Designing for social interaction with mundane technologies: issues of security and trust.
Sara BuryJohnathan IshmaelNicholas J. P. RacePaul SmithPublished in: Pers. Ubiquitous Comput. (2010)
Keyphrases
- social interaction
- security issues
- social systems
- security and privacy issues
- social influence
- learning processes
- social networks
- social psychology
- security services
- trust management
- information security
- social behavior
- social media
- privacy concerns
- trust relationships
- access control
- trusted computing
- public key infrastructure
- trust model
- trust negotiation
- virtual teams
- social learning
- social network analysis
- mutual understanding
- human agent
- competence development
- social intelligence
- social norms
- mutual adaptation