| 000 | 03370nam a22004458i 4500 | ||
|---|---|---|---|
| 001 | CR9781139828567 | ||
| 005 | 20250930143535.0 | ||
| 006 | m|||||o||d|||||||| | ||
| 007 | cr|||||||||||| | ||
| 008 | 121017s2014||||enk o ||1 0|eng|d | ||
| 020 | _a9781139828567 (ebook) | ||
| 020 | _z9781107038479 (hardback) | ||
| 040 |
_aUkCbUP _beng _erda _cUkCbUP |
||
| 050 | 0 | 0 |
_aQA76.9.C66 _bT78 2014 |
| 082 | 0 | 0 |
_a005.8 _223 |
| 245 | 0 | 0 |
_aTrust, computing, and society / _cedited by Richard H. R. Harper, Microsoft Research Cambridge. |
| 246 | 3 | _aTrust, Computing, & Society | |
| 264 | 1 |
_aCambridge : _bCambridge University Press, _c2014. |
|
| 300 |
_a1 online resource (xii, 362 pages) : _bdigital, PDF file(s). |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _aTitle from publisher's bibliographic system (viewed on 05 Oct 2015). | ||
| 505 | 8 | _aMachine generated contents note: 1. Introduction and overview R. Harper; Part I. The Topography of Trust and Computing: 2. The role of trust in cyberspace D. Clark; 3. The new face of the Internet T. Karagiannis; 4. Trust as a methodological tool in security engineering G. Danezis; Part II. Conceptual Points of View: 5. Computing and the search for trust T. Simpson; 6. The worry about trust O. Lagerspetz; 7. The inescapability of trust R. J. Anderson and W. Sharrock; 8. Trust in interpersonal interaction and cloud computing D. R. Watson; 9. Trust, social identity, and computation C. Ess; Part III. Trust in Design: 10. Design for trusted and trustworthy services A. Sasse and I. Kirlappos; 11. Dialogues: trust in design R. Banks; 12. Trusting oneself R. Harper and W. Odom; 13. Reflections on trust, computing and society R. Harper; Bibliography. | |
| 520 | _aThe internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust. | ||
| 650 | 0 |
_aComputers _xSocial aspects. |
|
| 650 | 0 |
_aInternet _xSocial aspects. |
|
| 650 | 0 | _aTrust. | |
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 |
_aComputer networks _xReliability. |
|
| 650 | 0 |
_aInformation technology _xSocial aspects. _960040 |
|
| 700 | 1 |
_aHarper, Richard, _d1960- _eeditor. |
|
| 776 | 0 | 8 |
_iPrint version: _z9781107038479 |
| 856 | 4 | 0 | _uhttps://doi.org/10.1017/CBO9781139828567 |
| 907 |
_a.b16844622 _b2020-12-22 _c2020-12-22 |
||
| 942 | _n0 | ||
| 998 |
_a1 _b2020-12-22 _cm _da _feng _genk _y0 _z.b16844622 |
||
| 999 |
_c651805 _d651805 |
||