Paper Monitor

Public read-only view
Last seen paper feed

No paper feed seen yet.

Export tab

Paper feed

trust

[PDF] When to Trust Tools? Adaptive Tool Trust Calibration For Tool-Integrated Math Reasoning

Ruotao Xu, Yixin Ji, Yu Luo, Jinpeng Li, Dong Li, Peifeng Li, Juntao Li, Min Zhang
arXiv.org.
Published: 2026-04-09
From feed: trust calibration

Large reasoning models (LRMs) have achieved strong performance enhancement through scaling test time computation, but due to the inherent limitations of the underlying language models, they still have shortcomings in tasks that require precise computation and extensive knowledge reserves. Tool-Integrated Reasoning (TIR) has emerged as a promising paradigm that incorporates tool call and execution within the reasoning trajectory. Although recent works have released some powerful open-source TIR models, our analysis reveals that these models still suffer from critical deficiencies. We find that when the reasoning of the model conflicts with the tool results, the model tends to believe in its own reasoning. And there are cases where the tool results are correct but are ignored by the model, resulting in incorrect answers, which we define as "Tool Ignored''. This indicates that the model does not know when to trust or ignore the tool. To overcome these limitations, We introduce Adaptive Tool Trust Calibration (ATTC), a novel framework that guides the model to adaptively choose to trust or ignore the tool results based on the confidence score of generated code blocks. The experimental results from various open-source TIR models of different sizes and across multiple datasets demonstrate that ATTC effectively reduces the "Tool Ignored" issue, resulting in a performance increase of 4.1% to 7.5%.

PDF | Source | Open access

trust

Guilty until proven innocent: Experiencing errors in training promotes relationship equity and trust calibration

William H. Sharp, Kenneth M. Jackson, Tyler H. Shaw
Applied Ergonomics
Published: 2026-04-02
From feed: trust calibration

written by William H. Sharp, Kenneth M. Jackson, Tyler H. Shaw Published by Applied Ergonomics

Source

trust

[PDF] MCPShield: A Security Cognition Layer for Adaptive Trust Calibration in Model Context Protocol Agents

Zhenhong Zhou, Yuanhe Zhang, Hongwei Cai, Moayad Aloqaily, Ouns Bouachir, Linsey Pang, Prakhar Mehrotra, Kun Wang, Qingsong Wen
arXiv.org.
Published: 2026-02-15
From feed: trust calibration

The Model Context Protocol (MCP) standardizes tool use for LLM-based agents and enable third-party servers. This openness introduces a security misalignment: agents implicitly trust tools exposed by potentially untrusted MCP servers. However, despite its excellent utility, existing agents typically offer limited validation for third-party MCP servers. As a result, agents remain vulnerable to MCP-based attacks that exploit the misalignment between agents and servers throughout the tool invocation lifecycle. In this paper, we propose MCPShield as a plug-in security cognition layer that mitigates this misalignment and ensures agent security when invoking MCP-based tools. Drawing inspiration from human experience-driven tool validation, MCPShield assists agent forms security cognition with metadata-guided probing before invocation. Our method constrains execution within controlled boundaries while cognizing runtime events, and subsequently updates security cognition by reasoning over historical traces after invocation, building on human post-use reflection on tool behavior. Experiments demonstrate that MCPShield exhibits strong generalization in defending against six novel MCP-based attack scenarios across six widely used agentic LLMs, while avoiding false positives on benign servers and incurring low deployment overhead. Overall, our work provides a practical and robust security safeguard for MCP-based tool invocation in open agent ecosystems.

PDF | Source | Open access

trust

[PDF] From Initial to Situational Automation Trust: The Interplay of Personality, Interpersonal Trust, and Trust Calibration in Young Males

Menghan Tang, Tianjiao Lu, Xuqun You
Behavioral Sciences.
Published: 2026-01-26
From feed: trust calibration

To understand human-machine interactions, we adopted a framework that distinguishes between stable individual differences (enduring personality/interpersonal traits), initial trust (pre-interaction expectations), and situational trust (dynamic calibration via gaze and behavior). A driving simulator experiment was conducted with 30 male participants to investigate trust calibration across three levels: manual (Level 0), semi-automated (Level 2, requiring monitoring), and fully automated (Level 4, system handles tasks). We combined eye tracking (pupillometry/fixations) with the Eysenck Personality Questionnaire (EPQ) and Interpersonal Trust Scale (ITS). Results indicated that semi-automation yielded a higher hazard detection sensitivity (d' = 0.81) but induced greater physiological costs (pupil diameter, ηp2 = 0.445) compared to manual driving. A mediation analysis confirmed that neuroticism was associated with initial trust specifically through interpersonal trust. Critically, despite lower initial trust, young male individuals with high interpersonal trust exhibited slower reaction times in the semi-automation model (B = 0.60, p = 0.035), revealing a "social complacency" effect where social faith paradoxically predicted lower behavioral readiness. Based on these findings, we propose that situational trust is a multi-layer calibration process involving dissociated attentional and behavioral mechanisms, suggesting that such "wary but complacent" drivers require adaptive HMI interventions.

Source | Open access

trust

[PDF] AI in project teams: how trust calibration reconfigures team's collaboration and performance

Viraj Dawarka, Melina Doargajudhur, Vincent Dutot
International Journal of Managing Projects in Business.
Published: 2026-01-06
From feed: trust calibration

Purpose As artificial intelligence (AI) becomes increasingly embedded in project-based work, trust calibration, ensuring that trust in AI systems is neither excessive nor insufficient, emerges as a key factor for effective collaboration. This study explores how project professionals calibrate trust in AI and how this process influences team collaboration and performance in technology-mediated project environments. Design/methodology/approach Guided by socio-technical systems theory (STS) complemented by adaptive structuration theory (AST), the study draws on 40 semi-structured interviews with project professionals across diverse UK industries. Thematic analysis is used to explore participants' lived experiences of trust calibration, collaboration mechanisms and perceived team performance in AI-supported settings. Findings The result indicates that trust in AI is situational, socially distributed and shaped through ongoing boundary work between human and machine inputs. Enablers such as transparency, role clarity, user experience, cultural norms and system feedback shape calibration processes. These processes, in turn, influenced collaboration (e.g. delegation of oversight and erosion of informal communication) and performance (e.g. metric-driven evaluation and strategic augmentation of human expertise). Originality/value This study contributes to project management and AI adoption research by conceptualising trust calibration as a socio-technical process embedded in team routines, rather than as an individual attitude. It offers an initial conceptual model and a revised conceptual model that links enablers, practices, and outcomes of trust calibration, demonstrating how trust mediates the relationship between AI integration, collaboration and performance. Beyond applying existing frameworks, this research extends STS and AST by developing new theoretical insights into trust calibration as a mechanism linking AI design, collaboration dynamics and project performance. Findings provide practical guidance for designing trust-aware, human-centred AI practices in project environments.

Source | Open access

trust

Detecting AI-Assisted Tampering in Crowdsourced IoT Service Trust Information

Thilina Lokuruge, Athman Bouguettaya
Lecture Notes in Computer Science
Published: 2026-01-01
From feed: TITLE("trust")) + IS Conference

written by Thilina Lokuruge, Athman Bouguettaya Published by Lecture Notes in Computer Science

Source

trust

Development, Network Analysis, and Validation of the Ethical–Spiritual Algorithmic Trust Calibration Scale (ES-ATCS): Exploring Teachers’ Ethical and Spiritual Trust in AI Integration Within Jordanian Secondary Education

Mahmoud Gharaibeh, Ayoub Hamdan Al‐Rousan, Mohammad Nayef Ayasrah, Mohamad Ahmad Saleem Khasawneh
Journal of Religion and Health
Published: 2025-12-17
From feed: trust calibration

written by Mahmoud Gharaibeh, Ayoub Hamdan Al‐Rousan, Mohammad Nayef Ayasrah, Mohamad Ahmad Saleem Khasawneh Published by Journal of Religion and Health

Source

trust

[PDF] Uncertainty Awareness and Trust in Explainable AI - On Trust Calibration Using Local and Global Explanations

Carina Newen, Daniel Bodemer, Sonja Glantz, Emmanuel Müller, Magdalena Wischnewski, Lenka Schnaubert
Proceedings IEEE International Conference on Data Mining Icdm.
Published: 2025-11-12
From feed: trust calibration

Explainable AI has become a common term in the literature, scrutinized by computer scientists and statisticians and highlighted by psychological or philosophical researchers. One major effort many researchers tackle is constructing general guidelines for XAI schemes, which we derived from our study. While some areas of XAI are well studied, we focus on uncertainty explanations and consider global explanations, which are often left out. We chose an algorithm that covers various concepts simultaneously, such as uncertainty, robustness, and global XAI, and tested its ability to calibrate trust. We then checked whether an algorithm that aims to provide more of an intuitive visual understanding, despite being complicated to understand, can provide higher user satisfaction and human interpretability.

Source | Open access

trust

[PDF] Uncertainty Awareness and Trust in Explainable AI - On Trust Calibration Using Local and Global Explanations

Carina Newen, Daniel Bodemer, Sonja Glantz, Emmanuel Müller, Magdalena Wischnewski, Lenka Schnaubert
Proceedings IEEE International Conference on Data Mining Icdm.
Published: 2025-11-12
From feed: trust calibration

Explainable AI has become a common term in the literature, scrutinized by computer scientists and statisticians and highlighted by psychological or philosophical researchers. One major effort many researchers tackle is constructing general guidelines for XAI schemes, which we derived from our study. While some areas of XAI are well studied, we focus on uncertainty explanations and consider global explanations, which are often left out. We chose an algorithm that covers various concepts simultaneously, such as uncertainty, robustness, and global XAI, and tested its ability to calibrate trust. We then checked whether an algorithm that aims to provide more of an intuitive visual understanding, despite being complicated to understand, can provide higher user satisfaction and human interpretability.

Source | Open access

trust

Autonomous and Intervention-Based Trust Calibration in Construction Robots: Impact on Unsafe Behavior

Jing Lin, Qinyuan Li, Kaicheng Zhang, Chi Zhang
Journal of Construction Engineering and Management
Published: 2025-10-25
From feed: trust calibration

As the construction industry increasingly adopts robotic systems, ensuring effective and safe human–robot interactions (HRIs) becomes critical. Trust in robots plays a critical role in shaping the safety and performance of workers. However, little is known about how trust evolves in dynamic construction environments or its impact on unsafe behavior in HRIs. This study examines the calibration of trust in robots within construction HRIs and its impact on unsafe behavior, focusing on the effects of both autonomous and intervention-based trust calibration methods. A mixed experimental design was conducted with 50 participants, incorporating two types of trust tasks (trust repair and dampening), two phases of autonomous calibration, and three intervention strategies (virtual reality–based training, textbook learning, and incentive and punishment). Multisource data, including questionnaires, electrodermal activity, and human–robot collision data in virtual reality, were analyzed using regression models. The findings demonstrated that both autonomous calibration and intervention-based methods significantly influence workers’ trust in robots. Virtual reality–based training can either repair or dampen trust in robots, depending on the training setup. Overtrust was found to lead to unsafe behavior, whereas autonomous calibration helped mitigate collisions, confirming the critical role of calibrated trust in enhancing safety. These results highlight the importance of trust calibration in promoting safer and more efficient HRIs in construction.

Source

trust

Design of a Trust Calibration Adaptive System for Human-Machine Interaction Interfaces Based on Deep Learning Algorithms

Chang Ge, Xinyu Wang, Kanghui Ma
2025 6th International Conference on Intelligent Design ICID 2025
Published: 2025-10-24
From feed: trust calibration

The growing prevalence of intelligent systems has heightened the importance of Human-Machine Interaction (HMI), yet the relationship between HMI design and user trust remains poorly understood. Current trust assessment methods, often reliant on subjective or post-hoc measures, struggle to capture trust dynamics in high-risk scenarios. To address the challenges of subjectivity and quantitative modeling, this paper introduces a deep learning-based method for predicting and calibrating user trust in HMIs. Our approach establishes a trust calibration model that identifies key metrics via the Analytic Hierarchy Process (AHP) and evaluates risk scenarios using a developed SRD function. A Generative Adversarial Network (GAN) generates datasets of design features, which are processed by a Bayesian updating-based calibration algorithm that implements both trust-enhancement and suppression strategies. A prototype for complex intelligent machinery demonstrates the proposed method. This study offers a novel solution for real-time trust measurement and provides theoretical and practical insights for data-driven HMI design.

Source

trust

[PDF] From Overtrust to Distrust: A Simulation Study on Driver Trust Calibration in Conditional Automated Driving

Heetae Hwang, Juhyeon Kim, Hojoon Kim, Heewon Min, Kyudong Park
Applied Sciences Switzerland.
Published: 2025-10-22
From feed: trust calibration

Conditional automated driving delegates routine control to automation while keeping drivers responsible for supervision and timely takeovers. In this context, safety and usability hinge on calibrated trust, a state between overtrust and distrust that aligns reliance with actual system capabilities. We investigated how calibrated trust relates to concurrent behavior during conditional automation in a driving-simulator study (n = 26). After a brief familiarization block, drivers completed four takeover request (TOR) exposures while performing a non-driving-related task (NDRT). Trust was assessed with a validated multi-item inventory. NDRT engagement was operationalized as successful Surrogate Reference Task (SuRT) clicks per second, and takeover behavior was indexed by TOR reaction time (TOR-RT) from TOR onset to the first valid control input. The results showed that higher trust was associated with greater ND RT throughput during automated driving, whereas TOR-RT did not change significantly across repeated exposures, consistent with familiarization. In this sample, we did not observe a systematic penalty in TOR-RT associated with higher trust; however, confidence-interval benchmarks indicate that modest delays cannot be ruled out. This suggests that, after brief onboarding, calibrated trust can coexist with timely safety-critical responses within the limits of our design. These findings tentatively support interface and training strategies that promote calibrated trust (e.g., predictable TOR policies, transparent capability boundaries, and short onboarding) to help drivers navigate between overtrust and distrust.

Source | Open access

trust

Unpacking Trust: An Ontological Framework for Information Trustworthiness in Decision-Making

Glenda Amaral, Verônica dos Santos, Edward Hermann Hæusler, Giancarlo Guizzardi, Daniel Schwabe, Sérgio Lifschitz
Lecture Notes in Computer Science
Published: 2025-10-14
From feed: TITLE("trust")) + IS Conference

written by Glenda Amaral, Verônica dos Santos, Edward Hermann Hæusler, Giancarlo Guizzardi, Daniel Schwabe, Sérgio Lifschitz Published by Lecture Notes in Computer Science

Source

trust

[PDF] Dynamic Trust Calibration Using Contextual Bandits

Bruno Miranda Henrique, Eugene Santos
arXiv.org.
Published: 2025-09-27
From feed: trust calibration

Trust calibration between humans and Artificial Intelligence (AI) is crucial for optimal decision-making in collaborative settings. Excessive trust can lead users to accept AI-generated outputs without question, overlooking critical flaws, while insufficient trust may result in disregarding valuable insights from AI systems, hindering performance. Despite its importance, there is currently no definitive and objective method for measuring trust calibration between humans and AI. Current approaches lack standardization and consistent metrics that can be broadly applied across various contexts, and they don't distinguish between the formation of opinions and subsequent human decisions. In this work, we propose a novel and objective method for dynamic trust calibration, introducing a standardized trust calibration measure and an indicator. By utilizing Contextual Bandits-an adaptive algorithm that incorporates context into decision-making-our indicator dynamically assesses when to trust AI contributions based on learned contextual information. We evaluate this indicator across three diverse datasets, demonstrating that effective trust calibration results in significant improvements in decision-making performance, as evidenced by 10 to 38% increase in reward metrics. These findings not only enhance theoretical understanding but also provide practical guidance for developing more trustworthy AI systems supporting decisions in critical domains, for example, disease diagnoses and criminal justice.

Source | Open access

trust

[PDF] Detecting Trust Calibration Traits in AI with EEG Signals for Speech Deception

Abdullah Aman Tutul, Theodora Chaspari, Sarah Ita Levitan, Julia Hirschberg
Frontiers in Artificial Intelligence and Applications.
Published: 2025-09-22
From feed: trust calibration

This paper investigates the effectiveness of frequency-based electroencephalogram (EEG) measures in capturing self-reported trust and trust mis-calibration in artificial intelligence (AI) systems used as decision support tools. It examines a collaborative human-AI decision-making task where 50 human users interacted with an explainable speech-based AI system to detect deceptive speech. Correlation analysis indicates that Alpha and Theta power values of EEG measured from central, frontal, and parietal regions depict negative correlation with self-reported trust, and Delta power values from frontal regions are negatively correlated with self-reported trust. A machine learning model using EEG power measures to estimate self-reported trust depicted a Spearman’s correlation value ρ = 0.63 (p <0.01) between predicted and actual self-reported trust. Additionally, the Beta-band-power values from left frontal and left central areas are higher during trust calibration compared to under-trust. The Gamma-band-power levels are also higher during trust-calibration compared to over-trust. Machine learning models based on these EEG measures predict different trust dimensions (i.e., over-trust, under-trust, trust-calibration) with moderate macro-F1 scores (i.e., 53-55%). Finally, the most effective trust assessment models leverage data from all considered brain regions – frontal, central, and parietal – achieving similar performance compared to models using central regions only and outperforming models using frontal or parietal regions alone.

Source | Open access

trust

[PDF] Need for Trust Calibration in Takeover request Performance in Level 3 Automated vehicles

Julakha Jahan Jui, Imali Hettiarachchi, Navid Mohajer
Main Conference Proceedings 17th International ACM Conference on Automotive User Interfaces and Interactive Vehicular Applications Automotiveui 2025.
Published: 2025-09-21
From feed: trust calibration

Need for Trust Calibration in Takeover request Performance in Level 3 Automated vehicles

Source | Open access

trust

The Role of Dispositional Trust in Adaptive Automation for Trust Calibration

Margaret Wielatz, Maitri Pandya, Madeleine S. Yuh, Neera Jain
IEEE International Workshop on Robot and Human Communication Ro Man
Published: 2025-08-25
From feed: trust calibration

A long-standing challenge in human-automation interaction is adapting automation to the individual characteristics of different humans. As such, "adaptive automation" is intended to be responsive, in real time, to the human. For human-automation interaction scenarios requiring trust calibration, this generally requires adaptations tailored to situational and learned trust factors which change during the human’s interaction. However, given that a human’s dis-positional trust factors also influence their dynamic trust interactions with automation, we aim to answer the question "do different dispositional trust characteristics (toward automation) warrant different types of adaptive automation?" To do this, we build on prior work in which distinct trust dynamics were identified among humans interacting with an intelligent decision aid in a simulated reconnaissance mission. We design a new experiment that enables us to 1) classify participants into one of the two identified trust behaviors based upon a limited set of observations and 2) evaluate each participant’s performance with two different adaptive automation schemes— one customized to their dispositional characteristic and one that is generalized to the broad population based on a single model of trust behavior. Based on data collected from 85 participants, we show that although the customized adaptive automation policies do not produce statistically significant differences in mission performance outcomes than the general one, identifying a participant’s trust behavior using model-based classification is useful for determining which individuals may benefit most from assistance in calibrating their trust.

Source

trust

[PDF] Human-Gen AI Co-Design: Exploring Factors Impacting Trust Calibration

Chao Guo, Antoni Borghini, Kosa Goucher-Lambert, Gaëlle Baudoux
Proceedings of the ASME Design Engineering Technical Conference.
Published: 2025-08-17
From feed: trust calibration

Abstract The process of generating ideas during co-design with a Generative AI (GenAI) system requires the gradual calibration of trust in that system. Trust plays a pivotal role in shaping human interactions with technology, and developing well-calibrated trust is essential for the effective use and integration of GenAI. Proper trust calibration helps prevent underutilization of the system’s capabilities and dissatisfaction with its output. For engineers and system designers, trust is particularly important as it directly influences user responses, system adoption, and overall engagement with new technologies. To explore the factors that influence trust fluctuation when co-designing with a GenAI system, we analyzed 12 hours of conceptual human-AI co-design sessions using a custom GenAI system capable of producing images across various generation modes from convergent-divergent to abstract-concrete, and combining text and sketch prompting. Focusing on each moment of interaction with GenAI-generated images, we conducted an incremental and qualitative coding of each trust-related extract from think-aloud protocols. Through this approach, we identified 23 key factors that cause fluctuations in trust. Our findings reveal a complex network of factors that impact trust calibration, offering insights into how GenAI systems can be designed to facilitate faster and more effective trust-building in human-GenAI collaborations.

PDF | Source | Open access

trust

A Human-Machine Trust Model and Trust Calibration Method for Decision-Aid Systems

Xiaojun Zhu, Lunfei Liang, Junsen Lu, Yun‐Bo Zhao, Yu Kang
Chinese Control Conference Ccc
Published: 2025-07-28
From feed: trust calibration

With the development of AI technology, decision-aid systems are widely applied. The trust level between humans and decision aids has a great impact on the overall performance of the system. Current research on human-machine trust has deficiencies in trust modeling and trust calibration, especially lacking quantitative characterization of human trust levels. In response to this, this paper proposes a human-machine trust evaluation model and a transparency-based trust calibration method for decision-aid systems. Firstly, a dynamic evolution model of human-machine trust is constructed, with machine performance and past trust as influencing factors. Secondly, the meaning of trust calibration is elaborated, the impact of transparency on the trust model is analyzed, and a transparency-based trust calibration method is proposed. Through the simulation experiment of a tumor prediction medical assistance system, the rationality of the proposed trust model and the effectiveness of the calibration method are verified.

Source

trust

[PDF] Trust calibration in IDEs : paving the way for widespread adoption of AI refactoring

Borg, Markus
arXiv.org.
Published: 2025-07-01
From feed: trust calibration

In the software industry, the drive to add new features often overshadows the need to improve existing code. Large Language Models (LLMs) offer a new approach to improving codebases at an unprecedented scale through AI-assisted refactoring. However, LLMs come with inherent risks such as braking changes and the introduction of security vulnerabilities. We advocate for encapsulating the interaction with the models in IDEs and validating refactoring attempts using trustworthy safeguards. However, equally important for the uptake of AI refactoring is research on trust development. In this position paper, we position our future work based on established models from research on human factors in automation. We outline action research within CodeScene on development of 1) novel LLM safeguards and 2) user interaction that conveys an appropriate level of trust. The industry collaboration enables large-scale repository analysis and A/B testing to continuously guide the design of our research interventions.

Source | Open access

trust

The Impact of Sense of Community on Mindfulness: The Mediating Effects of Trust, Norms, and Networks

Youn‐Hwan Hwang, Jong-Woo Park
Proceedings 29th IEEE Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing Snpd 2025 Summer
Published: 2025-06-25
From feed: TITLE("trust")) + IS Conference

This study aims to conduct an in-depth analysis of the impact of apartment residents' sense of community on mindfulness. Specifically, it focuses on empirically verifying the mediating effects of trust, norms, and networks - key components of social capital - in this relationship. A systematic survey was conducted on apartment residents in the Seoul metropolitan area for empirical analysis. The findings of this study are expected to contribute to deriving practical implications for the sustainable development of apartment communities and suggesting specific measures to enhance residents' psychological well-being.

Source

trust

Advancing Zero Trust Security in Industrial IoT (IIoT): A Machine Learning Perspective

Syed Shah, Gurmeet Chohan, Sabiya Masthanali, Syed Muhammad Danish, Yazan Otoum
Proceedings 29th IEEE Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing Snpd 2025 Summer
Published: 2025-06-25
From feed: TITLE("trust")) + IS Conference

The Industrial Internet of Things (IIoT) transforms modern industries by enabling intelligent automation, predictive maintenance, and real-time analytics. However, increased connectivity introduces significant cybersecurity risks, making traditional perimeter-based security models insufficient. This paper examines the adoption of Zero Trust Architecture (ZTA) in IIoT environments, with a focus on integrating machine learning (ML) for adaptive security mechanisms. The study examines identity and access management (IAM), microsegmentation, and anomaly detection in IIoT networks, addressing the unique constraints of industrial environments. Furthermore, an ML-enhanced Trust Algorithm (TA) is proposed to evaluate security risks and dynamically automate access control decisions. By integrating Zero Trust principles with intelligent security mechanisms, this research contributes to the development of resilient IIoT architectures that can effectively mitigate evolving cyber threats.

Source

trust

Trust Dynamics in AI-Assisted Development: Definitions, Factors, and Implications

Sadra Sabouri, Philipp Eibl, Xinyi Zhou, Morteza Ziyadi, Nenad Medvidović, Lars Lindemann, Souti Chattopadhyay
Proceedings International Conference on Software Engineering
Published: 2025-04-26
From feed: TITLE("trust")) + IS Conference

Software developers increasingly rely on AI code generation utilities. To ensure that “good” code is accepted into the code base and “bad” code is rejected, developers must know when to trust an AI suggestion. Understanding how developers build this intuition is crucial to enhancing developer-AI collaborative programming. In this paper, we seek to understand how developers (1) define and (2) evaluate the trustworthiness of a code suggestion and (3) how trust evolves when using AI code assistants. To answer these questions, we conducted a mixed method study consisting of an in-depth exploratory survey with (n=29) developers followed by an observation study (n=10). We found that comprehensibility and perceived correctness were the most frequently used factors to evaluate code suggestion trustworthiness. However, the gap in developers' definition and evaluation of trust points to a lack of support for evaluating trustworthy code in real-time. We also found that developers often alter their trust decisions, keeping only 52% of original suggestions. Based on these findings, we extracted four guidelines to enhance developer-AI interactions. We validated the guidelines through a survey with (n=7) domain experts and survey members (n=8). We discuss the validated guidelines, how to apply them, and tools to help adopt them.

PDF | Source

trust

: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust Dependencies

Paschal C. Amusuo, Kyle A. Robinson, Tanmay Singla, Haiyan Peng, Aravind Machiry, Santiago Torres-Arias, Laurent Simon, James C. Davis
Proceedings International Conference on Software Engineering
Published: 2025-04-26
From feed: TITLE("trust")) + IS Conference

Third-party libraries like Log4j accelerate software application development but introduce substantial risk. Vulnerabilities in these libraries have led to Software Supply Chain (SSC) attacks that compromised resources within the host system. These attacks benefit from current application permissions approaches: third-party libraries are implicitly trusted in the application runtime. An application runtime designed with ZeroTrust Architecture (ZTA) principles - secure access to resources, continuous monitoring, and least-privilege enforcement - could mitigate SSC attacks, as it would give zero implicit trust to these libraries. However, no individual security defense incorporates these principles at a low runtime cost. This paper proposes Zero-Trust Dependencies to mitigate SSC vulnerabilities: we apply the NIST ZTA to software applications. First, we assess the expected effectiveness and configuration cost of Zero-Trust Dependencies using a study of third-party software libraries and their vulnerabilities. Then, we present a system design, $\text{ZTD}_{\text{Sys}}$, that enables the application of Zero-Trust Dependencies to software applications and a prototype, $\text{ZTD}_{\text{JAVA}}$, for Java applications. Finally, with evaluations on recreated vulnerabilities and realistic applications, we show that $\text{ZTD}_{\text{JAVA}}$ can defend against prevalent vulnerability classes, introduces negligible cost, and is easy to configure and use.

Source

trust

What Guides Our Choices? Modeling Developers' Trust and Behavioral Intentions Towards Genai

Rudrajit Choudhuri, Bianca Trinkenreich, Rahul Pandita, Eirini Kalliamvakou, Igor Steinmacher, Marco Aurélio Gerosa, Christopher A. Sanchez, Anita Sarma
Proceedings International Conference on Software Engineering
Published: 2025-04-26
From feed: TITLE("trust")) + IS Conference

Generative AI (genAI) tools, such as ChatGPT or Copilot, are advertised to improve developer productivity and are being integrated into software development. However, misaligned trust, skepticism, and usability concerns can impede the adoption of such tools. Research also indicates that AI can be exclusionary, failing to support diverse users adequately. One such aspect of diversity is cognitive diversity-variations in users' cognitive styles-that leads to divergence in perspectives and interaction styles. When an individual's cognitive style is unsupported, it creates barriers to technology adoption. Therefore, to understand how to effectively integrate genAI tools into software development, it is first important to model what factors affect developers' trust and intentions to adopt genAI tools in practice? We developed a theoretically grounded statistical model to (1) identify factors that influence developers' trust in genAI tools and (2) examine the relationship between developers' trust, cognitive styles, and their intentions to use these tools in their work. We surveyed software developers ($\mathrm{N}=238$) at two major global tech organizations: GitHub Inc. and Microsoft; and employed Partial Least Squares-Structural Equation Modeling (PLS-SEM) to evaluate our model. Our findings reveal that genAI's system/output quality, functional value, and goal maintenance significantly influence developers' trust in these tools. Furthermore, developers' trust and cognitive styles influence their intentions to use these tools in their work. We offer practical suggestions for designing genAI tools for effective use and inclusive user experience.

PDF | Source

trust

Calibrating Reliance on Automated Advice: Transparency and Trust Calibration Feedback

Monica Tatasciore, Shayne Loft
International Journal of Human Computer Interaction
Published: 2025-04-16
From feed: trust calibration

Inappropriate reliance on automated advice can result in humans accepting incorrect or rejecting correct advice. Increased automation transparency and trust calibration feedback are principles purported to promote accurate automation use. We examined the effects of automation transparency, trust calibration feedback, and their potential interacting effect on automation use accuracy and other outcomes. Participants completed uninhabited vehicle management missions by agreeing/disagreeing with automated advice. Transparency was manipulated within-subjects (low, high) and trust calibration feedback between-subjects (absent, present). If trust was inappropriate, trust calibration feedback instructed participants to take their time and carefully check display information. Higher transparency benefited automation use accuracy, decision time, perceived workload, trust, and usability. Trust calibration feedback had no benefit on automation use accuracy and subsequently did not amplify the benefits of increased transparency. These findings have potential implications to inform the design of automated decision aids to support human understanding of, and calibration to, automation capabilities.

Source

trust

Design Matrix Factorization and Knowledge-Guided Clustering for Trust-Aware Cross-Domain Recommendation Systems

Jiaqi Chang, Fusheng Yu
Csecs 2025 Proceedings of 2025 7th International Conference on Software Engineering and Computer Science
Published: 2025-03-21
From feed: TITLE("trust")) + IS Conference

The core challenge in designing an algorithm for trust-aware cross-domain recommendation systems lies in effectively integrating ratings from all domains (target-domain and source-domains) and trust relationships to improve recommendation performance in the target-domain. These systems involve two types of information fusion: intra-domain information fusion, which integrates intra-domain trust relationships and ratings within each domain (target-domain or source-domain), and cross-domain information fusion, which fuses information from all domains through inter-domain trust relationships as a bridge. The existing algorithms are limited in that they only address either intra-domain information fusion or cross-domain information fusion, failing to comprehensively utilize both intra-domain and inter-domain trust relationships for integrating information from all domains. To address this limitation, we propose a novel approach that combines inter-domain information fusion and cross-domain information fusion. Based on this approach, we design a matrix factorization and knowledge-guided clustering based trust-aware cross-domain collaborative filtering algorithm (MFKC _ TCCFA). Experimental results on a dataset show that MFKC_TCCFA outperforms existing state-of-the-art algorithms.

Source

trust

[PDF] The Trust Calibration Maturity Model for Characterizing and Communicating Trustworthiness of AI Systems

Scott Steinmetz, Asmeret Naugle, Paul Schutte, Matt Sweitzer, Alex Washburne, Lisa Linville, Daniel Krofcheck, Michal Kucer, Samuel Myren
arXiv.org.
Published: 2025-01-28
From feed: trust calibration

Recent proliferation of powerful AI systems has created a strong need for capabilities that help users to calibrate trust in those systems. As AI systems grow in scale, information required to evaluate their trustworthiness becomes less accessible, presenting a growing risk of using these systems inappropriately. We propose the Trust Calibration Maturity Model (TCMM) to characterize and communicate information about AI system trustworthiness. The TCMM incorporates five dimensions of analytic maturity: Performance Characterization, Bias & Robustness Quantification, Transparency, Safety & Security, and Usability. The TCMM can be presented along with system performance information to (1) help a user to appropriately calibrate trust, (2) establish requirements and track progress, and (3) identify research needs. Here, we discuss the TCMM and demonstrate it on two target tasks: using ChatGPT for high consequence nuclear science determinations, and using PhaseNet (an ensemble of seismic models) for categorizing sources of seismic events.

Source | Open access

trust

[PDF] Confidence-Based Trust Calibration in Human-AI Teams

Michael Ibrahim
International Journal of Advanced Computer Science and Applications.
Published: 2025-01-01
From feed: trust calibration

Effective human-AI collaboration is contingent upon calibrated trust, wherein users depend on AI systems when accuracy is probable and rely on human judgment when errors are likely. In this study, a confidence-based mechanism for trust calibration within human-AI teams is examined. A decision-making strategy is proposed in which task delegation is governed by the AI’s confidence: when the confidence surpasses a specified threshold, the AI’s recommendation is adopted; otherwise, the decision is deferred to the human. Through simulation experiments on a binary classification task, performance outcomes are compared. The AI system achieves an accuracy of 77.7%, whereas the human decision-maker, modeled with a confidence-sensitive accuracy function ph(c) = 0.95 − 0.3c, attains an overall accuracy of 71.9%. Team performance is evaluated across a range of AI confidence thresholds (0.50 to 0.99), revealing that an intermediate threshold yields optimal team accuracy of 84.14%, substantially exceeding the performance of either agent individually. The findings provide a detailed analysis of confidence-based delegation, align with existing research on trust calibration, and underscore critical design implications for the development of human-centric AI systems.

Source | Open access

trust

Trust Calibration in IDEs: Paving the Way for Widespread Adoption of AI Refactoring

Borg M.
Proceedings 2025 IEEE ACM 2nd Ide Workshop Ide 2025
Published: 2025-01-01
From feed: trust calibration

written by Borg M. Published by Proceedings 2025 IEEE ACM 2nd Ide Workshop Ide 2025

Source

trust

Trust Calibration for Joint Human/AI Decision-Making in Dynamic and Uncertain Contexts

Laura R. Marusich, Benjamin T. Files, Melanie Bancilhon, Justine Rawal, Adrienne Raglin
Lecture Notes in Computer Science
Published: 2025-01-01
From feed: trust calibration

written by Laura R. Marusich, Benjamin T. Files, Melanie Bancilhon, Justine Rawal, Adrienne Raglin Published by Lecture Notes in Computer Science

Source

trust

[PDF] A Conceptual Model of Trust in Generative AI Systems

Nargess Tahmasbi, Elham Rastegari, Minh Truong
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

Generative Artificial Intelligence (GAI) significantly impacts various sectors, offering innovative solutions in consultation, self-education, and creativity. However, the trustworthiness of GAI outputs is questionable due to the absence of theoretical correctness guarantees and the opacity of Artificial Intelligence (AI) processes. These issues, compounded by potential biases and inaccuracies, pose challenges to GAI adoption. This paper delves into the trust dynamics in GAI, highlighting its unique capabilities to generate novel outputs and adapt over time, distinct from traditional AI. We introduce a model analyzing trust in GAI through user experience, operational capabilities, contextual factors, and task types. This work aims to enrich the theoretical discourse and practical approaches in GAI, setting a foundation for future research and applications.

PDF | Source | Open access

trust

[PDF] Examining Trust and Consent Models for Patient-Generated Health Data-sharing and Incentives

Brian Thoms, Nathan Botts, Evren Eryilmaz
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

This research explores mitigating factors that influence personal health information sharing as it relates to the adoption of personal health information systems (PHIS). We examine the willingness of online users to share specific types of health data, their general concerns about sharing their health data, and what incentives might exist to motivate health data-sharing in the future. Findings across 336 survey respondents identify an overall sense of concern towards online data-sharing and privacy policies, and yet a willingness to share information, including personal health data, and the potential for health incentives to affect their willingness to share various types of health data. The implications of this research will play an important role as organizations and individuals increasingly adopt personal health information systems. This research also addresses the need for established guidelines and frameworks that address patient privacy as more data is captured and stored within cloud computing environments.

Source | Open access

trust

[PDF] Bilateral Analysis of Consumer Trust in Mobile Providers: An Empirical Mixed Methods Approach in Germany

Jasmin Ebert, Peter J. Winzer
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

Building trust is crucial for adopting and using information and communication technologies, particularly in highly competitive markets with almost homogeneous products between providers. However, assessing consumer trust is challenging, as contractual obligations or high switching costs can lead to misinterpretations. This study investigates consumer trust in mobile providers in Germany. Initially, we conducted 13 qualitative online interviews with industry experts in Germany (except one from Switzerland) to develop hypotheses, which we then tested through a quantitative online survey of German consumers (N = 502). Contrary to the experts’ critical assumptions, the findings showed that consumer trust exceeded expectations. We found no correlation between the duration of customer relationships and trust. These results are especially relevant for mobile providers. Moreover, marketing/product managers from other sectors with comparable consumer goods (e.g., subscription-based media products or information goods) can also gain insights into strategies to enhance consumer trust and manage customer relationships.

Source | Open access

trust

[PDF] Employees’ Justice Perceptions and Trust in AI Systems for Performance Evaluation: Uncovering the Role of Gender and Culture

Nguyễn Thành Tâm, Regina Connolly
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

Organizational use of Artificial Intelligence (AI) to assist with performance evaluation has increased in recent years. However, limited understanding exists about employees’ perceptions regarding AI usage for this purpose, and how it reshapes justice perceptions, trust, and commitment towards the organization. Moreover, little attention has been paid to whether gender and cultural differences exist in relation to this issue. This study explores the intersectionality of gender and culture on employees’ perceptions of AI adoption for performance evaluation, focusing on justice perceptions and trust in AI. Survey data collected from 291 participants across Eastern and Western countries was analyzed using partial least squares and multigroup analyses. The findings elucidate the relative impacts of distributive, procedural, and informational justice on trust in AI across cultures. Notably, gender differences in trust in AI formation pathways were observed in the Eastern sample, whereas no such distinction was found among Western participants.

Source | Open access

trust

[PDF] Trust is Earned (Unless Your Website is Flawed): How Presentation Flaws and Delays Affect Swift Trust Between Individuals

Taylor Wells, Taylor Bullock
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

As interactions and work moves online, the experience users have with interfaces becomes increasingly more important. In this study, we examined how two types of website malfunction, presentation flaws and delays, affect swift trust impressions of other users. We draw upon signaling theory to theoretically explain how presentation flaws and delays affect users’ swift trusting beliefs and intentions to delegate to other users. We conducted an online experiment (n=514) with a 2x2 factorial design to test our model. The presence of presentation flaws significantly biased swift trust evaluations in the negative direction as predicted. Surprisingly, we found no impact of delays on swift trust impressions, but we did find that delays increase the effect of presentation flaws on swift trust in some conditions. Our results provide guidance for practitioners seeking to keep users engaged with their interface and avoiding inadvertent distrust of other users of the platform.

Source | Open access

trust

[PDF] What do I (and You) Have to Lose? Investigating Effects of Risk Asymmetry on the Trust Process in Distributed Dyads

August Capiola, Gene M. Alarcon, Izz Aldin Hamdan, Sarah A. Jessup, Tyler Ryan, Dexter Johnson, David Panson
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

Popular theories of trust note the importance of risk in the trust process. However, real-world risk is not homogenous: one party may stand to lose more (or less) based on the actions of another, and the degree of this asymmetry may change. The present research focused on comparative vulnerability and risk discrepancy between parties in a novel task. The study investigated their moderating effects on the trust process through the lens of exchange theory. Participants were recruited online to participate in a novel task designed to emulate real-world constraints present in computer-mediated ad hoc dyads. The results showed that in several cases, relative vulnerabilities and the extent of risk discrepancy moderated the effect of partner behaviors on trust-relevant criteria. This work is a step toward quantifying the effects of changing comparative vulnerability and risk discrepancy on the trust process and has implications for distributed dyads.

Source | Open access

trust

[PDF] Recursive Impacts of Algorithmic Management on Trust and Employee Productivity in Professional Work Settings

Alexander Korogodsky
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

This research proposes a framework that describes the influences of algorithmic management on trust and worker productivity. The framework illuminates the presence of a powerful, recursive force that exhibits both enabling and inhibiting effects of algorithms on trust and explains the consequences for employee productivity. Our findings result from an in-depth single case study that investigates the dynamics of adopting algorithms for the purposes of managing employees in professional work settings. Drawing on advances in Actor-Network Theory, we observed that algorithms mature from being enabling tools to emerge as equal actors that both influence and are influenced by the trust relationships. This research advances algorithmic management and trust theories by describing this phenomenon in terms of unexpected effects on employee-to-employee and employee-to-algorithm trust and identifying its impact on worker productivity.

Source | Open access

trust

[PDF] Towards a Framework for Building Trust and Transparency in Collaborative Data-Driven Use Cases – Learnings from a Mobility Case Study

Maximilian Werling, Dirk Werth, Heiner Lasi
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

The sharing of data across organizational boundaries is becoming increasingly important. In the context of mobility, data sharing is the foundation for enabling multimodal travel and real-time schedules. However, in practice, the design and implementation of cross-organizational data-driven use cases often proves difficult and subsequently fails. In addition to technological and organizational challenges, building trust between the participating organizations proves to be a success factor. This paper presents a case study in the mobility sector in which multiple organizations collaborate to enable data-driven use cases. The research process employed was action design research, which enabled the development of a framework that outlines the goals and activities of the participating organizations and contributes toward building interorganizational trust. Finally, we extract Design Principles from our results and discuss our findings.

Source | Open access

trust

[PDF] Trust and Leadership in the Hybrid Workplace

Nathalie Östergård, Karin Högberg, Ulrika Snis
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

Digitalization of the workplace has transformed work practices and shaped hybrid work contexts. This study explores trust from a leadership perspective in two hybrid organizations, commonly known as global high-tech industrial companies. The study is qualitative with an exploratory approach. Collected data consists of field observations and interviews. The result reveal that trust is understood as a vital leadership tool in hybrid work settings. Practical findings highlight the need for strategic efforts to build and sustain trust. In addition, leaders underscore that trust is linked to clear goals and expectations, addressing respect, loyalty and empathy. Leaders emphasized the importance of regular interactions to foster trustful relationships in hybrid work settings. The result indicate that some leaders perceive that there is no choice but to trust in hybrid work settings.

Source | Open access

trust

[PDF] Designing a Reporting System for Trust in Environmental Social Governance

Egor Ermolaev, Evgenia Yvonni Tseloni, Tamara Roth, Gilbert Fridgen
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

In an effort to make companies adhere to green practices, they are increasingly required to publicly disclose environmental, social, and governance (ESG) key performance indicators (KPIs). Typically published within annual reports, the current format may not deliver all legally mandated information, and also does not attract investors who have become more focused on sustainable investing. Thus, various industries aim at improving their ESG KPIs reporting practices, including life insurance companies. Life insurance companies need to integrate ESG-focused strategies into their client interactions to obviate greenwashing allegations and appeal to their environmentally-friendly target group. This helps them remain competitive and build long-lasting institution-based trust. To help these companies address the complexities of ESG KPIs reporting, this study proposes the development of a reporting system architecture supported by Distributed Ledger Technology (DLT) for compliant, transparent, reliable, and standardized ESG reporting.

Source | Open access

trust

[PDF] Towards Effective Knowledge Transfer and Trust in the Age of Artificial Intelligence

Jose Romero-Mariona, Josée Poirier, Elizabeth Le, Michael Dierickx
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

Generative artificial intelligence (AI) promises to revolutionize education and knowledge transfer. Educational paradigms are shifting as more AI- enabled tools flood the market. Combatting the common risks of hallucinations, outdated knowledge, and untraceable decision making are retrieval- augmented generation (RAG) models’ promises. AI- assisted tools for education in both academia and industry have the potential of utilizing information retrieval methods like RAG for increasing knowledge transfer while increasing trust in the system. The paper describes the “state of the art” in AI progress towards educational assistants and how current trends can help (or hinder) knowledge transfer and ultimately trust.

Source | Open access

trust

A Novel Architecture That Examines Network Activity in a Docker-Based Multitenant to Verify Zero Trust Container Architecture (ZTCA) Compliance

Lethia Jackson, Haydar Teymourlouei, Daryl Stone, Velma Latson, Malik Cobbs, Jefry Jesus Ramos, Jamiu Olayinka, John Paja
Communications in Computer and Information Science
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

written by Lethia Jackson, Haydar Teymourlouei, Daryl Stone, Velma Latson, Malik Cobbs, Jefry Jesus Ramos, Jamiu Olayinka, John Paja Published by Communications in Computer and Information Science

Source

trust

[PDF] Understanding Zero Trust Security Implementations via the MITRE ATT&amp;CK and D3FEND Frameworks: Uncovering Trends Across a Decade of Breaches

Philip Menard, Erskine Jerrell M. Delos Reyes, Ray Bateman
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

Information sharing is paramount to operating within the modern business domain. However, with information sharing comes the risk of data breaches. One of the key challenges facing organizations is the ability to trace, and therefore trust, digital information flows. Due to its central philosophy of verifying network traffic before trusting it, zero trust security is an approach to cyber defense architecture that is rapidly gaining popularity across organizations. Although fully adopting zero trust should greatly reduce an organization’s likelihood of suffering a breach, organizations adopt zero trust in varying degrees. In this manuscript, we aim to better understand how zero trust has been adopted over the last decade, using Verizon’s Data Breach Incident Report dataset as a representative sample whereby we may infer lack of zero trust adoption via observable breaches. We find that certain aspects are positively correlated with breach occurrences, while others are negatively associated.

Source | Open access

trust

[PDF] I Trust You So You are Part of Our Team: the Influence of Group Trust and Trust in Social Robots on In-Group Perception

Viviana Mariella Oberhofer
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

Social robots are technically capable of acting as robotic team members, enabled by the advances in artificial intelligence. However, research has shown the importance of also perceiving robots as part of the in-group instead of as out-group members, who are often met with avoidance and resistance. Research is lacking an understanding of the antecedents of in-group perception in robots and the interplay with trust. This study addresses this gap by conducting a between-subject lab experiment with 18 teams of three humans and one social robot. Our findings indicate that trust in the group can stimulate trust in the robot. Additionally, our findings demonstrate that trust skews with the perception of the robots’ actions, which are perceived as more favorable for the group. This, in turn, increases the in-group perception of the social robot. This research contributes to social categorization and trust research in human-agent team and human-robot interaction research.

Source | Open access

trust

Trust Paradoxes in Machine Learning: An Ontological Approach

Yuntian Ding, Nicolas Herbaut, Camille Salinesi
Lecture Notes in Business Information Processing
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

written by Yuntian Ding, Nicolas Herbaut, Camille Salinesi Published by Lecture Notes in Business Information Processing

Source

trust

[PDF] A Zero Trust Architecture for Critical Operational Technology Systems

Meng Song, Thuy Thanh Nguyen, Cynthia Irvine
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

Evolving business demands increasingly expose modern operational technology (OT) systems to external networks. Their vulnerability to contemporary cybersecurity threats due to legacy software and hardware requires proactive measures. While the Zero Trust (ZT) paradigm has been embraced for IT systems, its use in OT systems is largely uncharted. We present a ZT architectural model to modernize and secure critical OT systems. Using a water treatment OT system, we evaluated the ZT-OT architecture against real-world remote-access and bring-your-own-device (BYOD) use cases. Our results show the ZT-OT architecture can help mitigate vulnerabilities associated with threats in specific cases and we identified limitations concerning legacy components and normal operation. Our approach offers insights into the potential and challenges of ZT in protecting OT systems.

Source | Open access

trust

[PDF] Investigating the Effects of Classification Model Error Type on Trust-relevant Criteria in a Human-Machine Learning Interaction Task

Krista Harris, August Capiola, Dexter Johnson, Gene M. Alarcon, Sarah A. Jessup, Sasha Willis, Walter Bennette
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2025-01-01
From feed: TITLE("trust")) + IS Conference

Machine learning models have been critiqued for their opaqueness, so recent work has created models to accurately convey model confidence. High performance is the most important aspect of trust in the model. However, when performance drops, accurate decision confidence leads to higher trust outcomes. The current research expands upon this work investigating how incorrect, low confidence decisions differentially impact the trust process. Incorrect decisions were either made on stimuli the model was trained to classify or stimuli outside those classification categories. In a between-subjects design, participants monitored low performing models of varying low confidence error type in an online image classification task. Results demonstrated when the model flagged incorrect stimuli it was not trained to classify with low confidence, process perceptions increased, while decision time and task performance decreased. Our results extend the current framework regarding how model confidence influences the trust process. Implications, limitations, and future research are discussed.

Source | Open access

trust

[PDF] Eye-Tracking Characteristics: Unveiling Trust Calibration States in Automated Supervisory Control Tasks

Keran Wang, Wenjun Hou, Huiwen Ma, Leyi Hong
Sensors.
Published: 2024-12-12
From feed: trust calibration

Trust is a crucial human factor in automated supervisory control tasks. To attain appropriate reliance, the operator's trust should be calibrated to reflect the system's capabilities. This study utilized eye-tracking technology to explore novel approaches, given the intrusive, subjective, and sporadic characteristics of existing trust measurement methods. A real-world scenario of alarm state discrimination was simulated and used to collect eye-tracking data, real-time interaction data, system log data, and subjective trust scale values. In the data processing phase, a dynamic prediction model was hypothesized and verified to deduce and complete the absent scale data in the time series. Ultimately, through eye tracking, a discriminative regression model for trust calibration was developed using a two-layer Random Forest approach, showing effective performance. The findings indicate that this method may evaluate the trust calibration state of operators in human-agent collaborative teams within real-world settings, offering a novel approach to measuring trust calibration. Eye-tracking features, including saccade duration, fixation duration, and the saccade-fixation ratio, significantly impact the assessment of trust calibration status.

Source | Open access

trust

Heterogeneous Multi Relation Trust for SIoT Service Recommendation

Geming Xia, Chaodong Yu, Linxuan Song, Wei Peng, Yuze Zhang, Hongfeng Li
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2024-12-06
From feed: TITLE("trust")) + IS Conference

written by Geming Xia, Chaodong Yu, Linxuan Song, Wei Peng, Yuze Zhang, Hongfeng Li Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

ContractMind: Trust-calibration interaction design for AI contract review tools

Jian Zeng, Kaixin Chen, Ruiqi Wang, Yilong Li, Mingming Fan, Kaishun Wu, XueweiTony Qi, Lu Wang
International Journal of Human Computer Studies
Published: 2024-11-30
From feed: trust calibration

written by Jian Zeng, Kaixin Chen, Ruiqi Wang, Yilong Li, Mingming Fan, Kaishun Wu, XueweiTony Qi, Lu Wang Published by International Journal of Human Computer Studies

Source

trust

[PDF] Facilitating Trust Calibration in Artificial Intelligence–Driven Diagnostic Decision Support Systems for Determining Physicians’ Diagnostic Accuracy: Quasi-Experimental Study

Tetsu Sakamoto, Yukinori Harada, Taro Shimizu
Jmir Formative Research.
Published: 2024-10-10
From feed: trust calibration

Trust calibration did not significantly improve physicians' diagnostic accuracy when considering the differential diagnoses generated by reading medical histories and the possible differential diagnosis lists of an AI-driven automated medical history-taking system. As this was a formative study, the small sample size and suboptimal trust calibration methods may have contributed to the lack of significant differences. This study highlights the need for a larger sample size and the implementation of supportive measures of trust calibration.

Source | Open access

trust

[PDF] Trust calibration through perceptual and predictive information of the external context in autonomous vehicle

Qi Gao, Lehan Chen, Yanwei Shi, Yuxuan Luo, Mowei Shen, Zaifeng Gao
Transportation Research Part F Traffic Psychology and Behaviour.
Published: 2024-09-29
From feed: trust calibration

• Enhancing drivers’ perception and prediction of external context aids trust calibration in L3 driving. • Predictive information marked safe/dangerous zones boosts overall trust and avoid over-trust. • Number of accidents remains unaffected by SA improvements. Maintaining an appropriate level of trust is critical for driving safety in autonomous vehicles. While enhancing the driver’s situation awareness (SA) of system information in autonomous driving is known to significantly promote trust calibration, it remains unclear whether enhancing the driver’s SA of the external context during driving contributes to this calibration. This study addresses this gap by improving SA of the external context during Level 3 (L3) driving automation across various driving environments. Driving contexts were manipulated using distinct road conditions containing low, medium, or high contextual risks. To enhance driver’s SA of the driving context, we redesigned the in-vehicle central control panel to display real-time perceptual and predictive information about the external driving context. We hypothesized that SA of driving contexts would facilitate trust calibration rather than merely enhancing trust, allowing trust to adjust to appropriate levels under different driving conditions. Experiment 1 examined the impact of perceptual information about the road, traffic infrastructure, and surrounding vehicles on drivers’ trust. We found that driver’s trust decreased with increased contextual risk only when the reconfigured panel was used, while the number of accidents was not affected. Experiment 2 investigated the effect of predictive information about the external context on drivers’ trust by marking safe and dangerous zones around driver’s vehicle with green and red areas, respectively. We revealed that the predictive information calibrated the trust according to road conditions and increased overall trust levels, while the number of accidents was not affected. Together, these findings suggest that enhancing perception and prediction of external contexts helps drivers align their trust with contextual risk levels in L3 driving automation without compromising driving safety.

Source | Open access

trust

The role of Explainable AI in the Design of Visual Texts for Trust Calibration in Level 3 Automated Vehicles

Diah Ayu Irawati, Elif Bölükbaşı, Michael A. Gerber, Andreas Riener
16th International Conference on Automotive User Interfaces and Interactive Vehicular Applications Automotiveui 2024 Adjunct Conference Proceedings
Published: 2024-09-17
From feed: trust calibration

Considerable research has been carried out into explainable artificial intelligence (XAI) in automated driving to enhance user trust in these technologies. This work examines how XAI and HCI can improve user trust through visual text design in L3 automated vehicles. We aim to develop user interfaces (UIs) that make AI-driven vehicle decisions more transparent and understandable. Employing a mixed-methods approach (TiA scale, qualitative feedback) in a between-groups design (n=12 participants), we combine empirical analyses with UX design principles. The study indicates that effectively communicating AI processes through visual texts in UIs can bridge the gap between complex algorithms and user understanding, thus fostering trust. Results further indicate that contextual, clear, and expected multimodal interaction enhances user trust and understanding of automated systems. These findings are crucial for developing future automated systems in a user-centered manner.

Source

trust

Trust Calibration in Augmented Reality-based Decision Support Systems

Björn Konopka, Kay Hönemann, Manuel Wiesche
Proceedings 2024 26th International Conference on Business Informatics CBI 2024
Published: 2024-09-09
From feed: trust calibration

This empirical study investigates how users modify their trust in Augmented Reality-based (AR) decision support systems (DSS) in work environments, and how this trust influences work-related outcomes such as task performance, reliance on the system, and future intention to use it. Building upon existing research on trust in technology, particularly in automation, we develop a research model and hypotheses for Hu-man-AR-Interaction. To test our research model, we conducted a laboratory experiment with 115 participants using an ARbased decision support system. We manipulated the system’s performance, process, and purpose as key antecedents of trust calibration. Our findings indicate that calibrated trust has a significant positive influence on users’ reliance in the context of AR-DSS and their intention to use such systems in the future.

Source

trust

Robot Social Identity Performance Facilitates Contextually-Driven Trust Calibration and Accurate Human Assessments of Robot Capabilities

Maria P. Stull, Clare Lohrmann, Bradley Hayes
IEEE International Workshop on Robot and Human Communication Ro Man
Published: 2024-08-26
From feed: trust calibration

People struggle to form accurate expectations of robots because we typically associate behavior (and capability) with the physical entity even when there are clear indicators of different software programs dictating behavior at different times. This is a harmful prior, as commercially available, visibly similar robots do not necessarily share any common ground in terms of capability, safety, or behavior. Prior efforts to calibrate people’s expectations of robots have not extended to anchoring on the robot’s control software rather than its embodiment. In this work, we leverage social participation and flexible identity presentation to facilitate coworkers’ associations of robot capability with the currently running software rather than physical entity itself. By linking each of a robot’s controllers to a social identity, we enable collaborators to more easily differentiate between them. In a human subjects study (n=30), participants who experienced our social identity signal understood differences between the robot’s two controllers and prevented an unreliable controller from harming perceptions of the robot’s other controller.

Source

trust

[PDF] The Influence of Interdependence on Trust Calibration in Human-Machine Teams

Ruben Verhagen, Alexandra Marcu, Mark A. Neerincx, Myrthe L. Tielman
Frontiers in Artificial Intelligence and Applications.
Published: 2024-06-05
From feed: trust calibration

In human-machine teams, the strengths and weaknesses of both team members result in dependencies, opportunities, and requirements to collaborate. Managing these interdependence relationships is crucial for teamwork, as it is argued that they facilitate accurate trust calibration. Unfortunately, empirical research on the influence of interdependence on trust calibration during human-machine teamwork is lacking. Therefore, we conducted an experiment (n=80) to study the effect of interdependence relationships (complete independence, complementary independence, optional interdependence, required interdependence) on human-machine trust calibration. Participants collaborated with a virtual agent during a simulated search and rescue task in teams characterized by one of the four interdependencies. A machine-induced trust violation was included in the task to facilitate dynamic trust calibration. Results show that the interdependence relationships during human-machine teamwork influence perceived trust calibration over time. Only in the teams with joint actions (optional and required interdependence) does perceived trust in the machine not recover to its initial pre-violated value. However, results show that the correlation between perceived trust in the machine and machine trustworthiness is strongest in these teams with joint actions, suggesting a more accurate trust calibration process. Overall, our findings provide some first evidence that interdependence relationships during human-machine teamwork influence human-machine trust calibration.

Source | Open access

trust

Software Attribute Comprehensive Trust Measurement Model

Yihang Luo, Pengxuan Sun
ACM International Conference Proceeding Series
Published: 2024-05-29
From feed: TITLE("trust")) + IS Conference

With the rapid development of the information age, software security has become a crucial component. In the realm of security, quantifying the trustworthiness of software has become a focal point, yielding a series of research outcomes. While much of this work focuses on studying the trustworthy attributes of software from a static perspective, there are also efforts in designing dynamic assessment models. However, a comprehensive consideration of the holistic security attributes of software and the complexity of evaluating software security has not been adequately addressed. To address these challenges, this paper proposes a comprehensive trust evaluation model tailored for software attribute security. In the computation of the direct trust model, time factor and reward-penalty factors are introduced to enhance the accuracy of the trust model. The recommended trust model measures the evaluative disparity among software entities to derive recommended trustworthiness. The comprehensive trust model combines direct trust and recommended trust, introducing a dynamic weight allocation function to enhance adaptability. Finally, through simulation experiments comparing various trust models, the effectiveness of this approach is validated.

Source

trust

Trust in Software Supply Chains: Blockchain-Enabled SBOM and the AIBOM Future

Boming Xia, Dawen Zhang, Yue Liu, Qinghua Lu, Zhenchang Xing, Liming Zhu
Proceedings 2024 IEEE ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems and 2024 IEEE ACM 2nd International Workshop on Software Vulnerability Encycris Svm 2024
Published: 2024-04-15
From feed: TITLE("trust")) + IS Conference

The robustness of critical infrastructure systems is contingent upon the integrity and transparency of their software supply chains. A Software Bill of Materials (SBOM) is pivotal in this regard, offering an exhaustive inventory of components and dependencies crucial to software development. However, prevalent challenges in SBOM sharing, such as data tampering risks and vendors' reluctance to fully disclose sensitive information, significantly hinder its effective implementation. These challenges pose a notable threat to the security of critical infrastructure and systems where transparency and trust are paramount, underscoring the need for a more secure and flexible mechanism for SBOM sharing. To bridge the gap, this study introduces a blockchain-empowered architecture for SBOM sharing, leveraging verifiable credentials to allow for selective disclosure. This strategy not only heightens security but also offers flexibility. Furthermore, this paper broadens the remit of SBOM to encompass AI systems, thereby coining the term AI Bill of Materials (AIBOM). The advent of AI and its application in critical infrastructure necessitates a nuanced understanding of AI software components, including their origins and interdependencies. The evaluation of our solution indicates the feasibility and flexibility of the proposed SBOM sharing mechanism, positing a solution for safeguarding (AI) software supply chains, which is essential for the resilience and reliability of modern critical infrastructure systems.

Source

trust

[PDF] Scenarios for Trust Management in Swarm Robotics

Daniel Vojnar, Adela Bierska, Barbora Bühnová
Proceedings 2024 IEEE ACM 6th International Workshop on Robotics Software Engineering Rose 2024.
Published: 2024-04-15
From feed: TITLE("trust")) + IS Conference

Many terrestrial and aquatic organisms, such as ants, termites or fish, live in communities that resemble larger and more capable organisms thanks to the delicate coordination of the individuals. Humans benefit from mimicking this coordination in many technological sectors, whether it is the coordinated movement of drones, cars, or robot teaming. With the increasing autonomy and intelligence, multi-robot systems and swarm robots specifically have increasing potential to replace humans in dangerous missions, reacting collaboratively to unprecedented conditions. What if, however, one of the robots decides to sabotage such a collaborative mission? How can we support its peers in detecting an untrustworthy member? This paper identifies and classifies the scenarios of swarm-robot collaboration, which is prone to disruption by an untrustworthy member, and links them to a taxonomy of attacks, for which it highlights the importance of the trust aspect between individual robots across the scenarios. The benefits of trust are presented, discussing its capability to prevent attacks and detect malicious individuals in these types of systems.

Source | Open access

trust

Exploring Trust Black-Swan Blindness in Social Internet of Vehicles (SIoV)

Hind Bangui, Barbora Bühnová, Daša Kušniráková
Proceedings 2024 IEEE ACM 12th International Workshop on Software Engineering for Systems of Systems and Software Ecosystems Sesos 2024
Published: 2024-04-14
From feed: TITLE("trust")) + IS Conference

Bringing social networking notions into the Internet of Vehicles (IoV) paradigm has defined Social IoV ecosystems as an extension of the Social Internet of Things (SIoT). SIoV ecosystems have increased the smart utilization of transport networks by enabling vehicles to communicate autonomously and share information about their surrounding environment. However, the ability of vehicles to establish social relationships autonomously with different IoV entities has inherited the primary challenge in SIoT, which is to establish trusted relationships. This is further emphasized by the dynamic nature of vehicular ecosystems that allow various kinds of misbehaviour to be unnoticed, leading to scarce trust evidence and increased risk of blind spots in trust management. In this work, we introduce our trust-management vision for SIoV by gaining from the Black Swan theory to turn unnoticeable malicious behaviors into noticeable ones, and create a true sense of trust in SIoV.

Source

trust

[PDF] Increasing trust in the open source supply chain with reproducible builds and functional package management

Julien Malka
Proceedings International Conference on Software Engineering.
Published: 2024-04-14
From feed: TITLE("trust")) + IS Conference

Functional package managers (FPMs) and reproducible builds (R-B) are technologies and methodologies that are conceptually very different from the traditional software deployment model, and that have promising properties for software supply chain security. This thesis aims to evaluate the impact of FMPs and R-B on the security of the software supply chain and propose improvements to the FPM model to further improve trust in the open source supply chain.

Source | Open access

trust

[PDF] Decomposing and Measuring Trust in Open-Source Software Supply Chains

Lina Boughton, Courtney Miller, Yasemin Acar, Dominik Wermke, Christian Kästner
Proceedings International Conference on Software Engineering.
Published: 2024-04-14
From feed: TITLE("trust")) + IS Conference

Trust is integral for the successful and secure functioning of software supply chains, making it important to measure the state and evolution of trust in open source communities. However, existing security and supply chain research often studies the concept of trust without a clear definition and relies on obvious and easily available signals like GitHub stars without deeper grounding. In this paper, we explore how to measure trust in open source supply chains with the goal of developing robust measures for trust based on the behaviors of developers in the community. To this end, we contribute a process for decomposing trust in a complex large-scale system into key trust relationships, systematically identifying behavior-based indicators for the components of trust for a given relationship, and in turn operationalizing data-driven metrics for those indicators, allowing for the wide-scale measurement of trust in practice.

Source | Open access

trust

RogueOne: Detecting Rogue Updates via Differential Data-flow Analysis Using Trust Domains

Raphael J. Sofaer, Yaniv David, Mingqing Kang, Jianjia Yu, Yinzhi Cao, Junfeng Yang, Jason Nieh
Proceedings International Conference on Software Engineering
Published: 2024-04-12
From feed: TITLE("trust")) + IS Conference

Rogue updates, an important type of software supply-chain attack in which attackers conceal malicious code inside updates to benign software, are a growing problem due to their stealth and effectiveness. We design and implement RogueOne, a system for detecting rogue updates to JavaScript packages. RogueOne uses a novel differential data-flow analysis to capture how an update changes a package's interactions with external APIs. Using an efficient form of abstract interpretation that can exclude unchanged code in a package, it constructs an object data-flow relationship graph (ODRG) that tracks data-flows among objects. RogueOne then maps objects to trust domains, a novel abstraction which summarizes trust relationships in a package. Objects are assigned a trust domain based on whether they originate in the target package, a dependency, or in a system API. RogueOne uses the ODRG to build a set of data-flows across trust domains. It compares data-flow sets across package versions to detect untrustworthy new interactions with external APIs. We evaluated RogueOne on hundreds of npm packages, demonstrating its effectiveness at detecting rogue updates and distinguishing them from benign ones. RogueOne achieves high accuracy and can be more than seven times as effective in detecting rogue updates and avoiding false positives compared to other systems built to detect malicious packages.

Source

trust

[PDF] Can you trust your ML metrics? Using Subjective Logic to determine the true contribution of ML metrics for safety

Benjamin Herd, Simon Burton
Proceedings of the ACM Symposium on Applied Computing.
Published: 2024-04-08
From feed: TITLE("trust")) + IS Conference

Metrics such as accuracy, precision, recall, F1 score, etc. are generally used to assess the performance of machine learning (ML) models. From a safety perspective, relying on such single point estimates to evaluate safety requirements is problematic since they only provide a partial and indirect evaluation of the true safety risk associated with the model and its potential errors. In order to obtain a better understanding of the performance insufficiencies in the model, factors that could influence the quantitative evaluation of safety requirements such as test sample size, dataset size and model calibration need to be taken into account. In safety assurance, arguments typically combine complementary and diverse evidence to strengthen confidence in the safety claims. In this paper, we make a first step towards a more formal treatment of uncertainty in ML metrics by proposing a framework based on Subjective Logic that allows for modelling the relationship between primary and secondary pieces of evidence and the quantification of resulting uncertainty. Based on experiments, we show that single point estimates for common ML metrics tend to overestimate model performance and that a probabilistic treatment using the proposed framework can help to evaluate the probable bounds of the actual performance.

Source | Open access

trust

[PDF] Can you trust your Agent? The Effect of Out-of-Distribution Detection on the Safety of Reinforcement Learning Systems

Tom Haider, Karsten Roscher, Benjamin Herd, Felippe Schmoeller Roza, Simon Burton
Proceedings of the ACM Symposium on Applied Computing.
Published: 2024-04-08
From feed: TITLE("trust")) + IS Conference

Deep Reinforcement Learning (RL) has the potential to revolutionize the automation of complex sequential decision-making problems. Although it has been successfully applied to a wide range of tasks, deployment to real-world settings remains challenging and is often limited. One of the main reasons for this is the lack of safety guarantees for conventional RL algorithms, especially in situations that substantially differ from the learning environment. In such situations, state-of-the-art systems will fail silently, producing action sequences without signalizing any uncertainty regarding the current input. Recent works have suggested Out-of-Distribution (OOD) detection as an additional reliability measure when deploying RL in the real world. How these mechanisms benefit the safety of the entire system, however, is not yet fully understood. In this work, we study how OOD detection contributes to the safety of RL systems by describing the challenges involved with detecting unknown situations. We derive several definitions for unknown events and explore potential avenues for a successful safety argumentation, building on recent work for safety assurance of Machine Learning components. In a series of experiments, we compare different OOD detectors and show how difficult it is to distinguish harmless from potentially unsafe OOD events in practice, and how standard evaluation schemes can lead to deceptive conclusions, depending on which definition of unknown is applied.

Source | Open access

trust

[PDF] C-XAI: A conceptual framework for designing XAI tools that support trust calibration

Mohammad Naiseh, Auste Simkute, Baraa Zieni, Nan Jiang, Raian Ali
Journal of Responsible Technology.
Published: 2024-01-26
From feed: trust calibration

Recent advancements in machine learning have spurred an increased integration of AI in critical sectors such as healthcare and criminal justice. The ethical and legal concerns surrounding fully autonomous AI highlight the importance of combining human oversight with AI to elevate decision-making quality. However, trust calibration errors in human-AI collaboration, encompassing instances of over-trust or under-trust in AI recommendations, pose challenges to overall performance. Addressing trust calibration in the design process is essential, and eXplainable AI (XAI) emerges as a valuable tool by providing transparent AI explanations. This paper introduces Calibrated-XAI (C-XAI), a participatory design framework specifically crafted to tackle both technical and human factors in the creation of XAI interfaces geared towards trust calibration in Human-AI collaboration. The primary objective of the C-XAI framework is to assist designers of XAI interfaces in minimising trust calibration errors at the design level. This is achieved through the adoption of a participatory design approach, which includes providing templates, guidance, and involving diverse stakeholders in the design process. The efficacy of C-XAI is evaluated through a two-stage evaluation study, demonstrating its potential to aid designers in constructing user interfaces with trust calibration in mind. Through this work, we aspire to offer systematic guidance to practitioners, fostering a responsible approach to eXplainable AI at the user interface level.

Source | Open access

trust

[PDF] A Conceptual Model for Blockchain-Based Trust in Digital Ecosystems (Short Paper)

Yuntian Ding, Nicolas Herbaut, Daniel Négru
Lecture Notes in Business Information Processing.
Published: 2024-01-01
From feed: TITLE("trust")) + IS Conference

written by Yuntian Ding, Nicolas Herbaut, Daniel Négru Published by Lecture Notes in Business Information Processing.

Source | Open access

trust

[PDF] Meaningful Communication but not Superficial Anthropomorphism Facilitates Human-Automation Trust Calibration: The Human-Automation Trust Expectation Model (HATEM)

Owen Carter, Shayne Loft, Troy A. W. Visser
Human Factors.
Published: 2023-12-02
From feed: trust calibration

Designers using anthropomorphism to calibrate trust need to consider what contextually useful information will be communicated via anthropomorphic features.

Source | Open access

trust

Multi-secret Sharing Scheme for Zero Trust Environment

Qin Zhou, Rumiao Yang, Hao Zhou, Lei Cai
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences Icsess
Published: 2023-10-17
From feed: TITLE("trust")) + IS Conference

The zero-trust concept of “never trust, always verify” injected new vitality into the development of network security. However, the related research on zero trust is still preliminary, and the research on secure data transmission is relatively less. How to achieve secure data transmission in zero trust environment is a problem to be solved. Aiming the data transmission scenario of private data secret sharing among agents, this paper proposed a secure data transmission scheme based on multi-secret sharing to solve the problems of identity comparison confirmation of participants and adjust the access structure according to the security value of trust evaluation in existing secret sharing schemes. The proposed scheme adopts the secret sharing design without the trusted third party, which avoids the security risk of trusted third party disclosure in the traditional secret sharing scheme. Secondly, in the system parameter setting phase, the identity of participants and zero-trust identity database are compared to combine the characteristics of zero-trust “identity authentication”, to improve the security of secret sharing. Finally, during secret distribution, zero-trust trust evaluation security values are used to adjust the access structure based on zero-trust ‘trust evaluation’ to ensure secure data transmission.

Source

trust

A Supply Chain Finance Framework Based on Zero-Trust Architecture

Yisheng Pan, Shuai Liu, Jinyu Zhang, Hao Wu
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences Icsess
Published: 2023-10-17
From feed: TITLE("trust")) + IS Conference

The post-epidemic era has brought to light significant issues in traditional supply chain financing, particularly with regard to the financing challenges faced by SMEs. Despite the considerable advancements made in the supply chain financing model, it appears that the existing framework is inadequate in meeting the financing requirements of SMEs. The root cause of this inadequacy can be attributed to the inherent challenges posed by the chain's structure, such as lengthy credit evaluation cycles, fixed evaluation nodes, and the inability to promptly reflect the needs of downstream enterprises. In the realm of computers, the zero-trust architecture is a highly valuable framework. This paper presents a comprehensive analysis of the supply chain financing framework, with a focus on enhancing its efficacy through the implementation of a zero-trust architecture, and a quality management framework is proposed to complement the proposed architecture.

Source

trust

[PDF] The Importance of an Ethical Framework for Trust Calibration in AI

A. Allan Schmid, Manuel Wiesche
IEEE Intelligent Systems.
Published: 2023-09-29
From feed: trust calibration

The transformative power of artificial intelligence (AI) rises serious concerns on ethical issues within organizations and implicates the need of trust. To cope with that, numerous ethical frameworks are generally published, but only on a theoretical level. Furthermore, proper trust calibration in AI is of high relevance for the workers. Up to now, only limited studies have been carried out to investigate how an ethical framework can foster proper trust calibration of workers in practice. To close this gap, an ethical framework is investigated which ensures trust calibration by targeting AI reliability and AI safety. Finally, the effectiveness of the applied framework is evaluated based on 17 interviews within an international automotive supplier. As a result, this ethical framework led to a major increase in trust. This is a groundbreaking outcome since workers are willing to accept a lower level of AI safety and AI reliability at the same time.

Source | Open access

trust

[PDF] A Quantum Model of Trust Calibration in Human–AI Interactions

Luisa Roeder, Pamela Hoyte, J. van der Meer, Lauren Fell, Patrick Johnston, Graham Kerr, Peter Bruza
Entropy.
Published: 2023-09-20
From feed: trust calibration

This exploratory study investigates a human agent's evolving judgements of reliability when interacting with an AI system. Two aims drove this investigation: (1) compare the predictive performance of quantum vs. Markov random walk models regarding human reliability judgements of an AI system and (2) identify a neural correlate of the perturbation of a human agent's judgement of the AI's reliability. As AI becomes more prevalent, it is important to understand how humans trust these technologies and how trust evolves when interacting with them. A mixed-methods experiment was developed for exploring reliability calibration in human-AI interactions. The behavioural data collected were used as a baseline to assess the predictive performance of the quantum and Markov models. We found the quantum model to better predict the evolving reliability ratings than the Markov model. This may be due to the quantum model being more amenable to represent the sometimes pronounced within-subject variability of reliability ratings. Additionally, a clear event-related potential response was found in the electroencephalographic (EEG) data, which is attributed to the expectations of reliability being perturbed. The identification of a trust-related EEG-based measure opens the door to explore how it could be used to adapt the parameters of the quantum model in real time.

Source | Open access

trust

Embodied Conversational Agent Teams for Trust Calibration in Automated Vehicles

Marie Premstaller, Heike Christiane Kotsios, Philipp Wintersberger
ACM International Conference Proceeding Series
Published: 2023-09-12
From feed: trust calibration

Representing sub-systems of automated vehicles with a team of conversational agents has been suggested in the past to improve the process of trust calibration. Experiments so far did not include embodied agents. In this work, we present two potential analogies derived from a company hierarchy and a spaceship crew. We developed comic strips showing everyday interactions with these agents in an automated vehicle and evaluated them in a Vignette study in comparison with single-agent approaches. Our results suggest that a multi-agent approach could be beneficial for trust calibration, but only for the company and not the spaceship analogy. Only some of the design decisions regarding the agents’ personalities worked out as intended. Still, we believe the concept is promising for future investigations.

Source

trust

Trust Calibration Through Intentional Errors: Designing Robot Errors to Decrease Children’s Trust Towards Robots

Denise Y. Geiskkovitch, James E. Young
IEEE International Workshop on Robot and Human Communication Ro Man
Published: 2023-08-28
From feed: trust calibration

Robots are being developed to help in various settings with young children. However, research suggests that children may overtrust robots, which can have a negative impact when such trust is unwanted or unsafe. Based on recent results from the community we suggest designing robots to use intentional errors to potentially reduce children’s trust in robots and to mitigate overtrust. We present a breakdown of robot errors that might affect children’s trust towards robots, and which could be used intentionally to mitigate overtrust. This includes accuracy errors, responsiveness errors, and error recovery strategies. We highlight how they could be used to decrease trust. We lastly provide an agenda for researchers to further investigate how the intentional use of robot errors could help to mitigate children’s overtrust in robots.

Source

trust

[PDF] Simulation Evidence of Trust Calibration: Using POMDP with Signal Detection Theory to Adapt Agent Features for Optimised Task Outcome During Human-Agent Collaboration

Sarita Herse, Jonathan Vitale, Mary‐Anne Williams
International Journal of Social Robotics.
Published: 2023-08-16
From feed: trust calibration

Abstract Appropriately calibrated human trust is essential for successful Human-Agent collaboration. Probabilistic frameworks using a partially observable Markov decision process (POMDP) have been previously employed to model the trust dynamics of human behavior, optimising the outcomes of a task completed with a collaborative recommender system. A POMDP model utilising signal detection theory to account for latent user trust is presented, with the model working to calibrate user trust via the implementation of three distinct agent features: disclaimer message, request for additional information, and no additional feature. A simulation experiment is run to investigate the efficacy of the proposed POMDP model compared against a random feature model and a control model. Evidence demonstrates that the proposed POMDP model can appropriately adapt agent features in-task based on human trust belief estimates in order to achieve trust calibration. Specifically, task accuracy is highest with the POMDP model, followed by the control and then the random model. This emphasises the importance of trust calibration, as agents that lack considered design to implement features in an appropriate way can be more detrimental to task outcome compared to an agent with no additional features.

Source | Open access

trust

Team at Your Service: Investigating Functional Specificity for Trust Calibration in Automated Driving with Conversational Agents

Philipp Wintersberger
International Journal of Human Computer Interaction
Published: 2023-06-29
From feed: trust calibration

Functional specificity describes the degree to which operators can successfully calibrate their trust toward different subsystems of a machine. Only a few works have addressed this issue in the context of automated vehicles. Previous studies suggest that drivers have issues distinguishing between different subsystems, which leads to low functional specificity. To counter, this article presents a prototypical design where different in-vehicle subsystems are portrayed by independent conversational agents. The concept was evaluated in a user study where participants had to supervise a level 2 automated vehicle while reading and communicating with the conversational agents in the car. It was hypothesized that a clear differentiation between subsystems could allow drivers to better calibrate their trust. However, our results, based on subjective trust scales, monitoring, and driving behavior, cannot confirm this assumption. In contrast, functional specificity was high among participants of the study, and they based their situational and general trust ratings mainly on the perceptions of the driving automation system. Still, the experiment contributes to issues of trust and monitoring and concludes with a list of relevant findings to support trust calibration in supervisory control situations.

Source

trust

Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model

Shigeaki Tanimoto, Sogen Hori, Hiroyuki Satō, Atsushi Kanai
Proceedings 2023 IEEE Acis 21st International Conference on Software Engineering Research Management and Applications SERA 2023
Published: 2023-05-23
From feed: TITLE("trust")) + IS Conference

Telework has been on the rise since the advent of COVID-19, and concerns have arisen about issues such as information leakage due to internal fraud. The zero-trust model is attracting attention as a countermeasure. This model reduces risk by constantly performing authentication and authorization, thus leading to improved security levels and safer operation. However, currently less than 40% of the companies in Japan have introduced zero trust into their security policies, mainly due to the lack of specific guidelines for operational management. We have therefore developed a security policy (service authorization conditions) for the software defined perimeter (SDP) zero-trust model as a universal operational management method to promote zero-trust implementation. Specifically, we simplify the time/place/occasion (TPO) conditions of users as T (inside/outside working hours), P (inside/outside the company, telework), and O (with/without visitors), resulting in 12 patterns, and for each of these TPO conditions, we propose detailed new service authorization conditions for SDP. The results of qualitative evaluation demonstrated the effectiveness of the proposed method. Our findings will contribute to the introduction of the zero-trust model and pave the way for safer and more secure corporate networks.

Source

trust

Make Your Tools Sparkle with Trust: The PICSE Framework for Trust in Software Tools

Brittany Johnson, Christian Bird, Denae Ford, Nicole Forsgren, Thomas Zimmermann
Proceedings International Conference on Software Engineering
Published: 2023-05-01
From feed: TITLE("trust")) + IS Conference

The day to day of a software engineer involves a variety of tasks. While many of these tasks are collaborative and completed as such, it is not always possible or feasible to engage with other engineers for task completion. Software tools, such as code generators and static analysis tools, aim to fill this gap by providing additional support for developers to effectively complete their tasks. With a steady stream of new tools that emerging to support software engineers, including a new breed of tools that rely on artificial intelligence, there are important questions we should aim to answer regarding the trust engineers can, and should, put into their software tools and what it means to build a trustworthy tool. In this paper, we present findings from an industry interview study conducted with 18 engineers across and external to the Microsoft organization. Based on these interviews, we introduce the PICSE (pronounced "pixie") framework for trust in software tools to provide preliminary insights into factors that influence engineer trust in their software tools. We also discuss how the PICSE framework can be considered and applied in practice for designing and developing trustworthy software tools.

Source

trust

[PDF] Interpersonal Trust in OSS: Exploring Dimensions of Trust in GitHub Pull Requests

Amirali Sajadi, Kostadin Damevski, Preetha Chatterjee
Proceedings International Conference on Software Engineering.
Published: 2023-05-01
From feed: TITLE("trust")) + IS Conference

Interpersonal trust plays a crucial role in facilitating collaborative tasks, such as software development. While previous research recognizes the significance of trust in an organizational setting, there is a lack of understanding in how trust is exhibited in OSS distributed teams, where there is an absence of direct, in-person communications. To foster trust and collaboration in OSS teams, we need to understand what trust is and how it is exhibited in written developer communications (e.g., pull requests, chats). In this paper, we first investigate various dimensions of trust to identify the ways trusting behavior can be observed in OSS. Next, we sample a set of 100 GitHub pull requests from Apache Software Foundation (ASF) projects, to analyze and demonstrate how each dimension of trust can be exhibited. Our findings provide preliminary insights into cues that might be helpful to automatically assess team dynamics and establish interpersonal trust in OSS teams, leading to successful and sustainable OSS.

Source | Open access

trust

[PDF] Measuring and Understanding Trust Calibrations for Automated Systems: A Survey of the State-Of-The-Art and Future Directions

Magdalena Wischnewski, Nicole C. Krämer, Emmanuel Müller
Conference on Human Factors in Computing Systems Proceedings.
Published: 2023-04-19
From feed: trust calibration

Trust has been recognized as a central variable to explain the resistance to using automated systems (under-trust) and the overreliance on automated systems (over-trust). To achieve appropriate reliance, users’ trust should be calibrated to reflect a system’s capabilities. Studies from various disciplines have examined different interventions to attain such trust calibration. Based on a literature body of 1000+ papers, we identified 96 relevant publications which aimed to calibrate users’ trust in automated systems. To provide an in-depth overview of the state-of-the-art, we reviewed and summarized measurements of the trust calibration, interventions, and results of these efforts. For the numerous promising calibration interventions, we extract common design choices and structure these into four dimensions of trust calibration interventions to guide future studies. Our findings indicate that the measurement of the trust calibration often limits the interpretation of the effects of different interventions. We suggest future directions for this problem.

Source | Open access

trust

[PDF] Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions

Thomas Haines, Johannes Müller, Iñigo Querejeta-Azurmendi
Proceedings of the ACM Symposium on Applied Computing.
Published: 2023-03-27
From feed: TITLE("trust")) + IS Conference

Electronic voting (e-voting) is regularly used in many countries and organizations for legally binding elections. In order to conduct such elections securely, numerous e-voting systems have been proposed over the last few decades. Notably, some of these systems were designed to provide coercion-resistance. This property protects against potential adversaries trying to swing an election by coercing voters.

Source | Open access

trust

[PDF] Survey on Trust in Software Engineering for Autonomous Dynamic Ecosystems

Barbora Bühnová, David Halasz, Danish Iqbal, Hind Bangui
Proceedings of the ACM Symposium on Applied Computing.
Published: 2023-03-27
From feed: TITLE("trust")) + IS Conference

Software systems across various application domains are undergoing a major shift, from static systems of systems to dynamic ecosystems characterized by largely autonomous software agents, engaging in mutual coalitions and partnerships to complete complex collaborative tasks. One of the key challenges facing software engineering along with this shift, is our preparedness to leverage the concept of mutual trust building among the dynamic system components, to support safe collaborations with (possibly malicious or misbehaving) components outside the boundaries of our control. To support safe evolution towards dynamic software ecosystems, this paper examines the current progress in the research on trust in software engineering across various application domains. To this end, it presents a survey of existing work in this area, and suggests the directions in which further research is needed. These directions include the research of social metrics supporting trust assessment, fine-grained quantification of trust-assessment results, and opening the discussion on governance mechanisms responsible for trust-score management and propagation across the integrated software ecosystems.

Source | Open access

trust

[PDF] Deep-Learning based Trust Management with Self-Adaptation in the Internet of Behavior

Hind Bangui, Emilia Cioroaica, Mouzhi Ge, Barbora Bühnová
Proceedings of the ACM Symposium on Applied Computing.
Published: 2023-03-27
From feed: TITLE("trust")) + IS Conference

Internet of Behavior (IoB) has emerged as a new research paradigm within the context of digital ecosystems, with the support for understanding and positively influencing human behavior by merging behavioral sciences with information technology, and fostering mutual trust building between humans and technology. For example, when automated systems identify improper human driving behavior, IoB can support integrated behavioral adaptation to avoid driving risks that could lead to hazardous situations.

Source | Open access

trust

NFT Trust Survey

Jean-Marc Seigneur, Suzana Mesquita de Borba Maranhao Moreno
Proceedings of the ACM Symposium on Applied Computing
Published: 2023-03-27
From feed: TITLE("trust")) + IS Conference

Non-Fungible Tokens (NFT) have gained popularity since 2021, reaching a total market valuation of several billion US dollars, especially in art. This paper highlights the findings of our statistically representative survey of more than 1850 Americans, e.g., 5.7% have already bought an NFT. Unfortunately, that trust has been misplaced on many occasions due to technical and legal issues of most created NFTs. We detail those issues and evaluate them in the case of the most well-known NFT marketplace, i.e., OpenSea.

Source

trust

Understanding trust calibration in automated driving: the effect of time, personality, and system warning design

Jianhong Qu, Ronggang Zhou, Yaping Zhang, Qianli Ma
Ergonomics
Published: 2023-03-15
From feed: trust calibration

Under the human-automation codriving future, dynamic trust should be considered. This paper explored how trust changes over time and how multiple factors (time, trust propensity, neuroticism, and takeover warning design) calibrate trust together. We launched two driving simulator experiments to measure drivers' trust before, during, and after the experiment under takeover scenarios. The results showed that trust in automation increased during short-term interactions and dropped after four months, which is still higher than pre-experiment trust. Initial trust and trust propensity had a stable impact on trust. Drivers trusted the system more with the two-stage (MR + TOR) warning design than the one-stage (TOR). Neuroticism had a significant effect on the countdown compared with the content warning.Practitioner summary: The results provide new data and knowledge for trust calibration in the takeover scenario. The findings can help design a more reasonable automated driving system in long-term human-automation interactions.

Source

trust

The Performance of Trust in Knowledge Sharing Activities using the SECI Model in Online Teamwork

Murty Magda Pane, Arcadius Benawa
ACM International Conference Proceeding Series
Published: 2023-01-31
From feed: TITLE("trust")) + IS Conference

This research's objective is to get the information about the performance of trust of the students in the knowledge sharing activities the students have done. The specific model chosen in this research for knowledge sharing is the SECI Model. It used an experimental model combined with quantitative method. It used 92 respondents from several departments and second semester. It used questionnaires for SECI Model and Organizational Commitment, and they got > 0.250 for corrected total item correlations and Cronbach alpha, so all the itmes in the questionnaires are valid and reliable. The respondents tend to choose the scale of 4 (47.04% in average), 3 (26.944% in average) and 5 (18.082% in average). The correlations between trust and every process of SECI Model are 0.985, 0.636, 0.480 and 0.581. These results show that organizational commitment of the respondents have positive linear relationships with every process of SECI Model.

Source

trust

Evaluating the Effect of Time on Trust Calibration of Explainable Artificial Intelligence

Ezekiel Bernardo, Rosemary R. Seva
Applied Human Factors and Ergonomics International
Published: 2023-01-01
From feed: trust calibration

Explainable Artificial Intelligence (XAI) has played a significant role in human-computer interaction. The cognitive resources it carries allow humans to understand the complex algorithm powering Artificial Intelligence (AI), virtually resolving the acceptance and adoption barrier from the lack of transparency. This resulted in more systems leveraging XAI and triggering interest and efforts to develop newer and more capable techniques. However, though the research stream is expanding, little is known about the extent of its effectiveness on end-users. Current works have only measured XAI effects on either moment time effect or compared it cross-sectionally on various types of users. Filling this out can improve the understanding of existing studies and provide practical limitations on its use for trust calibration. To address this gap, a multi-time research experiment was conducted with 103 participants to use and evaluate XAI in an image classification application for three days. Measurement that was considered is on perceived usefulness for its cognitive contribution, integral emotions for affective change, trust, and reliance, and was analyzed via covariance-based structural equation modelling. Results showed that time only moderates the path from cognitive to trust and reliance as well as trust to reliance, with its effect dampening through time. On the other hand, affective change has remained consistent in all interactions. This shows that if an AI system uses XAI over a longer time frame, prioritization should be on its affective properties (i.e., things that will trigger emotional change) rather than purely on its cognitive purpose to maximize the positive effect of XAI.

Source

trust

CET-AoTM: Cloud-Edge-Terminal Collaborative Trust Evaluation Scheme for AIoT Networks

Chaodong Yu, Geming Xia, Linxuan Song, Wei Peng, Jian Chen, Danlei Zhang, Hongfeng Li
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2023-01-01
From feed: TITLE("trust")) + IS Conference

written by Chaodong Yu, Geming Xia, Linxuan Song, Wei Peng, Jian Chen, Danlei Zhang, Hongfeng Li Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

[PDF] Using Decentralized Social Trust as an Alternative Way to Prove Someone’s Address

Suzana Mesquita de Borba Maranhao Moreno, Jean-Marc Seigneur
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences Icsess.
Published: 2022-10-21
From feed: TITLE("trust")) + IS Conference

The traditional way to prove someone’s address using formal documents like utility bills may not be feasible for some people, like those living in very poor neighborhoods, because they do not have these documents. In this paper, we propose an alternative way to prove someone’s address using a decentralized social trust solution. Because our design choices, this solution is able to work offline and does not need a logically centralized repository of all issued proof-of-address, in oppose to what would be achieved by using existing accretionary ID solutions. We validated this proposal by building a mobile application, using it in a real experiment in a Brazilian favela, and collecting mobile data. We also interviewed 20 people to complement our validation and help to guide the next steps of this work. The experiment showed that the solution is viable and easy to use. It is possible to adopt an approach like the one proposed to prove other facts, like gender, sex and income. These proofs may be used for different initiatives, like social programs, purpose-driven lending or other decentralized finance services.

Source | Open access

trust

[PDF] How the different explanation classes impact trust calibration: The case of clinical decision support systems

Mohammad Naiseh, Dena Al‐Thani, Nan Jiang, Raian Ali
International Journal of Human Computer Studies.
Published: 2022-10-07
From feed: trust calibration

Machine learning has made rapid advances in safety-critical applications, such as traffic control, finance, and healthcare. With the criticality of decisions they support and the potential consequences of following their recommendations, it also became critical to provide users with explanations to interpret machine learning models in general, and black-box models in particular. However, despite the agreement on explainability as a necessity, there is little evidence on how recent advances in eXplainable Artificial Intelligence literature (XAI) can be applied in collaborative decision-making tasks, i.e., human decision-maker and an AI system working together, to contribute to the process of trust calibration effectively. This research conducts an empirical study to evaluate four XAI classes for their impact on trust calibration. We take clinical decision support systems as a case study and adopt a within-subject design followed by semi-structured interviews. We gave participants clinical scenarios and XAI interfaces as a basis for decision-making and rating tasks. Our study involved 41 medical practitioners who use clinical decision support systems frequently. We found that users perceive the contribution of explanations to trust calibration differently according to the XAI class and to whether XAI interface design fits their job constraints and scope. We revealed additional requirements on how explanations shall be instantiated and designed to help a better trust calibration. Finally, we build on our findings and present guidelines for designing XAI interfaces.

Source | Open access

trust

[PDF] Trust Calibration as a Function of the Evolution of Uncertainty in Knowledge Generation: A Survey

Joshua Boley, Maoyuan Sun
arXiv.org.
Published: 2022-09-09
From feed: trust calibration

User trust is a crucial consideration in designing robust visual analytics systems that can guide users to reasonably sound conclusions despite inevitable biases and other uncertainties introduced by the human, the machine, and the data sources which paint the canvas upon which knowledge emerges. A multitude of factors emerge upon studied consideration which introduce considerable complexity and exacerbate our understanding of how trust relationships evolve in visual analytics systems, much as they do in intelligent sociotechnical systems. A visual analytics system, however, does not by its nature provoke exactly the same phenomena as its simpler cousins, nor are the phenomena necessarily of the same exact kind. Regardless, both application domains present the same root causes from which the need for trustworthiness arises: Uncertainty and the assumption of risk. In addition, visual analytics systems, even more than the intelligent systems which (traditionally) tend to be closed to direct human input and direction during processing, are influenced by a multitude of cognitive biases that further exacerbate an accounting of the uncertainties that may afflict the user's confidence, and ultimately trust in the system. In this article we argue that accounting for the propagation of uncertainty from data sources all the way through extraction of information and hypothesis testing is necessary to understand how user trust in a visual analytics system evolves over its lifecycle, and that the analyst's selection of visualization parameters affords us a simple means to capture the interactions between uncertainty and cognitive bias as a function of the attributes of the search tasks the analyst executes while evaluating explanations. We sample a broad cross-section of the literature from visual analytics, human cognitive theory, and uncertainty, and attempt to synthesize a useful perspective.

Source | Open access

trust

[PDF] Conversational Agents Trust Calibration

Mateusz Dubiel, Sylvain Daronnat, Luis A. Leiva
ACM International Conference Proceeding Series.
Published: 2022-07-26
From feed: trust calibration

Previous work identified trust as one of the key requirements for adoption and continued use of conversational agents (CAs). Given recent advances in natural language processing and deep learning, it is currently possible to execute simple goal-oriented tasks by using voice. As CAs start to provide a gateway for purchasing products and booking services online, the question of trust and its impact on users’ reliance and agency becomes ever-more pertinent. This paper collates trust-related literature and proposes four design suggestions that are illustrated through example conversations. Our goal is to encourage discussion on ethical design practices to develop CAs that are capable of employing trust-calibration techniques that should, when relevant, reduce the user’s trust in the agent. We hope that our reflections, based on the synthesis of insights from the fields of human-agent interaction, explainable ai, and information retrieval, can serve as a reminder of the dangers of excessive trust in automation and contribute to more user-centred CA design.

Source | Open access

trust

Human-agent teaming and trust calibration: a theoretical framework, configurable testbed, empirical illustration, and implications for the development of adaptive systems

Philip Bobko, Leanne Hirshfield, Lucca Eloy, Cara Spencer, Emily Doherty, Jack Driscoll, Hannah Obolsky
Theoretical Issues in Ergonomics Science
Published: 2022-06-25
From feed: trust calibration

Given new technologies and algorithmic capabilities, human-agent teaming (HAT) is expected to dominate environments where complex problems are solved by heterogenous teams. In such teams, trust calibration is key; i.e. humans and agents working symbiotically, with humans trusting and relying on agents as appropriate. In this paper, we focus on understanding trust-calibration in HATs. We propose a theoretical framework of calibrated trust in HATs. Next, we provide a configurable testbed designed to investigate calibrated trust in HATs. To demonstrate the flexible testbed and our framework, we conduct a study investigating hypotheses about agent transparency and reliability. Results align with research to date, supporting the notion that transparency results in calibrated trust. Further, high transparency yielded more positive affect and lower workload than low transparency. We also found that increased agent reliability resulted in higher trust in the agent, as well as more positive valence. This suggests that participants experienced more engagement with the task when the agent was reliable and presumably trustworthy. We also build on our framework and testbed to outline a research agenda for the assessment of human trust dynamics in HATs and the development of subsequent real-time, intelligent adaptive systems.

Source

trust

Trust enhancement issues in program repair

Yannic Noller, Ridwan Shariffdeen, Xiang Gao, Abhik Roychoudhury
Proceedings International Conference on Software Engineering
Published: 2022-05-21
From feed: TITLE("trust")) + IS Conference

Automated program repair is an emerging technology that seeks to automatically rectify bugs and vulnerabilities using learning, search, and semantic analysis. Trust in automatically generated patches is necessary for achieving greater adoption of program repair. Towards this goal, we survey more than 100 software practitioners to understand the artifacts and setups needed to enhance trust in automatically generated patches. Based on the feedback from the survey on developer preferences, we quantitatively evaluate existing test-suite based program repair tools. We find that they cannot produce high-quality patches within a top-10 ranking and an acceptable time period of 1 hour. The developer feedback from our qualitative study and the observations from our quantitative examination of existing repair tools point to actionable insights to drive program repair research. Specifically, we note that producing repairs within an acceptable time-bound is very much dependent on leveraging an abstract search space representation of a rich enough search space. Moreover, while additional developer inputs are valuable for generating or ranking patches, developers do not seem to be interested in a significant human-in-the-loop interaction.

Source

trust

[PDF] Tell Me Something That Will Help Me Trust You: A Survey of Trust Calibration in Human-Agent Interaction

George Cancro, Shimei Pan, James R. Foulds
arXiv.org.
Published: 2022-05-06
From feed: trust calibration

When a human receives a prediction or recommended course of action from an intelligent agent, what additional information, beyond the prediction or recommendation itself, does the human require from the agent to decide whether to trust or reject the prediction or recommendation? In this paper we survey literature in the area of trust between a single human supervisor and a single agent subordinate to determine the nature and extent of this additional information and to characterize it into a taxonomy that can be leveraged by future researchers and intelligent agent practitioners. By examining this question from a human-centered, information-focused point of view, we can begin to compare and contrast different implementations and also provide insight and directions for future work.

Source | Open access

trust

In Rust We Trust – A Transpiler from Unsafe C to Safer Rust

Michael Ling, Yijun Yu, Haitao Wu, Yuan Wang, James R. Cordy, Ahmed E. Hassan
Proceedings International Conference on Software Engineering
Published: 2022-05-01
From feed: TITLE("trust")) + IS Conference

Rust is a type-safe system programming language with a compiler checking memory and concurrency safety. For a smooth transition from existing C projects, a source-to-source transpiler can auto-transform C programs into Rust using program transformation. However, existing C-to-Rust transformation tools (e.g. the open-source C2Rust transpiler 1 project) have the drawback of preserving the unsafe semantics of C, while rewriting them in Rust’s syntax. The work by Emre et el. [2] acknowledged these drawbacks, and used rustc compiler feedback to refactor one certain type of raw pointers to Rust references to improve overall safety and idiomaticness of C2Rust output. Focusing on improving API-safeness (i.e. lowering unsafe keyword usage in function signatures), we apply source-to-source transformation technique to auto-refactor C2Rust output using code structure pattern matching and transformation, which does not rely on rustc compiler feedback. And by relaxing the semantics-preserving constraints of transformations, we present CRustS 2 a fully-automated source-to-source transformation approach that increases the ratio of the transformed code passing the safety checks of the rustc compiler. Our method uses 220 new TXL [1] source-to-source transformation rules, of which 198 are strictly semantics-preserving and 22 are semantics-approximating, thus reducing the scope of unsafe expressions and exposing more opportunities for safe Rust refactoring. Our method has been evaluated on both open-source and commercial C projects, and demonstrates significantly higher safe code ratios after the transformations, with function-level safe code ratios comparable to the average level of idiomatic Rust projects.

Source

trust

Detecting Human Trust Calibration in Automation: A Convolutional Neural Network Approach

Sanghyun Choo, Chang S. Nam
IEEE Transactions on Human Machine Systems
Published: 2022-01-20
From feed: trust calibration

There is a general lack of studies that are aimed at monitoring and detecting an operator's trust calibration, even though detecting someone's adjusted trust towards automation is essential to prevent misuse and disuse of automation. The goal of this article is to propose a convolutional neural network (CNN) based framework to estimate operators’ trust levels and detect their trust calibration in automation using image features of electroencephalogram (EEG) signals preserving temporal, spectral, and spatial information. Thirteen participants performed a set of automated Air Force multiattribute task battery tasks that differed in reliability (High/Low) and credibility (High/Low) levels. The proposed framework was compared with three machine learning methods—naïve bayes, support vector machine, multilayer perceptron—in terms of accuracy, sensitivity, and specificity of trust estimation and detection of trust calibration. Results of this article showed that the proposed framework had the highest performance of both trust estimation and detection of trust calibration in automation compared to the other comparison methods. This indicates that the proposed framework using the CNN classifier with the image-based EEG features could be an applicable model for estimating multilevel trust and detecting trust calibration during human-automation interaction. Also, it can help to prevent disuse and misuse of automation by estimating operators’ trust levels and monitoring their trust calibration in automation.

Source

trust

Construction of Interface Evaluation System in Internet-Connected Vehicle Oriented to Automation Trust Calibration

Yihang Du, Niu Ke, Chao Sun
Smart Innovation Systems and Technologies
Published: 2022-01-01
From feed: trust calibration

written by Yihang Du, Niu Ke, Chao Sun Published by Smart Innovation Systems and Technologies

Source

trust

TRQP: Trust-Aware Real-Time QoS Prediction Framework Using Graph-Based Learning

Suraj Kumar, Soumi Chattopadhyay
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2022-01-01
From feed: TITLE("trust")) + IS Conference

written by Suraj Kumar, Soumi Chattopadhyay Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

[PDF] Enhancing Trust in Trust Services: Towards an Intelligent Human-input-based Blockchain Oracle (IHiBO)

Liuwen Yu, Mirko Zichichi, Réka Markovich, Amro Najjar
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2022-01-01
From feed: TITLE("trust")) + IS Conference

As their name suggests, trust is of crucial importance in ‘‘trust service". Nevertheless, in many cases, these services suffer from a lack transparency, documentation, traceability, and inclusive multi-lateral decision-making mechanisms. To overcome these challenges, in this paper we propose an integrated framework which incorporates formal argumentation and negotiation within a blockchain environment to make the decision-making processes of fund management transparent and traceable. We introduce three possible architectures and we evaluate and compare them considering different technical, financial, and legal aspects.

Source | Open access

trust

[PDF] Assessing Trust in Online Collaboration in E-government during the COVID-19 pandemic: An Employee Perspective

Wankun Gong, Ying Bao
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2022-01-01
From feed: TITLE("trust")) + IS Conference

Due to the outbreak of the COVID-19 pandemic, firms and institutions have to shift to work from home to prevent the spreading of the pandemic. As a public sector, employees in government institutions also collaborate online during the lockdown. Collaboration online has been identified as a challenge for employees. While our understanding of how employees’ perception and trust of the e-government is still limited. To address this research gap, this study intends to investigate the antecedents of employees’ trust in e-government during their work process in the new normal. By conducting a qualitative study with 14 in-depth interviews with employees with e-government experience during the COVID-19 pandemic, we extracted several key antecedents of employees’ trust in e-government. Based on the qualitative data analysis, a theoretical model of trust antecedents was proposed. Our study provides a deep understanding of the specific antecedents of employees’ trust in the e-government context.

Source | Open access

trust

[PDF] Triple Bottom Line: Exploratory Data Analysis of Lodging Real Estate Investment Trusts

Paper Hartman
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2022-01-01
From feed: TITLE("trust")) + IS Conference

Popular frameworks for firm efficiency were developed 40+ years ago by educated, Western businessmen. The world is different now and needs to be analyzed through modern lenses to address complex and evolving business challenges. Students learn how firms can become profitable, however, modern curriculum still does not address why. Corporate Social Responsibility (CSR) created space to better People, Planet, and Profit in topline decision-making, however CSR has become an echo chamber. This research aims to provide a purpose for profit by asking what popular focuses are in an industry, how they differ among firms, and how this research might be used for the benefit of all stakeholders. Firms can use this analysis for decision-making to innovate allocation of resources, educational deployment, and investment in infrastructure to better serve the purpose of profit; external stakeholders can use this analysis to explore industry-wide policy gaps and create tailored solutions for societal needs.

Source | Open access

trust

[PDF] Match or Mismatch? How Matching Personality and Gender between Voice Assistants and Users Affects Trust in Voice Commerce

Fabian Reinkemeier, Ulrich Gnewuch
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2022-01-01
From feed: TITLE("trust")) + IS Conference

Despite the ubiquity of voice assistants (VAs), they see limited adoption in the form of voice commerce, an online sales channel using natural language. A key barrier to the widespread use of voice commerce is the lack of user trust. To address this problem, we draw on similarity-attraction theory to investigate how trust is affected when VAs match the user’s personality and gender. We conducted a scenario-based experiment (N = 380) with four VAs designed to have different personalities and genders by customizing only the auditory cues in their voices. The results indicate that a personality match increases trust, while the effect of a gender match on trust is non-significant. Our findings contribute to research by demonstrating that some types of matches between VAs and users are more effective than others. Moreover, we reveal that it is important for practitioners to consider auditory cues when designing VAs for voice commerce.

Source | Open access

trust

[PDF] The Impact of Trust in Technology on the Appraisal of Technostress Creators in a Work-Related Context

Julia Theresia Zielonka
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2022-01-01
From feed: TITLE("trust")) + IS Conference

Research in technostress examines how and why the use of information and communication technologies causes individuals to experience an imbalance between demands and the ability to meet them. In this paper, the impact of system-like trust and human-like trust on the appraisal of technostress creators in a work-related setting is examined. In order to test the propositions, data on trust, technostress creators, the perception of distress and eustress, and job satisfaction were collected in a web-based survey from 210 employees. Structural equation modeling was performed for data analysis. The results confirm that both, system-like trust and human-like trust, significantly affect the appraisal of technostress creators. In particular, the higher the trust in technology is, the less harmful technostress creators are perceived, which positively impacts job satisfaction.

Source | Open access

trust

Two Routes to Trust Calibration

Johannes Kraus, Yannick Forster, Sebastian Hergeth, Martin Baumann
Research Anthology on Recent Trends Tools and Implications of Computer Programming
Published: 2021-10-29
From feed: trust calibration

Trust calibration takes place prior to and during system interaction along the available information. In an online study N = 519 participants were introduced to a conditionally automated driving (CAD) system and received different a priori information about the automation's reliability (low vs high) and brand of the CAD system (below average vs average vs above average reputation). Trust was measured three times during the study. Additionally, need for cognition (NFC) and other personality traits were assessed. Both heuristic brand information and reliability information influenced trust in automation. In line with the Elaboration Likelihood Model (ELM), participants with high NFC relied on the reliability information more than those with lower NFC. In terms of personality traits, materialism, the regulatory focus and the perfect automation scheme predicted trust in automation. These findings show that a priori information can influence a driver's trust in CAD and that such information is interpreted individually.

Source

trust

[PDF] Trust Calibration and Trust Respect: A Method for Building Team Cohesion\n in Human Robot Teams

Russell Perkins, Zahra Rezaei Khavas, Paul Robinette
arXiv.org.
Published: 2021-10-13
From feed: trust calibration

Recent advances in the areas of human-robot interaction (HRI) and robot\nautonomy are changing the world. Today robots are used in a variety of\napplications. People and robots work together in human autonomous teams (HATs)\nto accomplish tasks that, separately, cannot be easily accomplished. Trust\nbetween robots and humans in HATs is vital to task completion and effective\nteam cohesion. For optimal performance and safety of human operators in HRI,\nhuman trust should be adjusted to the actual performance and reliability of the\nrobotic system. The cost of poor trust calibration in HRI, is at a minimum, low\nperformance, and at higher levels it causes human injury or critical task\nfailures. While the role of trust calibration is vital to team cohesion it is\nalso important for a robot to be able to assess whether or not a human is\nexhibiting signs of mistrust due to some other factor such as anger,\ndistraction or frustration. In these situations the robot chooses not to\ncalibrate trust, instead the robot chooses to respect trust. The decision to\nrespect trust is determined by the robots knowledge of whether or not a human\nshould trust the robot based on its actions(successes and failures) and its\nfeedback to the human. We show that the feedback in the form of trust\ncalibration cues(TCCs) can effectively change the trust level in humans. This\ninformation is potentially useful in aiding a robot it its decision to respect\ntrust.\n

Source | Open access

trust

The Impact of Training on Human–Autonomy Team Communications and Trust Calibration

Craig J. Johnson, Mustafa Demir, Nathan J. McNeese, Jamie C. Gorman, Alexandra Wolff, Nancy J. Cooke
Human Factors
Published: 2021-10-01
From feed: trust calibration

Team training that includes an autonomous agent that models effective information exchange may positively impact team communication and coordination. Training that emphasizes the limitations of an autonomous agent may help calibrate trust.

Source

trust

Incorporating Trust into Collaborative Social Computing Applications

Paula Muñoz, Alejandro Pérez-Vereda, Nathalie Moreno, Javier Troya, Antonio Vallecillo
Proceedings 2021 IEEE 25th International Enterprise Distributed Object Computing Conference Edoc 2021
Published: 2021-10-01
From feed: TITLE("trust")) + IS Conference

Mobile-based collaborative social computing applications represent an alternative to the server-centric models currently offered by major IT vendors, where users own the information they generate and take control over how other users access and exploit it. In this context, trust is fundamental for sharing information and making decisions based on the data collected from other users. This work develops a trust management system embedded in the Digital Avatars framework for collaborative social computing applications, using Subjective logic. It enables explicit representation and operation with trust information about both service providers (functional trust) and other users’ opinions about these providers (referral trust) in peer-to-peer environments. The proposal is specified using high- level models that can also be simulated and validated, and serve as a guide for the corresponding implementations in an existing social computing application platform. The proposed solution has been successfully applied in a collaborative carpooling system, where users need to trust other users with whom they share travels.

Source

trust

Values of privacy and trust for monitoring health in injecting drug users

Carolyn Kavita Tauro
Proceedings IEEE International Enterprise Distributed Object Computing Workshop Edocw
Published: 2021-10-01
From feed: TITLE("trust")) + IS Conference

Health information systems are moving rapidly from aggregate manual to digital individualised ones. While beneficial for a more continued care across a person’s lifespan and despite guidelines and policies, concerns regarding privacy and trust exist. Much has to do with existing social structures that affect the way technology functions. The study adopts the tripartite methodology of Value Sensitive Design in the context of injecting drug users seeking HIV care under the national health program to demonstrate the need to expand value system design. Privacy and Trust are identified as essential human values vital for both indirect and direct stakeholders of technology.

Source

trust

[PDF] Explainable recommendation: when design meets trust calibration

Mohammad Naiseh, Dena Al‐Thani, Nan Jiang, Raian Ali
World Wide Web.
Published: 2021-08-02
From feed: trust calibration

Human-AI collaborative decision-making tools are being increasingly applied in critical domains such as healthcare. However, these tools are often seen as closed and intransparent for human decision-makers. An essential requirement for their success is the ability to provide explanations about themselves that are understandable and meaningful to the users. While explanations generally have positive connotations, studies showed that the assumption behind users interacting and engaging with these explanations could introduce trust calibration errors such as facilitating irrational or less thoughtful agreement or disagreement with the AI recommendation. In this paper, we explore how to help trust calibration through explanation interaction design. Our research method included two main phases. We first conducted a think-aloud study with 16 participants aiming to reveal main trust calibration errors concerning explainability in AI-Human collaborative decision-making tools. Then, we conducted two co-design sessions with eight participants to identify design principles and techniques for explanations that help trust calibration. As a conclusion of our research, we provide five design principles: Design for engagement, challenging habitual actions, attention guidance, friction and support training and learning. Our findings are meant to pave the way towards a more integrated framework for designing explanations with trust calibration as a primary goal.

Source | Open access

trust

[PDF] How can design help enhance trust calibration in public autonomous vehicles?

Yuri Klebanov, Romi Mikulinsky, Tom Reznikov, Miles Pennington, Yoshihiro SUDA, Toshihiro Hiraoka, Shoichi Kanzaki
arXiv.org.
Published: 2021-06-30
From feed: trust calibration

Trust is a multilayered concept with critical relevance when it comes to introducing new technologies. Understanding how humans will interact with complex vehicle systems and preparing for the functional, societal and psychological aspects of autonomous vehicles' entry into our cities is a pressing concern. Design tools can help calibrate the adequate and affordable level of trust needed for a safe and positive experience. This study focuses on passenger interactions capable of enhancing the system trustworthiness and data accuracy in future shared public transportation.

Source | Open access

trust

Calibrating Pedestrians' Trust in Automated Vehicles

Stefanie M. Faas, Johannes Kraus, Alexander Schoenhals, Martin Baumann
Conference on Human Factors in Computing Systems Proceedings
Published: 2021-05-06
From feed: trust calibration

Policymakers recommend that automated vehicles (AVs) display their automated driving status using an external human-machine interface (eHMI). However, previous studies suggest that a status eHMI is associated with overtrust, which might be overcome by an additional yielding intent message. We conducted a video-based laboratory study (N = 67) to investigate pedestrians’ trust and crossing behavior in repeated encounters with AVs. In a 2x2 between-subjects design, we investigated (1) the occurrence of a malfunction (AV failing to yield) and (2) system transparency (status eHMI vs. status+intent eHMI). Results show that during initial encounters, trust gradually increases and crossing onset time decreases. After a malfunction, trust declines but recovers quickly. In the status eHMI group, trust was reduced more, and participants showed 7.3 times higher odds of colliding with the AV as compared to the status+intent group. We conclude that a status eHMI can cause pedestrians to overtrust AVs and advocate additional intent messages.

Source

trust

[PDF] Blockchain-based root of trust management in security credential management system for vehicular communications

Arijet Sarker, SangHyun Byun, Wenjun Fan, Sang‐Yoon Chang
Proceedings of the ACM Symposium on Applied Computing.
Published: 2021-03-22
From feed: TITLE("trust")) + IS Conference

Security Credential Management System (SCMS) provides the Public Key Infrastructure (PKI) for vehicular networking. SCMS builds the state-of-the-art distributed PKI to protect the vehicular networking privacy against an honest-but-curious authority (by the use of multiple PKI authorities) and to decentralize the PKI root of trust (by the Elector-Based Root Management or EBRM, having the distributed electors manage the Root Certificate Authority or RCA). We build on the EBRM architecture and construct a Blockchain-Based Root Management (BBRM) to provide even greater decentralization and security. More specifically, BBRM uses blockchain to i) replace the existing RCA and have the electors directly involved in the root certificate generation, ii) control the elector network membership including elector addition and revocation, and iii) provide greater accountability and transparency on the aforementioned functionalities. We implement BBRM on Hyperledger Fabric using smart contract for system experimentation and analyses. Our experiments show that BBRM is lightweight in processing, efficient in ledger size, and supports a bandwidth of multiple transactions per second. Our results show that the BBRM blockchain is appropriate for the root certificate generation and the elector membership control for EBRM within SCMS, which are significantly smaller in number and occurrences than the SCMS outputs of vehicle certificates. We also experiment to analyze how the BBRM distributed consensus protocol parameters, such as the number of electors and the number of required votes, affect the overall scheme's performances.

Source | Open access

trust

[PDF] Trust assessment in 32 KiB of RAM

Matthew Bradbury, Arshad Jhumka, Tim Watson
Proceedings of the ACM Symposium on Applied Computing.
Published: 2021-03-22
From feed: TITLE("trust")) + IS Conference

There is an increasing demand for Internet of Things (IoT) systems comprised of resource-constrained sensor and actuator nodes executing increasingly complex applications, possibly simultaneously. IoT devices will not be able to execute computationally expensive tasks and will require more powerful computing nodes, called edge nodes, for such execution, in a process called computation offloading. When multiple powerful nodes are available, a selection problem arises: which edge node should a task be submitted to? This problem is even more acute when the system is subjected to attacks, such as DoS, or network perturbations such as system overload. In this paper, we present a trust model-based system architecture for computation offloading, based on behavioural evidence. The system architecture provides confidentiality, authentication and non-repudiation of messages in required scenarios and will operate within the resource constraints of embedded IoT nodes. We demonstrate the viability of the architecture with an example deployment of Beta Reputation System trust model on real hardware.

Source | Open access

trust

Evaluating feedback requirements for trust calibration in automated vehicles

Philipp Wintersberger, Frederica Janotta, Jakob Peintner, Andreas Löcken, Andreas Riener
IT Information Technology
Published: 2021-01-16
From feed: trust calibration

Abstract The inappropriate use of automation as a result of trust issues is a major barrier for a broad market penetration of automated vehicles. Studies so far have shown that providing information about the vehicle’s actions and intentions can be used to calibrate trust and promote user acceptance. However, how such feedback could be designed optimally is still an open question. This article presents the results of two user studies. In the first study, we investigated subjective trust and user experience of (N=21) participants driving in a fully automated vehicle, which interacts with other traffic participants in virtual reality. The analysis of questionnaires and semi-structured interviews shows that participants request feedback about the vehicle’s status and intentions and prefer visual feedback over other modalities. Consequently, we conducted a second study to derive concrete requirements for future feedback systems. We showed (N=56) participants various videos of an automated vehicle from the ego perspective and asked them to select elements in the environment they want feedback about so that they would feel safe, trust the vehicle, and understand its actions. The results confirm a correlation between subjective user trust and feedback needs and highlight essential requirements for automatic feedback generation. The results of both experiments provide a scientific basis for designing more adaptive and personalized in-vehicle interfaces for automated driving.

Source

trust

TAP: A Two-Level Trust and Personality-Aware Recommender System

Shahpar Yakhchi, Seyed Mohssen Ghafari, Mehmet A. Orgun
Lecture Notes in Computer Science
Published: 2021-01-01
From feed: TITLE("trust")) + IS Conference

written by Shahpar Yakhchi, Seyed Mohssen Ghafari, Mehmet A. Orgun Published by Lecture Notes in Computer Science

Source

trust

[PDF] TrustSECO: A Distributed Infrastructure for Providing Trust in the Software Ecosystem

Fang Hou, Siamak Farshidi, Slinger Jansen
Lecture Notes in Business Information Processing.
Published: 2021-01-01
From feed: TITLE("trust")) + IS Conference

written by Fang Hou, Siamak Farshidi, Slinger Jansen Published by Lecture Notes in Business Information Processing.

Source | Open access

trust

[PDF] The Responsible Innovation Framework: A Framework for Integrating Trust and Delight into Technology Innovation

Alka Roy
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2021-01-01
From feed: TITLE("trust")) + IS Conference

Although systematic biases in our intelligent systems and lack of privacy, equity, and ethical and trust considerations have entered AI and technology debate, we are still lacking a common practice-based framework for innovation that puts social well-being if not ahead at least on par with growing profits. And it has come at a cost that includes public trust. This paper introduces The Responsible Innovation Framework. This framework is intended for product and technology practitioners rather than relegating the responsibility only to compliance officers, risk assessors, privacy advocates, or ethicists. The paper 1) makes a case for using a common framework starting from ideation and vision stage 2) describes the “essential” components of the framework: stakeholders, value sets, and influencers 3) provides examples of how value sets could be leveraged in a flexible and iterative way for AI or Non-AI technology, and 4) lays out the need for additional work and case studies. The goal of the framework is to bring social considerations an essential part of technology decision making.

Source | Open access

trust

[PDF] Between Anthropomorphism, Trust, and the Uncanny Valley: a Dual-Processing Perspective on Perceived Trustworthiness and Its Mediating Effects on Use Intentions of Social Robots

Anika Nissen, Katharina Jahn
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2021-01-01
From feed: TITLE("trust")) + IS Conference

Designing social robots with the aim to increase their acceptance is crucial for the success of their implementation. However, even though increasing anthropomorphism is often seen as a promising way to achieve this goal, the uncanny valley effect proposes that anthropomorphism can be detrimental to acceptance unless robots are almost indistinguishable from humans. Against this background, we use a dual processing theory approach to investigate whether an uncanny valley of perceived trustworthiness (PT) can be observed for social robots and how this effect differs between the intuitive and deliberate reasoning system. The results of an experiment with four conditions and 227 participants provide support for the uncanny valley effect. Furthermore, mediation analyses suggested that use intention decreases through both reduced intuitive and deliberate PT for medium levels of anthropomorphism. However, for high levels of anthropomorphism (indistinguishable from real human), only intuitive PT determined use intention. Consequently, our results indicate both advantages and pitfalls of anthropomorphic design.

Source | Open access

trust

An explanation is not an excuse: Trust calibration in an age of transparent robots

Alan R. Wagner, Paul Robinette
Trust in Human Robot Interaction
Published: 2020-12-16
From feed: trust calibration

written by Alan R. Wagner, Paul Robinette Published by Trust in Human Robot Interaction

Source

trust

The Impact of Team Training On Coordination And Trust Calibration In Human–Autonomy Teaming

Craig J. Johnson, Mustafa Demir, Alexandra Wolff, Nancy J. Cooke
Proceedings of the Human Factors and Ergonomics Society
Published: 2020-12-01
From feed: trust calibration

written by Craig J. Johnson, Mustafa Demir, Alexandra Wolff, Nancy J. Cooke Published by Proceedings of the Human Factors and Ergonomics Society

Source

trust

Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools

Yan Chen, Fatemeh Zahedi, Ahmed Abbasi, David G. Dobolyi
Information and Management
Published: 2020-11-25
From feed: trust calibration

written by Yan Chen, Fatemeh Zahedi, Ahmed Abbasi, David G. Dobolyi Published by Information and Management

Source

trust

[PDF] Toward Adaptive Trust Calibration for Level 2 Driving Automation

Kumar Akash, Neera Jain, Teruhisa Misu
Icmi 2020 Proceedings of the 2020 International Conference on Multimodal Interaction.
Published: 2020-10-21
From feed: trust calibration

Properly calibrated human trust is essential for successful interaction between humans and automation. However, while human trust calibration can be improved by increased automation transparency, too much transparency can overwhelm human workload. To address this tradeoff, we present a probabilistic framework using a partially observable Markov decision process (POMDP) for modeling the coupled trust-workload dynamics of human behavior in an action-automation context. We specifically consider hands-off Level 2 driving automation in a city environment involving multiple intersections where the human chooses whether or not to rely on the automation. We consider automation reliability, automation transparency, and scene complexity, along with human reliance and eye-gaze behavior, to model the dynamics of human trust and workload. We demonstrate that our model framework can appropriately vary automation transparency based on real-time human trust and workload belief estimates to achieve trust calibration.

Source | Open access

trust

[PDF] Toward Adaptive Trust Calibration for Level 2 Driving Automation

Kumar Akash, Neera Jain, Teruhisa Misu
Icmi 2020 Proceedings of the 2020 International Conference on Multimodal Interaction.
Published: 2020-10-21
From feed: trust calibration

Properly calibrated human trust is essential for successful interaction between humans and automation. However, while human trust calibration can be improved by increased automation transparency, too much transparency can overwhelm human workload. To address this tradeoff, we present a probabilistic framework using a partially observable Markov decision process (POMDP) for modeling the coupled trust-workload dynamics of human behavior in an action-automation context. We specifically consider hands-off Level 2 driving automation in a city environment involving multiple intersections where the human chooses whether or not to rely on the automation. We consider automation reliability, automation transparency, and scene complexity, along with human reliance and eye-gaze behavior, to model the dynamics of human trust and workload. We demonstrate that our model framework can appropriately vary automation transparency based on real-time human trust and workload belief estimates to achieve trust calibration.

Source | Open access

trust

[PDF] Rapid Trust Calibration through Interpretable and Uncertainty-Aware AI

Richard Tomsett, Alun Preece, Dave Braines, Federico Cerutti, Supriyo Chakraborty, Mani Srivastava, Gavin Pearson, Lance Kaplan
Patterns.
Published: 2020-07-01
From feed: trust calibration

Artificial intelligence (AI) systems hold great promise as decision-support tools, but we must be able to identify and understand their inevitable mistakes if they are to fulfill this potential. This is particularly true in domains where the decisions are high-stakes, such as law, medicine, and the military. In this Perspective, we describe the particular challenges for AI decision support posed in military coalition operations. These include having to deal with limited, low-quality data, which inevitably compromises AI performance. We suggest that these problems can be mitigated by taking steps that allow rapid trust calibration so that decision makers understand the AI system's limitations and likely failures and can calibrate their trust in its outputs appropriately. We propose that AI services can achieve this by being both interpretable and uncertainty-aware. Creating such AI systems poses various technical and human factors challenges. We review these challenges and recommend directions for future research.

PDF | Source | Open access

trust

Increasing the Trust In Refactoring Through Visualization

Alex Bogart, Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, Ali Ouni
Proceedings 2020 IEEE ACM 42nd International Conference on Software Engineering Workshops Icsew 2020
Published: 2020-06-27
From feed: TITLE("trust")) + IS Conference

In software development, maintaining good design is essential. The process of refactoring enables developers to improve this design during development without altering the program's existing behavior. However, this process can be time-consuming, introduce semantic errors, and be difficult for developers inexperienced with refactoring or unfamiliar with a given code base. Automated refactoring tools can help not only by applying these changes, but by identifying opportunities for refactoring. Yet, developers have not been quick to adopt these tools due to a lack of trust between the developer and the tool. We propose an approach in the form of a visualization to aid developers in understanding these suggested operations and increasing familiarity with automated refactoring tools. We also provide a manual validation of this approach and identify options to continue experimentation.

Source

trust

Building trust in the untrustable

Emilia Cioroaica, Barbora Bühnová, Thomas Kühn, Daniel Schneider
Proceedings International Conference on Software Engineering
Published: 2020-06-27
From feed: TITLE("trust")) + IS Conference

Trust is a major aspect in the relationship between humans and autonomous safety-critical systems, such as autonomous vehicles. Although human errors may cause higher risks, failures of autonomous systems are more strongly perceived by the general population, which hinders the adoption of autonomous safety-critical systems. It is therefore necessary to devise approaches for systematically building trust in autonomous functions and thereby facilitate the adoption process. In this paper, we introduce a method and a framework for incrementally building trust in the context of autonomous driving. Within the envisioned solution, we employ the psychological narrative behind trust building through the formation of new habits and introduce a method where trust is established gradually for both the human and the autonomous safety-critical system via reputation building and step-by-step integration of smart software agents replacing human actions.

Source

trust

[PDF] Designing for Trust: A Behavioral Framework for Sharing Economy Platforms

Natã M. Barbosa, Emily Sun, Judd Antin, Paolo Parigi
Web Conference 2020 Proceedings of the World Wide Web Conference Www 2020.
Published: 2020-04-20
From feed: TITLE("trust")) + IS Conference

Trust is a fundamental prerequisite in the growth and sustainability of sharing economy platforms. Many of such platforms rely on actions that require trust to take place, such as entering a stranger’s car or sleeping at a stranger’s place. For this reason, understanding, measuring, and tracking trust can be of great benefit to such platforms, enabling them to identify trust behaviors, both online and offline, and identify groups which may benefit from trust-building interventions. In this work, we present the design and evaluation of a behavioral framework to measure a user’s propensity to trust others on Airbnb. We conducted an online experiment with 4,499 Airbnb users in the form of an investment game in order to capture users’ propensity to trust other users on Airbnb. Then, we used the experimental data to generate both explanatory and predictive models of trust propensity. Our contribution is a framework that can be used to measure trust propensity in sharing economy platforms via online and offline signals. We discuss which affordances need to be in place so that sharing economy platforms can get signals of trust, in addition to how such a framework can be used to inform design around trust in the short and long term.

Source | Open access

trust

[PDF] Adaptive trust calibration for human-AI collaboration

Kazuo Okamura, Seiji Yamada
Plos One.
Published: 2020-02-21
From feed: trust calibration

Safety and efficiency of human-AI collaboration often depend on how humans could appropriately calibrate their trust towards the AI agents. Over-trusting the autonomous system sometimes causes serious safety issues. Although many studies focused on the importance of system transparency in keeping proper trust calibration, the research in detecting and mitigating improper trust calibration remains very limited. To fill these research gaps, we propose a method of adaptive trust calibration that consists of a framework for detecting the inappropriate calibration status by monitoring the user's reliance behavior and cognitive cues called "trust calibration cues" to prompt the user to reinitiate trust calibration. We evaluated our framework and four types of trust calibration cues in an online experiment using a drone simulator. A total of 116 participants performed pothole inspection tasks by using the drone's automatic inspection, the reliability of which could fluctuate depending upon the weather conditions. The participants needed to decide whether to rely on automatic inspection or to do the inspection manually. The results showed that adaptively presenting simple cues could significantly promote trust calibration during over-trust.

Source | Open access

trust

[PDF] Effect of confidence and explanation on accuracy and trust calibration in AI-assisted decision making

Yunfeng Zhang, Q. Vera Liao, Rachel K. E. Bellamy
Fat 2020 Proceedings of the 2020 Conference on Fairness Accountability and Transparency.
Published: 2020-01-22
From feed: trust calibration

Today, AI is being increasingly used to help human experts make decisions in high-stakes scenarios. In these scenarios, full automation is often undesirable, not only due to the significance of the outcome, but also because human experts can draw on their domain knowledge complementary to the model's to ensure task success. We refer to these scenarios as AI-assisted decision making, where the individual strengths of the human and the AI come together to optimize the joint decision outcome. A key to their success is to appropriately calibrate human trust in the AI on a case-by-case basis; knowing when to trust or distrust the AI allows the human expert to appropriately apply their knowledge, improving decision outcomes in cases where the model is likely to perform poorly. This research conducts a case study of AI-assisted decision making in which humans and AI have comparable performance alone, and explores whether features that reveal case-specific model information can calibrate trust and improve the joint performance of the human and AI. Specifically, we study the effect of showing confidence score and local explanation for a particular prediction. Through two human experiments, we show that confidence score can help calibrate people's trust in an AI model, but trust calibration alone is not sufficient to improve AI-assisted decision making, which may also depend on whether the human can bring in enough unique knowledge to complement the AI's errors. We also highlight the problems in using local explanation for AI-assisted decision making scenarios and invite the research community to explore new approaches to explainability for calibrating human trust in AI.

Source | Open access

trust

[PDF] Effect of confidence and explanation on accuracy and trust calibration in AI-assisted decision making

Yunfeng Zhang, Q. Vera Liao, Rachel K. E. Bellamy
Fat 2020 Proceedings of the 2020 Conference on Fairness Accountability and Transparency.
Published: 2020-01-22
From feed: trust calibration

Today, AI is being increasingly used to help human experts make decisions in high-stakes scenarios. In these scenarios, full automation is often undesirable, not only due to the significance of the outcome, but also because human experts can draw on their domain knowledge complementary to the model's to ensure task success. We refer to these scenarios as AI-assisted decision making, where the individual strengths of the human and the AI come together to optimize the joint decision outcome. A key to their success is to appropriately calibrate human trust in the AI on a case-by-case basis; knowing when to trust or distrust the AI allows the human expert to appropriately apply their knowledge, improving decision outcomes in cases where the model is likely to perform poorly. This research conducts a case study of AI-assisted decision making in which humans and AI have comparable performance alone, and explores whether features that reveal case-specific model information can calibrate trust and improve the joint performance of the human and AI. Specifically, we study the effect of showing confidence score and local explanation for a particular prediction. Through two human experiments, we show that confidence score can help calibrate people's trust in an AI model, but trust calibration alone is not sufficient to improve AI-assisted decision making, which may also depend on whether the human can bring in enough unique knowledge to complement the AI's errors. We also highlight the problems in using local explanation for AI-assisted decision making scenarios and invite the research community to explore new approaches to explainability for calibrating human trust in AI.

Source | Open access

trust

A Cooperative Trust Evaluation Scheme for Tactical Wireless Sensor Networks

Jihun Lim, Dooho Keum, Young‐Bae Ko
ACM International Conference Proceeding Series
Published: 2020-01-12
From feed: TITLE("trust")) + IS Conference

In this paper, we address an important issue of trust evaluation for tactical wireless sensor networks, where energy-hungry sensor nodes are deployed in harsh and hostile areas for the purpose of surveillance and reconnaissance. In particular, due to the limited resources of the node, it is of great importance to detect and isolate malicious nodes in an energy-efficient manner. Most of previous work adopt some proactive scanning method, requiring periodical exchange of control messages even in ordinary times and thus significant computational overhead for updating trust values per all nodes over the network. In order to provide more energy efficient evaluation method (while yet preventing any intelligent attacks such as selective forwarding and false positive problem attacks), we propose a novel cooperative trust evaluation scheme in which the initial trust level of nodes measured by on- demand trust rating approach is re-evaluated later on by a root or gateway node based on a pattern analysis. Through a preliminary simulation study using OPNET simulator, we compare our scheme to the existing work and prove that it can achieve the higher detection rate with much less energy consumption.

Source

trust

[PDF] Empirical Evaluations of Framework for Adaptive Trust Calibration in Human-AI Cooperation

Kazuo Okamura, Seiji Yamada
IEEE Access.
Published: 2020-01-01
From feed: trust calibration

Recent advances in AI technologies are dramatically changing the world and impacting our daily life. However, human users still essentially need to cooperate with AI systems to complete tasks as such technologies are never perfect. For optimal performance and safety in human-AI cooperation, human users must appropriately adjust their level of trust to the actual reliability of AI systems. Poorly calibrated trust can be a major cause of serious issues with safety and efficiency. Previous works on trust calibration have emphasized the importance of system transparency for avoiding trust miscalibration. Measuring and influencing trust are still challenging issues; consequently, not many studies have focused on how to detect improper trust calibration nor how to mitigate it. We approach these research challenges with a behavior-based approach to capture the status of calibration. A framework of adaptive trust calibration is proposed, including a formal definition of improper trust calibration called “a trust equation”. It involves cognitive cues called “trust calibration cues (TCCs)” and a conceptual entity called “trust calibration AI” (TCAI), which supervises the status of trust calibration. We conducted empirical evaluations using a simulated drone environment with two types of cooperative tasks: a visual search task and a real-time navigation task. We designed trust changing scenarios and evaluated our framework. The results demonstrated that adaptively presenting a TCC could promote trust calibration more effectively than a traditional system transparency approach.

Source | Open access

trust

The Role of Behavioral Anthropomorphism in Human-Automation Trust Calibration

Theodore Jensen, Mohammad Maifi Hasan Khan, Yusuf Albayram
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2020-01-01
From feed: trust calibration

written by Theodore Jensen, Mohammad Maifi Hasan Khan, Yusuf Albayram Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

Towards Multi-level Trust-Driven Data Integration in Multi-cloud Environments

Senda Romdhani
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2020-01-01
From feed: TITLE("trust")) + IS Conference

written by Senda Romdhani Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

A Trust Logic for the Varieties of Trust

Mirko Tagliaferri, Alessandro Aldini
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2020-01-01
From feed: TITLE("trust")) + IS Conference

written by Mirko Tagliaferri, Alessandro Aldini Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

How to Induce Trust in Medical AI Systems

Ulrich Reimer, Beat Tödtli, Edith Maier
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2020-01-01
From feed: TITLE("trust")) + IS Conference

written by Ulrich Reimer, Beat Tödtli, Edith Maier Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

Trust-Aware Curation of Linked Open Data Logs

Dihia Lanasri, Selma Khouri, Ladjel Bellatreche
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2020-01-01
From feed: TITLE("trust")) + IS Conference

written by Dihia Lanasri, Selma Khouri, Ladjel Bellatreche Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

[PDF] Same same but different? A Two-Foci perspective on trust in information systems

Söllner M.
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2020-01-01
From feed: TITLE("trust")) + IS Conference

written by Söllner M. Published by Proceedings of the Annual Hawaii International Conference on System Sciences

Source

trust

A Trust and Energy-Aware Double Deep Reinforcement Learning Scheduling Strategy for Federated Learning on IoT Devices

Gaith Rjoub, Omar Abdel Wahab, Jamal Bentahar, Ahmed Saleh Bataineh
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2020-01-01
From feed: TITLE("trust")) + IS Conference

written by Gaith Rjoub, Omar Abdel Wahab, Jamal Bentahar, Ahmed Saleh Bataineh Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

Towards a Theory of Longitudinal Trust Calibration in Human–Robot Teams

Ewart J. de Visser, Marieke Peeters, Malte Jung, Spencer Kohn, Tyler H. Shaw, Richard Pak, Mark A. Neerincx
International Journal of Social Robotics
Published: 2019-11-23
From feed: trust calibration

written by Ewart J. de Visser, Marieke Peeters, Malte Jung, Spencer Kohn, Tyler H. Shaw, Richard Pak, Mark A. Neerincx Published by International Journal of Social Robotics

Source

trust

[PDF] Feedback on system or operator performance: Which is more useful for the timely detection of changes in reliability, trust calibration and appropriate automation usage?

Yidu Lu, Nadine Sarter
Proceedings of the Human Factors and Ergonomics Society.
Published: 2019-11-01
From feed: trust calibration

Creating safe human-machine systems requires that operators can quickly notice changes in system reliability in the interest of trust calibration and proper automation usage. Operators’ readiness to trust a system is determined not only by the performance of the automation but also by their confidence in their own abilities. This study therefore compared the usefulness of feedback on the performance of either agent. The experiment required two groups of ten participants each to perform an automation-assisted target identification task with “Automation Performance Feedback” (APF) or “Operator Performance Feedback” (OPF). Four different scenarios differed with respect to the degree and duration of changes in system reliability. Findings indicate that APF was more effective for supporting timely adjustments of perceived system reliability, especially with large and long reliability changes. Subjective trust ratings and performance were not affected, however, suggesting that these two factors are closely linked and more relevant for automation reliance.

Source | Open access

trust

Detecting Human Trust Calibration in Automation: A Deep Learning Approach

Sanghyun Choo, Nathan Sanders, Nayoung Kim, Wonjoon Kim, Chang S. Nam, Edward Fitts
Proceedings of the Human Factors and Ergonomics Society
Published: 2019-11-01
From feed: trust calibration

written by Sanghyun Choo, Nathan Sanders, Nayoung Kim, Wonjoon Kim, Chang S. Nam, Edward Fitts Published by Proceedings of the Human Factors and Ergonomics Society

Source

trust

Two Routes to Trust Calibration

Johannes Kraus, Yannick Forster, Sebastian Hergeth, Martin Baumann
International Journal of Mobile Human Computer Interaction
Published: 2019-06-11
From feed: trust calibration

Trust calibration takes place prior to and during system interaction along the available information. In an online study N = 519 participants were introduced to a conditionally automated driving (CAD) system and received different a priori information about the automation's reliability (low vs high) and brand of the CAD system (below average vs average vs above average reputation). Trust was measured three times during the study. Additionally, need for cognition (NFC) and other personality traits were assessed. Both heuristic brand information and reliability information influenced trust in automation. In line with the Elaboration Likelihood Model (ELM), participants with high NFC relied on the reliability information more than those with lower NFC. In terms of personality traits, materialism, the regulatory focus and the perfect automation scheme predicted trust in automation. These findings show that a priori information can influence a driver's trust in CAD and that such information is interpreted individually.

Source

trust

[PDF] Trust Beyond Computation Alone: Human Aspects of Trust in Blockchain Technologies

Barnaby Craggs, Awais Rashid
Proceedings 2019 IEEE ACM 41st International Conference on Software Engineering Software Engineering in Society ICSE Seis 2019.
Published: 2019-05-01
From feed: TITLE("trust")) + IS Conference

Blockchains - with their inherent properties of transaction transparency, distributed consensus, immutability and cryptographic verifiability - are increasingly seen as a means to underpin innovative products and services in a range of sectors from finance through to energy and healthcare. Discussions, too often, make assertions that the trustless nature of blockchain technologies enables and actively promotes their suitability - there being no need to trust third parties or centralised control. Yet humans need to be able to trust systems, and others with whom the system enables transactions. In this paper, we highlight that understanding this need for trust is critical for the development of blockchain-based systems. Through an online study with 125 users of the most well-known of blockchain based systems - the cryptocurrency Bitcoin - we uncover that human and institutional aspects of trust are pervasive. Our analysis highlights that, when designing future blockchain-based technologies, we ought to not only consider computational trust but also the wider eco-system, how trust plays a part in users engaging/disengaging with such eco-systems and where design choices impact upon trust. From this, we distill a set of guidelines for software engineers developing blockchain-based systems for societal applications.

Source | Open access

trust

(Do Not) Trust in Ecosystems

Emilia Cioroaica, Thomas Kühn, Barbora Bühnová
Proceedings 2019 IEEE ACM 41st International Conference on Software Engineering New Ideas and Emerging Results ICSE Nier 2019
Published: 2019-05-01
From feed: TITLE("trust")) + IS Conference

In the context of Smart Ecosystems, systems engage in dynamic cooperation with other systems to achieve their goals. Expedient operation is only possible when all systems cooperate as expected. This requires a level of trust between the components of the ecosystem. New systems that join the ecosystem therefore first need to build up a level of trust. Humans derive trust from behavioral reputation in key situations. In Smart Ecosystems (SES), the reputation of a system or system component can also be based on observation of its behavior. In this paper, we introduce a method and a test platform that support virtual evaluation of decisions at runtime, thereby supporting trust building within SES. The key idea behind the platform is that it employs and evaluates Digital Twins, which are executable models of system components, to learn about component behavior in observed situations. The trust in the Digital Twin then builds up over time based on the behavioral compliance of the real system component with its Digital Twin. In this paper, we use the context of automotive ecosystems and examine the concepts for building up reputation on control algorithms of smart agents dynamically downloaded at runtime to individual autonomous vehicles within the ecosystem.

Source

trust

The influence of trust cues on the trustworthiness of online reviews for recommendations

Catalin-Mihai Barbu, Guillermo Carbonell, Jürgen Ziegler
Proceedings of the ACM Symposium on Applied Computing
Published: 2019-04-08
From feed: TITLE("trust")) + IS Conference

In recent years, recommender systems have started to exploit user-generated content, in particular online reviews, as an additional means of personalizing and explaining their predictions. However, reviews that are poorly written or perceived as fake may have a detrimental effect on the users' trust in the recommendations. Embedding so-called "trust cues" in the user interface is a technique that can help users judge the trustworthiness of presented information. We report preliminary results from an online user study that investigated the impact of trust cues---in the form of helpfulness votes---on the trustworthiness of online reviews for recommendations.

Source

trust

N2TM: A New Node to Trust Matrix Method for Spam Worker Defense in Crowdsourcing Environments

Bin Ye, Yan Wang, Mehmet A. Orgun, Quan Z. Sheng
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2019-01-01
From feed: TITLE("trust")) + IS Conference

written by Bin Ye, Yan Wang, Mehmet A. Orgun, Quan Z. Sheng Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

[PDF] Adaptive Trust Calibration for Supervised Autonomous Vehicles

Kazuo Okamura, Seiji Yamada
Adjunct Proceedings 10th International ACM Conference on Automotive User Interfaces and Interactive Vehicular Applications Automotiveui 2018.
Published: 2018-09-13
From feed: trust calibration

Poor trust calibration in autonomous vehicles often degrades total system performance in safety or efficiency. Existing studies have primarily examined the importance of system transparency of autonomous systems to maintain proper trust calibration, with little emphasis on how to detect over-trust and under-trust nor how to recover from them. With the goal of addressing these research gaps, we first provide a framework to detect a calibration status on the basis of the user's behavior of reliance. We then propose a new concept with cognitive cues called trust calibration cues (TCCs) to trigger the user to quickly restore appropriate trust calibration. With our framework and TCCs, a novel method of adaptive trust calibration is explored in this study. We will evaluate our framework and examine the effectiveness of TCCs with a newly developed online drone simulator.

Source | Open access

trust

Combining Trust and Aggregate Computing

Roberto Casadei, Alessandro Aldini, Mirko Viroli
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2018-01-01
From feed: TITLE("trust")) + IS Conference

written by Roberto Casadei, Alessandro Aldini, Mirko Viroli Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

Increasing Trust in (Big) Data Analytics

Johannes Schneider, Joshua Handali, Jan vom Brocke
Lecture Notes in Business Information Processing
Published: 2018-01-01
From feed: TITLE("trust")) + IS Conference

written by Johannes Schneider, Joshua Handali, Jan vom Brocke Published by Lecture Notes in Business Information Processing

Source

trust

[PDF] Ensuring Resource Trust and Integrity in Web Browsers Using Blockchain Technology

H. Clemens, Benjamin Leiding
Lecture Notes in Business Information Processing.
Published: 2018-01-01
From feed: TITLE("trust")) + IS Conference

written by H. Clemens, Benjamin Leiding Published by Lecture Notes in Business Information Processing.

Source | Open access

trust

An Approach for Top-k Recommendation Based on Trust Information

Xiong Li-rong, Lingyan Wang, Yu-zhu Huang
Proceedings 2017 IEEE 10th International Conference on Service Oriented Computing and Applications Soca 2017
Published: 2017-11-01
From feed: TITLE("trust")) + IS Conference

Personalized recommendations can effectively solve the data explosion problem in network. Most existing works utilize rating information to reduce the score prediction error, e.g. MAE; however, users prefer a list of top-k items and minimizing MAE does not always result in better top-k item lists. Meanwhile, because of data sparse problem, social connections among users play an increasingly important role in top-k recommendation system. So, this paper presents a new trust-based top-k recommendation algorithm, called BTRank. It integrates rating and trust information to construct the rating sorting model, which effectively improves the quality of the top-k item list of all users. A series of experiments on real-world datasets prove the effectiveness of our algorithm.

Source

trust

Trust-Aware Recommendation for E-Commerce Associated with Social Networks

Wei Liang, Xiaokang Zhou, Suzhen Huang, Chunhua Hu, Qun Jin
Proceedings 2017 IEEE 10th International Conference on Service Oriented Computing and Applications Soca 2017
Published: 2017-11-01
From feed: TITLE("trust")) + IS Conference

In recent years, recommender systems are widely applied in e-commerce system to help users locating their interested information. However, the "all good reputation" problem brings down the accuracy of recommender systems. In addition, users' social network can benefit the recommendation especially when dealing with cold-start scenarios. In this paper, a novel trust-aware recommendation approach for e-commerce is proposed, which unearths the hint from ordinary rating and trust network by users' instant interactions in e-commerce system. More precisely, a rating revamping algorithm is designed to extract semantic ratings from feedback comments, and further construct fine grained rating score for the next process. Then, the recommendation scheme is studied through analyzing the users' trust network and their own behavior in e-commerce system. Finally, evaluations conducted based on a real dataset "Douban" to demonstrate the effectiveness of the proposed method.

Source

trust

Trust establishment framework between SDN controller and applications

Bassey Isong, Tebogo Kgogo, Francis Lugayizi, Bennett Kankuzi
Proceedings 18th IEEE Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing Snpd 2017
Published: 2017-06-01
From feed: TITLE("trust")) + IS Conference

Software Defined Networks (SDNs) is a new network paradigm and is gaining significant attention in recent years. However, security remains a great challenge, though several improvements have been proposed. A key security challenge is the lack of trust between the SDN controller and the applications running atop the control plane. SDN controller can easily be attacked if these applications are malicious or compromised by an attacker to control the entire network or even result in network failure since it represents a single point of failure in the SDN. Though trust mechanisms to verify network devices exist, mechanisms to verify management applications are still not well developed. Therefore, this paper proposes a unique direct trust establishment framework between an OpenFlow-based SDN controller and the applications. The objective is to ensure that SDN controller is protected and multitude of applications that regularly consume network resources are always trusted throughout their lifetime. Additionally, the paper introduced the concept of trust access matrix and application identity to ensure efficient control of network resources. Based on its operation, if this proposed trust model is adopted in the OpenFlow architecture, it could go a long way to improve the security of the SDN and protect the controller.

Source

trust

Do Not Trust Build Results at Face Value - An Empirical Study of 30 Million CPAN Builds

Mahdis Zolfagharinia, Bram Adams, Yann-Gaël Guéhénuc
IEEE International Working Conference on Mining Software Repositories
Published: 2017-05-01
From feed: TITLE("trust")) + IS Conference

Continuous Integration (CI) is a cornerstone of modern quality assurance, providing on-demand builds (compilation and tests) of code changes or software releases. Despite the myriad of CI tools and frameworks, the basic activity of interpreting build results is not straightforward, due to not only the number of builds being performed but also, and especially, due to the phenomenon of build inflation, according to which one code change can be built on dozens of different operating systems, run-time environments and hardware architectures. As existing work mostly ignored this inflation, this paper performs a large-scale empirical study of the impact of OS and run-time environment on build failures on 30 million builds of the CPAN ecosystem's CI environment. We observe the evolution of build failures over time, and investigate the impact of OSes and environments on build failures. We show that distributions may fail differently on different OSes and environments and, thus, that the results of CI require careful filtering and selection to identify reliable failure data.

Source

trust

Trust in requirements elicitation

Corentin Burnay, Monique Snoeck
Proceedings of the ACM Symposium on Applied Computing
Published: 2017-04-03
From feed: TITLE("trust")) + IS Conference

Elicitation is a process during Requirements Engineering (RE) which intends to identify requirements and information about a system and its domain. It relies heavily on communications and interactions between engineers and stakeholders. One significant variable influencing the effectiveness of such communication is Trust. While this very idea has been widely covered in many fields of research, little attention has been paid in RE to the potential influence of trust on the elicitation effort, and therefore on the overall RE success. This paper intends to fill in this gap by providing a first empirical study on the impact of trust during requirements elicitation and by proposing a first definition of trust in the engineers and trust in the stakeholders during RE.

Source

trust

Exploiting implicit and explicit signed trust relationships for effective recommendations

Irfan Ali, Jiwon Hong, Sang‐Wook Kim
Proceedings of the ACM Symposium on Applied Computing
Published: 2017-04-03
From feed: TITLE("trust")) + IS Conference

Trust networks have been widely used to mitigate the data sparsity and cold-start problems of collaborative filtering. Recently, some approaches have been proposed which exploit explicit signed trust relationships, i.e., trust and distrust relationships. These approaches ignore the fact that users despite trusting/distrusting each other in a trust network may have different preferences in real-life. Most of these approaches also handle the notion of the transitivity of distrust as well as trust. However, other existing work observed that trust is transitive while distrust is intransitive. Moreover, explicit signed trust relationships are fairly sparse and may not contribute to infer true preferences of users. In this paper, we propose to create implicit signed trust relationships and exploit them along with explicit signed trust relationship to solve sparsity problem of trust relationships. We also confirm the similarity (resp. dissimilarity) of implicit and explicit trust (resp. distrust) relationships by using the similarity score between users so that users' true preferences can be inferred. In addition to these strategies, we also propose a matrix factorization model that simultaneously exploits implicit and explicit signed trust relationships along with rating information and also handles transitivity of trust and intransitivity of distrust. Extensive experiments on Epinions dataset show that the proposed approach outperforms existing approaches in terms of accuracy.

Source

trust

On enhancing trust in cryptographic solutions

Νικόλαος Αλεξόπουλος
Proceedings of the ACM Symposium on Applied Computing
Published: 2017-04-03
From feed: TITLE("trust")) + IS Conference

Public key cryptography and its applications can be found in almost every aspect of online communication nowadays. Connecting to the website of your bank or to your email server by establishing a TLS connection are just two popular examples. Integral to achieving a secure connection to these services is, among others, authenticating their identity, i.e., that a certain public key belongs to the person or service that claims it. That is, a trust network is necessary in order to enable secure communication in any kind of scalable and dynamic network. Such networks are expected to be more and more common as the Internet of Things paradigm gets widely adopted. Existing approaches, namely the Web PKI and the various Webs of Trust are inherently vulnerable to attacks and cannot solve the problem in the long run.

Source

trust

Trust Calibration through Reliability Displays in Automated Vehicles

Brittany E. Noah, Bruce N. Walker
ACM IEEE International Conference on Human Robot Interaction
Published: 2017-03-06
From feed: trust calibration

Automated driving is a growing trend in commercially available vehicles. These technologies have the potential to improve safety, but only if drivers understand how they work and when they may fail. Displays that dynamically show automation reliability (and likelihood of failure) have been suggested to improve performance, especially when the driver needs to take back control of the car. There remain many open questions about how best to design such displays. The proposed work investigates metric type, level of information, and modality of presentation to determine how best to improve driver outcomes of situation awareness, trust, reliance and compliance, and overall driving performance.

Source

trust

A machine competence based analytical model to study trust calibration in supervised autonomous systems

Kamran Shafi
9th International Conference on Advanced Computational Intelligence Icaci 2017
Published: 2017-02-01
From feed: trust calibration

Modern day autonomous systems are moving away form mere automation of manual tasks to true autonomy that require them to apply human-like judgment when dealing with uncertain situations in performing complex tasks. Trust in these systems is a key enabler to fully realize this dream. A lack of trust leads to inefficient use of these systems and increases the supervision workload for humans. Conversely, an over trust in these systems leads to increased risks and exposure to catastrophic events. This paper presents a high-level analytical model to study trust dynamics in supervised autonomous system environments. Trust, in this context, is defined as a function of machine competence and the level of human control required to achieve this competence. A parametric model of machine competence is presented that allows generating different machine competence behaviors based on the task difficulty, level of supervision and machine's learning ability. The notions of perceived and desired or optimal trust, computed based on perceived and observed machine competence respectively, are introduced. This allows treating trust calibration as an optimization or control problem. The presented models provide a formal framework for developing higher-fidelity simulation models to study trust dynamics in supervised autonomous systems and develop appropriate controllers for optimizing the trust between humans and machines in these systems.

Source

trust

Trust-Based IoT Participatory Sensing for Hazard Detection and Response

Jia Guo, Ing-Ray Chen, Jeffrey J. P. Tsai, Hussam Al Hamadi
Lecture Notes in Computer Science
Published: 2017-01-01
From feed: TITLE("trust")) + IS Conference

written by Jia Guo, Ing-Ray Chen, Jeffrey J. P. Tsai, Hussam Al Hamadi Published by Lecture Notes in Computer Science

Source

trust

[PDF] Context and Trust Aware Workflow Oriented Access Framework

Tapalina Bhattasali, Nabendu Chaki, Rituparna Chaki, Khalid Saeed
Proceedings of the International Conference on Software Engineering and Knowledge Engineering Seke.
Published: 2016-07-01
From feed: TITLE("trust")) + IS Conference

Service oriented computing (SoC) changes the way of conducting business as these services are often available on a network. As traditional access control approach may not work in the changed environment, protecting business resource from misuse is a big challenge. Again, static allocation of access right to users will not be an efficient solution as SoC environment changes with time. This paper focuses on design of dynamic access control approach for business process. Here, we propose a context and trust aware workflow oriented access framework. Proposed approach focuses on inter-component relationship where phases are executed either in online or offline mode to avoid performance bottleneck. The concept of static binding in role based access model is extended to support dynamic access control by including context awareness and trust relationship between owner and user. Trust is either directly or indirectly dependent on service level agreement (SLA) compliance, quality of service, reputation and provenance (historical data). In this paper, the framework is designed by mapping proposed access model to workflow instances at run-time. It is validated by workflow net model, where workflow instance can be successfully executed without any interruption and can satisfy soundness property while incorporating proposed access control approach.

Source | Open access

trust

Trust analysis of composite service evolution

Li Liao, Shanshan Qi, Bixin Li
2016 IEEE Acis 14th International Conference on Software Engineering Research Management and Applications SERA 2016
Published: 2016-06-01
From feed: TITLE("trust")) + IS Conference

Changes to a composite service need to be well analyzed in order to ensure its trust is maintained. In this paper, we propose a trust analysis model to analyze the impact of three kinds of evolution operations performed on a composite service: business process changes, binding changes and interface changes. A trust dependency graph is introduced to analyze the impact on the trust of component services; a XBFG (eXtensible BPEL Flow Graph) is introduced to evaluate the impact on the trust of the composite service. Three metrics are introduced to evaluate the impact of these evolution operations. The case study shows how these evolution operations affect the trust of other component services and the composite service.

Source

trust

[PDF] Strengthening Weak Identities Through Inter-Domain Trust Transfer

Giridhari Venkatadri, Oana Goga, Changtao Zhong, Bimal Viswanath, Krishna P. Gummadi, Nishanth Sastry
25th International World Wide Web Conference Www 2016.
Published: 2016-04-11
From feed: TITLE("trust")) + IS Conference

On most current websites untrustworthy or spammy identities are easily created. Existing proposals to detect untrustworthy identities rely on reputation signals obtained by observing the activities of identities over time within a single site or domain; thus, there is a time lag before which websites cannot easily distinguish attackers and legitimate users. In this paper, we investigate the feasibility of leveraging information about identities that is aggregated across multiple domains to reason about their trustworthiness. Our key insight is that while honest users naturally maintain identities across multiple domains (where they have proven their trustworthiness and have acquired reputation over time), attackers are discouraged by the additional effort and costs to do the same. We propose a flexible framework to transfer trust between domains that can be implemented in today's systems without significant loss of privacy or significant implementation overheads.

Source | Open access

trust

Modeling trust and distrust information in recommender systems via joint matrix factorization with signed graphs

Dimitrios Rafailidis
Proceedings of the ACM Symposium on Applied Computing
Published: 2016-04-04
From feed: TITLE("trust")) + IS Conference

We propose an efficient recommendation algorithm, by incorporating the side information of users' trust and distrust social relationships into the learning process of a Joint Non-negative Matrix Factorization technique based on Signed Graphs, namely JNMF-SG. The key idea in this study is to generate clusters based on signed graphs, considering positive and negative weights for the trust and distrust relationships, respectively. Using a spectral clustering approach for signed graphs, the clusters are extracted on condition that users with positive connections should lie close, while users with negative ones should lie far. Then, we propose a Joint Non-negative Matrix factorization framework, by generating the final recommendations, using the user-item and user-cluster associations over the joint factorization. In our experiments with a dataset from a real-world social media platform, we show that we significantly increase the recommendation accuracy, compared to state-of-the-art methods that also consider the trust and distrust side information in matrix factorization.

Source

trust

Dynamically reconfigurable trust policies for untrustworthy third-party components

Kiev Gama, Didier Donsez
Proceedings of the ACM Symposium on Applied Computing
Published: 2016-04-04
From feed: TITLE("trust")) + IS Conference

Dynamic component-based platforms allow software to evolve at runtime, that is, components that can be located, loaded, and executed during runtime. Such dynamic update mechanism provides flexibility but introduces new challenges. This is especially true when dealing with third-party components, which make hard to predict the impacts (e.g., component incompatibilities at runtime, errors leading to application crashes) when integrating such thirdparty code into an application. Component quality is something hard to be evaluated and even harder when components are combined together. Third-party components whose origin or quality attributes are unknown may be considered as untrustworthy since they may potentially introduce faults to applications, although unintentionally. This paper describes the dynamic policy (i.e. changeable at runtime) behind our solution for temporarily isolating components in a sandbox, avoiding the trusted components to be disturbed in case the third-party code behaves inappropriately. By providing such mechanism we help introducing dependability attributes (namely maintainability, reliability and availability) in the component platform's architecture. In case the component presents no harm to the system, our approach provides the ability to promote a component outside the sandbox.

Source

trust

Trust calibration within a human-robot team: Comparing automatically generated explanations

Ning Wang, David V. Pynadath, Susan G. Hill
ACM IEEE International Conference on Human Robot Interaction
Published: 2016-03-01
From feed: trust calibration

Trust is a critical factor for achieving the full potential of human-robot teams. Researchers have theorized that people will more accurately trust an autonomous system, such as a robot, if they have a more accurate understanding of its decision-making process. Studies have shown that hand-crafted explanations can help maintain trust when the system is less than 100% reliable. In this work, we leverage existing agent algorithms to provide a domain-independent mechanism for robots to automatically generate such explanations. To measure the explanation mechanism's impact on trust, we collected self-reported survey data and behavioral data in an agent-based online testbed that simulates a human-robot team task. The results demonstrate that the added explanation capability led to improvement in transparency, trust, and team performance. Furthermore, by observing the different outcomes due to variations in the robot's explanation content, we gain valuable insight that can help lead to refinement of explanation algorithms to further improve human-robot trust calibration.

Source

trust

Investigating Trust Factors in Global Virtual Collaboration: A Case Study of a Manufacturing Company in China

Xusen Cheng, Jianyue Liu, Jianqing Huang, Xiangbin Yan, Yajing Han
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2016-01-01
From feed: TITLE("trust")) + IS Conference

With the increase development of information technologies, virtual teams have been playing a more and more significant role in organizational collaboration. Trust has become more and more vital in the context of mixed used in face-to-face and global virtual collaboration. There are different perspectives of trust factors in previous studies. This research attempt to analyze individual trust factors and explores new trust factors and their detailed sub-factors in business global virtual collaboration. We interviewed five people with important position in a manufacturing company in China. Through analyzing the interview data, we identified four main important factors: risk, benefit, power and effort, which have significant influence on collaboration. Furthermore, we also proposed sub-factors of each trust factors, which were associated with main factors. We also provide directions for future works.

Source

trust

Colors and Trust: The Influence of User Interface Design on Trust and Reciprocity

Florian Hawlitschek, Lars-Erik Jansen, Ewa Lux, Timm Teubner, Christof Weinhardt
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2016-01-01
From feed: TITLE("trust")) + IS Conference

Interpersonal trust and reciprocation are crucial factors in peer-to-peer online interactions. In order to shed more light on the association of user interface (UI) design and trusting as well as reciprocating behavior, we consider a computerized trust game with different interface background colors, red and blue, namely. We locate our work within recent NeuroIS theory, linking UI background color to user behavior via perceived warmth of UIs and color appeal. The results of a laboratory experiment indicate an enhancing effect of red interfaces on reciprocation behavior, fully mediated by perceived warmth. We suggest to further investigate this phenomenon by applying NeuroIS methodology.

Source

trust

From E-Shopping System Quality to the Consumer's Intention to Return: A Meta-Analytic Study of the Mediation of Attitude, Usefulness, Enjoyment, and Trust

John Ingham, Jean Cadieux
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2016-01-01
From feed: TITLE("trust")) + IS Conference

This research aims at clarifying the respective role of e-shopping system quality and attitude, usefulness, enjoyment, and trust to explain the consumer's intention to return to an online merchant. A meta-analytical regression based on 83 published studies is used to integrate, in one single model, concepts from two streams of information system (IS) research which are the technology acceptance model (TAM) and the IS success model. Results demonstrate that the sequence, consisting of e-shopping system quality (system quality, information quality, and customer service quality) -- behavioral beliefs and attitude -- intention to return, is theoretically and empirically founded and that customer service quality is the quality dimension that influences trust and enjoyment the most while information quality is the quality dimension that is the most influential on usefulness.

Source

trust

Trust Development in Globally Distributed Collaboration: A Case Study in China

Xusen Cheng, Jianyue Liu, Douglas A. Druckenmiller, Shixuan Fu
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2016-01-01
From feed: TITLE("trust")) + IS Conference

With the widespread use of virtual teams in learning and work, more attention has been drawn to trust in the team. Risk, benefits, utility value, effort, power, and interest are six factors that influence individual trust development. We have conducted a case study to investigate trust development in global virtual teams with Chinese students. This research takes the perspective of individual trust and aims to explore the trust development trend and new trust factors. We have collected data using survey -- interview and documentation in the case study. We have validated the trust trend and found that the risk factor is the obvious change factor. Furthermore, three trust sub-factors, i.e, time zone difference, language and culture barriers, communication technology were found to help evaluate trust development. Afterwards, we put forward solutions to mitigate these risk factors.

Source

trust

Internet Usage, Physician Performances and Patient's Trust in Physician During Diagnoses: Investigating Both Pre-Use and Not-Use Internet Groups

Tian Lu, Hong Chen, Yunjie Xu, Cheng Zhang
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2016-01-01
From feed: TITLE("trust")) + IS Conference

Do patients' Internet searches of disease information and physician performances affect patients' trust in physicians during diagnoses? This study proposes a research model concerning the effect of whether patients use Internet and Internet usage on perceived physician performances (including perceived communication time, explanation quality and physician attitude) and on trust. Our empirical study of over 650 subjects in China suggests that for pre-use Internet patients, they feel longer communication time but less quality of physicians' explanation in diagnosis process. There is no significant discrepancy of perceived physician attitude between two sample groups. We also demonstrate that whether patients search healthcare information through the Internet impacts their trust in physicians through physicians' explanation quality as well as the communication time. Moreover, this study indicates that physician performances in a diagnosis process play a dominant role in gaining patients' trust, while the professional status of a physician (i.e. expert) will help improve trust when patients feel warm attitude from physicians. However, longer search time on the Internet will weaken the effect of communication time and explanation quality on trust. Overall, this study suggests that the impact of the physician performances and Internet search are not trivial to physician-patient trust, but even in the high-tech age, high-touch remains an important factor to physician-patient trust.

Source

trust

Online Trust: An International Study of Subjects' Willingness to Shop at Online Merchants, Including the Effects of Promises and of Third Party Guarantees

Eric K. Clemons, Josh Wilson, Christian Matt, Thomas Heß, Fei Ren, Fujie Jin
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2016-01-01
From feed: TITLE("trust")) + IS Conference

Significant differences exist among consumers' online shopping behavior in different international markets. This paper compares consumer behavior in four different markets: (1) The US, the largest and most mature market, (2) Germany, a similarly advanced western market (3) China, the fastest growing online market, but one where consumers are plagued by incidents of counterfeits, forgeries, and spoiled or defective items, and (4) Singapore, an advanced market, culturally similar in some ways to China, but with a strong legal system. We performed laboratory experiments simultaneously in all four countries. We used three experimental treatments: (1) No assurances of product quality or authenticity, (2) promises of quality and authenticity, and (3) promises backed up by third party assurances. We examined subjects' responses for all three treatments, and for vendors' with different degrees of riskiness. We confirmed that significant differences exist in consumer behavior, but these differences were not always what we expected. Chinese consumers do appear to have trust in their best online vendors. US consumers appear to treat online shopping very similarly to the way they treat shopping in physical venues.

Source

trust

Expertise and Trust –Aware Social Web Service Recommendation

Ahlem Kalaï, Corinne Amel Zayani, Ikram Amous, Florence Sèdes
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2016-01-01
From feed: TITLE("trust")) + IS Conference

written by Ahlem Kalaï, Corinne Amel Zayani, Ikram Amous, Florence Sèdes Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

A Robust Approach to Finding Trustworthy Influencer in Trust-Oriented E-Commerce Environments

Feng Zhu, Guanfeng Liu, Yan Wang, Mehmet A. Orgun, An Liu, Zhixu Li, Kai Zheng
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2016-01-01
From feed: TITLE("trust")) + IS Conference

written by Feng Zhu, Guanfeng Liu, Yan Wang, Mehmet A. Orgun, An Liu, Zhixu Li, Kai Zheng Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

iSim: An Efficient Integrated Similarity Based Collaborative Filtering Approach for Trust Prediction in Service-Oriented Social Networks

Mingding Liao, Xiao Liu, Xiaofeng Gao, Jiaofei Zhong, Guihai Chen
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2016-01-01
From feed: TITLE("trust")) + IS Conference

written by Mingding Liao, Xiao Liu, Xiaofeng Gao, Jiaofei Zhong, Guihai Chen Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

Consumer Trust towards an Online Vendor in High- vs. Low-Context Cultures

Heli Hallikainen, Tommi Laukkanen
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2016-01-01
From feed: TITLE("trust")) + IS Conference

This study explores the effect of general disposition to trust on the perceived trustworthiness of an online vendor in high- and low-context cultures. A total sample of 616 responses from users of online bookstores was collected from China and Finland. The results show that the disposition to trust has a highly significant effect on the three dimensions of trustworthiness namely ability, integrity, and benevolence. However, the results of multigroup analysis indicate that these effects vary greatly between our country examples from high-and low-context cultures. We conclude that, while in China general disposition to trust has a highly significant effect on perceived trustworthiness of an online vendor, the effect is only marginal in Finland.

Source

trust

A local trust model based on time influence function in P2P networks

Yan-xia Cui, Hongyun Ning, Yun-yun Du
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences Icsess
Published: 2015-09-01
From feed: TITLE("trust")) + IS Conference

In peer-to-peer network environment, there is no centralized management authority to be relied on, so the service provider and service requester have to establish some assessment model, and evaluate the dynamic behavior of others, then choose more credible trusted entities to interact. Only in this way can they ensure security, safety and reliable decisions. On the basis of EigenTrust model, a local trust value computation model considering time effect function is put forward, and it reduces the network overhead, increases the binding force of malicious nodes, and makes the trust value computation model more reliable and accurate. Simulation experiments show that the improved model proposed in this paper greatly reduces the network overhead indeed, and transaction success rate of nodes is higher than EigenTrust model in the presence of malicious nodes in the P2P system.

Source

trust

Incorporating trust relationships in collaborative filtering recommender system

Xiao Shen, Haixia Long, Cuihua Ma
2015 IEEE Acis 16th International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing Snpd 2015 Proceedings
Published: 2015-06-01
From feed: TITLE("trust")) + IS Conference

Nowadays with the readily accessibility of online social networks (OSNs), people are facilitated to share interesting information with friends through OSNs. Undoubtedly these sharing activities make our life more fantastic. However, meanwhile one challenge we have to face is information overload that we do not have enough time to review all of the content broadcasted through OSNs. So we need to have a mechanism to help users recognize interesting items from a large pool of content. In this project, we aim at filtering unwanted content based on the strength of trust relationships between users. We have proposed two kinds of trust models-basic trust model and source-level trust model. The trust values are estimated based on historical user interactions and profile similarity. We estimate dynamic trusts and analyze the evolution of trust relationships over dates. We also incorporate the auxiliary causes of interactions to moderate the noisy effect of user's intrinsic tendency to perform a certain type of interaction. In addition, since the trustworthiness of diverse information sources are rather distinct, we further estimate trust values at source-level. Our recommender systems utilize several types of Collaborative Filtering (CF) approaches, including conventional CF (namely user-based, item-based, singular value decomposition (SVD)based), and also trust-combined user-based CF. We evaluate our trust models and recommender systems on Friendfeed datasets. By comparing the evaluation results, we found that the recommendations based on estimated trust relationships were better than conventional CF recommendations.

Source

trust

[PDF] Trust-building through Social Media Communications in Disaster Management

María Grazia Busà, Maria Teresa Musacchio, Shane Finan, Cilian Fennell
Www 2015 Companion Proceedings of the 24th International Conference on World Wide Web.
Published: 2015-05-18
From feed: TITLE("trust")) + IS Conference

Social media provides a digital space -- a meeting place, for different people, often representing one or more groups in a society. The use of this space during a disaster, especially where information needs are high and the availability of factually accurate and ethically sourced data is scarce, has increased substantially over the last 5-10 years. This paper attempts to address communication in social media and trust between the public and figures of authority during a natural disaster in order to suggest communication strategies that can enhance or reinforce trust between these bodies before, during and after a natural disaster.

Source | Open access

trust

Improving Predictability, Efficiency and Trust of Model-Based Proof Activity

Jean-Frédéric Étienne, Manuel Maarek, Florent Anseaume, Véronique Delebarre
Proceedings International Conference on Software Engineering
Published: 2015-05-01
From feed: TITLE("trust")) + IS Conference

We report on our industrial experience in using formal methods for the analysis of safety-critical systems developed in a model-based design framework. We first highlight the formal proof workflow devised for the verification and validation of embedded systems developed in Matlab/Simulink. In particular, we show that there is a need to: determine the compatibility of the model to be analysed with the proof engine, establish whether the model facilitates proof convergence or when optimisation is required, and avoid over-specification when specifying the hypotheses constraining the inputs of the model during analysis. We also stress on the importance of having a certain harness over the proof activity and present a set of tools we developed to achieve this purpose. Finally, we give a list of best practices, methods and any necessary tools aiming at guaranteeing the validity of the verification results obtained.

Source

trust

Engineering trust- and reputation-based security controls for future internet systems

Kristian Beckers, Maritta Heisel paluno, Francisco Moyano, Carmen Fernández-Gago
Proceedings of the ACM Symposium on Applied Computing
Published: 2015-04-13
From feed: TITLE("trust")) + IS Conference

Reputation as a decision criteria for whom to trust has been successfully adopted by a few internet-based businesses such as ebay or Amazon. Moreover, trust evaluation is becoming of increasing importance for future internet systems such as smart grids, because these contain potentially millions of users, their data, and a huge number of subsystems. The resulting scale and complexity makes them ideal candidates for trust and reputation based security controls, but currently engineering methodologies are missing that provide structured step-by-step instructions on how to design such controls. We contribute such a methodology including tool support that helps (i) to elicit trust relationships, (ii) to reason about how to construct trust and reputation engines for these and finally (iii) to specify consequent security controls. The methodology is based on formal OCL-expressions that provide (semi-)automatic support analysing UML models with regard to trust and reputation information.

Source

trust

Bi-directional trust index computation in resource marketplace

Avinash Sharma, Tridib Mukherjee, Partha Sharathi Dutta, Vinay Hegde
Proceedings of the ACM Symposium on Applied Computing
Published: 2015-04-13
From feed: TITLE("trust")) + IS Conference

Commoditizing idle computing resources by sharing them in a marketplace has gained increased attention in recent years as a potential disruption to the modern cloud-based service delivery. Recent initiatives have focused on scavenging for idle resources and provide suitable incentives accordingly. A recent work on resources marketplace has proposed a Marketplace for Compute Infrastructure that not only allows resource owners to get incentives by sharing resources to the marketplace but also ensures Service Level Agreements (SLAs), such as performance guarantees, for the computing jobs to be run by the shared resources.

Source

trust

Trust-based collection of information in distributed reputation networks

Dimitra Gkorou, Johan Pouwelse, Dick Epema
Proceedings of the ACM Symposium on Applied Computing
Published: 2015-04-13
From feed: TITLE("trust")) + IS Conference

Distributed reputation systems establish trust among strangers in online communities and provide incentives for users to contribute. In these systems, each user monitors the interactions of others and computes the reputations accordingly. Collecting information for computing the reputations is challenging for the users due to their vulnerability to attacks, their limited resources, and the burst of their interactions. The low cost of creating accounts in most reputation systems makes them popular to million of users, but also enables malicious users to boost their reputations by performing Sybil attacks. Furthermore, the burst of user interactions causes an information overload. To avoid the impact of malicious users and information overload, we propose EscapeLimit, a sybil attack-resistant, computationally simple, and fully distributed method for information collection. EscapeLimit leverages user interactions as indicators of trust and similarity between the corresponding users, and collects relevant and trusted information by limiting the escape probability into the Sybil area. We evaluate it by emulating interaction patterns derived from synthetic and real-world networks. Our evaluation shows EscapeLimit's effectiveness in terms of its resilience to Sybil attacks, its scalability, and its ability to provide relevant information to each user.

Source

trust

Social Media Use and Perception of Transparency in the Generation of Trust in Public Services

Cayetano Medina Molina, Ramón Rufín
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2015-01-01
From feed: TITLE("trust")) + IS Conference

Public institutions are among the key agents involved in the great social and economic debate regarding satisfaction, trust and transparency. For self-funded public organizations, such as certain higher education institutions, changes in their situation (greater competition and pressure from stakeholders) have meant that the demand for transparency policies is even greater than in other types of public institution. While transparency has been observed to play a role in the generation of satisfaction and trust, the existence of disparate results in the research into this relationship has given rise to the need to analyse the role played by variables moderating this role. This paper incorporates the role of the social media (Twitter and Facebook) used to access information from an organization which, in turn, acts as an intermediary for the delivery of services by another public institution. The results indicate that while the use of Twitter does not moderate the relationship between transparency, trust and satisfaction, the frequency of Facebook use does moderate the relationship between trust and the two antecedents referred to in the model: transparency and satisfaction.

Source

trust

Review of Research on Knowledge Transfer in Care Transitions: Trust-Enhancing Principles for Information Systems Design

Shi Ying Lim, Sirkka L. Järvenpää, Holly J. Lanham
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2015-01-01
From feed: TITLE("trust")) + IS Conference

This article reviews qualitative studies on discharge and patient care transition processes to understand the barriers to knowledge transfer and to propose principles for information systems for facilitating effective care transitions. Knowledge transfer occurs at many points during the processes, but this review focuses on two critical boundaries: (1) between patients and providers and (2) among various inpatient and outpatient providers. Failure to manage knowledge flows at these boundaries during care transitions can lead to unnecessary patient readmissions. However, interventions to improve processes and outcomes of care transitions have achieved mixed results. Our preliminary findings highlight trust-related barriers to knowledge transfer that might help to explain the mixed results. Analysis also suggests a lack of consideration for information technology's role in building trust during care transitions. We propose trust-enhancing principles for information systems design to better enable knowledge flows in patient-provider and provider-provider relationships.

Source

trust

Generating Trust in Online Consumer Reviews through Signaling: An Experimental Study

Tobias Riasanow, Hua Ye, Suparna Goswami
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2015-01-01
From feed: TITLE("trust")) + IS Conference

With the availability of online consumer reviews, consumers' consumption behaviors are gradually changing. They are increasingly relying on reviews for information prior to purchase. The influences of reviews on sales have been identified and verified by many empirical studies. However, little research has explored how review content characteristics affect the trustworthiness in online consumer reviews (TIOCR) and consumers' willingness to purchase (WTP) experience goods. Based on signaling theory and related literature, we construct a model to explain the TIOCR and WTP for experience goods. We hypothesize that TIOCR and WTP are influenced by review content characteristics, i.e., Prevalence of negative statements, prevalence of conflicting information, and availability of emotions. A pilot laboratory experiment is carried out to test the hypotheses. Preliminary results are discussed. The results will be validated in a large scale experiment.

Source

trust

Trust Transference from Brick to Click Retailers: A Conceptual Model for Impersonal Trust

Talal Alsaif, Ahmad Ghoneim
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2015-01-01
From feed: TITLE("trust")) + IS Conference

Previous researches have revealed that the creation of synergy between retailers' channels can enhance customers' satisfaction and loyalty. Nevertheless, little is known about utilizing such synergy in inducing customers' purchasing behavior in electronic commerce. In an attempt to address this issue, few empirical studies have been conducted on the role of trust transference from brick to click channels to understand customers' purchasing intentions. These studies have mainly focused on interpersonal trust as a proxy of the transference process. Therefore, the aim of this paper is to articulate the importance of impersonal trust and shed light on its expected role during the transference process. Based on this, the paper presents a conceptual model for impersonal trust to identify its transferable drivers and its relationship with customers' purchasing intentions. The proposed methodology for testing the conceptual model is also discussed in the final part of this paper.

Source

trust

Can We Trust Online Physician Ratings? Evidence from Cardiac Surgeons in Florida

Susan Lu, Huaxia Rui
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2015-01-01
From feed: TITLE("trust")) + IS Conference

Despite heated debate about the pros and cons of online physician ratings, very little systematic work examines the correlation between physicians' online ratings and their actual medical performance. Using patients' ratings of physicians at Rate MDs.com and the Florida Hospital Discharge data, we investigate whether online ratings reflect physicians' medical performance by means of a two-stage model that takes into account patients' ratings-based selection of cardiac surgeons. Estimation results show that five-star surgeons are associated with significantly lower mortality rates and are more likely to be selected by sicker patients compared with lower-rated surgeons. In contrast, not accounting for patients' rating-based selection leads to the opposite outcome: patients treated by five-star surgeons had higher mortality rates than patients treated by surgeons rated below five stars. Our findings suggest that we can trust online physician ratings, at least of cardiac surgeons.

Source

trust

We-Intention, Moral Trust, and Self-Motivation on Accelerating Knowledge Sharing in Social Collaboration

Darshana Karna, Ilsang Ko
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2015-01-01
From feed: TITLE("trust")) + IS Conference

More than billions of people are networked and connected together to create, collaborate and contribute their knowledge. The new world of collaboration and communication has been created by online social networks. Hence, growth and popularity of social collaboration is continuously increasing day-by-day. In spite of the importance of social networks, there is comparatively little theory-driven empirical research that has been published to address this new type of communication and interaction phenomena. In this research, we explore the factors which motivate people to participate actively in social collaboration. We conceptualized that use of social collaboration is an intentional social action where people willing to share their knowledge, experience and expertise. We examine the relative impact of We-Intention, moral trust and self-motivation to participate in social collaboration and knowledge sharing activity. An empirical study of social collaborators has been done and we concluded that knowledge sharing is an important goal to participate in social collaboration.

Source

trust

TRACE: A Dynamic Model of Trust for People-Driven Service Engagements

Anup K. Kalia, Pradeep K. Murukannaiah, Munindar P. Singh
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2015-01-01
From feed: TITLE("trust")) + IS Conference

written by Anup K. Kalia, Pradeep K. Murukannaiah, Munindar P. Singh Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

A trust-based opportunistic routing algorithm in Ad hoc network

Dan Feng, Yajie Ma, Fengxing Zhou, Shaowu Lu
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences Icsess
Published: 2014-06-01
From feed: TITLE("trust")) + IS Conference

By making the best of the wireless channel's broadcasting property, opportunistic routing can greatly improve the performance of wireless multi-hop networks. Traditional routing security mechanism is no longer suitable for the design of routing protocol in Ad hoc network. So this thesis introduces trust, i.e. the concept of security and credibility into opportunistic routing, and put forward an opportunistic routing algorithm based on trust. According to the simulation result, compared with ExOR algorithm of traditional opportunistic routing, TOR algorithm can prevent attacks of malicious node, improve the robustness of network and has an advantage in aspects such as handling capacity and end-to-end time delay.

Source

trust

Data imputation using a trust network for recommendation

Wonseok Hwang, Shaoyu Li, Sang‐Wook Kim, Kichun Lee
Www 2014 Companion Proceedings of the 23rd International Conference on World Wide Web
Published: 2014-04-07
From feed: TITLE("trust")) + IS Conference

Recommendation methods suffer from the data sparsity and cold-start user problems, often resulting in low accuracy. To address these problems, we propose a novel imputation method, which effectively densifies a rating matrix by filling unevaluated ratings with probable values. In our method, we use a trust network to estimate the unevaluated ratings accurately. We conduct experiments on the Epinions dataset and demonstrate that our method helps provide better recommendation accuracy than previous methods, especially for cold-start users.

Source

trust

Trust in social computing

Jiliang Tang, Huan Liu
Www 2014 Companion Proceedings of the 23rd International Conference on World Wide Web
Published: 2014-04-07
From feed: TITLE("trust")) + IS Conference

The rapid development of social media exacerbates the information overload and credibility problems. Trust, providing information about with whom we can trust to share information and from whom we can accept information, plays an important role in helping users collect relevant and reliable information in social media. Trust has become a research topic of increasing importance and of practical significance. In this tutorial, we illustrate properties and representation models of trust, elucidate trust measurements with representative algorithms, and demonstrate real-world applications where trust is explicitly used. As a new dimension of the trust study, we discuss the concept of distrust and its roles in trust measurements and applications.

Source

trust

Multi-category item recommendation using neighborhood associations in trust networks

Feng Xia, Haifeng Liu, Nana Yaw Asabere, Wei Wang, Zhuo Yang
Www 2014 Companion Proceedings of the 23rd International Conference on World Wide Web
Published: 2014-04-07
From feed: TITLE("trust")) + IS Conference

This paper proposes a novel recommendation method called RecDI. In the multi-category item recommendation domain, RecDI is designed to combine user ratings with information involving user's direct and indirect neighborhood associations. Through relevant benchmarking experiments on two real-world datasets, we show that RecDI achieves better performance than other traditional recommendation methods, which demonstrates the effectiveness of RecDI.

Source

trust

Trust prediction using positive, implicit, and negative information

Min-Hee Jang, Christos Faloutsos, Sang‐Wook Kim
Www 2014 Companion Proceedings of the 23rd International Conference on World Wide Web
Published: 2014-04-07
From feed: TITLE("trust")) + IS Conference

We propose a novel method to predict accurately trust relationships of a target user even if he/she does not have much interaction information. The proposed method considers positive, implicit, and negative information of all users in a network based on belief propagation to predict trust relationships of a target user.

Source

trust

Trust and hybrid reasoning for ontological knowledge bases

Hui Shi, Kurt Maly, Steven J. Zeil
Www 2014 Companion Proceedings of the 23rd International Conference on World Wide Web
Published: 2014-04-07
From feed: TITLE("trust")) + IS Conference

Projects such as Libra and Cimple have built systems to capture knowledge in a research community and to respond to semantic queries. However, they lack the support for a knowledge base that can evolve over time while responding to queries requiring reasoning. We consider a semantic web that covers linked data about science research that are being harvested from the Web and are supplemented and edited by community members. We use ontologies to incorporate semantics to detect conflicts and resolve inconsistencies, and to infer new relations or proof statements with a reasoning engine. We consider a semantic web subject to changes in the knowledge base, the underlying ontology or the rule set that governs the reasoning. In this paper we explore the idea of trust where each change to the knowledge base is analyzed as to what subset of the knowledge base can still be trusted. We present algorithms that adapt the reasoner such that, when proving a goal, it does a simple retrieval when it encounters trusted items and backward chaining over untrusted items. We provide an evaluation of our proposed modifications that show that our algorithm is conservative and that it provides significant gains in performance for certain queries.

Source

trust

From ratings to trust

Guibing Guo, Jie Zhang, Daniël Thalmann, Anirban Basu, Neil Yorke‐Smith
Proceedings of the ACM Symposium on Applied Computing
Published: 2014-03-24
From feed: TITLE("trust")) + IS Conference

Trust has been extensively studied and its effectiveness demonstrated in recommender systems. Due to the lack of explicit trust information in most systems, many trust metric approaches have been proposed to infer implicit trust from user ratings. However, previous works have not compared these different approaches, and oftentimes focus only on the performance of predictive item ratings. In this paper, we first analyse five kinds of trust metrics in light of the properties of trust. We conduct an empirical study to explore the ability of trust metrics to distinguish explicit trust from implicit trust and to generate accurate predictions. Experimental results on two real-world data sets show that existing trust metrics cannot provide satisfying performance, and indicate that future metrics should be designed more carefully.

Source

trust

Recommendation based on weighted social trusts and item relationships

Di Wang, Jun Ma, Tao Lian, Lei Guo
Proceedings of the ACM Symposium on Applied Computing
Published: 2014-03-24
From feed: TITLE("trust")) + IS Conference

Recommender systems have been well studied to overcome the information overload problem in both academia and industry during the past decade. Collaborative filtering is the most popular approach in recommender systems, among which Probabilistic Matrix Factorization (PMF) has proved very effective. In social networks, users linked together tend to have similar interests and some social-based methods emerged based on this assumption. However these methods treat different friends equally and actually different people may have different influence on a person. Besides social trusts, item relationships also provide rich information especially when trust information is not sufficient. The items liked by the same user may have similar characteristics and whether an item is preferred is influenced by its similar items. But most of these methods ignore the role of item relationships. In this paper, we propose a novel recommendation method which incorporates social trusts and item relationships into PMF. We compute user influence degrees and item similarities to weight user-user and item-item relationships when learning user and item latent factors. Experimental results on Epinions dataset demonstrate that our method has shown a significant improvement over existing approaches especially for the users who have made few ratings.

Source

trust

[PDF] Trust in Network Organizations -- A Literature Review on Emergent and Evolving Behavior in Network Organizations

Marcel Morisse, Bettina Horlach, Wiebke Kappenberg, Jurate Petrikina, Florian Robel, Florian Steffens
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2014-01-01
From feed: TITLE("trust")) + IS Conference

This systematic literature review examines different forms of evolving and emergent behavior in network organizations (NO) with an emphasis on trust. Because of the difficulties and importance in researching emergent behavior in network organizations, this review summarizes the main aspects of 17 papers and tries to disclose open research points by combining the different perspectives of behavior and forms of NOs. Due to the complexity of those organizations, there are several “soft aspects” that affect the partnership implicitly. In particular, trust is intertwined with other facets (e.g. legal aspects). IT governance and IT systems can have an impact on trust and vice versa. Therefore, maintaining a trustworthy relationship in a network organization is undoubtedly an enormous challenge for all participants. At the end of this literature review, we discuss some open research gaps like the influence of different cultures in NOs or the visualization of emergent behavior.

Source | Open access

trust

[PDF] Trust-Aware Decision-Making Methodology for Cloud Sourcing

Francisco Moyano, Kristian Beckers, Carmen Fernández-Gago
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics.
Published: 2014-01-01
From feed: TITLE("trust")) + IS Conference

written by Francisco Moyano, Kristian Beckers, Carmen Fernández-Gago Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics.

Source | Open access

trust

[PDF] The Effect of Providing Visualizations in Privacy Policies on Trust in Data Privacy and Security

Jörg Becker, Marcel Heddier, Ayten Öksüz, Ralf Knackstedt
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2014-01-01
From feed: TITLE("trust")) + IS Conference

Trust in data privacy and security of internet service providers is getting increasing attention, especially in the context of cloud service. Insufficient communication of implemented data privacy and data security measures may lead to a lack of trust. Visualizations are known to have various beneficial effects when used to communicate information. This paper investigates whether providing visualizations as means for communicating data privacy and security measures has a positive effect on trust. A laboratory experiment was conducted to measure the effect of visualizations on trust in the provider, trust in the measures of the provider, and on information security and privacy concerns. The results indicate that there is a small positive effect regarding trust in the provider and in his measures and no significant effect regarding information security and privacy concerns. The findings provide first insights into the effect of visualizations on trust and lead to several further research questions.

Source | Open access

trust

[PDF] Collaborative Technologies in an Inter-organizational Context: Examining the Role of Perceived Information Security and Trust on Post-adoption

Simon Trang, Thierry Jean Ruch, Lutz M. Kolbe
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2014-01-01
From feed: TITLE("trust")) + IS Conference

Intensified collaboration in inter-organizational networks is a driving force for the utilization of collaborative technologies (CT). However, with data leakages being discussed frequently in media, there is a rising consciousness of information security issues. These concerns are known to affect individual behavior. Despite the importance of this awareness, the role of information security for the acceptance of CT has not garnered significant attention in research. This paper accounts for this gap and extends the technology acceptance model by integrating the dimension of perceived information security. Moreover, it takes a socio-technical stance and incorporates the perspective of inter-personal trust. The study develops a theoretical model, which is then validated using data gathered from 121 network organizations in Germany. The results suggest that both perceived information security and inter-personal trust are important predictors for the intention to use CT and should be considered in the field of CT adoption research.

Source | Open access

trust

[PDF] The Impact of the Transparency Policy on University Students' Trust and Intention of Continued Use

Ramón Rufín Moreno, Cayetano Medina Molina
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2014-01-01
From feed: TITLE("trust")) + IS Conference

The loss of trust suffered by public institutions means that they are trying to identify the existing formulae so that this can be restored, and this includes transparency. In universities, certain changes in their situation (lower funding, higher competition and pressure on stakeholders) mean that the demand for transparency policies is even greater. Although the literature initially states that the transparency generated by the spread of online information is a suitable formula for increasing citizens' trust in the public institutions, recent papers question the validity of this relationship. This paper analyses the effectiveness of the transparency strategy carried out by the Spanish Open University UNED (Universidad Nacional de Educación a Distancia) in terms of the impact on students' trust and, what is most important, on their intention of continuing to use its services.

Source | Open access

trust

[PDF] The Role of Familiarity or Experience in Generating Trust and in Its Impact on Continued Use

Cayetano Medina Molina, Ramón Rufín Moreno
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2014-01-01
From feed: TITLE("trust")) + IS Conference

The fall in citizens' trust in public institutions is one of the biggest challenges they face. Among the formulae put forward to set this right is the role played by transparency yet, although initially it was considered that simply rolling out transparency programmes would lead to the intended outcome, subsequently several works established the non-existence of this relationship or even a decrease in citizens' trust. One possible explanation for such disparate consequences could be the way in which familiarity or experience affects trust-generating processes. For this reason, this research seeks to analyse, for the case of the UNED, the largest university institution in Spain, the impact that familiarity or user experience has on the relationship between transparency and trust and between this and continued use.

Source | Open access

trust

Social Context-Aware Trust Prediction in Social Networks

Xiaoming Zheng, Yan Wang, Mehmet A. Orgun, Guanfeng Liu, Haibin Zhang
Lecture Notes in Computer Science
Published: 2014-01-01
From feed: TITLE("trust")) + IS Conference

written by Xiaoming Zheng, Yan Wang, Mehmet A. Orgun, Guanfeng Liu, Haibin Zhang Published by Lecture Notes in Computer Science

Source

trust

Semantics-Based Approach for Dynamic Evolution of Trust Negotiation Protocols in Cloud Collaboration

Seung Hwan Ryu, Abdelkarim Erradi, Khaled M. Khan, Saleh Alhazbi, Boualem Benatallah
Lecture Notes in Computer Science
Published: 2014-01-01
From feed: TITLE("trust")) + IS Conference

written by Seung Hwan Ryu, Abdelkarim Erradi, Khaled M. Khan, Saleh Alhazbi, Boualem Benatallah Published by Lecture Notes in Computer Science

Source

trust

Collaborative QoS Prediction via Feedback-Based Trust Model

Liang Chen, Yipeng Feng, Jian Wu
Proceedings IEEE 6th International Conference on Service Oriented Computing and Applications Soca 2013
Published: 2013-12-01
From feed: TITLE("trust")) + IS Conference

With the development of Service Oriented Computing and the explosive growth of services, QoS (Quality of Service) based service computing, e.g., QoS-based selection and composition, is becoming more and more important. A common premise of previous research is that the QoS values of services to target users are supposed to be all known, while many QoS values are unknown in reality. This paper presents a trust-aware Collaborative Filtering approach to predict such unknown values for QoS-based service computing. Compared with existing methods, the proposed approach has two new features: 1) prediction feedback is explored and utilized to improve the performance of QoS prediction, 2) the proposed trust model is complemental to the state-of-the-art Collaborative Filtering based prediction approaches. An extensive performance study based on a public dataset demonstrates the effectiveness of the proposed approach.

Source

trust

[PDF] A Social Trust Based Recommendation Mechanism for Web Service Dynamic Collaboration

Szu‐Yin Lin, Ya-Ching Yang, Chi‐Chun Lo, Kuo‐Ming Chao
Proceedings IEEE 6th International Conference on Service Oriented Computing and Applications Soca 2013.
Published: 2013-12-01
From feed: TITLE("trust")) + IS Conference

In the distributed commercial environment, many enterprises utilize Web services to provide their resources such as data and applications to consumers. They collaborate with other relevant enterprises to accomplish tasks by sharing processes and resources. However, it is difficult to find the appropriate web service combination for enterprise, because the Quality of Services (QoS) that are widely used to select Web services is not sufficient anymore. In dynamic collaboration environment, it does not only need to consider the QoS, functionality and degree of matching, but also the social trust relationship between enterprises. This study proposes a social-trust-based recommendation mechanism for service-oriented dynamic collaboration. It uses the legal binding of Service Level Agreement and the characteristics of Social Trust Network of Web services to recommend proper and trustworthy services to support dynamic collaboration.

Source | Open access

trust

Presenting system uncertainty in automotive UIs for supporting trust calibration in autonomous driving

Tove Helldin, Göran Falkman, Maria Riveiro, Staffan Davidsson
Proceedings of the 5th International Conference on Automotive User Interfaces and Interactive Vehicular Applications Automotiveui 2013
Published: 2013-10-28
From feed: trust calibration

To investigate the impact of visualizing car uncertainty on drivers' trust during an automated driving scenario, a simulator study was conducted. A between-group design experiment with 59 Swedish drivers was carried out where a continuous representation of the uncertainty of the car's ability to autonomously drive during snow conditions was displayed to one of the groups, whereas omitted for the control group. The results show that, on average, the group of drivers who were provided with the uncertainty representation took control of the car faster when needed, while they were, at the same time, the ones who spent more time looking at other things than on the road ahead. Thus, drivers provided with the uncertainty information could, to a higher degree, perform tasks other than driving without compromising with driving safety. The analysis of trust shows that the participants who were provided with the uncertainty information trusted the automated system less than those who did not receive such information, which indicates a more proper trust calibration than in the control group.

Source

trust

Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts

Lahiru S. Gallege, Dimuthu U. Gamage, James H. Hill, Rajeev R. Raje
Proceedings IEEE International Enterprise Distributed Object Computing Workshop Edoc
Published: 2013-09-01
From feed: TITLE("trust")) + IS Conference

Composing a distributed software system out of independently developed and publically hosted services leads to savings in effort, time, and cost. Such an approach requires a careful selection of a set of services for realizing a particular distributed software system. Hence, identifying and quantifying the trust of such publically available services becomes a prerequisite for composing distributed software systems. The quantification of the trust associated with a service is a challenging task due to the subjective nature of trust, lack of standards, and associated uncertainty. Moreover, the trust of a service is not a static value and should be updated periodically. To achieve a proper quantification of a trust associated with a service, there is a need to periodically collect, monitor, and aggregate various evidences available about that service. This paper augments previously defined quantification of the trust by monitoring and aggregating various available evidences. This enhanced approach is used to improve the service selection process. Publically available mobile app services from the Android marketplace are utilized, as the dataset, to empirically validate this approach.

Source

trust

Network education video recommendation algorithm based on context and trust relationship

Chenyang Zhao, Junling Wang
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences Icsess
Published: 2013-05-01
From feed: TITLE("trust")) + IS Conference

With the development of information technology and the internet, there are many education videos on the network for people to study in their spare time. However, it is difficult for people to choose education videos which they really need. To solve the problem, a personalized recommendation algorithm based on context and trust relationship is proposed in this paper. Under the help of this algorithm, education videos interested by users can be proactive recommended. The algorithm improves traditional filtering recommendation algorithm. It is divided into three parts. One candidate video set is firstly obtained according to user-rating matrix and context, and then another set is obtained according to trust relationships between users. Finally, the former two candidate sets are combined to determine the recommendation video set. Experiments indicate that the proposed algorithm is more accurate than traditional collaborative filtering algorithm.

Source

trust

Composite trust-based public key management in mobile ad hoc networks

Jin-Hee Cho, Kevin Chan, Ing-Ray Chen
Proceedings of the ACM Symposium on Applied Computing
Published: 2013-03-18
From feed: TITLE("trust")) + IS Conference

Public key management in mobile ad hoc networks (MANETs) has been studied for several decades. Yet no single solution has completely resolved well known design challenges resulting from the unique characteristics of MANETs. These challenges include no centralized trusted entities, resource constraints, and high security vulnerabilities. This work proposes a fully distributed trust-based public key management approach for MANETs using a soft security mechanism based on the concept of trust. Instead of using hard security approaches, as in traditional security techniques, to eliminate security vulnerabilities, our work aims to maximize performance by trading off risk (i.e., security vulnerability) for trust. In this work, we propose a composite trust-based public key management (CTPKM) with no centralized trust entity with the goal of maximizing performance (e.g., service availability or efficiency) while mitigating security vulnerability. Each node employs a trust threshold to determine whether or not to trust another node. Each node's decision making using the given trust threshold affects performance and security of CTPKM. Our simulation experimental results show that there exists an optimal trust threshold that can best balance and meet the conflicting goals between performance and security, exploiting the inherent tradeoff between trust and risk.

Source

trust

Discovering influential nodes from trust network

Sabbir Ahmed, C. I. Ezeife
Proceedings of the ACM Symposium on Applied Computing
Published: 2013-03-18
From feed: TITLE("trust")) + IS Conference

The goal of viral marketing is that, by the virtue of mouth to mouth word spread, a small set of influential customers can influence more customers. Influence maximization (IM) task is used to discover such influential nodes (or customers) from a social network. Existing algorithms for IM adopt Greedy and Lazy forward optimization approaches which assume only positive influence among users and availability of influence probability, the probability that a user is influenced by another.

Source

trust

A framework for evaluating trust of service providers in cloud marketplaces

Sheikh Mahbub Habib, Vijay Varadharajan, Max Mühlhäuser
Proceedings of the ACM Symposium on Applied Computing
Published: 2013-03-18
From feed: TITLE("trust")) + IS Conference

The Cloud Security Alliance (CSA) provides a framework for cloud platform providers that manages standardized self-assessments regarding security controls. The framework as it stands does not allow consumers to specify and check their own requirements, nor does it contain any means for verifying the capabilities claimed by the providers. From a customer perspective, both these aspects are essential for evaluating the trustworthiness of cloud providers and for making an informed decision. We propose a novel concept for verifying the capabilities captured in the CSA's framework, plus a decision model that checks consumer requirements against the verification results. Our capability verification combines hard trust based on rigid validation with soft trust based on evidence about past behaviour. Elaborate formal methods are applied in both fields and combined into a single concept.

Source

trust

Exploring Privacy and Trust Issues in a Future Immersive Videoconferencing System

Katriina Kilpi, Shirley Elprama, An Jacobs
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2013-01-01
From feed: TITLE("trust")) + IS Conference

Existing standard videoconferencing tools have failed in creating an experience equal to formal face-to-face meetings. In an effort to overcome this challenge, ICOCOON was developed to create an immersive meeting experience. In its current state this videoconferencing tool displays video streams of all participants and a Virtual Meeting Room (VMR) portraying participants as avatars around one table. To create an effortless meeting experience in the immersive environment, the Virtual Director (VD) translates behaviors such as speaking and raising one's hand from the video stream to the VMR with the help of smart software. However, when delegating power to technology, privacy concerns arise. By creating a video prototype of the tool, we probed and discussed topics such as privacy and trust in technology. We found that users trade off their privacy concerns with benefits of using the proposed technology. To illustrate this trade-off, we extended an existing privacy perception model.

Source

trust

Identifying Fake Feedback for Effective Trust Management in Cloud Environments

Talal H. Noor, Quan Z. Sheng, Abdullah Alfazi, Jeriel Law, Anne H. H. Ngu
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2013-01-01
From feed: TITLE("trust")) + IS Conference

written by Talal H. Noor, Quan Z. Sheng, Abdullah Alfazi, Jeriel Law, Anne H. H. Ngu Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

TrustVis: A Trust Visualisation Service for Online Communities

Sanat Kumar Bista, Payam Aghaei Pour, Nathalie Colineau, ‪Surya Nepal‬, Cécile Paris
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2013-01-01
From feed: TITLE("trust")) + IS Conference

written by Sanat Kumar Bista, Payam Aghaei Pour, Nathalie Colineau, ‪Surya Nepal‬, Cécile Paris Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

Exploring Trust-Based Service Value Chain Framework in Tele-healthcare Services

Rung-Wei Po, Fu‐ren Lin, Bi-Kun Chuang, Michael J. Shaw
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2013-01-01
From feed: TITLE("trust")) + IS Conference

Tele-heatlh care services extending healthcare services from medical perspective of treatment and diagnosis to enhance holistic wellness of individuals, have been widely recognized by healthcare providers. This study explored the trust in the healthcare providers to generate the trust-based service value chain framework in tele-healthcare services. We report the results of survey from 1304 members of a district hospital in 7 villages in two townships of a county in the middle of Taiwan. Four motivations were identified from literature review in the study, which are the perception of tele-healthcare value, the perception of medical value, social influence, and effort expectancy. These motivators were used to predict the intention of using tele-healthcare services provided by the service provider. We employed trust as a mediator in this framework. From the statistical analysis, we obtain the following results: (1) the relationship between effort expectancy and intention to use is mediated by the trust in the service provider (2) Social influence insignificantly affects trust, however, it significantly affects the intention to use tele-healthcare services, (3) The perceived benefits and medical value are significantly mediated by calculation-based trust in the service provider. From these findings, we suggest that trust built is critical for service value co-creation stage in tele-healthcare services.

Source

trust

Examining the Formation of Swift Trust within a Scientific Global Virtual Team

Dhiraj Murthy, Atilano Rodriguez, Jeremy Lewis
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2013-01-01
From feed: TITLE("trust")) + IS Conference

This study examines the development of trust within a 77 member global virtual team, "SciTeam", tasked with organizing a scientific conference. A dedicated discussion board space was created within a virtual scientific organization platform (on which team members from around the world interacted). The task included logistics, scheduling, and content components. We studied the team using a 'swift trust' framework, ideal for task-oriented geographically displaced communities in which strangers work together to complete an assigned task. A mixed methods approach allowed us to develop qualitatively-derived hypotheses which we quantitatively tested. A unique finding was that while we could discern team member's particular posting habits (social or task-oriented), a user's impact upon the forum along the axes of trust and sociability was more strongly determined by their overall activity than by a user's propensity to engage in trust or social behavior.

Source

trust

Trust Issues in Disaster Communications

Yuko Murayama, Yoshia Saito, Dai Nishioka
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2013-01-01
From feed: TITLE("trust")) + IS Conference

The Great East Japan Earthquake on March 11 th , 2011 caused severe damage to the northern coast of the main island in Japan. Since then we have been working to help out the affected area in terms of IT support such as internetworking and providing PCs. Through our support activities we came across an interesting issue concerning collaboration with people from heterogeneous backgrounds. We call this problem disaster communications in this paper. We found that trust plays an important role in such communications. In this paper we report our experiences during our support activities and our findings.

Source

trust

The Role of Trust in Successful Ecommerce Websites in China: Field Observations and Experimental Studies

Eric K. Clemons, Fujie Jin, Josh Wilson, Fei Ren, Christian Matt, Thomas Heß, Noisian Koh
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2013-01-01
From feed: TITLE("trust")) + IS Conference

The ecommerce market in China is both the largest online market in the world and the market with the greatest number of low quality or counterfeit product offerings. We examine three very successful online companies in China and their very different paths to success and then use our experience to develop testable hypotheses, as proposed by Eisenhardt and Graebner. We present our hypotheses and then discuss the experiments that were conducted in China, the United States, Germany, and Singapore in order to test these hypotheses. We expected to see that the role of reputation is critical in China, and that it is more critical in China than in ecommerce markets elsewhere. Consistent with our hypotheses, we find first that vendor reputation is indeed the most important factor influencing consumers' willingness to shop at and willingness to pay for goods from a specific vendor in China and elsewhere. We find only limited support for our hypotheses concerning the role of risk mitigation mechanisms in general, but we do find support for the hypothesis that the Chinese online markets differ from online markets elsewhere.

Source

trust

Success of Multi Criteria Decision Support Systems: The Relevance of Trust

Martina Maida, Konradin Maier, Nikolaus Obwegeser, Volker Stix
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2013-01-01
From feed: TITLE("trust")) + IS Conference

In recent years the concept of trust has found its way into Information Systems research, especially in the field of technology acceptance. Trust is considered an important driver for the success of technologies. In this context, trust is particularly relevant for Multi Criteria Decision Support Systems (MCDSS), due to the inherent complexity of the methods and the often high impact of the underlying decision. In the course of this paper we present a consolidated view on different dimensions of trust and use a multidimensional model to discuss the specific characteristics and dynamics of trust in MCDSS. Using a quantitative empirical study we were able to confirm our theoretical findings and validate the proposed model empirically. After a discussion of the results we conclude our paper and suggest some areas for further research.

Source

trust

An Evaluation of Trust Development in Group Collaborations: A Longitudinal Case Study

Xusen Cheng, Aida Azadegan, Gwendolyn L. Kolfschoten
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2013-01-01
From feed: TITLE("trust")) + IS Conference

Trust is referred to as a key facilitator in team collaborations. Evidence shows that different levels of trust are related to different qualities of team collaboration. A lack of trust development in teams presents a significant challenge in group collaboration. In this paper", " we review factors associated with the establishment of trust in hybrid teams that collaborate virtually as well as face to face. Further we deliver an instrument to understand trust development in teams. We describe exploratory results of the instrument by running experiments with teams of collaborating students. Finally, in the analysis of the experiments we describe patterns of trust development in groups from both individual and group perspectives.

Source

trust

The Moderating Role of Virtuality on Trust in Leaders and the Consequences on Performance

Bettina C. Riedl, Julia V. Gallenkamp, Arnold Picot
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2013-01-01
From feed: TITLE("trust")) + IS Conference

Virtual leadership is a phenomenon that has strongly risen in importance in recent years. Therefore, the study at hand took a closer look at the way in which virtuality affects the trust in leaders, which again influences the performance of employees. In a questionnaire, in which 121 participants took part, the influence of virtuality on the relationship between the trustworthiness of a team-leader and the trust in that leader was investigated. Moreover, the effect of trust on the performance was examined. Thereby, virtuality was split into the two components geographical and temporal/cultural virtuality based on Chudoba, Wynn, Lu, and Watson-Manheim [1], trustworthiness, a proven antecedent of trust for non-virtual contexts was split into its three components ability, integrity and benevolence [2], and performance was assessed by the participants' general work satisfaction and their in-role performance. The results showed that, as hypothesized, the virtuality of the relationship between leader and employee significantly influenced the relationship between trustworthiness and trust. Furthermore, the perceived trust significantly influenced both performance measures. However, the influence of virtuality on the relationship between trustworthiness and trust was more complex than expected. Only geographical virtuality moderated the relationship of ability on trust, and temporal/cultural virtuality moderated the relationship of benevolence on trust. The relationship of the leader's integrity and trust was not moderated by the virtuality of the context at all. Interestingly, our data did not support a direct connection between the perceived ability of a leader and the trust in that leader. Theoretical and practical implications of these results are highlighted.

Source

trust

Technology Trust: From Antecedents to Perceived Performance Effects

Hannu Kivijärvi, Akseli Leppänen, Petri Hallikainen
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2013-01-01
From feed: TITLE("trust")) + IS Conference

The objective of this research is to study the antecedents of technology trust and its perceived consequences. The purpose is first to find potential factors behind the technology trust, evaluate their significance empirically, and then assesses the relationship between technology trust and perceived performance. Special attention is given to the behavior of technologists, people who have technological education, experience, and who are currently working in a high-tech organization. Empirical results confirm the underlying roles of social, institutional and technological dimensions behind the technology trust and, as a consequence, the explaining power of the trust on perceived organizational performance.

Source

trust

[PDF] A trust vector approach to transaction context-aware trust evaluation in e-commerce and e-service environments

Haibin Zhang, Yan Wang, Xiuzhen Zhang
Proceedings 2012 5th IEEE International Conference on Service Oriented Computing and Applications Soca 2012
Published: 2012-12-01
From feed: TITLE("trust")) + IS Conference

At some e-commerce websites (such as eBay), a trust value of a seller is computed based on the ratings of past transactions given by buyers, which can only reflect the general or global trust level of a seller without any transaction context information taken into account. As a result, a buyer may be easily deceived by a malicious seller in a forthcoming transaction. For example, with the notorious value imbalance problem, a malicious seller can build up a high trust level by selling cheap products and then start to deceive buyers in selling expensive products. In this paper, we first model all contextual transaction factors that reflect the nature of transactions, and thus influence the evaluation of transaction trust. In addition, instead of providing a single trust value, we propose a trust vector approach that takes into account the contextual factors in transactions. Our model systematically categorize these factors into service aspect and transaction aspect. In particular, the computation of the elements in this trust vector is associated with both the context of past transactions and the context of a forthcoming transaction, so as to comprehensively indicate the trust level of a seller for the forthcoming transaction. The computed trust vector can be taken as the reputation profile of the seller. Empirical studies illustrate that it is important and necessary to introduce contextual transaction factors in evaluating the trust level of sellers objectively.

Source

trust

Testing transitive trust algorithms for use in information quality assessment

Marek Šajna
Icsess 2012 Proceedings of 2012 IEEE 3rd International Conference on Software Engineering and Service Science
Published: 2012-06-01
From feed: TITLE("trust")) + IS Conference

Information quality (IQ) in the World Wide Web is stagnant; thus there is a constant need for IQ assessment techniques. Our research works towards a model, which would employ community-driven personalization with the help of trust metrics. This paper presents results from a series of experiments, which have proven the feasibility and suitability of two transitive trust algorithms for our research. Furthermore, we have benchmarked their effectiveness in the test environment.

Source

trust

An adaptive and Socially-Compliant Trust Management System for virtual communities

Reda Yaich, Olivier Boissier, Philippe Jaillon, Gauthier Picard
Proceedings of the ACM Symposium on Applied Computing
Published: 2012-03-26
From feed: TITLE("trust")) + IS Conference

Virtual communities (VCs) are open socio-technical structures wherein autonomous entities (i.e. agents) with common objectives join together to mutually satisfy their goals. The success of these communities relies on collaboration and resource sharing principals, making trust a critical issue for each member. Such environments motivate the need for more flexible trust models wherein both individual (i.e. user-centred) and collective (i.e. community-centred) trust requirements are considered in the decision making-process.

Source

trust

Preference-oriented QoS-based service discovery with dynamic trust and reputation management

Zeinab Noorian, Michael W. Fleming, Stephen Marsh
Proceedings of the ACM Symposium on Applied Computing
Published: 2012-03-26
From feed: TITLE("trust")) + IS Conference

In the presence of a variety of service providers that offer web services with overlapping or identical functionality, service consumers need a mechanism to distinguish one service from another based on their own subjective quality of service (QoS) preferences. Typical approaches in this field rely on trusted third parties to monitor the behaviour of service providers and endorse their performance based on their delivered services to different users. However, the issue of evaluating the credibility of user reports is one of the essential problems yet to be solved in the e-Business application area. In this paper we propose a two-layered preference-oriented service selection framework that integrates trust and reputation management techniques with an advanced procurement auction model in order to choose the most pertinent service provider that meets a consumer's QoS requirements. We will give a formal description of our approach and validate it with experiments demonstrating that our solution yields high-quality results under various realistic circumstances.

Source

trust

An XML-based protocol for improving trust negotiation between Web Services

Yunxi Zhang, Tanko Ishaya
Proceedings of the ACM Symposium on Applied Computing
Published: 2012-03-26
From feed: TITLE("trust")) + IS Conference

This paper aims to propose an XML-based protocol for two Web Services to utilise TN to establish a trust relationship between them. The main contribution of this protocol is towards preventing failed TN caused by the file format interoperability problem by checking file formats before TN processes. This will increase communication efficiency between WS.

Source

trust

Introduction to Reliability, Security and Trust Minitrack

Jeff Dagle
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2012-01-01
From feed: TITLE("trust")) + IS Conference

This minitrack focuses on topics related to advanced concepts to enhance reliability, and security and trust issues associated with operating the future electric power infrastructure. The increasing reliance of the electric power industry on information technologies introduces a new class of cyber vulnerabilities and threats to the electric power infrastructure that are only beginning to be effectively addressed through common industry standards and best practices. In addition, we invite papers that examine issues of resiliency and secure interoperability of future grid systems. This minitrack will explore the application of these technologies that are being considered to enhance the reliability of the rapidly evolving modern electric power system, and the associated cyber security issues associated with these and related technologies.

Source

trust

Predicting Users' Perceived Trust in Embodied Conversational Agents Using Vocal Dynamics

Aaron Elkins, Douglas C. Derrick, Judee K. Burgoon, Jay F. Nunamaker
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2012-01-01
From feed: TITLE("trust")) + IS Conference

One of the major challenges facing neurophysiological HCI design is to determine the systems and sensors that accurately and noninvasively measure human cognitive processes. Specifically, it is a significant undertaking to integrate sensors and measurements into an information system and accurately measure and interpret the human state. Using an experimental design this study explores the use of unobtrusive sensors based on behavioral and neurophysiological responses to predict human trust using the voice. Participants (N=88) completed a face-to-face interview with an Embodied Conversational Agent (ECA) and reported their perceptions of the ECA. They reported three dimensions consistent with the Mayer model of perceived trustworthiness. During the interaction, the demeanor and gender of the avatar was manipulated and these manipulations affected the reported measures of trustworthiness. Using growth modeling and multilevel analysis of covariance methods, a model was developed that could predict human trust during the interaction using the voice, time, and demographics.

Source

trust

Partitioning Trust in Network Testbeds

Gary Wong, Robert Ricci, Jonathon Duerig, Leigh Stoller, Srikanth Chikkulapelly, Woojin Seok
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2012-01-01
From feed: TITLE("trust")) + IS Conference

Traditionally, test beds for networking and systems research have been designed as monolithic facilities: they contain a single root of trust. The resources in the facility are assumed to be administered by a single entity or a set of mutually-trusting entities. All user management, including vouching for users' identities and taking responsibility for their actions, is done using a flat trust structure or a simple hierarchy with the facility itself as the root. This design is not a good match for test beds that are composed of multiple autonomous facilities, or in which different parts of the test bed operate under different trust models. In this paper, we argue that partitioned trust is increasingly important in large scale and security-sensitive test beds. We present a design that accomplishes this partitioning by using multiple trust roots. The trust domains created by these roots may decide, independently, how much trust to place in each other, and can apply policies based on the domain or principal that originates a request. The domains could represent separately administered facilities (as in a federated test bed), or they could represent sections within a single facility that run with different trust models (for example, with differing levels of security.) We have implemented this design in ProtoGENI, a control framework for federated test beds, we include details of this implementation and share experiences from using it in an active deployment with hundreds of users.

Source

trust

Communicator Trust across Media: A Comparison of Audio Conferencing, Video Conferencing, and a 3D Virtual Environment

Nicholas S. Lockwood, Anne Massey
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2012-01-01
From feed: TITLE("trust")) + IS Conference

Geographically dispersed teams rely on information and communication technologies (ICTs) to communicate and collaborate. Three ICTs that have received attention are audio conferencing (AC), video conferencing (VC), and, recently, 3D virtual environments (3D VEs). These ICTs represent communication media that differ in the number and type of cues available. In this study, the media are compared using a media determinant theories and uncertainty reduction theory. It is argued that differences among these media will impact perceptions of trust toward a communicator. An experimental task was utilized to collect repeated measures data on individual perceptions. Results of the analysis provide partial support for the hypotheses, but the effects seem to change over time. Potential explanations include an unanticipated priming effect due to the repeated measures nature of the survey. This explanation is discussed, along with implications, limitations, and directions for future research.

Source

trust

Exploring the State of Discipline on the Formation of Swift Trust within Global Virtual Teams

Shafiz Affendi Mohd Yusof, Norhayati Zakaria
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2012-01-01
From feed: TITLE("trust")) + IS Conference

The study of global virtual teams (GVTs) is important in the Information System (IS) field because GVTs employ a work structure that is heavily dependent on information communication technology. Besides the use of technology, GVTs are also composed of people from different cultural backgrounds. As such, GVTs are challenged not only to collaborate and coordinate projects in a virtual environment, but also to promote a trusting working relationship among culturally diverse members. In this meta-synthesis research, we sampled 3239 documents spanning fifteen (15) years, from 1995-2010 in seven (N=7) top IS journals. Trained coders read through all the articles systematically and coded the contents manually, only 55 useable articles were found that matched three or four of the codes (i.e., GVTs, virtual teams, trust, and swift trust). In the 15-year period, we found a startling result: less than 2% of articles published in the selected top IS journals have discussed this crucial topic. Hence, many more studies are warranted in order for the topic to be fully understood by IS scholars. We present the findings based on two thematic analyses: 1) GVTs vs. virtual teams and 2) GVT and trust and swift trust.

Source

trust

The Special Challenges of Ecommerce in China: A Preliminary Investigation of Sufficient Conditions for Generating Adequate Consumer Trust for Initial Launch

Eric K. Clemons, Fujie Jin, Fei Ren, Wang Ying, Josh Wilson
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2012-01-01
From feed: TITLE("trust")) + IS Conference

The ecommerce market in China is both the largest online market in the world and the one with the greatest number of low quality or counterfeit product offerings. Using case studies to develop testable hypotheses, as proposed by Eisenhardt and Graebner, we examine three very successful online companies in China and their very different paths to success. Our findings suggest that offering promises, assurances, and guarantees to consumers is not sufficient, because it is relatively easy for low quality sellers to offer counterfeit promises along with counterfeit products. We do find that promises backed up reputational capital can be sufficient to generate necessary online trust, and that actions must be taken to maintain quality in order to maintain trust. We understand the limitations of the work: since the same dataset cannot be used both to generate hypotheses and to test them we view this work as theory generation and not theory testing.

Source

trust

[PDF] Trust-Based Service Discovery in Multi-relation Social Networks

Amine Louati, Joyce El Haddad, Suzanne Pinson
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics.
Published: 2012-01-01
From feed: TITLE("trust")) + IS Conference

written by Amine Louati, Joyce El Haddad, Suzanne Pinson Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics.

Source | Open access

trust

[PDF] Examining Trust within the Team in IT Startup Companies--An Empirical Study in the People's Republic of China

Oliver Oechslein, Andranik Tumasjan
Proceedings of the Annual Hawaii International Conference on System Sciences.
Published: 2012-01-01
From feed: TITLE("trust")) + IS Conference

The People's Republic of China has shown strong economic growth rates within the last years, which can in part be attributed to the increasing foundation of startup companies, especially in the IT sector. Due to a lack of familiarity with novel situations, it is difficult for entrepreneurial teams to operate successfully during the first years after starting out. Previous research suggests that high levels of trust within the team can mitigate these difficulties and positively influence the relational capital that in turn is beneficial for the success of startup companies. The present study analyzes influencing variables on the relational capital dimension trust within IT startup companies in China. The results show that the innovativeness of a business idea as well as the business growth potential have a positive impact on trust within the entrepreneurial team, especially if the team consists of Chinese - as opposed to non-Chinese - startup founders.

Source | Open access

trust

Building Trust in Online Customers

George Coles, William Smart
Proceedings 2011 12th Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing Snpd 2011
Published: 2011-07-01
From feed: TITLE("trust")) + IS Conference

Although significant progress has been made towards securing the Internet environment, many consumers remain reluctant to participate in making on-line purchases. Cyber-crime continues to have a negative influence upon the uptake and acceptance of E-Commerce by consumers. As a result commercial website operators are faced with the problem of overcoming user distrust in the systems. The main argument put forward in this paper is that a consumer's trust depends more upon traditional marketing strategies than it does upon their beliefs in the security of on-line systems. In many cases these issues have been overlooked by web developers and vendors alike. The main conclusions of the study indicate that website design can have a positive effect on aconsumer's willingness to purchase from a website. Much responsibility for reinforcing trust in consumers lies with web developers. This can be achieved by making efforts to educate and engender trust in visitors through the overall design and informational content of the website itself and through the careful selection and combination of website design components.

Source

trust

The trust principles: The guidance of trust creation in e-commerce

Liangfang Huang, Lingling Wang
Icsess 2011 Proceedings 2011 IEEE 2nd International Conference on Software Engineering and Service Science
Published: 2011-07-01
From feed: TITLE("trust")) + IS Conference

E-commerce is developing very fast and has achieved remarkable achievement in China. However, a series of ethical issues especially true crisis occur in e-commerce development. And trust issue is the biggest concern in e-commerce. For the long term, creating the integrity image for transaction parties is an important approach for keeping e-commerce developing healthily in China. The paper discusses the trust issue and uses the Trust Principles to analyze the trust situation in Chinese e-commerce. As the result, the paper proposes some suggestions and solutions to address the trust crisis in e-commerce.

Source

trust

Socio-technical developer networks

Andrew Meneely, Laurie Williams
Proceedings International Conference on Software Engineering
Published: 2011-05-21
From feed: TITLE("trust")) + IS Conference

Software development teams must be properly structured to provide effectiv collaboration to produce quality software. Over the last several years, social network analysis (SNA) has emerged as a popular method for studying the collaboration and organization of people working in large software development teams. Researchers have been modeling networks of developers based on socio-technical connections found in software development artifacts. Using these developer networks, researchers have proposed several SNA metrics that can predict software quality factors and describe the team structure. But do SNA metrics measure what they purport to measure? The objective of this research is to investigate if SNA metrics represent socio-technical relationships by examining if developer networks can be corroborated with developer perceptions. To measure developer perceptions, we developed an online survey that is personalized to each developer of a development team based on that developer's SNA metrics. Developers answered questions about other members of the team, such as identifying their collaborators and the project experts. A total of 124 developers responded to our survey from three popular open source projects: the Linux kernel, the PHP programming language, and the Wireshark network protocol analyzer. Our results indicate that connections in the developer network are statistically associated with the collaborators whom the developers named. Our results substantiate that SNA metrics represent socio-technical relationships in open source development projects, while also clarifying how the developer network can be interpreted by researchers and practitioners.

Source

trust

Entering the circle of trust

Vibha Singhal Sinha, Senthil Mani, Saurabh Sinha
Proceedings International Conference on Software Engineering
Published: 2011-05-21
From feed: TITLE("trust")) + IS Conference

The success of an open-source project depends to a large degree on the proactive and constructive participation by the developer community. An important role that developers play in a project is that of a code committer. However, code-commit privilege is typically restricted to the core group of a project. In this paper, we study the phenomenon of the induction of external developers as code committers. The trustworthiness of an external developer is one of the key factors that determines the granting of commit privileges. Therefore, we formulate different hypotheses to explain how the trust is established in practice. To investigate our hypotheses, we developed an automated approach based on mining code repositories and bug-tracking systems. We implemented the approach and performed an empirical study, using the Eclipse projects, to test the hypotheses. Our results indicate that, most frequently, developers establish trust and credibility in a project by contributing to the project in a non-committer role. Moreover, the employing organization of a developer is another factor--although a less significant one--that influences trust.

Source

trust

A formal approach towards measuring trust in distributed systems

Guido Schryen, Melanie Volkamer, Sebastian Ries, Sheikh Mahbub Habib
Proceedings of the ACM Symposium on Applied Computing
Published: 2011-03-21
From feed: TITLE("trust")) + IS Conference

Emerging digital environments and infrastructures, such as distributed security services and distributed computing services, have generated new options of communication, information sharing, and resource utilization in past years. However, when distributed services are used, the question arises of to what extent we can trust service providers to not violate security requirements, whether in isolation or jointly. Answering this question is crucial for designing trustworthy distributed systems and selecting trustworthy service providers. This paper presents a novel trust measurement method for distributed systems, and makes use of propositional logic and probability theory. The results of the qualitative part include the specification of a formal trust language and the representation of its terms by means of propositional logic formulas. Based on these formulas, the quantitative part returns trust metrics for the determination of trustworthiness with which given distributed systems are assumed to fulfill a particular security requirement.

Source

trust

Hierarchical trust management for wireless sensor networks and its application to trust-based routing

Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho
Proceedings of the ACM Symposium on Applied Computing
Published: 2011-03-21
From feed: TITLE("trust")) + IS Conference

In this work, we propose a highly scalable cluster-based hierarchical trust management protocol for wireless sensor networks to effectively deal with selfish or malicious nodes. Unlike prior work, we consider multidimensional trust attributes derived from communication and social networks to evaluate the overall trust of a sensor node. Our peer-to-peer trust evaluation method leverages the cluster-based hierarchical structure for efficient communications. We develop a probability model using stochastic Petri net techniques to analyze the performance of the proposed trust management protocol. We validate the protocol design by comparing subjective trust generated as a result of protocol execution against objective trust obtained from actual node status. We apply our hierarchical trust management protocol to trust-based geographical routing as an application. Our results demonstrate that trust-based geographic routing under identified design settings can approach the ideal performance level achievable by flooding-based routing in message delivery ratio and message delay without incurring substantial message overhead. Furthermore, it can significantly outperform traditional geographic routing protocols that do not use trust concept in selecting forwarding nodes in message delivery ratio over a wide range of design parameter settings.

Source

trust

[PDF] Credibility-Based Trust Management for Services in Cloud Environments

Talal H. Noor, Quan Z. Sheng
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics.
Published: 2011-01-01
From feed: TITLE("trust")) + IS Conference

written by Talal H. Noor, Quan Z. Sheng Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics.

Source | Open access

trust

Citizen Perspectives on Trust in a Public Online Advanced Traveler Information System

Benjamin Schooley, Dolly Amy Harold, Thomas A. Horan, Richard Burkhard
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2011-01-01
From feed: TITLE("trust")) + IS Conference

The role of government in providing services to the citizen has been dramatically transformed with the evolution of the Internet and information and communication technologies. Now, government electronic services must not only be effective in their delivery but must also invoke citizen engagement in order to realize its significant contribution. Previous e-Government research has shown that trust in government electronic services is a critical factor in invoking citizen engagement. This study uses a grounded methods approach to understanding factors that affect citizen attitudes toward an online advanced traveler information system (ATIS) in Minneapolis, MN as elicited from users. Focus group discussions were analyzed to identify patterns that signify trust in e-Government systems. The results of this qualitative study include the elements of trust that are important to citizens using e-Government systems, not only as it applies to the online information systems, but in relation to the physical service that the online service represents.

Source

trust

Trust over Time and Distance in Global Partially Distributed Teams

Linda Plotnick, Starr Roxanne Hiltz, Rosalie J. Ocker
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2011-01-01
From feed: TITLE("trust")) + IS Conference

Partially Distributed Teams (PDTs), increasingly common in this global economy, have some collocated members in subteams but the subteams are distributed over geographic distance. Trust is crucial for effective team functioning and may be even more so in PDTs which have unique characteristics that can impede the development and maintenance of trust. In a quasi-experimental field study we examine the dimensions of trust, how trust changes over time, and the effects of temporal and cultural distance on trust in PDTs composed of subteams from 8 nations. Results indicate that in PDTs, early trust predicts later trust, trust is multidimensional, and can increase over time. Variations in trust by temporal and cultural distance between the subteams in PDTs are more inconsistent than anticipated and the relationship with cultural distance decreases over time.

Source

trust

Trust Management and Security in the Future Communication-Based "Smart" Electric Power Grid

Jose E. Fadul, Kate Hopkinson, Christopher Sheffield, James T. Moore, Todd R. Andel
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2011-01-01
From feed: TITLE("trust")) + IS Conference

New standards and initiatives in the U.S. electric power grid are moving in the direction of a smarter grid. Media attention has focused prominently on smart meters in distribution systems, but big changes are also occurring in the domains of protection, control, and Supervisory Control and Data Acquisition (SCADA) systems. These changes promise to enhance the reliability of the electric power grid and to allow it to safely operate closer to its limits, but there is also a real danger concerning the introduction of network communication vulnerabilities to so-called cyber attacks. This article advocates the use of a reputation-based trust management system as one method to mitigate such attacks. A simulated demonstration of the potential for such systems is illustrated in the domain of backup protection systems. The simulation results show the promise of this proposed technique.

Source

trust

Spyware Knowledge in Anti-Spyware Program Adoption: Effects on Risk, Trust, and Intention to Use

Dong-Heon Kwak, Donna McAlister Kizzier, Euisung Jung
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2011-01-01
From feed: TITLE("trust")) + IS Conference

Spyware is a serious threat, posing severe privacy and security issues. The best way for users to reduce the threat from spyware is to adopt anti-spyware programs. While previous studies have identified various determinants of anti-spyware adoption, some factors have not yet been examined. Based on the theory of reasoned action, this study presents a parsimonious model for users' intention to adopt anti-spyware programs. Structural equation modeling is used to empirically test a model. Every hypothesis is supported except the relationship between Internet familiarity and knowledge of spyware. This study concludes with discussions and implications for research and practice..

Source

trust

Sociotechnical Trust: An Architectural Approach

Amit K. Chopra, Elda Paja, Paolo Giorgini
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2011-01-01
From feed: TITLE("trust")) + IS Conference

written by Amit K. Chopra, Elda Paja, Paolo Giorgini Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

[PDF] A behaviour-based trust model for service web

‪Surya Nepal‬, Wanita Sherchan, Athman Bouguettaya
Proceedings 2010 IEEE International Conference on Service Oriented Computing and Applications Soca 2010.
Published: 2010-12-01
From feed: TITLE("trust")) + IS Conference

We propose a novel reputation based trust model that builds upon the behaviour of services interacting within communities. The proposed model is based on the Boltzmann behaviour model and considers the behaviour of consumers under the social influence. We evaluate the proposed model and discuss the corresponding results. We also include a comparison with feedback-based models in the presence of high impact events.

Source | Open access

trust

Study on supplier bi-directional selection based on synthesize trust degree

Xiaofeng Liu, Zhao Xun-wei
Proceedings 2010 IEEE International Conference on Software Engineering and Service Sciences Icsess 2010
Published: 2010-07-01
From feed: TITLE("trust")) + IS Conference

Because of different trust between suppliers lead to make different trust degree in supply chain, and the trust degree between suppliers is bi-directional, so a supplier bi-directional and two-stage selection model was constructed based on trust degree, according to trust degree distribution matrix of suppliers and cooperative game to bi-directional select suppliers.

Source

trust

A citizen trust model for e-government

Yan Liu, Changfeng Zhou
Proceedings 2010 IEEE International Conference on Software Engineering and Service Sciences Icsess 2010
Published: 2010-07-01
From feed: TITLE("trust")) + IS Conference

Trust in e-government is an important idea that should be critically investigated to help citizen favorably share information and make online transaction with government. This study aims to establish an e-government trust model from the behavioral perspectives of citizen. Based on the Technology Acceptance Model (TAM) and Customer Relationship Management (CRM), the study proposes an intergraded model of e-government citizen trust. An online survey is undertaken. The target population is citizens who have experienced with browsing and searching for the information in e-government web portals. Using Partial Least Squares approach, a highly statistically significant goodness-of-fit is found for the model. The findings indicate that perceived usefulness, perceived ease of use, perceived security and perceived risk, directly enhance the citizen trust in e-Government.

Source

trust

What is trust in a recommender for software development?

Gail C. Murphy, Emerson Murphy-Hill
Proceedings International Conference on Software Engineering
Published: 2010-05-04
From feed: TITLE("trust")) + IS Conference

Many recommendation systems have been built to aid software developers. Few have been evaluated using human-based evaluation strategies. In studying situations where recommendation systems have been used or might be used, we have observed that issues related to trust are important to a developer's acceptance of recommendations. In this position paper, we outline the trust issues that we have identified and suggest some mechanisms for promoting trust in recommendation systems aimed at software developers.

Source

trust

SourceRank

Raju Balakrishnan, Subbarao Kambhampati
Proceedings of the 19th International Conference on World Wide Web Www 10
Published: 2010-04-26
From feed: TITLE("trust")) + IS Conference

One immediate challenge in searching the deep web databases is source selection - i.e. selecting the most relevant web databases for answering a given query. The existing database selection methods (both text and relational) assess the source quality based on the query-similarity-based relevance assessment. When applied to the deep web these methods have two deficiencies. First is that the methods are agnostic to the correctness (trustworthiness) of the sources. Secondly, the query based relevance does not consider the importance of the results. These two considerations are essential for the open collections like the deep web. Since a number of sources provide answers to any query, we conjuncture that the agreements between these answers are likely to be helpful in assessing the importance and the trustworthiness of the sources. We compute the agreement between the sources as the agreement of the answers returned. While computing the agreement, we also measure and compensate for possible collusion between the sources. This adjusted agreement is modeled as a graph with sources at the vertices. On this agreement graph, a quality score of a source that we call SourceRank, is calculated as the stationary visit probability of a random walk. We evaluate SourceRank in multiple domains, including sources in Google Base, with sizes up to 675 sources. We demonstrate that the SourceRank tracks source corruption. Further, our relevance evaluations show that SourceRank improves precision by 22-60% over the Google Base and the other baseline methods. SourceRank has been implemented in a system called Factal.

Source

trust

A framework for trust establishment and assessment on the web of data

Qi Gao, Geert‐Jan Houben
Proceedings of the 19th International Conference on World Wide Web Www 10
Published: 2010-04-26
From feed: TITLE("trust")) + IS Conference

With the enormous and still growing amount of data and user interaction on the Web, it becomes more and more necessary for data consumers to be able to assess the trustworthiness of data on the Web. In this paper, we present a framework for trust establishment and assessment on the Web of Data. Different from many approaches that build trust metrics within networks of people, we propose a model to represent the trust in concrete pieces of web data for a specific consumer, in which also the context is considered. Further more, we provide three strategies for trust assessment based on the principles of Linked Data, to overcome the shortcomings of the conventional web of documents: i.e. the lack of semantics and interlinking.

Source

trust

iTrust

Kuldeep Yadav, Avinash Srinivasan
Proceedings of the ACM Symposium on Applied Computing
Published: 2010-03-22
From feed: TITLE("trust")) + IS Conference

Designing security solutions for Wireless Sensor Networks is a challenging task due to the potential hostile and unattended environment in which they operate as well as their resource constrained nature. A trust management framework can be useful for detecting untrustworthy nodes under such operational conditions. In an unattended autonomous network, the attacker can capture a sensor node and modify its regular functioning. Consequently, the compromised node will thereafter behave erratically, which, in most cases, is observable by nodes in the corresponding neighborhood. In this paper, we propose iTrust- an integrated trust framework in which monitor nodes, a set of specialty nodes, will evaluate neighborhood nodes based on their behavior in a session wise manner. Monitor nodes, in promiscuous mode, will garner information about nodes in their neighborhood. After each session, they will share trust indices of each node with their neighbors, which is used for future decision-making. We have simulated iTrust framework with a tolerance of 5%--25% network error rate and evaluated its performance. We have further evaluated the attack detection effectiveness of iTrust framework by simulating different attack scenarios and confirmed its robustness to several known attacks.

Source

trust

Computing multi-party trust privately

Shlomi Dolev, Niv Gilboa, Marina Kopeetsky
Proceedings of the ACM Symposium on Applied Computing
Published: 2010-03-22
From feed: TITLE("trust")) + IS Conference

Schemes for multi-party trust computation are presented. The schemes do not make use of a Trusted Authority. The schemes are more efficient than previous schemes by the number of messages exchanged which is proportional to the number of participants rather than to a quadratic number of the participants. We note that in our schemes the length of each message may be larger than the message length of previous schemes. The calculation of a trust, in a specific user by a group of community members, starts upon a request of an initiating user. The trust computation is provided in a completely distributed manner, while each user calculates its trust value privately. Given a community C and its members (users) U1, ..., Un, we present computationally secure schemes for trust computation. The first Accumulated Protocol AP computes the average trust in a specific user Ut upon the trust evaluation request initiated by a user Un. The exact trust values of each queried user are not disclosed to Un. The next Weighted Accumulated protocol WAP generates the average weighted trust in a specific user Ut taking into consideration the unrevealed trust that Un has in each user participating in the trust process evaluation. We extend our schemes to the case when the initiating user Un can be compromised by the adversary, and we introduce the Multiple Private Keys M P K P and the Multiple Private Keys Weighted M P W P protocols for computing average unweighted and weighted trust, respectively. The computation of all our algorithms requires the transmission of O(n) (possibly large) messages.

Source

trust

T2D

Rachid Saadi, Jean‐Marc Pierson, Lionel Brunie
Proceedings of the ACM Symposium on Applied Computing
Published: 2010-03-22
From feed: TITLE("trust")) + IS Conference

While the trust paradigm is essential to broadly extend the communication between the environment's actors, the evaluation of trust becomes a challenge when confronted with initializing the trust relationship and validating the transitive propriety of trust. Whether between users or between organizations, existing solutions work to create for peer to peer networks, flexible and decentralized security mechanisms with trust approach. However, we have noticed that the trust management systems do not make the most of the subjectivity, more specifically, the notion of Disposition to Trust although this aspect of subjectivity has a strong influence on how to assess direct and a transitive trust. For this reason in our study, we tackle this problem by introducing a new distributed trust model called T2D (Trust to Distrust) which is designed to incorporate the following contributions: (i) A behavior model which represents the Disposition to Trust; (ii) Initialization of trust relationship (direct and transitive) according to the defined behavior model.

PDF | Source

trust

Evaluating trust in grid certificates

David O'Callaghan, Louise Doran, Brian Coghlan
Proceedings of the ACM Symposium on Applied Computing
Published: 2010-03-22
From feed: TITLE("trust")) + IS Conference

Digital certificates are used to secure international computation and data storage grids used for e-Science projects, like the Worldwide Large Hadron Collider Computing Grid. The International Grid Trust Federation has defined the Grid Certificate Profile: a set of guidelines for digital certificates used for grid authentication. We have designed and implemented a program and related test suites for checking X.509 certificates against the certificate profiles and policies relevant for use on the Grid. The result is a practical tool that assists implementers and users of public key infrastructures to reach appropriate trust decisions.

Source

trust

Leveraging Social Networks to Embed Trust in Rideshare Programs

Vineeta Chaube, Andrea Kavanaugh, Manuel A. Pérez-Quiñones
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2010-01-01
From feed: TITLE("trust")) + IS Conference

Traffic congestion, high gas price and inadequate public transportation are major challenges for any country, business or individual. The traditional approach to solving these problems has been to improve public transportation and use greener energy. These approaches require huge investment, research and time, and can only be carried out by governments or businesses. An alternative solution seeks to reduce the number of vehicles on the road based on ridesharing. Nevertheless, ridesharing is not a popular form of public transportation.In this paper, we summarize the results of a rideshare needs assessment survey conducted within the [university] community. The purpose behind this study was to understand commuter travel patterns, their needs and to identify their preferences for private vehicles and public transit for a variety of travel needs. Our results indicate that users are willing to increase participation in ridesharing programs if three core issues are addressed - trust, convenience and incentives.

Source

trust

What Does Your Online Pharmacy Signal? A Comparative Analysis of Website Trust Features

Tamilla Mavlanova, Raquel Benbunan‐Fich
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2010-01-01
From feed: TITLE("trust")) + IS Conference

The growth of electronic commerce has offered a new channel for the commercialization of pharmaceutical products. While regulated online pharmacies offer convenient distribution of drugs, unregulated online vendors create risks for consumers by promoting medicines of unknown origin and jeopardizing sensitive medical information. Using the signaling theory and a comparative content analysis, this study examines a set of website trust features that distinguishes regulated and unregulated online pharmacies. This investigation is aimed at identifying observable signals that online pharmacies use to induce trust. The results enhance our understanding of trust related signals and help online buyers and regulatory institutions in the evaluation of online pharmacies.

Source

trust

Efficiency, Trust, and Visual Appeal: Usability Testing through Eye Tracking

Soussan Djamasbi, Marisa Siegel, Tom Tullis, Rui Dai
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2010-01-01
From feed: TITLE("trust")) + IS Conference

Creating a positive user experience is a fundamental element of producing a successful web page. Three important components of user experience are visual appeal, trust, and efficiency. This study extends past research by examining the effect of images of faces on the visual appeal, efficiency, and trustworthiness of a page. Data is collected using both subjective ratings and objective measurements, including eye tracking. Analysis indicates that users find a page that has images of people's faces more appealing than a page that has no images of faces and perform tasks more quickly when there are faces present. Additionally, analysis reveals a strong positive correlation between trusting the informational content of a page and its visual appeal. This research has important implications for theory and practical applications.

Source

trust

Trust but Verify Critical Infrastructure Cyber Security Solutions

Dennis K. Holstein, Keith Stouffer
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2010-01-01
From feed: TITLE("trust")) + IS Conference

Critical infrastructure cyber security solutions for industrial control systems are touted by the sellers as standards-based and comprehensive. Buyer beware, most of these claims are highly exaggerated. Only the International Society for Automation (ISA) is developing standards that are comprehensive in the sense that cyber security requirements control systems are defined as an extension of the security policies for the enterprise. Furthermore, these ISA standards include requirements that account for the dynamics induced by human behavior and the constraints imposed by external interfaces that are not directly controlled by the enterprise owner. This paper describes the seven foundational requirements codified in ISA-99.01-01 and the derived system requirements and metrics. The paper concludes with example security metrics recommended to verify the quality of cyber solutions offered.

Source

trust

What Is Trust in E-Government? A Proposed Typology

Panagiota Papadopoulou, Maria Nikolaidou, Drakoulis Martakos
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2010-01-01
From feed: TITLE("trust")) + IS Conference

Trust in e-government is of vital importance for the effective adoption and use of electronic public services. Understanding the concept of trust and the different types it involves in the e-government context is a key challenge for both research and practice. Aiming to address this need, this paper proposes a parsimonious yet comprehensive typology of trust in e-government. Trust in e-government is analyzed into seven different types conceptualized around the different targets they are related to. Each trust type is further delineated into its composing dimensions and the approach by which it can enabled. The paper continues to present an example of the practical applicability of the proposed typology by showing how the identified types of trust have been addressed in an online taxation portal.

Source

trust

Trust in Government Cross-Boundary Information Sharing Initiatives: Identifying the Determinants

J. Ramón Gil-García, Ahmet Güler, Theresa A. Pardo, Geraldine Burke
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2010-01-01
From feed: TITLE("trust")) + IS Conference

This paper identifies a set of determinants of trust in government cross-boundary information sharing (CBI) initiatives. Although there are some studies that identify the antecedents of trust in collaboration, research about trust relationships in government interorganizational initiatives is lacking. Little attention, in particular, has been paid to the determinants of trust in government CBI. To fill this gap in the literature, our study analyzes eight separate case studies of information sharing initiatives from criminal justice and public health organizations to identify new determinants of trust. Drawing from the case analysis we present three propositions related to trust determinants in the context of CBI initiatives, specifically, clarity of roles and responsibilities, knowledge of participating organizations, and exercise of authority.

Source

trust

Exploring the Moderating Effect of Information Inconsistency in a Trust-Based Online Shopping Model

Kem Z.K. Zhang, Matthew Lee, Christy M.K. Cheung, Xiao‐Liang Shen, Xiaoling Jin, Huaping Chen
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2010-01-01
From feed: TITLE("trust")) + IS Conference

Online shopping is associated with various uncertain issues. In this sense, researchers have found that trust plays an important role in affecting consumers' purchase behavior. As advances of Internet technology, many consumers tend to read online messages about others' shopping experiences before making purchasing decisions. Thus, informational social influence affects in the decision-making process as well. However, few studies have provided in-depth examination of both impacts from trust and informational social influence in online context. In this study, we explore the moderating effect of informational social influence in a trust-based online shopping model. We conduct a laboratory experiment to verify this model, and find that emotional trust mediates relationships between three trusting beliefs (competence, benevolence, and integrity) and purchase intention. Further, information inconsistency, a particular form of informational social influence, is found to strengthen the relationship between emotional trust and purchase intention. Implications for research and practice are discussed.

Source

trust

Trust in E-Government Transactional Services: A Study of Citizens' Perceptions in Mexico and the U.S.

Celene Navarrete
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2010-01-01
From feed: TITLE("trust")) + IS Conference

While the importance of trust in the online vendor and electronic channel for e-commerce transactions is well established, less is known about factors that influence trust in e-government services. Moreover, perceptions of trust depend heavily on the cultural context and thus can vary across countries. This study investigates differences in trust and consumption of public services by citizens across two settings: Mexico and the United States. Focus groups' results were first used to develop a survey; then a total of 455 surveys from both countries collected perceptions on four e-government services. Multi-group path analysis assessed the associations and differences between trust and service utilization. Results indicate the U.S. shows higher trust and utilization compared to Mexico. The two countries differ particularly in the impact of perceptions of the government's benevolence and competence on e-government service utilization Perceptions about the government's handling of data affects utilization only in the U.S., and the e-medium impacts utilization in both cultures. Implications for research and practice are discussed.

Source

trust

Improving Prediction Accuracy in Trust-Aware Recommender Systems

Sanjog Ray, Ambuj Mahanti
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2010-01-01
From feed: TITLE("trust")) + IS Conference

Trust-aware recommender systems are intelligent technology applications that make use of trust information and user personal data in social networks to provide personalized recommendations. Earlier research in trust-aware systems have shown that the ability of trust-based systems to make accurate predictions coupled with their robustness from shilling attacks make them a better alternative than traditional recommender systems. In this paper we propose an approach for improving accuracy of predictions in trust-aware recommender systems. In our approach, we first reconstruct the trust network. Trust network is reconstructed by removing trust links between users having correlation coefficient below a specified threshold value. For prediction calculation we compare three different approaches based on trust and correlation. We show through experiments on real life Epinions data set that our proposed approach of reconstructing the trust network gives substantially better prediction accuracy than the original approach of using all trust statements in the network.

Source

trust

Media Choices and Trust in Partially Distributed Global Teams

Linda Plotnick, Starr Roxanne Hiltz, Rosalie J. Ocker
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2010-01-01
From feed: TITLE("trust")) + IS Conference

Partially distributed teams (PDTs) are increasingly common in organizations as they collaborate across distance. A PDT has at least two collocated subteams that are geographically distant and communicate by electronic media. This paper reports on a two semester quasi-experimental study of students in global PDTs in the role of software developers designing an emergency management information system. Leadership configuration and temporal distribution were varied and their effects on communication media chosen were examined, as well as the relationship of the media used with trust. Both leadership configuration and distance affect the choices made of communications media and those choices, in some cases, are significantly associated with trust.

Source

trust

The Multidimensional Role of Trust in Enabling Creativity within Virtual Communities of Practice: A Theoretical Model Integrating Swift, Knowledge-Based, Institution-Based, and Organizational Trust

David Askay, April J. Spivack
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2010-01-01
From feed: TITLE("trust")) + IS Conference

Virtual communities of practice are gaining attention among scholars and practitioners as managers and high-level executives look for ways to adapt to an ever-increasing rate of environmental change. These communities have been recognized as a tool for generating new ideas by accessing geographically distributed expertise. As most expert knowledge is tacit and tacit knowledge exchange is what leads to creativity, an understanding of antecedents to tacit knowledge exchange is needed. This manuscript responds by examining the role of trust, a well-known antecedent of creativity, within the context of virtual communities of practice. An interdisciplinary approach led to the development of a multi-level, multi-dimensional model of trust. The authors propose that different dimensions of trust serve as both an antecedent and outcome of creativity in virtual communities of practice, by taking on various forms and roles in the creative process based on tenure of its members.

Source

trust

Role-based trust model for community of interest

Wei‐Tek Tsai, Peide Zhong, Xiaoying Bai, Jay Elston
IEEE International Conference on Service Oriented Computing and Applications Soca 09
Published: 2009-12-01
From feed: TITLE("trust")) + IS Conference

Trust is an important problem in a community of interest (COI) built on top of service-oriented architecture (SOA). Furthermore, ranking services, data, and workflows in service-oriented applications is also important. This paper presents a role-based trust model to address these two problems. In this paper, users are classified into different roles in COI using role ontology (RO). The RO describes their relationships, and is used as a basis for assigning a numeric value as each role's trust degree (TD). Because TD is represented as a number, the trustworthiness of service and data can be easily ranked in a COI system. Finally, this paper presents a case study to illustrate the key feature of this model.

Source

trust

Legal Patterns Implement Trust in IT Requirements: When Legal Means are the "Best" Implementation of IT Technical Goals

Alžběta Krausová, Fabio Massacci, Ayda Saïdane
2009 2nd International Workshop on Requirements Engineering and Law Relaw 2009
Published: 2009-09-01
From feed: TITLE("trust")) + IS Conference

The traditional approach of computer scientists to Law is that laws (statutes, regulations, etc.) set the requirements, logicians and requirements analysts model them, and finally IT technical solutions or organizational patterns are used to implement them. In this paper we try to answer a radically different question: Can a technical solution (e.g. a requirement in a security and dependability pattern) be implemented by legal means? We show how Legal Patterns, that represent the legal analogy of Software Patterns, can be formally used to implement trust relations required by security and dependability patterns.

Source

trust

Electronic Elections: Trust Through Engineering

Carsten Schürmann
2009 1st International Workshop on Requirements Engineering for E Voting Systems Re Vote 2009
Published: 2009-08-01
From feed: TITLE("trust")) + IS Conference

It comes with many risks but brings also many benefits. Instead of flat out rejecting the technology as uncontrollably dangerous, we advocate in this paper a different technological angle that renders electronic elections trustworthy beyond the usual levels of doubt. We exploit the trust that voters currently have into the democratic process and model our techniques around that observation accordingly. In particular, we propose a technique of trace emitting computations to record the individual steps of an electronic voting machine for a posteriori validation on an acceptably small trusted computing base. Our technology enables us to prove that an electronic elections preserves the voter's intent, assuming that the voting machine and the trace verifier are independent.

Source

trust

A trust management framework for service-oriented environments

William Conner, Arun Iyengar, Thomas Mikalsen, Isabelle Rouvellou, Klara Nahrstedt
Www 09 Proceedings of the 18th International World Wide Web Conference
Published: 2009-04-20
From feed: TITLE("trust")) + IS Conference

Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous work in reputation management has focused on providing robustness and improving performance for a given reputation scheme. In this paper, we present a reputation-based trust management framework that supports the synthesis of trust-related feedback from many different entities while also providing each entity with the flexibility to apply different scoring functions over the same feedback data for customized trust evaluations. We also propose a novel scheme to cache trust values based on recent client activity. To evaluate our approach, we implemented our trust management service and tested it on a realistic application scenario in both LAN and WAN distributed environments. Our results indicate that our trust management service can effectively support multiple scoring functions with low overhead and high availability.

Source

trust

Community gravity

Yutaka Matsuo, Hikaru Yamamoto
Www 09 Proceedings of the 18th International World Wide Web Conference
Published: 2009-04-20
From feed: TITLE("trust")) + IS Conference

Several attempts have been made to analyze customer behavior on online E-commerce sites. Some studies particularly emphasize the social networks of customers. Users' reviews and ratings of a product exert effects on other consumers' purchasing behavior. Whether a user refers to other users' ratings depends on the trust accorded by a user to the reviewer. On the other hand, the trust that is felt by a user for another user correlates with the similarity of two users' ratings. This bidirectional interaction that involves trust and rating is an important aspect of understanding consumer behavior in online communities because it suggests clustering of similar users and the evolution of strong communities. This paper presents a theoretical model along with analyses of an actual online E-commerce site. We analyzed a large community site in Japan: @cosme. The noteworthy characteristics of @cosme are that users can bookmark their trusted users; in addition, they can post their own ratings of products, which facilitates our analyses of the ratings' bidirectional effects on trust and ratings. We describe an overview of the data in @cosme, analyses of effects from trust to rating and vice versa, and our proposition of a measure of community gravity, which measures how strongly a user might be attracted to a community. Our study is based on the @cosme dataset in addition to the Epinions dataset. It elucidates important insights and proposes a potentially important measure for mining online social networks.

Source

trust

[PDF] Defending online reputation systems against collaborative unfair raters through signal modeling and trust

Yan Yang, Yan Sun, Steven Kay, Qing Yang
Proceedings of the ACM Symposium on Applied Computing.
Published: 2009-03-08
From feed: TITLE("trust")) + IS Conference

Online feedback-based rating systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. This problem is challenging especially when the number of honest ratings is relatively small and unfair ratings can contribute to a significant portion of the overall ratings. In addition, the lack of unfair rating data from real human users is another obstacle toward realistic evaluation of defense mechanisms. In this paper, we propose a set of methods that jointly detect smart and collaborative unfair ratings based on signal modeling. Based on the detection, a framework of trust-assisted rating aggregation system is developed. Furthermore, we design and launch a Rating Challenge to collect unfair rating data from real human users. The proposed system is evaluated through simulations as well as experiments using real attack data. Compared with existing schemes, the proposed system can significantly reduce the impact from collaborative unfair ratings.

Source | Open access

trust

A personalized framework for trust assessment

Trung Dong Huynh
Proceedings of the ACM Symposium on Applied Computing
Published: 2009-03-08
From feed: TITLE("trust")) + IS Conference

The number of computational trust models has been increasing quickly in recent years yet their applications for automating trust evaluation are still limited. The main obstacle is the difficulties in selecting a suitable trust model and adapting it for particular trust modeling requirements, which varies greatly due to the subjectivity of human trust. The Personalized Trust Framework (PTF) presented in this paper aims to address this problem by providing a mechanism for human users to capture their trust evaluation process in order for it to be replicated by computers. In more details, a user can specify how he selects a trust model based on information about the subject whose trustworthiness he needs to evaluate and how that trust model is configured. This trust evaluation process is then automated by the PTF making use of the trust models flexibly plugged into the PTF by the user. By so doing, the PTF enable users reuse and personalize existing trust models to suit their requirements without having to reprogram those models.

Source

trust

ATM

Mohammad Gias Uddin, Mohammad Zulkernine
Proceedings of the ACM Symposium on Applied Computing
Published: 2009-03-08
From feed: TITLE("trust")) + IS Conference

While providing services to stakeholders, service software can be exploited by potentially untrustworthy users. Given that, it is necessary to monitor the trust relationships between service providers and requestors for potential vulnerabilities they may invite to the total system. In this paper, we propose an Automatic Trust Monitoring algorithm called ATM based on the specification of trust relationships in trust scenarios and the quantification of the relationships through trust calculation schemes. Trust rules are generated from the trust scenarios ready to be deployed at run-time. A service requestor is penalized for the violation of a trust rule and rewarded for no such violation. This analysis facilitates the quantification of the trustworthiness of service requestors and the accuracy of the recommendations from other service providers that can be used to make dynamic decisions on the corresponding requestors. The monitor is implemented in a prototype file sharing grid and evaluated using file sharing applications.

Source

trust

Towards developing a trust-based security solution

Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury S. Hasan, Mohammad Zulkernine
Proceedings of the ACM Symposium on Applied Computing
Published: 2009-03-08
From feed: TITLE("trust")) + IS Conference

Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small memories and processors, limited energy and tiny packets, sensor networks cannot afford traditional luxury security solutions; this limitation causes security threats. There are several important security challenges, including access control, message integrity and confidentiality, and trust solutions that require us to use a careful design of resource constraints for pursuing more enhanced security solutions for a wireless sensor network. In this paper, we present a new idea of persistent security solutions that support trust for general purpose Wireless Sensor Networks.

Source

trust

iTrustU

Ting-Chun Peng, Seng‐Cho T. Chou
Proceedings of the ACM Symposium on Applied Computing
Published: 2009-03-08
From feed: TITLE("trust")) + IS Conference

Blogs give users a channel to express their knowledge and feelings with individuals worldwide, explaining the exponential growth of new blogs. However, due to the diverse subjects covered by bloggers, bloggers/readers have difficulty in finding valuable articles from the hundreds of millions of blogs on the Internet. To help ease information overload in the blogosphere, this work proposes a trust-enhanced collaborative filtering approach that integrates multi-faceted trust based on article type and user similarity. An online blog article recommender system, called iTrustU, is also designed to evaluate the effectiveness of the proposed approach in terms of accuracy and quality of recommendations. Results of a 45-day online experiment with 179 participants from the Internet demonstrate that the proposed integrated approach yields a significantly higher accuracy than traditional approaches, especially for cold-start users. Analysis results indicate that trust and similarity among bloggers/readers have a significantly positive correlation in the blogosphere. Effective recommender systems can be achieved by exploiting trust relationships in a trust network. The proposed approach is applicable not only to the blogosphere, but also to online social communities when trust relationships already exist between users.

Source

trust

Extending Bayesian trust models regarding context-dependence and user friendly representation

Sebastian Ries
Proceedings of the ACM Symposium on Applied Computing
Published: 2009-03-08
From feed: TITLE("trust")) + IS Conference

Successful collaboration between independent entities depends on the selection of trustworthy interaction partners. Bayesian trust models provide a well-founded way for deriving trust from evidence. Yet, current approaches lack an integration of context-dependent parameters and a graphical representation for users. We propose a modification of the Bayesian approach that integrates context-dependent parameters in the prior knowledge and that allows to overcome the negative effects that are usually introduced with aging. Furthermore, we propose a mapping of this approach to a more intuitive representation of trust.

Source

trust

Establishing Trust Management in an Open Source Collaborative Information Repository: An Emergency Response Information System Case Study

Evren Eryilmaz, Mark Cochran, Sumonta Kasemvilas
Proceedings of the 42nd Annual Hawaii International Conference on System Sciences Hicss
Published: 2009-01-01
From feed: TITLE("trust")) + IS Conference

This paper explores the design and evaluation of a trust model to establish trust management in an open source collaborative information repository for an emergency response environment. The proposed model is an instantiation of the SECURE framework and it is based on the characteristics of trust defined by recent information systems research. Evaluation of the model is based on a case study of a drill conducted by a city in Southern California. The results suggest that the proposed model might be useful to provide timely action plans for specific types of incidents based on the level trust and risk. However, a common terminology among involved organizations must exist prior to implementing the proposed model. In addition, information is volatile in an emergency response environment and rapid changes in conditions influence the consensus among entities. Therefore, verifying the accuracy of the emergency information used by the proposed model is essential to establish trust management in this particular context.

Source

trust

A Model for Understanding the Relationships Between Organizational Trust, KM Initiatives and Successes

Vincent Ribière
Proceedings of the 42nd Annual Hawaii International Conference on System Sciences Hicss
Published: 2009-01-01
From feed: TITLE("trust")) + IS Conference

Organizational culture and more particularly organizational trust is often mentioned as one of the main enablers for knowledge sharing and knowledge acquisition. For this research we used an empirical approach to validate this assumption. A theoretical model was developed to test the influence of organizational trust on the usage of various KM tools and practices (personalization and codification) as well as to assess its impact on KM initiative success and on the resulting benefits for organizations. Data collected among 97 US companies were used to validate this model and to demonstrate the significant role of trust in KM initiative success.

Source

trust

[PDF] Forming Social Networks of Trust to Incentivize Cooperation

Stuart M. Allen, Gualtiero B. Colombo, Roger M. Whitaker
Proceedings of the 42nd Annual Hawaii International Conference on System Sciences Hicss.
Published: 2009-01-01
From feed: TITLE("trust")) + IS Conference

This paper introduces a new generic model to incentivize cooperation between parties that are engaged in the paradox of a social dilemma. The approach addresses the problem of direct reciprocity and uses the formation of collaborative relationships between individuals that are motivated by selfish behaviour: every individual seeks to interact with another that is at least as cooperative as itself. The establishment and maintenance of mutually beneficial relationships results in a dynamic social network where individuals cluster based on similarity of cooperation. Through prioritising these trusted relationships, the payoff an individual receives becomes positively correlated with their cooperation level. The model is demonstrated by individuals playing against each other via the single player prisoners dilemma game. The model is of particular relevance to contemporary distributed systems where there is no central authority to enforce cooperation yet unrelated parties are required to share their resources.

Source | Open access

trust

Information Strategies to Support Full Information Product Pricing: the Role of Trust

Luis F. Luna‐Reyes, David F. Andersen, L.J.A. de Diego, Jing Zhang, Maj Munch Andersen, Andrew Whitmore, Ritu Roy
Proceedings of the 42nd Annual Hawaii International Conference on System Sciences Hicss
Published: 2009-01-01
From feed: TITLE("trust")) + IS Conference

In this paper, we report the importance of trust in the development and operation of distribution networks that attach non-price information to products to mitigate market dynamics introduced by information asymmetries. Often this non-price information is transmitted from producers to consumers through trusting networks or under certifiable labels such as "organic" or "fair trade." We are calling such networks full information product pricing (FIPP) networks. This study is part of a larger project aimed at understanding the characteristics of FIPP networks. This initial exploration on four cases in Canada and Latin America indicated that trust, in the forms of institutional trust, calculative trust, and relational trust, plays key roles in FIPP operations and expansion. It is critical for building collaboration, coordinating network activities, and mitigating the risks associated with information asymmetry.

Source

trust

Feedback Models for Collaboration and Trust in Crisis Response Networks

Bryan Hudgens, Alexander B. Bordetsky
Proceedings of the 42nd Annual Hawaii International Conference on System Sciences Hicss
Published: 2009-01-01
From feed: TITLE("trust")) + IS Conference

Scholars have devoted increasing efforts to understanding crisis response networks especially networks comprised of disparate members who acknowledge no higher organizational authority. Coordination within these networks is difficult for several reasons, including the chaotic nature of the crisis, a need to balance shared goals (crisis amelioration) and organization-specific goals, and the lack of a central organizing authority. More recently, scholars have suggested crisis response networks might be able to coordinate effectively in the absence of a central organizing authority. Grounded in general system theory and particularly the use of feedback loops, this paper proposes a campaign of experimentation set in the Naval Postgraduate School's Maritime Interdiction Operation that seeks to understand whether feedback loops comprised of reciprocal resource commitments can engender greater trust and commitment among organizations responding to a crisis.

Source

trust

Privacy Concerns, Trust in Government and Attitudes to Identity Cards in the United Kingdom

Adam Joinson
Proceedings of the 42nd Annual Hawaii International Conference on System Sciences Hicss
Published: 2009-01-01
From feed: TITLE("trust")) + IS Conference

In the present paper, the links between privacy concerns, trust in the Government and compulsion are examined in light of people's attitudes towards Identity Cards in the United Kingdom. A total of 404 respondents from both politically active and student groups were presented with scenarios for the implementation of ID Cards in which the degree of compulsion was varied. Their levels of privacy concern about ID Cards and trust in the Government were also measured. The perceived degree of compulsion, privacy concerns and trust in the Government predicted attitudes to Identity Cards. Mediation and moderation analyses were conducted to examine the relationship between privacy, trust and ID Card attitudes. It was found that the impact of privacy concern on attitudes was moderated by trust, such that amongst respondents with lower privacy concerns, lack of trust moderated this to lead to negative attitudes towards Identity Cards. Implications are discussed.

Source

trust

Security and Privacy Trust in E-Government: Understanding System and Relationship Trust Antecedents

Alexander McLeod, Sonja Pippin
Proceedings of the 42nd Annual Hawaii International Conference on System Sciences Hicss
Published: 2009-01-01
From feed: TITLE("trust")) + IS Conference

This research proposes an E-Government security trust model and develops a typology of antecedents in the context of citizen tax software use and e-filing. We propose that tax software use and electronic filing (e-filing) offer a novel and interesting research setting that is relevant to E-Government and security because of (1) the use of software to complete tax returns by a large portion of the citizenry, (2) the necessity of security for transmittal of information during e-filing, (3) the privacy of the subject matter, (4) the current promotion of e-filing by the American tax collection agency (IRS), and (5) individual taxpayer ambivalence or negative attitude toward taxes and the government in general. We suggest that when the information system serves as surrogate for a tax domain expert several antecedents to security and privacy trust are potential determinants of use.

Source

trust

Modelling Trust Requirements by Means of a Visualization Language

Kamaljit Kaur Bimrah, Haralambos Mouratidis, David Preston
2008 3rd International Workshop on Requirements Engineering Visualization Rev 08
Published: 2008-09-01
From feed: TITLE("trust")) + IS Conference

Little effort has been put into understanding how trust can be modelled and reasoned when developing information systems. Equally little effort has been put into developing visual languages to support trust modelling. Our motivation comes from this situation and we aim to develop a visualization language for trust related requirements elicitation. In this paper we highlight the lack of substantial work in this area and we describe the foundation for such a visualization language.

Source

trust

Role-based trust management security policy analysis and correction environment (RT-SPACE)

Mark Reith, Jianwei Niu, William H. Winsborough
Proceedings International Conference on Software Engineering
Published: 2008-05-10
From feed: TITLE("trust")) + IS Conference

This paper presents RT-SPACE, a tool suite for authoring, verifying, and correcting RT access control policies. RT is a role-based trust management framework well suited for use in systems that must protect the interests of multiple stakeholders in a decentralized environment.

Source

trust

Autonomic trust reasoning enables misbehavior detection in OLSR

Asma Adnane, Rafael T. de Sousa, Christophe Bidan, Ludovic Mé
Proceedings of the ACM Symposium on Applied Computing
Published: 2008-03-16
From feed: TITLE("trust")) + IS Conference

Ad Hoc networks do not rely on any centralized administration or fixed network infrastructure and their nodes establish a routing structure in a self-organized way, by means of an ad hoc routing protocol such as OLSR. Ad hoc route discovery and maintenance introduce specific security problems for routing protocols to prevent, detect or respond. Solutions to secure these routing protocols using some centralized units or trusted third-parties actually constrain the self-organization of ad hoc networks. In this paper, we propose for OLSR the integration of trust reasonings into each node behavior, so as to allow a self-organized trust-based control to help nodes to detect misbehavior attacks. Our analysis of OLSR brings out the trust rules that characterize this protocol and allows us to express formally the trust-related properties that can be verified by each node to assess the correct behavior of the other nodes. Simulation of OLSR with nodes reasoning on trust allows us to demonstrate the effectiveness of our approach and to compare trust-based routing choices with the bare OLSR reachability-based choices.

Source

trust

CAT

Mohammad Gias Uddin, Mohammad Zulkernine, Sheikh Iqbal Ahamed
Proceedings of the ACM Symposium on Applied Computing
Published: 2008-03-16
From feed: TITLE("trust")) + IS Conference

The requirements for spontaneous interactions in open and dynamic systems create security issues and necessitate the incorporation of trust management into each software entity to make decisions. Trust encompasses various quality attributes (e.g., security, competence, honesty) and helps in making appropriate decisions. In this paper, we present CAT, an interaction-based Context-Aware Trust model for open and dynamic systems by considering services as contexts. We identify a number of trust properties including context and risk awareness and address those in the proposed model. A context-similarity parameter is proposed to make decisions in similar situations. A time-based ageing parameter is introduced to change trust values over time without any further interaction. We present direct and indirect recommendations and apply path-based ageing on indirect recommendations. A mechanism to calculate the accuracy of recommendations is described. This accuracy is used to differentiate between reliable and unreliable recommendations in the total trust calculation.

Source

trust

Service sharing with trust in pervasive environment

Sheikh Iqbal Ahamed, Munirul M. Haque, Nilothpal Talukder
Proceedings of the ACM Symposium on Applied Computing
Published: 2008-03-16
From feed: TITLE("trust")) + IS Conference

In such as a highly dynamic and open environment, it has become a challenge to deploy multiple context-sensitive services due to the unwillingness of service provider to share resources. This apprehension to share resources stems mainly from a lack of trust. Sometimes infrastructure plays pivotal role to solve this issue with dynamic access control to replace traditional static policies. But when it comes to effective resource sharing in an infrastructure-less environment we face problems such as poor storage and computational capability. In this paper, we have developed a lightweight and distributed trust model based on recommendation, which will guarantee that service providers can securely share an unlimited number of resources, limited only by their hardware and bandwidth limitations. The multi-hop recommendation protocol incorporates a flexible behavioral model to handle interactions during service sharing and usage. This protocol will also assess risk using recommendations from context-sensitive services, in the trust framework, to help ensure smooth access to resources and services.

Source

trust

Fourth special track on Trust, Recommendations, Evidence and other Collaboration Know-how (TRECK'08)

Virgı́lio Almeida, Jean-Marc Seigneur
Proceedings of the ACM Symposium on Applied Computing
Published: 2008-03-16
From feed: TITLE("trust")) + IS Conference

Computational trust and online reputation services are reaching the mass market with pioneering startup reputation companies such as Venyo (http://www.venyo.org). The trust models and metrics used in those reputation services can again benefit from the TRECK track contributions, especially regarding their combination with recommender systems and their context-awareness aspects.

Source

trust

Whom should I trust?

Patricia Victor, Chris Cornelis, Ankur Teredesai, Martine De Cock
Proceedings of the ACM Symposium on Applied Computing
Published: 2008-03-16
From feed: TITLE("trust")) + IS Conference

Generating adequate recommendations for newcomers is a hard problem for a recommender system (RS) due to lack of detailed user profiles and social preference data. Empirical evidence suggests that the incorporation of a trust network among the users of the RS can leverage such 'cold start' (CS) recommendations. Hence, new users should be encouraged to connect to the network as soon as possible. But whom should new users connect to? Given the impact this choice has on the delivered recommendations, it is critical to guide newcomers through this early stage connection process. In this paper, we identify key figures in the trust network (in particular mavens, connectors and frequent raters) and investigate their influence on the coverage and accuracy of a collaborative filtering RS. Using a dataset from Epinions.com, we demonstrate that the generated recommendations for new user are more beneficial if they connect to an identified key figure compared to a random user.

Source

trust

Increasing trust through the use of 3d e-commerce environment

Nasser Nassiri
Proceedings of the ACM Symposium on Applied Computing
Published: 2008-03-16
From feed: TITLE("trust")) + IS Conference

Existing 2D e-commerce internet websites provide users with only relatively simple, browser-based interface to access available products and services. These websites often lack in the emulation of real-life human representative which is an important factor in establishing consumer's trust. 3D e-commerce environments with 3D virtual space and human-like avatar facilitating the sale of real-world products may add the human factor to the shopping experience and might therefore enhance the relation of social trust in these environments. This paper explains the concept of 3D e-commerce environments and their roles in increasing consumer's trust and in enhancing e-business profitability.

Source

trust

Propagating multitrust within trust networks

Stefano Bistarelli, Francesco Santini
Proceedings of the ACM Symposium on Applied Computing
Published: 2008-03-16
From feed: TITLE("trust")) + IS Conference

We suggest the concept of multitrust, which is aimed at computing trust by collectively involving a group of trustees at the same time: the trustor needs the concurrent support of multiple individuals to accomplish its task. We propose Soft Constraint Logic Programming based on semirings as a mean to quickly represent and evaluate trust propagation for this scenario. To attain this, we model the trust network adapting it to a weighted and-or graph, where the weight on a connector corresponds to the trust feedback value among the connected nodes. Semirings are the parametric and flexible structures used to appropriately represent trust metrics.

Source

trust

UMLtrust

Mohammad Gias Uddin, Mohammad Zulkernine
Proceedings of the ACM Symposium on Applied Computing
Published: 2008-03-16
From feed: TITLE("trust")) + IS Conference

As users in software systems depend on each other for achieving goals, performing tasks, and utilizing resources, the trust relationships in the systems need to be considered to identify the opportunities and vulnerabilities these relationships bring. However, the problem with specifying a trust relationship is that there is no precise and a priori criteria to be satisfied. The main objective of this work is towards incorporating trust from the very beginning of a software development process. A framework is presented for specifying trust scenarios using an extension of Unified Modeling Language (UML) called UMLtrust (UML for trust scenarios). A trust scenario combines interested parties based on a context and thus helps in building a trust relationship. Suitable trust rules can be generated from the trust scenarios to monitor the trustworthiness of specific trust relationships. In this way, we can avoid conflicting, ambiguous, and redundant trust requirements in a software development life cycle (SDLC). The applicability of the approach has been illustrated using examples from file sharing applications.

Source

trust

Building Trust and Cooperation through Technology Adaptation in Virtual Teams: Empirical Field Evidence

Dominic Thomas, Robert P. Bostrom
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2008-01-01
From feed: TITLE("trust")) + IS Conference

This article reports findings of an empirical, field study of how virtual information systems development teams project managers improve team trust and cooperation by managing adaptation of information and communications tools. We examine the effect of leader style on the efficacy of interaction interventions. Results indicate how theory X (command and control) and theory Y (facilitate and support) leadership approaches enable and contradict effective technology adaptation, trust building, and outcomes. Successful technology adaptation led to increased trust. In order to achieve technology adaptation during interventions, leaders taking employing actions associated with a theory Y approach achieved greater success. Implications for virtual project management are introduced.

Source

trust

Trust in Online Shopping: The Korean Student Experience

Ji-Seok Yoo, Jae-Nam Lee, Julian Hoffmann
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2008-01-01
From feed: TITLE("trust")) + IS Conference

E-commerce has become an important part of business. In South Korea, the market size of online shopping malls was 13,460 billion Korean Won in 2006, and this figure keeps growing. Thus, gaining loyal customers has become a rising concern. In this study, we adopted Lewicki and Bunker's three different types of trust, namely, calculus-based trust, knowledge-based trust, and identification-based trust, in order to investigate their hierarchical relationships in e-commerce and their impacts on customer satisfaction and loyalty. A total of 104 responses from university students were analyzed to test the proposed model and its hypotheses using PLS. The results showed that hierarchical relationships between different types of trust exist in the online environment, and among them, knowledge-based trust has the strongest impact on customer satisfaction. This finding implied that practitioners should focus on developing an appropriate online strategy in terms of how to build up trust-based relationships with online customers.

Source

trust

Understanding the Roles of Knowledge Sharing and Trust in Online Learning Communities

Brian Thoms, Nathan Garrett, Jesus Canelon Herrera, Terry Ryan
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2008-01-01
From feed: TITLE("trust")) + IS Conference

This paper builds on action and design research aimed at enhancing scholarly community and conversation in a graduate school setting. In this paper we focus on knowledge sharing (KS) and trust as important factors for building a sustainable online learning community (OLC). Guided by theories of social learning and social networking, we survey graduate students to assess their perceptions of KS and trust in communities of practice (CoPs). These results are compared against posttest results measuring community building and knowledge sharing in a stakeholder-defined OLC. Results indicate that although students' initial assessment of KS and trust in CoPs were low, users perceived high levels of value from a stakeholder-defined OLC. Our research offers a proof-of-concept that stakeholder-defined OLCs provide students with the opportunity to develop knowledge networks, while also providing for individual autonomy over their content. Our results also indicate an intriguing alternative to traditional course management systems (CMS).

Source

trust

Building Citizen Trust towards E-Government Services: Do High Quality Websites Matter?

Chee Wee Tan, Izak Benbasat, Ronald T. Cenfetelli
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2008-01-01
From feed: TITLE("trust")) + IS Conference

E-governments are increasingly becoming a familiar fixture in virtual landscapes. Yet, the lack of citizen trust brought on by the novelty and uncertainty of online transactions has inhibited the widespread acceptance for public e-services. Ascribing to the perspective of technology as a social actor with whom the customer interacts and transacts, we put forward a research model that accentuates the pivotal role of e-government service quality as a salient driver of citizens' trustworthiness beliefs towards e-government Web sites, which in turn promotes the corresponding adoption of public e-services. E-government service quality, as conceptualized in this study, borrows from the popularized SERVQUAL constructs in deriving prescriptive design principles to guide the development of e-government Web sites. Data collected from a sample of 647 e-government service participants substantiates all 14 hypothesized relationships, thereby suggesting that high quality e- government Web sites do matter in building citizen trust towards public e-services.

Source

trust

Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing-Copyright

Published by Proceedings Snpd 2007 Eighth Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing We didn't find an OA link, try to find a OA version on Google Scholar
Proceedings Snpd 2007 Eighth Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing
Published: 2007-07-01
From feed: TITLE("trust")) + IS Conference

Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center. The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors' opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors or the Institute of Electrical and Electronics Engineers, Inc.

Source

trust

Modeling electronic institutions with extended colored Petri net

Guoyong Cai, Ji Gao, Yong Huang
Proceedings Snpd 2007 Eighth Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing
Published: 2007-07-01
From feed: TITLE("trust")) + IS Conference

One of the most fundamental challenges in multi-agent system engineering is to enable predictable and reliable interaction amongst group of autonomy agents. Electronic Institution (EI) has been proposed as an important framework to deal with these challenges. A colored Petri net transducer (CPNt) approach is presented to represent an EI visually and formally. With existing CPN tools, an EI model can be simulated and verified automatically. Validated EI model serves as a fundamental mechanism to influence and constraint interactive behaviors of autonomy agents. As a result, predictable and reliable multi-agent system can be obtained. Comparing with other approaches, this approach has solid theoretic basis as it is extended from Petri net. Therefore existing engineering methodology of Petri net can be adapted to engineering electronic institution conveniently. A simple example is applied to illustrate the whole process of the proposed approach.

Source

trust

Research on Building Polygon Map Generalization Algorithm

Zhong Xie, Shaojian Zhu, Liang Wu
Proceedings Snpd 2007 Eighth Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing
Published: 2007-07-01
From feed: TITLE("trust")) + IS Conference

Generalization of the building polygon maps is a challenging problem within the world range. The paper discusses the automatic generalization algorithm of urban building polygon in GIS environment. The main research focuses on the rectangular adjustment of building polygon, partial concave and convex simplification of the large polygon, partial exaggeration of the small polygon and polygon cluster aggregation. In the practical development, we sort the different building polygon by its shape and characteristic, and simplify it with different methods. The experiment proves that the building polygon simplification products a reasonable result through this algorithm and the morph feature of block has been well preserved.

Source

trust

Using Trust Metric to Detect Malicious Behaviors in WSNs

Mingwu Zhang, Yang Bo, Qi Yu, Wenzheng Zhang
Proceedings Snpd 2007 Eighth Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing
Published: 2007-07-01
From feed: TITLE("trust")) + IS Conference

In order to enhance transaction security in wireless sensor networks, it is important to evaluate nodes' trustworthiness. Malicious nodes may strategically alter their behavior for concealing malicious behavior and prompting their reputation. Collusive or malicious behaviors might change the system trust entropy due to their voting ratings are biased. In this paper, according to the basic theory of Shanon informational entropy, the trust entropy and standard structure entropy of distributed entities trustworthiness evaluation are proposed, which be used to detect whether the malicious behavior happened in sensor systems. By simulating experiment, it can detect whether malicious behavior happened where the system is attacked either maliciously, randomly or collusively. Especially in collusive attack, the malicious nodes will boost their clique reputation and drop honest nodes by bad mouthing attack.

Source

trust

Forward-Secure Traceable Ring Signature

Chengyu Hu, Daxing Li
Proceedings Snpd 2007 Eighth Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing
Published: 2007-07-01
From feed: TITLE("trust")) + IS Conference

A traceable ring scheme is a ring signature except that it can restrict "excessive" anonymity. The traceable ring signature has a tag that consists of a list of ring members and an issue that refers to, for instance, a social affair or an election. A ring member can make any signed but anonymous opinion regarding the issue, but only once (per tag). The traceable ring signature can suit to many applications, such as an anonymous voting on a BBS, a dishonest whistle-blower problem, and unclonable group identification. In this paper, we suggest solutions to the key exposure problem in traceable ring signature. We propose the first forward secure traceable ring signature scheme and we prove its security in random oracle model.

Source

trust

Classification for a class of second-order singular equations on time scales

Chao Zhang, Lianghong Zhang
Proceedings Snpd 2007 Eighth Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing
Published: 2007-07-01
From feed: TITLE("trust")) + IS Conference

This paper is concerned with classification for a class of second-order singular equations on time scales. Firstly, we construct a sequence of circles. These circles are nested and converge to a limiting set. By the different cases of the limiting set, we can obtain the number of linearly independent square delta-integrable solutions of the equations. It follows from this number, we divide equations into two cases: limit point and limit circle cases.

Source

trust

Keynote 2

Published by Proceedings Snpd 2007 Eighth Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing We didn't find an OA link, try to find a OA version on Google Scholar
Proceedings Snpd 2007 Eighth Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing
Published: 2007-07-01
From feed: TITLE("trust")) + IS Conference

In current reputation-based trust models for P2P applications trust and reputation information are mainly used to choose service providers, they are helpless when facing this malicious attack: malicious nodes respond received queries at random in spite of whether it locally has queried resources. Once they are chosen as a provider, they will transmit a fake, even a malicious file. We present a hierarchical, especially reputation-based two-level trust model. In our model trust and reputation information are used to choose both request responders and service providers. So our model can restrain malicious behaviors from the headstream and withstand this attack. Furthermore in our model peers can receive more and better services; trust value in node can be concentrated at a considerable fast speed and malicious nodes can be identified quickly.

Source

trust

Clever Uses of Matrices for Neutral Delay Difference Systems

Guang Zhang, Bao Shi
Proceedings Snpd 2007 Eighth Acis International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing
Published: 2007-07-01
From feed: TITLE("trust")) + IS Conference

In this paper, by considering the eigenvalues and their corresponding eigenvectors of matrices, the miscellaneous solutions for a class of neutral delay difference systems are considered. Some necessary and/or sufficient conditions are obtained.

Source

trust

A formal Framework for Trust management of Service-oriented Systems

Liang Zheng-ping, Xiaoli Liu, Guoqing Wu, Yang Min, Zhang Fan
Proceedings IEEE International Conference on Service Oriented Computing and Applications Soca 2007
Published: 2007-06-01
From feed: TITLE("trust")) + IS Conference

Service oriented software development takes service, which is a well-defined function unit and can be purchased from Web, as the atomic entity for building software applications. Whereas, considering the particular characteristics of service, the trustworthiness of the service and service oriented applications needs to gain more attentions. In this paper we propose a trust framework for designing trustworthy service oriented applications, including service selection and service behavior monitoring. We use quantitative trust degree model for service selection and monitoring agents for the behavior surveillance. The formalized model of the service oriented application is also described. By using the formalization the formal verification, such as integrity of the design, the correctness and consistency of the implementation and so on, can be performed. In the end, an example is illustrated to demonstrate the details of the design process and formal analysis of the trust framework.

Source

trust

Certain trust

Sebastian Ries
Proceedings of the ACM Symposium on Applied Computing
Published: 2007-03-11
From feed: TITLE("trust")) + IS Conference

One of the challenges for ubiquitous computing and P2P systems is to find reliable partners for interactions. We believe that this problem can be solved by assigning trust values to entities and allowing them to state opinions about the trust-worthiness of others. In this paper, we develop a new trust model, called Certain Trust, which can easily be interpreted and adjusted by users and software agents. A key feature of Certain Trust is that it is capable of expressing the certainty of a trust opinion, depending on the context of use. We show how the trust values can be expressed using different representations (one for users and one for software agents) and present an automatic mapping to change between the representations.

Source

trust

Trust-based service provider selection in open environments

Holger Billhardt, Ramón Hermoso, Sascha Ossowskí, Roberto Centeno
Proceedings of the ACM Symposium on Applied Computing
Published: 2007-03-11
From feed: TITLE("trust")) + IS Conference

The problem of selecting correct counterparts to interact with is of particular relevance in open and dynamic environments. This problem increases when third parties may vary their behaviour at will. In this paper we examine the problem of service provider selection using trust and reputation techniques. Most approaches to service provider selection are based on the client's proper experiences about particular services from particular providers. A problem arises when no previous experience is available. To solve this problem, previous approaches have proposed that clients obtain the required reputation information from their acquaintances. In contrast, our work advocates an experience-based approach for service provider selection, in which clients use trust and reputation mechanisms to infer expectations of future providers' behaviour from past experiences in similar situations. We present some experimental results that support our proposal.

Source

trust

Designing a trust chain for a thin client on a live Linux cd

Megumi Nakamura, Seiji Munetoh
Proceedings of the ACM Symposium on Applied Computing
Published: 2007-03-11
From feed: TITLE("trust")) + IS Conference

CD-boot Linuxi is a live Linux environment, which is easy to use because it is not installed in the hard disk, but simply boots directly from a CD. This helps protect the sensitive information because a clean environment can be prepared at boot time. To insure this environment protects sensitive information, we adapted the trusted computing technology to define a trustworthy environment.

Source

trust

Contract as a Source of Trust--Commitment in Successful IT Outsourcing Relationship: An Empirical Study

Jahyun Goo, Ki-Chan Nam
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2007-01-01
From feed: TITLE("trust")) + IS Conference

Existing studies on IT outsourcing have mainly examined partnership factors that influence IT outsourcing effectiveness. This stream of IT outsourcing research has largely ignored how to foster and manage necessary attributes of partner relationships that promote relationship quality, leaving the role of the formal contract in the context of managing outsourcing relationships untouched. This research extends such studies and integrates the extant views that contracts and relational governance function as a complement and that relationship commitment and trust are the key attributes in the relational governance impacting on the interorganizational performance. Using service level agreements (SLA) we examine how specific elements of formal contracts help firms to shape their relational attributes such as trust and commitment that leads to the success of IT outsourcing. The results show that the effects of well-structured SLA in managing the relational aspects of IT outsourcing contracts are significant. This paper also provides insight into the development of relational governance through a contractual mechanism in IT outsourcing engagements

Source

trust

Information Privacy and Trust in Government: a citizen-based perspective from New Zealand

Rowena Cullen, Patrick Reilly
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2007-01-01
From feed: TITLE("trust")) + IS Conference

Increasing use of e-government has raised issues about the privacy of information provided by citizens to government. This paper explores the experiences and concerns of New Zealanders in relation to information privacy, and the impact of these concerns on the trust they place in government. A series of focus groups were conducted among a range of community groups. The findings reflect a range of attitudes about information privacy and the trustworthiness of government, and centre around two major themes: the use of technology and concerns about the competency of and practices of government employees. Most respondents were unaware of their existing protections; preferred face to face communication; had low levels of confidence in the privacy of online communication but made use of it for convenience sake; had greater confidence in government than in commercial organizations but made distinctions between individual agencies. Breaches of privacy were shown to have a negative impact on trust in government

Source

trust

The Effect of Individual Needs, Trust and Identification in Explaining Participation Intentions in Virtual Communities

Juan Juan Han, Raymond Zheng, Yunjie Xu
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2007-01-01
From feed: TITLE("trust")) + IS Conference

This paper studied individuals' intentions to participate in virtual communities. In order to assess what influences participation intentions, we studied individual-based factors (members' social needs and self expression needs), trust and identification. We found that although needs deficiency-based motivation theory is useful to explain participation intentions, trust and identification play an important moderating role

Source

trust

The Impact of National Culture and Social Pr esence on Trust and Communication Quality within Collabor ative Groups

Paul Benjamin Lowry, Dongsong Zhang, Lina Zhou, Xiaolan Fu
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2007-01-01
From feed: TITLE("trust")) + IS Conference

In this empirical study we examine the impact of national culture and social presence on interpersonal trust in both culturally homogeneous and heterogeneous groups. Results demonstrate that interpersonal trust is higher in homogeneous, low-individualism groups (represented by Chinese participants) than that in homogeneous, high-individualism groups (represented by U.S. participants); however, interpersonal trust in heterogeneous groups is lower for low-individualism than high-individualism group members. It is also found that social presence has a positive impact on interpersonal trust; however, a difference in social presence between groups supported by two collaborative technologies is not detected. In addition, perceived communication quality is reported highest in face-to-face (FtF) groups without the support of collaborative software (CS), followed by FtF, CS-supported groups, and then virtual, CS groups. These findings have important implications for trust building in global groups as well as for the design of collaborative technologies in support of virtual groups

Source

trust

A Study of Intention on Continuous Use of Online Financial Services: The Mediated Effects of Website Trust

Shih‐Ming Pi, Shih-Hua Li, Tsang‐Yao Chen, Huimin Chen
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2007-01-01
From feed: TITLE("trust")) + IS Conference

The lack of trust is one of the most frequently cited reasons for customer's not returning to Internet service providers. As a new form of commercial activity, online financial services and stock trading involve more uncertainty and risk than traditional financial services. Trust is therefore a relatively influential factor of customer behavior in online financial services. The purpose of this study is to propose a framework of intention to continuously adopt online financial services. Furthermore, the mediated effects of Website trust are trusted. The main method of data collection for this study is a survey instrument designed by the author. The data were gathered from the survey and tested by using partial least squares. The research findings showed that: 1) Website trust influences on the intention to continuous use of online financial services; 2) cognitive trust of online customers influences on affective trust; 3) factors of transaction security, Website and company awareness, prior Internet experience, and navigation functionality directly influence on cognitive trust of online customers, and; 4) transaction security is the only factor that influences on affective trust of online customers

Source

trust

Analysis of Trust in Internet and Mobile Commerce Adoption

Dai-Yon Cho, Hyun Jung Kwon, Hyoung-Yong Lee
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2007-01-01
From feed: TITLE("trust")) + IS Conference

Understanding user acceptance of the Internet, especially the intentions to use Internet commerce and mobile commerce, is important in explaining the fact that these commerce have been growing at an exponential rate in recent years. This paper studies factors of new technology to better understand and manage the electronic commerce activities. The theoretical model proposed in this paper is intended to clarify the factors as they are related to the technology acceptance model. More specifically, the relationship among trust and other factors are hypothesized. Using the technology acceptance model, this research reveals the importance of the hedonic factor. The result of this research implies that the ways of stimulating and facilitating customers' participation in mobile commerce should be differentiated from those in Internet commerce

Source

trust

Exploring Trust among Globally Distributed Work Teams

Sue Newell, Gary David, Donald R. Chand
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2007-01-01
From feed: TITLE("trust")) + IS Conference

Trust among team members has been identified as a crucial variable for the success of projects executed by virtual teams. This paper explores trust among IT work teams whose members are located at sites that are distributed in the United States, Ireland and India. Our case analysis suggests that trust among team members is problematic and it can be difficult to achieve among on-shore and off-shore sites when a "client/vendor" orientation frames the relationship. The key point of this paper is that management cannot expect team members to be able to build trust through competence and personal relationships when the social dynamics of the firm creates fragmentation, "Us versus Them" feeling and an environment of distrust. As a result, workers at distributed sites must find ways of overcoming this orientation and developing some measure of personal rapport to enable the formation of trust and accomplishment of collaborative work

Source

trust

Does Interpersonal Trust Also Matter? Exploring the Role of Trust in Successful IT Outsourcing

Cong Qi, Patrick Y.K. Chau
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2007-01-01
From feed: TITLE("trust")) + IS Conference

Recently, the focus of IT outsourcing has been shifting from the "what" and "why" issues to "how" companies manage outsourcing process, during which the relationship management becomes vitally important for the overall success of IT outsourcing. Simultaneously, trust, as a component of relationship, plays a central role in the success of IT outsourcing relationship. In view of these, this paper will explore the role of trust in successful relationship management, and further in the ultimate IT outsourcing success. The paper will also contribute by categorizing trust into two levels-organizational level and individual level, and exploring especially the effects of interpersonal trust. Knowledge sharing as a risk taking behavior will mediate the path from trust to relationship success. Theory of Organization Boundary Systems and Social Exchange Theory will be used in the model building process, and a survey will be conducted to test the model empirically

Source

trust

A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data

Yi Hu, Zhichun Xiao, Brajendra Panda
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2007-01-01
From feed: TITLE("trust")) + IS Conference

This research studies the problem of evaluating the effect of deceptive data based on the information flow network and the Web of trust. We present an information dissemination model that illustrates the prerequisite for dissemination of information based on the subject and object trusts. To evaluate the effects of deceptive data accurately, we offer a quantitative model that is utilized to calculate to what extent the subjects in the information flow network are affected. The algorithm for evaluating the spread of deceptive data is provided and the time complexity of the algorithm is also analyzed

Source

trust

Supporting Trust Calibration and the Effective Use of Decision Aids by Presenting Dynamic System Confidence Information

John M. McGuirl, Nadine Sarter
Human Factors
Published: 2006-12-01
From feed: trust calibration

The findings from this research can inform the design of decision support systems in a variety of event-driven high-tempo domains.

Source

trust

Critical factors in establishing and maintaining trust in software outsourcing relationships

Phong Thanh Nguyen, Muhammad Ali Babar, June Verner
Proceedings International Conference on Software Engineering
Published: 2006-05-28
From feed: TITLE("trust")) + IS Conference

Trust is considered one of the most important factors for successfully managing software outsourcing relationships. However, there is lack of research into understanding the factors that are considered important in establishing and maintaining trust between clients and vendors. The goal of this research is to gain an understanding of software outsourcing vendors' perceptions of the importance of factors that are critical to the establishment and maintenance of trust in software outsourcing projects in Vietnam. We used a multiple case study design to guide our research and in-depth interviews to collect qualitative data from 12 Vietnamese software development practitioners drawn from 8 companies that have been developing software for Far Eastern, European, and American clients. Vendor companies identified that cultural understanding, creditability, capabilities, and personal visits are important factors in gaining the initial trust of a client, while cultural understanding, communication strategies, contract conformance, and timely delivery are vital factors in maintaining that trust.

Source

trust

Architectural support for trust models in decentralized applications

Girish Suryanarayana, Mamadou H. Diallo, Justin R. Erenkrantz, Richard N. Taylor
Proceedings International Conference on Software Engineering
Published: 2006-05-28
From feed: TITLE("trust")) + IS Conference

Decentralized applications are composed of distributed entities that directly interact with each other and make local autonomous decisions in the absence of a centralized coordinating authority. Such decentralized applications, where entities can join and leave the system at any time, are particularly susceptible to the attacks of malicious entities. Each entity therefore requires protective measures to safeguard itself against these entities. Trust management solutions serve to provide effective protective measures against such malicious attacks. Trust relationships help an entity model and evaluate its confidence in other entities towards securing itself. Trust management is, thus, both an essential and intrinsic ingredient of decentralized applications. However, research in trust management has not focused on how trust models can be composed into a decentralized architecture. The PACE architectural style, described previously [21], provides structured and detailed guidance on the assimilation of trust models into a decentralized entity's architecture. In this paper, we describe our experiments with incorporating four different reputation-based trust models into a decentralized application using the PACE architectural style. Our observations lead us to conclude that PACE not only provides an effective and easy way to integrate trust management into decentralized applications, but also facilitates reuse while supporting different types of trust models. Additionally, PACE serves as a suitable platform to aid the evaluation and comparison of trust models in a fixed setting towards providing a way to choose an appropriate model for the setting.

Source

trust

Information trustworthiness evaluation based on trust combination

Yanjun Zuo, Brajendra Panda
Proceedings of the ACM Symposium on Applied Computing
Published: 2006-04-23
From feed: TITLE("trust")) + IS Conference

Publishing information in a virtual organization (VO) has become too easy due to low barriers; hence development of novel mechanisms to assess the quality of collected information has become a necessity. An evaluator makes such an assessment based on the trust he/she places on the information. This paper presents a model for evaluating information trustworthiness in a data-intensive VO.When some information is derived from various data items gathered from multiple sources (each data item is called an object as used together with the term, subject), it is possible that no data value (called a version of the object) satisfies an evaluator's requirement with regard to information quality, if they are evaluated separately. According to the principle of object trust combination, if the final values of an object calculated by using significantly different methods are similar, then the evaluator places higher level of trust in the results. Intuitively, different versions of the same object that are calculated in different ways but have similar values provides "multiple-proofs" towards their correctness. We assume that a subject has no conflicting information on a given object.This paper uses a formal data structure to represent how a given piece of information (object version) has been formed and develops algorithms (see Section 4) to compare the component structure similarity/dissimilarity between two object versions. This helps in calculating the final trust values of the object.

Source

trust

Trust-enhanced visibility for personalized document recommendations

Claudia Heß, Klaus Stein, Christoph Schlieder
Proceedings of the ACM Symposium on Applied Computing
Published: 2006-04-23
From feed: TITLE("trust")) + IS Conference

Documents are recommended by computer-based systems normally according to their prominence in the document reference network. Based on the requirements identified in a concrete use case for recommending scientific publications, the paper claims that merely measuring prominence is insufficient for high quality recommendations. We propose to use information from a trust network in addition to the document network in order to improve and to personalize recommendations. A trust-enhanced visibility measure integrates trust information and the classical reference based measures. A simulation study applies the new visibility measure to the presented use case.

Source

trust

Modeling Initial and Repeat Online Trust in B2C E-Commerce

Wei-Chang Kong, Yu‐Ting Caisy Hung
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2006-01-01
From feed: TITLE("trust")) + IS Conference

Prior research has demonstrated that the degrees and impact of customer trust on purchase intentions change with online experience. While online trust research has incorporated and built upon models and theories of interpersonal trust, swift trust, and impersonal trust, this line of research tends to examine initial and repeat online trust separately. Based on a dual processing model of persuasion — Elaboration Likelihood Model (ELM), this study attempts to provide one theoretical framework to examine customers’ formation of initial trust and repeat trust simultaneously. The model identifies motivation and ability to assess online vendor’s attributes as the key drivers to the formation of online trust attitude. These two factors, in combination, determine the salience of different information in influencing one’s trust attitude toward an e-vendor. Initial and repeat online transactions implied different levels of motivation and ability to deliberate vendor-related attributes, explaining the often observed distinct processes in initial trust and repeat trust formation. Implications and applications of such a framework are discussed.

Source

trust

Trust: From Cognition to Conceptual Models and Design

Alistair Sutcliffe
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Published: 2006-01-01
From feed: TITLE("trust")) + IS Conference

written by Alistair Sutcliffe Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Source

trust

[PDF] Dealing with Trust in eGov Services

Vassily Kritis
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics.
Published: 2006-01-01
From feed: TITLE("trust")) + IS Conference

written by Vassily Kritis Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics.

Source | Open access

trust

Trust Assessment Using Provenance in Service Oriented Applications

Shrija Rajbhandari, Arnaud Contes, Omer Rana, Vikas Deora, Ian Wootten
Proceedings 2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops Edocw2006
Published: 2006-01-01
From feed: TITLE("trust")) + IS Conference

Workflow forms a key part of many existing Service Oriented applications, involving the integration of services that may be made available at distributed sites. It is possible to distinguish between an "abstract" workflow description outlining which services must be involved in a workflow execution and a "physical" workflow description outlining the particular instances of services that were used in a particular enactment. Provenance information provides a useful way to capture the physical workflow description automatically especially if this information is captured in a standard format. Subsequent analysis on this provenance information may be used to evaluate whether the abstract workflow description has been adhered to, and to enable a user executing a workflow-based application to establish "trust" in the outcome.

Source

trust

Analysis of Trust in the E-Commerce Adoption

Hyoung Yong Lee, Hyunchul Ahn, Ingoo Han
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2006-01-01
From feed: TITLE("trust")) + IS Conference

Understanding user acceptance of the Internet, especially the usage intention of virtual communities, is important in explaining the fact that virtual communities have been growing at an exponential rate in recent years. This paper studies the trust of virtual communities to better understand and manage the activities of E-commerce. A theoretical model proposed in this paper is to clarify the factors as they are related to the Technology Acceptance Model. In particular the relationship between trust and Intentions is hypothesized. Using the Technology Acceptance Model, this research showed that the importance of trust in virtual communities. According to the research, different ways of stimulating the members are necessary in order to facilitate participation in activities of virtual communities. The effect of trust in members on intention to use is stronger than that of trust in service providers. The intention to purchase is more sensitive to trust in service providers than trust in members.

Source

trust

"Falling in Love Is a Matter of Trust" &amp;amp;#8212; About the Importance of Trust and Information Substitutes When Offering Digital Paid Services on Dating Websites

Florian Stahl, Marion Freudenschuss
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2006-01-01
From feed: TITLE("trust")) + IS Conference

Customers are increasingly demanding trustworthy paid services in the digital economy. While there is an increasing amount of scientific literature on the economics of the Internet and trust, empirical studies concerning paid services can scarcely be found. This paper discusses research in the field of trust and reputation on paid services for dating websites. Considering the literature and examining an extensive data basis, we deploy two hypotheses to highlight reputation mechanisms of the supplier as well as the reputation of the consumers and the number of purchase transactions and revenues of digital paid services on dating websites in this evolving field. Several statistics included in this paper underline a strong and significant influence of information substitutes such as a seller’s reputation or reputation mechanisms among the customers on the number of purchase transactions and revenues of digital paid services on dating websites.

Source

trust

Are Trust and Distrust Distinct Constructs? An Empirical Study of the Effects of Trust and Distrust among Online Banking Users

John Benamati, Mark A. Serva, Mark A. Fuller
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2006-01-01
From feed: TITLE("trust")) + IS Conference

This study provides insights on the trust-related factors that influence consumer intentions to use online banking. Specifically, the study examines the relationships between trustworthiness, trust, distrust, and user intentions to use online banking services. Over 500 college students located across two different universities completed a survey designed to examine the effects of trustworthiness perceptions on trust and distrust, and the downstream influence of trust and distrust on intention to use. As hypothesized, results indicate that trust and distrust are distinct constructs, and that the established nomological network between trustworthiness, trust, and intention hold in the current context. Also supported is the new contention that trustworthiness is negatively related to distrust, and that distrust has a negative effect on intention to use. Finally, our hypothesis examining the relative contribution of trust and distrust on user intentions was not supported. In the context of this study, trust overwhelmed distrust.

Source

trust

Effects of Switching Cost, Trust, and Information Sharing on Supply Chain Performance for B2B e-Commerce: A Multi-Agent Simulation Study

Fu‐ren Lin, Yi-pong Lo, Yu-wei Sung
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2006-01-01
From feed: TITLE("trust")) + IS Conference

In e-commerce era, companies can build up supply chain relationship via Internet technologies. Facing the severe global competition, how companies sustain in volatile relations becomes an essential supply chain management issue. Among literatures in exploring the individual effects of trust, switching cost, and information sharing on supply chain performance, the interactive effects of these factors have not being investigated yet. This study, first, proposes a simulation model of switching cost, trust, information sharing and supply chain performance. The performance measures include average fulfillment rate, average stock cost, and average cycle time. Second, we conduct experiments on a multi-agent simulation platform to evaluate the supply chain performance affected by these factors under various order demand environments. Finally, results from experiments are analyzed to measure the effects of switching cost, trust, and information sharing on supply chain. Findings from this study can help managers better utilize switching cost and trust attributes to determine information sharing level in managing supply chain for B2B e-commerce.

Source

trust

An Empirical Investigation of How Trust, Cohesion, and Performance Vary in Virtual and Face-to-Face Teams

Kimberly Furumo, John Pearson
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2006-01-01
From feed: TITLE("trust")) + IS Conference

As technology improves, more teams are meeting virtually. In this study, we analyze how individual levels of trust, cohesion, output, outcome satisfaction, and process satisfaction differ in virtual and face-to-face teams completing different tasks. A controlled experiment in which business students were randomly assigned to either a virtual or face-to-face team, completing either an intellective or a preference task, was completed. Comparisons of the four task/technology conditions showed that virtual team members reported lower levels of trust, cohesion, outcome satisfaction, and process satisfaction. However, their output was essentially the same as individual working in face-to-face teams. No significant differences were found between the teams completing the intellective or preference tasks.

Source

trust

Trust, Dependence and Global Interorganizational Systems

Muhamad Shamsul Ibrahim, P.M.A. Ribbers
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2006-01-01
From feed: TITLE("trust")) + IS Conference

Previous research has emphasized the importance of dependence and trust on interorganizational systems. This paper focuses on how dependence and trust impact various types of investments in IOS related resources and how these investments produce benefits within a global context. A conceptual model is constructed combining transaction-cost economics, resources-based view, trust and dependence. Four explorative case studies are conducted on interorganizational systems employed within a global context. Dependent organizations are found to conduct the needed investments and to use different types of resources depending on the requirements of the powerful organization. Competence-based trust is found to influence human-based resources and resources that enable domain-knowledge transfer. Reliability-based trust is found to influence human-based resources and resources that enable interlinking processes. Combinations of human-based resources and resources that enable domain-knowledge transfer or business-process linkage are found to produce strategic benefits. The lack of human-based resources is found to produce only operational benefits.

Source

trust

Mini Track: 'Ethical, Legal and Economic Issues in the Digital Economy: Intellectual Property Rights, Piracy, Trust, Security and Privacy'

Alok Gupta, Ramnath K. Chellappa
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2005-04-01
From feed: TITLE("trust")) + IS Conference

The emergence of the Internet as the de facto medium for business has accentuated the role of factors such as intellectual property rights (IPR), consumer privacy, and trust. Newer technologies have it made it a challenging task to protect content for sellers and private information for consumers. This is the second time for this mini track at HICSS and it includes technical, analytical, empirical, and conceptual research spanning diverse research areas and methodologies including the social, behavioral, and economic issues. In his paper “Does drop in copying cost support copyright term extension?” Michael Y. Yuan examines copyright duration and analyzes the validity of the extending copyright duration. Through a simulation of an information product market, this model recommends that decrease in copying cost of information products reduces the optimal duration of copyright. Further, while longer life expectancy may support copyright term extension, this work finds that increase in demand for information products supports reduction in copyright duration.

Source

trust

A trust-enhanced recommender system application

Paolo Avesani, Paolo Massa, Roberto Tiella
Proceedings of the ACM Symposium on Applied Computing
Published: 2005-03-13
From feed: TITLE("trust")) + IS Conference

Recommender Systems (RS) suggests to users items they will like based on their past opinions. Collaborative Filtering (CF) is the most used technique to assess user similarity between users but very often the sparseness of user profiles prevents the computation. Moreover CF doesn't take into account the reliability of the other users. In this paper we present a real world application, namely moleskiing.it, in which both of these conditions are critic to deliver personalized recommendations. A blog oriented architecture collects user experiences on ski mountaineering and their opinions on other users. Exploitation of Trust Metrics allows to present only relevant and reliable information according to the user's personal point of view of other authors trustworthiness. Differently from the notion of authority, we claim that trustworthiness is a user centered notion that requires the computation of personalized metrics. We also present an open information exchange architecture that makes use of Semantic Web formats to guarantee interoperability between ski mountaineering communities.

Source

trust

Component based trust management in the context of a virtual organization

Yanjun Zuo, Brajendra Panda
Proceedings of the ACM Symposium on Applied Computing
Published: 2005-03-13
From feed: TITLE("trust")) + IS Conference

One of the difficulties in evaluating the trustworthiness of an object in a virtual organization is the lack of sufficient information to study how the object was formed and to what level its components should be trusted. If a subject could be provided with detailed information about the ingredients of a compound object, then the subject would be able to evaluate the trust level of that compound object with higher confidence. This paper introduces a scheme using labels associated with each object within the domain of a virtual organization to facilitate trust management. Each label supplies certain information regarding the originality of the associated object. Thus, partial trust (also called component trust) can be integrated to evaluate the composite trust of the compound object. Re-labeling enables object information update to accommodate the dynamic nature of a virtual organization. Indirect trust between two subjects can be calculated based on a trust network. Different subjects may view the same object with different trust values because they trust the components of the object to different degrees. This model uses recommendations supplied by other subjects to provide a dynamic and flexible way to adjust the trustworthiness of an object for a certain subject.

Source

trust

How to incorporate revocation status information into the trust metrics for public-key certification

Kemal Biçakcı, Bruno Crispo, Andrew S. Tanenbaum
Proceedings of the ACM Symposium on Applied Computing
Published: 2005-03-13
From feed: TITLE("trust")) + IS Conference

In a traditional PKI, the trust associated with a public key is expressed in binary either by 0 or 1. Alternatively, several authors have proposed trust metrics to evaluate the confidence afforded by a public key. However their work has a static point of view and does not take into account the issue of public key revocation. In this paper, we make the first attempt to incorporate the revocation status information into the trust metrics for public key certification. To achieve our goal, we use a tailored form of a vector of trust model recently proposed. This would allow us to reason formally about when there is a need to check revocation status and how reliable the revocation mechanism should be in a given security application.

Source

trust

[PDF] Value-oriented design of service coordination processes

Roel Wieringa, Jaap Gordijn
Proceedings of the ACM Symposium on Applied Computing.
Published: 2005-03-13
From feed: TITLE("trust")) + IS Conference

The rapid growth of service coordination languages creates a need for methodological support for coordination design. Coordination design differs from workflow design because a coordination process connects different businesses that can each make design decisions independently from the others, and no business is interested in supporting the business processes of others. In multi-business cooperative design, design decisions are only supported by all businesses if they contribute to the profitability of each participating business. So in order to make coordination design decisions supported by all participating businesses, requirements for a coordination process should be derived from the business model that makes the coordination profitable for each participating business. We claim that this business model is essentially a model of intended value exchanges. We model the intended value exchanges of a business model as e3 -value value models and coordination processes as UML activity diagrams. The contribution of the paper is then to propose and discuss a criterion according to which a service coordination process must be correct with respect to a value exchange model. This correctness is necessary to gain business support for the process. Finally, we discuss methodological consequences of this approach for service coordination process design.

Source | Open access

trust

Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK)

Jean-Marc Seigneur, Christian D. Jensen
Proceedings of the ACM Symposium on Applied Computing
Published: 2005-03-13
From feed: TITLE("trust")) + IS Conference

Computational models of trust and mechanisms based on the human notion of trust have been gaining momentum over the last couple of years. One reason for this is that traditional security mechanisms are challenged by open, large scale and decentralised environments. The use of an explicit trust management component goes beyond security though. Trust has been used in reputation systems, collaborative filtering, social/business networking services, dynamic coalitions and virtual organizations. Two very successful real-world applications based on computational trust are GoogleTM's PageRankTM trust metric, where the entities are the Web pages and their trust relationships are the hyperlinks between the pages, and eBay@'s user profile score, which represents the trustworthiness of a user according to recommendations about past transactions.

Source

trust

Guidelines for developing trust in health websites

Elizabeth Sillence, Pam Briggs, Lesley Fishwick, Peter R. Harris
14th International World Wide Web Conference Www2005
Published: 2005-01-01
From feed: TITLE("trust")) + IS Conference

How do people decide which health websites to trust and which to reject? Thirteen participants all diagnosed with hypertension were invited to search for information and advice relating to hypertension. Participants took part in a four-week study engaging in both free and directed web searches. A content analysis of the group discussions revealed support for a staged model of trust in which mistrust or rejection of websites is based on design factors and trust or selection of websites is based on content factors such as source credibility and personalization. A number of guidelines for developing trust in health websites are proposed.

Source

trust

[PDF] Trust-Based Secure Workflow Path Construction

Mine Altunay, Douglas Brown, Gregory T. Byrd, Ralph A. Dean
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics.
Published: 2005-01-01
From feed: TITLE("trust")) + IS Conference

written by Mine Altunay, Douglas Brown, Gregory T. Byrd, Ralph A. Dean Published by Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics.

Source | Open access

trust

Toward autonomic web services trust and selection

E. Michael Maximilien, Munindar P. Singh
Icsoc 04 Proceedings of the Second International Conference on Service Oriented Computing
Published: 2004-11-15
From feed: TITLE("trust")) + IS Conference

Emerging Web services standards enable the development of large-scale applications in open environments. In particular, they enable services to be dynamically bound. However, current techniques fail to address the critical problem of selecting the right service instances. Service selection should be determined based on user preferences and business policies, and consider the trustworthiness of service instances.

Source

trust

Propagation of trust and distrust

R. Guha, Ravi Kumar, Prabhakar Raghavan, Andrew Tomkins
Thirteenth International World Wide Web Conference Proceedings Www2004
Published: 2004-05-17
From feed: TITLE("trust")) + IS Conference

A (directed) network of people connected by ratings or trust scores, and a model for propagating those trust scores, is a fundamental building block in many of today's most successful e-commerce and recommendation systems. We develop a framework of trust propagation schemes, each of which may be appropriate in certain circumstances, and evaluate the schemes on a large trust network consisting of 800K trust scores expressed among 130K people. We show that a small number of expressed trusts/distrust per individual allows us to predict trust between any two people in the system with high accuracy. Our work appears to be the first to incorporate distrust in a computational trust propagation setting.

Source

trust

[PDF] Trust enhanced ubiquitous payment without too much privacy loss

Jean-Marc Seigneur, Christian D. Jensen
Proceedings of the ACM Symposium on Applied Computing.
Published: 2004-03-14
From feed: TITLE("trust")) + IS Conference

Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in a customer, a means to link transactions using the same e-purse is required. Roughly, trust is a result of knowledge. As the number of transactions increases, the resulting increase in knowledge about the user of the e-purse threatens privacy due to global profiling. We present a scheme (and its prototype) that mitigates this loss of privacy without forbidding the use of trust for smoothing payment by giving the opportunity to the user to divide trust (i.e. transactions) according to context (e.g. location, user's current activity or subset of shops).

Source | Open access

trust

A comparison of team developmental stages, trust and performance for virtual versus face-to-face teams

Gail Corbitt, Lorraine R. Gardiner, Lauren K. Wright
Proceedings of the Hawaii International Conference on System Sciences
Published: 2004-01-01
From feed: TITLE("trust")) + IS Conference

This study is an empirical analysis that compares virtual with face-to-face teams on team trust, performance issues and team developmental stages. The study uses data collected both before teams were formed and after teams completed their project deliverable. Pre-task measures include individual disposition to trust and initial team trust. Upon completion of their deliverable, team members responded to post-task measures on motivation, team trust and teamwork dynamics. In addition to these attitudinal comparisons, we investigate how teams spent their time during the completion of their team task. We examine potential differences in the percentage of time spent in each of the classic team formation stages (forming, storming, norming and performing). Team members also reported the total time spent completing the deliverable as well as time spent using various communication tools. In addition, we evaluate and compare team performance in terms of the deliverable quality. Our results indicate that both virtual and face-to-face teams bring relatively high initial trust to the team experience. More enduring trust, however, must be maintained by positive, task-oriented team dynamics. Team mates need to meet work expectations in order to maintain the trusting environment. We confirm that trust is important to team performance for both virtual and face-to-face teams. Higher trust teams do tend to perform better. We also found that both virtual and face-to-face teams spend similar proportions of time in each team formation stage. Finally, there is no significant difference in results produced by face-to-face and virtual teams, though in this study the direction of effectiveness leans towards the virtual teams. This is potentially good news since many believe that face-to-face groups produce better results than their virtual counterparts.

Source

trust

Assessing trust among IS personnel: a view of general trust, trust of management and inter-organizational trust

Tom Roberts, P. Sweeney, Dean B. McFarlin, Paul H. Cheney
Proceedings of the Hawaii International Conference on System Sciences
Published: 2004-01-01
From feed: TITLE("trust")) + IS Conference

Trust is a central component in most relationships and a vital component in business transactions. This paper evaluates several trust levels for IS personnel. The general trust of people, trust of management and supervisors, and inter-organizational trust are evaluated. The study surveyed 168 information systems workers. The results indicate a low level of trust by information systems personnel in all aspects of trust. These results should be of notice for management in IS organizations because they must understand the perceptions of their employees as they conduct business both internally in their organization and in dealing with potential customers or clients.

Source

trust

Building citizen trust through e-government

Michael Parent, Christine A. Vandebeek, Andrew Gemino
Proceedings of the Hawaii International Conference on System Sciences
Published: 2004-01-01
From feed: TITLE("trust")) + IS Conference

The trust of citizens in their governments has gradually eroded. One response by several North American governments has been to introduce e-government, or Web-mediated citizen-to-government interaction. This paper tests the extent to which online initiatives have succeeded in increasing trust and external political efficacy in voters. An Internet-based survey of 182 Canadian voters shows that using the Internet to transact with government has a significantly positive impact on trust and external political efficacy. Interestingly, though the quality of the interaction is important, it is secondary to internal political efficacy in determining trust levels, and not significant in determining levels of external political efficacy (or perceived government responsiveness). For policy-makers, this suggests e-government efforts might be better-aimed at citizens with high pre-extant levels of trust, rather than in developing better Web sites. For researchers, this paper introduces political efficacy as an important determinant of trust as it pertains to e-government.

Source

trust

Using context- and content-based trust policies on the semantic web

Christian Bizer, Radoslaw Oldakowski
Proceedings of the 13th International World Wide Web Conference on Alternate Track Papers and Posters Www Alt 2004
Published: 2004-01-01
From feed: TITLE("trust")) + IS Conference

The current discussion about a future Semantic Web trust architecture is focused on reputational trust mechanisms based on explicit trust ratings. What is often overlooked is the fact that, besides of ratings, huge parts of the application-specific data published on the Semantic Web are also trust relevant and therefore can be used for flexible, fine-grained trust evaluations. In this poster we propose the usage of context- and content-based trust mechanisms and outline a trust architecture which allows the formulation of subjective and task-specific trust policies as a combination of reputation-, context- and content-based trust mechanisms.

Source

trust

Decentralized trust management and accountability in federated systems

Brent Chun, Andy Bavier
Proceedings of the Hawaii International Conference on System Sciences
Published: 2004-01-01
From feed: TITLE("trust")) + IS Conference

In this paper, we describe three key problems for trust management in federated systems and present a layered architecture for addressing them. The three problems we address include how to express and verify trust in a flexible and scalable manner, how to monitor the use of trust relationships over time, and how to manage and reevaluate trust relationships based on historical traces of past behavior. While previous work provides the basis for expressing and verifying trust, it does not address the concurrent problems of how to continuously monitor and manage trust relationships over time. These problems close the loop on trust management and are especially relevant in the context of federated systems where remote resources can be acquired across multiple administrative domains and used in potentially undesirable ways (e.g., to launch denial-of-service attacks).

Source

trust

Knowledge and the development of interpersonal trust: a dynamic model

Luis F. Luna‐Reyes, Anthony M. Cresswell, George P. Richardson
Proceedings of the Hawaii International Conference on System Sciences
Published: 2004-01-01
From feed: TITLE("trust")) + IS Conference

This paper presents a model of interpersonal trust dynamics, grounded in a longitudinal case study of an interorganizational information technology development project in New York State. System dynamics is the simulation method selected in this theory-building effort, based on qualitative data collected by the Center for Technology in Government. The model integrates concepts from economic models, as well as psychological and sociological theories about trust, learning, and perceptual processes in interpersonal relations. The simulation experiments show plausible path dependent behaviors with the characteristic asymmetries between trust and distrust described both in the literature an in the case data. The role of trust and knowledge development in the success of these projects is explored by combining models of sub processes into larger models of the overall collaboration. The value of the model as a theory building tool is enhanced by extended data collection and combining with related process models.

Source

trust

Trust in virtual healthcare communities: design and implementation of trust-enabling functionalities

W. Ebner, Jan Marco Leimeister, Helmut Krcmar
Proceedings of the Hawaii International Conference on System Sciences
Published: 2004-01-01
From feed: TITLE("trust")) + IS Conference

Trust in online communities, particularly in the healthcare domain, provides (apart from other success factors) the foundation for a successful implementation and operation of a virtual community (VC). A look at existing communities however leads to the conclusion that many VCs fail to meet requirements upon which trust is established. Based on the researchers' experience, this paper describes how trust-enabling functionalities can be systematically designed and implemented in a virtual community for cancer patients. The presented components support the process of creating trust in the VC and contribute to the successful implementation and maintenance of the community. The paper concludes with a discussion on aspects of trust yet to be implemented and recommendations for further research in this area.

Source

trust

A computational model of trust and reputation

Lik Mui, Mojdeh Mohtashemi, Ari Halberstadt
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2003-10-01
From feed: TITLE("trust")) + IS Conference

Despite their many advantages, e-businesses lag behind brick and mortar businesses in several fundamental respects. This paper concerns one of these: relationships based on trust and reputation. Recent studies on simple reputation systems for e-Businesses such as eBay have pointed to the importance of such rating systems for deterring moral hazard and encouraging trusting interactions. However, despite numerous studies on trust and reputation systems, few have taken studies across disciplines to provide an integrated account of these concepts and their relationships. This paper first surveys existing literatures on trust, reputation and a related concept: reciprocity. Based on sociological and biological understandings of these concepts, a computational model is proposed. This model can be implemented in a real system to consistently calculate agents' trust and reputation scores.

Source

trust

Third-party assurances: the road to trust in online retailing

Kathryn M. Kimery, M. McCord
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2003-10-01
From feed: TITLE("trust")) + IS Conference

Consumer trust of Internet vendors is a major factor influencing the success of e-commerce. To enhance consumer trust, many e-retailers are experimenting with various trust-building strategies, including participation in third party assurance programs. The study presents a model describing the relationship between trust and online purchasing, as well as related relationships with antecedents to both trust and purchasing: third-party assurances, individual disposition to trust, perceived risk of purchasing online from a particular Web merchant, and attitude toward a particular Web merchant. Four manipulations of a simulated retail Web site were used to test nine model-derived hypotheses. Data were collected and analyzed from a pilot study of 164 subjects. The initial results lend tentative support to six of the nine hypotheses, but not those postulating relationships between assurance seals and trust in e-retailers.

Source

trust

Artificial agents play the "Mad Mex trust game": a computational approach

Dazhong Wu, Steven O. Kimbrough, Fang Zhong
Proceedings of the Annual Hawaii International Conference on System Sciences
Published: 2003-10-01
From feed: TITLE("trust")) + IS Conference

We investigate the "Mad Mex trust game," a game of trust which cannot easily be represented in a strategic form. We investigate such questions as: Will cooperative behavior emerge and under what conditions? What are some of the efficient and effective mechanisms for trust building in electronic markets? How will these mechanisms affect the emergence of trust and cooperative behavior? What are the key ingredients in building distributed trust and what destroys trust? This game constitutes a more realistic model of negotiation in electronic markets, particularly on the Internet.

Source

trust

The transitional role of institutional trust in online interorganizational relationships

Paul A. Pavlou, Yao‐Hua Tan, David Gefen
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

Given the uncertainty of the online environment, institutional trust is fundamental in building and retaining online interorganizational relationships. The authors propose two types of institutional trust (a) third-party institution-based trust, which deals with intermediary driven structures, such as those in online B2B marketplaces, and (b) bilateral institutionalized trust, which deals with dyadic interorganizational processes, standards, and norms. We examine how institutional trust develops through their underlying dimensions (i) structural assurances, (ii) facilitating conditions, and (in) situational normality to engender trust and influence relationship continuity. This study focuses on the time-dependent nature of institutional trust from the exploratory to the maturity phase by describing (a) the role of bilateral relative to third-party institutional trust on buyer-supplier trust, and (b) the transition of the three underlying institutional dimensions on trust over the relationship's life cycle. This research has implications for (I) the longitudinal role of institutional trust in online relationship building, (2) the design of trust-building mechanisms in online B2B marketplaces, (3) the safe and cost-effective building of online interorganizational relationships, and (4) the literature on initial trust formation.

Source

trust

Trust in electronic environments

Kari Chopra, William A. Wallace
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

The objective of this paper is to provide a unified, theoretically grounded framework for trust in electronic environments. An overview of the research on trust is presented, examining the nature of the concept, its definition, and the factors and processes that contribute to trust. The result is an integrated model that provides a comprehensive framework for trust in a variety of settings. This general model of trust is then applied to four domains within electronic environments: information, information systems, electronic commerce, and online relationships. The benefits of this unified framework for trust are twofold. First, it provides a common language for information systems researchers studying trust in different domains. Second, it provides solid theoretical grounding for the study of trust in information systems. It thus enables the information systems community to engage in a more formal and systematic study of trust.

Source

trust

The effect of external safeguards on human-information system trust in an information warfare environment

David Biros, Gregory S. Fields, Gregg H. Gunsch
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

The modern military command and control (C2) center collects a massive amount of information that is both complex and contradictory. The amount of collected information is often more than can be effectively and efficiently understood by humans. Therefore, today's decision-makers have become reliant upon information systems to filter through the information and fuse that information into a computer representation of the battle space. The degree of reliance placed in these systems by the decision-makers suggests a significant level of trust. Trust theories and models are rich in the literature, but few have been developed for the human-computer trust relationship. A recent model of trust was found that was both broad in scope and supportive of human-computer trust theories. This model was used to explore the decision-maker's trust in information systems in a C2 environment. Given the vulnerability of information systems to information security incidents such as hacking and data manipulation, this study set out to examine if the presence of such incidents would effect the decision-makers trusting behavior. This study also examined if the use of such external safeguards, such as the computer emergency response teams (CERT) and the network risk assessment certifications, would affect the decision-maker. Two laboratory experiments were conducted with military personnel using a high-fidelity C2. The findings from both experiments suggest that the presence of information security incidents in a fast-paced C2 environment have no effect on the decision-makers trusting behavior. Decision-makers continued to trust information systems even though information security incidents occurred.

Source

trust

Dissecting trust and the assurance-violation dynamic

Samuel T. Redwine
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

The nature of trust a party extends is first subdivided into the areas of level of trust, scopes of applicability, and definiteness. Complications that arise when considering assurance and violations of trust are covered. A framework is provided for the dynamics of trust assurance opposed by potential or actual violations. The assurance side is based on dependability concepts while the violation side has its origins in military processes and concepts. Connecting these two sides are decision processes that reflect the dynamic interaction of the trusting and trusted/distrusted parties. The paper includes an example application of the framework within the computer security domain.

Source

trust

Framework and methods for the study and analysis of trust in information systems

Rubén Prieto-Díaz
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

The goal of this minitrack is to generate research interest in the core concepts of trusted computing: fundamental issues about trust and how trust can be specified designed and programmed into information systems. There is an urgent need for an ability to specify and unambiguously define the characteristics that make computer systems trustworthy.

Source

trust

The conceptualization of trust, risk and their electronic commerce: the need for clarifications

David Gefen, V. Srinivasan Rao, Noam Tractinsky
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

In recent years, significant advances have been made in the understanding of trust and risk in electronic commerce. However, in examining the published research, some troublesome trends surface. These trends include: (a) the tendency to treat conceptualizations of trust and risk as unidimensional constructs, ignoring the large body of literature suggesting that they are complex, multidimensional constructs; (b) the tendency to ignore whether trustworthiness is part of trust or a possibly different construct; and (c) the tendency to articulate relationships between trust and risk idiosyncratically without attention to prior articulations. These trends are troublesome because they have the potential to hamper the field's ability to do cumulative research in the long run. The goal of this article is to highlight these trends and call for greater attention to the issues raised in future research.

Source

trust

SME e-procurement adoption in Hong Kong - the roles of power, trust and value

Joyce Chan, Matthew Lee
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

The objective of this research is to test a model of electronic procurement (e-procurement) adoption behavior by small- to medium-sized enterprises (SME). We investigate the phenomenon from the perspective of buyer-seller relationship and argue that, value of e-procurement adoption, trust on supplier, trust on IT, power of e-procurement and power of suppliers are factors leading to SME's adoption behavior. Research findings from the four case studies provide some evidence that the former four factors have significant effect on SME's e-procurement adoption behavior when the last one does not. This study contributes to a better understanding of how and why SME in Hong Kong employ e-procurement using a snapshot approach. Practical and theoretical implications are also provided.

Source

trust

Can IT help government to restore public trust? Declining public trust and potential prospects of IT in the public sector

M.J. Moon
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

During the past four decades, public trust in governments has continued to diminish due to various administrative, political, socio-cultural, economic, and mass media causes. Focusing on the administrative dimension, this study explores selected administrative factors to the declining of public trust, including public perception of administrative corruption (lack of transparency), inefficiency (wastefulness), ineffectiveness, and policy alienation. We argue that information technology (IT) can offer potentially useful tools to governments and help them to restore public trust by enhancing transparency, cost efficiency, effectiveness, and policy participation. This argument is illustrated by four selected mini cases (OPEN system in Seoul, eVA in Virginia, eFiling for IRS tax returns, and online policy forums in Seoul and Pennsylvania). Despite a generalizability problem, this study offers a cautious but positive view on the potential contribution of IT in restoring pubic trust.

Source

trust

A preliminary assessment of different trust formation models: the effect of third party endorsements on online shopping

Sarah P. W. Shek, Choon Ling Sia, Kai H. Lim
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

This study investigates two trust building models - Mayer's factor-based model, and McKnight's process-based model of trust formation. It critically outlines the two different models of trust formation and adapts them for application in an online environment. Through a series of case studies we undertake a preliminary assessment of which model fits better to online shopper behaviors. We use the cases and interviews of online shoppers to understand how trust is formed in new online shopping experiences, and develop preliminary insights into the effectiveness of third party endorsements for trust building. We focus on comparative impact of satisfied customers' individual endorsements and portal affiliation. The findings of interviews raise our understanding of online trust formation and online consumer buying intentions. Also, this study raises a number of hypotheses, and suggests how Internet firms should utilize different endorsement strategies.

Source

trust

Trust, trait theory, and collaboration in telemedicine: a circumplex perspective

H.G. Brown, Marshall Scott Poole, Thomas L. Rodgers, K. Van Walsum
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

More than a process-automating tool, telemedicine is increasingly recognized for its ability to facilitate collaboration and knowledge creation between disparate healthcare providers. As trust is being demonstrated to affect positively the collaborative effort of practitioners and the concomitant, as well as subsequent impact on quality of health care delivery, the questions arise, What are the interpersonal traits of practitioners that contribute to a constructive and continuing telemedicine-centered collaboration? Furthermore, how do these interpersonal traits translate into specific types of interactions that maximize telecollaboration? These questions are especially germane as much telemedicine equipment remains underutilized, and administrators concern themselves with sustainability. Previous work has largely centered on relational variables affecting trust in collaboration, such as competence, reputation, and trustworthiness, but has neglected the personal characteristics that might impact participants' proclivity to collaborate and trust. This paper introduces the circumplex model as a framework for understanding the development of trust in collaborative telemedicine. The circumplex posits that interpersonal interaction can be explained along the two dimensions of power and affiliation. Sixteen personality traits may be arrayed in a circular or clockwise fashion around the psychological axis of Dominance and Nurturance. Recent causal modeling studies - of the relational relationships between the dimensions of the circumplex theory of interpersonal interaction and measures of interpersonal trust - have found that the circumplex dimensions of Dominance and Nurturance are sign positive predictors of interpersonal trust. Understanding these interpersonal characteristics of individuals may help address the constraints impeding telemedicine usage.

Source

trust

Internet use, transparency, and interactivity effects on trust in government

Eric W. Welch, Charles C. Hinnant
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

This paper asks how Internet use, citizen satisfaction with e-government and citizen trust in government are interrelated. Prior research has found that agencies stress information and service provision on the Web (one-way e-government strategy), but have generally ignore applications that would enhance citizen-government interaction (two-way e-government strategy). Based on a review of the literature, we develop hypotheses about how two facets of e-democracy - transparency and interactivity - may affect citizen trust in government. Using data obtained from the Council on Excellence in Government, we apply a two stage multiple equation model. Findings indicate that Internet use is positively associated with transparency satisfaction but negatively associated with interactivity satisfaction, and that both interactivity and transparency are positively associated with citizen trust in government. We conclude that the one-way e-transparency strategy may be insufficient, and that in the future agencies should make and effort to enhance e-interactivity.

Source

trust

Whoops... did I use the wrong concept to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts

Harrison McKnight, Charles J. Kacmar, V. Choudhury
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

Significant work has been initiated on trust in e-commerce settings, but little research has addressed distrust. Because of its connection to the insecurities that are found in risky situations, disposition to distrust is particularly suited to addressing issues of high risk, while disposition to trust is better suited for low risk issues. High risk issues include: a) perceptions that the Web is risky; and b) a willingness to depend on a specific unknown Web vendor in light of that risk. This theoretical position serves as the basis of a model of what causes consumers to initially decide to trust/distrust the Web and to explore and trust a Web site. The model includes three dispositions to trust constructs and one disposition to distrust construct. As proposed, the study found that disposition to trust predicted the low risk Web constructs, while disposition to distrust predicted the high risk Web constructs. This suggests that disposition to distrust has greater potential for predicting high-risk outcome constructs in e-commerce. This article contributes by showing how various aspects of disposition to trust/distrust affect consumer Web perceptions in different ways, depending on their level of risk. For e-commerce research, the findings of this article suggest that perhaps scholars have been studying a less effective factor for addressing risk - disposition to trust - instead of what may be a more effective factor - disposition to distrust.

Source

trust

Trust and deception in mediated communication

Judee K. Burgoon, G.A. Stoner, Joseph A. Bonito, Norah E. Dunbar
Proceedings of the 36th Annual Hawaii International Conference on System Sciences Hicss 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

Guided by interpersonal deception theory and the principle of interactivity, this investigation examined whether communication modalities differentially affect the extent to which group members develop trust or are vulnerable to manipulation and deceit, based on the degree of interactivity the modalities afford. According to the principle of interactivity, involvement and mutuality should increase as one move from text to audio and audiovisual (AV) modalities, to face-to-face (FtF) communication. Under nondeceptive circumstances, greater interactivity should elicit corresponding increases in trust and credibility; under deceptive circumstances, it should produce greater truth biases and inaccurate detection of deceit. This effect should be partly mitigated in text and audio modalities due to the presence of diagnostic deception indicators Pairs were assigned to a truthful or deceptive condition in one of three mediated conditions, or in a face-to-face condition. In the deceptive condition, one member of each pair was enlisted to deceive during the interaction. Following discussion, participants rated their communicative behavior and the credibility of the truthful or deceptive actor. Truth bias and accuracy in judging deceptive information was calculated. Results are compared to previous findings from face-to-face deception. Implications for collaborative technologies are advanced.

Source

trust

A formal model for trust in dynamic networks

Marco Carbone, Morten S. Nielsen, Vladimiro Sassone
Proceedings 1st International Conference on Software Engineering and Formal Methods Sefm 2003
Published: 2003-01-01
From feed: TITLE("trust")) + IS Conference

We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a novel notion of trust structures which, building on concepts from trust management and domain theory, feature at the same time a trust and an information partial order.

Source

trust

Developing trust in virtual teams

Carlo Iacono, Suzanne Weisband
Proceedings of the Hawaii International Conference on System Sciences
Published: 2002-11-22
From feed: TITLE("trust")) + IS Conference

A research project with distributed electronic teams was conducted to examine how virtual temporary teams quickly develop and maintain trust relationships with people that they hardly know, and may never meet again, with the goal of producing interdependent work. The authors collected data from 14 teams of students from three different universities with the aim of providing a theoretical and empirical explanation of what temporary, distributed teams do to produce trust as a foundation for cooperative work. The results suggest that high levels of trust were maintained in teams that engaged in continuous and frequent interaction, were more efficient in moving through the phases of the project, focused on the work content of their projects, and achieved sufficient amounts of social penetration during the first part of the project to increase their work effectiveness throughout its conclusion. The implications of trust in virtual teams are discussed.

Source

trust

Display Signaling in Augmented Reality: Effects of Cue Reliability and Image Realism on Attention Allocation and Trust Calibration

Michelle Yeh, Christopher D. Wickens
Human Factors
Published: 2001-09-01
From feed: trust calibration

This experiment seeks to examine the relationships among three advanced technology features (presentation of target cuing, reliability of target cuing, and level of image reality and the attention and trust given to that information). The participants were 16 military personnel who piloted an unmanned air vehicle and searched for targets camouflaged in terrain, which was presented at two levels of image realism. Cuing was available for some targets, and the reliability of this information was manipulated at two levels (100% and 75%). The results showed that the presence of cuing aided target detection for expected targets but drew attention away from the presence of unexpected targets. Cuing benefits and attentional tunneling were both reduced when cuing became less reliable. Increasing image realism was compelling but increased reliance on the cuing information when those data were reliable. Potential applications include a cost-benefit analysis of how trust modulates attention in the use of automated target recognition systems and the extent to which increased realism may influence this trust.

Source

Move to earlier state

Move to later state