-
2
-
-
84899167485
-
-
Accepted for the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business
-
Alcalde, B., & Mauw, S. (2009) An algebra for trust dilution and trust fusion. Accepted for the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.
-
(2009)
An Algebra for Trust Dilution and Trust Fusion
-
-
Alcalde, B.1
Mauw, S.2
-
4
-
-
27744551402
-
Adam smith, behavioral economist
-
doi:10.1257/089533005774357897
-
Ashraf, N., Camerer, C. F., & Loewenstein, G. (2005). Adam Smith, Behavioral Economist. The Journal of Economic Perspectives, 19(3). doi:10.1257/089533005774357897
-
(2005)
The Journal of Economic Perspectives
, vol.19
, Issue.3
-
-
Ashraf, N.1
Camerer, C.F.2
Loewenstein, G.3
-
8
-
-
84890141620
-
-
New York: John Wiley & Sons, Ltd. doi:10.1002/9780470028261
-
Chang, E., Dillion, T., & Hussain, F. K. (2006). Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence. New York: John Wiley & Sons, Ltd. doi:10.1002/9780470028261
-
(2006)
Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence
-
-
Chang, E.1
Dillion, T.2
Hussain, F.K.3
-
11
-
-
77949501304
-
Towards a better citizen identification system
-
doi:10.1007/s12394-009-0006-6
-
Cofta, P. (2009). Towards a better citizen identification system. Identity in the Information Society, 1(1), 39-53. doi:10.1007/s12394-009-0006-6
-
(2009)
Identity in the Information Society
, vol.1
, Issue.1
, pp. 39-53
-
-
Cofta, P.1
-
12
-
-
84858255716
-
Designing for trust
-
In Whitworth, B., & de Moor, A. (Eds.), Information Science Reference, IGI Global
-
Cofta, P. (2009). Designing for Trust. In Whitworth, B., & de Moor, A. (Eds.), Handbook of Research on Socio-Technical Design and Social Networking Systems. Information Science Reference. IGI Global.
-
(2009)
Handbook of Research on Socio-Technical Design and Social Networking Systems
-
-
Cofta, P.1
-
13
-
-
84898097831
-
Trust in identification systems: From empirical observations to design guidelines
-
In Yan, Z. (Ed.), New York, Information Science Reference, doi:10.4018/978-1-61520-682-7.ch019
-
Cofta, P., & Lacohée, H. (2010). Trust in identification systems: from empirical observations to design guidelines. In Yan, Z. (Ed.), Trust Modelling and management in Digital Environments: From Social Concepts to System Development. New York: Information Science Reference. doi:10.4018/978-1-61520-682-7.ch019
-
(2010)
Trust Modelling and Management in Digital Environments: From Social Concepts to System Development
-
-
Cofta, P.1
Lacohée, H.2
-
14
-
-
34548260045
-
NHS security dilemma as smartcards shared
-
January 30, 2007
-
Collins, T. (2007) NHS security dilemma as smartcards shared. ComputerWeekly, January 30, 2007.
-
(2007)
ComputerWeekly
-
-
Collins, T.1
-
17
-
-
24944456051
-
Risk models for trust-based access control (TBAC)
-
In Herrmann, P. (Ed.)
-
Dimmock, N., Bacon, J., Ingram, D., & Moody, K. (2005). Risk Models for Trust-Based Access Control (TBAC). In Herrmann, P. (Ed.), iTrust2005, LNCS 3477 (pp. 364-371).
-
(2005)
ITrust2005, LNCS 3477
, pp. 364-371
-
-
Dimmock, N.1
Bacon, J.2
Ingram, D.3
Moody, K.4
-
19
-
-
33845549351
-
Trust: An element of information security
-
In FischerHubner, S., Rannenberg, K., Yngstrom, L., & Lindskog, S. (Eds.), Boston: Springer
-
Flowerday, S., & von Solms, R. (2006). Trust: An Element of Information Security. In FischerHubner, S., Rannenberg, K., Yngstrom, L., & Lindskog, S. (Eds.), IFIP Int. Federation for Information Processing, Security and Privacy in Dynamic Environments. Boston: Springer.
-
(2006)
IFIP Int. Federation for Information Processing, Security and Privacy in Dynamic Environments
-
-
Flowerday, S.1
von Solms, R.2
-
22
-
-
33747001471
-
-
Technical Report DIT-02-008, Informatica e Telecomunicazioni, University of Trento
-
Giunchiglia, F., Mylopoulos, J., & Perini, A. (2001) The Tropos Software Development Methodology: Processes, Models and Diagrams. Technical Report DIT-02-008, Informatica e Telecomunicazioni, University of Trento
-
(2001)
The Tropos Software Development Methodology: Processes, Models and Diagrams
-
-
Giunchiglia, F.1
Mylopoulos, J.2
Perini, A.3
-
24
-
-
66249121412
-
When internal collaboration is bad for your company
-
(April)
-
Hansen, M. T. (2009). When Internal Collaboration is Bad for Your Company. Harvard Business Review, (April):83-88.
-
(2009)
Harvard Business Review
, pp. 83-88
-
-
Hansen, M.T.1
-
26
-
-
34547465017
-
-
(Ed.), Russell Sage Foundation
-
Hardin, R. (Ed.). (2004). Distrust. Russell Sage Foundation.
-
(2004)
Distrust
-
-
Hardin, R.1
-
28
-
-
84899251305
-
-
In: Proceedings of the WebSci'09: Society On-Line, 18-20 March 2009, Athens, Greece. (In Press)
-
Hodgson, P., & Cofta, P. (2009) Towards a methodology for research on trust. In: Proceedings of the WebSci'09: Society On-Line, 18-20 March 2009, Athens, Greece. (In Press)
-
(2009)
Towards a Methodology for Research on Trust
-
-
Hodgson, P.1
Cofta, P.2
-
29
-
-
0006778034
-
-
Opportunities in Africa: Microevidence on Firms and Households. Retrieved 18 October, 2007, from
-
Isham, J. (2000). The Effect of Social Capital on Technology Adoption: Evidence from Rural Tanzania. Opportunities in Africa: Microevidence on Firms and Households. Retrieved 18 October, 2007, from http://www.csae.ox.ac.uk/conferences/2000-OiA/pdfpapers/isham.PDF
-
(2000)
The Effect of Social Capital on Technology Adoption: Evidence from Rural Tanzania
-
-
Isham, J.1
-
31
-
-
0141975217
-
Experimental games for the design of reputation management systems
-
doi:10.1147/sj.423.0498
-
Keser, C. (2003). Experimental games for the design of reputation management systems. IBM Systems Journal, 42(3). doi:10.1147/sj.423.0498
-
(2003)
IBM Systems Journal
, vol.42
, Issue.3
-
-
Keser, C.1
-
32
-
-
79251500243
-
-
International Engineering Consortium
-
Lacohée, H., Cofta, P., Phippen, A., & Furnell, S. (2008). Understanding Public Perceptions: Trust and Engagement in ICT Mediated Services. International Engineering Consortium.
-
(2008)
Understanding Public Perceptions: Trust and Engagement in ICT Mediated Services
-
-
Lacohée, H.1
Cofta, P.2
Phippen, A.3
Furnell, S.4
-
33
-
-
0012508520
-
Measuring customer-based brand equity
-
doi:10.1108/07363769510095270
-
Lassar, W., Mittal, B., & Sharma, A. (1995). Measuring customer-based brand equity. Journal of Consumer Marketing, 12(4), 11-19. doi:10.1108/07363769510095270
-
(1995)
Journal of Consumer Marketing
, vol.12
, Issue.4
, pp. 11-19
-
-
Lassar, W.1
Mittal, B.2
Sharma, A.3
-
35
-
-
33749853948
-
A conceptual model integrating trust into planned change activities to enhance technology adoption
-
Lippert, S. K., Davis, M. (2006). A conceptual model integrating trust into planned change activities to enhance technology adoption. Journal of Information Science, 32.
-
(2006)
Journal of Information Science
, pp. 32
-
-
Lippert, S.K.1
Davis, M.2
-
36
-
-
0004265759
-
-
New York, John Wiley & Sons
-
Luhmann, N. (1979). Trust and Power. New York: John Wiley & Sons.
-
(1979)
Trust and Power
-
-
Luhmann, N.1
-
37
-
-
80052897731
-
Examining trust, forgiveness and regret as computational concepts
-
In Golbeck, J. (Ed.), New York, Springer
-
Marsh, S., & Briggs, P. (2008). Examining Trust, Forgiveness and Regret as Computational Concepts. In Golbeck, J. (Ed.)Computing with Social Trust. New York: Springer.
-
(2008)
Computing with Social Trust
-
-
Marsh, S.1
Briggs, P.2
-
40
-
-
33745849657
-
Foundations of attack trees. Information security and cryptology - ICISC 2005
-
doi:10.1007/11734727_17
-
Mauw, S., & Oostdijk, M. (2005). Foundations of Attack Trees. Information Security and Cryptology - ICISC 2005. Springer Lecture Notes in Computer Science, 3935, 186-198. doi:10.1007/11734727_17
-
(2005)
Springer Lecture Notes in Computer Science
, vol.3935
, pp. 186-198
-
-
Mauw, S.1
Oostdijk, M.2
-
41
-
-
85087586361
-
Trust in developing relationships: From theory to measurement
-
In Weaver, K. M. (Ed.)
-
McAllister, D. J., Lewicki, R. J., & Chaturvedi, S. (2006). Trust in developing relationships: From theory to measurement. In Weaver, K. M. (Ed.), Academy of Management Best Papers Proceedings.
-
(2006)
Academy of Management Best Papers Proceedings
-
-
McAllister, D.J.1
Lewicki, R.J.2
Chaturvedi, S.3
-
43
-
-
84899172893
-
-
Microsoft, Available
-
Microsoft. (2009) The Microsoft SDL Threat Modelling Tool. Available: http://msdn.microsoft.com/en-us/security/dd206731.aspx
-
(2009)
The Microsoft SDL Threat Modelling Tool
-
-
-
44
-
-
24144503351
-
The Trust/Control duality: An integrative perspective on positive expectations of others
-
2005
-
Mollering, G. (2005) The Trust/Control Duality: An Integrative Perspective on Positive Expectations of Others. In: Int. Sociology, September 2005, Vol. 20(3): 283-305. 2005.
-
(2005)
Int. Sociology, September 2005
, vol.20
, Issue.3
, pp. 283-305
-
-
Mollering, G.1
-
46
-
-
34249004734
-
Secure tropos: A security-oriented extension of the tropos methodology
-
World Scientific, 2007
-
Mouratidis, H., Giorgini, P. (2007) Secure Tropos: A Security-Oriented Extension of the Tropos methodology, International Journal of Software Engineering and Knowledge Engineering (IJSEKE) 17(2) pp. 285-309, World Scientific, 2007.
-
(2007)
International Journal of Software Engineering and Knowledge Engineering (IJSEKE)
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
48
-
-
84899287454
-
-
Victoria College, University of Toronto, 6-8 May 2005
-
Nooteboom, B. (2005) Framing, attribution and scripts in the development of trust. In. Proc. of symposium on 'Risk, trust and civility', Victoria College, University of Toronto, 6-8 May 2005.
-
(2005)
Framing, Attribution and Scripts in the Development of Trust. In. Proc. of Symposium on 'Risk, Trust and Civility'
-
-
Nooteboom, B.1
-
50
-
-
1142270162
-
Trusted computing platforms: TCPA technology
-
Upper Saddle River, NJ: Prentice-Hall
-
Pearson, S. (2002). Trusted Computing Platforms: TCPA Technology. In Context. Upper Saddle River, NJ: Prentice-Hall.
-
(2002)
Context
-
-
Pearson, S.1
-
52
-
-
57049132610
-
Understanding 'Honest Signals' in business
-
Fall
-
Petland, S., & Heibeck, T. (2008, Fall). Understanding 'Honest Signals' in Business. MIT Sloan Management Review., 50(1), 70-75.
-
(2008)
MIT Sloan Management Review
, vol.50
, Issue.1
, pp. 70-75
-
-
Petland, S.1
Heibeck, T.2
-
54
-
-
33744807496
-
The value of reputation on eBay: A controlled experiment
-
Jun, Available at, doi:10.1007/s10683-006-4309-2
-
Resnick, P. (2006, Jun). The value of reputation on eBay: a controlled experiment. Experimental Economics, 9(Issue 2), 79-101. Available at http://www.si.umich.edu/~presnick/papers/postcards/PostcardsFinalPrePub.pdf. doi:10.1007/s10683-006-4309-2
-
(2006)
Experimental Economics
, vol.9
, Issue.2
, pp. 79-101
-
-
Resnick, P.1
-
55
-
-
0037652052
-
Organisational justice, trust and the management of change: An exploration
-
doi:10.1108/00483480310467660
-
Saunders, M. N. K., & Thornhill, A. (2003). Organisational justice, trust and the management of change: An exploration. Personnel Review, 32(3), 360-375. doi:10.1108/00483480310467660
-
(2003)
Personnel Review
, vol.32
, Issue.3
, pp. 360-375
-
-
Saunders, M.N.K.1
Thornhill, A.2
-
56
-
-
34247247633
-
It is not all about trust-the role of distrust in inter-organizational relationships
-
Helsinki, Finland. Springer Boston
-
Seppanen, R., & Blomqvist, K. (2006) It is not all About Trust-The Role of Distrust in Inter-Organizational Relationships. In: Network-Centric Collaboration and Supporting Frameworks, proc. of IFIP TC5 WG 5.5 Seventh IFlP Working Conference on Virtual Enterprises, 25'27 September 2006, Helsinki, Finland. Springer Boston.
-
(2006)
Network-Centric Collaboration and Supporting Frameworks, Proc. of IFIP TC5 WG 5.5 Seventh IFlP Working Conference on Virtual Enterprises, 25-27 September 2006
-
-
Seppanen, R.1
Blomqvist, K.2
-
57
-
-
84890261995
-
-
Available at
-
Ullmann-Margalit, E. (2003) Trust out of distrust. Available at: www.law.nyu.edu/clppt/program2001/readings/ullman_margalit/Trust%20out%20of%20Distrust.pdf
-
(2003)
Trust Out of Distrust
-
-
Ullmann-Margalit, E.1
-
58
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. Management Information Systems Quarterly, 27(3), 425-478.
-
(2003)
Management Information Systems Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
|