, How to Develop a Security Controls Oriented Reference Architecture
, Theo Dimitrakos Continuous User Authentication Using Smartwatch Motion Sensor Data, p.15
and Fudong Li Privacy Policy Annotation for Semi-automated Analysis: A Cost-Effective Approach, p.29 ,
Nonnecke The Impact of Competence and Benevolence in a Computational Model of Trust, p.45 ,
, , p.58
Visualisation of Trust and Quality Information for Geospatial Dataset Selection and Use: Drawing Trust Presentation Comparisons with B2C e-Commerce, p.75 ,
Bastin Crowdsourcing Under Attack: Detecting Malicious Behaviors in Waze, p.91 ,
A Logical Framework for Pre-trust Computations 107 Mirko Tagliaferri and Alessandro Aldini Towards a Computational Model of Information Trust ,
, The Social Construction of " Shared Reality, Socio-Technical Systems. . . . 149 Kristina Milanovi? and Jeremy Pitt
, , p.161