Skip to main content

Can We Manage Trust?

  • Conference paper
Trust Management (iTrust 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3477))

Included in the following conference series:

Abstract

The term trust management suggests that trust can be managed, for example by creating trust, by assessing trustworthiness, or by determining optimal decisions based on specific levels of trust. The problem to date is that trust management in online environments is a diverse and ill defined discipline. In fact, the term trust management is being used with very different meanings in different contexts. This paper examines various approaches related to online activities where trust is relevant and where there is potential for trust management. In some cases, trust management has been defined with specific meanings. In other cases, there are well established disciplines with different names that could also be called trust management. Despite the confusion in terminology, trust management, as a general approach, represents a promising development for making online transactions more dependable, and in the long term for increasing the social capital of online communities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abrams, M.D.: Trusted System Concepts. Computers and Security 14(1), 45–56 (1995)

    Article  Google Scholar 

  2. Axelrod, R.: The Evolution of Cooperation. Basic Books, New York (1984)

    Google Scholar 

  3. Berg, J., Dickhaut, J., McCabe, K.: Trust, Reciprocity, and Social History. Games and Economic Behavior 10, 122–142 (1996)

    Article  Google Scholar 

  4. Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust Management for Public-Key Iinfrastructures. In: Proceedings of the 1998 Secure Protocols International Workshop, Cambridge, England (1998)

    Google Scholar 

  5. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Conference on Security and Privacy, Oakland, CA (1996)

    Google Scholar 

  6. Blaze, M., Feigenbaum, J., Strauss, M.: Compliance Checking in the PolicyMaker Trust Management System. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 254–274. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)

    Article  Google Scholar 

  8. Cheskin Research & Studio Archetype/Sapient. eCommerce Trust Study. Sapient (January 1999), http://www.sapient.com/cheskin/

  9. Chu, Y.-H., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: REFEREE: Trust Management for Web Applications. World Wide Web Journal 2, 127–139 (1997)

    Google Scholar 

  10. Coleman, J.S.: Social Capital in the Creation of Human Capital. American Journal of Sociology 94, 95–120 (1988)

    Article  Google Scholar 

  11. Dimitrakos, T.: Towards a Trust and Contract Management Framework for Dynamic Virtual Organisations. In: Proceedings of eAdoptions and the Knowledge Economy: eChallenges 2004. IOS Press, Amsterdam (2004)

    Google Scholar 

  12. Falcone, R., Castelfranchi, C.: How trust enhances and spread trust. In: Proceedings of the 4th Int. Workshop on Deception Fraud and Trust in Agent Societies, in the 5th International Conference on Autonomous Agents (AGENTS 2001) (May 2001)

    Google Scholar 

  13. Falcone, R., Castelfranchi, C.: Social Trust: A Cognitive Approach, pp. 55–99. Kluwer, Dordrecht (2001)

    Google Scholar 

  14. Fukuyama, F.: Trust: The Social Virtues and the Creation of Prosperity. The Free Press, New York (1995)

    Google Scholar 

  15. Gambetta, D.: Can We Trust Trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213–238. Basil Blackwell, Oxford (1990)

    Google Scholar 

  16. Grandison, T., Sloman, M.: Specifying and Analysing Trust for Internet Applications. In: Proceedings of the 2nd IFIP Conference on e-Commerce, e-Business and e-Government (I3E 2002), Lisbon (2002)

    Google Scholar 

  17. Huang, H., Keser, C., Leland, J., Shachat, J.: Trust, the Internet, and the Digital Divide. IBM Systems Journal 42(3), 507–518 (2003)

    Article  Google Scholar 

  18. Huberman, B.A., Wu, F.: The Dynamics of Reputations. Computing in Economics and Finance 18 (2003)

    Google Scholar 

  19. Järvenpää, S.L., Leidner, D.E.: Communication and trust in global virtual teams. Organization Science 10(6), 791–815 (1999)

    Article  Google Scholar 

  20. Jøsang, A.: The right type of trust for distributed systems. In: Meadows, C. (ed.) Proc. of the 1996 New Security Paradigms Workshop. ACM, New York (1996)

    Google Scholar 

  21. Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision (to appear). Decision Support Systems (2005)

    Google Scholar 

  22. Jøsang, A., Pope, S.: Semantic Constraints for Trust Tansitivity. In: Proceedings of the Asia-Pacific Conference of Conceptual Modelling (APCCM), Newcastle, Australia (February 2005)

    Google Scholar 

  23. Jøsang, A., Tran, N.: Trust Management for e-Commerce. In: VirtualBanking 2000, Virtual Conference (2000), hosted at, http://virtualbanking2000.com

  24. Keser, C.: Strategically Planned Behavior in Public Goods Experiments. Technical report, CIRANO Scientific Series 2000s-35, Montreal, Canada (2000)

    Google Scholar 

  25. Keser, C.: Experimental Games for the Design of Reputation Management Systems. IBM Systems Journal 42(3), 498–506 (2003)

    Article  Google Scholar 

  26. Keser, C., van Winden, F.: Conditional Cooperation and Voluntary Contributions to Public Goods. Scandinavian Journal of Economics 102, 23–39 (2000)

    Article  Google Scholar 

  27. Knack, S., Keefer, P.: Does Social Capital Have an Economic Payoff? A Cross-Country Investigation. Quarterly Journal of Economics 112(4), 1251–1288 (1997)

    Article  Google Scholar 

  28. Kreps, D., Wilson, R.: Reputation and Imperfect Information. Journal of Economic Theory 27(2), 253–279 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  29. Luhmann, N.: Trust and Power. Wiley, Chichester (1979)

    Google Scholar 

  30. McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Reseach Center (1996), http://misrc.umn.edu/wpaper/

  31. Needham, R.M.: Security and open source. Presentation at the Open Source Software Workshop (2002), http://nats-www.informatik.uni-hamburg.de/view/OSS2004/PaperCollection

  32. Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank Citation Ranking: Bringing Order to the Web. Technical report, Stanford Digital Library Technologies Project (1998)

    Google Scholar 

  33. Patton, M.A., Jøsang, A.: Technologies for Trust in Electronic Commerce. Electronic Commerce Research 4(1-2), 9–21 (2004)

    Article  Google Scholar 

  34. Pichler, R.: Trust and Reliance - Enforcement and Compliance: Enhancing Consumer Confidence in the Electronic Marketplace, Stanford Law School (May 2000), www.oecd.org/dsti/sti/it/secur/act/online_trust/Consumer_Confidence.pdf

  35. Powell, A., Piccoli, G., Ives, B.: Virtual teams: a review of current literature and directions for future research. SIGMIS Database 35(1), 6–36 (2004)

    Article  Google Scholar 

  36. Putnam, R.D.: Tuning in, tuning out: The strange disappearance of social capital in America. Political Science and Politics 28(4), 664–683 (1995)

    Article  MathSciNet  Google Scholar 

  37. Rasmusson, L., Janssen, S.: Simulated Social Control for Secure Internet Commerce. In: Meadows, C. (ed.) Proceedings of the 1996 New Security Paradigms Workshop. ACM, New York (1996)

    Google Scholar 

  38. Resnick, P., Zeckhauser, R., Friedman, R., Kuwabara, K.: Reputation Systems. Communications of the ACM 43(12), 45–48 (2000)

    Article  Google Scholar 

  39. Rowe, N.C.: Designing Good Deceptions in Defense of Information Systems. In: Proceedings of the Annual Computer Security Applications Conferencen (ACSAC), Tucson (December 2004)

    Google Scholar 

  40. Schiff, A., Kennes, J.: The Value of Reputation Systems. In: Proceedings of the First Summer Workshop in Industrial Organization (SWIO), Auckland NZ (March 2003)

    Google Scholar 

  41. Selten, R., Mitzkewitz, M., Uhlich, G.: Duopoly Strategies Programmed by Experienced Player. Econometrica 65, 517–555 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  42. Shapiro, C.: Consumer Information, Product Quality, and Seller Reputation. The Bell Journal of Economics 13(1), 20–35 (1982)

    Article  Google Scholar 

  43. Simmons, G.J., Meadows, C.: The role of trust in information integrity protocols. Journal of Computer Security 3(1), 71–84 (1995)

    Google Scholar 

  44. Williamson, O.E.: Calculativeness, Trust and Economic Organization. Journal of Law and Economics 36, 453–486 (1993)

    Article  Google Scholar 

  45. Zimmermann, P.R.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jøsang, A., Keser, C., Dimitrakos, T. (2005). Can We Manage Trust?. In: Herrmann, P., Issarny, V., Shiu, S. (eds) Trust Management. iTrust 2005. Lecture Notes in Computer Science, vol 3477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11429760_7

Download citation

  • DOI: https://doi.org/10.1007/11429760_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26042-4

  • Online ISBN: 978-3-540-32040-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics