Explanation and trust: what to tell the user in security and AI?
Tóm tắt
Từ khóa
Tài liệu tham khảo
Avižienis, A., Laprie, J., Randell, B., & Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1), 11–33.
Bederson, B., Lee, B., Sherman, R., Herrnson, P., & Niemi, R. (2003). Electronic voting system usability issues. In: Proceedings of the SIGCHI conference on human factors in computing systems (pp. 145–152).
Berlin, I. (1976). Vico and Herder: Two studies in the history of ideas. London: Hogarth.
Brey, P. (2005). Freedom and privacy in ambient intelligence. Ethics and Information Technology, 7(3), 157–166.
Chopra, K., & Wallace, W. (2002) Trust in electronic environments. In: Proceedings of the 36th Hawaii international conference on system sciences (HICSS’03).
Faden, R., Beauchamp, T., & King, N. (1986). A history and theory of informed consent. New York, USA: Oxford University Press.
Fahrenholtz, D., & Bartelt, A. (2001). Towards a sociological view of trust in computer science. In M. Schoop & R. Walczuch (Eds.), Proceedings of the eighth research symposium on emerging electronic markets (RSEEM 01).
Freuder, E., Likitvivatanavong, C., & Wallace, R. (2000) A case study in explanation and implication. In: CP2000 workshop on analysis and visualization of constraint programs and solvers.
Glass, A., McGuinness, D., & Wolverton, M. (2008) Toward establishing trust in adaptive agents. In Proceedings of the 13th international conference on intelligent user interfaces (pp. 227–236).
Gonggrijp, R., Hengeveld, W.-J., Bogk, A., Engling, D., Mehnert, H., Rieger, F., Scheffers, P., & Wels, B. (2006). Nedap/Groenendaal ES3B voting computer: a security analysis. Availabe online: http://www.wijvertrouwenstemcomputersniet.nl/images/9/91/Es3b-en.pdf . Consulted June 25, 2010.
Gregor, S., & Benbasat, I. (1999). Explanations from intelligent systems: Theoretical foundations and implications for practice. MIS Quarterly, 23(4), 497–530.
Harbers, M., van den Bosch, K., & Meyer, J. (2009). A study into preferred explanations of virtual agent behavior. In Z. Ruttkay, M. Kipp, A. Nijholt, & H. Vilhjhalmsson (Eds.), Intelligent virtual agents 9th international conference (Vol. 5773 of LNCS, pp. 132–145). Berlin: Springer.
Harris, B. (2003). Black box voting: Vote tampering in the 21st century. High Point, NC: Plan Nine.
Hubbers, E., Jacobs, B., & Pieters, W. (2005). RIES–internet voting in action. In R. Bilof (Ed.), Proceedings of 29th annual international computer software and applications conference, COMPSAC’05 (pp. 417–424). IEEE Computer Society.
Kosta, E., Pitkänen, O., Niemelä, M., & Kaasinen, E. (2010). Mobile-centric ambient intelligence in health- and homecare: Anticipating ethical and legal challenges. Science and Engineering Ethics, 16(2), 303–323.
Latour, B. (2005). Reassembling the social: An introduction to actor-network-theory. Oxford: Oxford University Press.
Luhmann, N. (1979). Trust and power: Two works by Niklas Luhmann. Chichester: Wiley.
Luhmann, N. (1988). Familiarity, confidence, trust: Problems and alternatives. In D Gambetta (Ed.), Trust: Making and breaking of cooperative relations. Oxford: Basil Blackwell.
Mauw, S., & Oostdijk, M. (2006). Foundations of attack trees. In D. Won & S. Kim (Eds.), Proceedings of 8th annual international conference on information security and cryptology, ICISC’05 (Vol. 3935 of LNCS, pp. 186–198). Heidelberg: Springer.
Nickel, P. (2012). Trust in technological systems. In M. de Vries, S. Hansson, & A. Meijers (Eds.), Norms and the artificial: Moral and non-moral norms in technology. Springer (Forthcoming).
Nikander, P. & Karvonen, K. (2001). Users and trust in cyberspace. In Christianson, B., Crispo, B., Malcolm, J., & Roe M. (Eds.), Security protocols: 8th international workshop, Cambridge, UK, April 3–5, 2000, Revised Papers (Vol. 2133 of LNCS, pp. 24–35). Heidelberg: Springer.
Nugent, C., & Cunningham, P. (2005). A case-based explanation system for black-box systems. Artificial Intelligence Review, 24(2), 163–178.
Oostveen, A., & Van den Besselaar, P. (2004) Security as belief: user’s perceptions on the security of electronic voting systems. In A. Prosser & R. Krimmer (Eds.), Electronic voting in Europe: Technology, law, politics and society (Vol. P-47 of Lecture notes in informatics, pp. 73–82). Bonn: Gesellschaft für Informatik.
Open Rights Group (2007). May 2007 election report: Findings of the Open Rights Group election observation mission in Scotland and England. Available online: http://www.openrightsgroup.org/wp-content/uploads/org_election_report.pdf . Consulted June 25, 2007.
Park, J. (1931). England’s controversy over the secret ballot. Political Science Quarterly, 46(1), 51–86.
Pieters, W. (2006). Acceptance of voting technology: between confidence and trust. In K. Stølen, W. Winsborough, F. Martinelli, & F. Massacci (Eds.), Trust management: 4th international conference (iTrust 2006), proceedings (Vol. 3986 of LNCS, pp. 283–297). Berlin: Springer.
Pieters, W. (2010). Reve{a,i}ling the risks: a phenomenology of information security. Techné, 14(3) (forthcoming).
Pieters, W., & van Haren, R. (2007). Temptations of turnout and modernisation: E-voting discourses in the UK and The Netherlands. Journal of Information, Communication and Ethics in Society, 5(4), 276–292.
Pu, P., & Chen, L. (2006). Trust building with explanation interfaces. In: Proceedings of the 11th international conference on intelligent user interfaces, p. 100.
Randell, B., & Ryan, P. (2006). Voting technologies and trust’. IEEE Security & Privacy, 4(5), 50–56.
Roth-Berghofer, T., & Cassens, J. (2005). Mapping goals and kinds of explanations to the knowledge containers of case-based reasoning systems. In H. Muños Avila & F. Ricci (Eds.), ICCBR 2005 (Vol. 3620 of LNCS, pp. 451–464). Berlin: Springer.
Schneier, B. (1999). Attack trees: Modeling security threats. Dr. Dobb’s Journal, 24(12), 21–29.
Shneiderman, B. (2000). Designing trust into online experiences. Communications of the ACM, 43(12), 57–59.
Sørmo, F., Cassens, J., & Aamodt, A. (2005). Explanation in case-based reasoning: perspectives and goals. Artificial Intelligence Review, 24(2), 109–143.
Taddeo, M. (2009). Defining trust and E-trust: Old theories and new problems. International Journal of Technology and Human Interaction, 5(2), 23–35.
Tavani, H. (2004). Genomic research and data-mining technology: Implications for personal privacy and informed consent. Ethics and Information Technology, 6(1), 15–28.
Verbeek, P. (2005). What things do: Philosophical reflections on technology, agency, and design. University Park: Pennsylvania State University Press.