Advertisement

Exploratory survey on an Evaluation Model for a Sense of Security

  • Natsuko Hikage
  • Yuko Murayama
  • Carl Hauser
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 232)

Abstract

Research in information security is no longer limited to technical issues: human-related issues such as trust and the sense of security are also required by the user. In this paper, we use a Japanese word for such feelings, Anshin; “An” means to ease, and “Shin” is to mind. One feels Anshin when he is free from worry and fear. We try to identify the factors of Anshin so that we can construct a framework of the evaluation of Anshin. We present an initial Anshin model, and report our recent research results from user survey with factor analysis. We derive the following factors from the analysis; 1) user expectation of trust and confidence, 2) satisfaction with user interface and 3) understanding of risk and threats from user experience as well prior knowledge.

Keywords

Security Technology User Expectation Terminal Device Japanese Word Exploratory Survey 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    D. Basin, S. Mödersheim and L. Viganò: CDiff: a new reduction technique for constraint-based analysis of security protocols, Proc. of the 10th ACM conference on Computer and Communications Security, pp. 335–344 (2003).Google Scholar
  2. 2.
    W. Shi, H.S. Lee, C. Lu and T. Zhang: Attacks and risk analysis for hardware supported software copy protection systems, Proc. of the 4th ACM workshop on Digital rights management, pp. 54–62 (2004).Google Scholar
  3. 3.
    J.J. Yan: A note on proactive password checking, Proc. of the 2001 workshop on New Security Paradigms, pp. 127–135(2001).Google Scholar
  4. 4.
    M. Deutsh: The effect of motivational orientation upon trust and suspition, Human Relation, 13, pp. 123–139(1960).CrossRefGoogle Scholar
  5. 5.
    M. Deutsh: The resolution of conflict (Yale University Press, 1973).Google Scholar
  6. 6.
    D. Gambetta: Can we trust trust?, Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford, chapter 13, pp. 213–237 (originally published from Basil Blackwell, 1988). Available at: http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf (Last Access: 9 Feb 2007)
  7. 7.
    S.P. Marsh: Formalising trust as computational concept, PhD Thesis, Department of Mathematics and Computer Science, University of Stirling (1994).Google Scholar
  8. 8.
    B. Friedman, P.H. Khan and D.C. Howe: Trust online, Communication of ACM, Vol. 43, No. 12, pp. 34–40(2000).CrossRefGoogle Scholar
  9. 9.
    P. Lamsal: Understanding Trust and Security, Available at: http://www.es.helsinki.fi/u/lamsal/asgn/trust/UnderstandingTrustAndSecurity.pdf(Last Access: 9 Feb 2007).
  10. 10.
    N. Dimmock, A. Belokosztolszki, D. Eyers, J. Baconand and K. Moody: Access management for distributed systems: Using trust and risk in role-based access control policies, Proc. of the ninth ACM symposium on Access Control Models and Technologies, pp. 156–162(2004).Google Scholar
  11. 11.
    L.J. Hoffman, K. Lawson-Jenkins, J. Blum: Trust beyond security: an expanded trust model, Communications of the ACM, Vol. 49, No. 7, pp. 94–101 (2006).CrossRefGoogle Scholar
  12. 12.
    Stephen Flowerday, Rossouw von Solms: Trust: An Element of Information security, Proc. of the IFIP TC-11 21st International Information Security Conference (SEC2006), pp. 87–98 (2006).Google Scholar
  13. 13.
    J.D. Lewis, and A. Weigert: Trust as a Social Reality, Social Forces, Vol. 63, No. 4, pp. 967–985 (1985).CrossRefGoogle Scholar
  14. 14.
    S. Xiao, and I. Benbasat: The formation of trust and distrust in recommendation agents in repeated interactions: a process-tracing analysis, Proc. of the 5th international conference on Electronic commerce (ICEC’03), pp. 287–293 (2003).Google Scholar
  15. 15.
    S. Xiao and I. Benbasat: Understanding Customer Trust in Agent-Mediated Electronic Commerce, Web-Mediated Electronic Commerce, and Traditional Commerce, Information Technology and Management, Vol. 4, No. 1–2, Kluwer Academic Publishers, pp. 181–207 (2004).Google Scholar
  16. 16.
    K. Chopra, W.A. Wallace: Trust in Electronic Environments, Proc. of the 36th Hawaii International Conference on System Science (HICSS’03), pp. 331–340 (2003).Google Scholar
  17. 17.
    H.H Kuan, and G.W. Bock: The Collective Reality of Trust: An Investigation of Social Relations and Networks on Trust in Multi-Channel Retailers, Proc. of the 13th European Conference on Information Systems (ECIS 2005), Available at: http://is2.lse.ac.uk/asp/aspecis/20050018.pdf (Last Access: 9 Feb 2007)
  18. 18.
    Yamagishi, T.: The structure of trust: The evolutionary games of mind and society (Tokyo University Press, 1998). English version is available at: http://www.lynx.let.hokudai.ac.jp/members/yamagishi/english.htm (Last Access: 9 Feb 2007).
  19. 19.
    T. Kikkawa, S. Shirato, S. Fujiiand and K. Takemura:The pursuit of informed reassurance (‘An-Shin’ in Society) and technological safety(‘An-Zen’), Journal of SHAKAI-GIJUTSU, Vol. 1, pp. 1–8 (2003). in Japanese.Google Scholar
  20. 20.
    A. Whitten and D. Tygar: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0, Proc. of the 9th USENIX Security Symposium, pp. 169–184 (1999).Google Scholar
  21. 21.
    R.T. Stephens: A framework for the identification of electronic commerce design elements that enable trust within the small hotel industry, Proc. of ACMSE’04, pp. 309–314 (2004).Google Scholar
  22. 22.
    P. Pu, L. Chen: Trust building with explanation interfaces, Proc. of the 11th international conference on Intelligent user interfaces (IUI’06), pp. 93–100 (2006).Google Scholar
  23. 23.
    J. Riegelsberger, M.A. Sasse and J.D. McCarthy: Privacy and trust: Shiny happy people building trust?: photos on e-commerce websites and consumer trust, Proc. of the SIGCHI conference on Human factors in computing systems (CHI’03), Vol. 5, No. 1, pp. 121–128 (2003).Google Scholar
  24. 24.
    Sapient & Cheskin: eCommerce Trust, 1999Google Scholar
  25. 25.
    Beck, A.T.: Cognitive Therapy of Depression (Guilford Press 1979).Google Scholar
  26. 26.
    Y. Murayama, N. Hikage, C. Hauser, B. Chakraborty and N. Segawa: An Anshin Model for the Evaluation of the Sense of Security, Proc. of Hawaii International Conference on System Science (HICSS’06), Vol. 8, p. 205a (2006).CrossRefGoogle Scholar
  27. 27.
    T. Tomita, K. Suzumura and Y. Murayama: Proposal for Under the Door Communication on the network, Human-Computer Interaction: Theory and Practice(Part II), pp. 1019–1023 (2003).Google Scholar
  28. 28.
    R.H. Alschuler and H.L. Berta: Painting and Personality, University of Chicago Press, Vol. 1 (1947).Google Scholar
  29. 29.
    D.J. Kim, C. Steinfield and Y. Lai: Revisiting the Role of Web Assurance Seals in Consumer Trust, Proc. of the 6th international conference on Electronic Commerce, pp. 280–287 (2004).Google Scholar
  30. 30.
    R. Dhamija, J.D Tygar. and M. Hearst: Why phishing works, Proc. of the SIGCHI conference on Human Factors in computing systems (CHF’06), pp. 581–590 (2006).Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Natsuko Hikage
    • 1
  • Yuko Murayama
    • 1
  • Carl Hauser
    • 2
  1. 1.Graduate school of Software and Information ScienceIwate Prefectoral UniversityIwateJAPAN
  2. 2.School of Electrical Engineering and Computer ScienceWashington State UniversityPullmanUSA

Personalised recommendations