Academic literature on the topic 'Trust and ethics of computer systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trust and ethics of computer systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Trust and ethics of computer systems"
Ruotsalainen, Pekka, and Bernd Blobel. "Health Information Systems in the Digital Health Ecosystem—Problems and Solutions for Ethics, Trust and Privacy." International Journal of Environmental Research and Public Health 17, no. 9 (April 26, 2020): 3006. http://dx.doi.org/10.3390/ijerph17093006.
Full textZong, Jonathan, and J. Nathan Matias. "Bartleby: Procedural and Substantive Ethics in the Design of Research Ethics Systems." Social Media + Society 8, no. 1 (January 2022): 205630512210770. http://dx.doi.org/10.1177/20563051221077021.
Full textAhamed, A. F. M. Jalal, and Long Pham. "Online Retailer Reputation, Satisfaction, and Trust as Catalysts in the Consumer Perceptions of Ethics on Online Retailers and Repurchase Intention." International Journal of E-Adoption 13, no. 2 (July 2021): 1–18. http://dx.doi.org/10.4018/ijea.2021070101.
Full textBag, Surajit, Gautam Srivastava, Shivam Gupta, and Saito Taiga. "Diffusion of Big Data Analytics Innovation in Managing Natural Resources in the African Mining Industry." Journal of Global Information Management 30, no. 6 (September 2022): 1–21. http://dx.doi.org/10.4018/jgim.297074.
Full textHariguna, Taqwa, Ade Maharini Adiandari, and Athapol Ruangkanjanases. "Assessing customer intention use of mobile money application and the antecedent of perceived value, economic trust and service trust." International Journal of Web Information Systems 16, no. 3 (February 22, 2020): 331–45. http://dx.doi.org/10.1108/ijwis-12-2019-0055.
Full textHamidi, Hodjat, and Saba Moradi. "Analysis of Consideration of Security Parameters by Vendors on Trust and Customer Satisfaction in E-Commerce." Journal of Global Information Management 25, no. 4 (October 2017): 32–45. http://dx.doi.org/10.4018/jgim.2017100103.
Full textKidd, John, Frank-jürgen Richter, and Marielle Stumm. "Learning and trust in supply chain management: Disintermediation, ethics and cultural pressures in brief dynamic alliances." International Journal of Logistics Research and Applications 6, no. 4 (December 2003): 259–75. http://dx.doi.org/10.1080/13675560310001626972.
Full textDíaz Nafría, José María. "The Need for an Informational Systems Approach to Security." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 1 (March 17, 2011): 93–122. http://dx.doi.org/10.31269/vol9iss1pp93-122.
Full textCarros, Felix, Tobias Störzinger, Anne Wierling, Adrian Preussner, and Peter Tolmie. "Ethical, Legal & Participatory Concerns in the Development of Human-Robot Interaction." i-com 21, no. 2 (July 19, 2022): 299–309. http://dx.doi.org/10.1515/icom-2022-0025.
Full textFournier-Tombs, Eleonore. "Towards a United Nations Internal Regulation for Artificial Intelligence." Big Data & Society 8, no. 2 (July 2021): 205395172110394. http://dx.doi.org/10.1177/20539517211039493.
Full textDissertations / Theses on the topic "Trust and ethics of computer systems"
Van, Wyk Byron Jay. "E-trust: a building block for developing valuable online platforms in Higher Education." Thesis, Cape Peninsula University of Technology, 2013. http://hdl.handle.net/20.500.11838/1852.
Full textThe aim of this research project was to provide an answer to the question: “How can an understanding of online trust be used to build valuable online applications in Higher Education?” In order to present an answer to this question, a literature survey was conducted to establish: • An understanding of the phenomenon of online trust • What the factors are that influence a loss of trust in the online environment The literature survey highlighted several factors that influence a loss of trust in the online environment, called trust cues. These factors, however, were often tested within the E-commerce environment, and not in organization-specific contexts, such as online platforms in use in Higher Education. In order to determine whether or not these factors would influence the development of trust in context-specific environments, the author of this research grouped the indentified trust factors into three focus areas, i.e. content, ease of use, and navigation. These factors were then incorporated into a series of nine different prototypes. These prototypes were different versions of a particular online platform currently in use at the Cape Peninsula University of Technology (CPUT). The prototypes were tested over a three week period, with certain staff members at the institution in question recruited as test participants. During each week of user observations, a different focus area was targeted, in order to establish the impact that it would have on the perceived trustworthiness of the platform in question. User observations were conducted while test participants completed a standard process using the various prototypes. Semi-structured interviews were also conducted while participants completed the specific process. Participants were asked to evaluate each screen in the process according to its perceived trust worthiness, by assigning a trust level score. At the completion of the three rounds of user observations, in-depth interviews were conducted with test participants. The participants’ trust level scores for each prototype were captured and graphed. A detailed description for the score given for a particular screen was presented on each graph. These scores were combined to provide an analysis of the focus area tested during the specific round. After the three rounds of user observations were completed, an analysis of all the trust factors tested were done. Data captured during interviews were transcribed, combined with feedback received from questionnaires, and analysed. An interpretation of the results showed that not all trust factors had a similar influence in the development of trust in the online platform under investigation. Trust cues such as content organization, clear instructions and useful content were by far the most significant trust factors, while others such as good visual design elements, professional images of products, and freedom from grammatical and typographical errors had little or no impact in the overall trustworthiness of the platform under investigation. From the analysis done it was clear that the development of trust in organization-specific contexts is significantly different than developing trust in an E-commerce environment and that factors that influence the development of trust in one context might not always be significant in another. In conclusion, it is recommended that when software applications are developed in organization-specific contexts, such as Higher Education, that trust factors such as good content organization, clear instructions and useful content be considered as the most salient. Organization-specific contexts differ quite significantly in that the users of these systems often convey a certain degree of trust toward the online platforms that they work with on a daily basis. Trust factors that are geared toward developing an initial or basic trust in a particular platform, which is often the case with first time users engaging in an E-commerce platform, would therefore not be as significant in the development of a more developed level of trust, which is what is needed within the development of organization-specific online platforms.
Grizzard, Julian B. "Towards Self-Healing Systems: Re-establishing Trust in Compromised Systems." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-04072006-133056/.
Full textSchwan, Karsten, Committee Member ; Schimmel, David, Committee Member ; Copeland, John, Committee Member ; Owen, Henry, Committee Chair ; Wills, Linda, Committee Member.
Zhao, Weiliang. "Trust in distributed information systems." View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/35454.
Full textA thesis presented to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics, in fulfilment of the requirements for the degree of Doctor of Philosophy. Includes bibliographies.
Lu, Gehao. "Neural trust model for multi-agent systems." Thesis, University of Huddersfield, 2011. http://eprints.hud.ac.uk/id/eprint/17817/.
Full textChan, Fuk Wing Thomas. "Preserving trust across multiple sessions in open systems /." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd497.pdf.
Full textRaval, Maharsh, and Rajkiran Sunkireddy. "Hardware Root of Trust on IoT Gateway." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40120.
Full textHuynh, Trung Dong. "Trust and reputation in open multi-agent systems." Thesis, University of Southampton, 2006. https://eprints.soton.ac.uk/262759/.
Full textMaiden, Wendy Marie. "Dualtrust a trust management model for swarm-based autonomic computing systems /." Pullman, Wash. : Washington State University, 2010. http://www.dissertations.wsu.edu/Thesis/Spring2010/W_Maiden_6041310.pdf.
Full textTitle from PDF title page (viewed on May 3, 2010). "Department of Electrical Engineering and Computer Science." Includes bibliographical references (p. 110-117).
Lebedev, Ilia Andreevich. "Trust less : shrinking the trusted parts of trusted systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/128315.
Full textCataloged from PDF of thesis.
Includes bibliographical references (pages 213-227).
Modern computers, industrial control systems, and other automation are broadly vulnerable as a result of decades of systemic forces that have prioritized cost and performance over security. Computers across the board face a crisis in the form of motivated software adversaries with access to our imperfect and enormously complex software. Considering these weaknesses, trust in modern computing systems is often not well-placed. Looking ahead to a shift in our collective priorities, this thesis is centered around a rigorous discussion of hardware-assisted isolation and enclaves -- authenticated software modules -- as a means to drastically reduce the complexity of trusted systems. By allowing trustworthy enclaved software to co-exist with, but remain strongly isolated from, existing software, we enable a gentle transition toward trustworthy systems. Specifically, this thesis refines formal definitions of enclaved execution and threat model via a series of hardware and software co-designs. These case studies explore enclave processors with small trusted computing bases spanning a gradient from an embedded SoC to a modern high-performance processor. This work is complementary to, and enables more effective application of, many powerful ideas such as information flow control, formal verification, multi-party computation, and other tools for trustworthy computing.
by Ilia Andreevich Lebedev.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Chan, Fuk-Wing Thomas. "Preserving Trust Across Multiple Sessions in Open Systems." BYU ScholarsArchive, 2004. https://scholarsarchive.byu.edu/etd/137.
Full textBooks on the topic "Trust and ethics of computer systems"
Chris, Cornelis, de Cock Martine, and SpringerLink (Online service), eds. Trust Networks for Recommender Systems. Paris: Atlantis Press, 2011.
Find full textJennifer, Golbeck, ed. Computing with social trust. London: Springer, 2009.
Find full textAccess control systems: Security, identity, management, and trust models. New York: Springer, 2005.
Find full textWierzbicki, Adam. Trust and Fairness in Open, Distributed Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.
Find full textM, McCune Jonathan, Perrig Adrian, and SpringerLink (Online service), eds. Bootstrapping Trust in Modern Computers. New York, NY: The Author(s), 2011.
Find full textAcquisti, Alessandro. Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Find full textEdgar, Weippl, Camp L. Jean, Volkamer Melanie, Reiter Mike, Zhang Xinwen, and SpringerLink (Online service), eds. Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textHuth, Michael. Trust and Trustworthy Computing: 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textCliff, Wang, and SpringerLink (Online service), eds. Introduction to Hardware Security and Trust. New York, NY: Springer Science+Business Media, LLC, 2012.
Find full textM, McCune Jonathan, ed. Trust and trustworthy computing: 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings. Heidelberg, Germany: Springer-Verlag, 2011.
Find full textBook chapters on the topic "Trust and ethics of computer systems"
Kirchebner, Tobias, Stephan Schlögl, Erin Bass, and Thomas Dilger. "Investigating Trust in Expert System Advice for Business Ethics Audits." In Communications in Computer and Information Science, 316–28. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81635-3_26.
Full textMassa, Paolo, and Paolo Avesani. "Trust Metrics in Recommender Systems." In Human–Computer Interaction Series, 259–85. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84800-356-9_10.
Full textKwan, Ming, and Deepak Ramachandran. "Trust and Online Reputation Systems." In Human–Computer Interaction Series, 287–311. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84800-356-9_11.
Full textTweedale, Jeffrey, and Philip Cutler. "Trust in Multi-Agent Systems." In Lecture Notes in Computer Science, 479–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11893004_62.
Full textBartneck, Christoph, Christoph Lütge, Alan Wagner, and Sean Welsh. "Trust and Fairness in AI Systems." In An Introduction to Ethics in Robotics and AI, 27–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51110-4_4.
Full textda Costa, Gonçalo Jorge Morais, Mary Prior, and Simon Rogerson. "Organizational Knowledge: Ethics and the Importance of Trust." In Communications in Computer and Information Science, 295–304. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16419-4_30.
Full textRozenfeld, Ola, and Moshe Tennenholtz. "Consistent Continuous Trust-Based Recommendation Systems." In Lecture Notes in Computer Science, 113–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10841-9_12.
Full textLai, Woodas W. K., Kam-Wing Ng, and Michael R. Lyu. "Integrating Trust in Grid Computing Systems." In Lecture Notes in Computer Science, 887–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30208-7_130.
Full textYau, Stephen S. "Managing Trust in Distributed Agent Systems." In Lecture Notes in Computer Science, 17–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11839569_2.
Full textBecker, Moritz Y., and Masoud Koleini. "Opacity Analysis in Trust Management Systems." In Lecture Notes in Computer Science, 229–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24861-0_16.
Full textConference papers on the topic "Trust and ethics of computer systems"
Kane, Bridget, and Saturnino Luz. "Trust, Ethics and Access: Challenges in Studying the Work of Multi-disciplinary Medical Teams." In 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS). IEEE, 2017. http://dx.doi.org/10.1109/cbms.2017.150.
Full textLibin, Alexander V. "Integrated disciplines and future competencies: A blueprint for ethically aligned curriculum for IT, CS, ITC & beyond." In Sixth International Conference on Higher Education Advances. Valencia: Universitat Politècnica de València, 2020. http://dx.doi.org/10.4995/head20.2020.11241.
Full textO'Grady, Katherine L., Steven D. Harbour, Ashlie R. Abballe, and Kelly Cohen. "Trust, Ethics, Consciousness, and Artificial Intelligence." In 2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC). IEEE, 2022. http://dx.doi.org/10.1109/dasc55683.2022.9925874.
Full text"What does it mean to trust AI systems?" In Fourth International Conference on Robot Ethics and Standards. CLAWAR Association Ltd., 2019. http://dx.doi.org/10.13180/icres.2019.29-30.07.p04.
Full textSchmitt, Anuschka. "Examining Trust in Conversational Systems: Conceptual and Empirical Findings on User Trust, Related Behavior, and System Trustworthiness." In AIES '22: AAAI/ACM Conference on AI, Ethics, and Society. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3514094.3539525.
Full textLim, Hock Chuan, Rob Stocker, and Henry Larkin. "Review of Trust and Machine Ethics Research: Towards A Bio-Inspired Computational Model of Ethical Trust (CMET)." In 3d International ICST Conference on Bio-Inspired Models of Network, Information, and Computing Systems. ICST, 2008. http://dx.doi.org/10.4108/icst.bionetics2008.4728.
Full textEma, Arisa, Katsue Nagakura, and Takanori Fujita. "Proposal for Type Classification for Building Trust in Medical Artificial Intelligence Systems." In AIES '20: AAAI/ACM Conference on AI, Ethics, and Society. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3375627.3375846.
Full textWu, Zhili, Xueli Yu, and Jingyu Sun. "An Improved Trust Metric for Trust-Aware Recommender Systems." In 2009 First International Workshop on Education Technology and Computer Science. IEEE, 2009. http://dx.doi.org/10.1109/etcs.2009.215.
Full textAboBakr, Ahmed, and Marianne A. Azer. "IoT ethics challenges and legal issues." In 2017 12th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2017. http://dx.doi.org/10.1109/icces.2017.8275309.
Full textBaarslag, Tim, Michael Kaisers, Enrico H. Gerding, Catholijn M. Jonker, and Jonathan Gratch. "When Will Negotiation Agents Be Able to Represent Us? The Challenges and Opportunities for Autonomous Negotiators." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/653.
Full textReports on the topic "Trust and ethics of computer systems"
Lewis, Dustin, ed. A Compilation of Materials Apparently Reflective of States’ Views on International Legal Issues pertaining to the Use of Algorithmic and Data-reliant Socio-technical Systems in Armed Conflict. Harvard Law School Program on International Law and Armed Conflict, December 2020. http://dx.doi.org/10.54813/cawz3627.
Full text