Advertisement

Users and Trust: The New Threats, the New Possibilities

  • Kristiina Karvonen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4556)

Abstract

In this paper, we describe the current threats and possibilities in the online environment from a user’s perspective on basis of literary analysis and a set of user studies concentrating on online trust formation and expression. The work includes a review on the current level of understanding about online trust, what kind of research has been done and what the basic ingredients of trust might be in the future. By comparing the new results with results gained in 1999, we can see how the situation has been changing. The analysis is based on research conducted on trust between 1999 and 2007, utilising user studies, ethnography, cultural studies, aesthetics, and basic usability engineering as methods. We also include some discussion on the appropriateness of various methods available for studying online trust, and propose directions for new trust research as a field inside human-computer interaction.

Keywords

Security human factors trust qualitative user study cross-cultural identity risk perception 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Adams, A., Sasse, M.A: Users Are Not the Enemy. Communications of the ACM 42(12), 41–46 (1999)CrossRefGoogle Scholar
  2. 2.
    Ackerman, M.S., Mainwaring, S.D.: Privacy Issues and Human-Computer Interaction. In: Cranor, L., Garfinkel, S. (eds.) Security and Usability. Designing Secure Systems that People Can Use, O’Reilly, pp. 381–400 (2005)Google Scholar
  3. 3.
    Ackerman, M.S., Cranor, L., Reagle, J.: Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. In: Proceedings of the ACM Conference on Electronic Commerce, pp. 1–8 (1999)Google Scholar
  4. 4.
    Bonhard, P., Sasse, M.A.: Knowing me, Knowing you - Using Profiles and Social Networking to Improve Recommender Systems. BT Technology Journal, 25(3) (July 2006)Google Scholar
  5. 5.
    Camp, L.J.: Digital Identity. IEEE Technology & Society 23(3), 34–41 (2004)Google Scholar
  6. 6.
    Camp, L.J.: Trust & Risk in Internet Commerce. MIT Press, Winter, Cambridge, MA (2000)Google Scholar
  7. 7.
    Castelfranchi, C., Falcone, R., Marzo, F.: Being Trusted in a Social Network: Trust as Relational Capital. Lecture Notes on Artificial Intelligence (LNAI). Springer, Heidelberg (2006)Google Scholar
  8. 8.
    Cranor, L.F, Reagle, J., Ackerman, M.S.: Beyond Concern: Understanding Net Users Attitudes about On-line Privacy, AT&T Labs-Research Technical Report TR 99.4.3 (1999) http://www.research.att.com/library/trs/TRs/99/99.4/
  9. 9.
    Diller, S., Lin, L., Tashjian, V.: The Evolving Role of Security, Privacy and Trust in a Digitized World. In: Jacko, J.A., Sears, A. (eds.) The Human-Computer Interaction Handbook - Fundamentals, Evolving Technologies, and Emerging Applications, Lawrence Erlbaum Associates, Inc., Mahwah, NJ (2002)Google Scholar
  10. 10.
    Ecommerce Trust Study, Cheskin: ECommerce Trust Study. January 12, 1999. Cheskin Research and Studio Archetype/Sapient 31 (1999) http://www.cheskin.com/cms/files/i/articles//17__report-eComm%20Trust1999.pdf
  11. 11.
  12. 12.
    Friedman, B., Kahn Jr, P.H, Howe, D.C: Trust Online. Communications of the ACM 43(12), 34–40 (2000)CrossRefGoogle Scholar
  13. 13.
    Fukuyama, F.: Trust: The Social Virtues and the Creation of Prosperity. Free Press, New York (1995)Google Scholar
  14. 14.
    Gefen, D.: Reflections on the Dimensions of Trust and Trustworthiness among Online Consumers. In: Gefen, D. (ed.) ACM SIGMIS Database. Summer 2002, vol. 33(3), pp. 38–53. ACM Press, New York, USA (2002)Google Scholar
  15. 15.
    Goffman, E.: The Presentation of Self in Everyday Life. New York, Anchor-Doubleday (1967)Google Scholar
  16. 16.
    Karat, C.M., Brodie, C., Karat, J.: Usability Design and Evaluation for Privacy and Security Solutions. In: Cranor, L., Garfinkel, S (eds.) Security and Usability. Designing Secure Systems that People Can Use, O’Reilly, pp. 47–74 (2005)Google Scholar
  17. 17.
    Karvonen, K.: The Beauty of Simplicity. In: Proceedings of the ACM Conference on Universal Usability (CUU 2000), November 16-17, 2000, Washington DC, USA (2000)Google Scholar
  18. 18.
    Karvonen, K.: Creating Trust. In: proceedings of the Fourth Nordic Workshop on Secure IT Systems (NordSec’99) November 1-2, 1999, Kista, Sweden (1999)Google Scholar
  19. 19.
    Karvonen, K., Komu, M., Gurtov, A.: Usable Security Management with HIP (to appear, 2007)Google Scholar
  20. 20.
    Lederer, S., Hong, J., Dey, A., Landay, J.: Personal Privacy Through Understanding and Action: Five Pitfalls for Designers. In: Personal and Ubiquitous Computing, Springer, Heidelberg (2004)Google Scholar
  21. 21.
    Lindgaard, G., Fernandes, G., Dudek, C., Brown, J.: Attention web designers: You have 50 milliseconds to make a good first impression! Behaviour & Information Technology 25(2), 115–126 (2006)CrossRefGoogle Scholar
  22. 22.
    Nikander, P., Karvonen, K.: Users and Trust in Cyberspace. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol. 2133, pp. 24–35. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  23. 23.
    Norman, D.: The Design of Every-Day Things. MIT Press, London (1986)Google Scholar
  24. 24.
    Norman, D.: Emotional Design: Why We Love (Or Hate) Everyday Things. Basic Books (2004)Google Scholar
  25. 25.
    Picard, R.W: Affective computing. MIT Press, Cambridge, MA (1997)Google Scholar
  26. 26.
    Salam, A.F, Rao, H.R., Pegels, C.C.: Consumer-Perceived Risk in E-Commerce Transactions. Communications of The. ACM 46(12), 325–331 (2003)CrossRefGoogle Scholar
  27. 27.
    Shneier, B.: Secrets and Lies. Digital Security in a Networked World. John Wiley & Sons, USA (2000)Google Scholar
  28. 28.
    Tractinsky, N., Katz, A.S., Ikar, D.: What is beautiful is usable. Interacting with Computers 13, 127–145 (2000)CrossRefGoogle Scholar
  29. 29.
    Westin, A.F.: Harris-Equifax Consumer Privacy Survey 1991. Atlanta, Equifax, Inc. (1991)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Kristiina Karvonen
    • 1
  1. 1.Department of Computer Science, Helsinki University or Technology, P.O.Box 5400, 02015-TKKFinland

Personalised recommendations