Trust, computing, and society / edited by Richard H. R. Harper, Microsoft Research Cambridge.

Call Number
005.8
Title
Trust, computing, and society / edited by Richard H. R. Harper, Microsoft Research Cambridge.
Trust, Computing, & Society
Physical Description
1 online resource (xii, 362 pages) : digital, PDF file(s).
Notes
Title from publisher's bibliographic system (viewed on 05 Oct 2015).
Contents
Machine generated contents note: 1. Introduction and overview R. Harper; Part I. The Topography of Trust and Computing: 2. The role of trust in cyberspace D. Clark; 3. The new face of the Internet T. Karagiannis; 4. Trust as a methodological tool in security engineering G. Danezis; Part II. Conceptual Points of View: 5. Computing and the search for trust T. Simpson; 6. The worry about trust O. Lagerspetz; 7. The inescapability of trust R. J. Anderson and W. Sharrock; 8. Trust in interpersonal interaction and cloud computing D. R. Watson; 9. Trust, social identity, and computation C. Ess; Part III. Trust in Design: 10. Design for trusted and trustworthy services A. Sasse and I. Kirlappos; 11. Dialogues: trust in design R. Banks; 12. Trusting oneself R. Harper and W. Odom; 13. Reflections on trust, computing and society R. Harper; Bibliography.
Summary
The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust.
Added Author
Harper, Richard, 1960- editor.
Subject
Computers Social aspects.
Internet Social aspects.
TRUST.
COMPUTER SECURITY.
Computer networks Security measures.
Computer networks Reliability.
Information technology Social aspects.
Multimedia
Total Ratings: 0
No records found to display.
 
 
 
03306nam a22004338i 4500
001
 
 
vtls001584698
003
 
 
VRT
005
 
 
20200921122000.0
006
 
 
m|||||o||d||||||||
007
 
 
cr||||||||||||
008
 
 
200921s2014||||enk     o     ||1 0|eng|d
020
$a 9781139828567 (ebook)
020
$z 9781107038479 (hardback)
035
$a (UkCbUP)CR9781139828567
039
9
$y 202009211220 $z santha
040
$a UkCbUP $b eng $e rda $c UkCbUP
050
0
0
$a QA76.9.C66 $b T78 2014
082
0
0
$a 005.8 $2 23
245
0
0
$a Trust, computing, and society / $c edited by Richard H. R. Harper, Microsoft Research Cambridge.
246
3
$a Trust, Computing, & Society
264
1
$a Cambridge : $b Cambridge University Press, $c 2014.
300
$a 1 online resource (xii, 362 pages) : $b digital, PDF file(s).
336
$a text $b txt $2 rdacontent
337
$a computer $b c $2 rdamedia
338
$a online resource $b cr $2 rdacarrier
500
$a Title from publisher's bibliographic system (viewed on 05 Oct 2015).
505
8
$a Machine generated contents note: 1. Introduction and overview R. Harper; Part I. The Topography of Trust and Computing: 2. The role of trust in cyberspace D. Clark; 3. The new face of the Internet T. Karagiannis; 4. Trust as a methodological tool in security engineering G. Danezis; Part II. Conceptual Points of View: 5. Computing and the search for trust T. Simpson; 6. The worry about trust O. Lagerspetz; 7. The inescapability of trust R. J. Anderson and W. Sharrock; 8. Trust in interpersonal interaction and cloud computing D. R. Watson; 9. Trust, social identity, and computation C. Ess; Part III. Trust in Design: 10. Design for trusted and trustworthy services A. Sasse and I. Kirlappos; 11. Dialogues: trust in design R. Banks; 12. Trusting oneself R. Harper and W. Odom; 13. Reflections on trust, computing and society R. Harper; Bibliography.
520
$a The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust.
650
0
$a Computers $x Social aspects.
650
0
$a Internet $x Social aspects.
650
0
$a TRUST.
650
0
$a COMPUTER SECURITY.
650
0
$a Computer networks $x Security measures.
650
0
$a Computer networks $x Reliability.
650
0
$a Information technology $x Social aspects.
700
1
$a Harper, Richard, $d 1960- $e editor.
776
0
8
$i Print version: $z 9781107038479
856
4
0
$u https://doi.org/10.1017/CBO9781139828567
999
$a VIRTUA               
No Reviews to Display
Summary
The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust.
Notes
Title from publisher's bibliographic system (viewed on 05 Oct 2015).
Contents
Machine generated contents note: 1. Introduction and overview R. Harper; Part I. The Topography of Trust and Computing: 2. The role of trust in cyberspace D. Clark; 3. The new face of the Internet T. Karagiannis; 4. Trust as a methodological tool in security engineering G. Danezis; Part II. Conceptual Points of View: 5. Computing and the search for trust T. Simpson; 6. The worry about trust O. Lagerspetz; 7. The inescapability of trust R. J. Anderson and W. Sharrock; 8. Trust in interpersonal interaction and cloud computing D. R. Watson; 9. Trust, social identity, and computation C. Ess; Part III. Trust in Design: 10. Design for trusted and trustworthy services A. Sasse and I. Kirlappos; 11. Dialogues: trust in design R. Banks; 12. Trusting oneself R. Harper and W. Odom; 13. Reflections on trust, computing and society R. Harper; Bibliography.
Subject
Computers Social aspects.
Internet Social aspects.
TRUST.
COMPUTER SECURITY.
Computer networks Security measures.
Computer networks Reliability.
Information technology Social aspects.
Multimedia