Switch to: References

Add citations

You must login to add citations.
  1. Reviewing the Case of Online Interpersonal Trust.Mirko Tagliaferri - 2023 - Foundations of Science 28 (1):225-254.
    The aim of this paper is to better qualify the problem of online trust. The problem of online trust is that of evaluating whether online environments have the proper design to enable trust. This paper tries to better qualify this problem by showing that there is no unique answer, but only conditional considerations that depend on the conception of trust assumed and the features that are included in the environments themselves. In fact, the major issue concerning traditional debates surrounding online (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Trusting Digital Technologies Correctly.Mariarosaria Taddeo - 2017 - Minds and Machines 27 (4):565-568.
  • The Ethical Governance of the Digital During and After the COVID-19 Pandemic.Mariarosaria Taddeo - 2020 - Minds and Machines 30 (2):171-176.
  • The Semantics of Untrustworthiness.Giuseppe Primiero & Laszlo Kosolosky - 2016 - Topoi 35 (1):253-266.
    We offer a formal treatment of the semantics of both complete and incomplete mistrustful or distrustful information transmissions. The semantics of such relations is analysed in view of rules that define the behaviour of a receiving agent. We justify this approach in view of human agent communications and secure system design. We further specify some properties of such relations.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • On Malfunction, Mechanisms and Malware Classification.Giuseppe Primiero, Frida J. Solheim & Jonathan M. Spring - 2019 - Philosophy and Technology 32 (2):339-362.
    Malware has been around since the 1980s and is a large and expensive security concern today, constantly growing over the past years. As our social, professional and financial lives become more digitalised, they present larger and more profitable targets for malware. The problem of classifying and preventing malware is therefore urgent, and it is complicated by the existence of several specific approaches. In this paper, we use an existing malware taxonomy to formulate a general, language independent functional description of malware (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Offline and Online Data: on upgrading functional information to knowledge.Giuseppe Primiero - 2013 - Philosophical Studies 164 (2):371-392.
    This paper addresses the problem of upgrading functional information to knowledge. Functional information is defined as syntactically well-formed, meaningful and collectively opaque data. Its use in the formal epistemology of information theories is crucial to solve the debate on the veridical nature of information, and it represents the companion notion to standard strongly semantic information, defined as well-formed, meaningful and true data. The formal framework, on which the definitions are based, uses a contextual version of the verificationist principle of truth (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Honesty, Competence, and Trust for Systems Design.Giuseppe Primiero - 2013 - Philosophy and Technology 26 (4):431-435.
    We briefly present three problems related to promiscuous trust in connection to germane notions of honesty and competence in systems design.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • A logic of negative trust.G. Primiero - 2020 - Journal of Applied Non-Classical Logics 30 (3):193-222.
    We present a logic to model the behaviour of an agent trusting or not trusting messages sent by another agent. The logic formalises trust as a consistency checking function with respect to currentl...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • How much do you trust me? A logico-mathematical analysis of the concept of the intensity of trust.Michele Loi, Andrea Ferrario & Eleonora Viganò - 2023 - Synthese 201 (6):1-30.
    Trust and monitoring are traditionally antithetical concepts. Describing trust as a property of a relationship of reliance, we introduce a theory of trust and monitoring, which uses mathematical models based on two classes of functions, including _q_-exponentials, and relates the levels of trust to the costs of monitoring. As opposed to several accounts of trust that attempt to identify the special ingredient of reliance and trust relationships, our theory characterizes trust as a quantitative property of certain relations of reliance that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Living in an Impossible World: Real-izing the Consequences of Intransitive Trust. [REVIEW]Bruce Christianson - 2013 - Philosophy and Technology 26 (4):411-429.
    Many accounts of online trust are based upon mechanisms for building reputation. Trust is portrayed as desirable, and handing off trust is easier if trust is modelled to be transitive. But in the analysis of cyber-security protocols, trust is usually used as a substitute for certain knowledge: it follows that if there is no residual risk, then there is no need for trust. On this grimmer understanding, the less that users are required to trust, the better. Involuntary transitivity of trust (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark