메뉴 건너뛰기




Volumn , Issue , 2010, Pages 260-284

Incorporating social trust into design practices for secure systems

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84865006235     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-61520-837-1.ch010     Document Type: Chapter
Times cited : (8)

References (59)
  • 2
    • 84899167485 scopus 로고    scopus 로고
    • Accepted for the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business
    • Alcalde, B., & Mauw, S. (2009) An algebra for trust dilution and trust fusion. Accepted for the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.
    • (2009) An Algebra for Trust Dilution and Trust Fusion
    • Alcalde, B.1    Mauw, S.2
  • 11
    • 77949501304 scopus 로고    scopus 로고
    • Towards a better citizen identification system
    • doi:10.1007/s12394-009-0006-6
    • Cofta, P. (2009). Towards a better citizen identification system. Identity in the Information Society, 1(1), 39-53. doi:10.1007/s12394-009-0006-6
    • (2009) Identity in the Information Society , vol.1 , Issue.1 , pp. 39-53
    • Cofta, P.1
  • 13
    • 84898097831 scopus 로고    scopus 로고
    • Trust in identification systems: From empirical observations to design guidelines
    • In Yan, Z. (Ed.), New York, Information Science Reference, doi:10.4018/978-1-61520-682-7.ch019
    • Cofta, P., & Lacohée, H. (2010). Trust in identification systems: from empirical observations to design guidelines. In Yan, Z. (Ed.), Trust Modelling and management in Digital Environments: From Social Concepts to System Development. New York: Information Science Reference. doi:10.4018/978-1-61520-682-7.ch019
    • (2010) Trust Modelling and Management in Digital Environments: From Social Concepts to System Development
    • Cofta, P.1    Lacohée, H.2
  • 14
    • 34548260045 scopus 로고    scopus 로고
    • NHS security dilemma as smartcards shared
    • January 30, 2007
    • Collins, T. (2007) NHS security dilemma as smartcards shared. ComputerWeekly, January 30, 2007.
    • (2007) ComputerWeekly
    • Collins, T.1
  • 17
    • 24944456051 scopus 로고    scopus 로고
    • Risk models for trust-based access control (TBAC)
    • In Herrmann, P. (Ed.)
    • Dimmock, N., Bacon, J., Ingram, D., & Moody, K. (2005). Risk Models for Trust-Based Access Control (TBAC). In Herrmann, P. (Ed.), iTrust2005, LNCS 3477 (pp. 364-371).
    • (2005) ITrust2005, LNCS 3477 , pp. 364-371
    • Dimmock, N.1    Bacon, J.2    Ingram, D.3    Moody, K.4
  • 24
    • 66249121412 scopus 로고    scopus 로고
    • When internal collaboration is bad for your company
    • (April)
    • Hansen, M. T. (2009). When Internal Collaboration is Bad for Your Company. Harvard Business Review, (April):83-88.
    • (2009) Harvard Business Review , pp. 83-88
    • Hansen, M.T.1
  • 26
    • 34547465017 scopus 로고    scopus 로고
    • (Ed.), Russell Sage Foundation
    • Hardin, R. (Ed.). (2004). Distrust. Russell Sage Foundation.
    • (2004) Distrust
    • Hardin, R.1
  • 28
    • 84899251305 scopus 로고    scopus 로고
    • In: Proceedings of the WebSci'09: Society On-Line, 18-20 March 2009, Athens, Greece. (In Press)
    • Hodgson, P., & Cofta, P. (2009) Towards a methodology for research on trust. In: Proceedings of the WebSci'09: Society On-Line, 18-20 March 2009, Athens, Greece. (In Press)
    • (2009) Towards a Methodology for Research on Trust
    • Hodgson, P.1    Cofta, P.2
  • 29
    • 0006778034 scopus 로고    scopus 로고
    • Opportunities in Africa: Microevidence on Firms and Households. Retrieved 18 October, 2007, from
    • Isham, J. (2000). The Effect of Social Capital on Technology Adoption: Evidence from Rural Tanzania. Opportunities in Africa: Microevidence on Firms and Households. Retrieved 18 October, 2007, from http://www.csae.ox.ac.uk/conferences/2000-OiA/pdfpapers/isham.PDF
    • (2000) The Effect of Social Capital on Technology Adoption: Evidence from Rural Tanzania
    • Isham, J.1
  • 31
    • 0141975217 scopus 로고    scopus 로고
    • Experimental games for the design of reputation management systems
    • doi:10.1147/sj.423.0498
    • Keser, C. (2003). Experimental games for the design of reputation management systems. IBM Systems Journal, 42(3). doi:10.1147/sj.423.0498
    • (2003) IBM Systems Journal , vol.42 , Issue.3
    • Keser, C.1
  • 33
    • 0012508520 scopus 로고
    • Measuring customer-based brand equity
    • doi:10.1108/07363769510095270
    • Lassar, W., Mittal, B., & Sharma, A. (1995). Measuring customer-based brand equity. Journal of Consumer Marketing, 12(4), 11-19. doi:10.1108/07363769510095270
    • (1995) Journal of Consumer Marketing , vol.12 , Issue.4 , pp. 11-19
    • Lassar, W.1    Mittal, B.2    Sharma, A.3
  • 35
    • 33749853948 scopus 로고    scopus 로고
    • A conceptual model integrating trust into planned change activities to enhance technology adoption
    • Lippert, S. K., Davis, M. (2006). A conceptual model integrating trust into planned change activities to enhance technology adoption. Journal of Information Science, 32.
    • (2006) Journal of Information Science , pp. 32
    • Lippert, S.K.1    Davis, M.2
  • 36
    • 0004265759 scopus 로고
    • New York, John Wiley & Sons
    • Luhmann, N. (1979). Trust and Power. New York: John Wiley & Sons.
    • (1979) Trust and Power
    • Luhmann, N.1
  • 37
    • 80052897731 scopus 로고    scopus 로고
    • Examining trust, forgiveness and regret as computational concepts
    • In Golbeck, J. (Ed.), New York, Springer
    • Marsh, S., & Briggs, P. (2008). Examining Trust, Forgiveness and Regret as Computational Concepts. In Golbeck, J. (Ed.)Computing with Social Trust. New York: Springer.
    • (2008) Computing with Social Trust
    • Marsh, S.1    Briggs, P.2
  • 40
    • 33745849657 scopus 로고    scopus 로고
    • Foundations of attack trees. Information security and cryptology - ICISC 2005
    • doi:10.1007/11734727_17
    • Mauw, S., & Oostdijk, M. (2005). Foundations of Attack Trees. Information Security and Cryptology - ICISC 2005. Springer Lecture Notes in Computer Science, 3935, 186-198. doi:10.1007/11734727_17
    • (2005) Springer Lecture Notes in Computer Science , vol.3935 , pp. 186-198
    • Mauw, S.1    Oostdijk, M.2
  • 43
    • 84899172893 scopus 로고    scopus 로고
    • Microsoft, Available
    • Microsoft. (2009) The Microsoft SDL Threat Modelling Tool. Available: http://msdn.microsoft.com/en-us/security/dd206731.aspx
    • (2009) The Microsoft SDL Threat Modelling Tool
  • 44
    • 24144503351 scopus 로고    scopus 로고
    • The Trust/Control duality: An integrative perspective on positive expectations of others
    • 2005
    • Mollering, G. (2005) The Trust/Control Duality: An Integrative Perspective on Positive Expectations of Others. In: Int. Sociology, September 2005, Vol. 20(3): 283-305. 2005.
    • (2005) Int. Sociology, September 2005 , vol.20 , Issue.3 , pp. 283-305
    • Mollering, G.1
  • 50
    • 1142270162 scopus 로고    scopus 로고
    • Trusted computing platforms: TCPA technology
    • Upper Saddle River, NJ: Prentice-Hall
    • Pearson, S. (2002). Trusted Computing Platforms: TCPA Technology. In Context. Upper Saddle River, NJ: Prentice-Hall.
    • (2002) Context
    • Pearson, S.1
  • 52
    • 57049132610 scopus 로고    scopus 로고
    • Understanding 'Honest Signals' in business
    • Fall
    • Petland, S., & Heibeck, T. (2008, Fall). Understanding 'Honest Signals' in Business. MIT Sloan Management Review., 50(1), 70-75.
    • (2008) MIT Sloan Management Review , vol.50 , Issue.1 , pp. 70-75
    • Petland, S.1    Heibeck, T.2
  • 54
    • 33744807496 scopus 로고    scopus 로고
    • The value of reputation on eBay: A controlled experiment
    • Jun, Available at, doi:10.1007/s10683-006-4309-2
    • Resnick, P. (2006, Jun). The value of reputation on eBay: a controlled experiment. Experimental Economics, 9(Issue 2), 79-101. Available at http://www.si.umich.edu/~presnick/papers/postcards/PostcardsFinalPrePub.pdf. doi:10.1007/s10683-006-4309-2
    • (2006) Experimental Economics , vol.9 , Issue.2 , pp. 79-101
    • Resnick, P.1
  • 55
    • 0037652052 scopus 로고    scopus 로고
    • Organisational justice, trust and the management of change: An exploration
    • doi:10.1108/00483480310467660
    • Saunders, M. N. K., & Thornhill, A. (2003). Organisational justice, trust and the management of change: An exploration. Personnel Review, 32(3), 360-375. doi:10.1108/00483480310467660
    • (2003) Personnel Review , vol.32 , Issue.3 , pp. 360-375
    • Saunders, M.N.K.1    Thornhill, A.2
  • 57
    • 84890261995 scopus 로고    scopus 로고
    • Available at
    • Ullmann-Margalit, E. (2003) Trust out of distrust. Available at: www.law.nyu.edu/clppt/program2001/readings/ullman_margalit/Trust%20out%20of%20Distrust.pdf
    • (2003) Trust Out of Distrust
    • Ullmann-Margalit, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.