The Role of Trust Management in Distributed Systems Security

Author(s):  
Matt Blaze ◽  
Joan Feigenbaum ◽  
John Ioannidis ◽  
Angelos D. Keromytis
2019 ◽  
Vol 6 (1) ◽  
pp. 47-63 ◽  
Author(s):  
Bettina Nissen ◽  
Ella Tallyn ◽  
Kate Symons

Abstract New digital technologies such as Blockchain and smart contracting are rapidly changing the face of value exchange, and present new opportunities and challenges for designers. Designers and data specialists are at the forefront of exploring new ways of exchanging value, using Blockchain, cryptocurrencies, smart contracting and the direct exchanges between things made possible by the Internet of Things (Tallyn et al. 2018; Pschetz et al. 2019). For researchers and designers in areas of Human Computer Interaction (HCI) and Interaction Design to better understand and explore the implications of these emerging and future technologies as Distributed Autonomous Organisations (DAOs) we delivered a workshop at the ACM conference Designing Interactive Systems (DIS) in Edinburgh in 2017 (Nissen et al. 2017). The workshop aimed to use the lens of DAOs to introduce the principle that products and services may soon be owned and managed collectively and not by one person or authority, thus challenging traditional concepts of ownership and power. This workshop builds on established HCI research exploring the role of technology in financial interactions and designing for the rapidly changing world of technology and value exchange (Kaye et al. 2014; Malmborg et al. 2015; Millen et al. 2015; Vines et al. 2014). Beyond this, the HCI community has started to explore these technologies beyond issues of finance, money and collaborative practice, focusing on the implications of these emerging but rapidly ascending distributed systems in more applied contexts (Elsden et al. 2018a). By bringing together designers and researchers with different experiences and knowledge of distributed systems, the aim of this workshop was two-fold. First, to further understand, develop and critique these new forms of distributed power and ownership and second, to practically explore how to design interactive products and services that enable, challenge or disrupt existing and emerging models.


Author(s):  
Ghada Farouk Elkabbany ◽  
Mohamed Rasslan

Distributed computing systems allow homogenous/heterogeneous computers and workstations to act as a computing environment. In this environment, users can uniformly access local and remote resources in order to run processes. Users are not aware of which computers their processes are running on. This might pose some complicated security problems. This chapter provides a security review of distributed systems. It begins with a survey about different and diverse definitions of distributed computing systems in the literature. Different systems are discussed with emphasize on the most recent. Finally, different aspects of distributed systems security and prominent research directions are explored.


2015 ◽  
Vol 7 (3) ◽  
pp. 1-17
Author(s):  
Juan Luis Santos

This paper discusses the key role of incentives in information systems security. Vulnerabilities can be reduced, and even removed, if individual motivations are taken into account in the process of protection and insurance design. The article first discusses the importance of externalities, free-riding behavior, uncertainty and the incentives mismatch between individuals and organizations involved in information systems security. Previous works perform this study using a game theoretical approach but the paper shows that an agent-based model is capable of including the heterogeneity and interrelations among individuals, not focusing on the reached equilibrium but on the dynamics prior to its emergence.


Author(s):  
Peace Kumah

Emerging human resource management (HRM) practices are focusing on background checks, training and development, employer-employee relations, responsibility and accountability, and monitoring of information systems security resources. Information systems security ensures that appropriate resources and adequate skills exist in the organization to effectively manage information security projects. This chapter examined the role of HRM in enhancing organizational information systems security. Using importance-performance map analysis, the study found training, background checks, and monitoring as crucial HRM practices that could enhance organizational information systems security. Moreover, four indicators, consisting of training on mobile devices security; malware management; background checks; and monitoring of potential, current, and former employees recorded high importance but with rather low performance. Consequently, these indicators should be improved. On the contrary, the organizations placed excessive focus on responsibility, accountability, and employee relations.


2020 ◽  
Vol 12 (9) ◽  
pp. 3877
Author(s):  
Marwa Ghanem ◽  
Ibrahim Elshaer ◽  
Alaa Shaker

There have been many attempts to understand the role of trust in the success of Information Systems (IS), but they have mainly studied users’ trust in IS themselves in online contexts, with little attention being paid to other possible trust types and organizational IS contexts. Also, there is a dearth of research on the topic in relation to tourism context and developing countries in general. This study examines the mediating role of three types of trust (management-based, provider-based, and system-based trust) in the relationship between tourism IS qualities (system, information, and service quality) with employees’ satisfaction and the intention to and actual use of a system. Perceptions were tested with data from 200 employees in the public sector of the Egyptian tourism industry using structural equation modeling. The results revealed that trust directly affects intention to use/use and user satisfaction, and it completely mediates the effect of the IS qualities on the intention to use/use and user satisfaction. This study draws attention to the requirement of investigating different types of trust to better understand its impact on tourism IS adaptation in developing countries.


Sign in / Sign up

Export Citation Format

Share Document