default search action
Stephen Marsh 0001
Person information
- affiliation: University of Ontario Institute of Technology, Oshawa, Canada
Other persons with the same name
- Stephen Marsh 0002 — TransCanada Pipelines, Calgary, AB, Canada
- Steve Marsh — disambiguation page
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j19]Tosan Atele-Williams, Stephen Marsh:
Information trust model. Cogn. Syst. Res. 80: 50-70 (2023) - [j18]Simon T. Powers, Olena Linnyk, Michael Guckert, Jennifer Hannig, Jeremy Pitt, Neil Urquhart, Anikó Ekárt, Nils Gumpfer, The Anh Han, Peter R. Lewis, Stephen Marsh, Tim Weber:
The Stuff We Swim in: Regulation Alone Will Not Lead to Justifiable Trust in AI. IEEE Technol. Soc. Mag. 42(4): 95-106 (2023) - 2022
- [j17]Peter R. Lewis, Stephen Marsh:
What is it like to trust a rock? A functionalist perspective on trust and trustworthiness in artificial intelligence. Cogn. Syst. Res. 72: 33-49 (2022) - [j16]Jean Botev, Ada Diaconescu, Heiko Hamann, Stephen Marsh, Francisco J. Rodríguez-Lera:
Editorial: Socio-technical ecologies: Design for human-machine systems. Frontiers Robotics AI 9 (2022) - 2021
- [j15]Rolf Egert, Jörg Daubert, Steve Marsh, Max Mühlhäuser:
Exploring energy grid resilience: The impact of data, prosumer awareness, and action. Patterns 2(6): 100258 (2021) - [j14]Peter R. Lewis, Stephen Marsh, Jeremy Pitt:
AI vs "AI": Synthetic Minds or Speech Acts. IEEE Technol. Soc. Mag. 40(2): 6-13 (2021) - [p3]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - 2020
- [j13]Stephen Marsh, Tosan Atele-Williams, Anirban Basu, Natasha Dwyer, Peter R. Lewis, Hector Miller-Bakewell, Jeremy Pitt:
Thinking about Trust: People, Process, and Place. Patterns 1(3): 100039 (2020)
2010 – 2019
- 2019
- [j12]Roba Abbas, Stephen Marsh, Kristina Milanovic:
Ethics and System Design in a New Era of Human-Computer Interaction [Guest Editorial]. IEEE Technol. Soc. Mag. 38(4): 32-33 (2019) - 2018
- [c46]Tosan Atele-Williams, Stephen Marsh:
Towards a Computational Model of Information Trust. IFIPTM 2018: 124-136 - [c45]Stephen Marsh, Ada Diaconescu, David Evans, Tracy Ann Kosa, Peter R. Lewis, Sheikh Mahbub Habib:
Public Privacy and Brick Houses Made of Glass. IFIPTM 2018: 137-148 - [c44]Sheikh Mahbub Habib, Nikolaos Alexopoulos, Md Monirul Islam, Jens Heider, Stephen Marsh, Max Mühlhäuser:
Trust4App: Automating Trustworthiness Assessment of Mobile Applications. TrustCom/BigDataSE 2018: 124-135 - [e9]Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 [contents] - 2017
- [j11]Jan-Philipp Steghöfer, Ada Diaconescu, Stephen Marsh, Jeremy Pitt:
The Next Generation of Socio-Technical Systems : Realizing the Potential, Protecting the Value [Introduction]. IEEE Technol. Soc. Mag. 36(3): 46-47 (2017) - [j10]Kirstie L. Bellman, Jean Botev, Hanno Hildmann, Peter R. Lewis, Stephen Marsh, Jeremy Pitt, Ingo Scholtes, Sven Tomforde:
Socially-Sensitive Systems Design: Exploring Social Potential. IEEE Technol. Soc. Mag. 36(3): 72-80 (2017) - [c43]Natasha Dwyer, Stephen Marsh:
Self-trust, Self-efficacy and Digital Learning. IFIPTM 2017: 110-115 - 2016
- [j9]Zeinab Noorian, Stephen Marsh, Michael W. Fleming:
zTrust: Adaptive Decentralized Trust Model for Quality of Service Selection in Electronic Marketplaces. Comput. Intell. 32(1): 127-164 (2016) - [c42]Anirban Basu, Stephen Marsh, Mohammad Shahriar Rahman, Shinsaku Kiyomoto:
A Model for Personalised Perception of Policies. IFIPTM 2016: 52-62 - [c41]Saghar Behrooz, Stephen Marsh:
A Trust-Based Framework for Information Sharing Between Mobile Health Care Applications. IFIPTM 2016: 79-95 - [c40]Stephen Marsh, Mark R. Dibben, Natasha Dwyer:
The Wisdom of Being Wise: A Brief Introduction to Computational Wisdom. IFIPTM 2016: 137-145 - [c39]Natasha Dwyer, Stephen Marsh:
How students regard trust in an elearning context. PST 2016: 682-685 - [c38]Anirban Basu, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh:
PrefRank: Quantification and Aggregation of Subjective User Preferences. Trustcom/BigDataSE/ISPA 2016: 7-13 - [p2]Natasha Dwyer, Stephen Marsh:
To Trust or Distrust: Has a Digital Environment Empowered Users to Proceed on Their Own Terms? Trustworthy Open Self-Organising Systems 2016: 231-244 - [e8]Jie Zhang, Zeinab Noorian, Stephen Marsh:
Incentives and Trust in Electronic Communities, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016. AAAI Technical Report WS-16-09, AAAI Press 2016 [contents] - 2015
- [c37]Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Stephen Marsh, Yung Shin Van Der Sype, Toru Nakamura:
Lightweight Practical Private One-Way Anonymous Messaging. IFIPTM 2015: 76-91 - [c36]Natasha Dwyer, Stephen Marsh:
Social Network Culture Needs the Lens of Critical Trust Research. IFIPTM 2015: 126-133 - [c35]Natasha Dwyer, Stephen Marsh:
The Detail of Trusted Messages: Retweets in a Context of Health and Fitness. IFIPTM 2015: 185-194 - [e7]Zeinab Noorian, Jie Zhang, Stephen Marsh, Christian Damsgaard Jensen:
Incentive and Trust in E-Communities, Papers from the 2015 AAAI Workshop, Austin, Texas, USA, January 25, 2015. AAAI Technical Report WS-15-08, AAAI Press 2015, ISBN 978-1-57735-719-3 [contents] - [e6]Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama:
Trust Management IX - 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 454, Springer 2015, ISBN 978-3-319-18490-6 [contents] - [i1]Ada Diaconescu, Stephen Marsh, Jeremy Pitt, Wolfgang Reif, Jan-Philipp Steghöfer:
Social Concepts in Self-organising Systems (Dagstuhl Seminar 15482). Dagstuhl Reports 5(11): 127-150 (2015) - 2014
- [j8]Zeinab Noorian, Jie Zhang, Yuan Liu, Stephen Marsh, Michael W. Fleming:
Trust-oriented buyer strategies for seller reporting and selection in competitive electronic marketplaces. Auton. Agents Multi Agent Syst. 28(6): 896-933 (2014) - [c34]Mehmet Vefa Bicakci, Babak Esfandiari, Stephen Marsh:
Anomaly Detection for Mobile Device Comfort. IFIPTM 2014: 93-108 - [c33]Natasha Dwyer, Stephen Marsh:
What can the hashtag #trust tell us about how users conceptualise trust? PST 2014: 398-402 - [c32]Anirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh, Yutaka Miyake:
PrefRank: fair aggregation of subjective user preferences. SAC 2014: 287-288 - [c31]Anirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Stephen Marsh, Jaideep Vaidya, Guibing Guo, Jie Zhang, Yutaka Miyake:
Privacy preserving trusted social feedback. SAC 2014: 1706-1711 - [c30]Tom De Nies, Davide Ceolin, Paul Groth, Olaf Hartig, Stephen Marsh:
Overview of METHOD 2014: the 3rd International Workshop on Methods for Establishing Trust of (Open) Data. URSW 2014: 53-54 - [e5]Fernando Bobillo, Rommel N. Carvalho, Davide Ceolin, Paulo Cesar G. da Costa, Claudia d'Amato, Nicola Fanizzi, Kathryn B. Laskey, Kenneth J. Laskey, Thomas Lukasiewicz, Trevor P. Martin, Matthias Nickles, Michael Pool, Tom De Nies, Olaf Hartig, Paul Groth, Stephen Marsh:
Proceedings of the 10th International Workshop on Uncertainty Reasoning for the Semantic Web (URSW 2014) co-located with the 13th International Semantic Web Conference (ISWC 2014), Riva del Garda, Italy, October 19, 2014. CEUR Workshop Proceedings 1259, CEUR-WS.org 2014 [contents] - 2013
- [c29]Natasha Dwyer, Anirban Basu, Stephen Marsh:
Reflections on Measuring the Trust Empowerment Potential of a Digital Environment. IFIPTM 2013: 127-135 - [c28]Tracy Ann Kosa, Stephen Marsh, Khalil El-Khatib:
Privacy representation in VANET. DIVANet@MSWiM 2013: 39-44 - [c27]Tim Storer, Stephen Marsh, Sylvie Noël, Babak Esfandiari, Khalil El-Khatib, Pamela Briggs, Karen Renaud, Mehmet Vefa Bicakci:
Encouraging second thoughts: Obstructive user interfaces for raising security awareness. PST 2013: 366-368 - [c26]Stephen Marsh, Yao Wang, Sylvie Noël, Lewis Robart, John A. Stewart:
Device Comfort for mobile health information accessibility. PST 2013: 377-380 - 2012
- [c25]Zeinab Noorian, Mahdi Noorian, Michael W. Fleming, Stephen Marsh:
A Strategic Reputation-Based Mechanism for Mobile Ad Hoc Networks. Canadian AI 2012: 145-157 - [c24]Audun Jøsang, Tanja Azderska, Stephen Marsh:
Trust Transitivity and Conditional Belief Reasoning. IFIPTM 2012: 68-83 - [c23]Stephen Marsh, Anirban Basu, Natasha Dwyer:
Rendering unto Cæsar the Things That Are Cæsar's: Complex Trust Models and Human Understanding. IFIPTM 2012: 191-200 - [c22]Daniel Da Silva, Tracy Ann Kosa, Stephen Marsh, Khalil El-Khatib:
Examining privacy in vehicular ad-hoc networks. DIVANet@MSWiM 2012: 105-110 - [c21]Zeinab Noorian, Michael W. Fleming, Stephen Marsh:
Preference-oriented QoS-based service discovery with dynamic trust and reputation management. SAC 2012: 2014-2021 - [c20]Zeinab Noorian, Jie Zhang, Michael W. Fleming, Stephen Marsh:
Determining the Optimal Reporting Strategy in Competitive E-marketplaces. TrustCom 2012: 350-357 - [e4]Nora Cuppens-Boulahia, Philip Fong, Joaquín García-Alfaro, Stephen Marsh, Jan-Philipp Steghöfer:
Tenth Annual International Conference on Privacy, Security and Trust, PST 2012, Paris, France, July 16-18, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2323-9 [contents] - 2011
- [j7]Stephen Marsh, Pamela Briggs, Khalil El-Khatib, Babak Esfandiari, John A. Stewart:
Defining and Investigating Device Comfort. Inf. Media Technol. 6(3): 914-935 (2011) - [j6]Stephen Marsh, Pamela Briggs, Khalil El-Khatib, Babak Esfandiari, John A. Stewart:
Defining and Investigating Device Comfort. J. Inf. Process. 19: 231-252 (2011) - [j5]Tracy Ann Kosa, Khalil El-Khatib, Stephen Marsh:
Measuring Privacy. J. Internet Serv. Inf. Secur. 1(4): 60-73 (2011) - [c19]Zeinab Noorian, Stephen Marsh, Michael W. Fleming:
Multi-layer cognitive filtering by behavioral modeling. AAMAS 2011: 871-878 - [c18]Zeinab Noorian, Stephen Marsh, Michael W. Fleming:
Prob-Cog: An Adaptive Filtering Model for Trust Evaluation. IFIPTM 2011: 206-222 - [c17]Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang, Pamela Briggs, Lewis Robart, John A. Stewart, Babak Esfandiari, Khalil El-Khatib, Mehmet Vefa Bicakci, Manh Cuong Dao, Michael Cohen, Daniel Da Silva:
Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security. STM 2011: 28-39 - 2010
- [e3]Masakatsu Nishigaki, Audun Jøsang, Yuko Murayama, Stephen Marsh:
Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings. IFIP Advances in Information and Communication Technology 321, Springer 2010, ISBN 978-3-642-13445-6 [contents]
2000 – 2009
- 2009
- [p1]Stephen Marsh, Pamela Briggs:
Examining Trust, Forgiveness and Regret as Computational Concepts. Computing with Social Trust 2009: 9-43 - 2008
- [e2]Larry Korba, Stephen Marsh, Reihaneh Safavi-Naini:
Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada. IEEE Computer Society 2008, ISBN 978-0-7695-3390-2 [contents] - 2007
- [c16]Sandro Etalle, Jerry den Hartog, Stephen Marsh:
Trust and punishment. Autonomics 2007: 5 - [e1]Sandro Etalle, Stephen Marsh:
Trust Management - Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30- August 2, 2007, Moncton, New Brunswick, Canada. IFIP 238, Springer 2007, ISBN 978-0-387-73654-9 [contents] - 2006
- [c15]Eugenia Kondratova, Ali A. Ghorbani, Stephen Marsh:
CIFS: a Trust-Based Multilayer Information Filtering System for Multi-Agent Mobile Information Systems. CNSR 2006: 300-310 - [c14]Audun Jøsang, Stephen Marsh, Simon Pope:
Exploring Different Types of Trust Propagation. iTrust 2006: 179-192 - [c13]Eugenia Kondratova, Stephen Marsh, Ali A. Ghorbani:
Trust-based contextual information filtering. PST 2006: 51 - 2005
- [c12]Stephen Marsh, Mark R. Dibben:
Trust, Untrust, Distrust and Mistrust - An Exploration of the Dark(er) Side. iTrust 2005: 17-33 - 2004
- [c11]Stephen Marsh, Pamela Briggs, Waleed Wagealla:
Considering trust in ambient societies. CHI Extended Abstracts 2004: 1707-1708 - [c10]Chris McDonald, Gerhard Roth, Stephen Marsh:
Red-Handed: Collaborative Gesture Interaction with a Projection Table. FGR 2004: 773-778 - [c9]Stephen Marsh:
infoDNA (Version 2) Agent Enhanced Trustworthy Distributed Information. PST 2004: 149-153 - [c8]Andrew S. Patrick, Janice Singer, Brian Corrie II, Sylvie Noël, Khalil El-Khatib, Bruno Emond, Todd Zimmerman, Stephen Marsh:
A QoE Sensitive Architecture for Advanced Collaborative Environments. QSHINE 2004: 319-322 - 2003
- [j4]Stephen Marsh, Mark R. Dibben:
The role of trust in information science and technology. Annu. Rev. Inf. Sci. Technol. 37(1): 465-498 (2003) - [j3]Stephen Marsh, Ali A. Ghorbani, Virendra C. Bhavsar:
The ACORN multi-agent system. Web Intell. Agent Syst. 1(1): 65-86 (2003) - 2002
- [j2]Jonathan Carter, Ali A. Ghorbani, Stephen Marsh:
Architectural Components of Information-Sharing Societies. Comput. Intell. 18(4): 638-655 (2002) - [c7]Jonathan Carter, Ali A. Ghorbani, Stephen Marsh:
Just-in-time information sharing architectures in multiagent systems. AAMAS 2002: 647-654 - [c6]Stephen Marsh, Lucy T. Nowell, John F. Meech, Kerstin Dautenhahn:
The philosophy and design of socially adept technologies. CHI Extended Abstracts 2002: 918-919 - 2000
- [c5]Stephen Marsh, John F. Meech:
Trust in design. CHI Extended Abstracts 2000: 45-46 - [c4]Hui Yu, Ali A. Ghorbani, Virendra C. Bhavsar, Stephen Marsh:
Keyphrase-Based Information Sharing in the ACORN Multi-agent Architecture. MATA 2000: 243-256
1990 – 1999
- 1997
- [j1]Steve Jones, Steve Marsh:
Human-computer-human interaction: trust in CSCW. ACM SIGCHI Bull. 29(3): 36-40 (1997) - [c3]Stephen Marsh, Youssef Masrour:
Agent augmented community-information: the ACORN architecture. CASCON 1997: 17 - [c2]Stephen Marsh:
A Community of Autonomous Agents for the Search and Distribution of Information in Networks. BCS-IRSG Annual Colloquium on IR Research 1997 - 1992
- [c1]Stephen Marsh:
Trust in Distributed Artificial Intelligence. MAAMAW 1992: 94-112
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 00:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint