Skip to main content

Designing for Trust

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2631))

Abstract

Designing for trust requires identification of the sometimes subtle trust assumptions embedded into systems. Defining trust as the intersection of privacy, security and reliability can simplify the identification of trust as embedded in a technical design. Yet while this definition simplifies, it also illuminates a sometimes overlooked problem. Because privacy is an element of trust, purely operational definitions of trust are inadequate for developing systems to enable humans to extend trust across the network. Privacy is both operational (in the sharing of data) and internal (based on user perception of privacy). Designing trust metrics for the next generation Internet, and indeed implementing designs that embed trust for any digital environment. requires an understanding of not only the technical nuances of security but also the human subtleties of trust perception. What is needed is a greater understanding of how individuals interact with computers with respect to the extension of trust, and how those extensions can be addressed by design.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Anderson, R.: Security Engineering, Wiley, New York (2001).

    Google Scholar 

  • Axelrod, R.: The Evolution of Cooperation, Harper Collins, USA (1994).

    Google Scholar 

  • Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. D. Gollman, ed., Computer Security — ESORICS’ 94 Lecture Notes in Computer Science. Springer-Verlag Inc., Berlin (1994) 3–18.

    Google Scholar 

  • Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A.:The role of trust management in distributed systems security” Secure Internet Programming, Vol. 1603. Lecture Notes in Computer Science. Springer-Verlag Inc. Berlin (1999) 185–210.

    Chapter  Google Scholar 

  • Bloustein, A.:Privacy as an aspect of human dignity: an answer to Dean Prosser. New York University Law Review 39: (1968) 962–970.

    Google Scholar 

  • Borland, J.: Stealth P2P network hides inside Kazaa. CNET Tech News, April, 2002. http://www.news.com.com/2100-1023-873181.html (2002)

  • Camp, L. J.: Trust and Risk in Internet Commerce, MIT Press, Cambridge, MA (2001).

    Google Scholar 

  • Camp, L. J and Chien, Y.T.: The Internet as Public Space: Concepts, Issues and Implications in Public Policy, Readings in Cyberethics. eds. R. Spinello and H Tavani, Jones and Bartlett Pub., Sudbury, MA (January 2001). Previously published in ACM Computers and Society, September (2000).

    Google Scholar 

  • Camp, L. J., McGrath C. and Nissenbaum H.: Trust: A Collision of Paradigms. Proceedings of Financial Cryptography, Lecture Notes in Computer Science. Springer-Verlag Inc. Berlin (2001).

    Google Scholar 

  • Camp, L. J. and Osorio, C.: Privacy Enhancing Technologies for Internet Commerce. Trust in the Network Economy. Springer-Verlag, Berlin (2002).

    Google Scholar 

  • Cohen, J.: A Right to Right to Read Anonymously: A Closer Look at Copyright Management in Cyberspace. Conn. L. Rev. Vol. 28 (1996).

    Google Scholar 

  • Compaine B. J.: Issues in New Information Technology. Ablex Publishing, Norwood, NJ (1998)

    Google Scholar 

  • Friedman, B., Howe, D. C., and Felten, E.: Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design. Proceedings of the Thirty-Fifth Annual Hawaii’s International Conference on System Sciences. IEEE Computer Society: Los Alamitos, CA. (2002).

    Google Scholar 

  • Fukuyama F.: Trust: The Social Virtues and the Creation of Prosperity. Free Press, NY, NY (1996).

    Google Scholar 

  • Golberg, Hill and Shostack: Privacy Ethics and Trust. Boston University Law Review, Vol. 81, N. 2 (2001) 407–422.

    Google Scholar 

  • Garfinkle, S.: Pretty Good Privacy, O’Reilly Publishing, Cambridge, MA. (1994).

    Google Scholar 

  • Kahan, D.: Trust, Collective Action, and Law. Boston University Law review, Vol. 81, N. 2 (2001) 333–347.

    MathSciNet  Google Scholar 

  • Lawler, E. J.: Coercive Capability in Conflict: A Test of Bilateral versus Conflict Spiral Theory. Social Psychology Quarterly, Vol. 50 (1988) 93–96.

    Article  MathSciNet  Google Scholar 

  • Mell, P.:Seeking Shade in a Land of Perpetual Sunlight: Privacy as Property in the Electronic Wilderness. Berkeley Technology Law Journal 11(1). (http://www.law.berkeley.edu/journals/btlj/index.html) (1996)

  • Morgan, M. G., Bostrom, A., Fischhoff, B., Atman, C. J.: Risk Communication: A Mental Models Approach. Cambridge University Press, Cambridge, UK (2002).

    Google Scholar 

  • Mueller, M.: Ruling the Root. MIT Press, Cambridge, MA (2002).

    Google Scholar 

  • Nissenbaum, H. and Introna, L.: Sustaining the Public Good Vision of the Internet: The Politics of Search Engines. The Information Society, Vol. 16, No. 3 (2000).

    Google Scholar 

  • Olson: The Logic of Collective Action: Public Goods and the Theory of Groups. Harvard University Press. Cambridge, MA (1965).

    Google Scholar 

  • A. Oram, ed.: Peer-to-Peer Harnessing the Power of Disruptive Technologies. O’Reilly and Associates, Cambridge, MA (2001).

    Google Scholar 

  • Prosser W.L.: Handbook of the Law of Torts, West Publishing Co., St. Paul, MN (1941).

    Google Scholar 

  • S. Shapiro: Places and Space: The Historical Interaction of Technology, Home, and Privacy. The Information Society, No. 14, Vol. 4, (1998) 275–284.

    Article  Google Scholar 

  • Titmuss R. M.: The Gift Relationship: From Human Blood to Social Policy, Expanded and revised edition. Ann Oakley and John Ashton (eds.) The New Press, New York (1997).

    Google Scholar 

  • Trublow, G.: Privacy law and practice. Times Mirror Books, New York (1991).

    Google Scholar 

  • Tygar, J.D. and Whitten, A.,: WWW Electronic Commerce and Java Trojan Horses, Second USENIX Electronic Commerce Workshop, Berkeley, CA (1996).

    Google Scholar 

  • Tyler, T.: Why People Obey the Law. Yale University Press, New Haven, NH (1990).

    Google Scholar 

  • Visa: Secure transaction technology specifications. Version 1.1, Visa International, New York (1995).

    Google Scholar 

  • Warren S. and Brandies L.: The right to privacy. Harvard Law Review, Vol. 4 (1890) 193–220.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Camp, L.J. (2003). Designing for Trust. In: Falcone, R., Barber, S., Korba, L., Singh, M. (eds) Trust, Reputation, and Security: Theories and Practice. TRUST 2002. Lecture Notes in Computer Science, vol 2631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36609-1_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-36609-1_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00988-7

  • Online ISBN: 978-3-540-36609-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics