Abstract
Previous research efforts have been expended in terms of the capture and subsequent instantiation of "soft" trust requirements that relate to HCI usability concerns or in relation to "hard" tangible security requirements that primarily relate to security a ssurance and security protocols. Little direct focus has been paid to managing intangible trust related requirements per se. This 'gap' is perhaps most evident in the public B2C (Business to Consumer) E- Systems we all use on a daily basis. Some speculative suggestions are made as to how to fill the 'gap'. Visual card sorting is suggested as a suitable evaluative tool; whilst deontic logic trust norms and UML extended notation are the suggested (methodologically invariant) means by which software development teams can perhaps more fully capture hence visualize intangible trust requirements.
| Original language | English |
|---|---|
| Title of host publication | nan |
| Publisher | Audio Visual Services (A VS), University of Leicester, UK |
| Publication status | Published - 1 Jan 2010 |
| Event | First International Workshop on the Interplay between User Experience and Software Development - Reykjavik Duration: 17 Oct 2010 → 17 Oct 2010 |
Conference
| Conference | First International Workshop on the Interplay between User Experience and Software Development |
|---|---|
| City | Reykjavik |
| Period | 17/10/10 → 17/10/10 |
| Other | First International Workshop on the Interplay between User Experience and Software Development (17/10/2010-17/10/2010, Reykjavik) |
Keywords
- intangible trust
Fingerprint
Dive into the research topics of 'Intangible trust requirements - how to fill the requirements trust "gap"?'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver