46 research outputs found

    A calculus for distrust and mistrust

    Get PDF
    Properties of trust are becoming widely studied in several applications within the computational domain. On the contrary, negative trust attribution is less well-defined and related issues are yet to be approached and resolved. We present a natural deduction calculus for trust protocols and its negative forms, distrust and mistrust. The calculus deals efficiently with forms of trust transitivity and negative trust multiplication and we briefly illustrate some possible applications

    A calculus for distrust and mistrust

    Get PDF
    Properties of trust are becoming widely studied in several applications within the computational domain. On the contrary, negative trust attribution is less well-defined and related issues are yet to be approached and resolved. We present a natural deduction calculus for trust protocols and its negative forms, distrust and mistrust. The calculus deals efficiently with forms of trust transitivity and negative trust multiplication and we briefly illustrate some possible applications

    Contradictory information flow in networks with trust and distrust

    Get PDF
    We offer a proof system and a NetLogo simulation for trust and distrust in networks where contradictory information is shared by ranked lazy and sceptic agents. Trust and its negative are defined as properties of edges: the former is required when a message is passed bottom-up in the hierarchy or received by a sceptic agent; the latter is attributed to channels that require contradiction resolution, or whose terminal is a lazy agent. These procedures are associated with epistemic costs, respectively for confirmation and refutation. We describe the logic, illustrate the algorithms implemented in the model and then focus on experimental results concerning the analysis of epistemic costs, the role of the agents’ epistemic attitude on distrust distribution and the influence of (dis)trust in reaching consensus

    Contradictory information flow in networks with trust and distrust

    Get PDF
    We offer a proof system and a NetLogo simulation for trust and distrust in networks where contradictory information is shared by ranked lazy and sceptic agents. Trust and its negative are defined as properties of edges: the former is required when a message is passed bottom-up in the hierarchy or received by a sceptic agent; the latter is attributed to channels that require contradiction resolution, or whose terminal is a lazy agent. These procedures are associated with epistemic costs, respectively for confirmation and refutation. We describe the logic, illustrate the algorithms implemented in the model and then focus on experimental results concerning the analysis of epistemic costs, the role of the agents’ epistemic attitude on distrust distribution and the influence of (dis)trust in reaching consensus

    Managing software uninstall with negative trust

    Get PDF
    A problematic aspect of software management systems in view of integrity preservation is the handling, approval, tracking and eventual execution of change requests. In the context of the relation between clients and repositories, trust can help identifying all packages required by the intended installation. Negative trust, in turn, can be used to approach the complementary problem induced by removing packages. In this paper we offer a logic for negative trust which allows to identify admissible and no-longer admissible software packages in the current installation profile in view of uninstall processes. We provide a simple working example and the system is formally verified using the Coq theorem prover

    A Conceptual Examination of Distrusting Beliefs in Older Adults about the Internet

    Get PDF
    Older adults are adopting the Internet in increasing numbers today. At the same time they are also experiencing uncertainties about their safety and information privacy on this medium. Several media reports have shown a rising number of incidents involving older Internet user, that indicate lack of awareness of Internet-related security and privacy issues. This conceptual paper provides a framework to help understand the reasons why older adults might distrust the commercial websites in general. Based on established theoretical frameworks about trust, distrust and aging-based technology adoption challenges, we develop several postulates to explain distrusting beliefs that can result in precautious Internet behavior. Implications of this framework will be found in building educational programs and interventions for the population over the age of 55

    Managing software uninstall with negative trust

    Get PDF
    A problematic aspect of software management systems in view of integrity preservation is the handling, approval, tracking and eventual execution of change requests. In the context of the relation between clients and repositories, trust can help identifying all packages required by the intended installation. Negative trust, in turn, can be used to approach the complementary problem induced by removing packages. In this paper we offer a logic for negative trust which allows to identify admissible and no-longer admissible software packages in the current installation profile in view of uninstall processes. We provide a simple working example and the system is formally verified using the Coq theorem prover

    Do You Need to Travel? Mapping Face-to-Face Communication Objectives to Technology Affordances

    Get PDF
    Computer-mediated communications (CMC) can be used as a substitute for face-to-face (FtF) meetings but their effectiveness is highly context dependent. This paper describes a theoretical framework and initial experimental design for characterizing a travel replacement threshold. This effort begins with a use case of remote engineering maintenance training, conducted in three conditions: side-by-side (physically proximate), teleconference (using off-the-shelf software), and a custom VR/AR system designed to provide the apprentice with a virtual view of both the instructor’s larger scale lab and smaller scale workbench. The research hypotheses, experimental protocol, and dependent measures are described. The task involves an instructor demonstrating a circuit board troubleshooting task to a remote apprentice. The apprentice then completes the trained task independently, and performance and subject preferences are compared across conditions. The details of this paper, the result of extensive literature review and winnowing of variables, may assist researchers exploring CMC, training, or social communication

    Consumers’ Factors on eWOM Diffusion in Social Networking Services (SNS)

    Get PDF
    This present study seeks to uncover personal factors of social networking services (SNS) users’ on eWOM diffusion in SNS through review of previous studies. This paper also aims to build a conceptual theory based on these findings and create a path for further studies and empirical research in the future.  Literature from technology acceptance fields and social sciences were examined on eWOM diffusion via four levels of self-factors in individuals.  The issues of level of trust, personal eWom experience, and self-efficacy are discussed in the prediction of eWOM, while different personalities are predicted to have different outcomes in eWOM diffusion.  The insights of personal factors influence in eWOM would enhance consumers’ ability to understand further how to navigate positive and negative perspectives of personal factors and act to use this discovery to assist own decision making. Keywords: eWOM, SNS, self-efficacy, eWOM experience trust, personality

    Identify the Antecedents of Distrust in a Website

    Get PDF
    It has been widely accepted that distrust is qualitatively different from trust. Yet scholarly knowledge about the antecedents of distrust is scarce, while the antecedents of trust have received extensive attention. Furthermore, little empirical research has explored how website factors impact on the formation of distrust in a user. Drawing upon the review of distrust literature and competence-motive perception, we propose a new theoretical framework to explain how website factors impact on perceptions of the attributes of a given website, which in turn form user distrust. In this research, distrust is triggered by website evaluations in two areas, namely malevolence and incompetence. These two attributes are determined by three website factors: lack of structural assurance, interface design, and lack of third-party recognition. The proposed research model of distrust formation in the online context is verified by an online survey with 283 valid responses. We offer theoretical and practical implications for our findings
    corecore