In this chapter we argue that transparency is worthless in guaranteeing the trustworthiness of the trustees (those in charge of designing and managing digital systems) when trustors are vulnerable and depend on those same technologies and systems. Specifically here we focus on the trustworthiness of security engineers, those responsible for the dependability of systems and devices. We propose abandoning the rationalistic instrumental paradigm of trust to embrace a vision of trust as care in order to ensure the trustworthiness—that is, the competence, integrity, and benevolence—of operators of digitally mediated sociotechnical systems.This work was partially funded by the “TRESCA—Trustworthy, Reliable, and Engaging Scientific Communication A...
This thesis aims to address several issues emerging in the new digital world. Using Trusted Computin...
In this paper we lay some theoretical foundations for examining governance, users and trust in onli...
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by...
The recent decades have witnessed dramatic developments in information and communication technologie...
Technology is a practically indispensible means for satisfying one’s basic interests in all central ...
In this paper, I will deal with trust in technological devices. Nowadays, we are led to trust AI mac...
In this paper we raise the question whether technological artifacts can properly speaking be trusted...
Part 1: Invited PaperInternational audienceThe computer security community has traditionally regarde...
\(\bf Purpose\) We defend the notion of "trust in technology" against the philosophical view that t...
Along with the invention of computers and interconnected networks, physical societal notions like se...
In these uncertain economic times, two key ingredients which are in short supply are trust and confi...
Along with the invention of computers and interconnected networks, physical societal notions like se...
Security is an interesting area, one in which we may well be guilty of misunderstanding the very peo...
In this paper we raise the question whether technological artifacts can properly speaking be trusted...
Research Doctorate - Doctor of Philosophy (PhD)Digital environments have long been considered an ena...
This thesis aims to address several issues emerging in the new digital world. Using Trusted Computin...
In this paper we lay some theoretical foundations for examining governance, users and trust in onli...
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by...
The recent decades have witnessed dramatic developments in information and communication technologie...
Technology is a practically indispensible means for satisfying one’s basic interests in all central ...
In this paper, I will deal with trust in technological devices. Nowadays, we are led to trust AI mac...
In this paper we raise the question whether technological artifacts can properly speaking be trusted...
Part 1: Invited PaperInternational audienceThe computer security community has traditionally regarde...
\(\bf Purpose\) We defend the notion of "trust in technology" against the philosophical view that t...
Along with the invention of computers and interconnected networks, physical societal notions like se...
In these uncertain economic times, two key ingredients which are in short supply are trust and confi...
Along with the invention of computers and interconnected networks, physical societal notions like se...
Security is an interesting area, one in which we may well be guilty of misunderstanding the very peo...
In this paper we raise the question whether technological artifacts can properly speaking be trusted...
Research Doctorate - Doctor of Philosophy (PhD)Digital environments have long been considered an ena...
This thesis aims to address several issues emerging in the new digital world. Using Trusted Computin...
In this paper we lay some theoretical foundations for examining governance, users and trust in onli...
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by...