Skip to main content

Qualitative Analysis for Trust Management

Towards a Model of Photograph Sharing Indiscretion

  • Conference paper
Security Protocols XVII (Security Protocols 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7028))

Included in the following conference series:

Abstract

Grounded Theory provides a useful approach for eliciting and justifying subjective characteristics of individuals. A Grounded Theory analysis is carried out on individuals who share pictures, with a view to developing a trust management policy model of indiscretion regarding the sharing of photographs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)

    Article  Google Scholar 

  2. Becker, M., Fournet, C., Gordon, A.: Design and semantics of a decentralized authorization language. In: 20th IEEE Computer Security Foundations Symposium (January 2007)

    Google Scholar 

  3. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: SP 1996: Symp. on Security and Privacy, p. 164. IEEE Computer Society (1996)

    Google Scholar 

  4. Breaux, T., Antón, A.: Analyzing regulatory rules for privacy and security requirements. IEEE Transactions on Software Engineering 34(1), 5–20 (2008)

    Article  Google Scholar 

  5. CCITT Draft Recommendation. The Directory Authentication Framework, Version 7 (November 1987)

    Google Scholar 

  6. Charmaz, K.: Constructing Grounded Theory. Sage Publications, London (2006)

    Google Scholar 

  7. Clarke, D., Elien, J., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in spki/sdsi. Journal of Computer Security 9(4), 285–322 (2001)

    Google Scholar 

  8. Daniel, B.K., Schwier, R.A.: A Bayesian belief network of a virtual learning community. International Journal of Web-Based Communities 3(2) (2007)

    Google Scholar 

  9. Dourish, P., Grinter, E., Delgado de la Flor, J., Joseph, M.: Security in the wild: user strategies for managing security as an everyday, practical problem. Personal Ubiquitous Comput. 8(6), 391–401 (2004)

    Article  Google Scholar 

  10. Ellis, C., Bochner, A.P.: Composing ethnography, alternative forms of qualitative writing. Alta Mira Press, California (1996)

    Google Scholar 

  11. Flechais, I., Mascolo, C., Sasse, M.A.: Integrating security and usability into the requirements and design process. Int. J. Electron. Secur. Digit. Forensic 1(1), 12–26 (2007)

    Article  Google Scholar 

  12. Glaser, B.G., Strauss, A.L.: The discovery of grounded theory. Aldine, Chicago (1967)

    Google Scholar 

  13. Hammersley, M.: The dilemma of qualitative method: Herbert Blumer and the Chicago tradition. Routledge (1989)

    Google Scholar 

  14. Howard, R.A., Matheson, J.E.: Influence diagrams. Decision Analysis 2(3) (September 2005)

    Google Scholar 

  15. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)

    Article  Google Scholar 

  16. Kvale, S.: InterViews: An Introduction to Qualitative Research Interviewing. Sage Publications, London (1996)

    Google Scholar 

  17. Li, J., Li, N., Winsborough, W.: Automated trust negotiation using cryptographic credentials. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (January 2005)

    Google Scholar 

  18. McCarthy, J., Wright, P.: Technology as Experience. MIT Press (2004)

    Google Scholar 

  19. McQueen, R.A., Knussen, C.: Research Methods in Psychology. Prentice Hall Europe, London (1999)

    Google Scholar 

  20. Onabajo, A., Jahnke, J.H.: Properties of confidentiality requirements. In: 19th IEEE Symposium on Computer-Based Medical Systems (2006)

    Google Scholar 

  21. Pacey, A.: Meaning in Technology. MIT Press, London (1999)

    Google Scholar 

  22. Putnam, R.D., et al.: Making democracy work: Civic traditions in Modern Italy. Princeton University Press (1993)

    Google Scholar 

  23. Riegelsberger, J., Sasse, M.A., McCarthy, J.D.: The mechanics of trust: A framework for research and design. Int. J. Hum.-Comput. Stud. 62(3), 381–422 (2005)

    Article  Google Scholar 

  24. Seaman, C.B.: Qualitative methods in empirical studies of software engineering. IEEE Trans. on Software Engineering 25(4), 557–572 (1999)

    Article  Google Scholar 

  25. Stainton Rogers, R., et al.: Social Psychology: A Critical Agenda. Polity Press, Cambridge (1995)

    Google Scholar 

  26. Uslaner, E.M.: The Moral Foundations of Trust. Cambridge University Press, Cambridge (2002)

    Google Scholar 

  27. Wellman, M.P.: Fundamental concepts of qualitative probabilistic networks. Artificial Intelligence (44), 257–303 (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Foley, S.N., Rooney, V.M. (2013). Qualitative Analysis for Trust Management. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds) Security Protocols XVII. Security Protocols 2009. Lecture Notes in Computer Science, vol 7028. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36213-2_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36213-2_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36212-5

  • Online ISBN: 978-3-642-36213-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics