Advertisement

The Structure of the Sense of Security, Anshin

  • Yuko Murayama
  • Natsuko Hikage
  • Yasuhiro Fujihara
  • Carl Hauser
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5141)

Abstract

Traditional research on security has been based on the assumption that a user feels secure when provided with secure systems and services. In this research we address factors influencing users’ sense of security. This paper reports our recent discoveries regarding the structure of the sense of security — Anshin. We conducted a questionnaire survey regarding the sense of security. Results using exploratory factor analysis (EFA) and structural equation modeling (SEM) identified six factors contributing to the sense of security. Furthermore, the structure of the sense of security is divided into two parts: personal and environmental.

Keywords

the sense of security security trust user survey statistical analysis 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Murayama, Y., Hikage, N., Hauser, C., Chakraborty, B., Segawa, N.: An Anshin Model for the Evaluation of the Sense of Security. In: Proc. of the 39th Hawaii International Conference on System Science (HICSS 2006), vol. 8, p. 205a (2006)Google Scholar
  2. 2.
    Hikage, N., Murayama, Y., Hauser, C.: Exploratory survey on an evaluation model for a sense of security. In: Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007), pp. 121–132 (2007)Google Scholar
  3. 3.
    Hikage, N., Hauser, C., Murayama, Y.: A statistical discussion of the sense of security, Anshin. Information Processing Society of Japan (IPSJ) Journal 48(9), 3193–3203 (2007)Google Scholar
  4. 4.
    Deutsh, M.: The effect of motivational orientation upon trust and suspicion. Human Relation 13, 123–139 (1960)CrossRefGoogle Scholar
  5. 5.
    Gambetta, D.: Can we trust trust?, Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, vol. 13, pp. 213–237. University of Oxford (1988); (originally published from Basil Blackwell, 1988) (Last Access, February 9, 2007), http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf
  6. 6.
    Marsh, S.P.: Formalising trust as computational concept, PhD Thesis, Department of Mathematics and Computer Science. University of Stirling (1994)Google Scholar
  7. 7.
    Lewis, J.D., Weigert, A.: Trust as a Social Reality. Social Forces 63(4), 967–985 (1985)CrossRefGoogle Scholar
  8. 8.
    Xiao, S., Benbasat, I.: The formation of trust and distrust in recommendation agents in repeated interactions: a process-tracing analysis. In: Proc. of the 5th international conference on Electronic commerce (ICEC 2003), pp. 287–293 (2003)Google Scholar
  9. 9.
    Xiao, S., Benbasat, I.: Understanding Customer Trust in Agent-Mediated Electronic Commerce, Web-Mediated Electronic Commerce, and Traditional Commerce. Information Technology and Management 5(1–2), 181–207 (2004)Google Scholar
  10. 10.
    McAllister, D.J.: Affect- and cognition-based trust as foundations for interpersonal cooperation in organizations. Academy of Management Journal 38(1), 24–59 (1995)CrossRefMathSciNetGoogle Scholar
  11. 11.
    Chopra, K., Wallace, W.A.: Trust in Electronic Environments. In: Proc. of the 36th Hawaii International Conference on System Science (HICSS 2003), vol. 1, p. 331.1 (2003)Google Scholar
  12. 12.
    Kuan, H.H., Bock, G.W.: The Collective Reality of Trust: An Investigation of Social Relations and Networks on Trust in Multi-Channel Retailers. In: Proc. of the 13th European Conference on Information Systems (ECIS 2005) (2005) (Last Access, February 9, 2007), http://is2.lse.ac.uk/asp/aspecis/20050018.pdf
  13. 13.
    Yamagishi, T.: The structure of trust: The evolutionary games of mind and society, Tokyo University Press (1998); English version, http://lynx.let.hokudai.ac.jp/members/yamagishi/english.htm (Last Access, February 9, 2007)
  14. 14.
    Whitten, A., Tygar, D.: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In: Proc. of the 9th USENIX Security Symposium, pp.169–184 (1999)Google Scholar
  15. 15.
    Stephens, R.T.: A framework for the identification of electronic commerce design elements that enable trust within the small hotel industry. In: Proc. of ACMSE 2004, pp. 309–314 (2004)Google Scholar
  16. 16.
    Pu, P., Chen, L.: Trust building with explanation interfaces. In: Proc. of the 11th international conference on Intelligent user interfaces (IUI 2006), pp. 93–100 (2006)Google Scholar
  17. 17.
    Riegelsberger, J., Sasse, M.A., McCarthy, J.D.: Privacy and trust: Shiny happy people building trust?: photos on e-commerce websites and consumer trust. In: Proc. of the SIGCHI conference on Human factors in computing systems (CHI 2003), vol. 5(1), pp. 121–128 (2003)Google Scholar
  18. 18.
    Kikkawa, T., Shirato, S., Fujii, S., Takemura, K.: The pursuit of informed reassurance (‘An-Shin’ in Society) and technological safety(‘An-Zen’). Journal of SHAKAI-GIJUTSU 1, 1–8 (2003) (in Japanese)CrossRefGoogle Scholar
  19. 19.
    Yamazaki, M., Kikkawa, T.: The Structure of Anxiety Associated with Avian Influenza and Pandemic Influenza. In: The 47th annual meeting of the Japanese Society of Social Psychology, pp. 676–677 (2006) (in Japanese)Google Scholar
  20. 20.
    Jöreskog, K.G.: A general approach to confirmatory maximum likelihood factor analysis. Psychometrika 34(2), 183–202 (1969)CrossRefGoogle Scholar
  21. 21.
    Hoyle, R.H.: Structural Equation Modeling: Concepts, Issues, and Applications. Sage Publications, Thousand Oaks (1995)Google Scholar
  22. 22.
    Tanaka, J.F.: How big is enough?: Sample size and goodness of fit in structural equation models with latent variables. Child Development 58, 136–146 (1987)CrossRefGoogle Scholar
  23. 23.
    Browne, M.W., Cudeck, R.: Alternative ways of assessing model fit. In: Bollen, K., et al. (eds.) Testing Structural Equation Models, pp. 137–162. Sage Publications, Thousand Oaks (1993)Google Scholar
  24. 24.
    Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proc. of the SIGCHI conference on Human Factors in computing systems (CHI 2006), pp. 581–590 (2006)Google Scholar
  25. 25.
    Camp, L.J.: "Design for Trust". In: Falcone, R. (ed.) Trust, Reputation and Security: Theories and Practice. Springer, Berlin (2003)Google Scholar
  26. 26.
    Hoffman, L.J., Lawson-Jenkins, K., Blum, J.: Trust beyond security: an expanded trust model. Communication of ACM 49(7), 94–101 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Yuko Murayama
    • 1
  • Natsuko Hikage
    • 1
  • Yasuhiro Fujihara
    • 1
  • Carl Hauser
    • 2
  1. 1.Graduate school of software and Information scienceIwate Prefectural UniversityIwateJapan
  2. 2.School of Electrical Engineering and Computer ScienceWashington State UniversityPullmanUSA

Personalised recommendations