A Language for Modelling Trust in Information Systems | SpringerLink
Skip to main content

A Language for Modelling Trust in Information Systems

  • Chapter
  • First Online:
Information Systems Development

Abstract

It has been argued in recent research that trust is an important issue for modern information systems and that it should be considered from the early stages of the development process. Nevertheless, little effort has been put into understanding how trust can be modelled and reasoned when developing information systems. Equally little effort has been put into developing modelling languages to support trust modelling. Our motivation comes from this situation and we aim to develop a trust-aware modelling framework that will enable information system developers to consider trust and its related concepts collectively during the development of information systems. In this chapter we re-enforce the argument about the need to consider trust during information systems development and we describe a modelling language that supports trust modelling. We employ a case study from a trust critical domain to demonstrate the application of our language.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Jøsang, A., Patton, M.A. (2004)."Technologies for Trust in Electronic Commerce.” Electronic Commerce Research Journal 4(1&2): 9–21.

    Google Scholar 

  2. Michael, J.B., Hestad, D.R., Pedersen, C.M., Gaines L.T (2002). “Incorporating the Human Element of Trust into Information Systems.” IAnewsletter 5: 4–8.

    Google Scholar 

  3. Chopra, K., Wallace, W.A. (2003). Trust in Electronic Environments. Proceedings of the 36th Hawaii Conference on System Sciences (HICSS'03), Hawaii.

    Google Scholar 

  4. Almenarez, F., Marın, A., Campo, C., Garcıa, C. (2004 ). PTM: A Pervasive Trust Management Model for Dynamic Open Environments. First Workshop on Pervasive Security, Privacy and Trust, PSPT’04 in conjunction with Mobiquitous, Boston, USA.

    Google Scholar 

  5. Robinson, S. L. (1996). “Trust and Breach of the Psychological Contract.” Administrative Science Quarterly 41: 574–579.

    Article  Google Scholar 

  6. Alford, J. (2004). Building Trust in Partnerships Between Community Organization and Government. Changing the Way Government Works Seminar, Melbourne.

    Google Scholar 

  7. Maarof, M. A., Krishna, K (2002). A Hybrid Trust Management Model For MAS Based. Information Security Group, Faculty of Computer Science and Information System University of Technology Malaysia, 81310 Skudai, Johor.

    Google Scholar 

  8. Yu, E., Liu, L (2001). Modelling Trust for System Design Using the i* Strategic Actors Framework. Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives.

    Google Scholar 

  9. Sutcliffe, A. (2006). Trust: From Cognition to Conceptual Models and Design. 18th International Conference, SE 2006, June 5–9, 2006 Proceedings, Springer-Verlag Berlin Heidelberg, Luxembourg.

    Google Scholar 

  10. Kethers, S. E. A. (2005). Modelling Trust Relationships in a Healthcare Network: Experiences with the TCD Framework. In Proceedings of the Thirteenth European Conference on Information Systems, Regensburg, Germany.

    Google Scholar 

  11. Li, X., Valacich, J. S., Hess, T. J. (2004). Predicting User Trust in Information Systems: A Comparison of Competing Trust Models. The Proceedings of the 37th Hawaii International Conference on Systems Sciences, Hawaii.

    Google Scholar 

  12. Giorgini, P., Mouratidis, H., Zannone, Z. (2006). Modelling Security and Trust with Secure Tropos. In Integrating Security and Software Engineering: Advances and Future Vision, Idea Group: 160–189.

    Google Scholar 

  13. Mouratidis, H., Giorgini, P. (2004). Enhancing secure Tropos to effectively deal with security requirements in the development of multiagent systems. 1st International Workshop on Safety and Security in Multiagent Systems, NY, USA.

    Google Scholar 

  14. Grandison, T., Sloman, M (2001). SULTAN – A Language for Trust Specification and Analysis. In: Eighth Workshop of the HP OpenView University Association, Berlin.

    Google Scholar 

  15. Wilson, M., Arenas, A., Schubert, L., Ed. (2007). TrustCoM Framework V4. AL1 – TrustCoM Framework.

    Google Scholar 

  16. Jürjens, J. (2004). “Developing Security-Critical Applications with UMLsec. A Short Walk-Through.” The European Journal for the Informatics Professional 5(2).

    Google Scholar 

  17. Basin, D., Clavel, M., Doser, J., Egea, M. (2007). A Metamodel-Based Approach for Analyzing Security-Design Models.MODELS 2007, Nashville, TN.

    Google Scholar 

  18. Mouratidis, H., Giorgini, P., Manson, G. (2005). When Security Meets Software Engineering: A Case of Modelling Secure Information Systems, in Information System. Elsevier 30(8): 609–629.

    Google Scholar 

  19. Dimitrakos, T., Ritchie, B., Raptis, D., Stølen, K. (2002). Model Based Security Risk Analysis for Web Applications: The CORAS Approach. EuroWeb 2002 Conference, Oxford, UK.

    Google Scholar 

  20. Bimrah, K., Mouratidis, H., Preston, D. (2007). Trust Ontology for Information Systems Development. 16th International Conference on Information Systems Development Ireland, Galway.

    Google Scholar 

  21. Viljanen, L. (2005). Towards an Ontology of Trust. Lecture Notes in Computer Science, Springer Berlin/Heidelberg, Copenhagen, Denmark.

    Google Scholar 

  22. Kim, A., Luo, J., Kang, M. (2005). Security Ontology for Annotating Resources. Lecture Notes in Computer Science, Springer-Verlag Berlin/Heidelberg, Agai Napa, Cyprus.

    Google Scholar 

  23. Cuske, C., Korthaus, A., Seedorf, S., Tomczyk, P. (2005). Towards Formal Ontologies for Technology Risk Measurement in the Banking Industry. Proceedings of the 1st Workshop Formal Ontologies Meet Industry, Verona, Italy.

    Google Scholar 

  24. Simmonds, A., Sandilands, P., Ekert, L.V. (2004). An Ontology for Network Security Attacks. Lecture Notes in Computer Science, Springer Berlin/Heidelberg, Kathmandu, Nepal.

    Google Scholar 

  25. Casare, S., Sichman, J. (2005). Towards a Functional Ontology of Reputation. International Conference on Autonomous Agents Archive Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, The Netherlands.

    Google Scholar 

  26. Martimiano, A. F. M., Moreira, E. S. (2005). An OWL-based Security Incident Ontology. In: Proceedings of the Eighth International Protege Conference 43–44 Poster.

    Google Scholar 

  27. Mouratidis, H., Giorgini, P., Mansoon, G (2003). An Ontology for Modelling Security: The Tropos Approach. Proceedings of the 7th International Conference on Knowledge-Based Intelligent Information & Engineering Systems, Oxford, England.

    Google Scholar 

  28. Siegel, J. (2001). “Developing in OMG's Model-Driven Architecture.” Developing in the MDA.

    Google Scholar 

  29. Grandison, T., Sloman, M (2000). “A Survey of Trust in Internet Applications.” IEEE Communications Surveys and Tutorials 3(4).

    Google Scholar 

  30. Random House (2006). Random House Unabridged Dictionary, Random House, Inc., New York.

    Google Scholar 

Download references

Acknowledgements

First, we would like to show gratitude to EPSRC for their funding with regard to this project and second we would like to express thanks to the staff at St Patrick’s College (London) for their support in our research.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Bimrah, K.K., Mouratidis, H., Preston, D. (2009). A Language for Modelling Trust in Information Systems. In: Papadopoulos, G., Wojtkowski, W., Wojtkowski, G., Wrycza, S., Zupancic, J. (eds) Information Systems Development. Springer, Boston, MA. https://doi.org/10.1007/b137171_62

Download citation

  • DOI: https://doi.org/10.1007/b137171_62

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-84809-9

  • Online ISBN: 978-0-387-84810-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics