Abstract
Grounded Theory provides a useful approach for eliciting and justifying subjective characteristics of individuals. A Grounded Theory analysis is carried out on individuals who share pictures, with a view to developing a trust management policy model of indiscretion regarding the sharing of photographs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)
Becker, M., Fournet, C., Gordon, A.: Design and semantics of a decentralized authorization language. In: 20th IEEE Computer Security Foundations Symposium (January 2007)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: SP 1996: Symp. on Security and Privacy, p. 164. IEEE Computer Society (1996)
Breaux, T., Antón, A.: Analyzing regulatory rules for privacy and security requirements. IEEE Transactions on Software Engineering 34(1), 5–20 (2008)
CCITT Draft Recommendation. The Directory Authentication Framework, Version 7 (November 1987)
Charmaz, K.: Constructing Grounded Theory. Sage Publications, London (2006)
Clarke, D., Elien, J., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in spki/sdsi. Journal of Computer Security 9(4), 285–322 (2001)
Daniel, B.K., Schwier, R.A.: A Bayesian belief network of a virtual learning community. International Journal of Web-Based Communities 3(2) (2007)
Dourish, P., Grinter, E., Delgado de la Flor, J., Joseph, M.: Security in the wild: user strategies for managing security as an everyday, practical problem. Personal Ubiquitous Comput. 8(6), 391–401 (2004)
Ellis, C., Bochner, A.P.: Composing ethnography, alternative forms of qualitative writing. Alta Mira Press, California (1996)
Flechais, I., Mascolo, C., Sasse, M.A.: Integrating security and usability into the requirements and design process. Int. J. Electron. Secur. Digit. Forensic 1(1), 12–26 (2007)
Glaser, B.G., Strauss, A.L.: The discovery of grounded theory. Aldine, Chicago (1967)
Hammersley, M.: The dilemma of qualitative method: Herbert Blumer and the Chicago tradition. Routledge (1989)
Howard, R.A., Matheson, J.E.: Influence diagrams. Decision Analysis 2(3) (September 2005)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)
Kvale, S.: InterViews: An Introduction to Qualitative Research Interviewing. Sage Publications, London (1996)
Li, J., Li, N., Winsborough, W.: Automated trust negotiation using cryptographic credentials. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (January 2005)
McCarthy, J., Wright, P.: Technology as Experience. MIT Press (2004)
McQueen, R.A., Knussen, C.: Research Methods in Psychology. Prentice Hall Europe, London (1999)
Onabajo, A., Jahnke, J.H.: Properties of confidentiality requirements. In: 19th IEEE Symposium on Computer-Based Medical Systems (2006)
Pacey, A.: Meaning in Technology. MIT Press, London (1999)
Putnam, R.D., et al.: Making democracy work: Civic traditions in Modern Italy. Princeton University Press (1993)
Riegelsberger, J., Sasse, M.A., McCarthy, J.D.: The mechanics of trust: A framework for research and design. Int. J. Hum.-Comput. Stud. 62(3), 381–422 (2005)
Seaman, C.B.: Qualitative methods in empirical studies of software engineering. IEEE Trans. on Software Engineering 25(4), 557–572 (1999)
Stainton Rogers, R., et al.: Social Psychology: A Critical Agenda. Polity Press, Cambridge (1995)
Uslaner, E.M.: The Moral Foundations of Trust. Cambridge University Press, Cambridge (2002)
Wellman, M.P.: Fundamental concepts of qualitative probabilistic networks. Artificial Intelligence (44), 257–303 (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Foley, S.N., Rooney, V.M. (2013). Qualitative Analysis for Trust Management. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds) Security Protocols XVII. Security Protocols 2009. Lecture Notes in Computer Science, vol 7028. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36213-2_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-36213-2_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36212-5
Online ISBN: 978-3-642-36213-2
eBook Packages: Computer ScienceComputer Science (R0)