Skip to main content

The Structure of the Sense of Security, Anshin

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5141))

  • 1272 Accesses

Abstract

Traditional research on security has been based on the assumption that a user feels secure when provided with secure systems and services. In this research we address factors influencing users’ sense of security. This paper reports our recent discoveries regarding the structure of the sense of security — Anshin. We conducted a questionnaire survey regarding the sense of security. Results using exploratory factor analysis (EFA) and structural equation modeling (SEM) identified six factors contributing to the sense of security. Furthermore, the structure of the sense of security is divided into two parts: personal and environmental.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Murayama, Y., Hikage, N., Hauser, C., Chakraborty, B., Segawa, N.: An Anshin Model for the Evaluation of the Sense of Security. In: Proc. of the 39th Hawaii International Conference on System Science (HICSS 2006), vol. 8, p. 205a (2006)

    Google Scholar 

  2. Hikage, N., Murayama, Y., Hauser, C.: Exploratory survey on an evaluation model for a sense of security. In: Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007), pp. 121–132 (2007)

    Google Scholar 

  3. Hikage, N., Hauser, C., Murayama, Y.: A statistical discussion of the sense of security, Anshin. Information Processing Society of Japan (IPSJ) Journal 48(9), 3193–3203 (2007)

    Google Scholar 

  4. Deutsh, M.: The effect of motivational orientation upon trust and suspicion. Human Relation 13, 123–139 (1960)

    Article  Google Scholar 

  5. Gambetta, D.: Can we trust trust?, Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, vol. 13, pp. 213–237. University of Oxford (1988); (originally published from Basil Blackwell, 1988) (Last Access, February 9, 2007), http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf

  6. Marsh, S.P.: Formalising trust as computational concept, PhD Thesis, Department of Mathematics and Computer Science. University of Stirling (1994)

    Google Scholar 

  7. Lewis, J.D., Weigert, A.: Trust as a Social Reality. Social Forces 63(4), 967–985 (1985)

    Article  Google Scholar 

  8. Xiao, S., Benbasat, I.: The formation of trust and distrust in recommendation agents in repeated interactions: a process-tracing analysis. In: Proc. of the 5th international conference on Electronic commerce (ICEC 2003), pp. 287–293 (2003)

    Google Scholar 

  9. Xiao, S., Benbasat, I.: Understanding Customer Trust in Agent-Mediated Electronic Commerce, Web-Mediated Electronic Commerce, and Traditional Commerce. Information Technology and Management 5(1–2), 181–207 (2004)

    Google Scholar 

  10. McAllister, D.J.: Affect- and cognition-based trust as foundations for interpersonal cooperation in organizations. Academy of Management Journal 38(1), 24–59 (1995)

    Article  MathSciNet  Google Scholar 

  11. Chopra, K., Wallace, W.A.: Trust in Electronic Environments. In: Proc. of the 36th Hawaii International Conference on System Science (HICSS 2003), vol. 1, p. 331.1 (2003)

    Google Scholar 

  12. Kuan, H.H., Bock, G.W.: The Collective Reality of Trust: An Investigation of Social Relations and Networks on Trust in Multi-Channel Retailers. In: Proc. of the 13th European Conference on Information Systems (ECIS 2005) (2005) (Last Access, February 9, 2007), http://is2.lse.ac.uk/asp/aspecis/20050018.pdf

  13. Yamagishi, T.: The structure of trust: The evolutionary games of mind and society, Tokyo University Press (1998); English version, http://lynx.let.hokudai.ac.jp/members/yamagishi/english.htm (Last Access, February 9, 2007)

  14. Whitten, A., Tygar, D.: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In: Proc. of the 9th USENIX Security Symposium, pp.169–184 (1999)

    Google Scholar 

  15. Stephens, R.T.: A framework for the identification of electronic commerce design elements that enable trust within the small hotel industry. In: Proc. of ACMSE 2004, pp. 309–314 (2004)

    Google Scholar 

  16. Pu, P., Chen, L.: Trust building with explanation interfaces. In: Proc. of the 11th international conference on Intelligent user interfaces (IUI 2006), pp. 93–100 (2006)

    Google Scholar 

  17. Riegelsberger, J., Sasse, M.A., McCarthy, J.D.: Privacy and trust: Shiny happy people building trust?: photos on e-commerce websites and consumer trust. In: Proc. of the SIGCHI conference on Human factors in computing systems (CHI 2003), vol. 5(1), pp. 121–128 (2003)

    Google Scholar 

  18. Kikkawa, T., Shirato, S., Fujii, S., Takemura, K.: The pursuit of informed reassurance (‘An-Shin’ in Society) and technological safety(‘An-Zen’). Journal of SHAKAI-GIJUTSU 1, 1–8 (2003) (in Japanese)

    Article  Google Scholar 

  19. Yamazaki, M., Kikkawa, T.: The Structure of Anxiety Associated with Avian Influenza and Pandemic Influenza. In: The 47th annual meeting of the Japanese Society of Social Psychology, pp. 676–677 (2006) (in Japanese)

    Google Scholar 

  20. Jöreskog, K.G.: A general approach to confirmatory maximum likelihood factor analysis. Psychometrika 34(2), 183–202 (1969)

    Article  Google Scholar 

  21. Hoyle, R.H.: Structural Equation Modeling: Concepts, Issues, and Applications. Sage Publications, Thousand Oaks (1995)

    Google Scholar 

  22. Tanaka, J.F.: How big is enough?: Sample size and goodness of fit in structural equation models with latent variables. Child Development 58, 136–146 (1987)

    Article  Google Scholar 

  23. Browne, M.W., Cudeck, R.: Alternative ways of assessing model fit. In: Bollen, K., et al. (eds.) Testing Structural Equation Models, pp. 137–162. Sage Publications, Thousand Oaks (1993)

    Google Scholar 

  24. Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proc. of the SIGCHI conference on Human Factors in computing systems (CHI 2006), pp. 581–590 (2006)

    Google Scholar 

  25. Camp, L.J.: "Design for Trust". In: Falcone, R. (ed.) Trust, Reputation and Security: Theories and Practice. Springer, Berlin (2003)

    Google Scholar 

  26. Hoffman, L.J., Lawson-Jenkins, K., Blum, J.: Trust beyond security: an expanded trust model. Communication of ACM 49(7), 94–101 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Murayama, Y., Hikage, N., Fujihara, Y., Hauser, C. (2008). The Structure of the Sense of Security, Anshin. In: Lopez, J., Hämmerli, B.M. (eds) Critical Information Infrastructures Security. CRITIS 2007. Lecture Notes in Computer Science, vol 5141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89173-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89173-4_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89095-9

  • Online ISBN: 978-3-540-89173-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics