trust l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Trust PowerPoint Presentation
Download Presentation
Trust

Loading in 2 Seconds...

play fullscreen
1 / 42

Trust - PowerPoint PPT Presentation


  • 338 Views
  • Uploaded on

Trust. Jason Chalecki. Usable Privacy and Security – Spring 2006. Not much trust. e-commerce sites 29% trust either "just about always" or "most of the time" 64% trust "only some of the time" or "never" consumer advice sites 33% trust 59% low levels of trust. An online problem?.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Trust' - oshin


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
trust

Trust

Jason Chalecki

Usable Privacy and Security – Spring 2006

not much trust
Not much trust
  • e-commerce sites
    • 29% trust either "just about always" or "most of the time"
    • 64% trust "only some of the time" or "never"
  • consumer advice sites
    • 33% trust
    • 59% low levels of trust
an online problem
An online problem?
  • small businesses
    • 68% trust
  • newspapers and television news
    • 58% trust
  • financial companies such as banks, insurance companies and stockbrokers
    • 55% trust
  • charities and other nonprofit organizations
    • 54% trust
  • federal government
    • 47% trust at least most of the time
lost or lacking trust
Lost or lacking trust
  • Napster (2003)
    • Very long pauses between songs. I dropped the service and haven’t been back, even though, when it worked, I loved it.
  • Jakob Nielsen (Alertbox 1999)
    • Would probably love the eFax service, but didn’t sign up because he would be locked in.
  • Amazon.com (1999)
    • They admitted that many favorable reviews had been paid for
    • But the flawed policy was terminated and the damage to the customer relationship was mended by an offer to refund any purchase that had been based on a paid recommendation.
trust is fundamental to security
Trust is fundamental to security
  • Lack of trust results in systems being ill-used or used not at all
  • Lack of understanding of trust results in wrong decisions or no decisions
  • Too much trust can be more dangerous than too little
    • E.g. I can open any file attachment because I run anti-virus software
fundamental questions
Fundamental questions
  • How to reliably represent trust in different interactions and interfaces
  • How to transform trust-based decisions into security decisions while maintaining the meaning of the trust-based decisions
  • What are the building blocks of trust
  • How is trust fallible
  • How can trust’s fallibility be addressed
definition
Definition
  • assured reliance on the character, ability, strength, or truth of someone or something (Merriam-Webster)
  • Concerns a positive expectation regarding the behavior of somebody or something in a situation that entails risk to the trusting party (Patrick, Briggs, and Marsh)
layers
Layers
  • Dispositional trust
    • Psychological disposition or personality trait to be trusting or not
  • Learned trust
    • A person’s general tendency to trust, or not to trust, as a result of experience
  • Situational trust
    • Basic tendencies are adjusted in response to situational cues
granularity
Granularity
  • I trust you
  • I trust you this much
  • I trust you this much to do this thing
another axis
Another axis
  • Hard trust
    • technology
  • Soft trust
    • social
processing strategies
Processing strategies
  • Heuristic approach making quick judgments from the obvious information
  • Systematic approach involving detailed analysis of information
credibility
Credibility
  • How is this different than trust?
credibility14
Credibility
  • How is this different than trust?
  • Credibility is believability
  • Trust is dependability
credibility and computing technology
“Credibility and Computing Technology”
  • Four Types of Credibility
    • Presumed credibility.
    • Reputed credibility.
    • Surface credibility.
    • Experienced credibility.
presumed credibility
Presumed credibility
  • Belief based on general assumptions
reputed credibility
Reputed credibility
  • Belief based on third-party reports
surface credibility
Surface credibility
  • Belief based on simple inspection
experienced credibility
Experienced credibility
  • Belief based on one’s own experience
credibility and computing technology20
“Credibility and Computing Technology”
  • Four Types of Credibility
    • Presumed credibility.
    • Reputed credibility.
    • Surface credibility.
    • Experienced credibility.
  • How do these relate to the layers of trust?
judgments of credibility
Judgments of credibility
  • Prominence
    • Involvement of the user
    • Topic of the web site
    • Nature of the user’s task
    • User’s experience
    • Individual differences
  • Interpretation
    • Assumptions in a user’s mind
    • Skills and knowledge possessed by user
    • Context for the user
slide22
Time
  • Initial trust
  • Interactions
  • Long-term trusted relationship
trustworthiness
Trustworthiness
  • Ability
    • Capacity to keep promises
  • Integrity
    • Actually keeping promises
  • Benevolence
    • Acting in another’s best interest
bhattacherjee s model

Familiarity

Willingness to Transact

Trust

Bhattacherjee’s Model

+

+

+

lee kim moon s model

Customer Loyalty

Comprehensive Information

Trust

Transaction Cost

Shared Value

Uncertainty

Number of Competitors

Specificity

Communication

Lee, Kim, & Moon’s Model

+

+

+

+

-

+

-

-

+

corritore s model

Credibility

Risk

Ease of Use

Corritore’s Model

Perception of:

External Factors

Trust

mcknight s model
McKnight’s Model

Disposition to Trust

Trusting Intentions (intention to engage in trust-related behaviors with a specific web vendor)

Trust Beliefs (perceptions of specific web vendor attributes)

Institution-Based Trust (perceptions of the Internet environment)

Trust-Related Behaviors

riegelsberger s model

TRUSTER

Separation in Space

TRUSTEE

+UNCERTAINTY

Riegelsberger’s Model

OutsideOption

Signals

Withdrawal

Trusting Action

Separation in Time

+UNCERTAINTY

Fulfillment

Nonfulfillment

models comparison
Models Comparison
  • Can be successfully operationalized, typically into questionnaires
  • Components of trust
    • Ability
    • Integrity
    • Benevolence
  • Many factors may affect trust
trust design guidelines
Ensure good ease of use.

Use attractive design.

Create a professional image – avoid spelling mistakes and other simple errors.

Don’t mix advertising and content – avoid sales pitches and banner advertisements.

Convey a “real-world” look and feel – for example, with use of high-quality photographs of real places and people.

Maximize the consistency, familiarity, or predictability of an interaction both in terms of process and visually.

Include seals of approval such as TRUSTe.

Provide explanations, justifying the advice or information given.

Include independent peer evaluation such as references from past and current users and independent message boards.

Provide clearly stated security and privacy statements, and also rights to compensation and returns.

Include alternative views, including good links to independent sites with the same business area.

Include background information such as indicators of expertise and patterns of past performance.

Clearly assign responsibilities (to the vendor and the customer).

Ensure that communication remains open and responsive, and offer order tracking or an alternative means of getting in touch.

Offer a personalized service that takes account of each client’s needs and preferences and reflects its social identity.

Trust Design Guidelines
stanford guidelines for web credibility
Stanford Guidelines for Web Credibility
  • Make it easy to verify the accuracy of the information on your site.
  • Show that there's a real organization behind your site.
  • Highlight the expertise in your organization and in the content and services you provide.
  • Show that honest and trustworthy people stand behind your site.
  • Make it easy to contact you.
  • Design your site so it looks professional (or is appropriate for your purpose).
  • Make your site easy to use – and useful.
  • Update your site's content often (at least show it's been reviewed recently).
  • Use restraint with any promotional content (e.g., ads, offers).
  • Avoid errors of all types, no matter how small they seem.

Stanford Persuasive Technology Lab

http://www.webcredibility.org/guidelines/

jakob nielsen s guidelines
Jakob Nielsen’s Guidelines
  • Design quality
  • Up-front disclosure
  • Comprehensive, correct, and current
  • Connected to the rest of the Web
  • Trust or Bust: Communicating Trustworthiness in Web Design
  • Jakob Nielsen's Alertbox, March 7, 1999
  • http://www.useit.com/alertbox/990307.html
guidelines comparison
Guidelines Comparison
  • Professional appearance and ease of use are very important
  • Be correct and verifiable
  • Be part of a larger community
trust question failings
Trust Question Failings
  • Often, the question being presented is a dilemma rather than a decision
  • Computers can’t help interpret emotional cues because they behave in a purely logical way
  • Users don’t want to deal with the trust issues presented to them
  • Users don’t want to reveal personal data
user behavior
User Behavior
  • What users say they do and what they actually do often differ
  • Users don’t necessarily want to think about the consequences of their behavior
  • Users make one-off decisions about trust
  • Users conceive of security and privacy issues differently than developers do
  • Users have many superstitions about how viruses are propagated
recommendations
Recommendations
  • Let users make trust decisions in context
  • Make the most trusted option the default selection
  • Present users with choices, not dilemmas
  • Always respect the user’s decision