— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Trust has been considered a central aspect of successful IT outsourcing from the beginning of the outsourcing relationship to the end. A great deal of interest in trust has been d...
Designing for trust in technology-mediated interaction is an increasing concern in CHI. In advertising, images of people have long been used to create positive attitudes to produc...
Jens Riegelsberger, Martina Angela Sasse, John D. ...
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, th...
Jean-Marc Seigneur, Alan Gray, Christian Damsgaard...
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...