Trust Management of Ubiquitous Multi-Display Environments

  • Ekatarina Kurdyukova
  • Elisabeth André
  • Karin Leichtenstern
Chapter
Part of the Cognitive Technologies book series (COGTECH)

Abstract

While a lot of research has been devoted to improving the security and the reliability of ubiquitous display environments, work on the user experience factor of trust is still scarce. To ensure that ubiquitous environments find acceptance among users, the user experience factor of trust should, however, not be underestimated. In this paper, we present a decision-theoretic approach to trust management that we consider particularly appropriate when a system has to balance the benefits and risks of a decision carefully. In the paper, we define decision policies that help maintain trust in critical situations, such as the loss of sensor data or the presence of unknown people. The approach has been employed in three interactive applications that have been developed as part of a university-wide ubiquitous displays management system.

References

  1. 1.
    H. Cao, P. Olivier, and D. Jackson. Enhancing privacy in public spaces through crossmodal displays. Soc. Sci. Comput. Rev., 26(1):87–102, 2008.CrossRefGoogle Scholar
  2. 2.
    C. Castelfranchi and R. Falcone. Trust Theory: A Socio-Cognitive and Computational Model. Wiley, 2010.Google Scholar
  3. 3.
    A. Glass, D. L. McGuinness, and M. Wolverton. Toward establishing trust in adaptive agents. In IUI ‘08: Proceedings of the 13th international conference on Intelligent user interfaces, pages 227–236, New York, NY, USA, 2008. ACM.Google Scholar
  4. 4.
    C. Graham and K. Cheverst. Guides, locals, chaperones, buddies and captains: managing trust through interaction paradigms. In 3rd Workshop ‘HCI on Mobile Guides’ at the Sixth International Symposium on Human Computer Interaction with Mobile Devices and Services, pages 227–236, New York, NY, USA, 2004. ACM.Google Scholar
  5. 5.
    T. Grandison and M. Sloman. A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 3(4):2–16, 2000.CrossRefGoogle Scholar
  6. 6.
    A. Kini and J. Choobineh. Trust in electronic commerce: definition and theoretical considerations. In Proc. of the Hawaii International Conference on System Sciences, volume 31, pages 51–61, 1998.Google Scholar
  7. 7.
    K. Leichtenstern, E. André, and E. Kurdyukova. Managing user trust for self-adaptive ubiquitous computing systems. In Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, MoMM ‘10, pages 409–414, New York, NY, USA, 2010. ACM.Google Scholar
  8. 8.
    J. Lumsden. Triggering trust: to what extent does the question influence the answer when evaluating the perceived importance of trust triggers? In BCS HCI ‘09: Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, pages 214–223, Swinton, UK, UK, 2009. British Computer Society.Google Scholar
  9. 9.
    C. Röcker, S. Hinske, and C. Magerkurth. Intelligent privacy support for large public displays. In Proceedings of Human-Computer Interaction International 2007 (HCII’07), Beijing, China, 2007.Google Scholar
  10. 10.
    S. J. Russell and P. Norvig. Artificial Intelligence a modern approach. Prentice Hall, Upper Saddle River, N.J., 2nd international edition, 2003.Google Scholar
  11. 11.
    M. Tschannen-Moran and W. Hoy. A multidisciplinary analysis of the nature, meaning, and measurement of trust. Review of Educational Research, 70(4):547, 2000.Google Scholar
  12. 12.
    Z. Yan and S. Holtmanns. Trust modeling and management: from social trust to digital trust. Book chapter of Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions, 2008.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Ekatarina Kurdyukova
    • 1
  • Elisabeth André
    • 1
  • Karin Leichtenstern
    • 1
  1. 1.Human-Centered MultimediaInstitute of Computer ScienceAugsburgGermany

Personalised recommendations