247,296 research outputs found

    Users' trust in information resources in the Web environment: a status report

    Get PDF
    This study has three aims; to provide an overview of the ways in which trust is either assessed or asserted in relation to the use and provision of resources in the Web environment for research and learning; to assess what solutions might be worth further investigation and whether establishing ways to assert trust in academic information resources could assist the development of information literacy; to help increase understanding of how perceptions of trust influence the behaviour of information users

    The onus on us? Stage one in developing an i-Trust model for our users.

    Get PDF
    This article describes a Joint Information Systems Committee (JISC)-funded project, conducted by a cross-disciplinary team, examining trust in information resources in the web environment employing a literature review and online Delphi study with follow-up community consultation. The project aimed to try to explain how users assess or assert trust in their use of resources in the web environment; to examine how perceptions of trust influence the behavior of information users; and to consider whether ways of asserting trust in information resources could assist the development of information literacy. A trust model was developed from the analysis of the literature and discussed in the consultation. Elements comprising the i-Trust model include external factors, internal factors and user's cognitive state. This article gives a brief overview of the JISC funded project which has now produced the i-Trust model (Pickard et. al. 2010) and focuses on issues of particular relevance for information providers and practitioners

    Asymptotically idempotent aggregation operators for trust management in multi-agent systems

    Get PDF
    The study of trust management in multi-agent system, especially distributed, has grown over the last years. Trust is a complex subject that has no general consensus in literature, but has emerged the importance of reasoning about it computationally. Reputation systems takes into consideration the history of an entity’s actions/behavior in order to compute trust, collecting and aggregating ratings from members in a community. In this scenario the aggregation problem becomes fundamental, in particular depending on the environment. In this paper we describe a technique based on a class of asymptotically idempotent aggregation operators, suitable particulary for distributed anonymous environments

    Psychological elements explaining the consumer's adoption and use of a website recommendation system: A theoretical framework proposal

    Get PDF
    The purpose of this paper is to understand, with an emphasis on the psychological perspective of the research problem, the consumer's adoption and use of a certain web site recommendation system as well as the main psychological outcomes involved. The approach takes the form of theoretical modelling. Findings: A conceptual model is proposed and discussed. A total of 20 research propositions are theoretically analyzed and justified. Research limitations/implications: The theoretical discussion developed here is not empirically validated. This represents an opportunity for future research. Practical implications: The ideas extracted from the discussion of the conceptual model should be a help for recommendation systems designers and web site managers, so that they may be more aware, when working with such systems, of the psychological process consumers undergo when interacting with them. In this regard, numerous practical reflections and suggestions are presented

    Trust-Building through Social Media Communications in Disaster Management

    Get PDF
    open4Social media provides a digital space – a meeting place, for different people, often representing one or more groups in a society. The use of this space during a disaster, especially where information needs are high and the availability of factually accurate and ethically sourced data is scarce, has increased substantially over the last 5-10 years. This paper attempts to address communication in social media and trust between the public and figures of authority during a natural disaster in order to suggest communication strategies that can enhance or reinforce trust between these bodies before, during and after a natural disaster.openM. G. Busà; M. T. Musacchio; S. Finan; C. FennelBusa', MARIA GRAZIA; Musacchio, MARIA TERESA; S., Finan; C., Fenne

    Trust beyond reputation: A computational trust model based on stereotypes

    Full text link
    Models of computational trust support users in taking decisions. They are commonly used to guide users' judgements in online auction sites; or to determine quality of contributions in Web 2.0 sites. However, most existing systems require historical information about the past behavior of the specific agent being judged. In contrast, in real life, to anticipate and to predict a stranger's actions in absence of the knowledge of such behavioral history, we often use our "instinct"- essentially stereotypes developed from our past interactions with other "similar" persons. In this paper, we propose StereoTrust, a computational trust model inspired by stereotypes as used in real-life. A stereotype contains certain features of agents and an expected outcome of the transaction. When facing a stranger, an agent derives its trust by aggregating stereotypes matching the stranger's profile. Since stereotypes are formed locally, recommendations stem from the trustor's own personal experiences and perspective. Historical behavioral information, when available, can be used to refine the analysis. According to our experiments using Epinions.com dataset, StereoTrust compares favorably with existing trust models that use different kinds of information and more complete historical information

    Whispers in the Classroom

    Get PDF
    Part of the Volume on Digital Young, Innovation, and the UnexpectedOnline backchannel chat rooms offer the potential to transform classroom learning in unexpected and powerful ways. However, the specific ways in which they can influence teaching pedagogy and learning opportunities are less well understood. Activities in a backchannel may include the dissemination of ideas, knowledge building, asking and answering questions, engaging in critical discourse, and sharing information and resources. This chapter describes a backchannel chat room that has taken place over multiple years in a large university student community. It explores unforeseen and exciting opportunities, as well as possible limitations, for designing teaching and learning practices to leverage this communication medium. With a deeper understanding of the opportunities and limitations of the backchannel, educators and instructional designers could transform the classroom experience from a passive lecture model to one of active, collaborative, and engaged knowledge production

    The mechanics of trust: a framework for research and design

    Get PDF
    With an increasing number of technologies supporting transactions over distance and replacing traditional forms of interaction, designing for trust in mediated interactions has become a key concern for researchers in human computer interaction (HCI). While much of this research focuses on increasing users’ trust, we present a framework that shifts the perspective towards factors that support trustworthy behavior. In a second step, we analyze how the presence of these factors can be signalled. We argue that it is essential to take a systemic perspective for enabling well-placed trust and trustworthy behavior in the long term. For our analysis we draw on relevant research from sociology, economics, and psychology, as well as HCI. We identify contextual properties (motivation based on temporal, social, and institutional embeddedness) and the actor's intrinsic properties (ability, and motivation based on internalized norms and benevolence) that form the basis of trustworthy behavior. Our analysis provides a frame of reference for the design of studies on trust in technology-mediated interactions, as well as a guide for identifying trust requirements in design processes. We demonstrate the application of the framework in three scenarios: call centre interactions, B2C e-commerce, and voice-enabled on-line gaming
    • …
    corecore