The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2009 vol.24)
pp: 5-11
Robert R. Hoffman , Institute for Human and Machine Cognition
John D. Lee , University of Wisconsin–Madison
David D. Woods , The Ohio State University
Nigel Shadbolt , University of Southampton
Janet Miller , US Air Force Research Laboratory
Jeffrey M. Bradshaw , Institute for Human and Machine Cognition
ABSTRACT
<p>In the game of cybersecurity catch-up, clever hackers repeatedly find some new malware scheme, and security people then come up with a new software or hardware patch. Although attempts to improve software and hardware must continue, what else might be done besides playing the clever game? Trust in and through technology will likely mediate the effectiveness of software and hardware in maintaining security on the Networld, where cultural, social, psychological, and computational elements are merging. This essay examines five human-centered issues for Networld: "anti-trust" in technology, a consensus on what "trust" is, interpersonal trust versus trust in automation, trusting as a dynamic process, and resilience engineering for the active management of trust.</p>
INDEX TERMS
Human-Centered Computing, trust, trust evaluation tools, online fraud, online security, trust in automation, trust relationships, resilience engineering
CITATION
Robert R. Hoffman, John D. Lee, David D. Woods, Nigel Shadbolt, Janet Miller, Jeffrey M. Bradshaw, "The Dynamics of Trust in Cyberdomains", IEEE Intelligent Systems, vol.24, no. 6, pp. 5-11, November/December 2009, doi:10.1109/MIS.2009.124
REFERENCES
1. K. Raina and A. Harsh, eCommerce Security: A Beginner's Guide, McGraw Hill, 2001.
2. B. Ortutay, "Don't Post That: Web Etiquette Evolves," Associated Press, 4 Sept. 2009, www.dailynews.com/news/ci_13273951.
3. C. Rhoads and L. Chao, "Iran's Web Spying Aided by Western Technology," Wall Street Journal, 22 June 2009, p. 2, http://online.wsj.com/article/SB124562668777335653.html.
4. B. Stelter and B. Stone, "Web Pries Lid of Iranian Censorship," New York Times, 22 June 2009, www.nytimes.com/2009/06/23/world/middleeast/23censor.html.
5. N. Gammeltoft and R. Garner, "Twitter, Facebook Resume Online Services after Cyber Attacks," Bloomberg.com, 7 Aug. 2009, www.bloomberg.com/apps/news?pid=20601102&sid=aEVBXs9eH8Gg.
6. "Finding Information on the Internet: A Guide," Teaching Library Internet Workshops, Univ. of California, Berkeley, 2009, www.lib.berkeley.edu/TeachingLib/Guides/Internet.
7. N. Shadbolt, "A Matter of Trust," IEEE Intelligent Systems, vol. 17, no. 1, 2002, pp. 2–3.
8. E. Naone, "Adding Trust to Wikipedia, and Beyond," Tech. Rev., 4 Sept. 2009, www.technologyreview.com/web/23355/?a=f.
9. L.C. Baldor, "US Officials Eye North Korea in Cyber Attack," Associated Press, 8 July 2009, www.usatoday.com/news/washington/2009-07-08-hacking-washington-nkorea_N.htm.
10. J. Weckerlein, "Cyberspace Warfare Remains Serious Business," Air Force Print News Today, 2 Mar. 2007, www.af.mil/news/story_print.asp?id=123043232.
11. P. Koopman and R.R. Hoffman, "Work-Arounds, Make-Work, and Kludges," IEEE Intelligent Systems, vol. 18, no. 6, pp. 70–75.
12. R.R. Hoffman, M. Marx, and P.A. Hancock, "Metrics, Metrics, Metrics: Negative Hedonicity," IEEE Intelligent Systems, vol. 23, no. 2, pp. 69–73.
13. R.R. Hoffman et al., "A Method for Eliciting, Preserving, and Sharing the Knowledge of Forecasters," Weather and Forecasting, vol. 21, no. 3, 2006, pp. 416–428.
14. M.T. Dzindolet et al., "The Role of Trust in Automation Reliance," Int'l J. Human-Computer Studies, vol. 58, no. 6, 2003, pp. 697–718.
15. R. Parasuraman and V. Riley, "Humans and Automation: Use, Misuse, Disuse, Abuse," Human Factors, vol. 39, no. 2, 1997, pp. 230–253.
16. J.D. Lee and K.A. See, "Trust in Automation: Designing for Appropriate Reliance," Human Factors, vol. 46, no. 1, 2004, pp. 50–80.
17. D.D. Woods and E. Hollnagel, Joint Cognitive Systems: Patterns in Cognitive Systems Engineering, CRC Press, 2006.
18. R.R. Hoffman and D.D. Woods, "Steps Toward a Theory of Complex and Cognitive Systems," IEEE Intelligent Systems, vol. 20, no. 1, 2005, pp. 76–79.
19. J.K. Rowling, Harry Potter and the Chamber of Secrets, Scholastic Press, 1999, p. 329.
20. K. O'Hara, Trust: From Socrates to Spin, Icon Books, 2004, p. 5.
21. R.C. Mayer, J.H. Davis, and F.D. Schoorman, "An Integrative Model of Organizational Trust," Academy of Management Rev., vol. 20, no. 3, 1995, pp. 709–734.
22. J.A. Simpson, "Psychological Foundations of Trust," Current Directions in Psychological Science, vol. 16, no. 5, 2007, pp. 264–268.
23. T.D. Huynh, N.R. Jennings, and N.R. Shadbolt, "An Integrated Trust and Reputation Model for Open Multi-Agent Systems," Autonomous Agents and Multi-Agent Systems, vol. 13, no. 2, 2006, pp. 119–154.
24. R. Stephens, A. Morison, and D.D. Woods, "Trust, ATR, and Layered Sensing: Models, Metrics, and Directions for Design," report to the US Air Force Research Laboratory, Sensors Directorate, from the Cognitive Systems Engineering Laboratory, Inst. for Ergonomics, Ohio State Univ., 2009.
25. C. Nass and Y. Moon, "Machines and Mindlessness: Social Responses to Computers," J. Social Issues, vol. 56, no. 1, 2000, pp. 81–103.
26. S. Lewandowsky, M. Mundy, and G. Tan, "The Dynamics of Trust: Comparing Humans to Automation," J. Experimental Psychology: Applied, vol. 6, no. 2, 2000, pp. 104–123.
27. G. Klein et al., "Ten Challenges for Making Automation a 'Team Player' in Joint Human-Agent Activity," IEEE Intelligent Systems, vol. 19, no. 6, 2004, pp. 91–95.
28. C.L. Corritore, B. Kracher, and S. Wiedenbeck, "On-Line Trust: Concepts, Evolving Themes, a Model," Int'l. J. Human-Computer Studies, vol. 58, no. 6, 2003, pp. 737–758.
29. A.M. Bisantz and Y. Seong, "Assessment of Operator Trust in and Utilization of Automated Decision-Aids under Different Framing Conditions," Int'l J. Industrial Ergonomics, vol. 28, no. 2, 2001, pp. 85–97.
30. V. Riley, "Operator Reliance on Automation: Theory and Data," Automation Theory and Applications, R. Parasuraman, and M. Mouloua eds., Erlbaum, 1996, pp. 19–35.
31. J. Gao, and J.D. Lee, "Extending the Decision Field Theory to Model Operators' Reliance on Automation in Supervisory Control Situations," IEEE Trans. Systems, Man, and Cybernetics, vol. 36, no. 5, 2006, pp. 943–959.
32. A. Vasalou, A. Hopfensitz, and J. Pitt, "In Praise of Forgiveness: Ways for Repairing Trust Breakdowns in One-Off Online Interactions," Int'l J. Human-Computer Studies, vol. 66, no. 6, 2008, pp. 466–480.
33. E. Hollnagel, D.D. Woods, and N. Leveson eds., , Resilience Engineering: Concepts and Precepts, Ashgate, 2006.
34. J. Watts-Perotti and D.D. Woods, "Cooperative Advocacy: A Strategy for Integrating Diverse Perspectives in Anomaly Response," J. Collaborative Computing, vol. 18, nos. 2–3, 2009, pp. 175–198.
35. E. Ostrom, "Toward a Behavioral Theory Linking Trust, Reciprocity, and Reputation," Trust and Reciprocity: Interdisciplinary Lessons from Experimental Research, E. Ostrom, and J. Walker eds., Russell Sage Foundation, 2003.
36. D. Weitzner et al., "Information Accountability," Comm. ACM, vol. 51, no. 6, 2008, pp. 82–87.
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool