77,905 research outputs found

    The mechanics of trust: a framework for research and design

    Get PDF
    With an increasing number of technologies supporting transactions over distance and replacing traditional forms of interaction, designing for trust in mediated interactions has become a key concern for researchers in human computer interaction (HCI). While much of this research focuses on increasing users’ trust, we present a framework that shifts the perspective towards factors that support trustworthy behavior. In a second step, we analyze how the presence of these factors can be signalled. We argue that it is essential to take a systemic perspective for enabling well-placed trust and trustworthy behavior in the long term. For our analysis we draw on relevant research from sociology, economics, and psychology, as well as HCI. We identify contextual properties (motivation based on temporal, social, and institutional embeddedness) and the actor's intrinsic properties (ability, and motivation based on internalized norms and benevolence) that form the basis of trustworthy behavior. Our analysis provides a frame of reference for the design of studies on trust in technology-mediated interactions, as well as a guide for identifying trust requirements in design processes. We demonstrate the application of the framework in three scenarios: call centre interactions, B2C e-commerce, and voice-enabled on-line gaming

    Watching You: Systematic Federal Surveillance of Ordinary Americans

    Get PDF
    To combat terrorism, Attorney General John Ashcroft has asked Congress to "enhance" the government's ability to conduct domestic surveillance of citizens. The Justice Department's legislative proposals would give federal law enforcement agents new access to personal information contained in business and school records. Before acting on those legislative proposals, lawmakers should pause to consider the extent to which the lives of ordinary Americans already are monitored by the federal government. Over the years, the federal government has instituted a variety of data collection programs that compel the production, retention, and dissemination of personal information about every American citizen. Linked through an individual's Social Security number, these labor, medical, education and financial databases now empower the federal government to obtain a detailed portrait of any person: the checks he writes, the types of causes he supports, and what he says "privately" to his doctor. Despite widespread public concern about preserving privacy, these data collection systems have been enacted in the name of "reducing fraud" and "promoting efficiency" in various government programs. Having exposed most areas of American life to ongoing government scrutiny and recording, Congress is now poised to expand and universalize federal tracking of citizen life. The inevitable consequence of such constant surveillance, however, is metastasizing government control over society. If that happens, our government will have perverted its most fundamental mission and destroyed the privacy and liberty that it was supposed to protect

    A New Era in American Health Care: Realizing the Potential of Reform

    Get PDF
    Illustrates features of the 2010 Patient Protection and Affordable Care Act, the beneficiaries of reform, changes to the healthcare system, and implementation challenges and long-term concerns. Includes current data on insurance status and access to care

    Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration

    Full text link
    We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity. We also provide an overview of the two most widely used commodity security protocols, IPsec and TLS. Pursuing a key exchange model, we propose how QKD could be integrated into these security applications. For such a QKD integration we propose a support layer that provides a set of common QKD services between the QKD protocol and the security applicationsComment: 12Page

    Let Your CyberAlter Ego Share Information and Manage Spam

    Full text link
    Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of billions of dollars everyday, and until recently, has gone largely unexplored. Empirically, the cyberspace social networks have been found to possess many of the same complex features that characterize its real counterparts, including scale-free degree distributions, low diameter, and extensive connectivity. We show that these topological features make the latent networks particularly suitable for explorations and management via local-only messaging protocols. {\em Cyber}alter egos can communicate via their direct links (i.e., using only their own address books) and set up a highly decentralized and scalable message passing network that can allow large-scale sharing of information and data. As one particular example of such collaborative systems, we provide a design of a spam filtering system, and our large-scale simulations show that the system achieves a spam detection rate close to 100%, while the false positive rate is kept around zero. This system has several advantages over other recent proposals (i) It uses an already existing network, created by the same social dynamics that govern our daily lives, and no dedicated peer-to-peer (P2P) systems or centralized server-based systems need be constructed; (ii) It utilizes a percolation search algorithm that makes the query-generated traffic scalable; (iii) The network has a built in trust system (just as in social networks) that can be used to thwart malicious attacks; iv) It can be implemented right now as a plugin to popular email programs, such as MS Outlook, Eudora, and Sendmail.Comment: 13 pages, 10 figure

    The Role of Middle Range Publications in the Development of Engineering Knowledge

    Get PDF
    This paper explores the role of publications in the development of engineering knowledge. Previous studies of scientific and technical publications tend to assume that engineers are like scientists in their use of scientific journals as a means of communicating new technical knowledge. But science differs from technology and we should not expect scientists and engineers to use the same sources of knowledge. We contend that previous studies of publications have been flawed because they ignore other forms of publication more suited to the communication of technical and engineering knowledge. This paper argues that technologists use "middle range" publications to exchange knowledge and explore implications of their technological experiences. By providing more visual images, experience-based reports and background information on technologies and products, middle range publications better reflect the ways in which engineers think and work. They allow for visual conversations and support visual communities. The paper provides a detailed exploration of the role of middle range publications and suggests a framework for future research on patterns of publication by technologists and engineers.engineering knowledge, engineering and design organisations, construction, scientific publications, technical publications, innovation studies

    SMILE: the creation of space for interaction through blended digital technology

    Get PDF
    Interactive Learning Environments at Sussex University is a course in which students are given mobile devices (XDAs) with PDA functionality and full Internet access for the duration of the term. They are challenged to design and evaluate learning experiences, both running and evaluating learning sessions that involve a blend of technologies. Data on technology usage was collected via backups, email and web-site logging as well as video and still photography of student-led sessions. Initial analysis indicates that large amounts of technical support, solid pedagogical underpinning and a flexible approach to both delivery context and medium are essential. The project operated under the acronym SMILE – Sussex Mobile Interactive Learning Environment
    corecore