<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Designing for Trust</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Michalis</forename><surname>Pavlidis</surname></persName>
							<email>m.pavlidis@ieee.org</email>
							<affiliation key="aff0">
								<orgName type="institution">University of East London</orgName>
								<address>
									<addrLine>4-6 University Way</addrLine>
									<postCode>E16 2RD</postCode>
									<settlement>London</settlement>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Designing for Trust</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">07C814CA98AF4C7FB5752BB77859FAE9</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T22:51+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Trustworthy information systems</term>
					<term>systems development</term>
					<term>trust</term>
					<term>trustworthiness</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Information systems exist in every aspect of our life. Therefore we need to make sure that users trust these systems in order to continue to use them. However, developing a trustworthy system is a challenging task for the right operation of the system as well as system's acceptance from the users' perspective. Ensuring well-placed trust always depends on the trustworthiness of the trustee, i.e. the system. Therefore, properties that belong to the trustworthiness highly influence to the development of trust. Nevertheless, trust has to be considered from a holistic perspective, since it covers a wide range of issues that belong to different disciplines. In this paper, we present the relevant properties of trust and trustworthiness from a holistic perspective and we define trustworthiness as the competence and ability of a system.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Problem Statement</head><p>Information has a large impact and plays an important role in different areas of human life. Trust of organisations and individuals in information systems is therefore becoming a central issue for the effective usage of such systems and the stored information.</p><p>Developing trustworthy information systems is important not only for the right operation of these systems, but also for their social acceptance and the advancement of information networking. So, we envisage developing a methodology to guide the developers through the process of trustworthy information systems development; a methodology that the developers can easily follow and that will cope with trust complexity and will make the development tasks visible and clear to them.</p><p>However, developing such a methodology requires an interdisciplinary research in other fields such as sociology, psychology, and social psychology. Also, there is lack of agreement among scientists regarding trust and there are a lot of definitions given that each one them reflects the discipline of the researcher.</p><p>So, we summarize the following research questions: a) How can we define system trustworthiness? b) What is a better way to model system trustworthiness? c) How trustworthiness properties influence development decisions?</p><p>There are a number of approaches that consider trust issues including trust modelling, reasoning, and the formation of a common vocabulary during the software development stage. Yu and Liu <ref type="bibr" target="#b0">[1]</ref> address the issues of trust at the requirements level of the system development process. They consider trust as a non-functional requirement, where trust is a combination of all or some quality attributes of a system under development and they demonstrate their approach by describing the behaviour of a system in the case of attack and examine defences that are needed from trust perspective.</p><p>In Yan and Cofta <ref type="bibr" target="#b1">[2]</ref> trust is a set of statements and goals and trust domains are defined as areas of mobile communication where the trust definition is common among the various elements. Because of the subjectivity of trust definitions there are gaps between the trust domains and certain elements bridge the gap and are responsible for ensuring trust at a higher level than the one of the domains. In the methodology the entities, the domains and their interconnections are represented graphically and enable a better view of the system.</p><p>Secure Tropos <ref type="bibr" target="#b2">[3]</ref> extends Tropos methodology with the concepts of trust, delegation, provisioning and ownership in order to allow the developer to capture trust relationships at a social and individual level.</p><p>Bimrah <ref type="bibr" target="#b3">[4]</ref> extends the Secure Tropos <ref type="bibr" target="#b4">[5]</ref> methodology with the concepts of request, action, trust relationship, trusting intention, reputative knowledge, recommendation and consequence in order to model trust. The developer is guided through a series of models in order to analyse and reason about trust relationships.</p><p>In <ref type="bibr" target="#b5">[6]</ref> the proposed method makes use of the Goal Requirement Language (GRL) and Use Case Map (UCM) which both of them belong to the User Requirement Notation (URN). Specifically, trust is captured as a soft goal because of its uncertainty of whether is has been satisfied or not and because of its fuzzy nature. Further analysis of trust as a soft goal will eventually lead to well defined tasks.</p><p>The UMLtrust framework of Uddin and Zulekernine <ref type="bibr" target="#b6">[7]</ref> considers trust from the early stages of the development process and it is a scenario-based analysis of trust. It uses UML, which is well accepted among software developers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Limitations of Related Work</head><p>However, most of the existing approaches concentrate on a subset of parameters that affect trust and do not consider the holistic nature of trust <ref type="bibr" target="#b7">[8]</ref>. One such parameter that is being neglected is that trust is context dependent. Moreover, the state of the art so far adopts an ad-hoc approach when tries to consider trust issues, which proves to be more difficult and costly <ref type="bibr" target="#b7">[8]</ref>. When trust requirements are not considered in a consistent way from the early stages of the software development, but in an ad-hoc way, they will result in conflicts with the other functional and non-functional requirements of the system. So, in order to resolve these conflicts more valuable resources, such money and time, will be needed, that will still lead to a more complex solution.</p><p>In addition, developers of a project might have a different cultural background and have a different understanding of trust. Therefore, not only they need a methodology that can guide them through the software development process, but also a methodology that will establish a common understanding of trust within a technical setting among the developers. Most of the works so far focus on modelling of trust but there is not much work that has been done that will focus on the essential properties related to the trust. We believe our work contribute on this direction.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Proposed Approach</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Trust</head><p>Trust is positive expectations of the behaviour of another actor from whom he might be positively or negatively affected <ref type="bibr" target="#b8">[9]</ref> and plays a very important role in software systems. The actor that trusts another actor is called trustor and the actor that is being trusted is called trustee. The relationship that exists between the trustor and the trustee is called trust relationship. So, in information systems, trust between actor A and actor B is positive expectations of A about the outcome of his relationship with B, from which he might be positively or negatively affected.</p><p>There is trust between the trustor and the trustee when the trustee possesses enough characteristics that are considered signs of trustworthiness within the trustor's social context. The more such characteristics the trustee possesses the greater the trust of the trustor in the trustee will be. Moving on to the information systems, a user will consider an information system trustworthy if the information system possesses characteristics that are considered signs of trustworthiness inside the social setting.</p><p>McKnight and Chervany <ref type="bibr" target="#b9">[10]</ref> defined four trust constructs, trusting beliefs, dispositional trust, institution based trust and trusting intention (fig. <ref type="figure" target="#fig_0">1</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Trustworthiness</head><p>In <ref type="bibr" target="#b10">[11]</ref> the evidence that express the trustworthiness of an actor are continuity, competence, and motivation. Continuity means that the current relationship between the two actors will continue in the future and it will not be only temporal. Competence refers to the means that the trustee possesses in order to support the trustor. An example of competence in a student teacher relationship is if the teacher has a teaching certificate. Motivation is whatever drives the trustee to support the needs of the trustor and an obvious example is if the trustor's interest matches with the trustee's interest.</p><p>In addition, McKnight and Chervany <ref type="bibr" target="#b9">[10]</ref> define the concepts of competence, benevolence, integrity, and predictability regarding trustworthiness. Competence means that the trustee has the power or the ability to do what it is needed by the trustor, while benevolence means that the trustee also cares about the trustor and is motivated to act in his interest. Integrity means that the trustee is honest and he will keep his promise to the trustor and he will fulfil the agreement, while predictability means that the trustee's behaviour is consistent enough so that the trustor can forecast his future behaviour.</p><p>Furthermore, in <ref type="bibr" target="#b11">[12]</ref> the properties regarding trustworthiness are called intrinsic properties that are consisted of ability, internalized norms, and benevolence. Ability is all the skills, competences, and characteristics that are required by the trustee in order to deliver in his relationship with the trustror. Internalized norms are all the principles that are considered acceptable by trustee and he behaves according to them. Finally, benevolence is when the trustee is in a relationship with a trustor as part of his own gratification and in such a relationship the trustee doesn't expect any return from the trustor. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Trust and Trustworthiness Relationship</head><p>The optimum condition though that will benefit the society is reached when there is justified trust and not when individuals show unconditional trust <ref type="bibr" target="#b12">[13]</ref>. Justified trust is when trust of the trustor matches the trustworthiness of the trustee, and the maximum benefit occurs. Trusting less is a loss of opportunities, while on the contrary trusting too much makes you vulnerable <ref type="bibr" target="#b10">[11]</ref>.</p><p>Trustworthiness is a characteristic of a person or thing that is the object of someone's trust. If the object of our trust is worthy of that trust, then it will fulfil our expectations and our trust will be rewarded, not betrayed. If a person is trustworthy, it is considered a virtue, so if a software artefact is trustworthy, then it is considered a mark of high quality <ref type="bibr" target="#b13">[14]</ref>. In addittion, being able to trust a software system is a prerequisite for its social acceptance <ref type="bibr" target="#b10">[11]</ref> and when there is trust in a software product it will increase its sales and the willingness of the users to pay even more for that product <ref type="bibr" target="#b14">[15]</ref>. Otherwise, the software system will be rejected and the development of that software system will result in a failure. Therefore, the goal is to increase as much as possible the trustworthiness of the system so that the trust of the users can be high and well placed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Process of Trusting</head><p>Trust is not static, but dynamic, which means that it is not stable during a time period but it changes over time. When two parties engage into a relationship there are two categories of factors that have an impact on the trust process, the extrinsic and intrinsic trust factors <ref type="bibr" target="#b15">[16]</ref>. The extrinsic trust factors are all the information about the trustee that is collected by the trustor without any direct experience, such as the trustee's reputation. On the contrary, the intrinsic trust factors are the information that the trustor collects about the trustee while having a direct experience. In the early stages of the trust relationship the extrinsic trust factors have a greater impact in the trustor's trust decision. However, as time goes by the intrinsic trust factors become more important since the trustor can make his decision on information that has been collected from direct experience.</p><p>The aim of this research is not to increase the user's trust perceptions, but to increase the actual trustworthiness of the system so that user's trust will be well placed and users will recognize this and develop trust in the system. In addition, this research is not aiming at the first stages of a trust relationship. It is concentrated on the later stages of a trust relationship, where the intrinsic trust factors have become more important, such as the ability of the system to ensure the privacy and of information.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Progress</head><p>A trustworthy system is a system that has the capability of meeting customer trust and the capability to meet their stated, unstated, and even unanticipated needs <ref type="bibr" target="#b16">[17]</ref>. Moreover, trustworthiness of a software system is the assurance that the system will perform as expected <ref type="bibr" target="#b17">[18]</ref>. Hoffman, Lawson-Jenkins and Blum <ref type="bibr" target="#b18">[19]</ref> proposed and extended a trust model, which considers privacy, security, reliability, usability, safety, availability, and user expectations as subcomponents of trust. We consider system trustworthiness based on the following properties (fig. <ref type="figure" target="#fig_1">2</ref>):</p><p>Privacy of personal information plays a very important role in building trust in an information system. Today, information systems have the ability to collect and store personal information very easily and by providing wider access. So, there is an increased risk for the personal information to be intentionally or unintentionally disclosed that will result in decreasing users' trust in the information system <ref type="bibr" target="#b19">[20]</ref>.</p><p>There are multiple examples in e-commerce and e-banking where the trustee is required to maintain the privacy of the customer's name, address and credit card details. Although consumers are willing to sacrifice their privacy in order to have some benefit, the privacy concerns are influencing the acceptance and adoption of new technologies <ref type="bibr" target="#b20">[21]</ref>.</p><p>Security is also of the same importance as privacy. If we don't consider trust in the design, then we might end up with a system that has security measures that are not needed and that they just make the collaboration of the users through the software system and with the system more difficult. On the other hand, security measures might not be taken in cases where it is assumed there is trust among the users or the system when it actually there in no such trust <ref type="bibr" target="#b2">[3]</ref>. Rasmusson and Janssen <ref type="bibr" target="#b21">[22]</ref> define two types of security, hard and soft security. Hard security is all the security mechanisms that protect the systems against any potential attack. However, there are cases that we do not only want to prevent an attack to a system resource but to protect ourselves from a provider of a harmful or low quality resource and the approach of protection in these cases is called soft security. Therefore, the receiver of the resource needs to show trust only to those resource providers that are trustworthy. Reliability of a system can be defined as "the probability that a system will perform a specified function within prescribed limits, under given environmental conditions, for a specified time" <ref type="bibr" target="#b22">[23]</ref>. Also, Avizienis, Laprie and Randell <ref type="bibr" target="#b17">[18]</ref> define system reliability as the continuity of providing the correct service. The attribute of reliability of a system as a trustee contributes significantly to its trustworthiness. When a trustor assigns a subjective probability to the behaviour of the trustee this is called reliability trust and it excludes situational parameters <ref type="bibr" target="#b23">[24]</ref>.</p><p>Another additional attribute of trustworthiness is usability. According to <ref type="bibr" target="#b24">[25]</ref> and <ref type="bibr" target="#b25">[26]</ref> usability is:</p><p>• How easily the users learn the interface (learnability).</p><p>• The efficiency of the interface (task performance).</p><p>• How easily the users can memorize.</p><p>• The reduction of errors.</p><p>• The general satisfaction with the interface. Research so far has shown that the usability factors have an impact on trustworthiness, especially of the websites, as they increase the perceived ability of them <ref type="bibr" target="#b26">[27]</ref>. Moreover, usability is a prerequisite to trust, as users need to trust themselves and their ability that they can use a software system correctly <ref type="bibr" target="#b27">[28]</ref>.</p><p>Safety is when there will not be any catastrophic consequences to the users or the environment by the use of the software system <ref type="bibr" target="#b17">[18]</ref> and maintainability is the ability of the software system to be modified or repaired <ref type="bibr" target="#b17">[18]</ref>. Both these properties influence trust. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Research Contributions</head><p>The main research contribution of this work is a methodology that the developers can easily follow and will guide them towards the development of trustworthy information systems. Developers of a project might have a different cultural background and have a different understanding of trust. Therefore, not only they need a methodology that can guide them through the software development process, but also a methodology that will establish a common understanding of trust within a technical setting among the developers Also, trustworthiness is examined from a holistic perspective in order to capture all the properties that are important in developing trust and not only a subset.</p><p>Information should be communicated across trusted parties. So, in the design of the system the social architectures of trust need to be considered and reflected in the technical architectures of trust. Therefore, our goal is to capture the social relationships of trust and to verify if the design of the system conforms to them.</p><p>Furthermore, the state of the art so far adopts an ad-hoc approach when tries to consider trust issues, which proves to be more difficult and costly <ref type="bibr" target="#b7">[8]</ref>. When trust requirements are not considered in a consistent way from the early stages of the software development, but in an ad-hoc way, they will result in conflicts with the other functional and non-functional requirements of the system. So, in order to resolve these conflicts more valuable resources, such money and time, will be needed, that will still lead to a more complex solution.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Trust properties</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. System trustworthiness properties.</figDesc><graphic coords="7,220.88,147.40,167.01,333.49" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgments. This research is under the supervision of Dr. Haralambos Mouratidis.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Modelling Trust for System Design Using the i* Strategic Actors Framework</title>
		<author>
			<persName><forename type="first">E</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Workshop on Deception Fraud and Trust in Agent Societies</title>
				<meeting>the International Workshop on Deception Fraud and Trust in Agent Societies</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="175" to="194" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Methodology to Bridge Different Domains of Trust in Mobile Communications</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Cofta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the First International iTrust Conference</title>
				<meeting>the First International iTrust Conference</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="211" to="224" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Requirements Engineering for Trust Management</title>
		<author>
			<persName><forename type="first">P</forename><surname>Giorgini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Massaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mylopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zanone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Information Security</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="257" to="274" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">A Framework for Modelling Trust during Information Systems Development</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">K</forename><surname>Bimrah</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
		<respStmt>
			<orgName>University of East London</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD Thesis</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Secure Tropos: A Security-Oriented Extension of the Tropos Methodology</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mouratidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Giorgini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Software Engineering and Knowledge Engineering</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="285" to="309" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Modelling Trust in E-Commerce: An Approach Based on User Requirement</title>
		<author>
			<persName><forename type="first">A</forename><surname>Pourshahid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Tran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 9 th International Conference on Electronic Commerce</title>
				<meeting>the 9 th International Conference on Electronic Commerce<address><addrLine>USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="413" to="422" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">UML-Trust: Towards Developing Trust Aware Software</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">G</forename><surname>Uddin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zulekernine</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the ACM Symposium on Applied Computing</title>
				<meeting>the ACM Symposium on Applied Computing<address><addrLine>Brazil</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="831" to="836" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Holistic Trust Design of E-Services</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lo Presti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Butler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Leushel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Booth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Trust in E-Services: Technologies, Practices and Challenges</title>
				<editor>
			<persName><forename type="first">R</forename><surname>Song</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Korba</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Yee</surname></persName>
		</editor>
		<meeting><address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<publisher>Idea Group Publishing</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="113" to="139" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The Trust/Control Duality: An Integrative Perspective on Positive Expectations of Others</title>
		<author>
			<persName><forename type="first">G</forename><surname>Mollering</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Sociology</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="283" to="305" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">What is Trust? A Conceptual Analysis and an Interdisciplinary Model</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">H</forename><surname>Mcknight</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">N</forename><surname>Chervany</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Americas Conference of Information Systems</title>
				<meeting><address><addrLine>Long Beach, CA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="827" to="833" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Trust, Complexity and Control: Confidence in a Convergent World</title>
		<author>
			<persName><forename type="first">P</forename><surname>Cofta</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>John Wiley and Sons</publisher>
			<pubPlace>London</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">The Mechanics of Trust: A Framework for Research and Design</title>
		<author>
			<persName><forename type="first">J</forename><surname>Riegelsberger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Sasse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Mccarthy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Human-Computer Studies</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="381" to="422" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Contracting with Uncertain Level of Trust</title>
		<author>
			<persName><forename type="first">S</forename><surname>Braynov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sandholm</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Computational Intelligence</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="501" to="514" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">The Metaphysics of Software Trust</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">K</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Voas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IT Professional IEEE Computer Society</title>
		<imprint>
			<biblScope unit="page" from="52" to="55" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Computanionally Modelling Trust: An Exploration</title>
		<author>
			<persName><forename type="first">J</forename><surname>Masthoff</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the SociUM Workshop assosiated with the User Modelling Conference</title>
				<meeting>the SociUM Workshop assosiated with the User Modelling Conference<address><addrLine>Greece</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Can we manage Trust?</title>
		<author>
			<persName><forename type="first">A</forename><surname>Josang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Keser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Dimitrakos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Trust Management. LNCS</title>
		<editor>Hermann, P., Issarny, V., Shiu, S.</editor>
		<imprint>
			<biblScope unit="volume">3477</biblScope>
			<biblScope unit="page" from="13" to="29" />
			<date type="published" when="2005">2005</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">B</forename><surname>Jayaswal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">P</forename><surname>Patton</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>Prentice Hal</publisher>
			<pubPlace>London</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Dependability and its Threats: A Taxonomy</title>
		<author>
			<persName><forename type="first">A</forename><surname>Avizienis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Laprie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Randell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">18 th IFIP</title>
				<imprint>
			<publisher>Kluwer Academic Publishers</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="91" to="120" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Trust Beyond Security: An Expanded Trust Model</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Hoffman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Lawson-Jenkins</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Blum</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="95" to="101" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Just what the Doctor Ordered: The Role of Information Sensitivity and Trust in Reducing Medical Information Privacy Concern</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Rohm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">G</forename><surname>Milne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Business Research</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="page" from="1000" to="1011" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Engineering Privacy</title>
		<author>
			<persName><forename type="first">S</forename><surname>Spiekermann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Cranor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Software Engineering</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="67" to="82" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Simulated Social Control for Secure Internet Commerce</title>
		<author>
			<persName><forename type="first">L</forename><surname>Rasmusson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Janssen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1996 New Security Paradigms Workshop</title>
				<meeting>the 1996 New Security Paradigms Workshop</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">R</forename><surname>Stapelberg</surname></persName>
		</author>
		<title level="m">Handbook of Reliability, Availability, Maintainability, and Safety in Engineering Design</title>
				<meeting><address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">A Survey of Trust and Reputation Systems for Online Service Provision</title>
		<author>
			<persName><forename type="first">A</forename><surname>Josang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ismail</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Boyd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="618" to="644" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<title level="m" type="main">Usability Engineering</title>
		<author>
			<persName><forename type="first">J</forename><surname>Nielsen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1993">1993</date>
			<publisher>Academic Press</publisher>
			<pubPlace>London</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Shackel</surname></persName>
		</author>
		<title level="m">Applied Ergonomics Handbook</title>
				<meeting><address><addrLine>Guilford</addrLine></address></meeting>
		<imprint>
			<publisher>IPC Science and Technology Press</publisher>
			<date type="published" when="1975">1975</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">The Impact of Interface Usability on Trust in Web Retailers</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">M</forename><surname>Roy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Dewit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">B</forename><surname>Aubert</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Internet Research: Electronic Networking Applications and Policy</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="388" to="398" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Usability and Trust in Information Systems</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Sasse</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Trust and Crime in Information Societies</title>
				<editor>
			<persName><forename type="first">R</forename><surname>Mansell</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><forename type="middle">B</forename><surname>Collin</surname></persName>
		</editor>
		<imprint>
			<publisher>Edward Elgar</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="319" to="348" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
