To Trust or Not to Trust - Six Recommendations for System Feedback in a Dynamic Environment
暂无分享,去创建一个
Manfred Tscheligi | Alexander G. Mirnig | Sandra Trösterer | Elke Beck | M. Tscheligi | Elke Beck | Sandra Trösterer
[1] Eric S. K. Yu,et al. A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs , 2007, ER.
[2] W. Keith Edwards,et al. Sesame: informing user security decisions with system visualization , 2008, CHI.
[3] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[4] Jason Bennett Thatcher,et al. Trust in a specific technology: An investigation of its components and measures , 2011, TMIS.
[5] Susan Wiedenbeck,et al. On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..
[6] L. Bogart. The Researcher's Dilemma , 1962 .
[7] Steven Hsu,et al. A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings , 2011, SOUPS.
[8] Lu Wang,et al. Trust and Reliance on an Automated Combat Identification System , 2009, Hum. Factors.
[9] Kim Sheehan,et al. Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..
[10] Deborah L. McGuinness,et al. Toward establishing trust in adaptive agents , 2008, IUI '08.
[11] R. Gurrea,et al. The role played by perceived usability, satisfaction and consumer trust on website loyalty , 2006, Inf. Manag..
[12] Heinrich Hußmann,et al. Data type based security alert dialogs , 2011, CHI EA '11.
[13] Alan Cooper,et al. About Face 3: the essentials of interaction design , 1995 .
[14] Andrew Sears and Julie A. Jacko. The human-computer interaction handbook , 2013 .
[15] Batya Friedman,et al. Trust online , 2000, CACM.
[16] Masooda Bashir,et al. A theoretical model for trust in automated systems , 2013, CHI Extended Abstracts.
[17] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[18] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[19] Jens Riegelsberger,et al. Ignore These At Your Peril: Ten principles for trust design , 2010, Trust 2010.
[20] J. Preece,et al. The Human-Computer Interaction Handbook , 2003 .
[21] Regina A. Pomranky,et al. The role of trust in automation reliance , 2003, Int. J. Hum. Comput. Stud..
[22] Richard Pak,et al. Decision support aids with anthropomorphic characteristics influence trust and performance in younger and older adults , 2012, Ergonomics.
[23] Jan H. P. Eloff,et al. Security and human computer interfaces , 2003, Comput. Secur..
[24] Jens Riegelsberger,et al. The mechanics of trust: A framework for research and design , 2005, Int. J. Hum. Comput. Stud..
[25] Anand K. Gramopadhye,et al. Measurement of trust over time in hybrid inspection systems: Research Articles , 2005 .
[26] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[27] Laurence W. Grimes,et al. Measurement of trust over time in hybrid inspection systems , 2005 .
[28] Daniel Belanche,et al. How to make online public services trustworthy , 2012, Electron. Gov. an Int. J..
[29] Alexander De Luca,et al. Using data type based security alert dialogs to raise online security awareness , 2011, SOUPS.
[30] Jens Riegelsberger,et al. The researcher's dilemma: evaluating trust in computer-mediated communication , 2003, Int. J. Hum. Comput. Stud..
[31] Ponnurangam Kumaraguru,et al. Privacy Indexes: A Survey of Westin's Studies , 2005 .
[32] Rashmi R. Sinha,et al. The role of transparency in recommender systems , 2002, CHI Extended Abstracts.
[33] Lorrie Faith Cranor,et al. Improving Computer Security Dialogs , 2011, INTERACT.