Abstract
It has been argued in recent research that trust is an important issue for modern information systems and that it should be considered from the early stages of the development process. Nevertheless, little effort has been put into understanding how trust can be modelled and reasoned when developing information systems. Equally little effort has been put into developing modelling languages to support trust modelling. Our motivation comes from this situation and we aim to develop a trust-aware modelling framework that will enable information system developers to consider trust and its related concepts collectively during the development of information systems. In this chapter we re-enforce the argument about the need to consider trust during information systems development and we describe a modelling language that supports trust modelling. We employ a case study from a trust critical domain to demonstrate the application of our language.
Similar content being viewed by others
References
Jøsang, A., Patton, M.A. (2004)."Technologies for Trust in Electronic Commerce.” Electronic Commerce Research Journal 4(1&2): 9–21.
Michael, J.B., Hestad, D.R., Pedersen, C.M., Gaines L.T (2002). “Incorporating the Human Element of Trust into Information Systems.” IAnewsletter 5: 4–8.
Chopra, K., Wallace, W.A. (2003). Trust in Electronic Environments. Proceedings of the 36th Hawaii Conference on System Sciences (HICSS'03), Hawaii.
Almenarez, F., Marın, A., Campo, C., Garcıa, C. (2004 ). PTM: A Pervasive Trust Management Model for Dynamic Open Environments. First Workshop on Pervasive Security, Privacy and Trust, PSPT’04 in conjunction with Mobiquitous, Boston, USA.
Robinson, S. L. (1996). “Trust and Breach of the Psychological Contract.” Administrative Science Quarterly 41: 574–579.
Alford, J. (2004). Building Trust in Partnerships Between Community Organization and Government. Changing the Way Government Works Seminar, Melbourne.
Maarof, M. A., Krishna, K (2002). A Hybrid Trust Management Model For MAS Based. Information Security Group, Faculty of Computer Science and Information System University of Technology Malaysia, 81310 Skudai, Johor.
Yu, E., Liu, L (2001). Modelling Trust for System Design Using the i* Strategic Actors Framework. Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives.
Sutcliffe, A. (2006). Trust: From Cognition to Conceptual Models and Design. 18th International Conference, SE 2006, June 5–9, 2006 Proceedings, Springer-Verlag Berlin Heidelberg, Luxembourg.
Kethers, S. E. A. (2005). Modelling Trust Relationships in a Healthcare Network: Experiences with the TCD Framework. In Proceedings of the Thirteenth European Conference on Information Systems, Regensburg, Germany.
Li, X., Valacich, J. S., Hess, T. J. (2004). Predicting User Trust in Information Systems: A Comparison of Competing Trust Models. The Proceedings of the 37th Hawaii International Conference on Systems Sciences, Hawaii.
Giorgini, P., Mouratidis, H., Zannone, Z. (2006). Modelling Security and Trust with Secure Tropos. In Integrating Security and Software Engineering: Advances and Future Vision, Idea Group: 160–189.
Mouratidis, H., Giorgini, P. (2004). Enhancing secure Tropos to effectively deal with security requirements in the development of multiagent systems. 1st International Workshop on Safety and Security in Multiagent Systems, NY, USA.
Grandison, T., Sloman, M (2001). SULTAN – A Language for Trust Specification and Analysis. In: Eighth Workshop of the HP OpenView University Association, Berlin.
Wilson, M., Arenas, A., Schubert, L., Ed. (2007). TrustCoM Framework V4. AL1 – TrustCoM Framework.
Jürjens, J. (2004). “Developing Security-Critical Applications with UMLsec. A Short Walk-Through.” The European Journal for the Informatics Professional 5(2).
Basin, D., Clavel, M., Doser, J., Egea, M. (2007). A Metamodel-Based Approach for Analyzing Security-Design Models.MODELS 2007, Nashville, TN.
Mouratidis, H., Giorgini, P., Manson, G. (2005). When Security Meets Software Engineering: A Case of Modelling Secure Information Systems, in Information System. Elsevier 30(8): 609–629.
Dimitrakos, T., Ritchie, B., Raptis, D., Stølen, K. (2002). Model Based Security Risk Analysis for Web Applications: The CORAS Approach. EuroWeb 2002 Conference, Oxford, UK.
Bimrah, K., Mouratidis, H., Preston, D. (2007). Trust Ontology for Information Systems Development. 16th International Conference on Information Systems Development Ireland, Galway.
Viljanen, L. (2005). Towards an Ontology of Trust. Lecture Notes in Computer Science, Springer Berlin/Heidelberg, Copenhagen, Denmark.
Kim, A., Luo, J., Kang, M. (2005). Security Ontology for Annotating Resources. Lecture Notes in Computer Science, Springer-Verlag Berlin/Heidelberg, Agai Napa, Cyprus.
Cuske, C., Korthaus, A., Seedorf, S., Tomczyk, P. (2005). Towards Formal Ontologies for Technology Risk Measurement in the Banking Industry. Proceedings of the 1st Workshop Formal Ontologies Meet Industry, Verona, Italy.
Simmonds, A., Sandilands, P., Ekert, L.V. (2004). An Ontology for Network Security Attacks. Lecture Notes in Computer Science, Springer Berlin/Heidelberg, Kathmandu, Nepal.
Casare, S., Sichman, J. (2005). Towards a Functional Ontology of Reputation. International Conference on Autonomous Agents Archive Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, The Netherlands.
Martimiano, A. F. M., Moreira, E. S. (2005). An OWL-based Security Incident Ontology. In: Proceedings of the Eighth International Protege Conference 43–44 Poster.
Mouratidis, H., Giorgini, P., Mansoon, G (2003). An Ontology for Modelling Security: The Tropos Approach. Proceedings of the 7th International Conference on Knowledge-Based Intelligent Information & Engineering Systems, Oxford, England.
Siegel, J. (2001). “Developing in OMG's Model-Driven Architecture.” Developing in the MDA.
Grandison, T., Sloman, M (2000). “A Survey of Trust in Internet Applications.” IEEE Communications Surveys and Tutorials 3(4).
Random House (2006). Random House Unabridged Dictionary, Random House, Inc., New York.
Acknowledgements
First, we would like to show gratitude to EPSRC for their funding with regard to this project and second we would like to express thanks to the staff at St Patrick’s College (London) for their support in our research.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Bimrah, K.K., Mouratidis, H., Preston, D. (2009). A Language for Modelling Trust in Information Systems. In: Papadopoulos, G., Wojtkowski, W., Wojtkowski, G., Wrycza, S., Zupancic, J. (eds) Information Systems Development. Springer, Boston, MA. https://doi.org/10.1007/b137171_62
Download citation
DOI: https://doi.org/10.1007/b137171_62
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-84809-9
Online ISBN: 978-0-387-84810-5
eBook Packages: Computer ScienceComputer Science (R0)