Modelling Trust and Trust-Building Among IT-Security Professionals - How Do Practitioners Find Out Whom to Work With?
Laurin B. WeissingerPublished in: HCI (22) (2017)
Keyphrases
- security requirements
- access control
- information security
- security policies
- trust model
- information systems
- policy enforcement
- trust management
- trust relationships
- trust evaluation
- information technology
- security management
- virtual teams
- intrusion detection
- security issues
- data mining
- real world
- researchers and practitioners
- computer security
- open systems
- trusted computing
- public key infrastructure
- trust negotiation