Abstract
Designing for trust requires identification of the sometimes subtle trust assumptions embedded into systems. Defining trust as the intersection of privacy, security and reliability can simplify the identification of trust as embedded in a technical design. Yet while this definition simplifies, it also illuminates a sometimes overlooked problem. Because privacy is an element of trust, purely operational definitions of trust are inadequate for developing systems to enable humans to extend trust across the network. Privacy is both operational (in the sharing of data) and internal (based on user perception of privacy). Designing trust metrics for the next generation Internet, and indeed implementing designs that embed trust for any digital environment. requires an understanding of not only the technical nuances of security but also the human subtleties of trust perception. What is needed is a greater understanding of how individuals interact with computers with respect to the extension of trust, and how those extensions can be addressed by design.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Anderson, R.: Security Engineering, Wiley, New York (2001).
Axelrod, R.: The Evolution of Cooperation, Harper Collins, USA (1994).
Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. D. Gollman, ed., Computer Security — ESORICS’ 94 Lecture Notes in Computer Science. Springer-Verlag Inc., Berlin (1994) 3–18.
Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A.:The role of trust management in distributed systems security” Secure Internet Programming, Vol. 1603. Lecture Notes in Computer Science. Springer-Verlag Inc. Berlin (1999) 185–210.
Bloustein, A.:Privacy as an aspect of human dignity: an answer to Dean Prosser. New York University Law Review 39: (1968) 962–970.
Borland, J.: Stealth P2P network hides inside Kazaa. CNET Tech News, April, 2002. http://www.news.com.com/2100-1023-873181.html (2002)
Camp, L. J.: Trust and Risk in Internet Commerce, MIT Press, Cambridge, MA (2001).
Camp, L. J and Chien, Y.T.: The Internet as Public Space: Concepts, Issues and Implications in Public Policy, Readings in Cyberethics. eds. R. Spinello and H Tavani, Jones and Bartlett Pub., Sudbury, MA (January 2001). Previously published in ACM Computers and Society, September (2000).
Camp, L. J., McGrath C. and Nissenbaum H.: Trust: A Collision of Paradigms. Proceedings of Financial Cryptography, Lecture Notes in Computer Science. Springer-Verlag Inc. Berlin (2001).
Camp, L. J. and Osorio, C.: Privacy Enhancing Technologies for Internet Commerce. Trust in the Network Economy. Springer-Verlag, Berlin (2002).
Cohen, J.: A Right to Right to Read Anonymously: A Closer Look at Copyright Management in Cyberspace. Conn. L. Rev. Vol. 28 (1996).
Compaine B. J.: Issues in New Information Technology. Ablex Publishing, Norwood, NJ (1998)
Friedman, B., Howe, D. C., and Felten, E.: Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design. Proceedings of the Thirty-Fifth Annual Hawaii’s International Conference on System Sciences. IEEE Computer Society: Los Alamitos, CA. (2002).
Fukuyama F.: Trust: The Social Virtues and the Creation of Prosperity. Free Press, NY, NY (1996).
Golberg, Hill and Shostack: Privacy Ethics and Trust. Boston University Law Review, Vol. 81, N. 2 (2001) 407–422.
Garfinkle, S.: Pretty Good Privacy, O’Reilly Publishing, Cambridge, MA. (1994).
Kahan, D.: Trust, Collective Action, and Law. Boston University Law review, Vol. 81, N. 2 (2001) 333–347.
Lawler, E. J.: Coercive Capability in Conflict: A Test of Bilateral versus Conflict Spiral Theory. Social Psychology Quarterly, Vol. 50 (1988) 93–96.
Mell, P.:Seeking Shade in a Land of Perpetual Sunlight: Privacy as Property in the Electronic Wilderness. Berkeley Technology Law Journal 11(1). (http://www.law.berkeley.edu/journals/btlj/index.html) (1996)
Morgan, M. G., Bostrom, A., Fischhoff, B., Atman, C. J.: Risk Communication: A Mental Models Approach. Cambridge University Press, Cambridge, UK (2002).
Mueller, M.: Ruling the Root. MIT Press, Cambridge, MA (2002).
Nissenbaum, H. and Introna, L.: Sustaining the Public Good Vision of the Internet: The Politics of Search Engines. The Information Society, Vol. 16, No. 3 (2000).
Olson: The Logic of Collective Action: Public Goods and the Theory of Groups. Harvard University Press. Cambridge, MA (1965).
A. Oram, ed.: Peer-to-Peer Harnessing the Power of Disruptive Technologies. O’Reilly and Associates, Cambridge, MA (2001).
Prosser W.L.: Handbook of the Law of Torts, West Publishing Co., St. Paul, MN (1941).
S. Shapiro: Places and Space: The Historical Interaction of Technology, Home, and Privacy. The Information Society, No. 14, Vol. 4, (1998) 275–284.
Titmuss R. M.: The Gift Relationship: From Human Blood to Social Policy, Expanded and revised edition. Ann Oakley and John Ashton (eds.) The New Press, New York (1997).
Trublow, G.: Privacy law and practice. Times Mirror Books, New York (1991).
Tygar, J.D. and Whitten, A.,: WWW Electronic Commerce and Java Trojan Horses, Second USENIX Electronic Commerce Workshop, Berkeley, CA (1996).
Tyler, T.: Why People Obey the Law. Yale University Press, New Haven, NH (1990).
Visa: Secure transaction technology specifications. Version 1.1, Visa International, New York (1995).
Warren S. and Brandies L.: The right to privacy. Harvard Law Review, Vol. 4 (1890) 193–220.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Camp, L.J. (2003). Designing for Trust. In: Falcone, R., Barber, S., Korba, L., Singh, M. (eds) Trust, Reputation, and Security: Theories and Practice. TRUST 2002. Lecture Notes in Computer Science, vol 2631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36609-1_3
Download citation
DOI: https://doi.org/10.1007/3-540-36609-1_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00988-7
Online ISBN: 978-3-540-36609-6
eBook Packages: Springer Book Archive