DocumentCode :
3097664
Title :
The effect of external safeguards on human-information system trust in an information warfare environment
Author :
Biros, David P. ; Fields, Gregory ; Gunsch, Gregg
Author_Institution :
Dept of Syst. & Eng. Mgt, Air Force Inst. of Technol., Wright-Patterson AFB, OH, USA
fYear :
2003
fDate :
6-9 Jan. 2003
Abstract :
The modern military command and control (C2) center collects a massive amount of information that is both complex and contradictory. The amount of collected information is often more than can be effectively and efficiently understood by humans. Therefore, today´s decision-makers have become reliant upon information systems to filter through the information and fuse that information into a computer representation of the battle space. The degree of reliance placed in these systems by the decision-makers suggests a significant level of trust. Trust theories and models are rich in the literature, but few have been developed for the human-computer trust relationship. A recent model of trust was found that was both broad in scope and supportive of human-computer trust theories. This model was used to explore the decision-maker´s trust in information systems in a C2 environment. Given the vulnerability of information systems to information security incidents such as hacking and data manipulation, this study set out to examine if the presence of such incidents would effect the decision-makers trusting behavior. This study also examined if the use of such external safeguards, such as the computer emergency response teams (CERT) and the network risk assessment certifications, would affect the decision-maker. Two laboratory experiments were conducted with military personnel using a high-fidelity C2. The findings from both experiments suggest that the presence of information security incidents in a fast-paced C2 environment have no effect on the decision-makers trusting behavior. Decision-makers continued to trust information systems even though information security incidents occurred.
Keywords :
command and control systems; decision making; information systems; security of data; computer emergency response teams; human-computer trust theories; human-information system; information security; information systems; information warfare; military command-and-control; network risk assessment certifications; Command and control systems; Computer crime; Computer networks; Fuses; Humans; Information filtering; Information filters; Information security; Information systems; Military computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on
Print_ISBN :
0-7695-1874-5
Type :
conf
DOI :
10.1109/HICSS.2003.1173894
Filename :
1173894
Link To Document :
بازگشت