-
1
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avižienis, A., Laprie, J., Randell, B., & Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1), 11-33.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avižienis, A.1
Laprie, J.2
Randell, B.3
Landwehr, C.4
-
2
-
-
0038713944
-
Electronic voting system usability issues
-
Bederson, B., Lee, B., Sherman, R., Herrnson, P., & Niemi, R. (2003). Electronic voting system usability issues. In: Proceedings of the SIGCHI conference on human factors in computing systems (pp. 145-152).
-
(2003)
In: Proceedings of the SIGCHI conference on human factors in computing systems
, pp. 145-152
-
-
Bederson, B.1
Lee, B.2
Sherman, R.3
Herrnson, P.4
Niemi, R.5
-
4
-
-
33646907615
-
Freedom and privacy in ambient intelligence
-
Brey, P. (2005). Freedom and privacy in ambient intelligence. Ethics and Information Technology, 7(3), 157-166.
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.3
, pp. 157-166
-
-
Brey, P.1
-
5
-
-
79952040920
-
-
In: Proceedings of the 36th Hawaii international conference on system sciences (HICSS'03)
-
Chopra, K., & Wallace, W. (2002) Trust in electronic environments. In: Proceedings of the 36th Hawaii international conference on system sciences (HICSS'03).
-
(2002)
Trust in electronic environments
-
-
Chopra, K.1
Wallace, W.2
-
6
-
-
0003408414
-
-
New York, USA: Oxford University Press
-
Faden, R., Beauchamp, T., & King, N. (1986). A history and theory of informed consent. New York, USA: Oxford University Press.
-
(1986)
A History and Theory of Informed Consent
-
-
Faden, R.1
Beauchamp, T.2
King, N.3
-
10
-
-
38549161247
-
-
Availabe online: Consulted June 25, 2010
-
Gonggrijp, R., Hengeveld, W.-J., Bogk, A., Engling, D., Mehnert, H., Rieger, F., Scheffers, P., & Wels, B. (2006). Nedap/Groenendaal ES3B voting computer: a security analysis. Availabe online: http://www. wijvertrouwenstemcomputersniet. nl/images/9/91/Es3b-en. pdf. Consulted June 25, 2010.
-
(2006)
Nedap/Groenendaal ES3B voting computer: A security analysis
-
-
Gonggrijp, R.1
Hengeveld, W.-J.2
Bogk, A.3
Engling, D.4
Mehnert, H.5
Rieger, F.6
Scheffers, P.7
Wels, B.8
-
11
-
-
0000686460
-
Explanations from intelligent systems: Theoretical foundations and implications for practice
-
Gregor, S., & Benbasat, I. (1999). Explanations from intelligent systems: Theoretical foundations and implications for practice. MIS Quarterly, 23(4), 497-530.
-
(1999)
MIS Quarterly
, vol.23
, Issue.4
, pp. 497-530
-
-
Gregor, S.1
Benbasat, I.2
-
12
-
-
70350397967
-
A study into preferred explanations of virtual agent behavior
-
In Z. Ruttkay, M. Kipp, A. Nijholt, & H. Vilhjhalmsson (Eds.), Berlin: Springer
-
Harbers, M., van den Bosch, K., & Meyer, J. (2009). A study into preferred explanations of virtual agent behavior. In Z. Ruttkay, M. Kipp, A. Nijholt, & H. Vilhjhalmsson (Eds.), Intelligent virtual agents 9th international conference (Vol. 5773 of LNCS, pp. 132-145). Berlin: Springer.
-
(2009)
Intelligent virtual agents 9th international conference
, vol.5773
, pp. 132-145
-
-
Harbers, M.1
van den Bosch, K.2
Meyer, J.3
-
14
-
-
33745926003
-
RIES-internet voting in action
-
In R. Bilof (Ed.), IEEE Computer Society
-
Hubbers, E., Jacobs, B., & Pieters, W. (2005). RIES-internet voting in action. In R. Bilof (Ed.), Proceedings of 29th annual international computer software and applications conference, COMPSAC'05 (pp. 417-424). IEEE Computer Society.
-
(2005)
Proceedings of 29th annual international computer software and applications conference, COMPSAC'05
, pp. 417-424
-
-
Hubbers, E.1
Jacobs, B.2
Pieters, W.3
-
15
-
-
77952428149
-
Mobile-centric ambient intelligence in health- and homecare: Anticipating ethical and legal challenges
-
Kosta, E., Pitkänen, O., Niemelä, M., & Kaasinen, E. (2010). Mobile-centric ambient intelligence in health- and homecare: Anticipating ethical and legal challenges. Science and Engineering Ethics, 16(2), 303-323.
-
(2010)
Science and Engineering Ethics
, vol.16
, Issue.2
, pp. 303-323
-
-
Kosta, E.1
Pitkänen, O.2
Niemelä, M.3
Kaasinen, E.4
-
18
-
-
0001968728
-
Familiarity, confidence, trust: Problems and alternatives
-
D. Gambetta (Ed.), Oxford: Basil Blackwell
-
Luhmann, N. (1988). Familiarity, confidence, trust: Problems and alternatives. In D Gambetta (Ed.), Trust: Making and breaking of cooperative relations. Oxford: Basil Blackwell.
-
(1988)
Trust: Making and Breaking of Cooperative Relations.
-
-
Luhmann, N.1
-
19
-
-
33745849657
-
Foundations of attack trees
-
In D. Won & S. Kim (Eds.), Heidelberg: Springer
-
Mauw, S., & Oostdijk, M. (2006). Foundations of attack trees. In D. Won & S. Kim (Eds.), Proceedings of 8th annual international conference on information security and cryptology, ICISC'05 (Vol. 3935 of LNCS, pp. 186-198). Heidelberg: Springer.
-
(2006)
Proceedings of 8th annual international conference on information security and cryptology, ICISC'05
, vol.3935
, pp. 186-198
-
-
Mauw, S.1
Oostdijk, M.2
-
20
-
-
0036824048
-
A better ballot box?
-
Mercuri, R. (2002). A better ballot box?. IEEE Spectrum, 39(10), 26-50.
-
(2002)
IEEE Spectrum
, vol.39
, Issue.10
, pp. 26-50
-
-
Mercuri, R.1
-
21
-
-
19744362318
-
Security by obscurity
-
Mercuri, R., & Neumann, P. (2003). Security by obscurity. Communications of the ACM, 46(11), 160.
-
(2003)
Communications of the ACM
, vol.46
, Issue.11
, pp. 160
-
-
Mercuri, R.1
Neumann, P.2
-
22
-
-
79952042104
-
Trust in technological systems
-
In M. de Vries, S. Hansson, & A. Meijers (Eds.), Springer (Forthcoming)
-
Nickel, P. (2012). Trust in technological systems. In M. de Vries, S. Hansson, & A. Meijers (Eds.), Norms and the artificial: Moral and non-moral norms in technology. Springer (Forthcoming).
-
(2012)
Norms and the artificial: Moral and non-moral norms in technology
-
-
Nickel, P.1
-
23
-
-
84871957390
-
Users and trust in cyberspace
-
In Christianson, B., Crispo, B., Malcolm, J., & Roe M. (Eds.), Cambridge, UK, April 3-5, 2000, Revised Papers, Heidelberg: Springer
-
Nikander, P. & Karvonen, K. (2001). Users and trust in cyberspace. In Christianson, B., Crispo, B., Malcolm, J., & Roe M. (Eds.), Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000, Revised Papers (Vol. 2133 of LNCS, pp. 24-35). Heidelberg: Springer.
-
(2001)
Security protocols: 8th international workshop
, vol.2133
, pp. 24-35
-
-
Nikander, P.1
Karvonen, K.2
-
24
-
-
26944440238
-
A case-based explanation system for black-box systems
-
Nugent, C., & Cunningham, P. (2005). A case-based explanation system for black-box systems. Artificial Intelligence Review, 24(2), 163-178.
-
(2005)
Artificial Intelligence Review
, vol.24
, Issue.2
, pp. 163-178
-
-
Nugent, C.1
Cunningham, P.2
-
25
-
-
85134704265
-
Security as belief: User's perceptions on the security of electronic voting systems
-
In A. Prosser & R. Krimmer (Eds.), Bonn: Gesellschaft für Informatik
-
Oostveen, A., & van den Besselaar, P. (2004) Security as belief: user's perceptions on the security of electronic voting systems. In A. Prosser & R. Krimmer (Eds.), Electronic voting in Europe: Technology, law, politics and society (Vol. P-47 of Lecture notes in informatics, pp. 73-82). Bonn: Gesellschaft für Informatik.
-
(2004)
Electronic voting in Europe: Technology, law, politics and society (Vol. P-47 of Lecture notes in informatics
, pp. 73-82
-
-
Oostveen, A.1
van den Besselaar, P.2
-
27
-
-
70349330370
-
England's controversy over the secret ballot
-
Park, J. (1931). England's controversy over the secret ballot. Political Science Quarterly, 46(1), 51-86.
-
(1931)
Political Science Quarterly
, vol.46
, Issue.1
, pp. 51-86
-
-
Park, J.1
-
28
-
-
33745894129
-
Acceptance of voting technology: between confidence and trust
-
In K. Stølen, W. Winsborough, F. Martinelli, & F. Massacci (Eds.) Berlin: Springer
-
Pieters, W. (2006). Acceptance of voting technology: between confidence and trust. In K. Stølen, W. Winsborough, F. Martinelli, & F. Massacci (Eds.), Trust management: 4th international conference (iTrust 2006), proceedings (Vol. 3986 of LNCS, pp. 283-297). Berlin: Springer.
-
(2006)
Trust management: 4th international conference (iTrust 2006), proceedings
, vol.3986
, pp. 283-297
-
-
Pieters, W.1
-
29
-
-
79952042266
-
Reve{a, i}ling the risks: a phenomenology of information security
-
(forthcoming)
-
Pieters, W. (2010). Reve{a, i}ling the risks: a phenomenology of information security. Techné, 14(3) (forthcoming).
-
(2010)
Techné
, vol.14
, Issue.3
-
-
Pieters, W.1
-
30
-
-
84986078210
-
Temptations of turnout and modernisation: E-voting discourses in the UK and The Netherlands
-
Pieters, W., & van Haren, R. (2007). Temptations of turnout and modernisation: E-voting discourses in the UK and The Netherlands. Journal of Information, Communication and Ethics in Society, 5(4), 276-292.
-
(2007)
Journal of Information, Communication and Ethics in Society
, vol.5
, Issue.4
, pp. 276-292
-
-
Pieters, W.1
van Haren, R.2
-
32
-
-
85008058364
-
Voting technologies and trust
-
Randell, B., & Ryan, P. (2006). Voting technologies and trust'. IEEE Security & Privacy, 4(5), 50-56.
-
(2006)
IEEE Security Privacy
, vol.4
, Issue.5
, pp. 50-56
-
-
Randell, B.1
Ryan, P.2
-
33
-
-
26944475572
-
Mapping goals and kinds of explanations to the knowledge containers of case-based reasoning systems
-
In H. Muños Avila & F. Ricci (Eds.), Berlin: Springer
-
Roth-Berghofer, T., & Cassens, J. (2005). Mapping goals and kinds of explanations to the knowledge containers of case-based reasoning systems. In H. Muños Avila & F. Ricci (Eds.), ICCBR 2005 (Vol. 3620 of LNCS, pp. 451-464). Berlin: Springer.
-
(2005)
ICCBR 2005
, vol.3620
, pp. 451-464
-
-
Roth-Berghofer, T.1
Cassens, J.2
-
34
-
-
0002670359
-
Attack trees: Modeling security threats
-
Schneier, B. (1999). Attack trees: Modeling security threats. Dr. Dobb's Journal, 24(12), 21-29.
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
35
-
-
0002809390
-
Designing trust into online experiences
-
Shneiderman, B. (2000). Designing trust into online experiences. Communications of the ACM, 43(12), 57-59.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 57-59
-
-
Shneiderman, B.1
-
36
-
-
26944470931
-
Explanation in case-based reasoning: Perspectives and goals
-
Sørmo, F., Cassens, J., & Aamodt, A. (2005). Explanation in case-based reasoning: perspectives and goals. Artificial Intelligence Review, 24(2), 109-143.
-
(2005)
Artificial Intelligence Review
, vol.24
, Issue.2
, pp. 109-143
-
-
Sørmo, F.1
Cassens, J.2
Aamodt, A.3
-
38
-
-
33748995094
-
Genomic research and data-mining technology: Implications for personal privacy and informed consent
-
Tavani, H. (2004). Genomic research and data-mining technology: Implications for personal privacy and informed consent. Ethics and Information Technology, 6(1), 15-28.
-
(2004)
Ethics and Information Technology
, vol.6
, Issue.1
, pp. 15-28
-
-
Tavani, H.1
-
40
-
-
0000919171
-
The impact of explanation facilities on user acceptance of expert systems advice
-
Ye, L., & Johnson, P. (1995). The impact of explanation facilities on user acceptance of expert systems advice. MIS Quarterly, 19(2), 157-172.
-
(1995)
MIS Quarterly
, vol.19
, Issue.2
, pp. 157-172
-
-
Ye, L.1
Johnson, P.2
|