Online Trust, Trustworthiness, or Assurance?

Daedalus ◽  
2011 ◽  
Vol 140 (4) ◽  
pp. 49-58 ◽  
Author(s):  
Coye Cheshire

Every day, individuals around the world retrieve, share, and exchange information on the Internet. We interact online to share personal information, find answers to questions, make financial transactions, play social games, and maintain professional and personal relationships. Sometimes our online interactions take place between two or more humans. In other cases, we rely on computers to manage information on our behalf. In each scenario, risk and uncertainty are essential for determining possible actions and outcomes. This essay highlights common deficiencies in our understanding of key concepts such as trust, trustworthiness, cooperation, and assurance in online environments. Empirical evidence from experimental work in computer-mediated environments underscores the promises and perils of overreliance on security and assurance structures as replacements for interpersonal trust. These conceptual distinctions are critical because the future shape of the Internet will depend on whether we build assurance structures to limit and control ambiguity or allow trust to emerge in the presence of risk and uncertainty.

2020 ◽  
Vol 4 (3) ◽  
pp. 490-495
Author(s):  
Astika Ayuningtyas ◽  
Yuliani Indrianingsih ◽  
Uyuunul Mauidzoh

The development of information and computerized tenology has led to what is called the Internet and the World Wide Web (WWW). In addition, the dramatic development of the Internet has given users more choice and control over content, and also provides individuals, businesses, and public and private organizations with the opportunity to generate and disseminate information. The interactive features of the web can be an effective way to build and maintain mutually beneficial relationships if the web is used properly. The presence of the Internet has proven to have a positive impact on the development of a village, sub-district or district to introduce and inform the potential of its region. This is evident in several regions of Indonesia which have successfully used Internet facilities to introduce tourist destinations to the world. Therefore, the training on the promotion website is an effort to optimize the introduction of high quality village products in the district of Patuk and is also intended to follow the results of research on the design of a promotion of superior products and tourist objects on the web in Patuk Gunungkidul district. On the basis of the website promotion feasibility test during the training for each representative in 11 villages in the Patuk sub-district, 87.36% was obtained, so that it can be said that the Introduction of superior village products via promotional materials based on the website was optimal and met the needs of users.


Author(s):  
Purva Kansal ◽  
Amit Kumar Kaushik

In an attempt to influence their pace of development, developing countries around the world try and influence the rate of investment (especially foreign private investments) in their economy. These countries attempt to influence investor decisions by matching and changing their portfolio with that of foreign investors’ needs. However, to make the country portfolio impressive, a country requires massive investment in infrastructure and other portfolio variables which brings countries at an impasse. This chapter discusses the viability of increasing income as a way out. This leads to another important issue as to how to increase revenue of a country with its limited portfolio of strengths. Recent developments in information technology and the Internet have led to a simple solution to this - offshore outsourcing. Outsourcing as a strategy has been around for many years. Traditionally, companies used to outsource their activities to independent suppliers who were best, but the choice was made from the suppliers located in the vicinity of the outsourcing company for easier coordination and control of the activities of the partner. However, due to developments in e-commerce, distance has become a relative term. Exchange of information in a fraction of a minute, irrespective of physical distance, has made it possible for companies to widen their horizons and look for independent suppliers in different nations — offshore outsourcing.


Author(s):  
Tziporah Stern

Privacy, or the right to hold information about oneself in secret (Masuda, 1979; O’Brien & Yasnof, 1999), has become increasingly important in the information society. With the rapid technological advances and the digitalization of information, retrieval of specific records is more rapid; personal information can be integrated into a number of different data files; and copying, transporting, collecting, storing, and processing large amounts of information is easier. Additionally, the advent of the World Wide Web and the fast-paced growth of the Internet have created further cause for concern. The vast amounts of digital information and the pervasiveness of the Internet facilitate new techniques for gathering information—for example, spyware, phishing, and cookies. Hence, personal information is much more vulnerable to being inappropriately used. This article outlines the importance of privacy in an e-commerce environment, the specific privacy concerns individuals may have, antecedents to these concerns, and potential remedies to quell them.


2019 ◽  
pp. 58-79 ◽  
Author(s):  
Mark Graham ◽  
Sanna Ojanperä ◽  
Martin Dittus

From the earliest stages of computer-mediated communication, technical change was predicted to undermine the significance of geography and lead to the “death of distance.” This seemed a logical consequence of electronic media enabling people to communicate from anywhere, to anyone, and anytime. However, empirical research, such as that illustrated in this chapter, has challenged this view. The authors argue that the Internet augments everyday places. As such, much like material geographies, the Internet can be spatially mapped. In doing so, the authors uncover significant geographic inequalities that shape how we use, move through, and interact with the world.


Author(s):  
Eleutherios A. Papathanassiou ◽  
Xenia J. Mamakou

The advent of the Internet has altered the way that individuals find information and has changed how they engage with many organizations, like government, health care, and commercial enterprises. The emergence of the World Wide Web has also resulted in a significant increase in the collection and process of individuals’ information electronically, which has lead to consumers concerns about privacy issues. Many researches have reported the customers’ worries for the possible misuse of their personal data during their transactions on the Internet (Earp & Baumer, 2003; Furnell & Karweni, 1999), while investigation has been made in measuring individuals’ concerns about organizational information privacy practices (Smith, Milberg & Burke, 1996). Information privacy, which “concerns an individual’s control over the processing, that is the acquisition, disclosure, and use, of personal information” (Kang, 1998) has been reported as one of the most important “ethical issues of the information age” (Mason, 1986).


Author(s):  
Hung Chim

The Bulletin Board System (BBS), when it first appeared in the middle 1970s, was essentially “a personal computer, not necessarily an expensive one, running inexpensive BBS software, plugged into an ordinary telephone line via a small electronic device called modem” (Rheingold, 1993). The networked computers used to create these parallel worlds and facilitate communication between human beings constitute the technical foundations of computer-mediated communication (CMC) (Nancy, 1998). CMC systems link people around the world into public discussions. While CMC can exist solely between two people or between one person and an anonymous group, increasingly, virtual communities of many people are being formed. With advent of the Internet, the World Wide Web (WWW) brought more new technologies to the BBS. Thousands of BBSs sprang up across the world. Many turned out tremendously successful and evolved into lively virtual communities. These communities provided forums with increasing importance for individuals and groups that share a professional interest or share common activities. Online BBS communities now play an important role in information dissemination and knowledge collaboration on the Internet. On one hand, online forums enable people to disseminate information in an extremely efficient way without geographical restriction. On the other hand, the freedom also comes with uncertainty. Any information can be released and the content is almost beyond control, or even unreliable. To understand the content and quality of the information in BBSs, we would split the task into two subjects: one is to assess the information sources; another is to assess the information providers, people themselves in the virtual communities. Most BBSs are anonymous, because people usually use a pseudonym rather than their real name when registering. A user does not need to provide real personal information to the system, either. Thus, how to assess the trust of the users in a BBS community and attract more trustful and worthy users to participate in the activities of the community have become crucial topics to establish a successful community. Two subjects are important for establishing user trust in a BBS community: First, a BBS system must be able to identify a user and provide efficient security protection for each user and his/her privacy. Second, the value and the trustworthiness of a user should be assessed according to that user’s behavior and contribution to the community in comparison to peers.


2003 ◽  
Vol 18 (3) ◽  
pp. 272-275 ◽  
Author(s):  
A. Clem ◽  
Sagar Galwankar ◽  
George Buck

AbstractThe world is becoming ever more interconnected via the Internet, creating both benefits and disadvantages for human communities. This article examines cyber-terrorism, one of the major negative consequences of the Internet. It also examines the potential impact of cyber-terrorism on the health of populations, its possible perpetrators, and its prevention and control.


1996 ◽  
Vol 60 (3) ◽  
pp. 50-68 ◽  
Author(s):  
Donna L. Hoffman ◽  
Thomas P. Novak

The authors address the role of marketing in hypermedia computer-mediated environments (CMEs). Their approach considers hypermedia CMEs to be large-scale (i.e., national or global) networked environments, of which the World Wide Web on the Internet is the first and current global implementation. They introduce marketers to this revolutionary new medium, propose a structural model of consumer navigation behavior in a CME that incorporates the notion of flow, and examine a series of research issues and marketing implications that follow from the model.


2021 ◽  
Author(s):  
◽  
Dale Stephens

<p>The Internet has rapidly become the world’s most prevalent form of communication. It can be accessed twenty-four hours a day from virtually any location in the world from a myriad of technologically savvy devices. Internet users can keep up to date with world events, watch movies, listen to music, interact with government agencies, analyse business trends, undertake research and maintain contact with people anywhere. The Internet also provides the ability for users to shop ‘online’ with virtually any product or service supplier anywhere in the world. This has created concerns regarding the use of personal information obtained through the medium of the Internet. An individual’s right to privacy is a right enshrined in legislation and through tort law. With the uptake of technology and the burgeoning use of the Internet the subject of online privacy has become a complex issue for law and policy makers both in New Zealand and internationally. The aim of this paper is to look at the online shopper or consumer and how their information could be protected. This paper looks at the key areas of privacy legislation, the storage of data and the rise of new technologies including ‘cloud’ computing and suggests that the complexity of online privacy is such that a different approach to access and use of personal information of online shoppers may be required. The rate of technology change, the enormity of the data capture situation and the international accessibility of the Internet are all factors that create an almost impossible situation for ensuring consumer privacy so this paper proposes that the onus moves away from the law and policy makers and put into the hands of the users of the Internet.</p>


2021 ◽  
Vol 11 (16) ◽  
pp. 7738
Author(s):  
Kyounggon Kim ◽  
Faisal Abdulaziz Alfouzan ◽  
Huykang Kim

Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-attacks is gradually changing. Early cyber-attacks were usually conducted by curious personal hackers who used simple techniques to hack homepages and steal personal information. Lately, cyber attackers have started using sophisticated cyber-attack techniques that enable them to retrieve national confidential information beyond the theft of personal information or defacing websites. These sophisticated and advanced cyber-attacks can disrupt the critical infrastructures of a nation. Much research regarding cyber-attacks has been conducted; however, there has been a lack of research related to measuring cyber-attacks from the perspective of offensive cybersecurity. This motivated us to propose a methodology for quantifying cyber-attacks such that they are measurable rather than abstract. For this purpose, we identified each element of offensive cybersecurity used in cyber-attacks. We also investigated the extent to which the detailed techniques identified in the offensive cyber-security framework were used, by analyzing cyber-attacks. Based on these investigations, the complexity and intensity of cyber-attacks can be measured and quantified. We evaluated advanced persistent threats (APT) and fileless cyber-attacks that occurred between 2010 and 2020 based on the methodology we developed. Based on our research methodology, we expect that researchers will be able to measure future cyber-attacks.


Sign in / Sign up

Export Citation Format

Share Document