To Trust or Not to Trust - Six Recommendations for System Feedback in a Dynamic Environment

[1]  Eric S. K. Yu,et al.  A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs , 2007, ER.

[2]  W. Keith Edwards,et al.  Sesame: informing user security decisions with system visualization , 2008, CHI.

[3]  Lorrie Faith Cranor,et al.  You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.

[4]  Jason Bennett Thatcher,et al.  Trust in a specific technology: An investigation of its components and measures , 2011, TMIS.

[5]  Susan Wiedenbeck,et al.  On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..

[6]  L. Bogart The Researcher's Dilemma , 1962 .

[7]  Steven Hsu,et al.  A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings , 2011, SOUPS.

[8]  Lu Wang,et al.  Trust and Reliance on an Automated Combat Identification System , 2009, Hum. Factors.

[9]  Kim Sheehan,et al.  Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..

[10]  Deborah L. McGuinness,et al.  Toward establishing trust in adaptive agents , 2008, IUI '08.

[11]  R. Gurrea,et al.  The role played by perceived usability, satisfaction and consumer trust on website loyalty , 2006, Inf. Manag..

[12]  Heinrich Hußmann,et al.  Data type based security alert dialogs , 2011, CHI EA '11.

[13]  Alan Cooper,et al.  About Face 3: the essentials of interaction design , 1995 .

[14]  Andrew Sears and Julie A. Jacko The human-computer interaction handbook , 2013 .

[15]  Batya Friedman,et al.  Trust online , 2000, CACM.

[16]  Masooda Bashir,et al.  A theoretical model for trust in automated systems , 2013, CHI Extended Abstracts.

[17]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[18]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[19]  Jens Riegelsberger,et al.  Ignore These At Your Peril: Ten principles for trust design , 2010, Trust 2010.

[20]  J. Preece,et al.  The Human-Computer Interaction Handbook , 2003 .

[21]  Regina A. Pomranky,et al.  The role of trust in automation reliance , 2003, Int. J. Hum. Comput. Stud..

[22]  Richard Pak,et al.  Decision support aids with anthropomorphic characteristics influence trust and performance in younger and older adults , 2012, Ergonomics.

[23]  Jan H. P. Eloff,et al.  Security and human computer interfaces , 2003, Comput. Secur..

[24]  Jens Riegelsberger,et al.  The mechanics of trust: A framework for research and design , 2005, Int. J. Hum. Comput. Stud..

[25]  Anand K. Gramopadhye,et al.  Measurement of trust over time in hybrid inspection systems: Research Articles , 2005 .

[26]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[27]  Laurence W. Grimes,et al.  Measurement of trust over time in hybrid inspection systems , 2005 .

[28]  Daniel Belanche,et al.  How to make online public services trustworthy , 2012, Electron. Gov. an Int. J..

[29]  Alexander De Luca,et al.  Using data type based security alert dialogs to raise online security awareness , 2011, SOUPS.

[30]  Jens Riegelsberger,et al.  The researcher's dilemma: evaluating trust in computer-mediated communication , 2003, Int. J. Hum. Comput. Stud..

[31]  Ponnurangam Kumaraguru,et al.  Privacy Indexes: A Survey of Westin's Studies , 2005 .

[32]  Rashmi R. Sinha,et al.  The role of transparency in recommender systems , 2002, CHI Extended Abstracts.

[33]  Lorrie Faith Cranor,et al.  Improving Computer Security Dialogs , 2011, INTERACT.