Advertisement

Increasing Trust Perceptions in the Internet of Things

  • Trenton Schulz
  • Ingvar Tjøstheim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8030)

Abstract

When interacting with objects and services in the Internet of Things, people will need to trust that their data is safe, and that “things” will do what they promise they will do. As part of a user evaluation of a toolkit for providing security and privacy information to users, we created two models to find a pattern in changes in the perception of trust in the participants. The model based on demographics was not very descriptive. But, the model based on participants’ privacy concerns and trust traits revealed a good match between changes in trust based on information from our toolkit. While there were some limitations in the current study, it showed how TFT can be improved for future evaluations.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ashton, K.: That ‘Internet of Things’ Thing. RFID Journal (2009), http://www.rfidjournal.com/article/view/4986
  2. 2.
    Steinke, F., Fritsch, T., Silbermann, L.: Trust in Ambient Assisted Living (AAL) – A Systematic Review of Trust in Automation and Assistance Systems. International Journal of Advances in Life Sciences 4(3), 77–88 (2012), http://www.iariajournals.org/life_sciences/tocv4n34.html Google Scholar
  3. 3.
    Yan, Z., Kantola, R., Zhang, P.: Theoretical Issues in the Study of Trust in Human-Computer Interaction. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 853–856. IEEE (November 2011)Google Scholar
  4. 4.
    Leister, W., Schulz, T.: Ideas for a Trust Indicator in the Internet of Things. In: Leister, W., Dini, P. (eds.) The First International Conference on Smart Systems, Devices and Technologies, SMART 2012, pp. 31–34. IARIA, Stuttgart (2012)Google Scholar
  5. 5.
    Hornák, Z., Nyilas, I., Schrammel, J., Wolkerstorfer, P., Ellensohn, L., Geven, A., Fritsch, L., Schulz, T., Abie, H., Pürzel, F., Wittstock, V.: D.3.1 Technology and Standard Report (2010), http://www.utrustit.eu/uploads/media/utrustit/uTRUSTit_D3.1_TechnologyReport_Final.pdf
  6. 6.
    Joinson, A., Reips, U.: Privacy, Trust, and Self-Disclosure Online. Human Computer Interaction 25(1), 1–24 (2010)CrossRefGoogle Scholar
  7. 7.
    Döbelt, S., Busch, M., Hochleitner, C.: Defining, Understanding, Explaining TRUST within the uTRUSTit Project. Tech. rep., CURE, Vienna, Austria (2012)Google Scholar
  8. 8.
    Fuglerud, K.S., Solheim, I., Ellensohn, L., Pürzel, F., Schulz, T.: uTRUSTit Deliverable D7.4 Ethics manual. Tech. rep., Norwegian Computing Center (2011), http://www.utrustit.eu/uploads/media/utrustit/uTRUSTit_D7.4._Ethics_Manual_Final_2.0.pdf
  9. 9.
    Busch, M., Döbelt, S., Hochleitner, C., Wolkerstorfer, P., Schulz, T., Fuglerud, K.S., Tjøstheim, I., Pürzel, F., Wittstock, E., Dumortier, J., Vandezande, N.: uTRUSTit Deliverable D6.2. Design Iteration I: Evaluation Report. Tech. rep., CURE–Center for Usability Research and Engineering (2012), http://www.utrustit.eu/uploads/media/utrustit/uTRUSTit_D6.2-Evaluation_Report_final.pdf
  10. 10.
    Fornell, C., Larcker, D.F.: Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research 18(1), 39–50 (1981)CrossRefGoogle Scholar
  11. 11.
    Barclay, D., Higgins, C., Thompson, R.: The Partial Least Squares (PLS) Approach to Causal Modeling: Personal Computer Adoption and Use as an Illustration. Technology Studies 2(2), 285–309 (1995)Google Scholar
  12. 12.
    Moncrieff, S., Venkatesh, S., West, G.: Dynamic privacy assessment in a smart house environment using multimodal sensing. ACM Transactions on Multimedia Computing, Communications, and Applications 5(2), 1–29 (2008)CrossRefGoogle Scholar
  13. 13.
    Yousafzai, S.Y., Pallister, J.G., Foxall, G.R.: Strategies for building and communicating trust in electronic banking: A field experiment. Psychology and Marketing 22(2), 181–201 (2005)CrossRefGoogle Scholar
  14. 14.
    Nixon, P., Wagealla, W., English, C., Terzis, S.: Security, Privacy and Trust Issues in Smart Environments. In: Smart Environments: Technology, Protocols and Applications, pp. 220–240. Wiley, London (2004)Google Scholar
  15. 15.
    Mooradian, T., Renzl, B., Matzler, K.: Who Trusts? Personality, Trust and Knowledge Sharing. Management Learning 37(4), 523–540 (2006)CrossRefGoogle Scholar
  16. 16.
    Rotter, J.B.: A new scale for the measurement of interpersonal trust. Journal of Personality 35(4), 651–665 (1967)CrossRefGoogle Scholar
  17. 17.
    Chin, W.W.: The Partial Least Squares Approach to Structural Equation Modeling. In: Modern Methods for Business Research, pp. 294–336. Laurence Wrlbaum Associates, Hillsdale (1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Trenton Schulz
    • 1
  • Ingvar Tjøstheim
    • 1
  1. 1.Norwegian Computing CenterNorsk RegnesentralOsloNorway

Personalised recommendations