Trust and Community on the Internet


Book Description




Computing with Social Trust


Book Description

This book has evolved out of roughly ve years of working on computing with social trust. In the beginning, getting people to accept that social networks and the relationships in them could be the basis for interesting, relevant, and exciting c- puter science was a struggle. Today, social networking and social computing have become hot topics, and those of us doing research in this space are nally nding a wealth of opportunities to share our work and to collaborate with others. This book is a collection of chapters that cover all the major areas of research in this space. I hope it will serve as a guide to students and researchers who want a strong introduction to work in the eld, and as encouragement and direction for those who are considering bringing their own techniques to bear on some of these problems. It has been an honor and privilege to work with these authors for whom I have so much respect and admiration. Thanks to all of them for their outstanding work, which speaks for itself, and for patiently enduringall my emails. Thanks, as always, to Jim Hendler for his constant support. Cai Ziegler has been particularly helpful, both as a collaborator, and in the early stages of development for this book. My appreciation also goes to Beverley Ford, Rebecca Mowat and everyone at Springer who helped with publication of this work.




Trust and Deception in Virtual Societies


Book Description

One of the major problems in the development of virtual societies, in particular in electronic commerce and computer-mediated interactions in organizations, is trust and deception. This book provides analyses by various researchers of the different types of trust that are needed for various tasks, such as facilitating on-line collaboration, building virtual communities and network organizations, and even the design of effective and user-friendly human-computer interfaces. The book has a multi-disciplinary character providing theoretical models of trust and deception, empirical studies, and practical solutions for creating trust in electronic commerce and multi-agent systems.




Online Brand Communities


Book Description

This book presents and analyzes the concept of online brand communities, an emerging and exciting topic in marketing and eCommerce. First, it lays out the foundations like the evolution of the Web and the so-called Social Web, its utility for users and businesses, and the evolution of the marketing mind-set to adapt the Social Web. On this basis, the book then presents a detailed analysis of online brand communities, examining the concept of virtual community with a specific focus on virtual brand communities. In this context the book also explores recent trends related to branding and brand management. Next, it proposes a classification system for online brand communities, taking into account questions like the motivating factors for consumers to join, participate and stay in a community. The process of value creation in communities is examined from both business and consumer perspectives. The book draws to a close with a brief presentation of the process broadly accepted for the successful development of online brand communities.




Social Internet of Things


Book Description

The aim of this book is to stimulate research on the topic of the Social Internet of Things, and explore how Internet of Things architectures, tools, and services can be conceptualized and developed so as to reveal, amplify and inspire the capacities of people, including the socialization or collaborations that happen through or around smart objects and smart environments. From new ways of negotiating privacy, to the consequences of increased automation, the Internet of Things poses new challenges and opens up new questions that often go beyond the technology itself, and rather focus on how the technology will become embedded in our future communities, families, practices, and environment, and how these will change in turn.




Trust in Social Media


Book Description

Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated content poses novel challenges for online users to find relevant information, or,




Strategic Uses of Social Technology


Book Description

On an everyday basis, we communicate with one another using various technological media, such as text messaging, social networking tools, and electronic mail, in work, educational, and personal settings. As a consequence of the increasing frequency of use and importance of computer-supported interaction, social scientists in particular have heeded the call to understand the social processes involved in such interactions. In this volume, the editors explore how aspects of a situation interact with characteristics of a person to help explain our technologically supported social interactions. The person-by-situation interaction perspective recognizes the powerful role of the situation and social forces on behavior, thought, and emotion, but also acknowledges the importance of person variables in explaining social interaction, including power and gender, social influence, truth and deception, ostracism, and leadership. This important study is of great relevance to modern readers, who are more and more frequently using technology to communicate with one another.




The Trust Factor


Book Description

This hands-on guide is a valuable resource for both current and aspiring school leaders. Written in short, easy-to-read chapters, The Trust Factor, 2nd Edition presents real-world examples and relevant research to help you develop the essential skills you need for building trust with staff, teachers, students, and parents. The Trust Factor provides updated versions of over 50 practical strategies that will help you learn to: Recognize and avoid behaviors that damage trust Repair trust when it has been broken Navigate challenging situations, such as teacher evaluations, student discipline, parent complaints, or scarce resources Establish and sustain trust with faculty, staff, students, and community Approach social media in a way that builds trust with the community. The guidance in this book is explained with simple, easy-to-implement steps you can apply immediately to your own practice, and are accompanied by reflection questions and self-assessment tools to help practicing or aspiring educational leaders succeed.




Trust in Computer Systems and the Cloud


Book Description

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing. The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master’s students in software architecture and security.




New Forms of Collaborative Innovation and Production on the Internet


Book Description

"The Internet has enabled new forms of large-scale collaboration. Voluntary contributions by large numbers of users and co-producers lead to new forms of production and innovation, as seen in Wikipedia, open source software development, in social networks or on user-generated content platforms as well as in many firm-driven Web 2.0 services. Large-scale collaboration on the Internet is an intriguing phenomenon for scholarly debate because it challenges well established insights into the governance of economic action, the sources of innovation, the possibilities of collective action and the social, legal and technical preconditions for successful collaboration. Although contributions to the debate from various disciplines and fine-grained empirical studies already exist, there still is a lack of an interdisciplinary approach"--Publisher's description.