Abstract
Research in information security is no longer limited to technical issues: human-related issues such as trust and the sense of security are also required by the user. In this paper, we use a Japanese word for such feelings, Anshin; “An” means to ease, and “Shin” is to mind. One feels Anshin when he is free from worry and fear. We try to identify the factors of Anshin so that we can construct a framework of the evaluation of Anshin. We present an initial Anshin model, and report our recent research results from user survey with factor analysis. We derive the following factors from the analysis; 1) user expectation of trust and confidence, 2) satisfaction with user interface and 3) understanding of risk and threats from user experience as well prior knowledge.
Currently affiliated with NTT Corporation.
Please use the following format when citing this chapter: Hikage, N., Murayama, Y., and Hauser. C-, 2007, in IFiP Internationa! Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, eds. Venter, H., Eloff, M, Labuschagne, L., Eloff. J., von Solms, R,. (Boston: Springer), pp. 121–132.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
D. Basin, S. Mödersheim and L. Viganò: CDiff: a new reduction technique for constraint-based analysis of security protocols, Proc. of the 10th ACM conference on Computer and Communications Security, pp. 335–344 (2003).
W. Shi, H.S. Lee, C. Lu and T. Zhang: Attacks and risk analysis for hardware supported software copy protection systems, Proc. of the 4th ACM workshop on Digital rights management, pp. 54–62 (2004).
J.J. Yan: A note on proactive password checking, Proc. of the 2001 workshop on New Security Paradigms, pp. 127–135(2001).
M. Deutsh: The effect of motivational orientation upon trust and suspition, Human Relation, 13, pp. 123–139(1960).
M. Deutsh: The resolution of conflict (Yale University Press, 1973).
D. Gambetta: Can we trust trust?, Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford, chapter 13, pp. 213–237 (originally published from Basil Blackwell, 1988). Available at: http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf (Last Access: 9 Feb 2007)
S.P. Marsh: Formalising trust as computational concept, PhD Thesis, Department of Mathematics and Computer Science, University of Stirling (1994).
B. Friedman, P.H. Khan and D.C. Howe: Trust online, Communication of ACM, Vol. 43, No. 12, pp. 34–40(2000).
P. Lamsal: Understanding Trust and Security, Available at: http://www.es.helsinki.fi/u/lamsal/asgn/trust/UnderstandingTrustAndSecurity.pdf(Last Access: 9 Feb 2007).
N. Dimmock, A. Belokosztolszki, D. Eyers, J. Baconand and K. Moody: Access management for distributed systems: Using trust and risk in role-based access control policies, Proc. of the ninth ACM symposium on Access Control Models and Technologies, pp. 156–162(2004).
L.J. Hoffman, K. Lawson-Jenkins, J. Blum: Trust beyond security: an expanded trust model, Communications of the ACM, Vol. 49, No. 7, pp. 94–101 (2006).
Stephen Flowerday, Rossouw von Solms: Trust: An Element of Information security, Proc. of the IFIP TC-11 21st International Information Security Conference (SEC2006), pp. 87–98 (2006).
J.D. Lewis, and A. Weigert: Trust as a Social Reality, Social Forces, Vol. 63, No. 4, pp. 967–985 (1985).
S. Xiao, and I. Benbasat: The formation of trust and distrust in recommendation agents in repeated interactions: a process-tracing analysis, Proc. of the 5th international conference on Electronic commerce (ICEC’03), pp. 287–293 (2003).
S. Xiao and I. Benbasat: Understanding Customer Trust in Agent-Mediated Electronic Commerce, Web-Mediated Electronic Commerce, and Traditional Commerce, Information Technology and Management, Vol. 4, No. 1–2, Kluwer Academic Publishers, pp. 181–207 (2004).
K. Chopra, W.A. Wallace: Trust in Electronic Environments, Proc. of the 36th Hawaii International Conference on System Science (HICSS’03), pp. 331–340 (2003).
H.H Kuan, and G.W. Bock: The Collective Reality of Trust: An Investigation of Social Relations and Networks on Trust in Multi-Channel Retailers, Proc. of the 13th European Conference on Information Systems (ECIS 2005), Available at: http://is2.lse.ac.uk/asp/aspecis/20050018.pdf (Last Access: 9 Feb 2007)
Yamagishi, T.: The structure of trust: The evolutionary games of mind and society (Tokyo University Press, 1998). English version is available at: http://www.lynx.let.hokudai.ac.jp/members/yamagishi/english.htm (Last Access: 9 Feb 2007).
T. Kikkawa, S. Shirato, S. Fujiiand and K. Takemura:The pursuit of informed reassurance (‘An-Shin’ in Society) and technological safety(‘An-Zen’), Journal of SHAKAI-GIJUTSU, Vol. 1, pp. 1–8 (2003). in Japanese.
A. Whitten and D. Tygar: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0, Proc. of the 9th USENIX Security Symposium, pp. 169–184 (1999).
R.T. Stephens: A framework for the identification of electronic commerce design elements that enable trust within the small hotel industry, Proc. of ACMSE’04, pp. 309–314 (2004).
P. Pu, L. Chen: Trust building with explanation interfaces, Proc. of the 11th international conference on Intelligent user interfaces (IUI’06), pp. 93–100 (2006).
J. Riegelsberger, M.A. Sasse and J.D. McCarthy: Privacy and trust: Shiny happy people building trust?: photos on e-commerce websites and consumer trust, Proc. of the SIGCHI conference on Human factors in computing systems (CHI’03), Vol. 5, No. 1, pp. 121–128 (2003).
Sapient & Cheskin: eCommerce Trust, 1999
Beck, A.T.: Cognitive Therapy of Depression (Guilford Press 1979).
Y. Murayama, N. Hikage, C. Hauser, B. Chakraborty and N. Segawa: An Anshin Model for the Evaluation of the Sense of Security, Proc. of Hawaii International Conference on System Science (HICSS’06), Vol. 8, p. 205a (2006).
T. Tomita, K. Suzumura and Y. Murayama: Proposal for Under the Door Communication on the network, Human-Computer Interaction: Theory and Practice(Part II), pp. 1019–1023 (2003).
R.H. Alschuler and H.L. Berta: Painting and Personality, University of Chicago Press, Vol. 1 (1947).
D.J. Kim, C. Steinfield and Y. Lai: Revisiting the Role of Web Assurance Seals in Consumer Trust, Proc. of the 6th international conference on Electronic Commerce, pp. 280–287 (2004).
R. Dhamija, J.D Tygar. and M. Hearst: Why phishing works, Proc. of the SIGCHI conference on Human Factors in computing systems (CHF’06), pp. 581–590 (2006).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Hikage, N., Murayama, Y., Hauser, C. (2007). Exploratory survey on an Evaluation Model for a Sense of Security. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds) New Approaches for Security, Privacy and Trust in Complex Environments. SEC 2007. IFIP International Federation for Information Processing, vol 232. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-72367-9_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-72367-9_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-72366-2
Online ISBN: 978-0-387-72367-9
eBook Packages: Computer ScienceComputer Science (R0)