The IT Law Wiki


32,076pages on
this wiki
Add New Page
Add New Page Talk0

Definitions Edit

Trust is

the belief that someone or something will behave as expected, and not another way.[1]
[a] measure of reliance on the character, ability, strength, or truth of someone or something.[2]
[c]onfidence that an entity will behave in a particular way with respect to certain activities (entity X is said to trust entity Y for a set of activities if and only if entity X relies upon entity Y behaving in a particular way with respect to the activities.)[3]
the belief that an entity will behave in a predictable manner while performing specific functions in specific conditions or circumstances.[4]

Overview Edit

Trust is a cornerstone of electronic government, electronic commerce, and social interactions on line. With improved trust amongst participants, electronic delivery of government and business services can accelerate and higher levels of confidence can be achieved. This confidence can in turn encourage innovation in the online marketplace and create new ways of doing business. It can also encourage social interactions and the exchange of ideas between organisations and individuals, confident in the identities of those with whom they are dealing.

Without trust, individuals may develop a sense of vulnerability and insecurity regarding their online activities.[5]

Privacy Edit

A key piece of trust online is confidence that privacy expectations are met. Even when the provider acts in good faith, a consumer who does not understand the provider's effort, will not gain more trust, and might very well walk away. User trust requires user understanding.

References Edit

  1. U.S. Department of Commerce, Internet Policy Task Force, Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework 13 (Dec. 16, 2010) (full-text). See also National Academy of Sciences, Trust in Cyberspace (Fred B. Schneider ed. 1999) (discussing trust in the context of IT systems); P. Brann & M. Foddy, "Trust and the Consumption of a Deteriorating Resource," 31 J. of Conflict Resolution 615 (1987).
  2. NSTAC Report to the President on Identity Management Strategy, at C-5.
  3. Id.
  4. NIST Special Publication 800-160, at B-15.
  5. OECD Working Party on Information Security and Privacy, The Role of Digital Identity Management in the Internet Economy: A Primer for Policy Makers, at 6.

See also Edit

Also on Fandom

Random Wiki