Qualitative Analysis for Trust Management : Towards a Model of Photograph Sharing Indiscretion

Grounded Theory provides a useful approach for eliciting and justifying subjective characteristics of individuals. A Grounded Theory analysis is carried on individuals who share pictures, with a view to developing a trust management policy model of indiscretion regarding the sharing of photographs.

[1]  Carolyn B. Seaman,et al.  Qualitative Methods in Empirical Studies of Software Engineering , 1999, IEEE Trans. Software Eng..

[2]  Jens H. Weber,et al.  Properties of Confidentiality Requirements , 2006, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06).

[3]  Ronald A. Howard,et al.  Influence Diagrams , 2005, Decis. Anal..

[4]  Paul Stenner,et al.  Social Psychology: A Critical Agenda , 1995 .

[5]  Cecilia Mascolo,et al.  Integrating security and usability into the requirements and design process , 2007, Int. J. Electron. Secur. Digit. Forensics.

[6]  R.I.A. Mercuri,et al.  Technology as Experience , 2005, IEEE Transactions on Professional Communication.

[7]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[8]  Lois W. Sayrs Interviews : an introduction to qualitative research interviewing , 1996 .

[9]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[10]  Butler W. Lampson,et al.  SPKI Certificate Theory , 1999, RFC.

[11]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[12]  Arnold Pacey,et al.  Meaning in Technology , 1999 .

[13]  A. Strauss,et al.  The Discovery of Grounded Theory , 1967 .

[14]  Arthur P. Bochner,et al.  Composing Ethnography: Alternative Forms of Qualitative Writing , 1999 .

[15]  Annie I. Antón,et al.  Analyzing Regulatory Rules for Privacy and Security Requirements , 2008, IEEE Transactions on Software Engineering.

[16]  Ronald L. Rivest,et al.  SDSI - A Simple Distributed Security Infrastructure , 1996 .

[17]  M. Hammersley The dilemma of qualitative method: Herbert Blumer and the Chicago tradition , 1991 .

[18]  Henry L. Roediger,et al.  Research Methods in Psychology , 1985 .

[19]  M. Angela Sasse,et al.  Users are not the enemy , 1999, CACM.

[20]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..