An increasing reliance on the Internet and mobile communication has deprived us of our usual means of assessing another party’s trustworthiness. This is increasingly forcing us to rely on control. Yet the notion of trust and trustworthiness is essential to the continued development of a technology-enabled society.Trust, Complexity and Control offers readers a single, consistent explanation of how the sociological concept of ‘trust’ can be applied to a broad spectrum of technology-related areas; convergent communication, automated agents, digital security, semantic web, artificial intelligence, e-commerce, e-government, privacy etc. It presents a model of confidence in which trust and control are driven and limited by complexity in one explanatory framework and demonstrates how that framework can be applied to different research and application areas. Starting with the individual’s assessment of trust, the book shows the reader how application of the framework can clarify misunderstandings and offer solutions to complex problems.The uniqueness of Trust, Complexity and Control is its interdisciplinary treatment of a variety of diverse areas using a single framework.Sections featured include:Trust and distrust in the digital world.The impact of convergent communication and networks on trust.Trust, economy and commerce.Trust-enhancing technologies.Trust, Complexity and Control is an invaluable source of reference for both researchers and practitioners within the Trust community. It will also be of benefit to students and lecturers in the fields of information technology, social sciences and computer engineering.
Author(s): Piotr Cofta
Edition: 1
Year: 2007
Language: English
Pages: 310
Trust, Complexity and Control......Page 4
Contents......Page 10
Foreword......Page 18
Introduction......Page 20
Part I Confidence: Trust and Control......Page 26
1.1 Basic Concepts......Page 28
1.2.1 Social Sciences......Page 29
1.2.2 Technology......Page 31
1.3 Terminology......Page 32
1.3.1 Alice......Page 33
1.3.2 Bob......Page 34
1.3.3 The Relationship......Page 35
1.4 Agents Alice and Bob......Page 36
1.4.2 Intentional Agent Bob......Page 37
1.6 No Confidence......Page 38
1.7 Pragmatics of Confidence......Page 39
Bibliography......Page 41
2.1 Introduction......Page 46
2.2.3 Transactional Horizon......Page 47
2.3 Two Trusts......Page 48
2.4.2 Proposition......Page 49
2.5.1 Entities......Page 50
2.5.2 The Complexity-scope Exchange......Page 51
2.5.3 The Assessment of Confidence......Page 52
2.6 Formalisation......Page 55
2.7.1 The Trust Path......Page 58
2.7.2 The Control Path......Page 59
2.9 Enablers......Page 61
2.9.1 Similarity......Page 63
2.9.3 Identity......Page 64
2.11 Characteristics of Trust and Control......Page 65
2.11.2 Volatility......Page 66
2.11.6 Measurability......Page 67
Bibliography......Page 68
3.1 Introduction......Page 72
3.2.1 Relationship to the Model......Page 73
3.3.1 Surveys......Page 74
3.3.2 Games of trust......Page 75
3.4 Value of Confidence......Page 77
3.4.1 Expressing Risk......Page 78
3.4.2 Sources of Uncertainty......Page 80
3.5.1 Discounting......Page 81
3.5.2 Decoration......Page 83
3.5.3 Uncertain Probability......Page 85
3.6 Conclusion......Page 87
Bibliography......Page 88
4.1 Introduction......Page 92
4.2 Models......Page 93
4.3.1 Interdisciplinary Model of Trust......Page 94
4.3.2 Technology Trust Formation Model......Page 98
4.3.3 MoTEC Model of Trust in e-Commerce......Page 99
4.3.4 Tan’s Transactional Trust Model......Page 102
4.4 Conclusion......Page 103
Bibliography......Page 104
5.1 Introduction......Page 106
5.2 Development of Confidence-Based Relationship......Page 107
5.2.1 Cognitive Trust (Control, External)......Page 108
5.3 Relationship as a Signalling Protocol......Page 109
5.3.1 Observation (Control, External)......Page 110
5.4 Swift Trust......Page 111
5.4.2 Imposed Confident Behaviour......Page 112
5.5 Emergence of Trust......Page 113
5.6 Breach of Trust......Page 115
5.7.1 Forgiveness in a Game of Trust......Page 116
5.7.2 Simulation......Page 117
5.8 Dead Ends......Page 118
Bibliography......Page 119
6.1 Introduction......Page 122
6.2 Related Works......Page 123
6.3 The Starting Point......Page 124
6.4.1 Distrust-like Behaviour......Page 125
6.4.2 Distrust in Social Contexts......Page 126
6.6 The Assessment of Distrust......Page 127
6.7.1 Continuity......Page 129
6.8 The Area Between......Page 130
6.10 Dis-control......Page 132
6.10.2 Example......Page 133
Bibliography......Page 134
Part II Confidence and Technology......Page 138
7.1 Introduction......Page 140
7.2.2 Removal and Transparency......Page 141
7.3.1 Two ‘Trusts’......Page 142
7.3.2 Unification......Page 143
7.4 Structuring the Area......Page 144
7.4.2 Technology to Technology (2)......Page 145
7.4.5 Other Configurations......Page 146
7.5.1 Similarity (Note 1)......Page 147
7.5.3 Motivation (Note 3)......Page 148
7.6 Conclusion......Page 149
Bibliography......Page 150
8.1 Introduction......Page 152
8.2 Reductive Approach: Security through Control......Page 153
8.2.1 Ontological Security......Page 154
8.2.2 Trusted Computing......Page 155
8.2.3 Trusted Foundations......Page 156
8.3 Holistic Approach: Security through Trust......Page 157
8.3.2 Trust-based Access Control......Page 158
8.3.3 Problems with the Holistic Approach......Page 159
8.5 Conclusion......Page 160
Bibliography......Page 161
9.1 Introduction......Page 164
9.2 Overview of the Research......Page 165
9.3 Quality Indicators......Page 166
9.4 Propagation and Transitivity of Confidence......Page 168
9.5 Taxonomy of Interactions......Page 170
9.5.1 Non-removed Interactions......Page 171
9.5.2 Once-removed Interactions......Page 173
9.5.3 Twice-removed Interactions......Page 175
9.5.4 Level-removed Interactions......Page 178
9.6.1 Network Architectures......Page 179
9.6.2 Memory......Page 181
9.6.3 Honesty and Similarity......Page 182
Bibliography......Page 183
10.1 Introduction......Page 188
10.2 Taxonomy of Threats......Page 189
10.2.1 Alice......Page 190
10.2.2 Reputation......Page 192
10.2.3 Information Flow......Page 193
10.2.4 Network......Page 196
10.3 Attacks......Page 197
10.3.2 Starvation......Page 198
10.3.5 Reputation Takeover......Page 199
10.3.6 Unfair ratings......Page 200
10.3.7 Dis-reputation......Page 201
10.3.8 Prejudice......Page 202
10.4 Conclusion......Page 203
Bibliography......Page 204
11.1 Introduction......Page 206
11.2 The Concept of TET......Page 207
11.3 TET Principles......Page 208
11.4 TET Requirements......Page 210
11.4.1 Identity......Page 211
11.4.2 Affinity......Page 212
11.4.4 Decency......Page 214
11.5 Tools......Page 215
11.5.1 Mask......Page 216
11.5.2 Mirror......Page 217
11.5.3 Memory......Page 218
11.6 Example......Page 219
11.6.3 Honesty......Page 220
11.7 Another Example......Page 221
11.8 Conclusion......Page 222
Bibliography......Page 223
Part III Confidence in a Convergent World......Page 226
12.1 Introduction......Page 228
12.2 Convergence......Page 229
12.2.1 Pervasiveness of Technology......Page 230
12.2.2 Brand Virtualisation......Page 231
12.3.1 Enablers – Similarity......Page 232
12.3.2 Enablers – Honesty......Page 234
12.3.3 Enablers – Identity......Page 235
12.3.4 Enablers – Availability......Page 236
12.3.5 Trust – Continuity......Page 237
12.3.6 Trust – Competence......Page 238
12.3.7 Trust – Motivation......Page 239
12.3.9 Control – Influence......Page 240
12.3.10 Control – Assurance......Page 241
Bibliography......Page 242
13.1 Introduction......Page 244
13.2 eBay......Page 245
13.3 eBay and the Model of Confidence......Page 246
13.3.2 Trust in Trading Domain – Operational Model......Page 247
13.3.3 Control over the Trading Domain – API......Page 248
13.3.4 Trust in Agents – PowerSeller......Page 249
13.3.5 Control over Agents – Reputation......Page 250
13.3.7 Control over Transactions – PayPal......Page 251
13.4 Potential Development of eBay......Page 252
13.5 Conclusion......Page 254
Bibliography......Page 255
14.1 Introduction......Page 258
14.2.1 Identity......Page 259
14.2.3 Authentication......Page 261
14.3 Privacy and Authentication......Page 263
14.4.1 Privacy-preserving Authentication (PPA)......Page 264
14.4.2 The PPA Protocol......Page 265
14.5 Example......Page 266
14.6 The Role of SIM......Page 267
14.7 Continuous Authentication......Page 268
14.8.2 Identity and the Perception of Truth......Page 269
14.9 Conclusion......Page 271
Bibliography......Page 272
15.2 Trust Management......Page 274
15.2.1 Example......Page 275
15.2.3 Generic Trust Management......Page 276
15.4 Problems......Page 278
15.4.3 Reliable Agents......Page 279
15.4.6 Expressiveness......Page 280
15.5 Autonomy......Page 281
15.5.2 Delegation......Page 282
15.5.3 Alteration......Page 284
15.5.4 Evolution......Page 285
15.6.2 Identity......Page 286
15.8 The Assessment of Trust......Page 287
15.8.1 Continuity......Page 288
15.8.3 Competence......Page 289
15.10 Trusted Third Party......Page 290
Bibliography......Page 292
16.1 Introduction......Page 294
16.2.1 Confidence as Facilitator......Page 295
16.2.2 Confidence as Social Capital......Page 296
16.2.4 Confidence as Currency......Page 297
16.3 Economy of Confidence......Page 298
16.3.1 Certification......Page 299
16.3.2 Representation......Page 300
16.3.3 Branding......Page 301
16.4 Opportunities in Confidence......Page 302
16.5 Fences of the Internet......Page 303
16.6 Trust in a Bottle......Page 305
Bibliography......Page 306
Index......Page 308