Show simple item record

dc.contributor.authorFrench, Timen_GB
dc.contributor.authorHuang, Weien_GB
dc.date.accessioned2013-04-07T18:34:46Z
dc.date.available2013-04-07T18:34:46Z
dc.date.issued2010
dc.identifier.citationFrench, T., and Huang, W. (2010) 'Intangible Trust Requirements - How to Fill the Requirements Trust "Gap"? '. In Proceedings of the First International Workshop on the Interplay between User Experience and Software Development. Rekjavick, Iceland, October 17th, 2010, Vol. 656: 13-17.en_GB
dc.identifier.issn1613-0073
dc.identifier.urihttp://hdl.handle.net/10547/279168
dc.description.abstractPrevious research efforts have been expended in terms of the capture and subsequent instantiation of "soft" trust requirements that relate to HCI usability concerns or in relation to "hard" tangible security requirements that primarily relate to security a ssurance and security protocols. Little direct focus has been paid to managing intangible trust related requirements per se. This 'gap' is perhaps most evident in the public B2C (Business to Consumer) E- Systems we all use on a daily basis. Some speculative suggestions are made as to how to fill the 'gap'. Visual card sorting is suggested as a suitable evaluative tool; whilst deontic logic trust norms and UML extended notation are the suggested (methodologically invariant) means by which software development teams can perhaps more fully capture hence visualize intangible trust requirements.
dc.language.isoenen
dc.publisherAudio Visual Services (A VS), University of Leicester, UKen_GB
dc.relation.urlhttp://www.informatik.uni-trier.de/~ley/db/conf/iused/iuxsed2010.htmlen_GB
dc.relation.urlhttp://ceur-ws.org/Vol-656/I-UxSED2010-Proceedings-Complete.pdfen_GB
dc.subjectintangible trust requirementsen_GB
dc.subjectvisual card-sortsen_GB
dc.subjectdeontic normsen_GB
dc.titleIntangible trust requirements - how to fill the requirements trust "gap"?en
dc.typeConference papers, meetings and proceedingsen
dc.contributor.departmentUniversity of Bedfordshireen_GB
html.description.abstractPrevious research efforts have been expended in terms of the capture and subsequent instantiation of "soft" trust requirements that relate to HCI usability concerns or in relation to "hard" tangible security requirements that primarily relate to security a ssurance and security protocols. Little direct focus has been paid to managing intangible trust related requirements per se. This 'gap' is perhaps most evident in the public B2C (Business to Consumer) E- Systems we all use on a daily basis. Some speculative suggestions are made as to how to fill the 'gap'. Visual card sorting is suggested as a suitable evaluative tool; whilst deontic logic trust norms and UML extended notation are the suggested (methodologically invariant) means by which software development teams can perhaps more fully capture hence visualize intangible trust requirements.


Files in this item

Thumbnail
Name:
paper3.pdf
Size:
67.14Kb
Format:
PDF
Description:
Full paper

This item appears in the following Collection(s)

Show simple item record