what-when-how
In Depth Tutorials and Information
11.2 TrustinSociotechnicalNetwork
Social norms that are based on the moral or spiritual values of people influence
all the interactions in the STNs. hey evolve to adapt to the development of
the network [8]. Trust is essential in social norms. In social sciences the widely
accepted definition of trust is “an attitude of positive expectation that one's vul-
nerabilities will not be exploited” [9,10]. However, in security, trust has been
recently defined as a “system or component whose failure can break the secu-
rity policy” [11]. he main diference between the two deinitions is that the
one from the social perspective pays attention to the interaction between people
and the one from security perspective emphasizes the feature of a secure system.
Figure  11.2 is from the research presented in [8,12]; it illustrates the model of
trust that consists of some factors determining the relationship between a trustor
and trustee. he main factors include Intrinsic Properties (Motivation, Ability,
lnternalized Norms, and Benevolence) and Contextual Properties (Temporal,
Social, and Institutional Embeddedness).
he establishment of a trust relationship depends upon both intrinsic properties
and contextual properties. Intrinsic properties, such as the propensity to take risks,
the benefits of engaging in a trust relationship, and the personal cost of break-
ing trust, are defined as the factors that are internal to the trustor and trustee;
law enforcement, expectations of future interactions, or reputation properties are
defined as the factors that exist outside both actors [8].
Trust plays a very important role in improving dependability of the social com-
ponent in STNs. Trust and the factors it includes seem to be consistent with secu-
rity policies, but sometimes they are contradictory and even worse; for instance,
Trustor
Trustee
Signal
Incentive
Ability
Ability
Motivation
Motivation
Temporal
Propensity
Internalized
Norms
Social
Institutional
Risks
Benevolence
Benefits
Context
Figure 11.2
Model of trust. (From Ivan Flechais et al. Divide and conquer:
Theroleoftrustandassuranceinthedesignofsecuresocio-technicalsystems.
September2005, NSPW '05: Proceedings of the 2005 Workshop on New Security
Paradigms ; Riegelsberger, J. et al. The mechanics of trust: A framework for
research and design. International Journal of Human Computer Studies 2004.
62(3),pp.381-422.)
Search WWH ::




Custom Search