<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Security and Morality: A Tale of User Deceit</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alla Genkina UCLA Information Studies</string-name>
          <email>alla@ayre.org</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cathleen McGrath College of Business Administration Loyola Marymount University</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>General Terms Security</institution>
          ,
          <addr-line>Management, and Experimentation</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>L Jean Camp Indiana University School of Informatics</institution>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>There has been considerable debate about the apparent irrationality of end users in choosing with whom to share information, with much of the discourse crystallized in research on phishing. Designs for security technology in general, anti-spam technology, and anti-phishing technology has been targeted on specific problems with distinct methods of mitigation. In contrasts, studies of human risk behaviors argue that such specific targets for specific problems are unlikely to provide a significant increase in user trust of the internet, as humans lump and generalize. We initially theorized that communications to users need to be less specific to technical failures and more deeply embedded in social or moral terms. Our experiments indicate that users respond more strongly to a privacy policy failure than an arguably more risky technical failure. From this and previous work we conclude that design for security and privacy needs to be more expansive in that there should be more bundling of signals and products, rather than more delineation of problems into those solvable by discrete tools. Usability must be more than the interface design, but rather integrate security and privacy into a trust interaction.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Security</kwd>
        <kwd>Trust</kwd>
        <kwd>Trustworthiness</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Categories and Subject Descriptors</title>
      <p>Computers and Society</p>
      <p>
        The efficacy of trust technologies is to some degree a
function of the assumptions of human trust behaviors
in the network. Note that the definition of trust in this
project is taken from Coleman’s [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] definition of
rational actors’ decision to place themselves in
vulnerable positions relative to others in the hope of
accomplishing something that is otherwise not
possible. Its operational focus fits well with the
computer science perspective. In contrast it is
explicitly not the definition of trust as an internal state
where confidence is expressed behavior as seen in
[
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>Building upon insights that have emerged from studies
on human-computer interaction and game theoretic
studies of trust we have developed a set of hypotheses
on human behavior with respect to computer-mediated
trust. We then test these hypotheses using an
experiment that is based on proven social science
methods. We will then examine the implications for
technical design of the confirmation or rejection of the
hypotheses with the use of structured formal protocol
analysis.</p>
      <p>Technical security experts focus on the considerable
technological challenges of securing networks, and
devising security policies. These essential efforts
would be more effective in practice if designs more
systematically addressed the (sometimes irrational)
people who are critical components of networked
information systems. Accordingly, efforts at securing
these systems should involve not only attention to
machines, networks, protocols and policies, but also a
systematic understanding of how the people
participate in and contribute to the security and trust of
networks.</p>
    </sec>
    <sec id="sec-2">
      <title>1.2 Theoretical Foundation</title>
      <p>
        The study of network security is the study of who can
be trusted for what action, and how to ensure a
trustworthy network. This understanding must build
upon not only the science and engineering of security,
but also the complex human factors that affect when
and how individuals are prepared to extend trust to the
agents with whom they interact and transact
computers, people and institutions. This is a problem
that has received much comment but little formal
quantitative study [
        <xref ref-type="bibr" rid="ref16 ref25">16, 25</xref>
        ].
      </p>
      <p>
        Humans appear to be ill suited as computing security
managers. Arguments have been made for embedding
security in the operating system from the
psychological perspective [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. In addition there is a
continuous debate about making the network more
trustworthy [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. As technology becomes more
complex, users develop simplified abstractions that
allow them to make sense of complicated systems [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ]
but these flawed models may obfuscate vital security
decisions. End-user security mechanisms may offer no
more autonomy to the naive user than the option to
perform brain surgery at home would offer medical
autonomy to the naive patient. In fact, the argument
that alterable code is not empowering to the user has
been argued in the case of applications [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
Social science experiments provide insights for
evaluating how trust mechanisms may succeed or fail
when presented to the naïve user. That humans are a
source of randomness is well-documented, and the
problems of ‘social engineering’ well known. Yet the
inclusion of the human behavior using tested
axiomatic results is a significant extension to previous
research on why security and trust systems fail [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
The experiment described here was built upon the
following theoretical construction of the problem.
2.
3.
4.
      </p>
      <sec id="sec-2-1">
        <title>Placement of trust allows actions that</title>
        <p>otherwise are not possible.</p>
        <p>If the person in whom trust is placed
(trustee) is trustworthy, then the trustor
will be better off than if he or she had
not trusted. Conversely, if the trustee is
not trustworthy, then the trustor will be
worse off than if he or she had not
trusted.</p>
        <p>Trust is an action that involves the
voluntary placement of resources
(physical, financial, intellectual, or
temporal) at the disposal of the trustee
with no real commitment from the
trustee.</p>
        <p>A time lag exists between the extension
of trust and the result of the trusting
behavior.</p>
        <p>First, we narrow the larger question of security to the
more constrained question of human trust behaviors.
Second, we extract from the larger literature testable
hypotheses with respect to trust behaviors. Third, we
develop an experimental design where the trust
behavior is a willingness to share information that give
a basis for rejecting the testable hypotheses.</p>
        <p>
          For this research, we use Coleman's [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] definition of
trust that accounts for the rational action of individuals
in social situations to structure the experimental
situations which subjects will face. Coleman's
definition of trust is operational and has four
components:
        </p>
        <p>1.</p>
        <p>
          The view held by a number of researchers about trust
is that it should be reserved for the case of people
only; that people can only trust (or not trust) other
people; not inanimate objects. These researchers
suggest that we use a term such as confidence or
reliance to denote the analogous attitude people may
hold toward objects such as computers and networks.
To the extent that this is more than merely a dispute
over word usage, we are sympathetic to the proposal
that there are important differences in the ways trust
versus confidence or reliance operate internally (See,
for example, [
          <xref ref-type="bibr" rid="ref16 ref28">28, 16</xref>
          ]. Yet in terms of building
mechanisms to create a trustworthy network we will
investigate the way trust may be extended to both
humans and objects. Note that there are
disagreements with respect to the definition and
examination of trust. Trust is a concept that crosses
disciplines as well as domains, so the focus of the
definition differs. There are two dominant definitions
of trust: operational and internal.
        </p>
        <p>Operational definitions of trust like the one we are
using require a party to make a rational decision based
on knowledge of possible rewards for trusting and not
trusting. Trust enables higher gains while distrust
avoids potential loss. Therefore risk aversion is a
critical parameter in defining trust.</p>
        <p>
          In the case of trust on the Internet operational trust
must include both evaluation of the users intention –
benevolent or malevolent, and the users' competence.
Particularly in the case of intention, the information
available in a physical interaction is absent. In
addition, cultural clues are difficult to discern on the
Internet as the face of most web pages are meant to be
as generic as possible to avoid offense. One
operational definition of trust is reliance [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. In this
case reliance is considered a result of belief in the
integrity or authority of the party to be trusted.
Reliance is based on the concept of mutual
selfinterest. Therefore the creation of trust requires
structure to provide information about the trusted
party to ensure that the self-interest of the trusted party
is aligned with the interest of the trusting party. When
reliance is refined, it requires that the trusted party be
motivated to insure the security of the site and protect
the privacy of the user. Under this conception trust is
illustrated by a willingness to share personal
information. Camp [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] offers another operational
definition of trust in which users are concerned with
risk rather than risk perception. From this perspective,
trust exists when individuals take actions that make
them vulnerable to others.
        </p>
        <p>
          A second perspective on trust used by social
psychologists, assumes that trust is an internal state.
(e.g., [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]) From this perspective, trust is a state of
belief in the motivations of others. Based on this
argument, social psychologists measure trust using
structured interviews and surveys. The results of the
interviews can find a high correlations between trust
and a willingness to cooperate. Yet trust is not defined
as but rather correlated with an exhibited willingness
to cooperate. This is in contrast to the working
definition underlying not only this work, but also most
of the research referenced herein. The definition of
trust used here and the set of methods used to explore
trust perfectly coincide and are based in the
quantitative, game-theory tradition of experiments in
trust in which trust is an enacted behavior rather than
an internal state.
        </p>
        <p>One underlying assumption is that, in addition to the
technical, good network security should incorporate an
increasingly systematic understanding of the ways
people extend trust in a networked environment. Thus
one goal of this experiment is to enable or simplify the
design of systems enabling rational human trust
behavior on-line by offering a more axiomatic
understanding of human trust behavior and illustrating
how the axioms can be applied. Therefore the goal of
our experiment is to offer a way to embed social
understanding of trust as exhibited in human action
into the design of security systems. Yet before any
concepts of trust are embedded into the technical
infrastructure, any implicit hypotheses developed in
studies of humans as trusting entities in relation to
computers must be made explicit and tested. Then it
is critical to illustrate by example how these
hypotheses can be effectively applied to past technical
designs.</p>
        <p>This is a two-part research investigation. First, we test
the hypotheses that are explicit in the game
theorybased research on human trust behavior in the specific
case of human/computer interaction. We test these
hypotheses using standard experimental and
quantitative methods, as described in the first methods
section. Second, based on these findings, we examine
the suitability of various distributed trust technologies
in light of the findings of the first part of this study.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>1.3. Hypothesis Development</title>
      <p>We developed a core hypotheses under which the
technologies of trust and the perspectives on trust from
social science converge. Essentially in contrast to the
assumption that individuals make increasingly
complex decisions in the face of increasingly complex
threats, social science suggests that people are
simplifiers. The hypotheses at its core points to a
common point of collision: technologists may embed
in the design of trust mechanisms implicit assumptions
that humans are attentive, discerning, and
everrational. There are strong philosophical arguments
that humans are simplifiers, and this implies that
humans will use trust of machines to simplify an ever
more complex world.</p>
      <p>Hypothesis I: In terms of trust and
forgiveness in the context of
computermediated activities, there is no
significant systematic difference in
people's reactions to betrayals
appearing to originate from malevolent
human actions, on the one hand, and
incompetence on the other.</p>
      <p>According to this hypothesis people do not
discriminate on the basis of the origins of harms such
as memory damage, denial of service, leakage of
confidential information, etc. In particular, it does not
matter whether the harms are believed by users to be
the result of technical failure or human (or
institutional) malevolence. Indeed, the determination
to avoid risks without concern of their origination is a
characteristic of risk technology.</p>
      <p>The hypothesis makes sense from a purely technical
standpoint. Certainly good computer security should
protect users from harms no matter what their sources,
and failure to do so is bad in any case. Yet a second
examination yields a more complex problem space.
This more complex design space in turn calls for a
more nuanced solution to the problem of key
revocation or patch distribution.</p>
      <p>What this means for our purposes is that people's trust
would likely be affected differentially by conditions
that differ in the following ways: cases where things
are believed to have gone wrong (security breaches) as
a result of unpredictable, purely technical glitches;
cases where failures are attributed to technical
shortcuts taken by human engineer; and thirdly cases
where malevolence (or at least disinterest in another’s
situation) is the cause of harm. To briefly illustrate, a
security breach that is attributed to an engineering
error might be judged accidental and forgiven if things
went wrong despite considerable precautions taken.
Where, however, the breach is due to error that was
preventable, the reaction might be more similar to a
reaction to malevolence. Readers familiar with
categories of legal liability will note the parallel
distinctions that the law draws between, for example,
negligence versus recklessness.</p>
      <p>
        Our second hypothesis relates to the ability of
individuals to make distinctions among different
computers. Computers are of course, distinct,
particularly once an operator has selected additional
applications that will run on and policies that will
govern the information on the site. Publications in
social theory (e.g., [
        <xref ref-type="bibr" rid="ref11 ref31">11, 31</xref>
        ]) predict that individuals'
initial willingness to trust and therefore convey
information in the context of a web form will depend
more on the characteristics of the individual and
interface than the perceived locality of or technology
underlying the web page. An empirical study of
computer science students also demonstrated that
experience with computers increases a willingness to
expose information across the board [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ].
      </p>
      <p>Studies in human-computer interaction suggest that
users, even those with considerable knowledge and
experience, tend to generalize broadly from their
experiences. Studies of off-line behaviors illustrate
that such generalization is particularly prevalent in
studies of trust within and between groups. Thus,
positive experiences with a computer may generalize
to the networked system (to computers) as a whole
and presumably the same would be true of negative
experiences. In other words, users may draw
inductive inferences to the whole system, across
computers, and not simply to the particular system
with which they experienced the positive transaction.
Do individuals learn to distinguish between threats or
do they increase threat lumping behavior?</p>
      <p>Hypothesis II: When people interact with
networked computers, they discriminate
among distinct computers (hosts, websites),
treating them as distinct entities, particularly
in their readiness to extend trust and secure
themselves from possible harms.</p>
    </sec>
    <sec id="sec-4">
      <title>2. EXPERIMENTAL DESIGN</title>
      <p>We collected data on computer users' responses
to trustworthy and untrustworthy computer behavior
by conducting real time experiments that measured
individuals’ initial willingness to conveying personal
information in order to receive a service over the web,
and then examined student responses to betrayals. A
total of 63 students participated in the study. They
were told that they were evaluating web pages as part
of a business management class. . Students were
shown one web site (elephantmine.net), then a second
site (reminders.name).</p>
      <p>The services offered over the Web sites appear to be
life management services, that will require that
individuals offer to provide information (e.g. birthday
of your spouse, favored gifts, grocery brand
preferences, credit card number). After participants
viewed the web pages, they responded to a series of
questions about their willingness to share information
with the site. The survey determined the data the
subjects were willing to provide to that domain. Our
services portals are designed to be similar in interface
but clearly different in source so that we can explore
the question of user differentiation of threats.
This design has three fundamental components: trust,
betrayal, trust. Subjects were told that they are
evaluating e-commerce systems that will make their
lives easier by managing gift-giving, subscription
management, bill-paying, grocery shopping, and
drycleaning etc. They were be asked their willingness to
engage with such a company. Background
information will included overall computer experience
experiences. These questions included typical personal
information as well as information about loved ones,
daily habits, and preferences.</p>
      <p>First we test the tendency for people trust to different
machines as illustrated by a willingness to share
information, as is consistent with referenced work.
The two machines have different themes and different
domain names. We showed that the machines are
distinct types by clearly identifying the machine with
visible labels (e.g. "Intel inside" and Tux the Linux
penguin, vs. "Viao" and "powered by NT").
During the introduction of the second web page, there
is one of two types of “betrayal”. In the first, the
betrayal is a change in policy that represents a
violation of trust in terms of the intention of the agent.
Here the students were shown a pop-up window
announcing a change in privacy policy, and offered a
redirection to a net privacy policy. In the second
condition, “betrayal” represented a violation of trust in
terms of a display of incompetence on the part of the
agent. One segment of students were shown a betrayal
that was another (imaginary) person’s data being
displayed on the screen. This illustrates a technical
inability to secure information. After each
“betrayal”, we tested for more trust behaviors, again
with trust behavior being defined as the willingness to
share information.</p>
    </sec>
    <sec id="sec-5">
      <title>3. RESULTS</title>
      <p>The results of our experiment with users provides
insight into our hypotheses regarding users’ responses
to violations of trust. Table 1 shows the results for the
both conditions.</p>
      <sec id="sec-5-1">
        <title>Change in privacy policy (Malevolence)</title>
        <p>Proportion
willing to
share before</p>
        <sec id="sec-5-1-1">
          <title>Proportion willing to share after</title>
        </sec>
      </sec>
      <sec id="sec-5-2">
        <title>Display other users’ private information (Incompetence)</title>
        <p>Proportion Proportion
willing to share willing to
before share after</p>
        <sec id="sec-5-2-1">
          <title>Type of information</title>
        </sec>
        <sec id="sec-5-2-2">
          <title>Your credit card number Your Social Security number</title>
        </sec>
        <sec id="sec-5-2-3">
          <title>Your year of birth</title>
        </sec>
        <sec id="sec-5-2-4">
          <title>Your IM buddy list</title>
        </sec>
        <sec id="sec-5-2-5">
          <title>Your list of email contacts</title>
        </sec>
        <sec id="sec-5-2-6">
          <title>Your coworkers’ names</title>
        </sec>
        <sec id="sec-5-2-7">
          <title>Your friend’s names</title>
        </sec>
        <sec id="sec-5-2-8">
          <title>Your parents’ names</title>
          <p>Your family members’
names
Your family members’
birthdays
Your family’s wedding
anniversaries
Your family members’
shopping preferences
** p&lt;.01
*** p&lt;.001
0.16
0.03
0.69
0.22
0.13
0.44
0.53
0.47
0.47
0.66
0.63
0.53
In the first condition, there is a change in the privacy
policy of the web page. We classify this as a violation
of trust intention. According to the first hypothesis, in
terms of effects on trust in computers and
computermediated activity and readiness to forgive and move
on, people do not discriminate on the basis of the
origins of harms such as memory damage, denial of
service, leakage of confidential information, etc. In
particular, it does not matter whether the harms are
believed by users to be the result of technical failure,
on the one hand, or human (or institutional)
malevolence.</p>
          <p>In the second condition, participants saw that a
fictional users’ information was displayed when the
webpage was opened. As shown in Table 1, after the
technical error demonstrating incompetence,
participants were less willing to share information, but
by a smaller margin than in the first case of a change
in privacy policy. Despite the fact that the technical
failure indicated an inability to keep information
secure or secret or private, the refusal to share future
information far more dramatically decreased with the
policy change.</p>
          <p>The data above illustrates that we have explicitly
rejected the hypotheses that all failures are the same,
with respect to human-driven and technical failures.
**
**
**
.09
0
.09
.06
.59 ***
.31 ***
.34 ***
.28 ***
.28 ***
.47 ***
.47 ***
.38 ***
0.29
0.03
1
0.16
0.23
0.42
0.65
0.58
0.68
0.87
0.84
0.77</p>
          <p>**
.13
0
0.9
.13 ***
.13 ***
0.52
0.68
.55 ***
.61 ***
.68</p>
          <p>**
.68 ***
.71 ***
The integration of the moral or ethical element is
noticeably absent in security technology design even
when there is an argument, without human interaction,
that such a policy would be good security practice. For
example, key revocation policies and software patches
all have an assumption of uniform technical failure. A
key may be revoked because of a flawed initial
presentation of the attribute, a change in the state of an
attribute, or a technical failure. Currently key
revocation lists are monolithic documents where the
responsibility is upon the key recipient to check.
Often, the key revocation lists only the date of
revocation and the key. These experiments would
argue that the cases of initial falsification, change in
status, and lost device would be very different and
would be treated differently. A search for possible
fraudulent transactions or a criminal investigation
would also view the three cases differently. Integrating
the reason for key revocation may make human
reaction to key revocation more effective and is
valuable from a system as well as a human
perspective.</p>
          <p>The second hypothesis, that individuals develop
mechanisms to evaluate web sites over time and enter
each transaction with a new calculus of risk, cannot be
supported by the evaluation. Each participant stated
that they had at least seven years of experience of the
web, including commerce. If the approach to a web
site were one of careful updating of a slowly
developed boolean function of risk, then the alteration
in the second case arguably would have been less
extreme. After all, the betrayal happens at the first site,
not the second. So every participant should begin at
the second site at exactly the same state as the first,
assuming each differentiates web sites rather than
reacting to experiences on “the net” as a whole.
Clearly there is no argument under which this data
would support that argument. Individuals reacted
strongly and immediately to the betrayal at the first
site, despite being told that the first and second site
were in no way related and were in fact competitors.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>4. CONCLUSIONS</title>
      <p>We have tested two hypotheses in human behavior
that can serve as axioms in the examination of
technical systems. Technical systems, as explained
above, embody assumptions about human responses.
The experiments have illustrated that users consider
failures in benevolence as more serious than failures in
competence. This illustrates that distinguishing that
security technologies that communicate state to the
end user will be most effective if they communicate in
terms that indicate harm, rather than more neutral
informative terms. Systems designed to offer security
and privacy, and thus indicating both benevolence and
competence, are more likely to be accepted by users.
Failures in such systems are less likely to be tolerated
by users, and users are less likely to subvert such
systems.</p>
      <p>As the complexity and extent of the Internet expands
users are increasingly expected to be active managers
of their own information security. This has been
primarily conceived in security design as enabling
users to be rational about extensions of trust in the
network. The truly rational choice is for security
designers to embed sometimes irrational but consistent
human behaviors into their own designs.</p>
      <p>
        The consideration of people's responses to computers
can be seen as drawing not only on the social sciences
generally but specifically on design for values in its
consideration of social determination. In the
viewpoint of the social determinist, technology is
framed by its users and adoption is part of the
innovative process. That is to say, that designs are
based on a post-hoc analysis of technologies after they
have been adopted [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Beyond identifying flaws of
security mechanisms we hope to offer guidance in the
analysis of future systems. It would be unwise to wait
until a security mechanism is widely adopted to
consider only then how easily it may be undermined
by "human engineering.”.
      </p>
    </sec>
    <sec id="sec-7">
      <title>5. REFERENCES</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Anderson</surname>
            ,
            <given-names>R. E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Johnson</surname>
            ,
            <given-names>D.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gotterbarn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Perrolle</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <year>1993</year>
          ,
          <article-title>"Using the ACM Code of Ethics in Decision making,"</article-title>
          <source>Communications of the ACM</source>
          , Vol.
          <volume>36</volume>
          ,
          <fpage>98</fpage>
          -
          <lpage>107</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Abric</surname>
          </string-name>
          &amp;
          <string-name>
            <surname>Kahanês</surname>
          </string-name>
          ,
          <year>1972</year>
          ,
          <article-title>"The effects of representations and behavior in experimental games"</article-title>
          ,
          <source>European Journal of Social Psychology</source>
          , Vol
          <volume>2</volume>
          , pp
          <fpage>129</fpage>
          -
          <lpage>144</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Axelrod</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <year>1994</year>
          , The Evolution of Cooperation, HarperCollins, USA.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Becker</surname>
          </string-name>
          , Lawrence C.
          <article-title>"Trust in Non-cognitive Security about Motives." Ethics 107 (Oct</article-title>
          .
          <year>1996</year>
          ):
          <fpage>43</fpage>
          -
          <lpage>61</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Blaze</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feigenbaum</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Lacy</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <year>1996</year>
          ,
          <article-title>"Decentralized Trust Management"</article-title>
          ,
          <source>Proceedings of the IEEE Conference on Security and Privacy</source>
          , May.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Bloom</surname>
          </string-name>
          ,
          <year>1998</year>
          ,
          <article-title>"Technology Experimentation, and the Quality of Survey Data"</article-title>
          ,
          <source>Science</source>
          , Vol.
          <volume>280</volume>
          , pp
          <fpage>847</fpage>
          -
          <lpage>848</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7] Boston Consulting Group,
          <year>1997</year>
          ,
          <article-title>Summary of Market Survey Results prepared for eTRUST</article-title>
          , The Boston Consulting Group San Francisco, CA,
          <year>March</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Camp</surname>
            ,
            <given-names>L.J.</given-names>
          </string-name>
          <string-name>
            <surname>Trust</surname>
          </string-name>
          &amp;
          <article-title>Risk in Internet Commerce</article-title>
          , MIT Press,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Camp</surname>
            ,
            <given-names>L.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cathleen</surname>
            <given-names>McGrath</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Helen Nissenbaum</surname>
          </string-name>
          , “
          <article-title>Trust: A Collision of Paradigms,”</article-title>
          <source>Proceedings of Financial Cryptography, Lecture Notes in Computer Science</source>
          , Springer-Verlag (Berlin) Fall
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Clark</surname>
          </string-name>
          &amp;
          <article-title>Blumenthal, "Rethinking the design of the Internet: The end to end arguments vs. the brave new world"</article-title>
          , Telecommunications Policy Research Conference, Washington DC,
          <year>September 2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Coleman</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <year>1990</year>
          , Foundations of Social Theory, Belknap Press, Cambridge, MA.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Compaine</surname>
            <given-names>B. J.</given-names>
          </string-name>
          ,
          <year>1988</year>
          , Issues in New Information Technology, Ablex Publishing; Norwood, NJ.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Computer</given-names>
            <surname>Science</surname>
          </string-name>
          and Telecommunications Board,
          <year>1999</year>
          , Trust in Cyberspace, National Academy Press, Washington, D.C.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Dawes</surname>
            ,
            <given-names>McTavish</given-names>
          </string-name>
          &amp; Shaklee,
          <year>1977</year>
          , “
          <article-title>Behavior, communication, and assumptions about other people's behavior in a commons dilemma situation</article-title>
          ,
          <source>” Journal of Personality and Social Psychology</source>
          , Vol
          <volume>35</volume>
          , pp
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Foley</surname>
          </string-name>
          ,
          <year>2000</year>
          ,
          <article-title>"</article-title>
          <source>Can Micrsoft Squash</source>
          <volume>63</volume>
          ,
          <article-title>000 Bugs in Win2k?"</article-title>
          ,
          <source>ZDnet Eweek, on-line edition, 11 February</source>
          <year>2000</year>
          , available at http://www.zdnet.com/eweek/stories/general/0,11 011,
          <issue>2436920</issue>
          ,00.html.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Friedman</surname>
            ,
            <given-names>P.H.</given-names>
          </string-name>
          <string-name>
            <surname>Kahn</surname>
            , Jr., and
            <given-names>D.C.</given-names>
          </string-name>
          <string-name>
            <surname>Howe</surname>
          </string-name>
          ,
          <article-title>"Trust Online," Communications of the ACM</article-title>
          ,
          <year>December 2000</year>
          /Vol.
          <volume>43</volume>
          , No.
          <volume>12</volume>
          <fpage>34</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Fukuyama</surname>
            <given-names>F.</given-names>
          </string-name>
          ,
          <year>1996</year>
          ,
          <article-title>Trust: The Social Virtues and the Creation of Prosperity</article-title>
          , Free Press, NY, NY.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Garfinkle</surname>
          </string-name>
          ,
          <year>1994</year>
          , PGP: Pretty Good Privacy,
          <string-name>
            <surname>O</surname>
          </string-name>
          'Reilly &amp; Associates, Inc., Sebastopol, CA, pp.
          <fpage>235</fpage>
          -
          <lpage>236</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Golberg</surname>
            ,
            <given-names>Hill</given-names>
          </string-name>
          &amp; Shostak,
          <year>2001</year>
          “Privacy, ethics, and trust” Boston University Law Review, V. 81
          <string-name>
            <surname>N.</surname>
          </string-name>
          <year>2</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Hoffman</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Clark</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <year>1991</year>
          ,
          <article-title>"Imminent policy considerations in the design and management of national and international computer networks,"</article-title>
          <source>IEEE Communications Magazine, February</source>
          ,
          <fpage>68</fpage>
          -
          <lpage>74</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Keisler</surname>
            ,
            <given-names>Sproull</given-names>
          </string-name>
          &amp; Waters,
          <year>1996</year>
          ,
          <article-title>"A Prisoners Dilemma Experiments on Cooperation with People and Human-Like Computers"</article-title>
          ,
          <source>Journal of Personality and Social Psychology</source>
          , Vol
          <volume>70</volume>
          , pp
          <fpage>47</fpage>
          -
          <lpage>65</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Kerr</surname>
          </string-name>
          &amp;
          <string-name>
            <surname>Kaufman-Gilliland</surname>
          </string-name>
          ,
          <year>1994</year>
          ,
          <article-title>"Communication, Commitment and cooperation in social dilemmas"</article-title>
          ,
          <source>Journal of Personality and Social Psychology</source>
          , Vol
          <volume>66</volume>
          , pp
          <fpage>513</fpage>
          -
          <lpage>529</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Luhmann</surname>
            ,
            <given-names>Niklas.</given-names>
          </string-name>
          <article-title>"Trust: A Mechanism For the Reduction of Social Complexity." Trust and Power: Two works by Niklas Luhmann</article-title>
          . New York: John Wiley &amp; Sons,
          <year>1979</year>
          .
          <fpage>1</fpage>
          -
          <lpage>103</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <source>[24] National Research Council</source>
          ,
          <year>1996</year>
          ,
          <article-title>Cryptography's Role in Securing the Information Society</article-title>
          , National Academy Press, Washington, DC.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Nikander</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Karvonen</surname>
          </string-name>
          , “
          <source>Users and Trust in Cyberspace. Lecture Notes in Computer Science</source>
          , Springer-Verlag (Berlin)
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Nissenbaum</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <article-title>"Securing Trust Online: Wisdom or Oxymoron?"</article-title>
          Forthcoming in Boston University Law Review
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <source>[27] Office of Technology Assessment</source>
          ,
          <year>1985</year>
          ,
          <string-name>
            <given-names>Electronic</given-names>
            <surname>Surveillance</surname>
          </string-name>
          and
          <string-name>
            <surname>Civil Liberties</surname>
          </string-name>
          OTACIT-
          <volume>293</volume>
          , United States Government Printing Office; Gaithersburg, MA.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <source>[28] Office of Technology Assessment</source>
          ,
          <year>1986</year>
          , Management, Security and
          <string-name>
            <given-names>Congressional</given-names>
            <surname>Oversight</surname>
          </string-name>
          OTA-CIT-
          <volume>297</volume>
          , United States Government Printing Office; Gaithersburg, MA.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Seligman</surname>
          </string-name>
          , Adam.
          <source>The Problem of Trust</source>
          . Princeton: Princeton University Press,
          <year>1997</year>
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Slovic</surname>
            ,
            <given-names>Paul. "Perceived</given-names>
          </string-name>
          <string-name>
            <surname>Risk</surname>
          </string-name>
          , Trust, and
          <string-name>
            <surname>Democracy</surname>
          </string-name>
          .
          <source>" Risk Analysis 13.6</source>
          (
          <year>1993</year>
          ):
          <fpage>675</fpage>
          -
          <lpage>681</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Sproull</surname>
            <given-names>L.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Kiesler</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <year>1991</year>
          , Connections, The MIT Press, Cambridge, MA, 1991
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Tygar</surname>
          </string-name>
          &amp;
          <string-name>
            <surname>Whitten</surname>
          </string-name>
          ,
          <year>1996</year>
          ,
          <article-title>"WWW Electronic Commerce and Java Trojan Horses"</article-title>
          ,
          <source>Proceedings of the Second USENIX Workshop on Electronic Commerce</source>
          ,
          <fpage>18</fpage>
          -
          <lpage>21</lpage>
          Oakland, CA
          <year>1996</year>
          ,
          <volume>243</volume>
          -
          <fpage>249</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>United</given-names>
            <surname>States Council for International Business</surname>
          </string-name>
          ,
          <year>1993</year>
          ,
          <article-title>Statement of the United States Council for International Business on the Key Escrow Chip, United States Council for International Business</article-title>
          , NY, NY.
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Wacker</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <year>1995</year>
          ,
          <article-title>"Drafting agreements for secure electronic commerce"</article-title>
          <source>Proceedings of the World Wide Electronic Commerce: Law</source>
          , Policy, Security &amp; Controls Conference,
          <source>October 18-20</source>
          , Washington, DC, pp.
          <fpage>6</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Walden</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <year>1995</year>
          ,
          <article-title>"Are privacy requirements inhibiting electronic commerce,"</article-title>
          <source>Proceedings of the World Wide Electronic Commerce: Law</source>
          , Policy, Security &amp; Controls Conference,
          <source>October 18-20</source>
          , Washington, DC, pp.
          <fpage>10</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <surname>Weick</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          “
          <article-title>Technology as Equivoque: Sensemaking in new technologies</article-title>
          ” In Goodman, L. Sproull, eds.
          <source>“Technology and Organizations</source>
          .
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <surname>Weisband</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Kiesler</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>1996</year>
          ).
          <article-title>Self Disclosure on computer forms: Meta-analysis and implications</article-title>
          .
          <source>Proceedings of the CHI '96 Conference on Human-Computer Interaction, April</source>
          <volume>14</volume>
          -22, Vancouver.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>