Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-xm8r8 Total loading time: 0 Render date: 2024-06-25T21:22:02.515Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  05 March 2014

Richard H. R. Harper
Affiliation:
Microsoft Research, Cambridge
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Acton, H.B. (1974) The Idea of a Spiritual Power. London: Athlone Press.Google Scholar
Akerlof, G.A. (1970) “The Market for ‘Lemons’: Quality Uncertainty and the Market Mechanism,” The Quarterly Journal of Economics, Vol. 84, Issue 3: 488–500.CrossRefGoogle Scholar
Al-Ani, B., Trainer, E., and Redmiles, D. (2012) Trust and Surprise in Distributed Teams. ICIC’12 International Conference on Intercultural Collaboration, March 21–23, 2012, Bengaluru, India: 97–106.Google Scholar
Anderson, B. (1983) Imagined Communities. London: Verso.Google Scholar
Anderson, C. (2006) The Long Tail: Why the Future of Business is Selling Less of More. New York: Hyperion.Google Scholar
Anderson, R. (2009) Security Engineering. 2nd ed. Indianapolis, IN: Wiley Publishing.Google Scholar
Anderson, R., Hughes, J. and Sharrock, W. (1987) “The Division of Labour.” In Conein, B., De Fornel, M., Quere, L. (eds.) Les Formes de la Conversation. Paris: CNET, 237–252.Google Scholar
Anderson, R. and Moore, T. (2006) “The Economics of Information Security,” Science 314.5799: 610–613.CrossRefGoogle Scholar
Anderson, R. and Sharrock, W. (1993) “Can Organisations Afford Knowledge?Journal of Computer Supported Collaborative Work, Vol. 1, No. 1: 145–161.Google Scholar
Axelrod, R. (1980) “More Effective Choice in the Prisoner's Dilemma.” Journal of Conflict Resolution, 24(3), 379–403.CrossRefGoogle Scholar
Axelrod, R. (1984) The Evolution of Cooperation. New York: Basic Books.Google Scholar
Ba, S., Whinston, A.B., and Zhang, H. (2003) “Building Trust in Online Auction Markets through an Economic Incentive Mechanism.” Decision Support Systems, 35(3), 273–286.CrossRefGoogle Scholar
Bacharach, M. and Gambetta, D. (2001) “Trust in Signs.” Trust in Society, 2: 148–184.Google Scholar
Bäcke, M. (2011) “Make-Believe and Make-Belief in Second Life Role-Playing Communities.” Convergence: The International Journal of Research into New Media Technologies, 18(1): 85–92. DOI: 10.1177/1354856511419917.CrossRefGoogle Scholar
Bacon, F. (2000) [1620] The New Organon. Jardine, L. and Silverthorne, M. (eds.). Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Baier, A. (1986) “Trust and Antitrust,” Ethics, 96: 231–260.CrossRefGoogle Scholar
Baier, A. (1994) Moral Prejudices: Essays on Ethics. Cambridge, MA: Harvard University Press.Google Scholar
Bakardjieva, M. (2005) Internet Society: The internet in Everyday Life. London: Sage.Google Scholar
Bakardjieva, M. (2009) “Subactivism: Lifeworld and Politics in the Age of the Internet,” The Information Society, 25: 91–104.CrossRefGoogle Scholar
Bakos, Y. and Dellarocas, C. (2002) “Cooperation without enforcement? A comparative analysis of litigation and online reputation as quality assurance mechanisms”. Proceedings of the 23rd International Conference on Information Systems (127–142). Barcelona, Spain.Google Scholar
Baldamus, W. (1957) “The Relationship between Wage and Effort,” The Journal of Industrial Economics, Vol. 5, No. 3: 192–201.CrossRefGoogle Scholar
Ball, R. and Naylor, M. (2005) Form Follows Idea. London: Black Dog Publishing.Google Scholar
Ballani, H. Costa, P. Karagiannis, T. and Rowstron, A. (2011) “The Price Is Right: Towards Location-Independent Costs in Datacenters”, Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X).Google Scholar
Baron, N. (2008) Always On: Language in an Online and Mobile World. Oxford: Oxford University Press.CrossRefGoogle Scholar
Baym, N. (2011) “Social Networks 2.0.” In Consalvo, M. and Ess, C. (eds.) The Blackwell Handbook of Internet Studies. Oxford: Wiley-Blackwell, 384–405.CrossRefGoogle Scholar
BBC (2006) “Online video eroding TV viewing”, “.
Beautement, A.Sasse, A., and Wonham, M. (2008) “The Compliance Budget”. Proceedings of the NSPW ’08. March 22–29, Olympic Valley, California.Google Scholar
Beck, U. (1992) The Risk Society. New York: Sage.Google Scholar
Bell, D. (1996) “The Bell-Lapadula Model,” Journal of Computer Security, 4.2: 3.Google Scholar
Benhabib, S. (1986) Critique, Norm, and Utopia: A Study of the Foundations of Critical Theory. New York: Columbia University Press.Google Scholar
Bittner, E. (1965) “The Concept of ‘Organisation,’Social Research, Vol. 32, No. 3: 239–255.Google Scholar
Bittner, E. (1967) “The Police on Skid Row: Study of Peacekeeping,” American Sociological Review, Vol. 32, No. 5: 699–715.CrossRefGoogle Scholar
Bloom, J.A., Cox, I.J., Kalker, T.Linnartz, J.Miller, M. and Traw, C. (1999) “Copy Protection for DVD Video”, Proceedings of the IEEE 87.7: 1267–1276.CrossRef
Bockover, M.I. (2010) “Confucianism and Ethics in the Western Philosophical Tradition I: Foundational Concepts,” Philosophy Compass, 5(4), 307–316.CrossRefGoogle Scholar
Bowlby, J. (1969) Attachment and Loss, Vol. I: Attachment. New York: Basic Books.Google Scholar
boyd, D.M., Ellison, N.B. (2007) “Social network sites: Definition, history, and scholarship”, Journal of Computer-Mediated Communication, 13(1), article 11.CrossRefGoogle Scholar
Bromseth, J. and Sundén, J. (2011) “Queering Internet Studies: Intersections of Gender and Sexuality.” In Consalvo, M. and Ess, C. (eds.) The Blackwell Handbook of Internet Studies. Oxford: Wiley-Blackwell, 270–299.CrossRefGoogle Scholar
Brooks, F.P. (1987) “No Silver Bullet: Essence and Accidents of Software Engineering,” IEEE Computer, Vol. 20, No. 4 (April): 10–19.CrossRefGoogle Scholar
Brown, B.Green, N. and Harper, R. (eds.) (2001) Wireless World: Interdisciplinary Perspectives on the Mobile Age. Hiedleberg and Godalming, UK: Springer Verlag.Google Scholar
Burke, K. (1954) Permance and Change: An Anatomy of Purpose (3rd edition), Berkely and Los Angeles: University of California Press.Google Scholar
Bury, S.Ishmael, J.Race, N. and Smith, P. (2010) “Designing for Interaction with Mundane Technologies,” Personal Ubiquitous Computing, Vol. 14: 227–236.CrossRefGoogle Scholar
Bush, V. (1945) “As We May Think.” Atlantic Monthly. Available at .
Button, G. (1991) Ethnomethodology and the Human Sciences. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Button, G. (ed.) (1993) Technology in Working Order. London: Routledge.
Butkiewicz, M., Madhyastha, H.V. and Sekar, V. (2011) “Understanding website complexity: measurements, metrics, and implications”. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (IMC '11).
Cachin, C. and Schunter, M. (2011) “A Cloud You Can Trust.” IEEE Spectrum, Vol. 48, Issue 12, pp. 28–51. At: <>, accessed December 3, 2012.CrossRef
Cairncross, F. (1997) The Death of Distance. Boston, MA: Harvard Business School Press.Google Scholar
Carr, N. (2009) The Big Switch: Rewiring the World, from Edison to Google. London and New York: W.W. Norton and Co.Google Scholar
Carr, N. (2010) The Shallows: What the Internet Is Doing to Our Brains. London and New York: W.W. Norton.Google Scholar
Castells, M. (2002) The Internet Galaxy. Oxford: Oxford University Press.CrossRefGoogle Scholar
Castells, M. (2009) Communication Power. Oxford: Oxford University Press.Google Scholar
Carusi, A. (2008) “Scientific visualisations and aesthetic grounds for trust.” Ethics and Information Technology, 10, 243–254.CrossRefGoogle Scholar
Carusi, Annamaria. (2011) “Trust in the Virtual/Physical Interworld”. In Ess, C. and Thorseth, M. (eds.), Trust and Virtual Worlds: Contemporary Perspectives, 103–119. Oxford: Peter Lang.Google Scholar
Cavalier, R. (ed). (2005) The Impact of the internet on Our Moral Lives. Albany, NY: SUNY Press.Google Scholar
Cerf, V. (2010) “Trust and the Internet,” IEEE Internet Computing, September/October: Vol. 14, no 5: 95–96.CrossRefGoogle Scholar
Chen, T.M.Abu-Nimeh, S. (2011) “Lessons from Stuxnet,” IEEE Computer, 44(4): 91–93.CrossRefGoogle Scholar
Cheshire, C. (2011) “Online Trust, Trustworthiness, or Assurance?Daedalus, 140(4): 49–58.CrossRefGoogle ScholarPubMed
Churchland, P. (1084) Matter and Consciousness. Cambridge, MA: MIT Press.Google Scholar
Churchland, P.S. (1989) Neurophilosophy: Toward a Unified Science of the Mind/Body. Cambridge, MA: MIT Press.Google Scholar
Cicourel, A. (1968) The Social Organisation of Juvenile Justice. London: Heinemann.Google Scholar
Cicourel, A.V. (1972) “Basic and Normative Rules in the Negotiation of Status and Role.” In Sudnow, D. (ed.) Studies in Social Interaction. New York: The Free Press, 229–258.Google Scholar
CISCO (2012) Cisco Visual Networking Index: Forecast and Methodology, 2011–2016, May, CISCO.
Clark, A. and Chalmers, D. (1998) “The extended mind,” Analysis, 58, no 1: 7–19.CrossRefGoogle Scholar
Clark, D., Wroclawski, J.Sollins, K.R. and Braden, R. (2005) “Tussle in cyberspace: defining tomorrow's Internet.” ACM Transactions on Networking, Vol. 13, Issue 3: 462–475. ACM.CrossRefGoogle Scholar
Clarke, K., Hardstone, G., Rouncefield, M., and Sommerville, I. (eds.) (2006) Trust in Technology: A Socio-Technical Perspective. London: Springer.CrossRef
Coady, C.A.J. (1992) Testimony: A Philosophical Study. New York: Oxford University Press.Google Scholar
Cofta, P. (2001) The Trustworthy and Trusted Web. Delft, Netherlands: Now Publishers.Google Scholar
Coker, G., Guttman, J.D., Loscocco, P., Herzog, A.L., Millen, J., O’Hanlon, B., Ramsdell, J.D., Segall, A., Sheehy, J. and Sniffen, B.T. (2011) “Principles of remote attestation,” International Journal of Information Security, 10.2: 63–81.CrossRefGoogle Scholar
Coleman, J. (1990) Foundations of Social Theory. Cambridge, MA: Belknap Press.Google Scholar
Columbus, L. (2013) “Why Cloud Computing Is Slowly Winning The Trust War”, Forbes (March),
Cook, K. and Gerbasi, A. (2011) “Trust.” In Hedstrom, P. and Bearman, P. (eds.) The Oxford Handbook of Analytic Sociology. Oxford: Oxford University Press, 218–244.Google Scholar
Cornes, R. and Sandler, T. (1996) The Theory of Externalities, Public Goods, and Club Goods. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Corritore, C., Marble, R., Widenbeck, S., Kracher, B., and Chandran, A. (2005) “Measuring Online Trust of Websites: Credibility, Perceived Ease of Use, and Risk”. AMCIS 2005 Proceedings. Aug. 11–14th. Paper 370. Available at: <>.
Corritore, C.L., Kracher, B., and Wiedenbeck, S. (2003) “On-line Trust: Concepts, Evolving Themes, a Model,” International Journal of Human-Computer Studies, 58(6): 737–758.CrossRefGoogle Scholar
Coulter, J. and Sharrock, W. (2007) Brain, Mind, and Human Behaviour in Contemporary Cognitive Science: Critical assessments of the philosophy of Psychology. Lampeter, UK: Edwin Mullen Press.Google Scholar
Craig, E. (1990) Knowledge and the State of Nature. Oxford: Clarendon Press.Google Scholar
Davenport, T.H. and Patil, D.J. (2012) “Data Scientist: The Sexiest Job of the 21st Century,” Harvard Business Review, October.
Dasgupta, P. (1990) “Trust as a Commodity.” In Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations. Oxford: Blackwell, 49–72.Google Scholar
Davidow, W. (2011) Overconnected: What the Digital Economy Says about Us. London: Headline Publishing.Google Scholar
De Certeau, M. (1984) The Practice of Everyday Life. Berkeley: University of California Press.Google Scholar
Defoe, D. (1719) The Life and Adventures of Robinson Crusoe. References from 1965, Angus, Ross (ed.) London: Penguin.Google Scholar
Deleuze, G. (1990) The Logic of Sense. London: Continuum Press.Google Scholar
de Quervain, D., Fischbacher, U., Treyer, V., Schellhammer, M., Schnyder, U., Buck, A. & Fehr, E. (2004) “The Neural Basis of Altruistic Punishment,” Science, 305(5688), 1254–8.CrossRefGoogle ScholarPubMed
Deutsch, M. (1958) “Trust and Suspicion,” Journal of Conflict Resolution, 2: 265–279.CrossRefGoogle Scholar
Dhamija, R. and Tygar, J.D. (2005) “The Battle against Phishing: Dynamic Security Skins.” ACM International Conference Proceeding Series, Vol. 93: 77–88.Google Scholar
Dhamija, R., Tygar, J.D., and Hearst, M. (2006) “Why Phishing Works.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 22–27, Montreal, 581–590. ACM; doi>10.1145/1124772.1124861.CrossRef
Dibbell, J. (1993) “A Rape in Cyberspace.” (Originally published in The Village Voice, December 21, 1993: 36–42) <>, accessed March 9, 2013.
Diffie, W. and Hellman, M. (1976) “New Directions in Cryptography,” Information Theory, IEEE Transactions, 22.6: 644–654.CrossRefGoogle Scholar
Donath, J. and Boyd, D. (2004) “Public Displays of Connection,” BT Technology Journal, 22(4), 71–82.CrossRefGoogle Scholar
Durkheim, E. (1897) On Suicide. London: Classics Penguin.Google Scholar
Durkheim, E. (1933) The Division of Labour in Society. New York: Free Press.Google Scholar
eBay (2012) “High Positive Feedback but Still a SCAM: eBay Guides.” .
Egger, F.N. (2001) “Affective Design of e-Commerce User Interfaces: How to Maximise Perceived Trustworthiness,” in Helender, M.Khalid, H. and Tham, M. (Eds) Procedures of the International Conference of Affective Human Factors Design, June 27–29, London: Asean Academic Press, 317–324.Google Scholar
Eisenstein, E. (2005) The Printing Revolution in Early Modern Europe. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Ellison, C. and Schneier, B. (2000) “Ten risks of PKI: What you're not being told about public key infrastructure,” Computer Security Journal, 16.1: 1–7.Google Scholar
Emory, F. and Trist, E. (1972) Toward a Social Ecology. London: Plenum Press.Google Scholar
Engelbart, D. (1962) Augmenting Human Intellect: A Conceptual Framework. Stanford, CA: Stanford Research Institute.CrossRefGoogle Scholar
Erikson, E.H. (1977) Childhood and Society. London: Paladin Books.Google Scholar
Ess, C. (2010) “Trust and New Communications Technologies,” Knowledge, Technology and Policy, Vol. 23: 287–305.CrossRefGoogle Scholar
Ess, C. (2010a) “The Embodied Self in a Digital Age: Possibilities, Risks, and Prospects for a Pluralistic (Democratic/Liberal) Future?Nordicom Information, 32(2), June: 105–118; <>.Google Scholar
Ess, C. (2010b) “Trust and New Communication Technologies: Vicious Circles, Virtuous Circles, Possible Futures,” Knowledge, Technology, and Policy, 23: 287–305; DOI 10.1007/s12130-010-9114-8.CrossRefGoogle Scholar
Ess, C. (2012) “At the Intersections between Internet Studies and Philosophy: ‘Who Am I Online?’ (Introduction to Special Issue),” Philosophy & Technology, Vol. 25, Iss. 3 (September): 275–284; DOI 10.1007/s13347-012-0085-4.CrossRefGoogle Scholar
Ess, C. (2013a) Digital Media Ethics (2nd ed). Cambridge: Polity Press.Google Scholar
Ess, C. (2013b) “The Onlife Manifesto: Philosophical Backgrounds, and the Futures of Democracy Media Usages and Equaylit,” <>
Ess, C. and Thorseth, M. (eds.) (2011) Trust and Virtual Worlds. New York: Peter Lang.
Faisal, M. and Alsumait, A. (2011) “Social Network Privacy and Trust Concerns,” iiWAS2011, (The 13th International Conference on Information Integration and Web-based Applications and Services) December 5–7, 2011, Ho Chi Minh City, Vietnam, 416–419.CrossRef
Fehr, E. (2009) “The Economics and Biology of Trust,” Journal of the European Economic Association, April/May, 7(2–3): 235–266.CrossRefGoogle Scholar
Flechais, I., Riegelsberger, J. and Sasse, M.A. (2005) “Divide and Conquer: The Role of Trust and Assurance in the Design of Secure Socio-Technical Systems,” Proceedings of the 2005 Workshop on New Security Paradigms, 33–41; ACM.
Floridi, L. (ed.) (2010) The Cambridge Handbook of Information and Computer Ethics. Cambridge: Cambridge University Press.CrossRef
Floridi, L. (2011) “The Construction of Personal Identities Online,” Minds & Machines, 21: 477–479. DOI 10.1007/s11023-011-9254-y.CrossRefGoogle Scholar
Floridi, L. (2012) “Distributed Morality in an Information Society,” Science and Engineering Ethics, Sept, Vol. 19, Issue 3, 727–743. DOI 10.1007/s11948-012-9413-4.CrossRefGoogle Scholar
Floridi, L. (forthcoming) The Fourth Revolution – The Impact of Information and Communication Technologies on Our Lives. Oxford: Oxford University Press.
Fogel, J. and Nehmad, E. (2009) “Internet Social Network Communities,” Computers in Human Behaviour, Vol. 25: Issue 1, January, 153–160.CrossRefGoogle Scholar
Fogg, B.J. (April 2003) “Prominence-Interpretation Theory: Explaining How People Assess Credibility Online,” CHI’03 Extended Abstracts on Human Factors in Computing Systems, 722–723; ACM.
Fox-IT (August 2012) “Black Tulip: Report of the Investigation into the DigiNotar Certificate Authority Breach,” .
Friedell, E. (1960) Kulturgeschichte der Neuzeit. München: C.H. Beck.CrossRefGoogle Scholar
Fukuyama, F. (1995) Trust: The Social Virtue and the Creation of Prosperity. New York: Free Press.Google Scholar
Gal, S. (2002) “A Semiotics of the Public/Private Distinction,” Differences: A Journal of Feminist Cultural Studies, 13(2002): 77–95.CrossRefGoogle Scholar
Gambetta, D. (ed.). (1988) Trust: Making and Breaking Co-operative Relations. Oxford: Basil Blackwell.
Gambetta, D. (1990) “Can We Trust Trust?.” In Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations. Oxford: Blackwell, 213–245.Google Scholar
Garfinkel, H. (1956) “Conditions of Successful Degradation Ceremonies,” American Journal of Sociology, Vol. 61, No. 2: 420–424.CrossRefGoogle Scholar
Garfinkel, H. (1963a) “Parsons’ Solution to the Problem of Social Order as a Method for making Everyday Activities Observable ‘From the Point of View of the Action,’” Unpublished manuscript.
Garfinkel, H. (1963b) “A Conception of, and Experiments With, ‘Trust’ as a Condition of Stable Concerted Actions,” in Harvey, O.J. (ed.) Motivation and Social Interaction. New York: The Ronald Press, 187–238.Google Scholar
Garfinkel, H. (1967) Studies in Ethnomethodology. Englewood Cliffs, NJ: Prentice Hall.Google Scholar
Garfinkel, H. (2002) Ethnomethodology's Program. Lanham: Rowman and Littlefield.Google Scholar
Geertz, C. (1973) The Interpretation of Cultures. New York: Basic Books.Google Scholar
Geertz, C. (1995) After the Fact: Two Countries, Four Decades, One Anthropologist. Cambridge, MA: Harvard University Press.Google Scholar
Gergen, K. (2009) Relational Being. Oxford: Oxford University Press.Google Scholar
Gettier, E. (1963) “Is Justified True Belief Knowledge?Analysis, 23: 121–123.CrossRefGoogle Scholar
Gibson, J.J. (1979) The Ecological Approach to Visual Perception. New York: Houghton Mifflin.Google Scholar
Gibson, W. (1984) Neuromancer. New York: Ace Books.Google Scholar
Giddens, A. (1990) The Consequences of Modernity. Stanford, CA: Stanford University Press.Google Scholar
Gilligan, C. (1982) In a Different Voice: Psychological Theory and Women's Development. Cambridge, MA: Harvard University Press.Google Scholar
Gligor, V. and Wing, J. (2011) “Towards a Theory of Trust in Networks of Humans and Computers”, 19th International Workshop on Security Protocols, LNCS, March, 28–30, Berlin.Google Scholar
Goethe, J.W. von (1925) Aus meinem Leben. Dichtung und Wahrheit. Goethes Sämtliche Werke, Band III, Leipzig: Insel-Verlag.Google Scholar
Goffman, E. (1959) The Presentation of Self in Everyday Life. Garden City, New York: Doubleday.Google Scholar
Goffman, E. (1962) Asylums. New York: Doubleday Anchor Books.Google Scholar
Golić, J.D. (1997) “Cryptanalysis of Alleged A5 Stream Cipher.” Advances in Cryptology – EUROCRYPT’97. Berlin Heidelberg: Springer.Google Scholar
Gomer, R., Rodrigues, E.M., Milic-Frayling, N. and Schraefel, M.C. (2013) “Network Analysis of Third Party Tracking: User Exposure to Tracking Cookies through Search”. In the Proc. of 2013 IEEE/WIC/ACM Int. Conf. on Web Intelligence (WI) and Intelligent Agent Technology (IAT), (WI-IAT’13), Atlanta, GA, USA, Nov. 17–20.CrossRef
Good, D. (1990) “Individuals, Interpersonal Relations, and Trust”. In Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations. Oxford: Blackwell, 31–48.Google Scholar
Goodwin, C. (1981) Conversational Organization: Interaction between Speakers and Hearers. New York: Academic Press.Google Scholar
Google (2005) “Search Gets Personal,” At <>, retrieved March 23, 2012.
Google (2012) “Basics: Search History Personalization,” At <>, retrieved March 23, 2012.
Google (2009) “Personalized Search for Everyone,” At <>, retrieved March 23, 2012.
Govier, T. (1993) “An Epistemology of Trust,” International Journal of Moral and Social Studies 8: 155–174.Google Scholar
Govier, T. (1997) Social Trust and Human Communities. Montreal: McGill-Queen's University Press.Google Scholar
Grabner-Kräuter, S. and Kaluscha, E.A. (2003) “Empirical Research in On-line Trust: A Review and Critical Assessment,” International Journal of Human-Computer Studies, 58(6): 783–812.CrossRefGoogle Scholar
Grant, R.G. (1993) “The Politics of Equilibrium,” Inquiry 35: 423–446.CrossRefGoogle Scholar
Gray, M. (2009) Out in the Country: Youth, Media, and Queer Visibility in Rural America. New York: NYU Press.Google Scholar
Green, N.Harper, R., Murtagh, G., and Cooper, G. (2001) “Configuring the Mobile User: Sociological and Industry Models of the Consumer,” Journal of Personal and Ubiquitous Computing, Vol. 5 Issue 2, July 147–156.CrossRefGoogle Scholar
Gutmann, P. (2013) Security Usability. A draft manuscript, Retrieved from: .
Hallam, R.S. (2009) Virtual Selves, Real Persons: a Dialogue across Disciplines. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Hamilton, J. (2010) “Cloud Computing Economies of Scale,” MIX2010 presentation, .
Hamilton, J. (2012) “I Love Solar Power But…” (March); .
Hamilton, J. (2013) “Customer Trust,” (January), .
Han, S., Jung, J.Wetherall, D. (2012) “A Study of Third-Party Tracking by Mobile Apps in the Wild,” Technical Report, UW-CSE-12-03-01, March.
Handy, C. (1995) “Trust and the Virtual Organization,” Harvard Business Review, 73(3): 40–50.Google Scholar
Handley, M. (2006) “Why The Internet Only Just WorksBT Technology Journal, Vol. 24, No 3, July.CrossRefGoogle Scholar
Hardin, R. (2002) Trust and Trustworthiness. New York: Russell Sage Foundation.Google Scholar
Hardy, G.H. and Snow, C.P. (1967) A Mathematician's Apology. Cambridge: Cambridge University Press.Google Scholar
Harper, R. (2005) “The Moral Order of Text: Explorations in the Social Performance of SMS.” In Hoflich, J. and Gebhart, J. (eds) Mobile Communication–Perspectives and Current Research Fields. Berlin: Peter Lang GmbH–Europäischer Verlag der Wissenschaften, 99–222.Google Scholar
Harper, R. (2010) Texture: Human Expression in the Age of Communications Overload. Cambridge, MA: The MIT Press.Google Scholar
Harper, R., Evergeti, V., Hamill, L., and Shatwell, B. (2003) “The Social Organisation of Communication in the Home of the 21st Century: An analysis of the Future of Paper-Mail and Implications for the Design of Electronic Alternatives,” The Journal of Cognition, Technology and Work, 5: 5–22.Google Scholar
Harper, R. and Hamill, L. (2005) “Kids will be Kids: the Role of Mobiles in Teenage Life.” In Hamill, L. and Lasen, A. (eds.) Mobile World Past, Present and Future, Springer-Verlag: Godalming, UK, 61–73.Google Scholar
Harper, R. and Hughes, J. (1993) “What a F*****g System!” In Button, G. (ed) Technology in Working Order. London: Routledge, 127–144.Google Scholar
Harrison, S. and Dourish, P. (1996) “Re-Place-ing Space: The Roles of Place and Space in Collaborative Systems.” Proceedings of CSCW’96. New York: ACM Press.Google Scholar
Harvey, O.J. (1963) (ed) Motivation and Social Interaction. New York: The Ronald Press.Google Scholar
Harvey, N., Harries, C., and Fischer, I. (2000) “Using Advice and Assessing its Quality,” Organizational Behaviour and Human Decision Processes, 81(2): 252–273.CrossRefGoogle ScholarPubMed
Hayes, B. (2008) “Cloud Computing,” Communications of the ACM, 51(7): 9–11.
Hendrik, S. and Mochalski, K. (2009) “Internet Study” 2008/2009. IPOQUE Report 37: 351–362.
Henrich, J., Boyd, R., Bowles, S., Camerer, C., Fehr, E., and Gintis, H. (2004) Foundations of Human Sociality: Economic Experiments and Ethnographic Evidence from Fifteen Small Scale Societies. Oxford: Oxford University Press.CrossRefGoogle Scholar
Henrich, J., Boyd, R., Bowles, S., Camerer, C., Fehr, E., Gintis, H., and McElreath, R. (2013) “In Search of Homo Economicus: Behavioural Experiments in 15 Small-Scale Societies,” The American Economic Review, Vol. 91, No. 2: 73–78.CrossRefGoogle Scholar
Heritage, J. (1978) “Aspects of the Flexibilities of Natural Language Use: A Reply to Phillips,” Sociology, Vol. 12, No. 1 (January): 79–104.CrossRefGoogle Scholar
Herley, C. (2009) “So Long, and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users,” Proceedings of the 2009 workshop on new security paradigms workshop, 133–144; ACM.
Herley, C. (2012) “Why do Nigerian Scammers Say They are from Nigeria?” Proceedings of the Workshop on the Economics of Information Security, June 25–26, Berlin. Herley, C. (2013) “When Does Targeting Make Sense for an Attacker?IEEE Security & Privacy, 11(2): 89–92.CrossRefGoogle Scholar
Hertzberg, L. (1988) “On the Attitude of Trust,” Inquiry 31, 307–322. Reprinted in Hertzberg, L. (1994) “The Limits of Experience,” Acta Philosophica Fennica, Vol. 56, 113–130.Google Scholar
Hobbes, T. (1985 [1651]) Leviathan. London: Penguin.Google Scholar
Hollis, M. (1998) Trust within Reason. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Holm, J. (1988) Pidgins and Creoles: Vol. 1, Theory and Structure. Cambridge: Cambridge University Press.Google Scholar
Holton, R. (1994) “Deciding to Trust, Coming to Believe,” Australasian Journal of Philosophy 72: 63–76.CrossRefGoogle Scholar
Hongladarom, S. (2007) “Analysis and Justification of Privacy from a Buddhist Perspective.” In Hongladarom, S. and Charles, Ess (eds.) Information Technology Ethics: Cultural Perspectives. Hershey, PA: Idea Group Reference, 108–22.CrossRefGoogle Scholar
Horn, D.B., Olson, J.S., Karasik, L. (2002) “The Effects of Spatial and Temporal Video Distortion on Lie Detection Performance.” In CHI2002 Extended abstracts. ACM Press, New York, NY, 716–718.Google Scholar
Hu, X., Lin, Z., and Zhang, H. (2003) “Myth or Reality: Effect of Trust-Promoting Seals in Electronic Markets,” Trust in the Network Economy, Petrovic, O.Posch, R. and Marhold, F. (Eds), Springer, Berlin, 143–150.CrossRefGoogle Scholar
Hughes, J., Shapiro, D., Sharrock, W. and Anderson, R. (1988) “The Automation of Air Traffic Control.” Final Report SERC/ESRC Grant No. GR/D/86157. Swindon, UK: Economic and Social Sciences Research Council.Google Scholar
Hughes, J. and Sharrock, W. (2007) Theory and Methods in Sociology. Basingstoke: Plagrave.CrossRefGoogle Scholar
Husserl, E. (1936) The Cartesian Meditations. The Hague: Martinus Nijhoff.Google Scholar
Idhe, D. (2009) Postphenomenology and Technoscience. New York: SUNY Press.Google Scholar
Ingold, T. (2011) Being Alive: Essays on Movement, Knowledge and Description. Abingdon, UK: Routledge.Google Scholar
Innis, H. (1951) The Bias of Communication. Toronto: University of Toronto Press.Google Scholar
Innis, H. (1972) Empire and Communications. Toronto: University of Toronto Press.Google Scholar
Jackson, F. (1998) From Metaphysics to Ethics: A Defence of Conceptual Analysis. Oxford: Clarendon Press.Google Scholar
Jackson, F. (2005) “Ramsey Sentences and Avoiding the Sui Generis.” In Lillehammer, and Mellor, (eds), Ramsey's Legacy, Oxford: Oxford University Press, 122–136.Google Scholar
Jackson, J. (2001) Truth, Trust, and Medicine. London: Routledge.Google Scholar
Jarvenpaa, S., Tractinsky, N., and Vitale, M. (2000) “Consumer Trust in an Internet Store,” Information Technology and Management 1(1–2) 45–71.CrossRefGoogle Scholar
Jeanneney, J. (2007) Google and the Myth of Universal Knowledge: A View from Europe. Trans. Fagan, T.L.Chicago and London: The University of Chicago Press.Google Scholar
Jenson, C.S., Sarkarm, C.J., Poots, C. (2007) “Tracking Website Data-Collection and Privacy Practices with the iWatch Web Crawler,” Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS’07, New York, ACM: 29–40.CrossRefGoogle Scholar
Jones, K. (1996) “Trust as an Affective Attitude,” Ethics 107, 4–25.CrossRefGoogle Scholar
Johnson, S. (2012) Future Perfect: The Case For Progress In A Networked Age. New York: Riverhead Books.Google Scholar
Kahn, D. (1996) The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. London: Scribner.Google Scholar
Kahnemann, D. (2011) Thinking, Fast, Slow. London: Allen Lane.Google Scholar
Kant, I. ([1785] 1959) Foundations of the Metaphysics of Morals. Trans. Beck, L.W.Indianapolis, IN: Bobbs-Merrill.Google Scholar
Kaplan, A. (1964) The Conduct of Inquiry. San Francisco, CA: The Chandler Publishing.Google Scholar
Karagiannis, T., Broido, A., Brownlee, N., Claffy, K.C., and Faloutsos, M. (2004) “Is P2P dying or just hiding?”. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM).
Kendall, L. (2011) “Community and the Internet.” In Consalvo, M. and Ess, C. (eds.) The Blackwell Handbook of Internet Studies. Oxford: Wiley-Blackwell, 310–325.Google Scholar
Kerckhoffs, A. (1883) “La Cryptographie Militaire,Journal des Sciences Militaires, Vol. IX, pp. 5–83.Google Scholar
Kerr, I. (2010) “The Devil is in the Defaults,” Ottawa Citizen, May 29, 2010. Available at <>, retrieved March 23, 2012.
Kickstarter (2012) “Kickstarter Is Not a Store.” . Accessed 18/12/2012.
Kim, D.J., Ferrin, D.L., and Rao, H.R. (2008) “A Trust-Based Consumer Decision-Making Model in Electronic Commerce: The Role of Trust, Perceived Risk, and Their Antecedents,” Decision Support Systems, 44(2), 544–564.CrossRefGoogle Scholar
Kimery, K.M. and McCard, M. (2002) “Third-Party Assurances: Mapping the Road to Trust in e-Retailing,” Journal of Information Technology Theory and Application, Vol. 4 No. 2: 63–82.Google Scholar
Kirlappos, I., Sasse, M., and Harvey, N. (2012) “Why Trust Seals Don't Work: A Study of User Perceptions and Behaviour,” Trust and Trustworthy Computing, 308–324.CrossRef
Kirlappos, I. and Sasse, M.A. (2012) “Security Education against Phishing: A Modest Proposal for a Major Rethink,” Security & Privacy, IEEE 10(2): 24–32.CrossRefGoogle Scholar
Kitiyadisai, K. (2005) “Privacy Rights and Protection: Foreign Values in Modern Thai Context,” Ethics and Information Technology, 7(1): 17–26.CrossRefGoogle Scholar
Kohn, M. (2008) Trust: Self-Interest and the Common Good. Oxford: Oxford University Press.Google Scholar
Kondor, Z. (2009) “Communication and the Metaphysics of Practice: Sellarsian Ethics Revisited,” in Nyírí, K. (ed.), Engagement and Exposure: Mobile Communication and the Ethics of Social Networking. Vienna: Passagen, 179–87.Google Scholar
Kramer, R. (1999) “Trust and Distrust in Organizations: Emerging Perspectives, Enduring Questions,” Annual Review of Psychology, 50: 569–98.CrossRefGoogle ScholarPubMed
KPCB (2012) Internet Trends: Kleiner Perkins Caufield & Byers.
Labovitz, C . Iekel-Johnson, S.McPherson, D., Oberheide, J. and Jahanian, F. (2010) “Internet inter-domain traffic”. In Proceedings of the ACM SIGCOMM 2010 conference (SIGCOMM '10).
Lagerspetz, O. (1998) Trust: The Tacit Demand. Kluwer: Dordrecht.CrossRefGoogle Scholar
Lagerspetz, O. and Hertzberg, L. (2013) “Wittgenstein on Trust.” In Mäkelä, P. and Townley, C. (ed.) Trust: Analytic and Applied Perspectives. Amsterdam: Rodopi Press: 31–51.Google Scholar
Lahno, B. (2002) Institutional Trust: A Less Demanding Form of Trust? Caracas: Revista Latinoamericana de Estudios Avanzados (RELEA).
Lampson, B.W. (2004) “Computer Security in the Real World,” IEEE Computer 37(6): 37–46.CrossRefGoogle Scholar
Lange, P.G. (2007) “Publicly Private and Privately Public: Social Networking on YouTube,” Journal of Computer-Mediated Communication, 13(1): 361–380. <>CrossRefGoogle Scholar
Lankton, N. and McKnight, D. (2011) “What Does it Mean to Trust Facebook?” The Database for Advances in Information Systems, Vol. 42, No. 2: 32–54.CrossRefGoogle Scholar
Lee, J. (2002) “Making Losers of Auction Winners,” New York Times. .
Lee, M.K. and Turban, E. (2001) “A Trust Model for Consumer Internet Shopping,” International Journal of Electronic Commerce 6, 75–92.CrossRefGoogle Scholar
Lefebrve, H. (2004) Rhythmanalysis: Space, Time and Everyday Life. Trans. Elden, S. and Moore, G.London: Verso Books.Google Scholar
Leinwand, A. (2013) “Is it Too Easy for Your Cloud Provider to Snoop on Your Business?” GIGAOM, January 2013; .
Lessig, L. (2008) Remix. London: Penguin.CrossRefGoogle Scholar
Lillehammer, H. and Mellor, D. (eds.) (2005) Ramsey's Legacy. Oxford: Clarendon Press.
Løgstrup, K.E. (1956) Den Etiske Fordring [The Ethical Demand]. Copenhagen: Gyldendal (Published in English as Løgstrup, K.E. (1971) The Ethical Demand, Philadelphia: Fortress Press.)Google Scholar
Lohr, S. (2012) “The Age of Big Data”, The New York Times, February.
Lord, C., Ross, L., and Lepper, M. (1979) “Biased Assimilation and Attitude Polarization: The Effects of Prior Theories on Subsequently Considered Evidence,” Journal of Personality and Social Psychology 37(11): 2098–2109.CrossRefGoogle Scholar
Luhmann, N. (1990) “Familiarity, Confidence, Trust: Problems and Alternatives.” In Gambetta, D. (ed.) Trust: Making and Breaking Co-operative Relations. Oxford: Basil Blackwell, 94–107.Google Scholar
Lyas, C. (1999) Peter Winch. London: Acumen Publishing.Google Scholar
MacDonald, R. (2012) “Can we Trust Cloud Computing, ISPs and Social Networks? Public Service Europe.” At: <>, accessed December 3, 2012.
Mackenzie, C. (2008) “Relational Autonomy, Normative Authority and Perfectionism,” Journal of Social Philosophy 39(4, Winter): 512–533.CrossRefGoogle Scholar
Martin, D. (1984) “Mother Wouldn't Like It!: Housework as Magic,” in Theory, Culture and Society, Los Angeles: Sage, 19–37.Google Scholar
Massey, D. (2005) For Space. Los Angeles: Sage.Google Scholar
Masum, H. and Tovey, M. (2011) The Reputation Society. Boston, MA: MIT Press.Google Scholar
Mayer-Schönberger, V. and Cukier, K. (2013) Big Data: A Revolution That Will Transform How We Live, Work and Think. London: John Murray.Google Scholar
Mayer, J.R. and Mitchell, J.C. (2012) “Third-Party Web Tracking: Policy and Technology.” Proceedings of the 2012 IEEE Symposium on Security and Privacy, 413–427.CrossRef
Mayer, R., Davis, J., and Schoorman, F.D. (1995) “An Integrative Model of Organizational Trust,” Academy of Management Review, 20(3), 709–734.CrossRefGoogle Scholar
McCarthy, T. (1978) The Critical Theory of Jürgen Habermas. Cambridge: Hutchinson Press.Google Scholar
McGinn, C. (2012) Truth by Analysis: Games, Names, and Philosophy. Oxford: Oxford University Press.Google Scholar
McKinsey Global Institute (June 2011) “Big data: The next frontier for innovation, competition, and productivity.”
McLuhan, M. (1964) Understanding Media: The Extensions of Man. New York: McGraw-Hill.Google Scholar
McMyler, B. (2011) Testimony, Trust, and Authority. Oxford: Oxford University Press.CrossRefGoogle Scholar
Mead, G.H. ([1934] 1967) Mind, Self & Society. Chicago, IL: Chicago University Press.Google Scholar
Merton, R.K. (1972) “Insider and Outsiders: A Chapter in the Sociology of Knowledge,” American Journal of Sociology, Vol. 78, No. 1 (July): 9–47.CrossRefGoogle Scholar
Meyrowitz, J. (1985) No Sense of Place. Oxford: Oxford University Press.Google Scholar
Mikians, J., Gyarmati, L., Erramilli, V. and Laoutaris, N. (2012) “Detecting price and search discrimination on the Internet”. In Proceedings of the 11th ACM Workshop on Hot Topics in Networks (HotNets-XI).
Milgram, S. (1963) “Behavioral Study of Obedience,Journal of Abnormal and Social Psychology 67(4): 371–8.CrossRefGoogle Scholar
Mill, J.S. (1956 [1859]) On Liberty. Indianapolis: Bobbs-Merrill, Indianapolis.Google Scholar
Miller, D. (2009) The Comfort of Things. Cambridge: Polity Press.Google Scholar
Miller, R. (2009) “Inside Microsoft's Chicago Data Center”, Data Centre Knowledge, Oct 1st.
Mills, C. Wright. (1952) White Collar: The American Middle Classes. Oxford: Oxford University Press.Google Scholar
Mitzal, B. (1996) Trust in Modern Societies. Cambridge: Polity Press.Google Scholar
Möllering, G. (2006) Trust: Reason, Routine, Reflexivity. Amsterdam: Elsevier.Google Scholar
Moore, G.E. (1903) Principia Ethica. Cambridge: Cambridge University Press.Google Scholar
Mundie, C., de Vries, P., Haynes, P., and Corwine, M. (2002) Trustworthy Computing, Microsoft White Paper, Redmond, Washington State: Microsoft Corp.Google Scholar
Mumford, E. (1996) Effective Systems Design and Requirements Analysis. London: MacMillan.Google Scholar
Myskja, B. (2008) “The Categorical Imperative and the Ethics of Trust,” Ethics and Information Technology, 10: 213–220.CrossRefGoogle Scholar
Myskja, B. (2011) “Trust, Lies, and Virtuality.” In Ess, C. and Thorseth, M. (eds.) Trust and Virtual Worlds: Contemporary Perspectives. New York: Peter Lang, 120–136.Google Scholar
Naughton, J. (2012) From Gutenburg to Zuckerberg. London: Quercus.Google Scholar
Nickel, P. (2007) “Trust and Obligation-Ascription,” Ethical Theory and Moral Practice 10: 309–19.CrossRefGoogle Scholar
Nickel, P., Franssen, M., and Kroes, P. (2010) “Can We Make Sense of the Notion of Trustworthy Technology?Knowledge, Technology and Policy, 23: 429–46.CrossRefGoogle Scholar
Nickerson, R. (1998) “Confirmation Bias: A Ubiquitous Phenomenon in Many Guises,” Review of General Psychology, 2(2): 175–220.CrossRefGoogle Scholar
Nielsen, J., Molich, R., Snyder, S. and Farrell, C. (2000) E-Commerce User Experience: Trust. Fremont, CA: Nielsen Norman Group.Google Scholar
Nissenbaum, H. (2001) “Securing Trust Online: Wisdom or Oxymoron?Boston University Law Review, 81: 101–31.Google Scholar
Nissenbaum, H. (2010) Privacy in Context: Technology, Policy and Integrity in Everyday Life. Stanford, CA: Stanford University Press.Google Scholar
Nissenbaum, H. (2011) “A Contextual Approach to Privacy On-line.” In Daedalus (Fall): 32–48, Boston: MIT Press.Google Scholar
Odlyzko, A. (2010) “Providing Security with Insecure Systems.” Proceedings of WiSec’10 March 22–24, Hoboken, New Jersey.Google Scholar
Odom, W.Sellen, S.Harper, R. and Thereska, E. (2012) “Lost in Translation: Understanding the Possession of Digital Things in the Cloud.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’12). New York, NY, USA, 781–790; ACM.Google Scholar
Odom, W., Zimmerman, J., and Forlizzi, J. (2011) “Teenagers and Their Virtual Possessions.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’11). New York, NY, USA, 1491–1500; ACM.Google Scholar
Odom, W.Zimmerman, J., Forlizzi, J., Hugera, A., Marchitto, M., Canas, J., Nam, T., Lim, Y., Lee, M., Seok, J., Kim, D., Lee, Y., Row, Y., Sohn, B., and Moore, H. (2013) “Fragmentation and Transition: Understanding the Perception of Virtual Possessions among Young Adults in Spain, South Korea, and the United States.” Proceedings of SIGCHI Conference on Human Factors in Computing Systems (CHI ’13). New York, NY, USA, 1833–1842; ACM.CrossRefGoogle Scholar
Ong, W. (1988) Orality and Literacy: The Technologizing of the Word. Routledge: London.Google Scholar
O’Neill, O. (2002) “A Question of Trust.” Reith Lectures 2002. BBC Radio4. , accessed August 18, 2012.
O’Neill, O. (2002b) Autonomy and Trust in Bioethics. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
O’Neill, O. (2012) “Kant and the Social Contract Tradition.” In Ellis, E. (ed.) Kant's Political Theory: Interpretations and Applications. Philadelphia: Pennsylvania State University Press.Google Scholar
Oppy, G. and Dowe, D. (2011) “The Turing Test,” Zalta, E. Z. (ed.), The Stanford Encyclopedia of Philosophy (Spring Edition), URL <>.
Origgi, G. (2008) Qu'est-ce que la confiance?Paris: Vrin.Google Scholar
Paasonen, S. (2010) “Labors of Love: Netporn, Web 2.0 and the Meanings of Amateurism,” New Media & Society, 12(8): 1297–1312.CrossRefGoogle Scholar
Palfrey, J. and Gasser, U. (2008) Born Digital: Understanding the First Generation of Digital Natives. New York: Basic Books.Google Scholar
Pariser, E. (2011) The Filter Bubble: What the Internet is Hiding from You. London: Penguin.Google Scholar
Pettit, P. 2004) “Trust, Reliance and the Internet,” Analyse & Kritik, Vol. 26, 108–21.CrossRefGoogle Scholar
Pettit, P. (2008) “Trust, Reliance and the Internet,” Information Technology and Moral Philosophy. Eds. van den Hoven, J. and Veckert, J.London: Cambridge University Press.Google Scholar
Pfitzmann, B. and Waidner, M. (1992) “How to Break and Repair a ‘Provably Secure’ Untraceable Payment System.” Advances in Cryptology – CRYPTO’91. Berlin Heidelberg: Springer.Google Scholar
Pieters, W. (2010) “Reve{a,i}ling the risks,” Techne, Vol. 14, No. 3: 194–206.Google Scholar
Plato. (1991) The Republic. Trans Bloom, A.New York: Basic Books.Google Scholar
Pollner, M. (1979) “Explicative Transactions: Making and Managing Meaning in Traffic Court.” In Psathas, G. (ed.) Everyday Language: Studies in Ethnomethodology. New York: Irvington, 227–256.Google Scholar
Popa, L., Kumar, G., Chowdhury, M., Krishnamurthy, A., Ratnasamy, S. and Stoica, I. (2012) “FairCloud: Sharing the Network In Cloud Computing.” Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM ’12)Finland, Aug. 13–17th.Google Scholar
Popa, L., Ghodsi, A. and Stoica, I. (2010) “HTTP as the narrow waist of the future internet”. Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks (Hotnets-IX).
Postman, N. (1985) Amusing Ourselves to Death: Public Discourse in the Age of Show Business. New York: Penguin.Google Scholar
Psathas, G. and Waksler, F. (1973) “Essential Features of Face-to-Face Interaction.” In Psathas, G. (ed.) Phenomenological Sociology: Issues and Applications. New York: Wiley–Interscience, 159–181.Google Scholar
Randall, D. (2003) “Inside the Smart Home: A Case Study,” In Harper, R. (ed.) Inside the Smart Home. London: Springer, 227–246.CrossRefGoogle Scholar
Rashid, F.Y. (2012) “Recent Bank Cyber Attacks Originated From Hacked Data Centers, Not Large Botnet,” Securityweek, October, .
Raub, W. and Weesie, J. (2000a) The Management of Durable Relations. Amsterdam: Thela Thesis.Google Scholar
Raub, W. and Weesie, J. (2000b) “The Management of Matches: A Research Program on Solidarity in Durable Social Relations,” Netherland's Journal of Social Sciences 36, 71–88.Google Scholar
Reason, J. (1986) “Recurring Errors in Process Environments: some implications for the design of intelligent support systems.” Proceedings of the NATO Advanced Study Institute on Intelligent Decision Support in Process Environments. New York: Springer-Verlag, 255–270.CrossRefGoogle Scholar
Richards, G. (2012) “Hamilton Makes Up With Button Over Twitter Row,” The Guardian (October 20): 37.Google Scholar
Riegelsberger, J., Sasse, A., McCarthy, D. (2003) “Shiny Happy People Building Trust?” Proceedings of ACM CHI 2005 New Horizons, April 5–10, 2003, Ft. Lauderdale, Florida, USA, Vol. 5, No. 1: 121–128.Google Scholar
Riegelsberger, J. and Sasse, M.A. (2001) “Trustbuilders and Trustbusters: The Role of Trust Cues in Interfaces to e-Commerce Applications.” In Schmid, B., Stanoevska-Slabeva, K., Tschammer, V. (eds.) Towards the E-Society: E-commerce, E-Business and E-Government. Norwell: Kluwer, 17–30.Google Scholar
Riegelsberger, J. and Sasse, M.A. (2003b) “Designing e-Commerce Applications for Consumer Trust.” In Petrovic, O., Ksela, M., and Fallenboeck, M. (eds.) Trust in the Network Economy. Wien: Springer, 97–110.CrossRefGoogle Scholar
Riegelsberger, J., Sasse, M.A., and McCarthy, J. D. (2003a) “The Researcher's Dilemma: Evaluating Trust in Computer-Mediated Communication,” International Journal of Human-Computer Studies 58(6), 759–781.CrossRefGoogle Scholar
Riegelsberger, J., Sasse, M.A., and McCarthy, J.D. (2005) “The Mechanics of Trust: A Framework for Research and Design,” International Journal of Human-Computer Studies 62(3), 381–422.CrossRefGoogle Scholar
Riepl, W. (1913) Das Nachrichtenwesen des Altertums mit besonderer Rücksicht auf die Römer. Leipzig: Teubner.Google Scholar
Rivest, R.L., Shamir, A., and Adleman, L. (1978) “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM 21.2: 120–126.CrossRefGoogle Scholar
Rorty, R. (1979) Philosophy and the Mirror of Nature. New Jersey: Princeton University Press.Google Scholar
Rose, E. (1992) The Werald. Boulder, CO: The Waiting Room Press.Google Scholar
Anderson, R., and Moore, T. (2006) “The economics of information security.” Science 314.5799: 610–613.CrossRef
Rushkoff, D. (2010) Program or be Programmed. Berkeley, CA: Soft Skull Press.CrossRefGoogle Scholar
Ryle, G. (1949) The Concept of Mind. London: Hutchinson.Google Scholar
Sacks, H. (1972) “On the Analysability of Stories by Children.” In Gumperz, J.J. and Hymes, D. (eds.) Directions in Sociolinguistics: The Ethnography of Communication. New York: Holt, Rinehart and Winston, 325–345.Google Scholar
Salam, A., Iyer, L., Palvia, P., and Singh, R. (2005) “Trust in e-Commerce,” Communications of the ACM 48: 73–77.CrossRefGoogle Scholar
Saltzer, J., Reed, D., and Clark, D.D. (1984) “End-to-End Arguments in System Design,” ACM Transactions on Computer Systems, Vol. 2, No. 4 (November): 277–288.CrossRefGoogle Scholar
Sante, L. (1993) “Sophie Calle's Uncertainty Principle,” Parkett Issue 36 (June), 74–85.
Sasse, M. and Kirlappos, I. (2011) “Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling,” Proceedings of Trust Management V, 9–12. IFIP Advances in Information and Communication Technology, Springer: Boston.Google Scholar
Schatzki, T. (2010) The Timespace of Human Activity. Lanham, MD: Lexington Books.Google Scholar
Schechter, S.E., Dhamija, R., Ozment, A., and Fischer, I. (2007) “The Emperor's New Security Indicators”. Security and Privacy, 2007 (SP’07). IEEE Symposium, Oakland, California, 51–65.CrossRefGoogle Scholar
Schneier, B. (2012) Liars and Outliers: Enabling the Trust That Society Needs to Thrive. Indianapolis, IN: John Wiley & Sons.Google Scholar
Schutz, A. (1982) “On Multiple Realities.” In The Problem of Social Reality, Collected Papers, Vol. 1. The Hague: Martinus Nijhoff, 340–345.Google Scholar
Schutz, A. and Luckmann, T. (1973) The Structures of the Life World. London: Heinemann.Google Scholar
Schulze, H. and Mochalski, K. (2009) “Internet Study 2008/2009.” IPOQUE Report 37: 351–362.
Schwartz, H. and Jacobs, J. (1979) Qualitative Sociology: A Method to the Madness. New York: The Free Press.Google Scholar
Seghi, A. (2012) “The UK's Online Obsession: The Latest Ofcom Figures for Media Consumption,” The Guardian Datablog, December 13, 2012, .
Shannon, C. (1949) “Communication Theory of Secrecy Systems,” Bell System Technical Journal, Vol. 28(4): 656–715.CrossRefGoogle Scholar
Shieh, A., Kandula, S., Greenberg, A., Kim, C. and Saha, B. (2011) “Sharing the data center network”. In Proceedings of the 8th USENIX conference on Networked systems design and implementation (NSDI'11). USENIX Association, Berkeley, CA, USA, 23–23.Google Scholar
Shneiderman, B. (2000) “Designing Trust into Online Experiences,” Communications of the ACM, 43(12): 57–59.CrossRefGoogle Scholar
Shope, R. (1983) The Analysis of Knowing. A Decade of Research. Princeton, NJ: Princeton University Press.Google Scholar
Shue, D., Freedman, M.J. and Shaikh, A. (2012) “Performance isolation and fairness for multi-tenant cloud storage”. In Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation (OSDI'12). USENIX Association, Berkeley, CA, USA, 349–362.Google Scholar
Siau, K. and Shen, Z. (2003) “Building Customer Trust in Mobile Commerce,” Communications of the ACM, April 2003/Vol. 46, No. 4: 91–94.CrossRefGoogle Scholar
Simmel, G. (1950) The Sociology of Georg Simmel. Trans. Wolff, K.H.New York: The Free Press.Google Scholar
Simmel, G. (1955) Conflict and the Web of Group-Affiliations. New York: The Free Press.Google Scholar
Simmel, G. (1978) The Philosophy of Money. London: Routledge.Google Scholar
Simpson, T. (2011a) “Robots, Trust and War,” Philosophy and Technology, 24(3): 325–337.CrossRefGoogle Scholar
Simpson, T. (2011b) “e-Trust and Reputation,” Ethics and Information Technology, 13(1): 29–38.CrossRefGoogle Scholar
Simpson, T. (2012a) “What is Trust?Pacific Philosophical Quarterly, 93: 550–569.CrossRefGoogle Scholar
Simpson, T. (2012b) “Evaluating Google as an Epistemic Tool,” Metaphilosophy, 43(4): 426–445.CrossRefGoogle Scholar
Smith, D.E. (1978) “K. is Mentally Ill: The Anatomy of a Factual Account,” Sociology, 12:1, 23–45.CrossRefGoogle Scholar
Smith, D.E. (1982) “The Active Text: Texts as Constituents of Social Relations.” In Smith, D.E. (ed.) Texts, Facts and Femininity. Boston, MA: Northeastern University Press, 12–51.Google Scholar
Sommerville, I., Dewsbury, G.Clarke, K., and Rouncefield, M. (2006) “Dependability and Trust in Organizational and Domestic Computer Systems.” In Clarke, K., Hardstone, G., Rouncefield, M. and Sommerville, I. (eds.) Trust in Technology: A Socio-Technical Perspective. Dordrecht: Springer, 169–94.CrossRefGoogle Scholar
Spafford, E. (2009) “Cyber Security,” ISIPS 2008, LNCS 5661, 20–33.
Stajano, F. and Wilson, P. (2011) “Understanding Scam Victims: Seven Principles for Systems Security,” Communications of the ACM, 54(3), 70–75.CrossRefGoogle Scholar
Strawson, P. (1974) “Freedom and Resentment.” In Strawson, P. (ed.) Freedom and Resentment and Other Essays. London: Methuen, 1–25.Google Scholar
Strawson, P. (1992) Analysis and Metaphysics: An Introduction to Philosophy. Oxford: Oxford University Press.CrossRefGoogle Scholar
Stuart, S. (2008) “From Agency to Apperception: Through Kinaesthesia to Cognition and Creation,” Ethics and Information Technology, 10: 255–264.CrossRefGoogle Scholar
Sullins, J. (2011) “The Next Steps in RoboEthics,” Keynote Address. International Association for Computing and Philosophy (IACAP) Conference, July 3. Aarhus, Denmark.
Sztompka, P. (2003) Trust: A Sociological Theory. Cambridge: Cambridge University Press.Google Scholar
Taddeo, M. (2009) “Defining Trust and E-trust: From Old Theories to New Problems,” International Journal of Technology and Human Interaction, 5: 23–35.CrossRefGoogle Scholar
Taddeo, M. (2010) “Modelling Trust in Artificial Agents, A First Step Toward the Analysis of e-Trust,” Minds and Machines, 20: 243–257.CrossRefGoogle Scholar
Taddeo, M. (2011) “The Role of e-Trust in Distribute Artificial Systems.” In Ess, C. and Thorseth, M. (eds.) Trust and Virtual Worlds: Contemporary Perspectives. New York: Peter Lang, 75–88.Google Scholar
Tan, Y.H. and Thoen, W. (2001) “Toward a Generic Model of Trust for Electronic Commerce,” International Journal of Electronic Commerce, 5, 61–74.Google Scholar
Tapscott, D. and Willians, A.D. (2006) “Wikinomics: How Mass Collaboration Changes Everything”, Portfolio Trade.
Taylor, C. (1989) Sources of Self: the Making of the Modern Identity. Cambridge: Cambridge University Press.Google Scholar
Thereska, E. and Harper, R. (2012) “Multi-structured Redundancy”. HotStorage’12: the 4th Workshop on Hot Topics in Storage and File Systems, Usenix, Boston.Google Scholar
Thereska, T., Ballani, H., O'Shea, G., Karagiannis, T., Rowstron, A., Talpey, T., Black, R. and Zhu, T. (2013) “IOFlow: A Software-Defined Storage Architecture” in SOSP'13: The 24th ACM Symposium on Operating Systems Principles, ACM, November.
Thomas, W. and Thomas, J. (1928) The Child in America. New York: Knopf.Google Scholar
Thomborson, C. (2010) “Axiomatic and Behavioral Trust,” in TRUST’10. Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Springer-Verlag: Berlin, Heidelberg, 352–366.CrossRefGoogle Scholar
Thompson, K. (1984) “Reflections on Trusting Trust.” Communications of the ACM 27(8): 761–763.CrossRefGoogle Scholar
Thorn, C. and Dibbell, J. (eds.) (2012) Violation: Rape in Gaming. Create Space Independent Publishing Platform (October 17, 2012).
Travers, J. and Milgram, S. (1969) “An Experimental Study of the Small World Problem.” Sociometry, Vol. 32, No. 4: 425–443.CrossRefGoogle Scholar
Turilli, M., Vaccaro, A., and Mariarosaria, T. (eds.) (2010) “The Case of Online Trust,” Knowledge, Technology and Policy, Vol. 23: 333–345.CrossRef
Turing, A. (1950) “Computing Machinery and Intelligence”. Mind: A Quarterly Review of Psychology and Philosophy, 59(236): 433–460. October.CrossRefGoogle Scholar
Twyman, M., Harvey, N., and Harries, C. (2008) “Trust in Motives, Trust in Competence: Separate Factors Determining the Effectiveness of Risk Communication,” Judgment and Decision Making, 3: 111–120.Google Scholar
U.S. Department of Defense (1983) “Trusted Computer System Evaluation Criteria” (The Orange Book). Available at: <>.
Vallor, S. (2010) “Social Networking Technology and the Virtues,” Ethics and Information Technology, 12: 157–170. DOI 10.1007/s10676-009-9202-1.CrossRefGoogle Scholar
Van Gelder, L. ([1985] 1991) “The Strange Case of the Electronic Lover.” In Dunlop, C. and Kling, R. (eds.) Computerization and Controversy. San Diego, CA: Academic Press, 364–375.Google Scholar
Vaudenay, S. (2002) “Security Flaws Induced by CBC Padding – Applications to SSL, IPSEC, WTLS…” Advances in Cryptology – EUROCRYPT 2002. Berlin Heidelberg: Springer.Google Scholar
Wason, P. (1960) “On the Failure to Eliminate Hypotheses in a Conceptual Task,” Quarterly Journal of Experimental Psychology 12(3): 129–140.CrossRefGoogle Scholar
Watson, R. (2009) “Constitutive Practices and Garfinkel's Notion of Trust: Revisited,” Journal of Classical Sociology 9:4 (November): 475–499.CrossRefGoogle Scholar
Watson, R. and Carlin, A.P. (2012) “‘Information’: Praxeological Considerations,” Human Studies, Vol. 35: 327–345.CrossRefGoogle Scholar
Watts, D. (2004) Six Degrees: The Science of the Connected Age. London: Random House.Google Scholar
Weckert, J. (2005) On-line Trust. In Cavalier, R. (ed.) The Impact of the Internet on Our Moral Lives, Albany, NJ: Sunny Press, 95–117.Google Scholar
Weckert, J. (2011) “Trusting Software Agents.” In Ess, and Thorseth, (eds.) 2011, 89–102.
Whitten, A. and Tygar, J.D. (1999) “Why Johnny can't encrypt: A usability evaluation of PGP 5.0”. Proceedings of the 8th USENIX Security Symposium, Vol. 99. New York: McGraw-Hill.Google Scholar
Whitty, M.T. and Joinson, A.N. (2009) Truth, Lies and Trust on the Internet. New York: Routledge/Taylor & Francis Group.Google Scholar
Wieder, D.L. (1974) Language and Social Reality. The Hague: Mouton.CrossRefGoogle Scholar
Wignall, A. (2012) “What it's like to work at…Brunel University?” The Guardian. . Accessed 18/12/2012.
Williams, B. (1990) “Formal Structures and Social Reality.” In Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations. Oxford: Blackwell, 3–13.Google Scholar
Williams, B. (2002) Truth and Truthfulness: An Essay in Genealogy. Princeton: Princeton University Press.Google Scholar
Williams, M.L. (circa 1972) “Seeing Through Appearances: Procedures for ‘Discovering’ Criminal Activity.” Unpublished conference paper, Department of Sociology, University of California, Santa Barbara.
Williamson, T. (2000) Knowledge and Its Limits. Oxford: Oxford University Press.Google Scholar
Winch, P. (1958) The Idea of a Social Science. London: Routledge.Google Scholar
Wittgenstein, L. (1953) Philosophical Investigations. Trans. Anscombe, G.E.M.Oxford: Basil Blackwell.Google Scholar
Wong, P.H. (2012) Net Recommendation: Prudential Appraisals of Digital Media and the Good Life. PhD thesis. Enschede: University of Twente, Netherlands.Google Scholar
Wu, M., Miller, R.C., and Garfinkel, S.L. (2006) “Do security toolbars actually prevent phishing attacks?” In CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY, USA. ACM, 601–610.CrossRef
Zhang, Y., Egelman, S., Cranor, L., and Hong, J. (2006a) “Phinding Phish: Evaluating Anti-Phishing Tools.” Proceedings of 14th Annual Network and Distributed System Security Symposium, ISOC.
Zhang, Q., Markantonakis, K., and Mayes, K. (2006b) “A Mutual Authentication Enabled Fair-Exchange and Anonymous e-Payment Protocol,” E-Commerce Technology, 2006. The 8th IEEE International Conference on and Enterprise Computing, E-Commerce, and E-Services, The 3rd IEEE International Conference, 20.
Zinn, J. (Ed) (2008) Social Theories of Risk and Uncertainty. London: Blackwell.CrossRef

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Edited by Richard H. R. Harper
  • Book: Trust, Computing, and Society
  • Online publication: 05 March 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781139828567.019
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Edited by Richard H. R. Harper
  • Book: Trust, Computing, and Society
  • Online publication: 05 March 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781139828567.019
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Edited by Richard H. R. Harper
  • Book: Trust, Computing, and Society
  • Online publication: 05 March 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781139828567.019
Available formats
×