Academic literature on the topic 'Trust and ethics of computer systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trust and ethics of computer systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Trust and ethics of computer systems"

1

Ruotsalainen, Pekka, and Bernd Blobel. "Health Information Systems in the Digital Health Ecosystem—Problems and Solutions for Ethics, Trust and Privacy." International Journal of Environmental Research and Public Health 17, no. 9 (April 26, 2020): 3006. http://dx.doi.org/10.3390/ijerph17093006.

Full text
Abstract:
Digital health information systems (DHIS) are increasingly members of ecosystems, collecting, using and sharing a huge amount of personal health information (PHI), frequently without control and authorization through the data subject. From the data subject’s perspective, there is frequently no guarantee and therefore no trust that PHI is processed ethically in Digital Health Ecosystems. This results in new ethical, privacy and trust challenges to be solved. The authors’ objective is to find a combination of ethical principles, privacy and trust models, together enabling design, implementation of DHIS acting ethically, being trustworthy, and supporting the user’s privacy needs. Research published in journals, conference proceedings, and standards documents is analyzed from the viewpoint of ethics, privacy and trust. In that context, systems theory and systems engineering approaches together with heuristic analysis are deployed. The ethical model proposed is a combination of consequentialism, professional medical ethics and utilitarianism. Privacy enforcement can be facilitated by defining it as health information specific contextual intellectual property right, where a service user can express their own privacy needs using computer-understandable policies. Thereby, privacy as a dynamic, indeterminate concept, and computational trust, deploys linguistic values and fuzzy mathematics. The proposed solution, combining ethical principles, privacy as intellectual property and computational trust models, shows a new way to achieve ethically acceptable, trustworthy and privacy-enabling DHIS and Digital Health Ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
2

Zong, Jonathan, and J. Nathan Matias. "Bartleby: Procedural and Substantive Ethics in the Design of Research Ethics Systems." Social Media + Society 8, no. 1 (January 2022): 205630512210770. http://dx.doi.org/10.1177/20563051221077021.

Full text
Abstract:
The lack of consent or debriefing in online research has attracted widespread public distrust. How can designers create systems to earn and maintain public trust in large-scale online research? Procedural theories inform processes that enable individuals to make decisions about their participation. Substantive theories focus on the normative judgments that researchers and participants make about specific studies in context. Informed by these theories, we designed Bartleby, a system for debriefing participants and eliciting their views about studies that involved them. We evaluated this system by using it to debrief thousands of participants in a series of observational and experimental studies on Twitter and Reddit. We find that Bartleby addresses procedural concerns by creating new opportunities for study participants to exercise autonomy. We also find that participants use Bartleby to contribute to substantive, value-driven conversations about participant voice and power. We conclude with a critical reflection on the strengths and limitations of reusable software to satisfy values from both procedural and substantive ethical theories.
APA, Harvard, Vancouver, ISO, and other styles
3

Ahamed, A. F. M. Jalal, and Long Pham. "Online Retailer Reputation, Satisfaction, and Trust as Catalysts in the Consumer Perceptions of Ethics on Online Retailers and Repurchase Intention." International Journal of E-Adoption 13, no. 2 (July 2021): 1–18. http://dx.doi.org/10.4018/ijea.2021070101.

Full text
Abstract:
This research investigates the effect of consumer perceptions regarding the ethics of online retailers (CPEOR) on repurchase intention through reputation, satisfaction, and trust. The authors performed structural equation model analysis with SmartPLS on a sample of 458 responses collected from Vietnamese consumers. They found that CPEOR has a significant positive effect on reputation, satisfaction, and trust. As expected, trust and satisfaction directly predict repurchase intention; however, reputation does not directly follow this pattern. Instead, two prosocial constructs, namely trust and satisfaction, channel the effect of reputation on repurchase intention. Contrary to the conventional understanding that a favourable reputation will predict higher consumer trust, they found a negative correlation between these two factors. The managerial and theoretical contributions of the research and direction for future research are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
4

Bag, Surajit, Gautam Srivastava, Shivam Gupta, and Saito Taiga. "Diffusion of Big Data Analytics Innovation in Managing Natural Resources in the African Mining Industry." Journal of Global Information Management 30, no. 6 (September 2022): 1–21. http://dx.doi.org/10.4018/jgim.297074.

Full text
Abstract:
The study draws upon the ethical theory of organizing to elucidate the links between ethical climate antecedents, organizational practices, and consequences. We also integrated organizing vision theory to examine the influence of diffusion of big data analytics innovation on sustainable business practices. The results indicate that organizational trust has a significant positive impact on ethics training and ethics audit, which is critical to South Africa's mining industry. Furthermore, the results indicate that ethical leadership is positively related to ethics training and ethics audits. Findings show that ethics training and ethics audit is positively related to sustainable business practices. Findings indicate that the vision constructed by community members is positively related to the diffusion of big data analytics innovation. We also found that the diffusion of big data analytics innovation is positively related to sustainable business practices. Lastly, findings show that sustainable business practices are positively related to firm performance.
APA, Harvard, Vancouver, ISO, and other styles
5

Hariguna, Taqwa, Ade Maharini Adiandari, and Athapol Ruangkanjanases. "Assessing customer intention use of mobile money application and the antecedent of perceived value, economic trust and service trust." International Journal of Web Information Systems 16, no. 3 (February 22, 2020): 331–45. http://dx.doi.org/10.1108/ijwis-12-2019-0055.

Full text
Abstract:
Purpose The purpose of this study is to examine the role of trust and perceived value (PV) in customer intentions to adopt mobile money application (MMA) services. Trust and PV were broken down into various dimensions. This study investigated the two-component base trusts, namely, economic and service, and also PV as an antecedent. Design/methodology/approach This study involved 402 respondents selected through the interception and online survey approach and had five hypotheses. The structural equation model was used to test the hypothesis of this study. Findings The findings showed that the PV was related to the customer’s intention to use MMA services and economy-based trust. Trust in service providers and economic-based trust were positively related to customer intentions to use MMA services. Research limitations/implications Although the concept of MMA has been explored in several literatures, the role of trust and PV in the use of MMA has not been of much concern among researchers. In addition, this study described PV as a construction with five supporting dimensions. The current literature showed that the integration of PV with construct trust was still lacking in attention from researchers especially the study of MMA. Practical implications For practitioners, these findings confirmed that MMA service providers need to convince customers of protection to money and personal information. Also, providers need to ensure that the use of MMA provides cost and time effectiveness. Besides, it is important to ensure the services provided to customers are the fastest way to carry out financial transactions, in this case, including payment and retail purchases. This finding also showed that PV related to MMA services needs to be studied from a customer perspective, focusing on four aspects of ethics, playfulness, customer return of investment and excellent service. Therefore, handling PV in these services requires specific strategies to deal with these various aspects. Originality/value This study integrated two dimensions of trust, thus economic trust and service trust, the authors also integrated dimension of PV as the antecedent of two dimensions of trust, to understand the dimension of intention use MMA.
APA, Harvard, Vancouver, ISO, and other styles
6

Hamidi, Hodjat, and Saba Moradi. "Analysis of Consideration of Security Parameters by Vendors on Trust and Customer Satisfaction in E-Commerce." Journal of Global Information Management 25, no. 4 (October 2017): 32–45. http://dx.doi.org/10.4018/jgim.2017100103.

Full text
Abstract:
Exchanges in electronic market accomplishes through electronic channels. An electronic market is a meeting point for both the shoppers and the sellers. This article aims for the impact of cultural and security orientation on the customer perception of the seller's ethics regarding the customers' loyalty. A heuristic method is applied to examine dimensions of customer perception of seller ethics. The research community is selected out of a large group of sale experts and directly through electronic survey platform in electronic markets. According to the article findings, electronic customers are of high tendency to better understand the electronic seller's ethics, and the customer's higher perception of electronic sellers increases the shopping. On-time and correct electronic seller's responses affect positively on the customers' loyalty. The consumer loyalty regarding the ethics of electronic retailer's scale is greater completeness to evaluate consumer perceptions of e-retailers' ethics than scales using a one-dimensional approach. This study further examines both individualism and collectivism at the individual level, which is rare in the existing literature.
APA, Harvard, Vancouver, ISO, and other styles
7

Kidd, John, Frank-jürgen Richter, and Marielle Stumm. "Learning and trust in supply chain management: Disintermediation, ethics and cultural pressures in brief dynamic alliances." International Journal of Logistics Research and Applications 6, no. 4 (December 2003): 259–75. http://dx.doi.org/10.1080/13675560310001626972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Díaz Nafría, José María. "The Need for an Informational Systems Approach to Security." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 1 (March 17, 2011): 93–122. http://dx.doi.org/10.31269/vol9iss1pp93-122.

Full text
Abstract:
Different senses of security and its related assumptions, methodologies and contexts are analyzed by first reviewing the liberalistic notions of security and trust, unveiling, on the one hand, the contradictions exhibited between discourse and practice; on the other hand, the historical strategy of concentration of power behind the liberalistic doctrines. The weakness, limits and implications of the liberalistic notions and methods on security and trust are inquired, and subsequently a genuine horizon of security as sustainable and general procurement of positive freedom is advocated. The CyberSyn project successfully implemented in Chile, but tragically and prematurely ending under the hard power in the 9/11 of 1973, serves as model of the posed system approach to security. However, the system model is actualized and completed with elements of the general theory of information in virtue of: the increased complexity of societal systems, its ultimate global dimension, its biospherical closure, the increase of information assets and processes, and some epistemological boundaries. These reasons also set the need of keeping – beside the system approach – a critical and ethical stance.
APA, Harvard, Vancouver, ISO, and other styles
9

Carros, Felix, Tobias Störzinger, Anne Wierling, Adrian Preussner, and Peter Tolmie. "Ethical, Legal & Participatory Concerns in the Development of Human-Robot Interaction." i-com 21, no. 2 (July 19, 2022): 299–309. http://dx.doi.org/10.1515/icom-2022-0025.

Full text
Abstract:
Abstract Research on Human-Robot Interaction is increasing as system become widely available and reached a level that enables smooth interactions. Yet, many research projects act in a silo mentality, in regard of participatory, ethical, or legal matters of social robotics. Knowledge about specific challenges is not universal and has often to be transferred from non-robotic contexts. We present findings in the three dimensions: participatory design, ethics for social robots and legal aspects. We accompanied eight research projects on social robots in real-world scenarios for three years. During that time, we spoke, observed, and helped (where possible) the research projects. This gave us specific insights into their work. Our findings work in three dimensions. In participatory design we observed that the trust relationship to users is essential to gain truthful insights and that a mixed method approach is promising. Regarding ethical aspects, we could see that ethical matters should be answered early on. And in the legal dimensions we noticed that the GDPR regulations are a challenge that often requires the help of experts. This work is reflecting on the observation of eight projects and is collecting lessons learned to help future projects and to learn from previous work.
APA, Harvard, Vancouver, ISO, and other styles
10

Fournier-Tombs, Eleonore. "Towards a United Nations Internal Regulation for Artificial Intelligence." Big Data & Society 8, no. 2 (July 2021): 205395172110394. http://dx.doi.org/10.1177/20539517211039493.

Full text
Abstract:
This article sets out the rationale for a United Nations Regulation for Artificial Intelligence, which is needed to set out the modes of engagement of the organisation when using artificial intelligence technologies in the attainment of its mission. It argues that given the increasing use of artificial intelligence by the United Nations, including in some activities considered high risk by the European Commission, a regulation is urgent. It also contends that rules of engagement for artificial intelligence at the United Nations would support the development of ‘good artificial intelligence’, by giving developers clear pathways for authorisation that would build trust in these technologies. Finally, it argues that an internal regulation would build upon the work in artificial intelligence ethics and best practices already initiated in the organisation that could, like the Brussels Effect, set an important precedent for regulations in other countries.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Trust and ethics of computer systems"

1

Van, Wyk Byron Jay. "E-trust: a building block for developing valuable online platforms in Higher Education." Thesis, Cape Peninsula University of Technology, 2013. http://hdl.handle.net/20.500.11838/1852.

Full text
Abstract:
Thesis submitted in fulfilment of the requirements for the degree Master of Technology Design in the Faculty of Informatics and Design at the Cape Peninsula University of Technology Supervisor: Prof J Messeter Cape Town, 2013
The aim of this research project was to provide an answer to the question: “How can an understanding of online trust be used to build valuable online applications in Higher Education?” In order to present an answer to this question, a literature survey was conducted to establish: • An understanding of the phenomenon of online trust • What the factors are that influence a loss of trust in the online environment The literature survey highlighted several factors that influence a loss of trust in the online environment, called trust cues. These factors, however, were often tested within the E-commerce environment, and not in organization-specific contexts, such as online platforms in use in Higher Education. In order to determine whether or not these factors would influence the development of trust in context-specific environments, the author of this research grouped the indentified trust factors into three focus areas, i.e. content, ease of use, and navigation. These factors were then incorporated into a series of nine different prototypes. These prototypes were different versions of a particular online platform currently in use at the Cape Peninsula University of Technology (CPUT). The prototypes were tested over a three week period, with certain staff members at the institution in question recruited as test participants. During each week of user observations, a different focus area was targeted, in order to establish the impact that it would have on the perceived trustworthiness of the platform in question. User observations were conducted while test participants completed a standard process using the various prototypes. Semi-structured interviews were also conducted while participants completed the specific process. Participants were asked to evaluate each screen in the process according to its perceived trust worthiness, by assigning a trust level score. At the completion of the three rounds of user observations, in-depth interviews were conducted with test participants. The participants’ trust level scores for each prototype were captured and graphed. A detailed description for the score given for a particular screen was presented on each graph. These scores were combined to provide an analysis of the focus area tested during the specific round. After the three rounds of user observations were completed, an analysis of all the trust factors tested were done. Data captured during interviews were transcribed, combined with feedback received from questionnaires, and analysed. An interpretation of the results showed that not all trust factors had a similar influence in the development of trust in the online platform under investigation. Trust cues such as content organization, clear instructions and useful content were by far the most significant trust factors, while others such as good visual design elements, professional images of products, and freedom from grammatical and typographical errors had little or no impact in the overall trustworthiness of the platform under investigation. From the analysis done it was clear that the development of trust in organization-specific contexts is significantly different than developing trust in an E-commerce environment and that factors that influence the development of trust in one context might not always be significant in another. In conclusion, it is recommended that when software applications are developed in organization-specific contexts, such as Higher Education, that trust factors such as good content organization, clear instructions and useful content be considered as the most salient. Organization-specific contexts differ quite significantly in that the users of these systems often convey a certain degree of trust toward the online platforms that they work with on a daily basis. Trust factors that are geared toward developing an initial or basic trust in a particular platform, which is often the case with first time users engaging in an E-commerce platform, would therefore not be as significant in the development of a more developed level of trust, which is what is needed within the development of organization-specific online platforms.
APA, Harvard, Vancouver, ISO, and other styles
2

Grizzard, Julian B. "Towards Self-Healing Systems: Re-establishing Trust in Compromised Systems." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-04072006-133056/.

Full text
Abstract:
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2006.
Schwan, Karsten, Committee Member ; Schimmel, David, Committee Member ; Copeland, John, Committee Member ; Owen, Henry, Committee Chair ; Wills, Linda, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Weiliang. "Trust in distributed information systems." View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/35454.

Full text
Abstract:
Thesis (Ph.D.)--University of Western Sydney, 2008.
A thesis presented to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics, in fulfilment of the requirements for the degree of Doctor of Philosophy. Includes bibliographies.
APA, Harvard, Vancouver, ISO, and other styles
4

Lu, Gehao. "Neural trust model for multi-agent systems." Thesis, University of Huddersfield, 2011. http://eprints.hud.ac.uk/id/eprint/17817/.

Full text
Abstract:
Introducing trust and reputation into multi-agent systems can significantly improve the quality and efficiency of the systems. The computational trust and reputation also creates an environment of survival of the fittest to help agents recognize and eliminate malevolent agents in the virtual society. The thesis redefines the computational trust and analyzes its features from different aspects. A systematic model called Neural Trust Model for Multi-agent Systems is proposed to support trust learning, trust estimating, reputation generation, and reputation propagation. In this model, the thesis innovates the traditional Self Organizing Map (SOM) and creates a SOM based Trust Learning (STL) algorithm and SOM based Trust Estimation (STE) algorithm. The STL algorithm solves the problem of learning trust from agents' past interactions and the STE solve the problem of estimating the trustworthiness with the help of the previous patterns. The thesis also proposes a multi-agent reputation mechanism for generating and propagating the reputations. The mechanism exploits the patterns learned from STL algorithm and generates the reputation of the specific agent. Three propagation methods are also designed as part of the mechanism to guide path selection of the reputation. For evaluation, the thesis designs and implements a test bed to evaluate the model in a simulated electronic commerce scenario. The proposed model is compared with a traditional arithmetic based trust model and it is also compared to itself in situations where there is no reputation mechanism. The results state that the model can significantly improve the quality and efficacy of the test bed based scenario. Some design considerations and rationale behind the algorithms are also discussed based on the results.
APA, Harvard, Vancouver, ISO, and other styles
5

Chan, Fuk Wing Thomas. "Preserving trust across multiple sessions in open systems /." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd497.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Raval, Maharsh, and Rajkiran Sunkireddy. "Hardware Root of Trust on IoT Gateway." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40120.

Full text
Abstract:
Gateways play a vital role in the Internet of Things (IoT) infrastructure. Gateways are widely used and their usage range from industries to smart homes. As they have expanded nowadays to have internet connectivity which raises certain security issues like being exposed to various threats and cyber-attacks such as rootkits, bootkits. Many researches and developmentswere made to countermeasure these problems. One of the significant developments was Root ofTrust (RoT). RoT can be enabled both by using hardware such as a chip named Trusted PlatformModule (TPM) and using software like Trusted Execution Environment (TEE).We propose amethod on how to enable RoT using the chip TPM 2.0 on a product, a Gateway named GWen from the company HMS Industrial Networks AB using the TPM software stack TSS2.0. We have performed tests on cryptographic operations such as key generation, key usage, and secure key storage and have shown the results in this report. Based on our results, adding and enabling the TPM 2.0 to the GWen enhances the security of its Linux distribution and makes it possible tosecurely identify and authenticate the gateway based on its secret keys that are stored securelyinside it’s TPM.
APA, Harvard, Vancouver, ISO, and other styles
7

Huynh, Trung Dong. "Trust and reputation in open multi-agent systems." Thesis, University of Southampton, 2006. https://eprints.soton.ac.uk/262759/.

Full text
Abstract:
Trust and reputation are central to effective interactions in open multi-agent systems (MAS) in which agents, that are owned by a variety of stakeholders, continuously enter and leave the system. This openness means existing trust and reputation models cannot readily be used since their performance suffers when there are various (unforseen) changes in the environment. To this end, this thesis develops and evaluates FIRE, a trust and reputation model that enables autonomous agents in open MAS to evaluate the trustworthiness of their peers and to select good partners for interactions. FIRE integrates four sources of trust information under the same framework in order to provide a comprehensive assessment of an agent’s likely performance in open systems. Specifically, FIRE incorporates interaction trust, role-based trust, witness reputation, and certified reputation, that models trust resulting from direct experiences, role-based relationships, witness reports, and third-party references, respectively, to provide trust metrics in most circumstances. A novel model of reporter credibility has also been integrated to enable FIRE to effectively deal with inaccurate reports (from witnesses and referees). Finally, adaptive techniques have been introduced, which make use of the information gained from monitoring the environment, to dynamically adjust a number of FIRE’s parameters according to the actual situation an agent finds itself in. In all cases, a systematic empirical analysis is undertaken to evaluate the effectiveness of FIRE in terms of the agent’s performance.
APA, Harvard, Vancouver, ISO, and other styles
8

Maiden, Wendy Marie. "Dualtrust a trust management model for swarm-based autonomic computing systems /." Pullman, Wash. : Washington State University, 2010. http://www.dissertations.wsu.edu/Thesis/Spring2010/W_Maiden_6041310.pdf.

Full text
Abstract:
Thesis (M.A. in electrical engineering and computer science)--Washington State University, May 2010.
Title from PDF title page (viewed on May 3, 2010). "Department of Electrical Engineering and Computer Science." Includes bibliographical references (p. 110-117).
APA, Harvard, Vancouver, ISO, and other styles
9

Lebedev, Ilia Andreevich. "Trust less : shrinking the trusted parts of trusted systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/128315.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2020
Cataloged from PDF of thesis.
Includes bibliographical references (pages 213-227).
Modern computers, industrial control systems, and other automation are broadly vulnerable as a result of decades of systemic forces that have prioritized cost and performance over security. Computers across the board face a crisis in the form of motivated software adversaries with access to our imperfect and enormously complex software. Considering these weaknesses, trust in modern computing systems is often not well-placed. Looking ahead to a shift in our collective priorities, this thesis is centered around a rigorous discussion of hardware-assisted isolation and enclaves -- authenticated software modules -- as a means to drastically reduce the complexity of trusted systems. By allowing trustworthy enclaved software to co-exist with, but remain strongly isolated from, existing software, we enable a gentle transition toward trustworthy systems. Specifically, this thesis refines formal definitions of enclaved execution and threat model via a series of hardware and software co-designs. These case studies explore enclave processors with small trusted computing bases spanning a gradient from an embedded SoC to a modern high-performance processor. This work is complementary to, and enables more effective application of, many powerful ideas such as information flow control, formal verification, multi-party computation, and other tools for trustworthy computing.
by Ilia Andreevich Lebedev.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
10

Chan, Fuk-Wing Thomas. "Preserving Trust Across Multiple Sessions in Open Systems." BYU ScholarsArchive, 2004. https://scholarsarchive.byu.edu/etd/137.

Full text
Abstract:
Trust negotiation, a new authentication paradigm, enables strangers on the Internet to establish trust through the gradual disclosure of digital credentials and access control policies. Previous research in trust negotiation does not address issues in preserving trust across multiple sessions. This thesis discusses issues in preserving trust between parties who were previously considered strangers. It also describes the design and implementation of trust preservation in TrustBuilder, a prototype trust negotiation system. Preserving trust information can reduce the frequency and cost of renegotiation. A scenario is presented that demonstrates that a server supporting trust preservation can recoup the cost of the trust preservation facility when approximately 25% of its requests are from repeat customers. The throughput and response time improve up to approximately 33% as the percentage of repeat customers grows to 100%.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Trust and ethics of computer systems"

1

Chris, Cornelis, de Cock Martine, and SpringerLink (Online service), eds. Trust Networks for Recommender Systems. Paris: Atlantis Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jennifer, Golbeck, ed. Computing with social trust. London: Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Access control systems: Security, identity, management, and trust models. New York: Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wierzbicki, Adam. Trust and Fairness in Open, Distributed Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

M, McCune Jonathan, Perrig Adrian, and SpringerLink (Online service), eds. Bootstrapping Trust in Modern Computers. New York, NY: The Author(s), 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Acquisti, Alessandro. Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Edgar, Weippl, Camp L. Jean, Volkamer Melanie, Reiter Mike, Zhang Xinwen, and SpringerLink (Online service), eds. Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Huth, Michael. Trust and Trustworthy Computing: 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cliff, Wang, and SpringerLink (Online service), eds. Introduction to Hardware Security and Trust. New York, NY: Springer Science+Business Media, LLC, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

M, McCune Jonathan, ed. Trust and trustworthy computing: 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings. Heidelberg, Germany: Springer-Verlag, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Trust and ethics of computer systems"

1

Kirchebner, Tobias, Stephan Schlögl, Erin Bass, and Thomas Dilger. "Investigating Trust in Expert System Advice for Business Ethics Audits." In Communications in Computer and Information Science, 316–28. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81635-3_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Massa, Paolo, and Paolo Avesani. "Trust Metrics in Recommender Systems." In Human–Computer Interaction Series, 259–85. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84800-356-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kwan, Ming, and Deepak Ramachandran. "Trust and Online Reputation Systems." In Human–Computer Interaction Series, 287–311. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84800-356-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tweedale, Jeffrey, and Philip Cutler. "Trust in Multi-Agent Systems." In Lecture Notes in Computer Science, 479–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11893004_62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bartneck, Christoph, Christoph Lütge, Alan Wagner, and Sean Welsh. "Trust and Fairness in AI Systems." In An Introduction to Ethics in Robotics and AI, 27–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51110-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

da Costa, Gonçalo Jorge Morais, Mary Prior, and Simon Rogerson. "Organizational Knowledge: Ethics and the Importance of Trust." In Communications in Computer and Information Science, 295–304. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16419-4_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rozenfeld, Ola, and Moshe Tennenholtz. "Consistent Continuous Trust-Based Recommendation Systems." In Lecture Notes in Computer Science, 113–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10841-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lai, Woodas W. K., Kam-Wing Ng, and Michael R. Lyu. "Integrating Trust in Grid Computing Systems." In Lecture Notes in Computer Science, 887–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30208-7_130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yau, Stephen S. "Managing Trust in Distributed Agent Systems." In Lecture Notes in Computer Science, 17–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11839569_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Becker, Moritz Y., and Masoud Koleini. "Opacity Analysis in Trust Management Systems." In Lecture Notes in Computer Science, 229–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24861-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Trust and ethics of computer systems"

1

Kane, Bridget, and Saturnino Luz. "Trust, Ethics and Access: Challenges in Studying the Work of Multi-disciplinary Medical Teams." In 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS). IEEE, 2017. http://dx.doi.org/10.1109/cbms.2017.150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Libin, Alexander V. "Integrated disciplines and future competencies: A blueprint for ethically aligned curriculum for IT, CS, ITC & beyond." In Sixth International Conference on Higher Education Advances. Valencia: Universitat Politècnica de València, 2020. http://dx.doi.org/10.4995/head20.2020.11241.

Full text
Abstract:
Autonomous and intelligent technical systems are specifically designed to reduce the necessity for human intervention in our daily lives. In so doing, these new computer-based systems are also raising concerns about their impact on individuals and society. Because of their innovative nature, the full benefit will be obtained only if the technology is aligned with society's defined values guided by ethical principles. Through the proposed ethically aligned curriculum (ETHIKA) for computer sciences (CS) and information technology (IT) specialties we intend, therefore, to establish frameworks to guide and inform dialogue and debate around the non-technical implications, in particular related to ethical dilemmas. Hereby we understand "ethical" to go beyond universal moral constructs, such as trust, harm, good or bad, and include ethical designs for AI-based technologies, socially-oriented computer sciences, and ethical risks of digital society. As digital economy prospers, more CS/IT-professionals realize the power of education-driven intellectual capacity (InCED). It is hypothesized, that InCED has direct impact on learning competencies of students, warranting future successful management of professional and life ethical challenges. ETHIKA elucidate, through both methodological and experimental inquiries, the impact of global digitalization and related ethical risks on learning and professional competencies in both professional CS/IT-community and the University students.
APA, Harvard, Vancouver, ISO, and other styles
3

O'Grady, Katherine L., Steven D. Harbour, Ashlie R. Abballe, and Kelly Cohen. "Trust, Ethics, Consciousness, and Artificial Intelligence." In 2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC). IEEE, 2022. http://dx.doi.org/10.1109/dasc55683.2022.9925874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"What does it mean to trust AI systems?" In Fourth International Conference on Robot Ethics and Standards. CLAWAR Association Ltd., 2019. http://dx.doi.org/10.13180/icres.2019.29-30.07.p04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schmitt, Anuschka. "Examining Trust in Conversational Systems: Conceptual and Empirical Findings on User Trust, Related Behavior, and System Trustworthiness." In AIES '22: AAAI/ACM Conference on AI, Ethics, and Society. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3514094.3539525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lim, Hock Chuan, Rob Stocker, and Henry Larkin. "Review of Trust and Machine Ethics Research: Towards A Bio-Inspired Computational Model of Ethical Trust (CMET)." In 3d International ICST Conference on Bio-Inspired Models of Network, Information, and Computing Systems. ICST, 2008. http://dx.doi.org/10.4108/icst.bionetics2008.4728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ema, Arisa, Katsue Nagakura, and Takanori Fujita. "Proposal for Type Classification for Building Trust in Medical Artificial Intelligence Systems." In AIES '20: AAAI/ACM Conference on AI, Ethics, and Society. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3375627.3375846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Zhili, Xueli Yu, and Jingyu Sun. "An Improved Trust Metric for Trust-Aware Recommender Systems." In 2009 First International Workshop on Education Technology and Computer Science. IEEE, 2009. http://dx.doi.org/10.1109/etcs.2009.215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

AboBakr, Ahmed, and Marianne A. Azer. "IoT ethics challenges and legal issues." In 2017 12th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2017. http://dx.doi.org/10.1109/icces.2017.8275309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baarslag, Tim, Michael Kaisers, Enrico H. Gerding, Catholijn M. Jonker, and Jonathan Gratch. "When Will Negotiation Agents Be Able to Represent Us? The Challenges and Opportunities for Autonomous Negotiators." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/653.

Full text
Abstract:
Computers that negotiate on our behalf hold great promise for the future and will even become indispensable in emerging application domains such as the smart grid and the Internet of Things. Much research has thus been expended to create agents that are able to negotiate in an abundance of circumstances. However, up until now, truly autonomous negotiators have rarely been deployed in real-world applications. This paper sizes up current negotiating agents and explores a number of technological, societal and ethical challenges that autonomous negotiation systems have brought about. The questions we address are: in what sense are these systems autonomous, what has been holding back their further proliferation, and is their spread something we should encourage? We relate the automated negotiation research agenda to dimensions of autonomy and distill three major themes that we believe will propel autonomous negotiation forward: accurate representation, long-term perspective, and user trust. We argue these orthogonal research directions need to be aligned and advanced in unison to sustain tangible progress in the field.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Trust and ethics of computer systems"

1

Lewis, Dustin, ed. A Compilation of Materials Apparently Reflective of States’ Views on International Legal Issues pertaining to the Use of Algorithmic and Data-reliant Socio-technical Systems in Armed Conflict. Harvard Law School Program on International Law and Armed Conflict, December 2020. http://dx.doi.org/10.54813/cawz3627.

Full text
Abstract:
This document is a compilation of materials that at least appear to be reflective of one or more states’ views on international legal issues pertaining to the actual or possible use of algorithmic and data-reliant socio-technical systems in armed conflict. In September of 2018, the Harvard Law School Program on International Law and Armed Conflict (HLS PILAC) commenced a project titled “International Legal and Policy Dimensions of War Algorithms: Enduring and Emerging Concerns.”[1] The project builds on the program’s earlier research and policy initiative on war-algorithm accountability. A goal of the current project is to help strengthen international debate and inform policymaking on the ways that artificial intelligence and complex computer algorithms are transforming war, as well as how international legal and policy frameworks already govern, and might further regulate, the design, development, and use of those technologies. The project is financially supported by the Ethics and Governance of Artificial Intelligence Fund. In creating this compilation, HLS PILAC seeks in part to provide a resource through which the positions of states with divergent positions on certain matters potentially of international public concern can be identified. Legal aspects of war technologies are more complex than some governments, scholars, and advocates allow. In the view of HLS PILAC, knowledge of the legal issues requires awareness of the multiple standpoints from which these arguments are fashioned. An assumption underlying how we approach these inquiries is that an assessment concerning international law in this area ought to take into account the perspectives of as many states (in addition to other relevant actors) as possible.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography