (commenting that both businesses and consumers regard transaction security as their biggest concern); Dennis D. Steinauer et al., Trust and Traceability in Electronic Commerce, 5 STANDARD VIEW 118, 118 (1997) (exploring "technology or other processes that can help increase the level of confidence . . . in electronic commerce"); David Woolford, Electronic Commerce: It's All a Matter of Trust, 25 COMPUTING CANADA 18, ¶ 1 (May 7, 1999) 〈http://www.plesman.eom/Archives/cc/1999/May/2518/cc251813b.html〉 (arguing that electronic deals suffer from the problems of "authenticity and integrity").
    • (1998) Soc'y , vol.35 , pp. 28
    • Backhouse, J.P.1
  • 4
    • 0041540817 scopus 로고    scopus 로고
    • Building consumer trust online
    • at 80, 80
    • See, e.g., James P. Backhouse, Security: The Achilles Heel of Electronic Commerce, 35 SOC'Y 28, 28 (1998) (discussing security issues in e-commerce); Donna L. Hoffman et al., Building Consumer Trust Online, COMM. OF THE ACM Apr. 1999, at 80, 80 (addressing the trust issues between consumers and businesses in e-commerce); Robert Moskowitz, Ask Yourself: In Whom Can You Really Trust?, NETWORK COMPUTING 1, ¶ 1 (Jun. 15 1998) 〈http://www.networkcomputing.com/911/911colmoskowitz.html〉 (discussing the doubts that plague e-commerce); Pauline Ratnasingham, Implicit Trust Levels in EDI Security, 2 J. INTERNET SECURITY, 1, ¶ 1 (1999) 〈http://www.addsecure.net/jisec/1999-02.htm〉 (arguing that trust is an "important antecedent" for successful business relationships); Karl Salnoske, Building Trust in Electronic Commerce, 100 BUSINESS CREDIT 24, 24 (Jan. 1998) 〈http://www.nacm.org/bcmag/bcarchives/1998/articlesl998/jan/jan98art2. html〉 (commenting that both businesses and consumers regard transaction security as their biggest concern); Dennis D. Steinauer et al., Trust and Traceability in Electronic Commerce, 5 STANDARD VIEW 118, 118 (1997) (exploring "technology or other processes that can help increase the level of confidence . . . in electronic commerce"); David Woolford, Electronic Commerce: It's All a Matter of Trust, 25 COMPUTING CANADA 18, ¶ 1 (May 7, 1999) 〈http://www.plesman.eom/Archives/cc/1999/May/2518/cc251813b.html〉 (arguing that electronic deals suffer from the problems of "authenticity and integrity").
    • (1999) Comm. of the ACM Apr.
    • Hoffman, D.L.1
  • 5
    • 0039101912 scopus 로고    scopus 로고
    • Ask yourself: In whom can you really trust?
    • ¶ 1 Jun. 15
    • See, e.g., James P. Backhouse, Security: The Achilles Heel of Electronic Commerce, 35 SOC'Y 28, 28 (1998) (discussing security issues in e-commerce); Donna L. Hoffman et al., Building Consumer Trust Online, COMM. OF THE ACM Apr. 1999, at 80, 80 (addressing the trust issues between consumers and businesses in e-commerce); Robert Moskowitz, Ask Yourself: In Whom Can You Really Trust?, NETWORK COMPUTING 1, ¶ 1 (Jun. 15 1998) 〈http://www.networkcomputing.com/911/911colmoskowitz.html〉 (discussing the doubts that plague e-commerce); Pauline Ratnasingham, Implicit Trust Levels in EDI Security, 2 J. INTERNET SECURITY, 1, ¶ 1 (1999) 〈http://www.addsecure.net/jisec/1999-02.htm〉 (arguing that trust is an "important antecedent" for successful business relationships); Karl Salnoske, Building Trust in Electronic Commerce, 100 BUSINESS CREDIT 24, 24 (Jan. 1998) 〈http://www.nacm.org/bcmag/bcarchives/1998/articlesl998/jan/jan98art2. html〉 (commenting that both businesses and consumers regard transaction security as their biggest concern); Dennis D. Steinauer et al., Trust and Traceability in Electronic Commerce, 5 STANDARD VIEW 118, 118 (1997) (exploring "technology or other processes that can help increase the level of confidence . . . in electronic commerce"); David Woolford, Electronic Commerce: It's All a Matter of Trust, 25 COMPUTING CANADA 18, ¶ 1 (May 7, 1999) 〈http://www.plesman.eom/Archives/cc/1999/May/2518/cc251813b.html〉 (arguing that electronic deals suffer from the problems of "authenticity and integrity").
    • (1998) Network Computing , pp. 1
    • Moskowitz, R.1
  • 6
    • 0039101919 scopus 로고    scopus 로고
    • Implicit trust levels in edi security
    • ¶ 1
    • See, e.g., James P. Backhouse, Security: The Achilles Heel of Electronic Commerce, 35 SOC'Y 28, 28 (1998) (discussing security issues in e-commerce); Donna L. Hoffman et al., Building Consumer Trust Online, COMM. OF THE ACM Apr. 1999, at 80, 80 (addressing the trust issues between consumers and businesses in e-commerce); Robert Moskowitz, Ask Yourself: In Whom Can You Really Trust?, NETWORK COMPUTING 1, ¶ 1 (Jun. 15 1998) 〈http://www.networkcomputing.com/911/911colmoskowitz.html〉 (discussing the doubts that plague e-commerce); Pauline Ratnasingham, Implicit Trust Levels in EDI Security, 2 J. INTERNET SECURITY, 1, ¶ 1 (1999) 〈http://www.addsecure.net/jisec/1999-02.htm〉 (arguing that trust is an "important antecedent" for successful business relationships); Karl Salnoske, Building Trust in Electronic Commerce, 100 BUSINESS CREDIT 24, 24 (Jan. 1998) 〈http://www.nacm.org/bcmag/bcarchives/1998/articlesl998/jan/jan98art2. html〉 (commenting that both businesses and consumers regard transaction security as their biggest concern); Dennis D. Steinauer et al., Trust and Traceability in Electronic Commerce, 5 STANDARD VIEW 118, 118 (1997) (exploring "technology or other processes that can help increase the level of confidence . . . in electronic commerce"); David Woolford, Electronic Commerce: It's All a Matter of Trust, 25 COMPUTING CANADA 18, ¶ 1 (May 7, 1999) 〈http://www.plesman.eom/Archives/cc/1999/May/2518/cc251813b.html〉 (arguing that electronic deals suffer from the problems of "authenticity and integrity").
    • (1999) J. Internet Security , vol.2 , pp. 1
    • Ratnasingham, P.1
  • 7
    • 0040880211 scopus 로고    scopus 로고
    • Building trust in electronic commerce
    • Jan.
    • See, e.g., James P. Backhouse, Security: The Achilles Heel of Electronic Commerce, 35 SOC'Y 28, 28 (1998) (discussing security issues in e-commerce); Donna L. Hoffman et al., Building Consumer Trust Online, COMM. OF THE ACM Apr. 1999, at 80, 80 (addressing the trust issues between consumers and businesses in e-commerce); Robert Moskowitz, Ask Yourself: In Whom Can You Really Trust?, NETWORK COMPUTING 1, ¶ 1 (Jun. 15 1998) 〈http://www.networkcomputing.com/911/911colmoskowitz.html〉 (discussing the doubts that plague e-commerce); Pauline Ratnasingham, Implicit Trust Levels in EDI Security, 2 J. INTERNET SECURITY, 1, ¶ 1 (1999) 〈http://www.addsecure.net/jisec/1999-02.htm〉 (arguing that trust is an "important antecedent" for successful business relationships); Karl Salnoske, Building Trust in Electronic Commerce, 100 BUSINESS CREDIT 24, 24 (Jan. 1998) 〈http://www.nacm.org/bcmag/bcarchives/1998/articlesl998/jan/jan98art2. html〉 (commenting that both businesses and consumers regard transaction security as their biggest concern); Dennis D. Steinauer et al., Trust and Traceability in Electronic Commerce, 5 STANDARD VIEW 118, 118 (1997) (exploring "technology or other processes that can help increase the level of confidence . . . in electronic commerce"); David Woolford, Electronic Commerce: It's All a Matter of Trust, 25 COMPUTING CANADA 18, ¶ 1 (May 7, 1999) 〈http://www.plesman.eom/Archives/cc/1999/May/2518/cc251813b.html〉 (arguing that electronic deals suffer from the problems of "authenticity and integrity").
    • (1998) Business Credit , vol.100 , pp. 24
    • Salnoske, K.1
  • 8
    • 0039101918 scopus 로고    scopus 로고
    • Trust and traceability in electronic commerce
    • See, e.g., James P. Backhouse, Security: The Achilles Heel of Electronic Commerce, 35 SOC'Y 28, 28 (1998) (discussing security issues in e-commerce); Donna L. Hoffman et al., Building Consumer Trust Online, COMM. OF THE ACM Apr. 1999, at 80, 80 (addressing the trust issues between consumers and businesses in e-commerce); Robert Moskowitz, Ask Yourself: In Whom Can You Really Trust?, NETWORK COMPUTING 1, ¶ 1 (Jun. 15 1998) 〈http://www.networkcomputing.com/911/911colmoskowitz.html〉 (discussing the doubts that plague e-commerce); Pauline Ratnasingham, Implicit Trust Levels in EDI Security, 2 J. INTERNET SECURITY, 1, ¶ 1 (1999) 〈http://www.addsecure.net/jisec/1999-02.htm〉 (arguing that trust is an "important antecedent" for successful business relationships); Karl Salnoske, Building Trust in Electronic Commerce, 100 BUSINESS CREDIT 24, 24 (Jan. 1998) 〈http://www.nacm.org/bcmag/bcarchives/1998/articlesl998/jan/jan98art2. html〉 (commenting that both businesses and consumers regard transaction security as their biggest concern); Dennis D. Steinauer et al., Trust and Traceability in Electronic Commerce, 5 STANDARD VIEW 118, 118 (1997) (exploring "technology or other processes that can help increase the level of confidence . . . in electronic commerce"); David Woolford, Electronic Commerce: It's All a Matter of Trust, 25 COMPUTING CANADA 18, ¶ 1 (May 7, 1999) 〈http://www.plesman.eom/Archives/cc/1999/May/2518/cc251813b.html〉 (arguing that electronic deals suffer from the problems of "authenticity and integrity").
    • (1997) Standard View , vol.5 , pp. 118
    • Steinauer, D.D.1
  • 9
    • 24644480306 scopus 로고    scopus 로고
    • Electronic commerce: It's all a matter of trust
    • ¶ 1 (May 7, 1999)
    • See, e.g., James P. Backhouse, Security: The Achilles Heel of Electronic Commerce, 35 SOC'Y 28, 28 (1998) (discussing security issues in e-commerce); Donna L. Hoffman et al., Building Consumer Trust Online, COMM. OF THE ACM Apr. 1999, at 80, 80 (addressing the trust issues between consumers and businesses in e-commerce); Robert Moskowitz, Ask Yourself: In Whom Can You Really Trust?, NETWORK COMPUTING 1, ¶ 1 (Jun. 15 1998) 〈http://www.networkcomputing.com/911/911colmoskowitz.html〉 (discussing the doubts that plague e-commerce); Pauline Ratnasingham, Implicit Trust Levels in EDI Security, 2 J. INTERNET SECURITY, 1, ¶ 1 (1999) 〈http://www.addsecure.net/jisec/1999-02.htm〉 (arguing that trust is an "important antecedent" for successful business relationships); Karl Salnoske, Building Trust in Electronic Commerce, 100 BUSINESS CREDIT 24, 24 (Jan. 1998) 〈http://www.nacm.org/bcmag/bcarchives/1998/articlesl998/jan/jan98art2. html〉 (commenting that both businesses and consumers regard transaction security as their biggest concern); Dennis D. Steinauer et al., Trust and Traceability in Electronic Commerce, 5 STANDARD VIEW 118, 118 (1997) (exploring "technology or other processes that can help increase the level of confidence . . . in electronic commerce"); David Woolford, Electronic Commerce: It's All a Matter of Trust, 25 COMPUTING CANADA 18, ¶ 1 (May 7, 1999) 〈http://www.plesman.eom/Archives/cc/1999/May/2518/cc251813b.html〉 (arguing that electronic deals suffer from the problems of "authenticity and integrity").
    • Computing Canada , vol.25 , pp. 18
    • Woolford, D.1
  • 10
    • 0039101966 scopus 로고    scopus 로고
    • note
    • A misuse of language persists within the technical computer security community: proponents of a particular security device invariably use the term "trusted" to signal their faith that the system in question is trustworthy. This usage is misleading, as it suggests a general acceptance of the device in question when in fact it is the duty of the proponents to argue or prove that it is indeed worthy of this acceptance.
  • 11
    • 84994155710 scopus 로고    scopus 로고
    • A distributed trust model
    • (discussing the weaknesses of current security approaches for managing trust); DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (visited July 1, 1999)
    • See, e.g., Alfarez Abdul-Rahman & Stephen Hailes, A Distributed Trust Model, in. NEW SECURITY PARADIGMS WORKSHOP 48, 48 (1998) (discussing the weaknesses of current security approaches for managing trust); DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (visited July 1, 1999) 〈http://www.all.net/books/orange〉 (classifying computer systems into four divisions of enhanced security protection); Rohit Khare & Adam Rifkin, Weaving a Web of Trust (visited Jan. 13, 2001) 〈http://www.w3journal.eom/7/s3.rifkin.wrap.html〉 (1997) ("develop[ing] a taxonomy for how trust assertions can be specified, justified and validated"); Michael K. Reiter, Distributing Trust with the Rampart Toolkit, COMM. OF THE ACM, Apr. 1996, at 71, 71 (describing group communication protocols which distributes trust among a group).
    • (1998) New Security Paradigms Workshop , pp. 48
    • Abdul-Rahman, A.1    Hailes, S.2
  • 12
    • 84994155710 scopus 로고    scopus 로고
    • visited Jan. 13, 2001
    • See, e.g., Alfarez Abdul-Rahman & Stephen Hailes, A Distributed Trust Model, in. NEW SECURITY PARADIGMS WORKSHOP 48, 48 (1998) (discussing the weaknesses of current security approaches for managing trust); DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (visited July 1, 1999) 〈http://www.all.net/books/orange〉 (classifying computer systems into four divisions of enhanced security protection); Rohit Khare & Adam Rifkin, Weaving a Web of Trust (visited Jan. 13, 2001) 〈http://www.w3journal.eom/7/s3.rifkin.wrap.html〉 (1997) ("develop[ing] a taxonomy for how trust assertions can be specified, justified and validated"); Michael K. Reiter, Distributing Trust with the Rampart Toolkit, COMM. OF THE ACM, Apr. 1996, at 71, 71 (describing group communication protocols which distributes trust among a group).
    • (1997) Weaving a Web of Trust
    • Khare, R.1    Rifkin, A.2
  • 13
    • 0030126124 scopus 로고    scopus 로고
    • Distributing trust with the rampart toolkit
    • at 71, 71 (describing group communication protocols which distributes trust among a group)
    • See, e.g., Alfarez Abdul-Rahman & Stephen Hailes, A Distributed Trust Model, in. NEW SECURITY PARADIGMS WORKSHOP 48, 48 (1998) (discussing the weaknesses of current security approaches for managing trust); DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (visited July 1, 1999) 〈http://www.all.net/books/orange〉 (classifying computer systems into four divisions of enhanced security protection); Rohit Khare & Adam Rifkin, Weaving a Web of Trust (visited Jan. 13, 2001) 〈http://www.w3journal.eom/7/s3.rifkin.wrap.html〉 (1997) ("develop[ing] a taxonomy for how trust assertions can be specified, justified and validated"); Michael K. Reiter, Distributing Trust with the Rampart Toolkit, COMM. OF THE ACM, Apr. 1996, at 71, 71 (describing group communication protocols which distributes trust among a group).
    • (1996) Comm. of the ACM, Apr.
    • Reiter, M.K.1
  • 14
    • 0002809390 scopus 로고    scopus 로고
    • Designing trust into online experiences
    • Dec. at 57
    • Although I do not discuss their work here, I must acknowledge another community of researchers: namely those interested in computer-human interaction, who are concerned with ways to elicit trust through the design of user interfaces. See, e.g., Ben Schneiderman, Designing Trust into Online Experiences, COMM. OF THE ACM, Dec. 2000, at 57, 58-59 (outlining certain steps, such as disclosing patterns of past performance and enforcing privacy and security policies, that designers can take to encourage trust in online relationships).
    • (2000) Comm. of the ACM , pp. 58-59
    • Schneiderman, B.1
  • 15
    • 0040285872 scopus 로고    scopus 로고
    • See TRUST IN CYBERSPACE, supra note 2, at 12-23 (evaluating whether and to what degree we can rely on existing networked information systems that support our critical infrastructures). This report urged a set of actions to increase trustworthiness and limit our vulnerability to harm, even catastrophe, that might result from failures due to malfunction or malicious attack. See id. at 240-55 (outlining the Commission's conclusions and recommendations)
    • See TRUST IN CYBERSPACE, supra note 2, at 12-23 (evaluating whether and to what degree we can rely on existing networked information systems that support our critical infrastructures). This report urged a set of actions to increase trustworthiness and limit our vulnerability to harm, even catastrophe, that might result from failures due to malfunction or malicious attack. See id. at 240-55 (outlining the Commission's conclusions and recommendations).
  • 16
    • 0004219481 scopus 로고    scopus 로고
    • See ADAM B. SELIGMAN, THE PROBLEM OF TRUST 19 (1997) (arguing that trust in systems entails confidence in a set of institutions).
    • (1997) The Problem of Trust , pp. 19
    • Seligman, A.B.1
  • 17
    • 84936823913 scopus 로고
    • Trust and antitrust
    • See, e.g., Annette Baier, Trust and Antitrust, 96 ETHICS 231, 232 (1986) ("There are immoral as well as moral trust relationships, and trust-busting can be a morally proper goal.").
    • (1986) Ethics , vol.96 , pp. 231
    • Baier, A.1
  • 18
    • 0141883580 scopus 로고
    • Trust: A mechanism for the reduction of social complexity
    • photo. reprint 1988
    • NIKLAS LUHMANN, Trust: A Mechanism for the Reduction of Social Complexity, in TRUST AND POWER: Two WORKS BY NIKLAS LUHMANN 8 (photo. reprint 1988) (1979) ("[T]rust constitutes a more effective form of complexity reduction.").
    • (1979) Trust and Power: Two Works by Niklas Luhmann , pp. 8
    • Luhmann, N.1
  • 19
    • 0039694068 scopus 로고    scopus 로고
    • See id. at 20 (noting that trust evolves from past experiences that can guide future actions)
    • See id. at 20 (noting that trust evolves from past experiences that can guide future actions).
  • 20
    • 0039101920 scopus 로고    scopus 로고
    • Id. at 20
    • Id. at 20.
  • 21
    • 0039694064 scopus 로고    scopus 로고
    • Id. at 25
    • Id. at 25.
  • 22
    • 0003530481 scopus 로고
    • (illustrating examples for the need for trust in economic life); Baier, supra note 9, at 239
    • See generally FRANCIS FUKUYAMA, TRUST: THE SOCIAL VIRTUES AND THE CREATION OF PROSPERITY 7 (1995) (illustrating examples for the need for trust in economic life); Baier, supra note 9, at 239 (commenting that ordinary individuals must trust the mailman and the plumber to do their jobs properly); Lawrence C. Becker, Trust as Noncognitive Security about Motives, 107 ETHICS 43, 51 (1996) (discussing trust of government officials); Russell Hardin, Trustworthiness, 107 ETHICS 26, 33 (1996) (explaining how economic institutions are trustworthy with their customers); Philip Pettit, The Cunning of Trust, 24 PHIL. & PUB. AFF. 202, 204-05 (1995) (discussing the trust placed in a city bus driver).
    • (1995) Trust: The Social Virtues and the Creation of Prosperity , pp. 7
    • Fukuyama, F.1
  • 23
    • 0001943398 scopus 로고    scopus 로고
    • Trust as noncognitive security about motives
    • See generally FRANCIS FUKUYAMA, TRUST: THE SOCIAL VIRTUES AND THE CREATION OF PROSPERITY 7 (1995) (illustrating examples for the need for trust in economic life); Baier, supra note 9, at 239 (commenting that ordinary individuals must trust the mailman and the plumber to do their jobs properly); Lawrence C. Becker, Trust as Noncognitive Security about Motives, 107 ETHICS 43, 51 (1996) (discussing trust of government officials); Russell Hardin, Trustworthiness, 107 ETHICS 26, 33 (1996) (explaining how economic institutions are trustworthy with their customers); Philip Pettit, The Cunning of Trust, 24 PHIL. & PUB. AFF. 202, 204-05 (1995) (discussing the trust placed in a city bus driver).
    • (1996) Ethics , vol.107 , pp. 43
    • Becker, L.C.1
  • 24
    • 0003042661 scopus 로고    scopus 로고
    • Trustworthiness
    • See generally FRANCIS FUKUYAMA, TRUST: THE SOCIAL VIRTUES AND THE CREATION OF PROSPERITY 7 (1995) (illustrating examples for the need for trust in economic life); Baier, supra note 9, at 239 (commenting that ordinary individuals must trust the mailman and the plumber to do their jobs properly); Lawrence C. Becker, Trust as Noncognitive Security about Motives, 107 ETHICS 43, 51 (1996) (discussing trust of government officials); Russell Hardin, Trustworthiness, 107 ETHICS 26, 33 (1996) (explaining how economic institutions are trustworthy with their customers); Philip Pettit, The Cunning of Trust, 24 PHIL. & PUB. AFF. 202, 204-05 (1995) (discussing the trust placed in a city bus driver).
    • (1996) Ethics , vol.107 , pp. 26
    • Hardin, R.1
  • 25
    • 85025252101 scopus 로고
    • The cunning of trust
    • See generally FRANCIS FUKUYAMA, TRUST: THE SOCIAL VIRTUES AND THE CREATION OF PROSPERITY 7 (1995) (illustrating examples for the need for trust in economic life); Baier, supra note 9, at 239 (commenting that ordinary individuals must trust the mailman and the plumber to do their jobs properly); Lawrence C. Becker, Trust as Noncognitive Security about Motives, 107 ETHICS 43, 51 (1996) (discussing trust of government officials); Russell Hardin, Trustworthiness, 107 ETHICS 26, 33 (1996) (explaining how economic institutions are trustworthy with their customers); Philip Pettit, The Cunning of Trust, 24 PHIL. & PUB. AFF. 202, 204-05 (1995) (discussing the trust placed in a city bus driver).
    • (1995) Phil. & Pub. Aff. , vol.24 , pp. 202
    • Pettit, P.1
  • 26
    • 0040880178 scopus 로고    scopus 로고
    • LUHMANN, supra note 10, at 40 (footnote omitted)
    • LUHMANN, supra note 10, at 40 (footnote omitted).
  • 28
    • 0040880179 scopus 로고    scopus 로고
    • Pettit, supra note 14, at 225
    • Pettit, supra note 14, at 225.
  • 29
    • 0040285874 scopus 로고    scopus 로고
    • See id. at 202 (arguing that society where people trust one another will most likely function "more harmoniously and fruitfully" than society devoid of trust); see also FUKUYAMA, supra note 14, at 47 (arguing that "sociability is critical to economic life because virtually all economic activity is carried out by groups rather than individuals");PUTNAM, supra note 16, at 170 asserting that trust is an "essential component" of social capital
    • See id. at 202 (arguing that society where people trust one another will most likely function "more harmoniously and fruitfully" than society devoid of trust); see also FUKUYAMA, supra note 14, at 47 (arguing that "sociability is critical to economic life because virtually all economic activity is carried out by groups rather than individuals"); PUTNAM, supra note 16, at 170 (asserting that trust is an "essential component" of social capital).
  • 30
    • 0033440687 scopus 로고    scopus 로고
    • Building trust in divided societies
    • See Daniel M. Weinstock, Building Trust in Divided Societies, 7 POL. PHIL. 263, 263-83 (1999).
    • (1999) Pol. Phil. , vol.7 , pp. 263
    • Weinstock, D.M.1
  • 32
    • 0039694075 scopus 로고    scopus 로고
    • See SELIGMAN, supra note 8, at 73 (arguing that solidarity must include some element of trust)
    • See SELIGMAN, supra note 8, at 73 (arguing that solidarity must include some element of trust).
  • 33
    • 0040285877 scopus 로고    scopus 로고
    • See Becker, supra note 12, at 51 (voicing that the majority of U.S. citizens trust the motives of public officials enough to combat the effect of receiving negative information about them)
    • See Becker, supra note 12, at 51 (voicing that the majority of U.S. citizens trust the motives of public officials enough to combat the effect of receiving negative information about them).
  • 34
    • 0348199156 scopus 로고    scopus 로고
    • Law and borders -the rise of law in cyberspace
    • Consider, for example, controversies over governance of a range of issues from speech and gambling to the allocation of Domain Names. For one of the classic (and controversial) positions on Internet governance, see David R. Johnson & David Post, Law and Borders -The Rise of Law in Cyberspace, 48 STAN. L. REV. 1367, 1367 (1996) (arguing that Cyberspace requires different laws than the laws that govern geographically-defined territories).
    • (1996) Stan. L. Rev. , vol.48 , pp. 1367
    • Johnson, D.R.1    Post, D.2
  • 35
    • 85010174898 scopus 로고    scopus 로고
    • Social capital: Promise and pitfalls of its role in development
    • For a similar critique of social capital, see Alejandro Portes & Patricia Landolt, Social Capital: Promise and Pitfalls of its Role in Development, 32 J. LAT. AM. STUD. 529, 546 (2000) (commenting that "one must not be over-optimistic about what enforceable trust . . . can accomplish").
    • (2000) J. Lat. Am. Stud. , vol.32 , pp. 529
    • Portes, A.1    Landolt, P.2
  • 36
    • 0039694121 scopus 로고    scopus 로고
    • See Baier, supra note 9, at 259 (arguing that in some instances it is more prudent to distrust, rather than to trust)
    • See Baier, supra note 9, at 259 (arguing that in some instances it is more prudent to distrust, rather than to trust).
  • 37
    • 0040285818 scopus 로고    scopus 로고
    • See Becker, supra note 12, at 58 (noting that a "proper sense of security is a balance of cognitive control and noncognitive stability")
    • See Becker, supra note 12, at 58 (noting that a "proper sense of security is a balance of cognitive control and noncognitive stability").
  • 38
    • 0039101928 scopus 로고    scopus 로고
    • See SELIGMAN, supra note 8, at 16-21 (explaining the difference between trust and confidence)
    • See SELIGMAN, supra note 8, at 16-21 (explaining the difference between trust and confidence).
  • 39
    • 0040880183 scopus 로고    scopus 로고
    • Pettit, supra note 14, at 210 (arguing that the mechanisms of trust can explain why "trust builds on trust")
    • Pettit, supra note 14, at 210 (arguing that the mechanisms of trust can explain why "trust builds on trust").
  • 40
    • 0039101925 scopus 로고    scopus 로고
    • See id. at 203 (commenting that many are not proud of this trait)
    • See id. at 203 (commenting that many are not proud of this trait).
  • 41
    • 0040285809 scopus 로고    scopus 로고
    • Id. at 211
    • Id. at 211.
  • 42
    • 0040880182 scopus 로고    scopus 로고
    • See id. at 203 (arguing that people regard their desire for the good opinion of others as a disposition that is hard to shed)
    • See id. at 203 (arguing that people regard their desire for the good opinion of others as a disposition that is hard to shed).
  • 43
    • 0039101927 scopus 로고    scopus 로고
    • See id. at 207 (arguing that "[w]here trust of this kind materializes and survives, people will take that as a token of proof of their being well disposed toward one another, so that the success of the trust should prove to be fruitful in other regards")
    • See id. at 207 (arguing that "[w]here trust of this kind materializes and survives, people will take that as a token of proof of their being well disposed toward one another, so that the success of the trust should prove to be fruitful in other regards").
  • 44
    • 0039694118 scopus 로고    scopus 로고
    • SELIGMAN, supra note 8, at 69 (arguing that familiarity relates to the "human bond" rooted in identity)
    • SELIGMAN, supra note 8, at 69 (arguing that familiarity relates to the "human bond" rooted in identity).
  • 45
    • 0040285821 scopus 로고    scopus 로고
    • Id. at 69
    • Id. at 69.
  • 46
    • 0040285871 scopus 로고    scopus 로고
    • See PUTNAM, supra note 16, at 172 (arguing that reciprocity undergirds social trust, which facilitates cooperation in communities)
    • See PUTNAM, supra note 16, at 172 (arguing that reciprocity undergirds social trust, which facilitates cooperation in communities).
  • 47
    • 0039101929 scopus 로고    scopus 로고
    • See, e.g., SELIGMAN, supra note 8, at 22 (arguing that the concept of social role has been "fundamental to modern sociological analysis"); Baier, supra note 9 at 256 (arguing that people trust others to perform their roles in society); Pettit, supra note 14, at 221 (arguing that divisions among people in a community are likely to reduce the chances of people from different sides trusting one another)
    • See, e.g., SELIGMAN, supra note 8, at 22 (arguing that the concept of social role has been "fundamental to modern sociological analysis"); Baier, supra note 9 at 256 (arguing that people trust others to perform their roles in society); Pettit, supra note 14, at 221 (arguing that divisions among people in a community are likely to reduce the chances of people from different sides trusting one another).
  • 48
    • 11744348112 scopus 로고    scopus 로고
    • See LUHMANN, supra note 10, at 78-85 (discussing the conditions necessary for trust to be formed)
    • See LUHMANN, supra note 10, at 78-85 (discussing the conditions necessary for trust to be formed); Russell Hardin, The Street-Level Epistemology of Trust, 21 POL. & SOC'Y 505, 514 (1993) (asserting that the "terrible vision of a permanent underclass in American city ghettos may have its grounding in the lesson that the children of the ghetto are taught . . . that they cannot trust others"); Pettit, supra note 14, at 222 (arguing that a society in which trust is found only in small family groups might become very cynical); Weinstock, supra note 19, at 263-83.
  • 49
    • 11744348112 scopus 로고    scopus 로고
    • The street-level epistemology of trust
    • See LUHMANN, supra note 10, at 78-85 (discussing the conditions necessary for trust to be formed); Russell Hardin, The Street-Level Epistemology of Trust, 21 POL. & SOC'Y 505, 514 (1993) (asserting that the "terrible vision of a permanent underclass in American city ghettos may have its grounding in the lesson that the children of the ghetto are taught . . . that they cannot trust others"); Pettit, supra note 14, at 222 (arguing that a society in which trust is found only in small family groups might become very cynical); Weinstock, supra note 19, at 263-83.
    • (1993) Pol. & Soc'y , vol.21 , pp. 505
    • Hardin, R.1
  • 50
    • 0040880210 scopus 로고    scopus 로고
    • See LUHMANN, supra note 10, at 84 (commenting on how "complex and richly varied the social conditions for the formation of trust are")
    • See LUHMANN, supra note 10, at 84 (commenting on how "complex and richly varied the social conditions for the formation of trust are").
  • 51
    • 0039101926 scopus 로고    scopus 로고
    • See Hardin, supra note 37, at 522 (discussing social mechanisms that generate trust); Pettit, supra note 14, at 220 (arguing that the "trust-responsiveness mechanism" has implications for institutional design); Weinstock, supra note 19, at 263-83
    • See Hardin, supra note 37, at 522 (discussing social mechanisms that generate trust); Pettit, supra note 14, at 220 (arguing that the "trust-responsiveness mechanism" has implications for institutional design); Weinstock, supra note 19, at 263-83.
  • 52
    • 0033244312 scopus 로고    scopus 로고
    • The meaning of anonymity in an information age
    • There is far more complexity to this issue than I need, or am able, to show here. See, e.g., Helen Nissenbaum, The Meaning of Anonymity in an Information Age, 15 INFO. SOC'Y 141, 141 (1999) (discussing anonymity and what it means to protect it); Kathleen Wallace, Anonymity, 1 ETHICS AND INFO. TECH. 23, 23 (1999) (offering a definition of anonymity).
    • (1999) Info. Soc'y , vol.15 , pp. 141
    • Nissenbaum, H.1
  • 53
    • 0013227993 scopus 로고    scopus 로고
    • Anonymity
    • There is far more complexity to this issue than I need, or am able, to show here. See, e.g., Helen Nissenbaum, The Meaning of Anonymity in an Information Age, 15 INFO. SOC'Y 141, 141 (1999) (discussing anonymity and what it means to protect it); Kathleen Wallace, Anonymity, 1 ETHICS AND INFO. TECH. 23, 23 (1999) (offering a definition of anonymity).
    • (1999) Ethics and Info. Tech. , vol.1 , pp. 23
    • Wallace, K.1
  • 54
    • 0040880212 scopus 로고    scopus 로고
    • note
    • In 1999, a thirteen-year-old boy from Haddonfield, N.J. participated in Ebay auctions, bidding away $3.2 million dollars on items like a van Gogh sketch and a 1971 Corvette convertible. His parents were successful in freeing themselves from responsibility for these transactions. See Boy Bids $3M at Online Site, AP ONLINE (Haddonfield), Apr. 30, 1999, available in 1999 WL 17062405 (reporting the exploits of the eighth-grade online bidder).
  • 55
    • 0001604963 scopus 로고
    • A rape in cyberspace; or, how an evil clown, a haitian trickster spirit, two wizards, and a cast of dozens turned a database into a society
    • Mark Dery, ed.
    • See Julian Dibbell, A Rape in Cyberspace; or, How an Evil Clown, a Haitian Trickster Spirit, Two Wizards, and a Cast of Dozens Turned a Database into a Society, in FLAME WARS: THE DISCOURSE OF CYBERCULTURE 237, 237-40 (Mark Dery, ed. 1994) (describing a fictional virtual rape in an online multi-user domain).
    • (1994) Flame Wars: The Discourse Of Cyberculture , vol.237 , pp. 237-240
    • Dibbell, J.1
  • 56
    • 0040285875 scopus 로고    scopus 로고
    • note
    • This is what I mean by organizing according to functionality. Structurally, a password is a very different device to a locked door, but in relation to this aspect of computer security, namely access control, they are effectively the same.
  • 57
    • 0039101958 scopus 로고    scopus 로고
    • Computer world battles faster-moving viruses technology
    • Oct. 4, at C1, C7 (reflecting on the "notorious" outbreak of the Morris Worm and explaining that an internet security clearinghouse was created in response to the damage done by the Morris Worm)
    • See Ashley Dunn, Computer World Battles Faster-Moving Viruses Technology, LA TIMES, Oct. 4, 1999, at C1, C7 (reflecting on the "notorious" outbreak of the Morris Worm and explaining that an internet security clearinghouse was created in response to the damage done by the Morris Worm).
    • (1999) La Times
    • Dunn, A.1
  • 58
    • 0039101961 scopus 로고    scopus 로고
    • Khare & Rifkin, supra note 5, at ¶ 4
    • Khare & Rifkin, supra note 5, at ¶ 4.
  • 59
    • 0008694796 scopus 로고    scopus 로고
    • Risks of e-mail borne viruses, worms, and trojan horses
    • ¶¶ 1, 6, 9, 11, 12, 13 June 17
    • Bruce Schneier, Risks of E-mail Borne Viruses, Worms, and Trojan Horses, 20 RISKS DIGEST 2, ¶¶ 1, 6, 9, 11, 12, 13 (June 17, 1999) 〈http://catless.ncl.ac.uk/Risks/20.45.html〉.
    • (1999) Risks Digest , vol.20 , pp. 2
    • Schneier, B.1
  • 60
    • 0040285807 scopus 로고    scopus 로고
    • See, e.g., COMMITTEE ON INFORMATION SYSTEMS TRUSTWORTHINESS, NATIONAL RESEARCH COUNCIL, TRUST IN CYBERSPACE 134-37 (Fred B. Schneider ed., 1999) (defining firewalls and identifying them as one of the mechanisms used to prevented unwanted access to computer systems)
    • See, e.g., COMMITTEE ON INFORMATION SYSTEMS TRUSTWORTHINESS, NATIONAL RESEARCH COUNCIL, TRUST IN CYBERSPACE 134-37 (Fred B. Schneider ed., 1999) (defining firewalls and identifying them as one of the mechanisms used to prevented unwanted access to computer systems).
  • 61
    • 0039694117 scopus 로고    scopus 로고
    • JAVAWORLD, May 1
    • See, e.g., Gary McGraw & Edward Felten, Understanding the Keys to Java Security, JAVAWORLD, May 1, 1997, available in 1997 WL 28334788 (reporting that a "code-signing hole" had been found in Java software);
    • (1997) Understanding the Keys to Java Security
    • McGraw, G.1    Felten, E.2
  • 63
    • 0039694120 scopus 로고    scopus 로고
    • See LAWRENCE LESSIG, CODE AND OTHER LAWS OF CYBERSPACE 34-35 (1999) (identifying three common architectures of identity used on Internet as passwords, "cookies," and digital certificates)
    • See LAWRENCE LESSIG, CODE AND OTHER LAWS OF CYBERSPACE 34-35 (1999) (identifying three common architectures of identity used on Internet as passwords, "cookies," and digital certificates).
  • 64
    • 0033244312 scopus 로고    scopus 로고
    • The meaning of anonymity in an information age
    • But cf. Helen Nissenbaum, The Meaning of Anonymity in an Information Age, 15 INFO. SOC'Y 141, 143 (1999) (arguing that the information age's capacity to aggregate and analyze the data necessary to identify an individual, even without access to a name, presents a new challenge to protecting anonymity, where society desires to do so).
    • (1999) Info. Soc'y , vol.15 , pp. 141
    • Nissenbaum, H.1
  • 65
    • 0039694119 scopus 로고    scopus 로고
    • Microsoft Explorer's security is based on this principle
    • Microsoft Explorer's security is based on this principle.
  • 66
    • 0040285873 scopus 로고    scopus 로고
    • See Schneier, supra note 46, at ¶ 9 ("One problem is the permissive nature of the Internet.") 53 This seems to be the form of the Federal Intrusion Detection Network (FIDNet) system proposed by the National Security Council and endorsed by the Clinton administration to protect government computers
    • See Schneier, supra note 46, at ¶ 9 ("One problem is the permissive nature of the Internet.") 53 This seems to be the form of the Federal Intrusion Detection Network (FIDNet) system proposed by the National Security Council and endorsed by the Clinton administration to protect government computers. See Marc Lacey, Clinton Outlines Plan and Money to Tighten Computer Security, N.Y. TIMES, Jan. 8, 2000, at A14 (identifying FIDNet as part of the Clinton Administration's larger computer security plan); see also White House Fact Sheet: Cyber Security Budget Initiatives, U.S. NEWSWIRE, Feb. 15, 2000, available in 2000 WL 4141378 (outlining the Clinton Administration's budget initiatives related to cyber security for fiscal year 2001); THE WHITE HOUSE, DEFENDING AMERICA'S CYBERSPACE: NATIONAL PLAN FOR INFORMATION SYSTEMS PROTECTION, VERSION 1.0: AN INVITATION TO DIALOGUE, EXECUTIVE SUMMARY 15 (2000) (discussing various government intrusion detection systems). The FIDNet proposal has met with significant opposition from various civil liberties groups. See, e.g., John Markoff, The Strength of the Internet Proves to Be Its Weakness, N.Y. TIMES, Feb. 10, 2000, at C1 (noting that FIDNet caused alarm among civil libertarians who said it would be used to curtail privacy on the internet); see also Patrick Thibodeau, Senate Hears Objections to Cyberalarm, COMPUTERWORLD, Feb. 7, 2000, at 25, available in LEXIS, News Library, U.S. News, Combined File (reporting on privacy group's testimony before the U.S. Senate Judiciary Subcommittee on Technology, Terrorism and Government Information).
  • 67
    • 0040285812 scopus 로고    scopus 로고
    • N.Y. TIMES, Jan. 8, at A14 (identifying FIDNet as part of the Clinton Administration's larger computer security plan)
    • See Schneier, supra note 46, at ¶ 9 ("One problem is the permissive nature of the Internet.") 53 This seems to be the form of the Federal Intrusion Detection Network (FIDNet) system proposed by the National Security Council and endorsed by the Clinton administration to protect government computers. See Marc Lacey, Clinton Outlines Plan and Money to Tighten Computer Security, N.Y. TIMES, Jan. 8, 2000, at A14 (identifying FIDNet as part of the Clinton Administration's larger computer security plan); see also White House Fact Sheet: Cyber Security Budget Initiatives, U.S. NEWSWIRE, Feb. 15, 2000, available in 2000 WL 4141378 (outlining the Clinton Administration's budget initiatives related to cyber security for fiscal year 2001); THE WHITE HOUSE, DEFENDING AMERICA'S CYBERSPACE: NATIONAL PLAN FOR INFORMATION SYSTEMS PROTECTION, VERSION 1.0: AN INVITATION TO DIALOGUE, EXECUTIVE SUMMARY 15 (2000) (discussing various government intrusion detection systems). The FIDNet proposal has met with significant opposition from various civil liberties groups. See, e.g., John Markoff, The Strength of the Internet Proves to Be Its Weakness, N.Y. TIMES, Feb. 10, 2000, at C1 (noting that FIDNet caused alarm among civil libertarians who said it would be used to curtail privacy on the internet); see also Patrick Thibodeau, Senate Hears Objections to Cyberalarm, COMPUTERWORLD, Feb. 7, 2000, at 25, available in LEXIS, News Library, U.S. News, Combined File (reporting on privacy group's testimony before the U.S. Senate Judiciary Subcommittee on Technology, Terrorism and Government Information).
    • (2000) Clinton Outlines Plan and Money to Tighten Computer Security
    • Lacey, M.1
  • 68
    • 0039101891 scopus 로고    scopus 로고
    • U.S. NEWSWIRE, Feb. 15, 2000, available in 2000 WL 4141378 outlining the Clinton Administration's budget initiatives related to cyber security for fiscal year
    • See Schneier, supra note 46, at ¶ 9 ("One problem is the permissive nature of the Internet.") 53 This seems to be the form of the Federal Intrusion Detection Network (FIDNet) system proposed by the National Security Council and endorsed by the Clinton administration to protect government computers. See Marc Lacey, Clinton Outlines Plan and Money to Tighten Computer Security, N.Y. TIMES, Jan. 8, 2000, at A14 (identifying FIDNet as part of the Clinton Administration's larger computer security plan); see also White House Fact Sheet: Cyber Security Budget Initiatives, U.S. NEWSWIRE, Feb. 15, 2000, available in 2000 WL 4141378 (outlining the Clinton Administration's budget initiatives related to cyber security for fiscal year 2001); THE WHITE HOUSE, DEFENDING AMERICA'S CYBERSPACE: NATIONAL PLAN FOR INFORMATION SYSTEMS PROTECTION, VERSION 1.0: AN INVITATION TO DIALOGUE, EXECUTIVE SUMMARY 15 (2000) (discussing various government intrusion detection systems). The FIDNet proposal has met with significant opposition from various civil liberties groups. See, e.g., John Markoff, The Strength of the Internet Proves to Be Its Weakness, N.Y. TIMES, Feb. 10, 2000, at C1 (noting that FIDNet caused alarm among civil libertarians who said it would be used to curtail privacy on the internet); see also Patrick Thibodeau, Senate Hears Objections to Cyberalarm, COMPUTERWORLD, Feb. 7, 2000, at 25, available in LEXIS, News Library, U.S. News, Combined File (reporting on privacy group's testimony before the U.S. Senate Judiciary Subcommittee on Technology, Terrorism and Government Information).
    • (2001) White House Fact Sheet: Cyber Security Budget Initiatives
  • 69
    • 0039694069 scopus 로고    scopus 로고
    • See Schneier, supra note 46, at ¶ 9 ("One problem is the permissive nature of the Internet.") 53 This seems to be the form of the Federal Intrusion Detection Network (FIDNet) system proposed by the National Security Council and endorsed by the Clinton administration to protect government computers. See Marc Lacey, Clinton Outlines Plan and Money to Tighten Computer Security, N.Y. TIMES, Jan. 8, 2000, at A14 (identifying FIDNet as part of the Clinton Administration's larger computer security plan); see also White House Fact Sheet: Cyber Security Budget Initiatives, U.S. NEWSWIRE, Feb. 15, 2000, available in 2000 WL 4141378 (outlining the Clinton Administration's budget initiatives related to cyber security for fiscal year 2001); THE WHITE HOUSE, DEFENDING AMERICA'S CYBERSPACE: NATIONAL PLAN FOR INFORMATION SYSTEMS PROTECTION, VERSION 1.0: AN INVITATION TO DIALOGUE, EXECUTIVE SUMMARY 15 (2000) (discussing various government intrusion detection systems). The FIDNet proposal has met with significant opposition from various civil liberties groups. See, e.g., John Markoff, The Strength of the Internet Proves to Be Its Weakness, N.Y. TIMES, Feb. 10, 2000, at C1 (noting that FIDNet caused alarm among civil libertarians who said it would be used to curtail privacy on the internet); see also Patrick Thibodeau, Senate Hears Objections to Cyberalarm, COMPUTERWORLD, Feb. 7, 2000, at 25, available in LEXIS, News Library, U.S. News, Combined File (reporting on privacy group's testimony before the U.S. Senate Judiciary Subcommittee on Technology, Terrorism and Government Information).
    • (2000) The White House, Defending America's Cyberspace: National Plan for Information Systems Protection, Version 1.0: An Invitation to Dialogue, Executive Summary , pp. 15
  • 70
    • 0040285808 scopus 로고    scopus 로고
    • N.Y. TIMES, Feb. 10, at C1 (noting that FIDNet caused alarm among civil libertarians who said it would be used to curtail privacy on the internet)
    • See Schneier, supra note 46, at ¶ 9 ("One problem is the permissive nature of the Internet.") 53 This seems to be the form of the Federal Intrusion Detection Network (FIDNet) system proposed by the National Security Council and endorsed by the Clinton administration to protect government computers. See Marc Lacey, Clinton Outlines Plan and Money to Tighten Computer Security, N.Y. TIMES, Jan. 8, 2000, at A14 (identifying FIDNet as part of the Clinton Administration's larger computer security plan); see also White House Fact Sheet: Cyber Security Budget Initiatives, U.S. NEWSWIRE, Feb. 15, 2000, available in 2000 WL 4141378 (outlining the Clinton Administration's budget initiatives related to cyber security for fiscal year 2001); THE WHITE HOUSE, DEFENDING AMERICA'S CYBERSPACE: NATIONAL PLAN FOR INFORMATION SYSTEMS PROTECTION, VERSION 1.0: AN INVITATION TO DIALOGUE, EXECUTIVE SUMMARY 15 (2000) (discussing various government intrusion detection systems). The FIDNet proposal has met with significant opposition from various civil liberties groups. See, e.g., John Markoff, The Strength of the Internet Proves to Be Its Weakness, N.Y. TIMES, Feb. 10, 2000, at C1 (noting that FIDNet caused alarm among civil libertarians who said it would be used to curtail privacy on the internet); see also Patrick Thibodeau, Senate Hears Objections to Cyberalarm, COMPUTERWORLD, Feb. 7, 2000, at 25, available in LEXIS, News Library, U.S. News, Combined File (reporting on privacy group's testimony before the U.S. Senate Judiciary Subcommittee on Technology, Terrorism and Government Information).
    • (2000) The Strength of the Internet Proves to Be Its Weakness
    • Markoff, J.1
  • 71
    • 0039694073 scopus 로고    scopus 로고
    • COMPUTERWORLD, Feb. 7, at 25
    • See Schneier, supra note 46, at ¶ 9 ("One problem is the permissive nature of the Internet.") 53 This seems to be the form of the Federal Intrusion Detection Network (FIDNet) system proposed by the National Security Council and endorsed by the Clinton administration to protect government computers. See Marc Lacey, Clinton Outlines Plan and Money to Tighten Computer Security, N.Y. TIMES, Jan. 8, 2000, at A14 (identifying FIDNet as part of the Clinton Administration's larger computer security plan); see also White House Fact Sheet: Cyber Security Budget Initiatives, U.S. NEWSWIRE, Feb. 15, 2000, available in 2000 WL 4141378 (outlining the Clinton Administration's budget initiatives related to cyber security for fiscal year 2001); THE WHITE HOUSE, DEFENDING AMERICA'S CYBERSPACE: NATIONAL PLAN FOR INFORMATION SYSTEMS PROTECTION, VERSION 1.0: AN INVITATION TO DIALOGUE, EXECUTIVE SUMMARY 15 (2000) (discussing various government intrusion detection systems). The FIDNet proposal has met with significant opposition from various civil liberties groups. See, e.g., John Markoff, The Strength of the Internet Proves to Be Its Weakness, N.Y. TIMES, Feb. 10, 2000, at C1 (noting that FIDNet caused alarm among civil libertarians who said it would be used to curtail privacy on the internet); see also Patrick Thibodeau, Senate Hears Objections to Cyberalarm, COMPUTERWORLD, Feb. 7, 2000, at 25, available in LEXIS, News Library, U.S. News, Combined File (reporting on privacy group's testimony before the U.S. Senate Judiciary Subcommittee on Technology, Terrorism and Government Information).
    • (2000) Senate Hears Objections to Cyberalarm
    • Thibodeau, P.1
  • 72
    • 0039694055 scopus 로고    scopus 로고
    • Melissa's creator faces 'hard time'
    • Apr. 14, at 7, available in LEXIS, News Library, U.S. News, Computing & Technology file (reporting that America Online assisted federal and state law enforcement agents in identifying David Smith as the creator of the Melissa virus)
    • See John Leyden, Melissa's Creator Faces 'Hard Time', NETWORK NEWS, Apr. 14, 1999, at 7, available in LEXIS, News Library, U.S. News, Computing & Technology file (reporting that America Online assisted federal and state law enforcement agents in identifying David Smith as the creator of the Melissa virus); Lee Copeland, Virus Creator Fesses Up - Admits to Originating and Disseminating Melissa, COMPUTER RESELLER NEWS, Sep. 6, 1999, available in LEXIS, News Library, Newspaper Stories, Combined Papers (noting that America Online tracked Smith down by tracing the virus to a list server in New Jersey); Hiawatha Bray, N.J. man charged in computer virus case, THE BOSTON GLOBE, Apr. 3, 1999, at A1, available in LEXIS, News Library, Newspaper Stories, Combined Papers (noting that America Online assisted the government agents in identifying Smith).
    • (1999) Network News
    • Leyden, J.1
  • 73
    • 0040285813 scopus 로고    scopus 로고
    • Virus creator fesses up - Admits to originating and disseminating Melissa
    • Sep. 6
    • See John Leyden, Melissa's Creator Faces 'Hard Time', NETWORK NEWS, Apr. 14, 1999, at 7, available in LEXIS, News Library, U.S. News, Computing & Technology file (reporting that America Online assisted federal and state law enforcement agents in identifying David Smith as the creator of the Melissa virus); Lee Copeland, Virus Creator Fesses Up - Admits to Originating and Disseminating Melissa, COMPUTER RESELLER NEWS, Sep. 6, 1999, available in LEXIS, News Library, Newspaper Stories, Combined Papers (noting that America Online tracked Smith down by tracing the virus to a list server in New Jersey); Hiawatha Bray, N.J. man charged in computer virus case, THE BOSTON GLOBE, Apr. 3, 1999, at A1, available in LEXIS, News Library, Newspaper Stories, Combined Papers (noting that America Online assisted the government agents in identifying Smith).
    • (1999) Computer Reseller News
  • 74
    • 0039101889 scopus 로고    scopus 로고
    • THE BOSTON GLOBE, Apr. 3, at A1, available in LEXIS, News Library, Newspaper Stories, Combined Papers (noting that America Online assisted the government agents in identifying Smith)
    • See John Leyden, Melissa's Creator Faces 'Hard Time', NETWORK NEWS, Apr. 14, 1999, at 7, available in LEXIS, News Library, U.S. News, Computing & Technology file (reporting that America Online assisted federal and state law enforcement agents in identifying David Smith as the creator of the Melissa virus); Lee Copeland, Virus Creator Fesses Up - Admits to Originating and Disseminating Melissa, COMPUTER RESELLER NEWS, Sep. 6, 1999, available in LEXIS, News Library, Newspaper Stories, Combined Papers (noting that America Online tracked Smith down by tracing the virus to a list server in New Jersey); Hiawatha Bray, N.J. man charged in computer virus case, THE BOSTON GLOBE, Apr. 3, 1999, at A1, available in LEXIS, News Library, Newspaper Stories, Combined Papers (noting that America Online assisted the government agents in identifying Smith).
    • (1999) N.J. Man Charged in Computer Virus Case
    • Bray, H.1
  • 75
    • 0039101914 scopus 로고    scopus 로고
    • Baier, supra note 9, at 235
    • Baier, supra note 9, at 235.
  • 76
    • 0039101913 scopus 로고    scopus 로고
    • Id. at 259
    • Id. at 259.
  • 77
    • 0039101915 scopus 로고    scopus 로고
    • Hardin, supra note 37, at 507
    • Hardin, supra note 37, at 507.
  • 78
    • 0040880175 scopus 로고    scopus 로고
    • SELIGMAN, supra note 8, at 43
    • SELIGMAN, supra note 8, at 43.
  • 79
    • 0040880171 scopus 로고    scopus 로고
    • FUKUYAMA, supra note 14, at 26
    • FUKUYAMA, supra note 14, at 26.
  • 80
    • 0039101908 scopus 로고    scopus 로고
    • See Baier, supra note 9, at 236 (analyzing trust as a relationship in which "A trusts B with valued thing C," and in which B is given discretionary powers with respect to C); Hardin, supra note 36, at 506 ("To say 'I trust you' seems almost always to be elliptical, as though we can assume some such phrase as 'to do X' or 'in matters Y.'"); Weinstock, supra note 19, at 263-83
    • See Baier, supra note 9, at 236 (analyzing trust as a relationship in which "A trusts B with valued thing C," and in which B is given discretionary powers with respect to C); Hardin, supra note 36, at 506 ("To say 'I trust you' seems almost always to be elliptical, as though we can assume some such phrase as 'to do X' or 'in matters Y.'"); Weinstock, supra note 19, at 263-83.
  • 81
    • 0039101909 scopus 로고    scopus 로고
    • Baier, supra note 9, at 245 ("We take it for granted that people will perform their role-related duties and trust any individual worker to look after whatever her job requires her to. The very existence of that job, as a standard occupation, creates a climate of some trust in those with that job.")
    • Baier, supra note 9, at 245 ("We take it for granted that people will perform their role-related duties and trust any individual worker to look after whatever her job requires her to. The very existence of that job, as a standard occupation, creates a climate of some trust in those with that job.")
  • 82
    • 0035608716 scopus 로고    scopus 로고
    • Trust ethics and privacy
    • See Goldberg et al., Trust Ethics and Privacy, 81 B. U. L. REV. 407 (2001) (discussing changes to Amazon.com's privacy agreement, protecting customer information, that resulted in reduced protections).
    • (2001) B. U. L. Rev. , vol.81 , pp. 407
    • Goldberg1
  • 83
    • 0039101890 scopus 로고    scopus 로고
    • Hardin, supra note 37, at 507
    • Hardin, supra note 37, at 507.
  • 84
    • 0040285806 scopus 로고    scopus 로고
    • See LUHMANN, supra note 10, at 20 (noting that trust is based in part on familiarity, history, and past experiences); id. at 24 (arguing that trust always involves the risk that the harm resulting from a breach of trust may be greater than the benefit to be gained by trusting); Pettit, supra note 14, at 208 (arguing that irrespective of how one defines risk-taking, trust always involves putting oneself in a position of vulnerability whereby it is possible for the other person to do harm to the truster); Weinstock, supra note 19, at 263-83
    • See LUHMANN, supra note 10, at 20 (noting that trust is based in part on familiarity, history, and past experiences); id. at 24 (arguing that trust always involves the risk that the harm resulting from a breach of trust may be greater than the benefit to be gained by trusting); Pettit, supra note 14, at 208 (arguing that irrespective of how one defines risk-taking, trust always involves putting oneself in a position of vulnerability whereby it is possible for the other person to do harm to the truster); Weinstock, supra note 19, at 263-83.
  • 85
    • 0009431934 scopus 로고
    • The right of privacy
    • Richard Posner, The Right of Privacy, 12 GA. L. REV. 393, 408 (1978).
    • (1978) Ga. L. Rev. , vol.12 , pp. 393
    • Posner, R.1
  • 86
    • 0040285791 scopus 로고    scopus 로고
    • WASH. POST, September 22, at A31, available in LEXIS, News Library, Newspaper Stories, Combined Papers (reporting that civil liberties groups welcomed changes to the Clinton Administration's original proposals, in particular limitations on automatic data collection); see also supra note 53 (discussing the Clinton Administration's proposal for, and reaction to, enhanced computer network security programs)
    • There has been discussion in the media about the Clinton administration's proposals to monitor both governmental and private networks for signs of terrorist and criminal activity. See, e.g., Robert O'Harrow, Computer Security Proposal Is Revised: Critics Had Raised Online Privacy Fears, WASH. POST, September 22, 1999, at A31, available in LEXIS, News Library, Newspaper Stories, Combined Papers (reporting that civil liberties groups welcomed changes to the Clinton Administration's original proposals, in particular limitations on automatic data collection); see also supra note 53 (discussing the Clinton Administration's proposal for, and reaction to, enhanced computer network security programs).
    • (1999) Computer Security Proposal Is Revised: Critics Had Raised Online Privacy Fears
    • O'Harrow, R.1
  • 87
    • 0040880167 scopus 로고    scopus 로고
    • See LUHMANN, supra note 10, at 15 (noting that "trust increases the 'tolerance of uncertainty,'" and explaining that "mastery of events" (i.e. knowledge) can replace trust)
    • See LUHMANN, supra note 10, at 15 (noting that "trust increases the 'tolerance of uncertainty,'" and explaining that "mastery of events" (i.e. knowledge) can replace trust).
  • 88
    • 0039101903 scopus 로고    scopus 로고
    • Id. at 42
    • Id. at 42.
  • 89
    • 23144435923 scopus 로고    scopus 로고
    • Trust and distrust in organizations: Emerging perspectives, enduring questions
    • Roderick M. Kramer, Trust and Distrust in Organizations: Emerging Perspectives, Enduring Questions, 50 ANN. REV. PSYCHOL. 569, 591 (1999).
    • (1999) Ann. Rev. Psychol. , vol.50 , pp. 569
    • Kramer, R.M.1
  • 90
    • 0040285801 scopus 로고    scopus 로고
    • Pettit, supra note 14, at 225
    • Pettit, supra note 14, at 225.
  • 91
    • 0039694059 scopus 로고    scopus 로고
    • See Dibbell, supra note 42, at 239-42 (describing a fictional virtual rape in an online multi-user domain)
    • See Dibbell, supra note 42, at 239-42 (describing a fictional virtual rape in an online multi-user domain).
  • 92
    • 0040880161 scopus 로고    scopus 로고
    • See U.S. DEP'T OF JUST., BUREAU OF JUSTICE STATISTICS: SELECTED FINDINGS, VIOLENT CRIME 3 (1994) (reporting that "in murders where the relationship between the victim and the offender was known, 44% of the victims were killed by an acquaintance, 22% by a stranger, and 20% by a family member")
    • See U.S. DEP'T OF JUST., BUREAU OF JUSTICE STATISTICS: SELECTED FINDINGS, VIOLENT CRIME 3 (1994) (reporting that "in murders where the relationship between the victim and the offender was known, 44% of the victims were killed by an acquaintance, 22% by a stranger, and 20% by a family member").
  • 93
    • 0027769403 scopus 로고    scopus 로고
    • See Becker, supra note 12, at 50 (noting that "ordinary life" provides substantial anecdotal evidence that most people have personal relationships in which they remain "trustful despite the known untrustworthiness of others")
    • See Becker, supra note 12, at 50 (noting that "ordinary life" provides substantial anecdotal evidence that most people have personal relationships in which they remain "trustful despite the known untrustworthiness of others"); cf. Paul Slovic, Perceived Risk, Trust and Democracy, 13 RISK ANALYSIS 675, 677 (1993) (describing trust as fragile and identifying "the asymmetry principle," by which trust is usually created slowly, but destroyed in an instant, often by a single event) .
  • 94
    • 0027769403 scopus 로고    scopus 로고
    • Perceived risk, trust and democracy
    • See Becker, supra note 12, at 50 (noting that "ordinary life" provides substantial anecdotal evidence that most people have personal relationships in which they remain "trustful despite the known untrustworthiness of others"); cf. Paul Slovic, Perceived Risk, Trust and Democracy, 13 RISK ANALYSIS 675, 677 (1993) (describing trust as fragile and identifying "the asymmetry principle," by which trust is usually created slowly, but destroyed in an instant, often by a single event) .
    • (1993) Risk Analysis , vol.13 , pp. 675
    • Slovic, P.1
  • 95
    • 0040880162 scopus 로고    scopus 로고
    • See Hoffman et al., supra note 3, at 82 (concluding that the primary barriers to consumers providing demographic data to Web sites are related to trust and noting that over 72% of Web users indicated they would provide demographic data if the Web sites would provide information regarding how the collected data would be used)
    • See Hoffman et al., supra note 3, at 82 (concluding that the primary barriers to consumers providing demographic data to Web sites are related to trust and noting that over 72% of Web users indicated they would provide demographic data if the Web sites would provide information regarding how the collected data would be used).
  • 96
    • 0039694058 scopus 로고    scopus 로고
    • See Becker, supra note 12, at 59 (arguing that a person's loss of confidence in another person's motivations does more harm to the relationship than when the other person proves to be "merely unreliable or not credible"). 76 Id. at 51
    • See Becker, supra note 12, at 59 (arguing that a person's loss of confidence in another person's motivations does more harm to the relationship than when the other person proves to be "merely unreliable or not credible"). 76 Id. at 51.
  • 97
    • 0039101892 scopus 로고    scopus 로고
    • Id. at 59
    • Id. at 59.
  • 98
    • 0040285790 scopus 로고    scopus 로고
    • See Slovic, supra note 73, at 680 (contrasting French and American citizens' reaction to risks associated with nuclear power and noting that the French public's acceptance of the risks is partly related to the public trust in the state-run nuclear program, which has a reputation for emphasizing public service over profits)
    • See Slovic, supra note 73, at 680 (contrasting French and American citizens' reaction to risks associated with nuclear power and noting that the French public's acceptance of the risks is partly related to the public trust in the state-run nuclear program, which has a reputation for emphasizing public service over profits).
  • 99
    • 0035626654 scopus 로고    scopus 로고
    • Trust and law abidingness: A proactive model of social regulation
    • See Tom Tyler, Trust and Law Abidingness: A Proactive Model of Social Regulation, 81 B. U. L. REV. 361 (2001) (advocating a "proactive model of social regulation that is based upon encouraging and maintaining public trust in the character and motives of legal authorities").
    • (2001) B. U. L. Rev. , vol.81 , pp. 361
    • Tyler, T.1
  • 100
    • 0039694056 scopus 로고    scopus 로고
    • See id. at 366 ("Motive based trust is central to situations in which people rely upon fiduciary authorities."); see also id. at 376 (summarizing results of an empirical study and concluding that trust is an important factor in shaping people's reactions to their experience with legal authorities because one, "people who trust the motives of the authority with whom they are dealing are more willing to defer to that authority;" and two, "trust leads to more positive feelings about the legal authority involved")
    • See id. at 366 ("Motive based trust is central to situations in which people rely upon fiduciary authorities."); see also id. at 376 (summarizing results of an empirical study and concluding that trust is an important factor in shaping people's reactions to their experience with legal authorities because one, "people who trust the motives of the authority with whom they are dealing are more willing to defer to that authority;" and two, "trust leads to more positive feelings about the legal authority involved").
  • 101
    • 0040285795 scopus 로고    scopus 로고
    • Id.
    • Id.
  • 102
    • 0040880155 scopus 로고    scopus 로고
    • See id. at 396 ("In the context of a specific personal experience with a legal authority, people are willing to voluntarily defer based upon their belief that the authorities are acting in a trustworthy manner. They infer trustworthiness from the justice of the actions of the authorities."); see also id. at 398 (discussing the opportunities police officers and judges have to developing public good will by justifying outcomes by reference to the public's moral values, in the outcome context, and treating people fairly in the procedural context)
    • See id. at 396 ("In the context of a specific personal experience with a legal authority, people are willing to voluntarily defer based upon their belief that the authorities are acting in a trustworthy manner. They infer trustworthiness from the justice of the actions of the authorities."); see also id. at 398 (discussing the opportunities police officers and judges have to developing public good will by justifying outcomes by reference to the public's moral values, in the outcome context, and treating people fairly in the procedural context) .
  • 103
    • 0040880158 scopus 로고    scopus 로고
    • See supra note 65 and accompanying text
    • See supra note 65 and accompanying text.
  • 104
    • 0040880159 scopus 로고    scopus 로고
    • note
    • I am grateful to Beth Kolko for suggesting this metaphor. When I presented a version of this paper in September 1999 at The Netherlands Royal Academy of Arts and Sciences a thoughtful audience argued that Amsterdam served better as a contrast.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.