Skip to main navigation Skip to search Skip to main content

Intangible trust requirements - how to fill the requirements trust "gap"?

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Downloads (Pure)

Abstract

Previous research efforts have been expended in terms of the capture and subsequent instantiation of "soft" trust requirements that relate to HCI usability concerns or in relation to "hard" tangible security requirements that primarily relate to security a ssurance and security protocols. Little direct focus has been paid to managing intangible trust related requirements per se. This 'gap' is perhaps most evident in the public B2C (Business to Consumer) E- Systems we all use on a daily basis. Some speculative suggestions are made as to how to fill the 'gap'. Visual card sorting is suggested as a suitable evaluative tool; whilst deontic logic trust norms and UML extended notation are the suggested (methodologically invariant) means by which software development teams can perhaps more fully capture hence visualize intangible trust requirements.
Original languageEnglish
Title of host publicationnan
PublisherAudio Visual Services (A VS), University of Leicester, UK
Publication statusPublished - 1 Jan 2010
EventFirst International Workshop on the Interplay between User Experience and Software Development - Reykjavik
Duration: 17 Oct 201017 Oct 2010

Conference

ConferenceFirst International Workshop on the Interplay between User Experience and Software Development
CityReykjavik
Period17/10/1017/10/10
OtherFirst International Workshop on the Interplay between User Experience and Software Development (17/10/2010-17/10/2010, Reykjavik)

Keywords

  • intangible trust

Fingerprint

Dive into the research topics of 'Intangible trust requirements - how to fill the requirements trust "gap"?'. Together they form a unique fingerprint.

Cite this