Title
Towards a theory of trust in networks of humans and computers
Abstract
We argue that a general theory of trust in networks of humans and computers must be build on both a theory of behavioraltrust and a theory of computationaltrust. This argument is motivated by increased participation of people in social networking, crowdsourcing, human computation, and socio-economic protocols, e.g., protocols modeled by trust and gift-exchange games [3,10,11], norms-establishing contracts [1], and scams [6,35,33]. User participation in these protocols relies primarily on trust, since on-line verification of protocol compliance is often impractical; e.g., verification can lead to undecidable problems, co-NP complete test procedures, and user inconvenience. Trust is captured by participant preferences (i.e., risk and betrayal aversion) and beliefs in the trustworthiness of other protocol participants [11,10]. Both preferences and beliefs can be enhanced whenever protocol noncompliance leads to punishment of untrustworthy participants [11,23]; i.e., it seems natural that betrayal aversion can be decreased and belief in trustworthiness increased by properly defined punishment [1]. We argue that a general theory of trust should focus on the establishment of new trust relations where none were possible before. This focus would help create new economic opportunities by increasing the pool of usable services, removing cooperation barriers among users, and at the very least, taking advantage of "network effects." Hence a new theory of trust would also help focus security research in areas that promote trust-enhancement infrastructures in human and computer networks. Finally, we argue that a general theory of trust should mirror, to the largest possible extent, human expectations and mental models of trust without relying on false methaphors and analogies with the physical world.
Year
DOI
Venue
2011
10.1007/978-3-642-25867-1_22
Security Protocols Workshop
Keywords
Field
DocType
human computation,new economic opportunity,new trust relation,focus security research,new theory,human expectation,protocol compliance,betrayal aversion,general theory,protocol noncompliance,computations,behavior,networks
Express trust,Social preferences,Internet privacy,Social network,Computer security,Computer science,Crowdsourcing,Betrayal,Risk aversion,Computational trust,Undecidable problem
Conference
Volume
ISSN
Citations 
7114
0302-9743
16
PageRank 
References 
Authors
1.22
17
2
Name
Order
Citations
PageRank
Virgil D. Gligor14133513.94
Jeannette M. Wing26429874.60