Skip to main content

Sociotechnical Trust: An Architectural Approach

  • Conference paper
Conceptual Modeling – ER 2011 (ER 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6998))

Included in the following conference series:

  • 1468 Accesses

Abstract

Current approaches in sociotechnical systems consider trust to be either cognitive—referring to actors’ mental models of each other—or technical—referring to an actor’s trust of a technical artifact. In this paper, we take a more expansive view of trust: in addition to the cognitive, we also consider trust in the architectural sense. Broadly, architectural trust applies at the level of roles. Our principal claim is that sociotechnical systems are essentially specified in terms of architectural trust. Whereas previous work has considered dependencies between actors as a fundamental social relation, we claim that no dependency can exist without the corresponding architectural trust.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Credit card accountability responsibility and disclosure act of (2009), http://www.govtrack.us/congress/bill.xpd?bill=h111-627

  2. Asnar, Y., Giorgini, P., Massacci, F., Zannone, N.: From trust to dependability through risk analysis. In: Proceedings of the Second International Conference on Availability, Reliability and Security, pp. 19–26 (2007)

    Google Scholar 

  3. Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi-Agent Systems 8(3), 203–236 (2004)

    Article  MATH  Google Scholar 

  4. Castelfranchi, C., Tan, Y.-H.: The role of trust and deception in virtual societies. International Journal of Electronic Commerce 6(3), 55–70 (2002)

    Google Scholar 

  5. Standing Committee on The Food Chain and Animal Health. Food law implementation guidelines. World Wide Web electronic publication, January 2010, Lastchecked (December 2010)

    Google Scholar 

  6. Chopra, A.K., Dalpiaz, F., Giorgini, P., Mylopoulos, J.: Modeling and reasoning about service-oriented applications via goals and commitments. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 113–128. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Chopra, A.K., Dalpiaz, F., Giorgini, P., Mylopoulos, J.: Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 113–128. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Dewsbury, G., Sommerville, I., Clarke, K., Rouncefield, M.: A Dependability Model for Domestic Systems. In: Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. LNCS, vol. 2788, pp. 103–115. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering for trust management: Model, methodology, and reasoning. International Journal of Information Security 5, 257–274 (2006)

    Article  MATH  Google Scholar 

  10. Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: Using trust assumptions with security requirements. Requirements Engineering 11, 138–151 (2006)

    Article  MATH  Google Scholar 

  11. Jones, S., Wilikens, M., Morris, P., Masera, M.: Trust requirements in e-business. Communications of the ACM 43(12), 81–87 (2000)

    Article  Google Scholar 

  12. Lipner, S.: The trustworthy computing security development lifecycle. In: Proceedings of the 20th Annual Computer Security Applications Conference, pp. 2–13 (December 2004)

    Google Scholar 

  13. Mead, N.R., Jarzombek, J.: Advancing software assurance with public-private collaboration. IEEE Computer 43(9), 21–30 (2010)

    Article  Google Scholar 

  14. Siena, A., Armellin, G., Mameli, G., Mylopoulos, J., Perini, A., Susi, A.: Establishing regulatory compliance for information system requirements: An experience report from the health care domain. In: Parsons, J., Saeki, M., Shoval, P., Woo, C., Wand, Y. (eds.) ER 2010. LNCS, vol. 6412, pp. 90–103. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  15. Singh, M.P., Chopra, A.K., Desai, N.: Commitment-based service-oriented architecture. Computer 42(11), 72–79 (2009)

    Article  Google Scholar 

  16. Singh, M.P.: An ontology for commitments in multiagent systems: Toward a unification of normative concepts. Artificial Intelligence and Law 7, 97–113 (1999)

    Article  Google Scholar 

  17. Singh, M.P.: Trust as a basis for social computing (2010), http://www.csc.ncsu.edu/faculty/mpsingh/papers/positions/Trust-formal-architecture-talk.pdf

  18. Strens, R., Dobson, J.: How responsibility modelling leads to security requirements. In: Proceedings of the New Security Paradigms Workshop, pp. 143–149 (1993)

    Google Scholar 

  19. van Lamsweerde, A.: From system goals to software architecture. In: Bernardo, M., Inverardi, P. (eds.) SFM 2003. LNCS, vol. 2804, pp. 25–43. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chopra, A.K., Paja, E., Giorgini, P. (2011). Sociotechnical Trust: An Architectural Approach. In: Jeusfeld, M., Delcambre, L., Ling, TW. (eds) Conceptual Modeling – ER 2011. ER 2011. Lecture Notes in Computer Science, vol 6998. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24606-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24606-7_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24605-0

  • Online ISBN: 978-3-642-24606-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics