Loading [MathJax]/extensions/MathMenu.js
The Dynamics of Trust in Cyberdomains | IEEE Journals & Magazine | IEEE Xplore

Abstract:

This essays examined some human-centering issues for the Networld, placed primarily for convenience into five categories: antitrust in technology, a concensus on what "tr...Show More

Abstract:

This essays examined some human-centering issues for the Networld, placed primarily for convenience into five categories: antitrust in technology, a concensus on what "trust" is, interpersonal trust versus trust in automation, trusting as a dynamic process, and resilience engineering for the active management of trust. The approach of designing and foundation for the active management of trust in cyberdomains.
Published in: IEEE Intelligent Systems ( Volume: 24, Issue: 6, Nov.-Dec. 2009)
Page(s): 5 - 11
Date of Publication: 31 December 2009

ISSN Information:

References is not available for this document.

The Lesson and its Implication

For some decades now, cybersecurity has been a continuous game of catch-up. Clever hackers find some new scheme for malware, the malware is sent out and does its thing, the malware is sniffed out, and then the security people come up with a new software or hardware patch. This “clever game” is not likely to end. Indeed, attempts to improve software and hardware must continue.

Select All
1.
Κ. Raina and A. Harsh, eCommerce Security: A Beginner's Guide, McGraw Hill, 2001.
2.
B. Ortutay, Don't Post That: Web Etiquette Evolves, Associated Press, Sept. 2009, [online] Available: www.dailynews.com/news/ ci_13273951.
3.
C. Rhoads and L. Chao, "Iran's Web Spying Aided by Western Technology", Wall Street Journal, pp. 2, June 2009, [online] Available: http://online.wsj.com/article/ SB124562668777335653.html.
4.
B. Stelter and B. Stone, "Web Pries Lid of Iranian Censorship", New York Times, June 2009, [online] Available: www. nytimes.com/2009/06/23/world/ middleeast/23censor.html.
5.
N. Gammeltoft and R. Garner, Twitter Facebook Resume Online Services after Cyber Attacks, Aug. 2009, [online] Available: www.bloomberg.com/ apps/news?pid=20601102&sid= aEVBXs9eH8Gg.
6.
, "Finding Information on the Internet: A Guide", Teaching Library Internet Workshops, 2009, [online] Available: www.lib.berkeley.edu/ TeachingLib/Guides/Internet.
7.
N. Shadbolt, "A Matter of Trust", IEEE Intelligent Systems, vol. 17, no. 1, pp. 2-3, 2002.
8.
E. Naone, "Adding Trust to Wikipedia and Beyond", Tech. Rev., Sept. 2009, [online] Available: www.technologyreview.com/ web/23355/?a=f.
9.
L. C. Baldor, US Officials Eye North Korea in Cyber Attack, Associated Press, July 2009, [online] Available: www.usatoday.com/ news/washington/2009-07-08-hacking-washington-nkorea_N.htm.
10.
J. Weckerlein, "Cyberspace Warfare Remains Serious Business", Air Force Print News Today, Mar. 2007, [online] Available: www.af.mil/news/story_print. asp?id=123043232.
11.
P. Koopman and R. R. Hoffman, "Work-Arounds Make-Work and Kludges", IEEE Intelligent Systems, vol. 18, no. 6, pp. 70-75.
12.
R. R. Hoffman, M. Marx and P. A. Hancock, "Metrics Metrics Metrics: Negative Hedonicity", IEEE Intelligent Systems, vol. 23, no. 2, pp. 69-73.
13.
R. R. Hoffman, "A Method for Eliciting Preserving and Sharing the Knowledge of Forecasters", Weather and Forecasting, vol. 21, no. 3, pp. 416-428, 2006.
14.
M. T. Dzindolet, "The Role of Trust in Automation Reliance", Int'l J. Human-Computer Studies, vol. 58, no. 6, pp. 697-718, 2003.
15.
R. Parasuraman and V. Riley, "Humans and Automation: Use Misuse Disuse Abuse", Human Factors, vol. 39, no. 2, pp. 230-253, 1997.
16.
J. D. Lee and K. A. See, "Trust in Automation: Designing for Appropriate Reliance", Human Factors, vol. 46, no. 1, pp. 50-80, 2004.
17.
D. D. Woods and E. Hollnagel, Joint Cognitive Systems: Patterns in Cogni tive Systems Engineering, CRC Press, 2006.
18.
R. R. Hoffman and D. D. Woods, "Steps Toward a Theory of Complex and Cognitive Systems", IEEE Intelligent Systems, vol. 20, no. 1, pp. 76-79, 2005.
19.
J. K. Rowling, Harry Potter and the Chamber of Secrets, Scholastic Press, pp. 329, 1999.
20.
K. O'Hara, Trust: From Socrates to Spin, Icon Books, pp. 5, 2004.
21.
R. C. Mayer, J. H. Davis and F. D. Schoorman, "An Integrative Model of Organizational Trust", Academy of Management Rev., vol. 20, no. 3, pp. 709-734, 1995.
22.
J. A. Simpson, "Psychological Foundations of Trust", Current Directions in Psychological Science, vol. 16, no. 5, pp. 264-268, 2007.
23.
T. D. Huynh, N. R. Jennings and N. R. Shadbolt, "An Integrated Trust and Reputation Model for Open Multi-Agent Systems", Autonomous Agents and Multi Agent Systems, vol. 13, no. 2, pp. 119-154, 2006.
24.
R. Stephens, A. Morison, and D.D. Woods, "Trust, ATR, and Layered Sensing: Models, Metrics, and Directions for Design," report to the US Air Force Research Laboratory, Sensors Directorate, from the Cognitive Systems Engineering Laboratory, Inst. for Ergonomics, Ohio State Univ., 2009.
25.
C. Nass and Y. Moon, "Machines and Mindlessness: Social Responses to Computers", J. Social Issues, vol. 56, no. 1, pp. 81-103, 2000.
26.
S. Lewandowsky, M. Mundy and G. Tan, "The Dynamics of Trust: Comparing Humans to Automation", J. Experimental Psychology: Applied, vol. 6, no. 2, pp. 104-123, 2000.
27.
G. Klein, "Ten Challenges for Making Automation a 'Team Player' in Joint Human-Agent Activity", IEEE Intelligent Systems, vol. 19, no. 6, pp. 91-95, 2004.
28.
C. L. Corritore, B. Kracher and S. Wiedenbeck, "On-Line Trust: Concepts Evolving Themes a Model", Int'l. J. Human-Computer Studies, vol. 58, no. 6, pp. 737-758, 2003.
29.
A. M. Bisantz and Y. Seong, "Assessment of Operator Trust in and Utilization of Automated Decision-Aids under Different Framing Conditions", Int'l J. Industrial Ergonomics, vol. 28, no. 2, pp. 85-97, 2001.
30.
V. Riley, "Operator Reliance on Automation: Theory and Data" in Automation Theory and Applications, Erlbaum, pp. 19-35, 1996.

Contact IEEE to Subscribe

References

References is not available for this document.