章节

网际空间的信任问题及其背景关系

关键词

作者

杰弗瑞·杨 (Geoffrey Yeo),英国人,伦敦大学信息研究学院研究员,《档案与文件》编委会成员。著有《文件管理手册:原则与实践》一书。主要研究兴趣为文件概念、文件生成及管理、数字环境中的文件背景与描述。

参考文献 查看全部 ↓
  • Anderson,Scott R.,and Robert B.Allen.2009.“Envisioning the Archival Commons.” American Archivist,72(2):383-400.
  • Artz,Donovan,and Yolanda Gil.2007.“A Survey of Trust in Computer Science and the Semantic Web.” Journal of Web Semantics,5(2):58-71.
  • Bardram,Jakob E.,Jonathan Bunde-Pedersen,and Mads Soegaard.“Support for Activity-Based Computing in a Personal Computing Operating System.” CHI’06:Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.New York:ACM Press,2006.
  • Barga,Roger S.,and Luciano A.Digiampietri.2006.“Automatic Generation of Workflow Provenance.” Lecture Notes on Computer Science,4145:1-9.
  • Bastian,Jeannette A..2003.Owning Memory:How a Caribbean Community Lost Its Archives and Found Its History. Westport,CT:Libraries Unlimited,2003.
  • Bearman,David.1996.“Item Level Control and Electronic Recordkeeping.” Archives and Museum Informatics,10(3):195-245.
  • Berg,Marc,and Els Goorman.1999.“The Contextual Nature of Medical Information.” International Journal of Medical Informatics,56:51-60.
  • Berners-Lee,Tim.1997.“Cleaning Up the User Interface.” http://www.w3.org/DesignIssues/UI.html.
  • Blanchette,Jean-Francsois.2012.Burdens of Proof:Cryptographic Culture and Evidence Law in the Age of Electronic Documents. Cambridge,MA:MIT Press.
  • Blomqvist,Kirsimarja.1997.“The Many Faces of Trust.” Scandinavian Journal of Management,13(3):271-286.
  • Blouin,Francis X.,and William G.Rosenberg.2011.Processing the Past:Contesting Authority in History and the Archives. New York:Oxford University Press.
  • Borland,Jennifer. 2009.“Trust and the Records Professional.” http://www.armaedfoundation.org/pdfs/JBorland_ScholarshipEssay.pdf.
  • Braun,Uri,Simson Garfinkel,David A.Holland,Kiran-Kumar Muniswamy-Reddy,and Margo I.Seltzer.2006.“Issues in Automatic Provenance Collection.” Lecture Notes on Computer Science,4145:171-183.
  • Brdiczka,Oliver.2010.“From Documents to Tasks:Deriving User Tasks from Document Usage Patterns.” IUI 2010:Proceedings of the 15th International Conference on Intelligent User Interfaces.New York:ACM Press.
  • Chapman,Adriane,Barbara Blaustein,and Chris Elsaesser.2010.“Provenance-Based Belief.” http://www.mitre.org/work/tech_papers/2010/09_5315/09_5315.pdf.
  • Cheney,James,Laura Chiticariu,and Wang-Chiew Tan. 2009.“Provenance in Databases:Why,How,and Where.” Foundations and Trends in Databases,1(4):379-474.
  • Cofta,Piotr.2007.Trust,Complexity and Control. Chichester:John Wiley & Sons.
  • Cook,Michael.1999.The Management of Information from Archives,2nd.Aldershot:Gower.
  • Craven,Louise.2008.“From the Archivist's Cardigan to the Very Dead Sheep:What are Archives?What are Archivists?What do They Do?”In What are Archives?Cultural and Theoretical Perspectives:A Reader,edited by L.Craven.Aldershot:Ashgate.
  • Cvetkovich,George,and Ragnar E.Lofstedt,eds.1999.Social Trust and the Management of Risk. London:Earthscan Publications.
  • Dai,Chenyun,Dan Lin,Elisa Bertino,and Murat Kantarcioglu. 2008.“An Approach to Evaluate Data Trustworthiness Based on Data Provenance.” Lecture Notes on Computer Science,5159:82-98.
  • Dalby,Andrew.2009.The World and Wikipedia. Draycott:Siduri Books.
  • Davies,Nigel,Daniel P.Siewiorek,and Rahul Sukthankar.2008.“Activity-Based Computing.” Pervasive Computing,7(2):20-21.
  • Denning,Peter,Jim Horning,David Parnas,and Lauren Weinstein.2005.“Wikipedia Risks.” Communications of the ACM,48(12):152.
  • Ding,Li,Jie Bao,James R Michaelis,Jun Zhao,and Deborah L.McGuinness.2010.“Reflections on Provenance Ontology Encodings.” Lecture Notes on Computer Science,6378:198-205.
  • Dollar,Charles M..1992.Archival Theory and Information Technologies:The Impact of Information Technologies on Archival Principles and Methods. Macerata,Italy:University of Macerata.
  • Donaldson,Devan Ray,and Kathleen Fear.2011.“Provenance,End-User Trust and Reuse:An Empirical Investigation.” http://static.usenix.org/events/tapp11/tech/final_files/Donaldson.pdf.
  • Dragunov,Anton N.,Thomas G.Dietterich,Kevin Johnsrude,Matthew McLaughlin,Lida Li,and Jonathan L.Herlocker.“TaskTracer:A Desktop Environment to Support Multi-tasking Knowledge Workers.” 2005.IUI’05:Proceedings of the 10th International Conference on Intelligent User Interfaces. New York:ACM Press.
  • Dredze,Mark,Tessa Lau,and Nicholas Kushmerick.2006.“Automatically Classifying Emails into Activities.” IUI’06:Proceedings of the 11th International Conference on Intelligent User Interfaces. New York:ACM Press.
  • Duranti,Luciana.1995.“Reliability and Authenticity:The Concepts and their Implications.” Archivaria,39:5-10.
  • Duranti,Luciana,and Corinne Rogers.2012.“Trust in Digital Records:An Increasingly Cloudy Legal Area.” Computer Law & Security Review,28:522-531.
  • Esteva,Maria,Weijia Xu,Jaya Sreevelsan-Nair,Ashwini Athalye,and Merwan Hadethe.“Finding Narratives of Activities through Archival Bond in Electronically Stored Informa-tion.” 2009.http://web.archive.org/web/20100722172246/http://www.law.pitt.edu/DESI3_Workshop/Papers/DESI_III.Esteva-Xu-Nair.pdf.
  • European Commission Directorate-General for Communication.2011.“Eurobarometer 76:Public Opinion in the European Union:First Results.” http://ec.europa.eu/public_opinion/archives/eb/eb76/eb76_first_en.pdf.
  • Evans,Max J..2007.“Archives of the People,by the People,for the People.” American Archivist,70(2):387-400.
  • Fear,Kathleen,and Devan Ray Donaldson.“Provenance and Credibility in Scientific Data Repositories.” Archival Science,12(3):319-339.
  • Fukuyama,Francis.1996.Trust:The Social Virtues and the Creation of Prosperity. London:Penguin.
  • Gilliland,Anne.“Neutrality,Social Justice and the Obligations of Archival Education and Educators in the Twenty-first Century.” Archival Science,11(3-4):193-209.
  • Golbeck,Jennifer,and Aaron Mannes.2006.“Using Trust and Provenance for Content Filtering on the Semantic Web.” http://sunsite.informatik.rwth-aachen.de/Publications/CEUR-WS/Vol-190/paper02.pdf.
  • Graves,Alvaro,Tim Lebo,and Jim McCusker.2010.“Provenance and Trust in E-Science.” http://tw.rpi.edu/proj/portal.wiki/images/0/06/McCusker_Lebo_Graves_ProvenanceTrustSlides.pdf.
  • Greenfield,Adam.2006.Everyware:The Dawning Age of Ubiquitous Computing. Berkeley,C.A.:Peachpit Press.
  • Grimnes,Gunnar A.,Leo Sauermann,and Ansgar Bernardi.2009.“The Personal Knowledge Workbench of the NEPOMUK Social Semantic Desktop.” Lecture Notes in Computer Science,5554:836-840.
  • Halpin,Harry.2009.“Provenance:The Missing Component of the Semantic Web for Privacy and Trust.” http://ceur-ws.org/Vol-447/paper9.pdf.
  • Harris,Verne.2000.Exploring Archives:An Introduction to Archival Ideas and Practice in South Africa. Pretoria:National Archives of South Africa.
  • Hasan,Ragib,Radu Sion,and Marianne Winslett.2009.“Secure Provenance:Protecting the Genealogy of Bits.” http://static.usenix.org/publications/login/2009-06/openpdfs/hasan.pdf.
  • Haworth,Kent M..2002.“Archival Description:Content and Context in Search of Structure.” In Encoded Archival Description on the Internet,edited by D.Pitti and W.Duff,New York:Haworth Press.
  • Horsman,Peter.2011.“Wrapping Records in Narratives:Representing Context Through Archival Description.” http://www.its-arolsen.org/fileadmin/user_upload/Dateien/Archivtagung/Horsman_text.pdf.
  • Hosking,Geoffrey.2010.Trust:Money,Markets and Society. Calcutta:Seagull Books.
  • Huvila,Isto.2008.“Participatory Archive:Towards Decentralised Curation,Radical User Orientation,and Broader Contextualisation of Records Management.” Archival Science,8(1):15-36.
  • Imran,Muhammad,and Helmut Hlavacs.2012.“Provenance in the Cloud:Why and How?”http://www.thinkmind.org/download.php?articleid1/4cloud_computing_2012_5_20_20114.pdf.
  • ISO 15489-1.2001.Information and Documentation:Records Management.Part 1:General.International Organization for Standardization.
  • Janowicz,Krzysztof.2009.“Trust and Provenance:You Can't Have One Without The Other.” http://geog.ucsb.edu/,jano/trust_provenance.pdf.
  • Jenkinson,Hilary.1937.A Manual of Archive Administration,2nd.London:Lund Humphries.
  • Kang,Hyunmo,Catherine Plaisant,Tamer Elsayed,and Douglas W.Oard.2010.“Making Sense of Archived E-Mail:Exploring the Enron Collection with NetLens.” Journal of the American Society for Information Science and Technology,61(4):723-744.
  • Kaptelinin,Victor.2003.“UMEA:Translating Interaction Histories into Project Contexts.” CHI’03:Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.New York:ACM Press.
  • Karypidis,Alexandros,and Spyros Lalis.2007.“Automated Context Aggregation and File Annotation for PAN-based Computing.” Personal and Ubiquitous Computing,11(1):33-44.
  • Kelton,Kari,Kenneth R.Fleischmann,and William A.Wallace.2008.“Trust in Digital Information.” Journal of the American Society for Information Science and Technology,59(3):363-374.
  • Kirlappos,Iacovos,M.Angela Sasse,and Nigel Harvey..2012.“Why Trust Seals Don't Work:A Study of User Perceptions and Behavior.” Lecture Notes in Computer Science,7344:308-324.
  • Lahno,Bernd.2001.“Institutional Trust:A Less Demanding Form of Trust?”Revista Latinoamericana de Estudios Avanzados,15:19-58.
  • Lee,Christopher A.2011.“Collecting the Externalized Me:Appraisal of Materials in the Social Web.” In Digital,I.:Personal Collections in the Digital Era,edited by C.A.Lee.Chicago,IL:Society of American Archivists.
  • Leung,Andrew W.,Aleatha Parker-Wood,and Ethan L.Miller.2009.“Copernicus:A Scalable,High-Performance Semantic File System.” http://ssrc.cse.ucsc.edu/Papers/ssrctr-09-06.pdf.
  • Locke,John.1954.Essays on the Law of Nature,edited by W.von Leyden.Oxford:Clarendon Press.
  • Lofstedt,Ragnar E.,and Tom Horlick-Jones.1999.“Environmental Regulation in the UK:Politics,Institutional Change and Public Trust.” In Social Trust and the Management of Risk,edited by G.Cvetkovich and R.E.Lo fstedt,London:Earthscan Publications.
  • Lowd,Daniel,and Nicholas Kushmerick.2009.“Using Salience to Segment Desktop Activity into Projects.” IUI 2009:Proceedings of the 14th International Conference on Intelligent User Interfaces. New York:ACM Press.
  • Lynch,Clifford.2000.“Authenticity and Integrity in the Digital Environment:An Exploratory Analysis of the Central Role of Trust.” Authenticity in a Digital Environment. Washington:Council on Library and Information Resources.
  • MacNeil,Heather.2000.Trusting Records:Legal,Historical,and Diplomatic Perspectives. Dordrecht:Kluwer.
  • MacNeil,Heather.2005.“Picking Our Text:Archival Description,Authenticity,and the Archivist as Editor.” American Archivist,68(2):264-278.
  • MacNeil,Heather.2009.“Trusting Description:Authenticity,Accountability,and Archival Description Standards.” Journal of Archival Organization,7(3):89-107.
  • MacNeil,Heather.2001.“Trust and Professional Identity:Narratives,Counter-Narratives and Lingering Ambiguities.” Archival Science,11(3-4):175-192.
  • Mayer,Rudolf,Robert Neumayer,and Andreas Rauber.2009.“Interacting with(Semi-)Automatically Extracted Context of Digital Objects.” http://www.idi.ntnu.no/,neumayer/pubs/MAY09_ciao.pdf Archives & Records 1920 G.Yeo.
  • Mayer-Schonberger,Viktor.2009.Delete:The Virtue of Forgetting in the Digital Age. Princeton,NJ:Princeton University Press.
  • Mayer-Scho nberger,Viktor,and Kenneth Cukier.2013.Big Data:A Revolution That Will Transform How We Live,Work and Think. London:John Murray.
  • McDonald,John.1997.“Towards Automated Record Keeping:Interfaces for the Capture of Records of Business Processes.” Archives and Museum Informatics,11(3-4):277-285.
  • McEvily,Bill,Vincenzo Perrone,and Akbar Zaheer.2003.“Introduction to the Special Issue on Trust in an Organizational Context.” Organization Science,14(1):1-4.
  • McKemmish,Sue.1993.“Introducing Archives and Archival Programs.” In Keeping Archives,edited by J.Ellis.2nd.Melbourne:D.W.Thorpe.
  • McKnight,D.Harrison,and Norman L.Chervany.1996.“The Meanings of Trust.” http://misrc.umn.edu/wpaper/WorkingPapers/9604.pdf
  • Millar,Laura A.2010.Archives:Principles and Practices. London:Facet Publishing.
  • Millar,Laura A..2002.“The Death of the Fonds and the Resurrection of Provenance:Archival Context in Space and Time.” Archivaria,53:1-15.
  • Moran,Thomas P.,Alex Cozzi,and Stephen P.Farrell.2005.“Unified Activity Management:Supporting People in E-Business.” Communications of the ACM,48(12):67-70.
  • Moreau,Luc.2010.“The Foundations for Provenance on the Web.” http://eprints.soton.ac.uk/271691/.
  • Moran,et al.2010.“The Open Provenance Model Core Specification.” http://eprints.soton.ac.uk/271449/.
  • Morrish,R..1930.“Fraud in Various Forms.” Police Journal,3(4):589-600.
  • Muller,S.,J.A.Feith,and R.Fruin.1898.Handleiding voor het Ordenen en Beschrijven van Archieven. Groningen:Van der Kamp.
  • Muniswamy-Reddy,Kiran-Kumar,Peter Macko,and Margo Seltzer.2010.“Provenance for the Cloud.” http://static.usenix.org/event/fast10/tech/full_papers/muniswamy-reddy.pdf.
  • Nesmith,Tom.2002.“Seeing Archives:Postmodernism and the Changing Intellectual Place of Archives.” American Archivist,65(1):24-41.
  • Nhan,Johnny,Patrick Kinkade,and Ronald Burns.2009.“Finding a Pot of Gold at the End of an Internet Rainbow:Further Examination of Fraudulent Email Solicitation.” International Journal of Cyber Criminology,3(1):452-475.
  • Omitola,Tope,Nicholas Gibbins,and Nigel Shadbolt.2010.“Provenance in Linked Data Integration.” http://linkeddata.future-internet.eu/images/e/eb/FIA2010_Provenance_in_the_Future_Internet.pdf.
  • Perer,Adam,and Ben Shneiderman.2005.“Beyond Threads:Identifying Discussion in Email Archives.” http://hcil.cs.umd.edu/trs/2005-26/2005-26.pdf
  • Power,Michael.1997.The Audit Society:Rituals of Verification. Oxford:Oxford University Press.
  • Procter,Margaret.2008.“Life Before Jenkinson:The Development of British Archival Theory and Thought at the Turn of the Twentieth Century.” Archives,119:140-161.
  • Queensland State Archives.2008.“Creating Full and Accurate Records.” http://www.archives.qld.gov.au/Recordkeeping/GRKDownloads/Documents/full_accurate.pdf.
  • Rath,Andreas S.,Didier Devaurs,and Stefanie N.Lindstaedt.2009.“UICO:An Ontology-based User Interaction Context Model for Automatic Task Detection on the Computer Desktop.” Proceedings of the 1st Workshop on Context,Information and Ontologies.New York:ACM Press.
  • Rattenbury,Tye,and John Canny.2007.“CAAD:An Automatic Task Support System.” CHI’07:Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York:ACM Press.
  • Riegelsberger,Jens,M.Angela Sasse,and John D.McCarthy.2005.“The Mechanics of Trust:A Framework for Research and Design.” International Journal of Human-Computer Studies,62(3):381-422.
  • Riss,Uwe V.,Olaf Grebner,Philip S.Taylor,and Ying Du.2010.“Knowledge Work Support by Semantic Task Management.” Computers in Industry,61:798-805.
  • Roper,Michael.1992.“The Development of the Principles of Provenance and Respect for Original Order in the Public Record Office.” In The Archival Imagination:Essays in Honour of Hugh A.Taylor,edited by B.L.Craig.Ottawa:Association of Canadian Archivists.
  • Schmidt,Albrecht,Bastian Pfleging,Florian Alt,Alireza Sahami Shirazi,and Geraldine Fitzpatrick.2012.“Interacting with 21st-Century Computers.” Pervasive Computing,11(1):22-30.
  • Schwartz,Joan M..2011.“The Archival Garden:Photographic Plantings,Interpretive Choices,and Alternative Narratives.” In Controlling the Past:Documenting Society and Institutions,edited by T.Cook.Chicago,IL:Society of American Archivists.
  • Searle,John R..2002.Consciousness and Language. Cambridge:Cambridge University Press.
  • Shah,Chirag.2009.“Mining Contextual Information for Ephemeral Digital Video Preservation.” International Journal of Digital Curation,4(1):175-192.
  • Simmhan,Yogesh L.,Beth Plale,and Dennis Gannon.2005.“A Survey of Data Provenance in E-Science.” SIGMOD Record,34(3):31-36.
  • State Records Authority of New South Wales.2004.“Standard on Full and Accurate Records.” http://www.records.nsw.gov.au/documents/recordkeeping-standards/Standard%20No%20%207%20-%20Full%20and%20Accurate.pdf.
  • Statistics Canada.2002.“Statistics Canada's Quality Assurance Framework.” http://www5.statcan.gc.ca/bsolc/olc-cel/olc-cel?lang1/4eng&catno1/412-586-X.
  • Viklund,Mattias.2003.“Risk Policy:Trust,Risk Perception,and Attitudes.” http://hhs.diva-portal.org/smash/get/diva2:221508/FULLTEXT01.pdf.
  • Voida,Stephen,Elizabeth D.Mynatt,and W.Keith Edwards.2008.“Re-framing the Desktop Interface Around the Activities of Knowledge Work.” UIST’08:Proceedings of the 21st Annual ACM.Symposium on User Interface Software and Technology.New York:ACM Press.
  • W3C Provenance Incubator Group.2010.“Provenance XG Final Report.” http://www.w3.org/2005/Incubator/prov/XGR-prov-20101214.
  • Weinberger,David.2009.“Transparency Is the New Objectivity.” http://www.hyperorg.com/blogger/2009/07/19/transparency-is-the-new-objectivity/.
  • Wf4Ever Advanced Workflow Preservation Technologies for Enhanced Science.2011.“Workflow Integrity and Authenticity Maintenance Initial Requirements.” http://repo.wf4ever-project.org/dlibra/doczip?id1/418.
  • Wombacher,Andreas,and Mohammad Rezwanul Huq.2011.“Towards Automatic Capturing of Manual Data Processing Provenance.” http://doc.utwente.nl/77220/1/paper.pdf.
  • Wootten,Ian,and Omer Rana.2008.“Recording the Context of Action for Process Documentation.” Lecture Notes on Computer Science,5272:45-53.
  • Yeo,Geoffrey.2012.“Bringing Things Together:Aggregate Records in a Digital Age.” Archivaria,74:43-91.
  • Yeo,Geoffrey.“Representing the Act:Records and Speech Act Theory.” Journal of the Society of Archivists,31(2):95-117.

网际空间的信任问题及其背景关系

可试读20%内容 PDF阅读 阅读器阅览

试读已结束,剩余80%未读

¥9.75 查看全文 >

VIP免费

章节目录

  • 引言
  • 1.信任
  • 2.网际空间
  • 3.来源与背景关系
  • 4.捕获背景关系
  • 5.透明度、可信性和来源
  • 6.结论

查看更多>>>