Skip to main content
Trust, Computing, and Society
  • Get access
    Check if you have access via personal or institutional login
  • Cited by 3
  • Cited by
    This book has been cited by the following publications. This list is generated based on data provided by CrossRef.

    Pink, Sarah Lanzeni, Debora and Horst, Heather 2018. Data anxieties: Finding trust in everyday digital mess. Big Data & Society, Vol. 5, Issue. 1, p. 205395171875668.

    Lipková, Helena Landová, Hana and Jarolímková, Adéla 2018. Information Literacy in the Workplace. Vol. 810, Issue. , p. 833.

    Restuccia, Francesco Ghosh, Nirnay Bhattacharjee, Shameek Das, Sajal K. and Melodia, Tommaso 2017. Quality of Information in Mobile Crowdsensing. ACM Transactions on Sensor Networks, Vol. 13, Issue. 4, p. 1.

  • Export citation
  • Recommend to librarian
  • Recommend this book

    Email your librarian or administrator to recommend adding this book to your organisation's collection.

    Trust, Computing, and Society
    • Online ISBN: 9781139828567
    • Book DOI:
    Please enter your name
    Please enter a valid email address
    Who would you like to send this to *
  • Buy the print book

Book description

The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust.

Refine List
Actions for selected content:
Select all | Deselect all
  • View selected items
  • Export citations
  • Download PDF (zip)
  • Send to Kindle
  • Send to Dropbox
  • Send to Google Drive
  • Send content to

    To send content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to .

    To send content items to your Kindle, first ensure is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle.

    Note you can select to send to either the or variations. ‘’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

    Find out more about the Kindle Personal Document Service.

    Please be advised that item(s) you selected are not available.
    You are about to send

Save Search

You can save your searches here and later view and run them again in "My saved searches".

Please provide a title, maximum of 40 characters.
Acton, H.B. (1974) The Idea of a Spiritual Power. London: Athlone Press.
Akerlof, G.A. (1970) “The Market for ‘Lemons’: Quality Uncertainty and the Market Mechanism,” The Quarterly Journal of Economics, Vol. 84, Issue 3: 488–500.
Al-Ani, B., Trainer, E., and Redmiles, D. (2012) Trust and Surprise in Distributed Teams. ICIC’12 International Conference on Intercultural Collaboration, March 21–23, 2012, Bengaluru, India: 97–106.
Anderson, B. (1983) Imagined Communities. London: Verso.
Anderson, C. (2006) The Long Tail: Why the Future of Business is Selling Less of More. New York: Hyperion.
Anderson, R. (2009) Security Engineering. 2nd ed. Indianapolis, IN: Wiley Publishing.
Anderson, R., Hughes, J. and Sharrock, W. (1987) “The Division of Labour.” In Conein, B., De Fornel, M., Quere, L. (eds.) Les Formes de la Conversation. Paris: CNET, 237–252.
Anderson, R. and Moore, T. (2006) “The Economics of Information Security,” Science 314.5799: 610–613.
Anderson, R. and Sharrock, W. (1993) “Can Organisations Afford Knowledge?Journal of Computer Supported Collaborative Work, Vol. 1, No. 1: 145–161.
Axelrod, R. (1980) “More Effective Choice in the Prisoner's Dilemma.” Journal of Conflict Resolution, 24(3), 379–403.
Axelrod, R. (1984) The Evolution of Cooperation. New York: Basic Books.
Ba, S., Whinston, A.B., and Zhang, H. (2003) “Building Trust in Online Auction Markets through an Economic Incentive Mechanism.” Decision Support Systems, 35(3), 273–286.
Bacharach, M. and Gambetta, D. (2001) “Trust in Signs.” Trust in Society, 2: 148–184.
Bäcke, M. (2011) “Make-Believe and Make-Belief in Second Life Role-Playing Communities.” Convergence: The International Journal of Research into New Media Technologies, 18(1): 85–92. DOI: 10.1177/1354856511419917.
Bacon, F. (2000) [1620] The New Organon. Jardine, L. and Silverthorne, M. (eds.). Cambridge: Cambridge University Press.
Baier, A. (1986) “Trust and Antitrust,” Ethics, 96: 231–260.
Baier, A. (1994) Moral Prejudices: Essays on Ethics. Cambridge, MA: Harvard University Press.
Bakardjieva, M. (2005) Internet Society: The internet in Everyday Life. London: Sage.
Bakardjieva, M. (2009) “Subactivism: Lifeworld and Politics in the Age of the Internet,” The Information Society, 25: 91–104.
Bakos, Y. and Dellarocas, C. (2002) “Cooperation without enforcement? A comparative analysis of litigation and online reputation as quality assurance mechanisms”. Proceedings of the 23rd International Conference on Information Systems (127–142). Barcelona, Spain.
Baldamus, W. (1957) “The Relationship between Wage and Effort,” The Journal of Industrial Economics, Vol. 5, No. 3: 192–201.
Ball, R. and Naylor, M. (2005) Form Follows Idea. London: Black Dog Publishing.
Ballani, H. Costa, P. Karagiannis, T. and Rowstron, A. (2011) “The Price Is Right: Towards Location-Independent Costs in Datacenters”, Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X).
Baron, N. (2008) Always On: Language in an Online and Mobile World. Oxford: Oxford University Press.
Baym, N. (2011) “Social Networks 2.0.” In Consalvo, M. and Ess, C. (eds.) The Blackwell Handbook of Internet Studies. Oxford: Wiley-Blackwell, 384–405.
BBC (2006) “Online video eroding TV viewing”, “.
Beautement, A.Sasse, A., and Wonham, M. (2008) “The Compliance Budget”. Proceedings of the NSPW ’08. March 22–29, Olympic Valley, California.
Beck, U. (1992) The Risk Society. New York: Sage.
Bell, D. (1996) “The Bell-Lapadula Model,” Journal of Computer Security, 4.2: 3.
Benhabib, S. (1986) Critique, Norm, and Utopia: A Study of the Foundations of Critical Theory. New York: Columbia University Press.
Bittner, E. (1965) “The Concept of ‘Organisation,’Social Research, Vol. 32, No. 3: 239–255.
Bittner, E. (1967) “The Police on Skid Row: Study of Peacekeeping,” American Sociological Review, Vol. 32, No. 5: 699–715.
Bloom, J.A., Cox, I.J., Kalker, T.Linnartz, J.Miller, M. and Traw, C. (1999) “Copy Protection for DVD Video”, Proceedings of the IEEE 87.7: 1267–1276.
Bockover, M.I. (2010) “Confucianism and Ethics in the Western Philosophical Tradition I: Foundational Concepts,” Philosophy Compass, 5(4), 307–316.
Bowlby, J. (1969) Attachment and Loss, Vol. I: Attachment. New York: Basic Books.
boyd, D.M., Ellison, N.B. (2007) “Social network sites: Definition, history, and scholarship”, Journal of Computer-Mediated Communication, 13(1), article 11.
Bromseth, J. and Sundén, J. (2011) “Queering Internet Studies: Intersections of Gender and Sexuality.” In Consalvo, M. and Ess, C. (eds.) The Blackwell Handbook of Internet Studies. Oxford: Wiley-Blackwell, 270–299.
Brooks, F.P. (1987) “No Silver Bullet: Essence and Accidents of Software Engineering,” IEEE Computer, Vol. 20, No. 4 (April): 10–19.
Brown, B.Green, N. and Harper, R. (eds.) (2001) Wireless World: Interdisciplinary Perspectives on the Mobile Age. Hiedleberg and Godalming, UK: Springer Verlag.
Burke, K. (1954) Permance and Change: An Anatomy of Purpose (3rd edition), Berkely and Los Angeles: University of California Press.
Bury, S.Ishmael, J.Race, N. and Smith, P. (2010) “Designing for Interaction with Mundane Technologies,” Personal Ubiquitous Computing, Vol. 14: 227–236.
Bush, V. (1945) “As We May Think.” Atlantic Monthly. Available at .
Button, G. (1991) Ethnomethodology and the Human Sciences. Cambridge: Cambridge University Press.
Button, G. (ed.) (1993) Technology in Working Order. London: Routledge.
Butkiewicz, M., Madhyastha, H.V. and Sekar, V. (2011) “Understanding website complexity: measurements, metrics, and implications”. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (IMC '11).
Cachin, C. and Schunter, M. (2011) “A Cloud You Can Trust.” IEEE Spectrum, Vol. 48, Issue 12, pp. 28–51. At: <>, accessed December 3, 2012.
Cairncross, F. (1997) The Death of Distance. Boston, MA: Harvard Business School Press.
Carr, N. (2009) The Big Switch: Rewiring the World, from Edison to Google. London and New York: W.W. Norton and Co.
Carr, N. (2010) The Shallows: What the Internet Is Doing to Our Brains. London and New York: W.W. Norton.
Castells, M. (2002) The Internet Galaxy. Oxford: Oxford University Press.
Castells, M. (2009) Communication Power. Oxford: Oxford University Press.
Carusi, A. (2008) “Scientific visualisations and aesthetic grounds for trust.” Ethics and Information Technology, 10, 243–254.
Carusi, Annamaria. (2011) “Trust in the Virtual/Physical Interworld”. In Ess, C. and Thorseth, M. (eds.), Trust and Virtual Worlds: Contemporary Perspectives, 103–119. Oxford: Peter Lang.
Cavalier, R. (ed). (2005) The Impact of the internet on Our Moral Lives. Albany, NY: SUNY Press.
Cerf, V. (2010) “Trust and the Internet,” IEEE Internet Computing, September/October: Vol. 14, no 5: 95–96.
Chen, T.M.Abu-Nimeh, S. (2011) “Lessons from Stuxnet,” IEEE Computer, 44(4): 91–93.
Cheshire, C. (2011) “Online Trust, Trustworthiness, or Assurance?Daedalus, 140(4): 49–58.
Churchland, P. (1084) Matter and Consciousness. Cambridge, MA: MIT Press.
Churchland, P.S. (1989) Neurophilosophy: Toward a Unified Science of the Mind/Body. Cambridge, MA: MIT Press.
Cicourel, A. (1968) The Social Organisation of Juvenile Justice. London: Heinemann.
Cicourel, A.V. (1972) “Basic and Normative Rules in the Negotiation of Status and Role.” In Sudnow, D. (ed.) Studies in Social Interaction. New York: The Free Press, 229–258.
CISCO (2012) Cisco Visual Networking Index: Forecast and Methodology, 2011–2016, May, CISCO.
Clark, A. and Chalmers, D. (1998) “The extended mind,” Analysis, 58, no 1: 7–19.
Clark, D., Wroclawski, J.Sollins, K.R. and Braden, R. (2005) “Tussle in cyberspace: defining tomorrow's Internet.” ACM Transactions on Networking, Vol. 13, Issue 3: 462–475. ACM.
Clarke, K., Hardstone, G., Rouncefield, M., and Sommerville, I. (eds.) (2006) Trust in Technology: A Socio-Technical Perspective. London: Springer.
Coady, C.A.J. (1992) Testimony: A Philosophical Study. New York: Oxford University Press.
Cofta, P. (2001) The Trustworthy and Trusted Web. Delft, Netherlands: Now Publishers.
Coker, G., Guttman, J.D., Loscocco, P., Herzog, A.L., Millen, J., O’Hanlon, B., Ramsdell, J.D., Segall, A., Sheehy, J. and Sniffen, B.T. (2011) “Principles of remote attestation,” International Journal of Information Security, 10.2: 63–81.
Coleman, J. (1990) Foundations of Social Theory. Cambridge, MA: Belknap Press.
Columbus, L. (2013) “Why Cloud Computing Is Slowly Winning The Trust War”, Forbes (March),
Cook, K. and Gerbasi, A. (2011) “Trust.” In Hedstrom, P. and Bearman, P. (eds.) The Oxford Handbook of Analytic Sociology. Oxford: Oxford University Press, 218–244.
Cornes, R. and Sandler, T. (1996) The Theory of Externalities, Public Goods, and Club Goods. Cambridge: Cambridge University Press.
Corritore, C., Marble, R., Widenbeck, S., Kracher, B., and Chandran, A. (2005) “Measuring Online Trust of Websites: Credibility, Perceived Ease of Use, and Risk”. AMCIS 2005 Proceedings. Aug. 11–14th. Paper 370. Available at: <>.
Corritore, C.L., Kracher, B., and Wiedenbeck, S. (2003) “On-line Trust: Concepts, Evolving Themes, a Model,” International Journal of Human-Computer Studies, 58(6): 737–758.
Coulter, J. and Sharrock, W. (2007) Brain, Mind, and Human Behaviour in Contemporary Cognitive Science: Critical assessments of the philosophy of Psychology. Lampeter, UK: Edwin Mullen Press.
Craig, E. (1990) Knowledge and the State of Nature. Oxford: Clarendon Press.
Davenport, T.H. and Patil, D.J. (2012) “Data Scientist: The Sexiest Job of the 21st Century,” Harvard Business Review, October.
Dasgupta, P. (1990) “Trust as a Commodity.” In Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations. Oxford: Blackwell, 49–72.
Davidow, W. (2011) Overconnected: What the Digital Economy Says about Us. London: Headline Publishing.
De Certeau, M. (1984) The Practice of Everyday Life. Berkeley: University of California Press.
Defoe, D. (1719) The Life and Adventures of Robinson Crusoe. References from 1965, Angus, Ross (ed.) London: Penguin.
Deleuze, G. (1990) The Logic of Sense. London: Continuum Press.
de Quervain, D., Fischbacher, U., Treyer, V., Schellhammer, M., Schnyder, U., Buck, A. & Fehr, E. (2004) “The Neural Basis of Altruistic Punishment,” Science, 305(5688), 1254–8.
Deutsch, M. (1958) “Trust and Suspicion,” Journal of Conflict Resolution, 2: 265–279.
Dhamija, R. and Tygar, J.D. (2005) “The Battle against Phishing: Dynamic Security Skins.” ACM International Conference Proceeding Series, Vol. 93: 77–88.
Dhamija, R., Tygar, J.D., and Hearst, M. (2006) “Why Phishing Works.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 22–27, Montreal, 581–590. ACM; doi>10.1145/1124772.1124861.
Dibbell, J. (1993) “A Rape in Cyberspace.” (Originally published in The Village Voice, December 21, 1993: 36–42) <>, accessed March 9, 2013.
Diffie, W. and Hellman, M. (1976) “New Directions in Cryptography,” Information Theory, IEEE Transactions, 22.6: 644–654.
Donath, J. and Boyd, D. (2004) “Public Displays of Connection,” BT Technology Journal, 22(4), 71–82.
Durkheim, E. (1897) On Suicide. London: Classics Penguin.
Durkheim, E. (1933) The Division of Labour in Society. New York: Free Press.
eBay (2012) “High Positive Feedback but Still a SCAM: eBay Guides.” .
Egger, F.N. (2001) “Affective Design of e-Commerce User Interfaces: How to Maximise Perceived Trustworthiness,” in Helender, M.Khalid, H. and Tham, M. (Eds) Procedures of the International Conference of Affective Human Factors Design, June 27–29, London: Asean Academic Press, 317–324.
Eisenstein, E. (2005) The Printing Revolution in Early Modern Europe. Cambridge: Cambridge University Press.
Ellison, C. and Schneier, B. (2000) “Ten risks of PKI: What you're not being told about public key infrastructure,” Computer Security Journal, 16.1: 1–7.
Emory, F. and Trist, E. (1972) Toward a Social Ecology. London: Plenum Press.
Engelbart, D. (1962) Augmenting Human Intellect: A Conceptual Framework. Stanford, CA: Stanford Research Institute.
Erikson, E.H. (1977) Childhood and Society. London: Paladin Books.
Ess, C. (2010) “Trust and New Communications Technologies,” Knowledge, Technology and Policy, Vol. 23: 287–305.
Ess, C. (2010a) “The Embodied Self in a Digital Age: Possibilities, Risks, and Prospects for a Pluralistic (Democratic/Liberal) Future?Nordicom Information, 32(2), June: 105–118; <>.
Ess, C. (2010b) “Trust and New Communication Technologies: Vicious Circles, Virtuous Circles, Possible Futures,” Knowledge, Technology, and Policy, 23: 287–305; DOI 10.1007/s12130-010-9114-8.
Ess, C. (2012) “At the Intersections between Internet Studies and Philosophy: ‘Who Am I Online?’ (Introduction to Special Issue),” Philosophy & Technology, Vol. 25, Iss. 3 (September): 275–284; DOI 10.1007/s13347-012-0085-4.
Ess, C. (2013a) Digital Media Ethics (2nd ed). Cambridge: Polity Press.
Ess, C. (2013b) “The Onlife Manifesto: Philosophical Backgrounds, and the Futures of Democracy Media Usages and Equaylit,” <>
Ess, C. and Thorseth, M. (eds.) (2011) Trust and Virtual Worlds. New York: Peter Lang.
Faisal, M. and Alsumait, A. (2011) “Social Network Privacy and Trust Concerns,” iiWAS2011, (The 13th International Conference on Information Integration and Web-based Applications and Services) December 5–7, 2011, Ho Chi Minh City, Vietnam, 416–419.
Fehr, E. (2009) “The Economics and Biology of Trust,” Journal of the European Economic Association, April/May, 7(2–3): 235–266.
Flechais, I., Riegelsberger, J. and Sasse, M.A. (2005) “Divide and Conquer: The Role of Trust and Assurance in the Design of Secure Socio-Technical Systems,” Proceedings of the 2005 Workshop on New Security Paradigms, 33–41; ACM.
Floridi, L. (ed.) (2010) The Cambridge Handbook of Information and Computer Ethics. Cambridge: Cambridge University Press.
Floridi, L. (2011) “The Construction of Personal Identities Online,” Minds & Machines, 21: 477–479. DOI 10.1007/s11023-011-9254-y.
Floridi, L. (2012) “Distributed Morality in an Information Society,” Science and Engineering Ethics, Sept, Vol. 19, Issue 3, 727–743. DOI 10.1007/s11948-012-9413-4.
Floridi, L. (forthcoming) The Fourth Revolution – The Impact of Information and Communication Technologies on Our Lives. Oxford: Oxford University Press.
Fogel, J. and Nehmad, E. (2009) “Internet Social Network Communities,” Computers in Human Behaviour, Vol. 25: Issue 1, January, 153–160.
Fogg, B.J. (April 2003) “Prominence-Interpretation Theory: Explaining How People Assess Credibility Online,” CHI’03 Extended Abstracts on Human Factors in Computing Systems, 722–723; ACM.
Fox-IT (August 2012) “Black Tulip: Report of the Investigation into the DigiNotar Certificate Authority Breach,” .
Friedell, E. (1960) Kulturgeschichte der Neuzeit. München: C.H. Beck.
Fukuyama, F. (1995) Trust: The Social Virtue and the Creation of Prosperity. New York: Free Press.
Gal, S. (2002) “A Semiotics of the Public/Private Distinction,” Differences: A Journal of Feminist Cultural Studies, 13(2002): 77–95.
Gambetta, D. (ed.). (1988) Trust: Making and Breaking Co-operative Relations. Oxford: Basil Blackwell.
Gambetta, D. (1990) “Can We Trust Trust?.” In Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations. Oxford: Blackwell, 213–245.
Garfinkel, H. (1956) “Conditions of Successful Degradation Ceremonies,” American Journal of Sociology, Vol. 61, No. 2: 420–424.
Garfinkel, H. (1963a) “Parsons’ Solution to the Problem of Social Order as a Method for making Everyday Activities Observable ‘From the Point of View of the Action,’” Unpublished manuscript.
Garfinkel, H. (1963b) “A Conception of, and Experiments With, ‘Trust’ as a Condition of Stable Concerted Actions,” in Harvey, O.J. (ed.) Motivation and Social Interaction. New York: The Ronald Press, 187–238.
Garfinkel, H. (1967) Studies in Ethnomethodology. Englewood Cliffs, NJ: Prentice Hall.
Garfinkel, H. (2002) Ethnomethodology's Program. Lanham: Rowman and Littlefield.
Geertz, C. (1973) The Interpretation of Cultures. New York: Basic Books.
Geertz, C. (1995) After the Fact: Two Countries, Four Decades, One Anthropologist. Cambridge, MA: Harvard University Press.
Gergen, K. (2009) Relational Being. Oxford: Oxford University Press.
Gettier, E. (1963) “Is Justified True Belief Knowledge?Analysis, 23: 121–123.
Gibson, J.J. (1979) The Ecological Approach to Visual Perception. New York: Houghton Mifflin.
Gibson, W. (1984) Neuromancer. New York: Ace Books.
Giddens, A. (1990) The Consequences of Modernity. Stanford, CA: Stanford University Press.
Gilligan, C. (1982) In a Different Voice: Psychological Theory and Women's Development. Cambridge, MA: Harvard University Press.
Gligor, V. and Wing, J. (2011) “Towards a Theory of Trust in Networks of Humans and Computers”, 19th International Workshop on Security Protocols, LNCS, March, 28–30, Berlin.
Goethe, J.W. von (1925) Aus meinem Leben. Dichtung und Wahrheit. Goethes Sämtliche Werke, Band III, Leipzig: Insel-Verlag.
Goffman, E. (1959) The Presentation of Self in Everyday Life. Garden City, New York: Doubleday.
Goffman, E. (1962) Asylums. New York: Doubleday Anchor Books.
Golić, J.D. (1997) “Cryptanalysis of Alleged A5 Stream Cipher.” Advances in Cryptology – EUROCRYPT’97. Berlin Heidelberg: Springer.
Gomer, R., Rodrigues, E.M., Milic-Frayling, N. and Schraefel, M.C. (2013) “Network Analysis of Third Party Tracking: User Exposure to Tracking Cookies through Search”. In the Proc. of 2013 IEEE/WIC/ACM Int. Conf. on Web Intelligence (WI) and Intelligent Agent Technology (IAT), (WI-IAT’13), Atlanta, GA, USA, Nov. 17–20.
Good, D. (1990) “Individuals, Interpersonal Relations, and Trust”. In Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations. Oxford: Blackwell, 31–48.
Goodwin, C. (1981) Conversational Organization: Interaction between Speakers and Hearers. New York: Academic Press.
Google (2005) “Search Gets Personal,” At <>, retrieved March 23, 2012.
Google (2012) “Basics: Search History Personalization,” At <>, retrieved March 23, 2012.
Google (2009) “Personalized Search for Everyone,” At <>, retrieved March 23, 2012.
Govier, T. (1993) “An Epistemology of Trust,” International Journal of Moral and Social Studies 8: 155–174.
Govier, T. (1997) Social Trust and Human Communities. Montreal: McGill-Queen's University Press.
Grabner-Kräuter, S. and Kaluscha, E.A. (2003) “Empirical Research in On-line Trust: A Review and Critical Assessment,” International Journal of Human-Computer Studies, 58(6): 783–812.
Grant, R.G. (1993) “The Politics of Equilibrium,” Inquiry 35: 423–446.
Gray, M. (2009) Out in the Country: Youth, Media, and Queer Visibility in Rural America. New York: NYU Press.
Green, N.Harper, R., Murtagh, G., and Cooper, G. (2001) “Configuring the Mobile User: Sociological and Industry Models of the Consumer,” Journal of Personal and Ubiquitous Computing, Vol. 5 Issue 2, July 147–156.
Gutmann, P. (2013) Security Usability. A draft manuscript, Retrieved from: .
Hallam, R.S. (2009) Virtual Selves, Real Persons: a Dialogue across Disciplines. Cambridge: Cambridge University Press.
Hamilton, J. (2010) “Cloud Computing Economies of Scale,” MIX2010 presentation, .
Hamilton, J. (2012) “I Love Solar Power But…” (March); .
Hamilton, J. (2013) “Customer Trust,” (January), .
Han, S., Jung, J.Wetherall, D. (2012) “A Study of Third-Party Tracking by Mobile Apps in the Wild,” Technical Report, UW-CSE-12-03-01, March.
Handy, C. (1995) “Trust and the Virtual Organization,” Harvard Business Review, 73(3): 40–50.
Handley, M. (2006) “Why The Internet Only Just WorksBT Technology Journal, Vol. 24, No 3, July.
Hardin, R. (2002) Trust and Trustworthiness. New York: Russell Sage Foundation.
Hardy, G.H. and Snow, C.P. (1967) A Mathematician's Apology. Cambridge: Cambridge University Press.
Harper, R. (2005) “The Moral Order of Text: Explorations in the Social Performance of SMS.” In Hoflich, J. and Gebhart, J. (eds) Mobile Communication–Perspectives and Current Research Fields. Berlin: Peter Lang GmbH–Europäischer Verlag der Wissenschaften, 99–222.
Harper, R. (2010) Texture: Human Expression in the Age of Communications Overload. Cambridge, MA: The MIT Press.
Harper, R., Evergeti, V., Hamill, L., and Shatwell, B. (2003) “The Social Organisation of Communication in the Home of the 21st Century: An analysis of the Future of Paper-Mail and Implications for the Design of Electronic Alternatives,” The Journal of Cognition, Technology and Work, 5: 5–22.
Harper, R. and Hamill, L. (2005) “Kids will be Kids: the Role of Mobiles in Teenage Life.” In Hamill, L. and Lasen, A. (eds.) Mobile World Past, Present and Future, Springer-Verlag: Godalming, UK, 61–73.
Harper, R. and Hughes, J. (1993) “What a F*****g System!” In Button, G. (ed) Technology in Working Order. London: Routledge, 127–144.
Harrison, S. and Dourish, P. (1996) “Re-Place-ing Space: The Roles of Place and Space in Collaborative Systems.” Proceedings of CSCW’96. New York: ACM Press.
Harvey, O.J. (1963) (ed) Motivation and Social Interaction. New York: The Ronald Press.
Harvey, N., Harries, C., and Fischer, I. (2000) “Using Advice and Assessing its Quality,” Organizational Behaviour and Human Decision Processes, 81(2): 252–273.
Hayes, B. (2008) “Cloud Computing,” Communications of the ACM, 51(7): 9–11.
Hendrik, S. and Mochalski, K. (2009) “Internet Study” 2008/2009. IPOQUE Report 37: 351–362.
Henrich, J., Boyd, R., Bowles, S., Camerer, C., Fehr, E., and Gintis, H. (2004) Foundations of Human Sociality: Economic Experiments and Ethnographic Evidence from Fifteen Small Scale Societies. Oxford: Oxford University Press.
Henrich, J., Boyd, R., Bowles, S., Camerer, C., Fehr, E., Gintis, H., and McElreath, R. (2013) “In Search of Homo Economicus: Behavioural Experiments in 15 Small-Scale Societies,” The American Economic Review, Vol. 91, No. 2: 73–78.
Heritage, J. (1978) “Aspects of the Flexibilities of Natural Language Use: A Reply to Phillips,” Sociology, Vol. 12, No. 1 (January): 79–104.
Herley, C. (2009) “So Long, and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users,” Proceedings of the 2009 workshop on new security paradigms workshop, 133–144; ACM.
Herley, C. (2012) “Why do Nigerian Scammers Say They are from Nigeria?” Proceedings of the Workshop on the Economics of Information Security, June 25–26, Berlin. Herley, C. (2013) “When Does Targeting Make Sense for an Attacker?IEEE Security & Privacy, 11(2): 89–92.
Hertzberg, L. (1988) “On the Attitude of Trust,” Inquiry 31, 307–322. Reprinted in Hertzberg, L. (1994) “The Limits of Experience,” Acta Philosophica Fennica, Vol. 56, 113–130.
Hobbes, T. (1985 [1651]) Leviathan. London: Penguin.
Hollis, M. (1998) Trust within Reason. Cambridge: Cambridge University Press.
Holm, J. (1988) Pidgins and Creoles: Vol. 1, Theory and Structure. Cambridge: Cambridge University Press.
Holton, R. (1994) “Deciding to Trust, Coming to Believe,” Australasian Journal of Philosophy 72: 63–76.
Hongladarom, S. (2007) “Analysis and Justification of Privacy from a Buddhist Perspective.” In Hongladarom, S. and Charles, Ess (eds.) Information Technology Ethics: Cultural Perspectives. Hershey, PA: Idea Group Reference, 108–22.
Horn, D.B., Olson, J.S., Karasik, L. (2002) “The Effects of Spatial and Temporal Video Distortion on Lie Detection Performance.” In CHI2002 Extended abstracts. ACM Press, New York, NY, 716–718.
Hu, X., Lin, Z., and Zhang, H. (2003) “Myth or Reality: Effect of Trust-Promoting Seals in Electronic Markets,” Trust in the Network Economy, Petrovic, O.Posch, R. and Marhold, F. (Eds), Springer, Berlin, 143–150.
Hughes, J., Shapiro, D., Sharrock, W. and Anderson, R. (1988) “The Automation of Air Traffic Control.” Final Report SERC/ESRC Grant No. GR/D/86157. Swindon, UK: Economic and Social Sciences Research Council.
Hughes, J. and Sharrock, W. (2007) Theory and Methods in Sociology. Basingstoke: Plagrave.
Husserl, E. (1936) The Cartesian Meditations. The Hague: Martinus Nijhoff.
Idhe, D. (2009) Postphenomenology and Technoscience. New York: SUNY Press.
Ingold, T. (2011) Being Alive: Essays on Movement, Knowledge and Description. Abingdon, UK: Routledge.
Innis, H. (1951) The Bias of Communication. Toronto: University of Toronto Press.
Innis, H. (1972) Empire and Communications. Toronto: University of Toronto Press.
Jackson, F. (1998) From Metaphysics to Ethics: A Defence of Conceptual Analysis. Oxford: Clarendon Press.
Jackson, F. (2005) “Ramsey Sentences and Avoiding the Sui Generis.” In Lillehammer, and Mellor, (eds), Ramsey's Legacy, Oxford: Oxford University Press, 122–136.
Jackson, J. (2001) Truth, Trust, and Medicine. London: Routledge.
Jarvenpaa, S., Tractinsky, N., and Vitale, M. (2000) “Consumer Trust in an Internet Store,” Information Technology and Management 1(1–2) 45–71.
Jeanneney, J. (2007) Google and the Myth of Universal Knowledge: A View from Europe. Trans. Fagan, T.L.Chicago and London: The University of Chicago Press.
Jenson, C.S., Sarkarm, C.J., Poots, C. (2007) “Tracking Website Data-Collection and Privacy Practices with the iWatch Web Crawler,” Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS’07, New York, ACM: 29–40.
Jones, K. (1996) “Trust as an Affective Attitude,” Ethics 107, 4–25.
Johnson, S. (2012) Future Perfect: The Case For Progress In A Networked Age. New York: Riverhead Books.
Kahn, D. (1996) The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. London: Scribner.
Kahnemann, D. (2011) Thinking, Fast, Slow. London: Allen Lane.
Kant, I. ([1785] 1959) Foundations of the Metaphysics of Morals. Trans. Beck, L.W.Indianapolis, IN: Bobbs-Merrill.
Kaplan, A. (1964) The Conduct of Inquiry. San Francisco, CA: The Chandler Publishing.
Karagiannis, T., Broido, A., Brownlee, N., Claffy, K.C., and Faloutsos, M. (2004) “Is P2P dying or just hiding?”. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM).
Kendall, L. (2011) “Community and the Internet.” In Consalvo, M. and Ess, C. (eds.) The Blackwell Handbook of Internet Studies. Oxford: Wiley-Blackwell, 310–325.
Kerckhoffs, A. (1883) “La Cryptographie Militaire,Journal des Sciences Militaires, Vol. IX, pp. 5–83.
Kerr, I. (2010) “The Devil is in the Defaults,” Ottawa Citizen, May 29, 2010. Available at <>, retrieved March 23, 2012.
Kickstarter (2012) “Kickstarter Is Not a Store.” . Accessed 18/12/2012.
Kim, D.J., Ferrin, D.L., and Rao, H.R. (2008) “A Trust-Based Consumer Decision-Making Model in Electronic Commerce: The Role of Trust, Perceived Risk, and Their Antecedents,” Decision Support Systems, 44(2), 544–564.
Kimery, K.M. and McCard, M. (2002) “Third-Party Assurances: Mapping the Road to Trust in e-Retailing,” Journal of Information Technology Theory and Application, Vol. 4 No. 2: 63–82.
Kirlappos, I., Sasse, M., and Harvey, N. (2012) “Why Trust Seals Don't Work: A Study of User Perceptions and Behaviour,” Trust and Trustworthy Computing, 308–324.
Kirlappos, I. and Sasse, M.A. (2012) “Security Education against Phishing: A Modest Proposal for a Major Rethink,” Security & Privacy, IEEE 10(2): 24–32.
Kitiyadisai, K. (2005) “Privacy Rights and Protection: Foreign Values in Modern Thai Context,” Ethics and Information Technology, 7(1): 17–26.
Kohn, M. (2008) Trust: Self-Interest and the Common Good. Oxford: Oxford University Press.
Kondor, Z. (2009) “Communication and the Metaphysics of Practice: Sellarsian Ethics Revisited,” in Nyírí, K. (ed.), Engagement and Exposure: Mobile Communication and the Ethics of Social Networking. Vienna: Passagen, 179–87.
Kramer, R. (1999) “Trust and Distrust in Organizations: Emerging Perspectives, Enduring Questions,” Annual Review of Psychology, 50: 569–98.
KPCB (2012) Internet Trends: Kleiner Perkins Caufield & Byers.
Labovitz, C . Iekel-Johnson, S.McPherson, D., Oberheide, J. and Jahanian, F. (2010) “Internet inter-domain traffic”. In Proceedings of the ACM SIGCOMM 2010 conference (SIGCOMM '10).
Lagerspetz, O. (1998) Trust: The Tacit Demand. Kluwer: Dordrecht.
Lagerspetz, O. and Hertzberg, L. (2013) “Wittgenstein on Trust.” In Mäkelä, P. and Townley, C. (ed.) Trust: Analytic and Applied Perspectives. Amsterdam: Rodopi Press: 31–51.
Lahno, B. (2002) Institutional Trust: A Less Demanding Form of Trust? Caracas: Revista Latinoamericana de Estudios Avanzados (RELEA).
Lampson, B.W. (2004) “Computer Security in the Real World,” IEEE Computer 37(6): 37–46.
Lange, P.G. (2007) “Publicly Private and Privately Public: Social Networking on YouTube,” Journal of Computer-Mediated Communication, 13(1): 361–380. <>
Lankton, N. and McKnight, D. (2011) “What Does it Mean to Trust Facebook?” The Database for Advances in Information Systems, Vol. 42, No. 2: 32–54.
Lee, J. (2002) “Making Losers of Auction Winners,” New York Times. .
Lee, M.K. and Turban, E. (2001) “A Trust Model for Consumer Internet Shopping,” International Journal of Electronic Commerce 6, 75–92.
Lefebrve, H. (2004) Rhythmanalysis: Space, Time and Everyday Life. Trans. Elden, S. and Moore, G.London: Verso Books.
Leinwand, A. (2013) “Is it Too Easy for Your Cloud Provider to Snoop on Your Business?” GIGAOM, January 2013; .
Lessig, L. (2008) Remix. London: Penguin.
Lillehammer, H. and Mellor, D. (eds.) (2005) Ramsey's Legacy. Oxford: Clarendon Press.
Løgstrup, K.E. (1956) Den Etiske Fordring [The Ethical Demand]. Copenhagen: Gyldendal (Published in English as Løgstrup, K.E. (1971) The Ethical Demand, Philadelphia: Fortress Press.)
Lohr, S. (2012) “The Age of Big Data”, The New York Times, February.
Lord, C., Ross, L., and Lepper, M. (1979) “Biased Assimilation and Attitude Polarization: The Effects of Prior Theories on Subsequently Considered Evidence,” Journal of Personality and Social Psychology 37(11): 2098–2109.
Luhmann, N. (1990) “Familiarity, Confidence, Trust: Problems and Alternatives.” In Gambetta, D. (ed.) Trust: Making and Breaking Co-operative Relations. Oxford: Basil Blackwell, 94–107.
Lyas, C. (1999) Peter Winch. London: Acumen Publishing.
MacDonald, R. (2012) “Can we Trust Cloud Computing, ISPs and Social Networks? Public Service Europe.” At: <>, accessed December 3, 2012.
Mackenzie, C. (2008) “Relational Autonomy, Normative Authority and Perfectionism,” Journal of Social Philosophy 39(4, Winter): 512–533.
Martin, D. (1984) “Mother Wouldn't Like It!: Housework as Magic,” in Theory, Culture and Society, Los Angeles: Sage, 19–37.
Massey, D. (2005) For Space. Los Angeles: Sage.
Masum, H. and Tovey, M. (2011) The Reputation Society. Boston, MA: MIT Press.
Mayer-Schönberger, V. and Cukier, K. (2013) Big Data: A Revolution That Will Transform How We Live, Work and Think. London: John Murray.
Mayer, J.R. and Mitchell, J.C. (2012) “Third-Party Web Tracking: Policy and Technology.” Proceedings of the 2012 IEEE Symposium on Security and Privacy, 413–427.
Mayer, R., Davis, J., and Schoorman, F.D. (1995) “An Integrative Model of Organizational Trust,” Academy of Management Review, 20(3), 709–734.
McCarthy, T. (1978) The Critical Theory of Jürgen Habermas. Cambridge: Hutchinson Press.
McGinn, C. (2012) Truth by Analysis: Games, Names, and Philosophy. Oxford: Oxford University Press.
McKinsey Global Institute (June 2011) “Big data: The next frontier for innovation, competition, and productivity.”
McLuhan, M. (1964) Understanding Media: The Extensions of Man. New York: McGraw-Hill.
McMyler, B. (2011) Testimony, Trust, and Authority. Oxford: Oxford University Press.
Mead, G.H. ([1934] 1967) Mind, Self & Society. Chicago, IL: Chicago University Press.
Merton, R.K. (1972) “Insider and Outsiders: A Chapter in the Sociology of Knowledge,” American Journal of Sociology, Vol. 78, No. 1 (July): 9–47.
Meyrowitz, J. (1985) No Sense of Place. Oxford: Oxford University Press.
Mikians, J., Gyarmati, L., Erramilli, V. and Laoutaris, N. (2012) “Detecting price and search discrimination on the Internet”. In Proceedings of the 11th ACM Workshop on Hot Topics in Networks (HotNets-XI).
Milgram, S. (1963) “Behavioral Study of Obedience,Journal of Abnormal and Social Psychology 67(4): 371–8.
Mill, J.S. (1956 [1859]) On Liberty. Indianapolis: Bobbs-Merrill, Indianapolis.
Miller, D. (2009) The Comfort of Things. Cambridge: Polity Press.
Miller, R. (2009) “Inside Microsoft's Chicago Data Center”, Data Centre Knowledge, Oct 1st.
Mills, C. Wright. (1952) White Collar: The American Middle Classes. Oxford: Oxford University Press.
Mitzal, B. (1996) Trust in Modern Societies. Cambridge: Polity Press.
Möllering, G. (2006) Trust: Reason, Routine, Reflexivity. Amsterdam: Elsevier.
Moore, G.E. (1903) Principia Ethica. Cambridge: Cambridge University Press.
Mundie, C., de Vries, P., Haynes, P., and Corwine, M. (2002) Trustworthy Computing, Microsoft White Paper, Redmond, Washington State: Microsoft Corp.
Mumford, E. (1996) Effective Systems Design and Requirements Analysis. London: MacMillan.
Myskja, B. (2008) “The Categorical Imperative and the Ethics of Trust,” Ethics and Information Technology, 10: 213–220.
Myskja, B. (2011) “Trust, Lies, and Virtuality.” In Ess, C. and Thorseth, M. (eds.) Trust and Virtual Worlds: Contemporary Perspectives. New York: Peter Lang, 120–136.
Naughton, J. (2012) From Gutenburg to Zuckerberg. London: Quercus.
Nickel, P. (2007) “Trust and Obligation-Ascription,” Ethical Theory and Moral Practice 10: 309–19.
Nickel, P., Franssen, M., and Kroes, P. (2010) “Can We Make Sense of the Notion of Trustworthy Technology?Knowledge, Technology and Policy, 23: 429–46.
Nickerson, R. (1998) “Confirmation Bias: A Ubiquitous Phenomenon in Many Guises,” Review of General Psychology, 2(2): 175–220.
Nielsen, J., Molich, R., Snyder, S. and Farrell, C. (2000) E-Commerce User Experience: Trust. Fremont, CA: Nielsen Norman Group.
Nissenbaum, H. (2001) “Securing Trust Online: Wisdom or Oxymoron?Boston University Law Review, 81: 101–31.
Nissenbaum, H. (2010) Privacy in Context: Technology, Policy and Integrity in Everyday Life. Stanford, CA: Stanford University Press.
Nissenbaum, H. (2011) “A Contextual Approach to Privacy On-line.” In Daedalus (Fall): 32–48, Boston: MIT Press.
Odlyzko, A. (2010) “Providing Security with Insecure Systems.” Proceedings of WiSec’10 March 22–24, Hoboken, New Jersey.
Odom, W.Sellen, S.Harper, R. and Thereska, E. (2012) “Lost in Translation: Understanding the Possession of Digital Things in the Cloud.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’12). New York, NY, USA, 781–790; ACM.
Odom, W., Zimmerman, J., and Forlizzi, J. (2011) “Teenagers and Their Virtual Possessions.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’11). New York, NY, USA, 1491–1500; ACM.
Odom, W.Zimmerman, J., Forlizzi, J., Hugera, A., Marchitto, M., Canas, J., Nam, T., Lim, Y., Lee, M., Seok, J., Kim, D., Lee, Y., Row, Y., Sohn, B., and Moore, H. (2013) “Fragmentation and Transition: Understanding the Perception of Virtual Possessions among Young Adults in Spain, South Korea, and the United States.” Proceedings of SIGCHI Conference on Human Factors in Computing Systems (CHI ’13). New York, NY, USA, 1833–1842; ACM.
Ong, W. (1988) Orality and Literacy: The Technologizing of the Word. Routledge: London.
O’Neill, O. (2002) “A Question of Trust.” Reith Lectures 2002. BBC Radio4. , accessed August 18, 2012.
O’Neill, O. (2002b) Autonomy and Trust in Bioethics. Cambridge: Cambridge University Press.
O’Neill, O. (2012) “Kant and the Social Contract Tradition.” In Ellis, E. (ed.) Kant's Political Theory: Interpretations and Applications. Philadelphia: Pennsylvania State University Press.
Oppy, G. and Dowe, D. (2011) “The Turing Test,” Zalta, E. Z. (ed.), The Stanford Encyclopedia of Philosophy (Spring Edition), URL <>.
Origgi, G. (2008) Qu'est-ce que la confiance?Paris: Vrin.
Paasonen, S. (2010) “Labors of Love: Netporn, Web 2.0 and the Meanings of Amateurism,” New Media & Society, 12(8): 1297–1312.
Palfrey, J. and Gasser, U. (2008) Born Digital: Understanding the First Generation of Digital Natives. New York: Basic Books.
Pariser, E. (2011) The Filter Bubble: What the Internet is Hiding from You. London: Penguin.
Pettit, P. 2004) “Trust, Reliance and the Internet,” Analyse & Kritik, Vol. 26, 108–21.
Pettit, P. (2008) “Trust, Reliance and the Internet,” Information Technology and Moral Philosophy. Eds. van den Hoven, J. and Veckert, J.London: Cambridge University Press.
Pfitzmann, B. and Waidner, M. (1992) “How to Break and Repair a ‘Provably Secure’ Untraceable Payment System.” Advances in Cryptology – CRYPTO’91. Berlin Heidelberg: Springer.
Pieters, W. (2010) “Reve{a,i}ling the risks,” Techne, Vol. 14, No. 3: 194–206.
Plato. (1991) The Republic. Trans Bloom, A.New York: Basic Books.
Pollner, M. (1979) “Explicative Transactions: Making and Managing Meaning in Traffic Court.” In Psathas, G. (ed.) Everyday Language: Studies in Ethnomethodology. New York: Irvington, 227–256.
Popa, L., Kumar, G., Chowdhury, M., Krishnamurthy, A., Ratnasamy, S. and Stoica, I. (2012) “FairCloud: Sharing the Network In Cloud Computing.” Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM ’12)Finland, Aug. 13–17th.
Popa, L., Ghodsi, A. and Stoica, I. (2010) “HTTP as the narrow waist of the future internet”. Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks (Hotnets-IX).
Postman, N. (1985) Amusing Ourselves to Death: Public Discourse in the Age of Show Business. New York: Penguin.
Psathas, G. and Waksler, F. (1973) “Essential Features of Face-to-Face Interaction.” In Psathas, G. (ed.) Phenomenological Sociology: Issues and Applications. New York: Wiley–Interscience, 159–181.
Randall, D. (2003) “Inside the Smart Home: A Case Study,” In Harper, R. (ed.) Inside the Smart Home. London: Springer, 227–246.
Rashid, F.Y. (2012) “Recent Bank Cyber Attacks Originated From Hacked Data Centers, Not Large Botnet,” Securityweek, October, .
Raub, W. and Weesie, J. (2000a) The Management of Durable Relations. Amsterdam: Thela Thesis.
Raub, W. and Weesie, J. (2000b) “The Management of Matches: A Research Program on Solidarity in Durable Social Relations,” Netherland's Journal of Social Sciences 36, 71–88.
Reason, J. (1986) “Recurring Errors in Process Environments: some implications for the design of intelligent support systems.” Proceedings of the NATO Advanced Study Institute on Intelligent Decision Support in Process Environments. New York: Springer-Verlag, 255–270.
Richards, G. (2012) “Hamilton Makes Up With Button Over Twitter Row,” The Guardian (October 20): 37.
Riegelsberger, J., Sasse, A., McCarthy, D. (2003) “Shiny Happy People Building Trust?” Proceedings of ACM CHI 2005 New Horizons, April 5–10, 2003, Ft. Lauderdale, Florida, USA, Vol. 5, No. 1: 121–128.
Riegelsberger, J. and Sasse, M.A. (2001) “Trustbuilders and Trustbusters: The Role of Trust Cues in Interfaces to e-Commerce Applications.” In Schmid, B., Stanoevska-Slabeva, K., Tschammer, V. (eds.) Towards the E-Society: E-commerce, E-Business and E-Government. Norwell: Kluwer, 17–30.
Riegelsberger, J. and Sasse, M.A. (2003b) “Designing e-Commerce Applications for Consumer Trust.” In Petrovic, O., Ksela, M., and Fallenboeck, M. (eds.) Trust in the Network Economy. Wien: Springer, 97–110.
Riegelsberger, J., Sasse, M.A., and McCarthy, J. D. (2003a) “The Researcher's Dilemma: Evaluating Trust in Computer-Mediated Communication,” International Journal of Human-Computer Studies 58(6), 759–781.
Riegelsberger, J., Sasse, M.A., and McCarthy, J.D. (2005) “The Mechanics of Trust: A Framework for Research and Design,” International Journal of Human-Computer Studies 62(3), 381–422.
Riepl, W. (1913) Das Nachrichtenwesen des Altertums mit besonderer Rücksicht auf die Römer. Leipzig: Teubner.
Rivest, R.L., Shamir, A., and Adleman, L. (1978) “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM 21.2: 120–126.
Rorty, R. (1979) Philosophy and the Mirror of Nature. New Jersey: Princeton University Press.
Rose, E. (1992) The Werald. Boulder, CO: The Waiting Room Press.
Anderson, R., and Moore, T. (2006) “The economics of information security.” Science 314.5799: 610–613.
Rushkoff, D. (2010) Program or be Programmed. Berkeley, CA: Soft Skull Press.
Ryle, G. (1949) The Concept of Mind. London: Hutchinson.
Sacks, H. (1972) “On the Analysability of Stories by Children.” In Gumperz, J.J. and Hymes, D. (eds.) Directions in Sociolinguistics: The Ethnography of Communication. New York: Holt, Rinehart and Winston, 325–345.
Salam, A., Iyer, L., Palvia, P., and Singh, R. (2005) “Trust in e-Commerce,” Communications of the ACM 48: 73–77.
Saltzer, J., Reed, D., and Clark, D.D. (1984) “End-to-End Arguments in System Design,” ACM Transactions on Computer Systems, Vol. 2, No. 4 (November): 277–288.
Sante, L. (1993) “Sophie Calle's Uncertainty Principle,” Parkett Issue 36 (June), 74–85.
Sasse, M. and Kirlappos, I. (2011) “Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling,” Proceedings of Trust Management V, 9–12. IFIP Advances in Information and Communication Technology, Springer: Boston.
Schatzki, T. (2010) The Timespace of Human Activity. Lanham, MD: Lexington Books.
Schechter, S.E., Dhamija, R., Ozment, A., and Fischer, I. (2007) “The Emperor's New Security Indicators”. Security and Privacy, 2007 (SP’07). IEEE Symposium, Oakland, California, 51–65.
Schneier, B. (2012) Liars and Outliers: Enabling the Trust That Society Needs to Thrive. Indianapolis, IN: John Wiley & Sons.
Schutz, A. (1982) “On Multiple Realities.” In The Problem of Social Reality, Collected Papers, Vol. 1. The Hague: Martinus Nijhoff, 340–345.
Schutz, A. and Luckmann, T. (1973) The Structures of the Life World. London: Heinemann.
Schulze, H. and Mochalski, K. (2009) “Internet Study 2008/2009.” IPOQUE Report 37: 351–362.
Schwartz, H. and Jacobs, J. (1979) Qualitative Sociology: A Method to the Madness. New York: The Free Press.
Seghi, A. (2012) “The UK's Online Obsession: The Latest Ofcom Figures for Media Consumption,” The Guardian Datablog, December 13, 2012, .
Shannon, C. (1949) “Communication Theory of Secrecy Systems,” Bell System Technical Journal, Vol. 28(4): 656–715.
Shieh, A., Kandula, S., Greenberg, A., Kim, C. and Saha, B. (2011) “Sharing the data center network”. In Proceedings of the 8th USENIX conference on Networked systems design and implementation (NSDI'11). USENIX Association, Berkeley, CA, USA, 23–23.
Shneiderman, B. (2000) “Designing Trust into Online Experiences,” Communications of the ACM, 43(12): 57–59.
Shope, R. (1983) The Analysis of Knowing. A Decade of Research. Princeton, NJ: Princeton University Press.
Shue, D., Freedman, M.J. and Shaikh, A. (2012) “Performance isolation and fairness for multi-tenant cloud storage”. In Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation (OSDI'12). USENIX Association, Berkeley, CA, USA, 349–362.
Siau, K. and Shen, Z. (2003) “Building Customer Trust in Mobile Commerce,” Communications of the ACM, April 2003/Vol. 46, No. 4: 91–94.
Simmel, G. (1950) The Sociology of Georg Simmel. Trans. Wolff, K.H.New York: The Free Press.
Simmel, G. (1955) Conflict and the Web of Group-Affiliations. New York: The Free Press.
Simmel, G. (1978) The Philosophy of Money. London: Routledge.
Simpson, T. (2011a) “Robots, Trust and War,” Philosophy and Technology, 24(3): 325–337.
Simpson, T. (2011b) “e-Trust and Reputation,” Ethics and Information Technology, 13(1): 29–38.
Simpson, T. (2012a) “What is Trust?Pacific Philosophical Quarterly, 93: 550–569.
Simpson, T. (2012b) “Evaluating Google as an Epistemic Tool,” Metaphilosophy, 43(4): 426–445.
Smith, D.E. (1978) “K. is Mentally Ill: The Anatomy of a Factual Account,” Sociology, 12:1, 23–45.
Smith, D.E. (1982) “The Active Text: Texts as Constituents of Social Relations.” In Smith, D.E. (ed.) Texts, Facts and Femininity. Boston, MA: Northeastern University Press, 12–51.
Sommerville, I., Dewsbury, G.Clarke, K., and Rouncefield, M. (2006) “Dependability and Trust in Organizational and Domestic Computer Systems.” In Clarke, K., Hardstone, G., Rouncefield, M. and Sommerville, I. (eds.) Trust in Technology: A Socio-Technical Perspective. Dordrecht: Springer, 169–94.
Spafford, E. (2009) “Cyber Security,” ISIPS 2008, LNCS 5661, 20–33.
Stajano, F. and Wilson, P. (2011) “Understanding Scam Victims: Seven Principles for Systems Security,” Communications of the ACM, 54(3), 70–75.
Strawson, P. (1974) “Freedom and Resentment.” In Strawson, P. (ed.) Freedom and Resentment and Other Essays. London: Methuen, 1–25.
Strawson, P. (1992) Analysis and Metaphysics: An Introduction to Philosophy. Oxford: Oxford University Press.
Stuart, S. (2008) “From Agency to Apperception: Through Kinaesthesia to Cognition and Creation,” Ethics and Information Technology, 10: 255–264.
Sullins, J. (2011) “The Next Steps in RoboEthics,” Keynote Address. International Association for Computing and Philosophy (IACAP) Conference, July 3. Aarhus, Denmark.
Sztompka, P. (2003) Trust: A Sociological Theory. Cambridge: Cambridge University Press.
Taddeo, M. (2009) “Defining Trust and E-trust: From Old Theories to New Problems,” International Journal of Technology and Human Interaction, 5: 23–35.
Taddeo, M. (2010) “Modelling Trust in Artificial Agents, A First Step Toward the Analysis of e-Trust,” Minds and Machines, 20: 243–257.
Taddeo, M. (2011) “The Role of e-Trust in Distribute Artificial Systems.” In Ess, C. and Thorseth, M. (eds.) Trust and Virtual Worlds: Contemporary Perspectives. New York: Peter Lang, 75–88.
Tan, Y.H. and Thoen, W. (2001) “Toward a Generic Model of Trust for Electronic Commerce,” International Journal of Electronic Commerce, 5, 61–74.
Tapscott, D. and Willians, A.D. (2006) “Wikinomics: How Mass Collaboration Changes Everything”, Portfolio Trade.
Taylor, C. (1989) Sources of Self: the Making of the Modern Identity. Cambridge: Cambridge University Press.
Thereska, E. and Harper, R. (2012) “Multi-structured Redundancy”. HotStorage’12: the 4th Workshop on Hot Topics in Storage and File Systems, Usenix, Boston.
Thereska, T., Ballani, H., O'Shea, G., Karagiannis, T., Rowstron, A., Talpey, T., Black, R. and Zhu, T. (2013) “IOFlow: A Software-Defined Storage Architecture” in SOSP'13: The 24th ACM Symposium on Operating Systems Principles, ACM, November.
Thomas, W. and Thomas, J. (1928) The Child in America. New York: Knopf.
Thomborson, C. (2010) “Axiomatic and Behavioral Trust,” in TRUST’10. Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Springer-Verlag: Berlin, Heidelberg, 352–366.
Thompson, K. (1984) “Reflections on Trusting Trust.” Communications of the ACM 27(8): 761–763.
Thorn, C. and Dibbell, J. (eds.) (2012) Violation: Rape in Gaming. Create Space Independent Publishing Platform (October 17, 2012).
Travers, J. and Milgram, S. (1969) “An Experimental Study of the Small World Problem.” Sociometry, Vol. 32, No. 4: 425–443.
Turilli, M., Vaccaro, A., and Mariarosaria, T. (eds.) (2010) “The Case of Online Trust,” Knowledge, Technology and Policy, Vol. 23: 333–345.
Turing, A. (1950) “Computing Machinery and Intelligence”. Mind: A Quarterly Review of Psychology and Philosophy, 59(236): 433–460. October.
Twyman, M., Harvey, N., and Harries, C. (2008) “Trust in Motives, Trust in Competence: Separate Factors Determining the Effectiveness of Risk Communication,” Judgment and Decision Making, 3: 111–120.
U.S. Department of Defense (1983) “Trusted Computer System Evaluation Criteria” (The Orange Book). Available at: <>.
Vallor, S. (2010) “Social Networking Technology and the Virtues,” Ethics and Information Technology, 12: 157–170. DOI 10.1007/s10676-009-9202-1.
Van Gelder, L. ([1985] 1991) “The Strange Case of the Electronic Lover.” In Dunlop, C. and Kling, R. (eds.) Computerization and Controversy. San Diego, CA: Academic Press, 364–375.
Vaudenay, S. (2002) “Security Flaws Induced by CBC Padding – Applications to SSL, IPSEC, WTLS…” Advances in Cryptology – EUROCRYPT 2002. Berlin Heidelberg: Springer.
Wason, P. (1960) “On the Failure to Eliminate Hypotheses in a Conceptual Task,” Quarterly Journal of Experimental Psychology 12(3): 129–140.
Watson, R. (2009) “Constitutive Practices and Garfinkel's Notion of Trust: Revisited,” Journal of Classical Sociology 9:4 (November): 475–499.
Watson, R. and Carlin, A.P. (2012) “‘Information’: Praxeological Considerations,” Human Studies, Vol. 35: 327–345.
Watts, D. (2004) Six Degrees: The Science of the Connected Age. London: Random House.
Weckert, J. (2005) On-line Trust. In Cavalier, R. (ed.) The Impact of the Internet on Our Moral Lives, Albany, NJ: Sunny Press, 95–117.
Weckert, J. (2011) “Trusting Software Agents.” In Ess, and Thorseth, (eds.) 2011, 89–102.
Whitten, A. and Tygar, J.D. (1999) “Why Johnny can't encrypt: A usability evaluation of PGP 5.0”. Proceedings of the 8th USENIX Security Symposium, Vol. 99. New York: McGraw-Hill.
Whitty, M.T. and Joinson, A.N. (2009) Truth, Lies and Trust on the Internet. New York: Routledge/Taylor & Francis Group.
Wieder, D.L. (1974) Language and Social Reality. The Hague: Mouton.
Wignall, A. (2012) “What it's like to work at…Brunel University?” The Guardian. . Accessed 18/12/2012.
Williams, B. (1990) “Formal Structures and Social Reality.” In Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations. Oxford: Blackwell, 3–13.
Williams, B. (2002) Truth and Truthfulness: An Essay in Genealogy. Princeton: Princeton University Press.
Williams, M.L. (circa 1972) “Seeing Through Appearances: Procedures for ‘Discovering’ Criminal Activity.” Unpublished conference paper, Department of Sociology, University of California, Santa Barbara.
Williamson, T. (2000) Knowledge and Its Limits. Oxford: Oxford University Press.
Winch, P. (1958) The Idea of a Social Science. London: Routledge.
Wittgenstein, L. (1953) Philosophical Investigations. Trans. Anscombe, G.E.M.Oxford: Basil Blackwell.
Wong, P.H. (2012) Net Recommendation: Prudential Appraisals of Digital Media and the Good Life. PhD thesis. Enschede: University of Twente, Netherlands.
Wu, M., Miller, R.C., and Garfinkel, S.L. (2006) “Do security toolbars actually prevent phishing attacks?” In CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY, USA. ACM, 601–610.
Zhang, Y., Egelman, S., Cranor, L., and Hong, J. (2006a) “Phinding Phish: Evaluating Anti-Phishing Tools.” Proceedings of 14th Annual Network and Distributed System Security Symposium, ISOC.
Zhang, Q., Markantonakis, K., and Mayes, K. (2006b) “A Mutual Authentication Enabled Fair-Exchange and Anonymous e-Payment Protocol,” E-Commerce Technology, 2006. The 8th IEEE International Conference on and Enterprise Computing, E-Commerce, and E-Services, The 3rd IEEE International Conference, 20.
Zinn, J. (Ed) (2008) Social Theories of Risk and Uncertainty. London: Blackwell.


Altmetric attention score

Full text views

Total number of HTML views: 0
Total number of PDF views: 1080 *
Loading metrics...

Book summary page views

Total views: 1539 *
Loading metrics...

* Views captured on Cambridge Core between September 2016 - 21st September 2018. This data will be updated every 24 hours.