Trust, computing, and society:
The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity o...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2014
|
Schlagworte: | |
Online-Zugang: | BSB01 FHN01 Volltext |
Zusammenfassung: | The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust |
Beschreibung: | Title from publisher's bibliographic system (viewed on 05 Oct 2015) |
Beschreibung: | 1 online resource (xii, 362 pages) |
ISBN: | 9781139828567 |
DOI: | 10.1017/CBO9781139828567 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043944674 | ||
003 | DE-604 | ||
005 | 20191105 | ||
007 | cr|uuu---uuuuu | ||
008 | 161206s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781139828567 |c Online |9 978-1-139-82856-7 | ||
024 | 7 | |a 10.1017/CBO9781139828567 |2 doi | |
035 | |a (ZDB-20-CBO)CR9781139828567 | ||
035 | |a (OCoLC)967603335 | ||
035 | |a (DE-599)BVBBV043944674 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-92 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a MS 7965 |0 (DE-625)123801: |2 rvk | ||
084 | |a SR 850 |0 (DE-625)143366: |2 rvk | ||
245 | 1 | 0 | |a Trust, computing, and society |c edited by Richard H. R. Harper, Microsoft Research Cambridge |
246 | 1 | 3 | |a Trust, Computing, & Society |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2014 | |
300 | |a 1 online resource (xii, 362 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 05 Oct 2015) | ||
505 | 8 | |a Machine generated contents note: 1. Introduction and overview R. Harper; Part I. The Topography of Trust and Computing: 2. The role of trust in cyberspace D. Clark; 3. The new face of the Internet T. Karagiannis; 4. Trust as a methodological tool in security engineering G. Danezis; Part II. Conceptual Points of View: 5. Computing and the search for trust T. Simpson; 6. The worry about trust O. Lagerspetz; 7. The inescapability of trust R. J. Anderson and W. Sharrock; 8. Trust in interpersonal interaction and cloud computing D. R. Watson; 9. Trust, social identity, and computation C. Ess; Part III. Trust in Design: 10. Design for trusted and trustworthy services A. Sasse and I. Kirlappos; 11. Dialogues: trust in design R. Banks; 12. Trusting oneself R. Harper and W. Odom; 13. Reflections on trust, computing and society R. Harper; Bibliography | |
520 | |a The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust | ||
650 | 4 | |a Gesellschaft | |
650 | 4 | |a Computers / Social aspects | |
650 | 4 | |a Internet / Social aspects | |
650 | 4 | |a Trust | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer networks / Reliability | |
650 | 4 | |a Information technology / Social aspects | |
650 | 0 | 7 | |a Gesellschaft |0 (DE-588)4020588-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Vertrauen |0 (DE-588)4063290-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Vertrauen |0 (DE-588)4063290-8 |D s |
689 | 0 | 3 | |a Gesellschaft |0 (DE-588)4020588-5 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Harper, Richard |d 1960- |0 (DE-588)137217048 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-107-03847-9 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9781139828567 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029353645 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1017/CBO9781139828567 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9781139828567 |l FHN01 |p ZDB-20-CBO |q FHN_PDA_CBO |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176889831489536 |
---|---|
any_adam_object | |
author2 | Harper, Richard 1960- |
author2_role | edt |
author2_variant | r h rh |
author_GND | (DE-588)137217048 |
author_facet | Harper, Richard 1960- |
building | Verbundindex |
bvnumber | BV043944674 |
classification_rvk | MS 7965 SR 850 |
collection | ZDB-20-CBO |
contents | Machine generated contents note: 1. Introduction and overview R. Harper; Part I. The Topography of Trust and Computing: 2. The role of trust in cyberspace D. Clark; 3. The new face of the Internet T. Karagiannis; 4. Trust as a methodological tool in security engineering G. Danezis; Part II. Conceptual Points of View: 5. Computing and the search for trust T. Simpson; 6. The worry about trust O. Lagerspetz; 7. The inescapability of trust R. J. Anderson and W. Sharrock; 8. Trust in interpersonal interaction and cloud computing D. R. Watson; 9. Trust, social identity, and computation C. Ess; Part III. Trust in Design: 10. Design for trusted and trustworthy services A. Sasse and I. Kirlappos; 11. Dialogues: trust in design R. Banks; 12. Trusting oneself R. Harper and W. Odom; 13. Reflections on trust, computing and society R. Harper; Bibliography |
ctrlnum | (ZDB-20-CBO)CR9781139828567 (OCoLC)967603335 (DE-599)BVBBV043944674 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Soziologie |
doi_str_mv | 10.1017/CBO9781139828567 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04457nmm a2200661zc 4500</leader><controlfield tag="001">BV043944674</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20191105 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161206s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139828567</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-139-82856-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9781139828567</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9781139828567</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)967603335</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043944674</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MS 7965</subfield><subfield code="0">(DE-625)123801:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 850</subfield><subfield code="0">(DE-625)143366:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trust, computing, and society</subfield><subfield code="c">edited by Richard H. R. Harper, Microsoft Research Cambridge</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Trust, Computing, & Society</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 362 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 05 Oct 2015)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Machine generated contents note: 1. Introduction and overview R. Harper; Part I. The Topography of Trust and Computing: 2. The role of trust in cyberspace D. Clark; 3. The new face of the Internet T. Karagiannis; 4. Trust as a methodological tool in security engineering G. Danezis; Part II. Conceptual Points of View: 5. Computing and the search for trust T. Simpson; 6. The worry about trust O. Lagerspetz; 7. The inescapability of trust R. J. Anderson and W. Sharrock; 8. Trust in interpersonal interaction and cloud computing D. R. Watson; 9. Trust, social identity, and computation C. Ess; Part III. Trust in Design: 10. Design for trusted and trustworthy services A. Sasse and I. Kirlappos; 11. Dialogues: trust in design R. Banks; 12. Trusting oneself R. Harper and W. Odom; 13. Reflections on trust, computing and society R. Harper; Bibliography</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gesellschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Social aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Social aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Trust</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Reliability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Social aspects</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Gesellschaft</subfield><subfield code="0">(DE-588)4020588-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Vertrauen</subfield><subfield code="0">(DE-588)4063290-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Vertrauen</subfield><subfield code="0">(DE-588)4063290-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Gesellschaft</subfield><subfield code="0">(DE-588)4020588-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Harper, Richard</subfield><subfield code="d">1960-</subfield><subfield code="0">(DE-588)137217048</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-107-03847-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9781139828567</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029353645</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9781139828567</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9781139828567</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">FHN_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043944674 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:39:22Z |
institution | BVB |
isbn | 9781139828567 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029353645 |
oclc_num | 967603335 |
open_access_boolean | |
owner | DE-12 DE-92 |
owner_facet | DE-12 DE-92 |
physical | 1 online resource (xii, 362 pages) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO FHN_PDA_CBO |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Trust, computing, and society edited by Richard H. R. Harper, Microsoft Research Cambridge Trust, Computing, & Society Cambridge Cambridge University Press 2014 1 online resource (xii, 362 pages) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 05 Oct 2015) Machine generated contents note: 1. Introduction and overview R. Harper; Part I. The Topography of Trust and Computing: 2. The role of trust in cyberspace D. Clark; 3. The new face of the Internet T. Karagiannis; 4. Trust as a methodological tool in security engineering G. Danezis; Part II. Conceptual Points of View: 5. Computing and the search for trust T. Simpson; 6. The worry about trust O. Lagerspetz; 7. The inescapability of trust R. J. Anderson and W. Sharrock; 8. Trust in interpersonal interaction and cloud computing D. R. Watson; 9. Trust, social identity, and computation C. Ess; Part III. Trust in Design: 10. Design for trusted and trustworthy services A. Sasse and I. Kirlappos; 11. Dialogues: trust in design R. Banks; 12. Trusting oneself R. Harper and W. Odom; 13. Reflections on trust, computing and society R. Harper; Bibliography The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust Gesellschaft Computers / Social aspects Internet / Social aspects Trust Computer security Computer networks / Security measures Computer networks / Reliability Information technology / Social aspects Gesellschaft (DE-588)4020588-5 gnd rswk-swf Vertrauen (DE-588)4063290-8 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Internet (DE-588)4308416-3 s Computersicherheit (DE-588)4274324-2 s Vertrauen (DE-588)4063290-8 s Gesellschaft (DE-588)4020588-5 s 2\p DE-604 Harper, Richard 1960- (DE-588)137217048 edt Erscheint auch als Druckausgabe 978-1-107-03847-9 https://doi.org/10.1017/CBO9781139828567 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Trust, computing, and society Machine generated contents note: 1. Introduction and overview R. Harper; Part I. The Topography of Trust and Computing: 2. The role of trust in cyberspace D. Clark; 3. The new face of the Internet T. Karagiannis; 4. Trust as a methodological tool in security engineering G. Danezis; Part II. Conceptual Points of View: 5. Computing and the search for trust T. Simpson; 6. The worry about trust O. Lagerspetz; 7. The inescapability of trust R. J. Anderson and W. Sharrock; 8. Trust in interpersonal interaction and cloud computing D. R. Watson; 9. Trust, social identity, and computation C. Ess; Part III. Trust in Design: 10. Design for trusted and trustworthy services A. Sasse and I. Kirlappos; 11. Dialogues: trust in design R. Banks; 12. Trusting oneself R. Harper and W. Odom; 13. Reflections on trust, computing and society R. Harper; Bibliography Gesellschaft Computers / Social aspects Internet / Social aspects Trust Computer security Computer networks / Security measures Computer networks / Reliability Information technology / Social aspects Gesellschaft (DE-588)4020588-5 gnd Vertrauen (DE-588)4063290-8 gnd Internet (DE-588)4308416-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4020588-5 (DE-588)4063290-8 (DE-588)4308416-3 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Trust, computing, and society |
title_alt | Trust, Computing, & Society |
title_auth | Trust, computing, and society |
title_exact_search | Trust, computing, and society |
title_full | Trust, computing, and society edited by Richard H. R. Harper, Microsoft Research Cambridge |
title_fullStr | Trust, computing, and society edited by Richard H. R. Harper, Microsoft Research Cambridge |
title_full_unstemmed | Trust, computing, and society edited by Richard H. R. Harper, Microsoft Research Cambridge |
title_short | Trust, computing, and society |
title_sort | trust computing and society |
topic | Gesellschaft Computers / Social aspects Internet / Social aspects Trust Computer security Computer networks / Security measures Computer networks / Reliability Information technology / Social aspects Gesellschaft (DE-588)4020588-5 gnd Vertrauen (DE-588)4063290-8 gnd Internet (DE-588)4308416-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Gesellschaft Computers / Social aspects Internet / Social aspects Trust Computer security Computer networks / Security measures Computer networks / Reliability Information technology / Social aspects Vertrauen Internet Computersicherheit Aufsatzsammlung |
url | https://doi.org/10.1017/CBO9781139828567 |
work_keys_str_mv | AT harperrichard trustcomputingandsociety AT harperrichard trustcomputingsociety |