Abstract
Traditional research on security has been based on the assumption that a user feels secure when provided with secure systems and services. In this research we address factors influencing users’ sense of security. This paper reports our recent discoveries regarding the structure of the sense of security — Anshin. We conducted a questionnaire survey regarding the sense of security. Results using exploratory factor analysis (EFA) and structural equation modeling (SEM) identified six factors contributing to the sense of security. Furthermore, the structure of the sense of security is divided into two parts: personal and environmental.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Murayama, Y., Hikage, N., Hauser, C., Chakraborty, B., Segawa, N.: An Anshin Model for the Evaluation of the Sense of Security. In: Proc. of the 39th Hawaii International Conference on System Science (HICSS 2006), vol. 8, p. 205a (2006)
Hikage, N., Murayama, Y., Hauser, C.: Exploratory survey on an evaluation model for a sense of security. In: Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007), pp. 121–132 (2007)
Hikage, N., Hauser, C., Murayama, Y.: A statistical discussion of the sense of security, Anshin. Information Processing Society of Japan (IPSJ) Journal 48(9), 3193–3203 (2007)
Deutsh, M.: The effect of motivational orientation upon trust and suspicion. Human Relation 13, 123–139 (1960)
Gambetta, D.: Can we trust trust?, Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, vol. 13, pp. 213–237. University of Oxford (1988); (originally published from Basil Blackwell, 1988) (Last Access, February 9, 2007), http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf
Marsh, S.P.: Formalising trust as computational concept, PhD Thesis, Department of Mathematics and Computer Science. University of Stirling (1994)
Lewis, J.D., Weigert, A.: Trust as a Social Reality. Social Forces 63(4), 967–985 (1985)
Xiao, S., Benbasat, I.: The formation of trust and distrust in recommendation agents in repeated interactions: a process-tracing analysis. In: Proc. of the 5th international conference on Electronic commerce (ICEC 2003), pp. 287–293 (2003)
Xiao, S., Benbasat, I.: Understanding Customer Trust in Agent-Mediated Electronic Commerce, Web-Mediated Electronic Commerce, and Traditional Commerce. Information Technology and Management 5(1–2), 181–207 (2004)
McAllister, D.J.: Affect- and cognition-based trust as foundations for interpersonal cooperation in organizations. Academy of Management Journal 38(1), 24–59 (1995)
Chopra, K., Wallace, W.A.: Trust in Electronic Environments. In: Proc. of the 36th Hawaii International Conference on System Science (HICSS 2003), vol. 1, p. 331.1 (2003)
Kuan, H.H., Bock, G.W.: The Collective Reality of Trust: An Investigation of Social Relations and Networks on Trust in Multi-Channel Retailers. In: Proc. of the 13th European Conference on Information Systems (ECIS 2005) (2005) (Last Access, February 9, 2007), http://is2.lse.ac.uk/asp/aspecis/20050018.pdf
Yamagishi, T.: The structure of trust: The evolutionary games of mind and society, Tokyo University Press (1998); English version, http://lynx.let.hokudai.ac.jp/members/yamagishi/english.htm (Last Access, February 9, 2007)
Whitten, A., Tygar, D.: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In: Proc. of the 9th USENIX Security Symposium, pp.169–184 (1999)
Stephens, R.T.: A framework for the identification of electronic commerce design elements that enable trust within the small hotel industry. In: Proc. of ACMSE 2004, pp. 309–314 (2004)
Pu, P., Chen, L.: Trust building with explanation interfaces. In: Proc. of the 11th international conference on Intelligent user interfaces (IUI 2006), pp. 93–100 (2006)
Riegelsberger, J., Sasse, M.A., McCarthy, J.D.: Privacy and trust: Shiny happy people building trust?: photos on e-commerce websites and consumer trust. In: Proc. of the SIGCHI conference on Human factors in computing systems (CHI 2003), vol. 5(1), pp. 121–128 (2003)
Kikkawa, T., Shirato, S., Fujii, S., Takemura, K.: The pursuit of informed reassurance (‘An-Shin’ in Society) and technological safety(‘An-Zen’). Journal of SHAKAI-GIJUTSU 1, 1–8 (2003) (in Japanese)
Yamazaki, M., Kikkawa, T.: The Structure of Anxiety Associated with Avian Influenza and Pandemic Influenza. In: The 47th annual meeting of the Japanese Society of Social Psychology, pp. 676–677 (2006) (in Japanese)
Jöreskog, K.G.: A general approach to confirmatory maximum likelihood factor analysis. Psychometrika 34(2), 183–202 (1969)
Hoyle, R.H.: Structural Equation Modeling: Concepts, Issues, and Applications. Sage Publications, Thousand Oaks (1995)
Tanaka, J.F.: How big is enough?: Sample size and goodness of fit in structural equation models with latent variables. Child Development 58, 136–146 (1987)
Browne, M.W., Cudeck, R.: Alternative ways of assessing model fit. In: Bollen, K., et al. (eds.) Testing Structural Equation Models, pp. 137–162. Sage Publications, Thousand Oaks (1993)
Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proc. of the SIGCHI conference on Human Factors in computing systems (CHI 2006), pp. 581–590 (2006)
Camp, L.J.: "Design for Trust". In: Falcone, R. (ed.) Trust, Reputation and Security: Theories and Practice. Springer, Berlin (2003)
Hoffman, L.J., Lawson-Jenkins, K., Blum, J.: Trust beyond security: an expanded trust model. Communication of ACM 49(7), 94–101 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Murayama, Y., Hikage, N., Fujihara, Y., Hauser, C. (2008). The Structure of the Sense of Security, Anshin. In: Lopez, J., Hämmerli, B.M. (eds) Critical Information Infrastructures Security. CRITIS 2007. Lecture Notes in Computer Science, vol 5141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89173-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-89173-4_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89095-9
Online ISBN: 978-3-540-89173-4
eBook Packages: Computer ScienceComputer Science (R0)