A DECISION-THEORETIC APPROACH TO MAINTAIN TRUST IN UBIQUITOUS DISPLAYS ENVIRONMENTS
Keywords:Ubiquitous Displays, Adaptive Systems, Trust Management, Decision-Theoretic Approach, Man-Machine Communication.
AbstractIn this paper, we present a decision-theoretic approach to trust management for ubiquitous display environments that assesses the user’s trust in a system, monitors it over time and applies appropriate measurements to maintain trust in critical situations. The approach has been applied to two interactive applications that have been developed as part of a university-wide ubiquitous displays management system. The two applications run on public display located in public rooms at Augsburg University. They can be operated and assisted by mobile phones. In the paper, we define decision policies for the two applications and investigate their impact on relevant trust factors, such as privacy, comfort of use, transparency and controllability.
Cao H., Olivier P. & Jackson D. Enhancing privacy in public spaces through crossmodal displays. Soc. Sci. Comput. Rev., 26 (1), 2008, pp. 87-102.
Castelfranchi C. & Falcone R. Trust Theory: A Socio-Cognitive and Computational Model. Wiley, 2010.
Cheverst K., Dix A., Fitton D., Kray C., Rouncefield M., Sas C. et al. Exploring bluetooth based mobile phone interaction with the hermes photo display. MobileHCI ‘05: Proceedings of the 7th international conference on Human computer interaction with mobile devices & services. New York, NY, USA: ACM, 2005, pp. 47-54.
Glass A., McGuinness D. L., & Wolverton M. Toward establishing trust in adaptive agents. IUI ‘08: Proceedings of the 13th international conference on Intelligent user interfaces, New York, NY, USA: ACM, 2008, pp. 227-236.
Graham C., & Cheverst K. Guides, locals, chaperones, buddies and captains: managing trust through interaction paradigms. 3rd Workshop ‘HCI on Mobile Guides’ at the Sixth International Symposium on Human Computer Interaction with Mobile Devices and Services, New York, NY, USA: ACM, 2004, pp. 227-236.
Grandison T., & Sloman M. A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 3 (4), 2000, pp. 2-16.
Kini A., & Choobineh J. Trust in electronic commerce: definition and theoretical considerations. Proc. of the Hawaii International Conference on System Sciences, 31, 1998, pp. 51-61.
Leichtenstern K., Andre E., & Kurdyukova K. Managing user trust for self-adaptive ubiquitous computing systems. MoMM’10: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia. New York, NY, USA: ACM, 2010.
Lumsden J. Triggering trust: to what extent does the question influence the answer when evaluating the perceived importance of trust triggers? BCS HCI’09: Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction. Swinton, UK, UK: British Computer Society, 2009, pp. 214-223.
Muller J., Exeler J., Buzeck M., & Kruger A. ReflectiveSigns: digital signs that adapt to audience attention. In H. Tokuda, M. Beigl, A. Friday, A. J. Brush, & Y. Tobe (Hrsg.), Pervasive Computing, 7th International Conference, Pervasive 2009, Nara, Japan, May 11-14, 2009. Proceedings 5538, pp. 17-24. Springer.
Rocker C., Hinske S., & Magerkurth C. Intelligent privacy support for large public displays. Proceedings of Human-Computer Interaction International 2007 (HCII’07). Beijing, China.
Rukzio E., Leichtenstern K., Callaghan V., Holleis P., Schmidt A., & Chin J. S.-Y. An experimental comparison of physical mobile interaction techniques: touching, pointing and scanning. In P. Dourish, & A. Friday (Hrsg.), UbiComp 2006: Ubiquitous Computing, 8th International Conference, UbiComp 2006, Orange County, CA, USA, September 17-21, 2006. 4206, pp. 87-104. Springer.
Russell S. J., & Norvig P. Artificial Intelligence a modern approach (2nd international edition Ausg.). Upper Saddle River, N.J.: Prentice Hall, 2003.
Tschannen-Moran M., & Hoy W. K. A multidisciplinary analysis of the nature, meaning, and measurement of trust. Review of Educational Research, 70 (4), (2000), 547.
Yan Z., & Holtmanns S. Trust modeling and management: from social trust to digital trust. Book chapter of Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions, 2008.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.