메뉴 건너뛰기




Volumn 13, Issue 1, 2011, Pages 53-64

Explanation and trust: What to tell the user in security and AI?

Author keywords

Actor network theory; Confidence; Expert systems; Explanation; Information security; Informed consent; Systems theory; Trust

Indexed keywords


EID: 79952041624     PISSN: 13881957     EISSN: 15728439     Source Type: Journal    
DOI: 10.1007/s10676-010-9253-3     Document Type: Article
Times cited : (127)

References (40)
  • 4
    • 33646907615 scopus 로고    scopus 로고
    • Freedom and privacy in ambient intelligence
    • Brey, P. (2005). Freedom and privacy in ambient intelligence. Ethics and Information Technology, 7(3), 157-166.
    • (2005) Ethics and Information Technology , vol.7 , Issue.3 , pp. 157-166
    • Brey, P.1
  • 5
    • 79952040920 scopus 로고    scopus 로고
    • In: Proceedings of the 36th Hawaii international conference on system sciences (HICSS'03)
    • Chopra, K., & Wallace, W. (2002) Trust in electronic environments. In: Proceedings of the 36th Hawaii international conference on system sciences (HICSS'03).
    • (2002) Trust in electronic environments
    • Chopra, K.1    Wallace, W.2
  • 11
    • 0000686460 scopus 로고    scopus 로고
    • Explanations from intelligent systems: Theoretical foundations and implications for practice
    • Gregor, S., & Benbasat, I. (1999). Explanations from intelligent systems: Theoretical foundations and implications for practice. MIS Quarterly, 23(4), 497-530.
    • (1999) MIS Quarterly , vol.23 , Issue.4 , pp. 497-530
    • Gregor, S.1    Benbasat, I.2
  • 12
    • 70350397967 scopus 로고    scopus 로고
    • A study into preferred explanations of virtual agent behavior
    • In Z. Ruttkay, M. Kipp, A. Nijholt, & H. Vilhjhalmsson (Eds.), Berlin: Springer
    • Harbers, M., van den Bosch, K., & Meyer, J. (2009). A study into preferred explanations of virtual agent behavior. In Z. Ruttkay, M. Kipp, A. Nijholt, & H. Vilhjhalmsson (Eds.), Intelligent virtual agents 9th international conference (Vol. 5773 of LNCS, pp. 132-145). Berlin: Springer.
    • (2009) Intelligent virtual agents 9th international conference , vol.5773 , pp. 132-145
    • Harbers, M.1    van den Bosch, K.2    Meyer, J.3
  • 15
    • 77952428149 scopus 로고    scopus 로고
    • Mobile-centric ambient intelligence in health- and homecare: Anticipating ethical and legal challenges
    • Kosta, E., Pitkänen, O., Niemelä, M., & Kaasinen, E. (2010). Mobile-centric ambient intelligence in health- and homecare: Anticipating ethical and legal challenges. Science and Engineering Ethics, 16(2), 303-323.
    • (2010) Science and Engineering Ethics , vol.16 , Issue.2 , pp. 303-323
    • Kosta, E.1    Pitkänen, O.2    Niemelä, M.3    Kaasinen, E.4
  • 18
    • 0001968728 scopus 로고
    • Familiarity, confidence, trust: Problems and alternatives
    • D. Gambetta (Ed.), Oxford: Basil Blackwell
    • Luhmann, N. (1988). Familiarity, confidence, trust: Problems and alternatives. In D Gambetta (Ed.), Trust: Making and breaking of cooperative relations. Oxford: Basil Blackwell.
    • (1988) Trust: Making and Breaking of Cooperative Relations.
    • Luhmann, N.1
  • 20
    • 0036824048 scopus 로고    scopus 로고
    • A better ballot box?
    • Mercuri, R. (2002). A better ballot box?. IEEE Spectrum, 39(10), 26-50.
    • (2002) IEEE Spectrum , vol.39 , Issue.10 , pp. 26-50
    • Mercuri, R.1
  • 22
    • 79952042104 scopus 로고    scopus 로고
    • Trust in technological systems
    • In M. de Vries, S. Hansson, & A. Meijers (Eds.), Springer (Forthcoming)
    • Nickel, P. (2012). Trust in technological systems. In M. de Vries, S. Hansson, & A. Meijers (Eds.), Norms and the artificial: Moral and non-moral norms in technology. Springer (Forthcoming).
    • (2012) Norms and the artificial: Moral and non-moral norms in technology
    • Nickel, P.1
  • 23
    • 84871957390 scopus 로고    scopus 로고
    • Users and trust in cyberspace
    • In Christianson, B., Crispo, B., Malcolm, J., & Roe M. (Eds.), Cambridge, UK, April 3-5, 2000, Revised Papers, Heidelberg: Springer
    • Nikander, P. & Karvonen, K. (2001). Users and trust in cyberspace. In Christianson, B., Crispo, B., Malcolm, J., & Roe M. (Eds.), Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000, Revised Papers (Vol. 2133 of LNCS, pp. 24-35). Heidelberg: Springer.
    • (2001) Security protocols: 8th international workshop , vol.2133 , pp. 24-35
    • Nikander, P.1    Karvonen, K.2
  • 24
    • 26944440238 scopus 로고    scopus 로고
    • A case-based explanation system for black-box systems
    • Nugent, C., & Cunningham, P. (2005). A case-based explanation system for black-box systems. Artificial Intelligence Review, 24(2), 163-178.
    • (2005) Artificial Intelligence Review , vol.24 , Issue.2 , pp. 163-178
    • Nugent, C.1    Cunningham, P.2
  • 27
    • 70349330370 scopus 로고
    • England's controversy over the secret ballot
    • Park, J. (1931). England's controversy over the secret ballot. Political Science Quarterly, 46(1), 51-86.
    • (1931) Political Science Quarterly , vol.46 , Issue.1 , pp. 51-86
    • Park, J.1
  • 28
    • 33745894129 scopus 로고    scopus 로고
    • Acceptance of voting technology: between confidence and trust
    • In K. Stølen, W. Winsborough, F. Martinelli, & F. Massacci (Eds.) Berlin: Springer
    • Pieters, W. (2006). Acceptance of voting technology: between confidence and trust. In K. Stølen, W. Winsborough, F. Martinelli, & F. Massacci (Eds.), Trust management: 4th international conference (iTrust 2006), proceedings (Vol. 3986 of LNCS, pp. 283-297). Berlin: Springer.
    • (2006) Trust management: 4th international conference (iTrust 2006), proceedings , vol.3986 , pp. 283-297
    • Pieters, W.1
  • 29
    • 79952042266 scopus 로고    scopus 로고
    • Reve{a, i}ling the risks: a phenomenology of information security
    • (forthcoming)
    • Pieters, W. (2010). Reve{a, i}ling the risks: a phenomenology of information security. Techné, 14(3) (forthcoming).
    • (2010) Techné , vol.14 , Issue.3
    • Pieters, W.1
  • 30
    • 84986078210 scopus 로고    scopus 로고
    • Temptations of turnout and modernisation: E-voting discourses in the UK and The Netherlands
    • Pieters, W., & van Haren, R. (2007). Temptations of turnout and modernisation: E-voting discourses in the UK and The Netherlands. Journal of Information, Communication and Ethics in Society, 5(4), 276-292.
    • (2007) Journal of Information, Communication and Ethics in Society , vol.5 , Issue.4 , pp. 276-292
    • Pieters, W.1    van Haren, R.2
  • 32
    • 85008058364 scopus 로고    scopus 로고
    • Voting technologies and trust
    • Randell, B., & Ryan, P. (2006). Voting technologies and trust'. IEEE Security & Privacy, 4(5), 50-56.
    • (2006) IEEE Security Privacy , vol.4 , Issue.5 , pp. 50-56
    • Randell, B.1    Ryan, P.2
  • 33
    • 26944475572 scopus 로고    scopus 로고
    • Mapping goals and kinds of explanations to the knowledge containers of case-based reasoning systems
    • In H. Muños Avila & F. Ricci (Eds.), Berlin: Springer
    • Roth-Berghofer, T., & Cassens, J. (2005). Mapping goals and kinds of explanations to the knowledge containers of case-based reasoning systems. In H. Muños Avila & F. Ricci (Eds.), ICCBR 2005 (Vol. 3620 of LNCS, pp. 451-464). Berlin: Springer.
    • (2005) ICCBR 2005 , vol.3620 , pp. 451-464
    • Roth-Berghofer, T.1    Cassens, J.2
  • 34
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • Schneier, B. (1999). Attack trees: Modeling security threats. Dr. Dobb's Journal, 24(12), 21-29.
    • (1999) Dr. Dobb's Journal , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 35
    • 0002809390 scopus 로고    scopus 로고
    • Designing trust into online experiences
    • Shneiderman, B. (2000). Designing trust into online experiences. Communications of the ACM, 43(12), 57-59.
    • (2000) Communications of the ACM , vol.43 , Issue.12 , pp. 57-59
    • Shneiderman, B.1
  • 36
    • 26944470931 scopus 로고    scopus 로고
    • Explanation in case-based reasoning: Perspectives and goals
    • Sørmo, F., Cassens, J., & Aamodt, A. (2005). Explanation in case-based reasoning: perspectives and goals. Artificial Intelligence Review, 24(2), 109-143.
    • (2005) Artificial Intelligence Review , vol.24 , Issue.2 , pp. 109-143
    • Sørmo, F.1    Cassens, J.2    Aamodt, A.3
  • 38
    • 33748995094 scopus 로고    scopus 로고
    • Genomic research and data-mining technology: Implications for personal privacy and informed consent
    • Tavani, H. (2004). Genomic research and data-mining technology: Implications for personal privacy and informed consent. Ethics and Information Technology, 6(1), 15-28.
    • (2004) Ethics and Information Technology , vol.6 , Issue.1 , pp. 15-28
    • Tavani, H.1
  • 40
    • 0000919171 scopus 로고
    • The impact of explanation facilities on user acceptance of expert systems advice
    • Ye, L., & Johnson, P. (1995). The impact of explanation facilities on user acceptance of expert systems advice. MIS Quarterly, 19(2), 157-172.
    • (1995) MIS Quarterly , vol.19 , Issue.2 , pp. 157-172
    • Ye, L.1    Johnson, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.