National Science Library of Georgia

Image from Google Jackets

Trust, computing, and society / edited by Richard H. R. Harper, Microsoft Research Cambridge.

Contributor(s): Material type: TextTextPublisher: Cambridge : Cambridge University Press, 2014Description: 1 online resource (xii, 362 pages) : digital, PDF file(s)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781139828567 (ebook)
Other title:
  • Trust, Computing, & Society
Subject(s): Additional physical formats: Print version: : No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.C66 T78 2014
Online resources:
Contents:
Machine generated contents note: 1. Introduction and overview R. Harper; Part I. The Topography of Trust and Computing: 2. The role of trust in cyberspace D. Clark; 3. The new face of the Internet T. Karagiannis; 4. Trust as a methodological tool in security engineering G. Danezis; Part II. Conceptual Points of View: 5. Computing and the search for trust T. Simpson; 6. The worry about trust O. Lagerspetz; 7. The inescapability of trust R. J. Anderson and W. Sharrock; 8. Trust in interpersonal interaction and cloud computing D. R. Watson; 9. Trust, social identity, and computation C. Ess; Part III. Trust in Design: 10. Design for trusted and trustworthy services A. Sasse and I. Kirlappos; 11. Dialogues: trust in design R. Banks; 12. Trusting oneself R. Harper and W. Odom; 13. Reflections on trust, computing and society R. Harper; Bibliography.
Summary: The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Title from publisher's bibliographic system (viewed on 05 Oct 2015).

Machine generated contents note: 1. Introduction and overview R. Harper; Part I. The Topography of Trust and Computing: 2. The role of trust in cyberspace D. Clark; 3. The new face of the Internet T. Karagiannis; 4. Trust as a methodological tool in security engineering G. Danezis; Part II. Conceptual Points of View: 5. Computing and the search for trust T. Simpson; 6. The worry about trust O. Lagerspetz; 7. The inescapability of trust R. J. Anderson and W. Sharrock; 8. Trust in interpersonal interaction and cloud computing D. R. Watson; 9. Trust, social identity, and computation C. Ess; Part III. Trust in Design: 10. Design for trusted and trustworthy services A. Sasse and I. Kirlappos; 11. Dialogues: trust in design R. Banks; 12. Trusting oneself R. Harper and W. Odom; 13. Reflections on trust, computing and society R. Harper; Bibliography.

The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust.

There are no comments on this title.

to post a comment.
Copyright © 2023 Sciencelib.ge All rights reserved.