Trust modelling for online transactions: a phishing scenario

Trust is an important component of online transactions. The increasing amount and sophistication of spam, phishing, and other semantic attacks increase users' uncertainty about the consequences of their actions and their distrust towards other online parties. In this paper, we highlight some key characteristics of a model that we are developing to represent and compare the online trust decision processes of "expert" and "non-expert" computer users. We also report on preliminary data we are gathering to validate, refine, and apply our model. This research is part of a broader project that aims at developing tools and training modules to help online users make good trust decisions.

[1]  Jungwon Lee,et al.  What makes Internet users visit cyber stores again? key design factors for customer loyalty , 2000, CHI.

[2]  Susan Wiedenbeck,et al.  On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..

[3]  Alexander J. Rothman,et al.  Social psychology of health : key readings , 2003 .

[4]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[5]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[6]  Andrew S. Patrick,et al.  Building Trustworthy Software Agents , 2002, IEEE Internet Comput..

[7]  Michael G. Pollitt,et al.  The Economics of Trust, Norms and Networks , 2002 .

[8]  Diana C. Mutz Social Trust and E-Commerce Experimental Evidence for the Effects of Social Trust on Individuals’ Economic Behavior , 2005 .

[9]  Lorrie Faith Cranor,et al.  Security and Usability: Designing Secure Systems that People Can Use , 2005 .

[10]  Boon-Chye Lee,et al.  To Trust or Not to Trust? A Model of Internet Trust from the Customer's Point of View , 2001, Bled eConference.

[11]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[12]  Charles J. Kacmar,et al.  Trust in e-commerce vendors: a two-stage model , 2000, ICIS.

[13]  J. Horrigan,et al.  Trust and privacy online: Why Americans want to rewrite the rules , 2000 .

[14]  Min Wu Fighting phishing at the user interface , 2006 .

[15]  J. Cave The economics of cyber trust between cyber partners , 2004 .

[16]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[17]  Edward,et al.  Measuring Trust , 2000 .

[18]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[19]  Yao-Hua Tan,et al.  An outline of a trust model for electronic commerce , 2000, Appl. Artif. Intell..

[20]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[21]  Jens Riegelsberger,et al.  Trustbuilders and Trustbusters - The Role of Trust Cues in Interfaces to e-Commerce Applications , 2001, I3E.

[22]  C. L. Scott Interpersonal Trust: A Comparison of Attitudinal and Situational Factors , 1980 .

[23]  Jens Riegelsberger,et al.  The mechanics of trust: A framework for research and design , 2005, Int. J. Hum. Comput. Stud..

[24]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[25]  Lorrie Faith Cranor,et al.  Decision strategies and susceptibility to phishing , 2006, SOUPS '06.

[26]  Ildemaro Araujo,et al.  Developing trust in internet commerce , 2003, CASCON.

[27]  Luís M. B. Cabral,et al.  The Economics of Trust and Reputation : A Primer , 2005 .

[28]  M. Spence Job Market Signaling , 1973 .

[29]  Jonathan J. Oliver,et al.  Anatomy of a Phishing Email , 2004, CEAS.

[30]  Lance James,et al.  Phishing exposed , 2005 .

[31]  Russell Dean Vines,et al.  Phishing: Cutting the Identity Theft Line , 2005 .

[32]  Jens Riegelsberger,et al.  Shiny happy people building trust?: photos on e-commerce websites and consumer trust , 2003, CHI '03.

[33]  Min Wu,et al.  Do security toolbars actually prevent phishing attacks? , 2006, CHI.

[34]  B. J. Fogg,et al.  Persuasive technology: using computers to change what we think and do , 2002, UBIQ.

[35]  Ellen R. Tauber,et al.  Experts vs. Online Consumers: A Comparative Credibility Study of Health and Finance Web Sites , 2002 .

[36]  D. C. M. Platt Britain and Germany , 1993 .

[37]  Ewald A. Kaluscha,et al.  Empirical research in on-line trust: a review and critical assessment , 2003, Int. J. Hum. Comput. Stud..

[38]  Fn Florian Egger FROM INTERACTIONS TO TRANSACTIONS: Designing the Trust Experience for Business-to-Consumer Electronic Commerce , 2003 .

[39]  Gerald L. Lohse,et al.  International Differences in Information Privacy Concerns: A Global Survey of Consumers , 2004, Inf. Soc..

[40]  J. Doug Tygar,et al.  The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.

[41]  L. Mui,et al.  A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[42]  David Gefen,et al.  Reflections on the dimensions of trust and trustworthiness among online consumers , 2002, Data Base.

[43]  Lik Mui,et al.  A Computational Model of Trust and Reputation for E-businesses , 2002 .

[44]  Gerardo A. Guerra,et al.  Economics of Trust in the Information Economy: Issues of Identity, Privacy and Security , 2003 .

[45]  Anol Bhattacherjee,et al.  Individual Trust in Online Firms: Scale Development and Initial Test , 2002, J. Manag. Inf. Syst..