skip to main content
10.1145/1497185.1497269acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Patterns of trust in ubiquitous environments

Published:24 November 2008Publication History

ABSTRACT

In ubiquitous environments, users are exposed to public spaces and places where they are supposed to interact and provide also private information. In order to enhance user acceptance of such ubiquitous appliances they have to be designed to consider trust and trustworthiness already in the design phase. We focus on regarding trust in early phases and provide tools for designers by describing trust issues through patterns which are made available through design repositories. Such patterns help designers of ubiquitous applications to create designs quicker based on the availability of already proven solutions they can rely on.

References

  1. C. Alexander. A Pattern Language: Towns, Buildings, Construction (Center for Environmental Structure Series). Oxford University Press, 1977.Google ScholarGoogle Scholar
  2. C. Alexander. The Timeless Way of Building. Oxford University Press, 1979.Google ScholarGoogle Scholar
  3. L. Bass, B. E. John, and J. Kates. Achieving usability through software architecture. Technical report, Software Engineering Institute (SEI), Carnegie Mellon University, 2001.Google ScholarGoogle Scholar
  4. E. Chang, F. Hussain, and T. Dillon. Trust and Reputation for Service-Oriented Environments: Technologies For Building Business Intelligence And Consumer Confidence. John Wiley & Sons, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K. Chopra and W. A. Wallace. Trust in electronic environments. In HICSS '03: Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 9, page 331.1, Washington, DC, USA, 2003. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. M. Dearden and M. D. Harrison. Abstract models for hci;. International Journal of Human-Computer Studies, 46(1):151--177, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  7. E. Folmer, J. v. Gurp, and J. Bosch. A framework for capturing the relationship between usability and software architecture, 2003.Google ScholarGoogle Scholar
  8. D. Gambetta. Can we trust trust. In Trust: Making and Breaking Cooperative Relations, pages 213--237. Basil Blackwell, 1988.Google ScholarGoogle Scholar
  9. E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns Elements of Reusable Object-orientated Software. Addison -Wesley, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Grill and M. Blauhut. Design patterns applied in a uid process for safety critical environments (sces). In Proc. of the 4th Usability Symposium USAB 2008, submitted for review to USAB 2008. Springer-Verlag, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. K. Hussain and E. Chang. An overview of the interpretations of trust and reputation. Advanced International Conference on Telecommunications, 0:30, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. D. Lewis and A. Weigert. Trust as a social reality. Social Forces, 63(3):967--985, 1985.Google ScholarGoogle ScholarCross RefCross Ref
  13. N. Luhmann. Trust: Making and breaking cooperative relations, 2000.Google ScholarGoogle Scholar
  14. M. Madsen and S. Gregor. Measuring human-computer trust. In G. Gable and M. Viatle, editors, Proceedings of the 11th Australasian Conference on Information Systems, page p. 53ff, 2000.Google ScholarGoogle Scholar
  15. G. C. Moore and I. Benbasat. Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3):192--222, Sept. 1991.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. B. M. Muir and N. Moray. Trust in automation. part ii. experimental studies of trust and human intervention in a process control simulation. Ergonomics, 39(3):429--460, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  17. C. Nass and J. Steuer. Voices, boxes, and sources of messages computers and social actors. Human Communication Research, 19(4):504--527, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  18. C. Nass, J. Steuer, and E. R. Tauber. Computers are social actors. In CHI '94: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 72--78, New York, NY, USA, 1994. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Nielsen. Usability Engineering. Academic Press, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. A. Norman. The Design of Everyday Things. B&T, 1988.Google ScholarGoogle Scholar
  21. J. Riegelsberger, M. A. Sasse, and J. D. McCarthy. The mechanics of trust: a framework for research and design. Int. J. Hum.-Comput. Stud., 62(3):381--422, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Tidwell. Designing Interfaces. O'Reilly, first edition edition, November 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Tseng and B. J. Fogg. Credibility and computing technology. Commun. ACM, 42(5):39--44, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. van Welie and G. C. van der Veer. Pattern languages in interaction design. In INTERACT, 2003.Google ScholarGoogle Scholar
  25. M. V. Welie and H. Trætteberg. Interaction patterns in user interfaces. In Proc. Seventh Pattern Languages of Programs Conference: PLoP 2000, pages 13--16, 2000.Google ScholarGoogle Scholar

Index Terms

  1. Patterns of trust in ubiquitous environments

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      MoMM '08: Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
      November 2008
      488 pages
      ISBN:9781605582696
      DOI:10.1145/1497185

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 November 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader