Users and trust in cyberspace

Pekka Nikander, Kristiina Karvonen

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    15 Citations (Scopus)

    Abstract

    The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related question of the generic trust assumptions, which underlie the settings where the protocols are run, has received less attention. Furthermore, the notion of trust, as it is typically defined, has more been based on the formal model used than the real user requirements posed by the application context and the actual people using the system. In this paper, we approach that problem from the users’ point of view. We briefly describe what are the psychological bases on which typical people build their trust assumptions on, and consider how these are reflected in a typical e-commerce setting today. Given this background, we proceed to contemplate how the systems could be made more trustworthy by explicitly representing the trust assumptions and requirements, and how these digital expressions of trust could be instrumented to and integrated with actual authentication protocols. Thus, our aim is to broaden the view from a protocol centric approach towards considering the actual users, and to provide some initial requirements for future operating systems and user interface design.

    Original languageEnglish
    Title of host publicationSecurity Protocols - 8th International Workshop, Revised Papers
    PublisherSpringer Verlag
    Pages24-35
    Number of pages12
    ISBN (Print)3540425667, 9783540425663
    Publication statusPublished - 1 Jan 2001
    MoE publication typeA4 Article in a conference publication
    EventInternational Workshop on Security Protocols - Cambridge, United Kingdom
    Duration: 3 Apr 20005 Apr 2000
    Conference number: 8

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume2133
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Workshop

    WorkshopInternational Workshop on Security Protocols
    CountryUnited Kingdom
    CityCambridge
    Period03/04/200005/04/2000

    Fingerprint Dive into the research topics of 'Users and trust in cyberspace'. Together they form a unique fingerprint.

  • Cite this

    Nikander, P., & Karvonen, K. (2001). Users and trust in cyberspace. In Security Protocols - 8th International Workshop, Revised Papers (pp. 24-35). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2133). Springer Verlag.