SlideShare une entreprise Scribd logo
1  sur  17
How to study trust online  …  example of social networking, reputation, identity Tina Guenther, DGS08 Jena, October 10, 2008
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
2. Conceptualizing trust online ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3. Social Relations, Reputation, Identity ,[object Object],[object Object],[object Object]
4. Preconditions ,[object Object],[object Object]
4. Preconditions ,[object Object],[object Object],[object Object]
4. Preconditions ,[object Object],[object Object],[object Object]
Provider A Provider B User A User B 5. Interorganizational & interpersonal trust online Developer A Developer B Source: Möllering 2006 + supplements General online public
Source: Möllering 2006 + supplements 5. Three levels of trust online [Embeddness into offline world at all three levels] actor Individual/ Interaction level actor structure Organizational level structure … Institutional level
5. “Trust wheel”   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Quelle: Möllering 2006
6. Applying the framework ,[object Object],[object Object]
6. Applying the framework ,[object Object],[object Object]
6. Applying the framework ,[object Object],[object Object]
3. Wie man Vertrauen  online erforschen kann What uses, what signals of trustworthiness? What constitutes good practice?  How do you establish online identity,  monitor reputation?  How suspend vulnerability, uncertainty? How do you experience the tension of trust? How do people make trust possible through participation in online social life?  Source: Möllering 2006 Enacting Experience Leap of faith Reflexivity Routine Reason Example Questions Elements
4. Vertrauen  online erforschen?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you for your attention!   This content is licenced with a CC-BY-NC-SA licence following German Law

Contenu connexe

Tendances

Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
eComm2008
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital Identity
Digital-identity
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
Digital-identity
 
Effects of Social Networking in Academic Literacy
Effects of Social Networking in Academic LiteracyEffects of Social Networking in Academic Literacy
Effects of Social Networking in Academic Literacy
Steve Chilton
 
Web2.0 disaster
Web2.0 disasterWeb2.0 disaster
Web2.0 disaster
PalMD
 

Tendances (20)

Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
 
Digital Self
Digital SelfDigital Self
Digital Self
 
Web 2.0 Challenges & Opportunities
Web 2.0 Challenges & OpportunitiesWeb 2.0 Challenges & Opportunities
Web 2.0 Challenges & Opportunities
 
#LTEC4121: Presentation of Self Online
#LTEC4121: Presentation of Self Online #LTEC4121: Presentation of Self Online
#LTEC4121: Presentation of Self Online
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Social Media Policy and Guidelines
Social Media Policy and GuidelinesSocial Media Policy and Guidelines
Social Media Policy and Guidelines
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital Identity
 
Social Networking at William Mitchell College of Law
Social Networking at William Mitchell College of LawSocial Networking at William Mitchell College of Law
Social Networking at William Mitchell College of Law
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
Effects of Social Networking in Academic Literacy
Effects of Social Networking in Academic LiteracyEffects of Social Networking in Academic Literacy
Effects of Social Networking in Academic Literacy
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
Protecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineProtecting Your Professional Reputation Online
Protecting Your Professional Reputation Online
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
 
Web2.0 disaster
Web2.0 disasterWeb2.0 disaster
Web2.0 disaster
 
Overview of Web 2.0 in the Government
Overview of Web 2.0 in the GovernmentOverview of Web 2.0 in the Government
Overview of Web 2.0 in the Government
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation
 

En vedette (7)

Increase Security trust on secure areas (TURBINE Workshop, Jan 2011)
Increase Security trust on secure areas (TURBINE Workshop, Jan 2011)Increase Security trust on secure areas (TURBINE Workshop, Jan 2011)
Increase Security trust on secure areas (TURBINE Workshop, Jan 2011)
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
21 security and_trust
21 security and_trust21 security and_trust
21 security and_trust
 
Presentation
PresentationPresentation
Presentation
 
Managing Your Trust Network
Managing Your Trust NetworkManaging Your Trust Network
Managing Your Trust Network
 
Security and trust. gabriel waller, nokia siemens networks.
Security and trust. gabriel waller, nokia siemens networks.Security and trust. gabriel waller, nokia siemens networks.
Security and trust. gabriel waller, nokia siemens networks.
 
Personal Data & Trust Network - 11/3/15
Personal Data & Trust Network - 11/3/15Personal Data & Trust Network - 11/3/15
Personal Data & Trust Network - 11/3/15
 

Similaire à How to study trust online

User centric personalized multifacet model trust in online social network
User centric personalized multifacet model trust in online social networkUser centric personalized multifacet model trust in online social network
User centric personalized multifacet model trust in online social network
csandit
 
Multi facet trust model for online social network environment
Multi facet trust model for online social network environmentMulti facet trust model for online social network environment
Multi facet trust model for online social network environment
IJNSA Journal
 
MULTI-FACET TRUST MODEL FOR ONLINE SOCIAL NETWORK ENVIRONMENT
MULTI-FACET TRUST MODEL FOR ONLINE SOCIAL NETWORK ENVIRONMENTMULTI-FACET TRUST MODEL FOR ONLINE SOCIAL NETWORK ENVIRONMENT
MULTI-FACET TRUST MODEL FOR ONLINE SOCIAL NETWORK ENVIRONMENT
IJNSA Journal
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
Anil Dhami
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactions
Sónia
 
20 06-2014
20 06-201420 06-2014
20 06-2014
Sónia
 
What Is Enterprise 2.0 Public
What Is Enterprise 2.0   PublicWhat Is Enterprise 2.0   Public
What Is Enterprise 2.0 Public
Tanya Ney
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
kmtj1979
 
01.Key trends in social media
01.Key trends in social media01.Key trends in social media
01.Key trends in social media
Julian Matthews
 

Similaire à How to study trust online (20)

Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
User centric personalized multifacet model trust in online social network
User centric personalized multifacet model trust in online social networkUser centric personalized multifacet model trust in online social network
User centric personalized multifacet model trust in online social network
 
Multi facet trust model for online social network environment
Multi facet trust model for online social network environmentMulti facet trust model for online social network environment
Multi facet trust model for online social network environment
 
MULTI-FACET TRUST MODEL FOR ONLINE SOCIAL NETWORK ENVIRONMENT
MULTI-FACET TRUST MODEL FOR ONLINE SOCIAL NETWORK ENVIRONMENTMULTI-FACET TRUST MODEL FOR ONLINE SOCIAL NETWORK ENVIRONMENT
MULTI-FACET TRUST MODEL FOR ONLINE SOCIAL NETWORK ENVIRONMENT
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking Presentation
 
Case Study Of RHEAL
Case Study Of RHEALCase Study Of RHEAL
Case Study Of RHEAL
 
Problem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finderProblem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finder
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 
Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.
 
Networking in the North
Networking in the NorthNetworking in the North
Networking in the North
 
Social capital and networking
Social capital and networkingSocial capital and networking
Social capital and networking
 
Work 2.0 Tech Best Practices Aenc
Work 2.0   Tech Best Practices   AencWork 2.0   Tech Best Practices   Aenc
Work 2.0 Tech Best Practices Aenc
 
A Network Mindset Practical Approaches to Everyday Networked and Collaborativ...
A Network Mindset Practical Approaches to Everyday Networked and Collaborativ...A Network Mindset Practical Approaches to Everyday Networked and Collaborativ...
A Network Mindset Practical Approaches to Everyday Networked and Collaborativ...
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactions
 
20 06-2014
20 06-201420 06-2014
20 06-2014
 
What Is Enterprise 2.0 Public
What Is Enterprise 2.0   PublicWhat Is Enterprise 2.0   Public
What Is Enterprise 2.0 Public
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
 
Tools and Services for More Intelligent Meta Networks
Tools and Services for More Intelligent Meta NetworksTools and Services for More Intelligent Meta Networks
Tools and Services for More Intelligent Meta Networks
 
01.Key trends in social media
01.Key trends in social media01.Key trends in social media
01.Key trends in social media
 

Plus de Tina Guenther

Internetsoziologie Koeln Ws0910
Internetsoziologie Koeln Ws0910Internetsoziologie Koeln Ws0910
Internetsoziologie Koeln Ws0910
Tina Guenther
 

Plus de Tina Guenther (8)

Internetsoziologie Koeln Ws0910
Internetsoziologie Koeln Ws0910Internetsoziologie Koeln Ws0910
Internetsoziologie Koeln Ws0910
 
Vertrauen und professionelle Selbstdarstellung 09
Vertrauen und professionelle Selbstdarstellung 09Vertrauen und professionelle Selbstdarstellung 09
Vertrauen und professionelle Selbstdarstellung 09
 
Internetöffentliche Netzwerkwissenschaft & Vertrauen09
Internetöffentliche Netzwerkwissenschaft & Vertrauen09Internetöffentliche Netzwerkwissenschaft & Vertrauen09
Internetöffentliche Netzwerkwissenschaft & Vertrauen09
 
Das digitale Ich Republica 09
Das digitale Ich Republica 09Das digitale Ich Republica 09
Das digitale Ich Republica 09
 
HS Wissenssoziologie
HS WissenssoziologieHS Wissenssoziologie
HS Wissenssoziologie
 
HS Soziologie des Internet
HS Soziologie des InternetHS Soziologie des Internet
HS Soziologie des Internet
 
Das macht bei uns die Hilfskraft. Über Potenziale des Web 2.0 für die Sozialw...
Das macht bei uns die Hilfskraft. Über Potenziale des Web 2.0 für die Sozialw...Das macht bei uns die Hilfskraft. Über Potenziale des Web 2.0 für die Sozialw...
Das macht bei uns die Hilfskraft. Über Potenziale des Web 2.0 für die Sozialw...
 
Wissensspeicher Internet.
Wissensspeicher Internet. Wissensspeicher Internet.
Wissensspeicher Internet.
 

Dernier

Dernier (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 

How to study trust online

  • 1. How to study trust online … example of social networking, reputation, identity Tina Guenther, DGS08 Jena, October 10, 2008
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Provider A Provider B User A User B 5. Interorganizational & interpersonal trust online Developer A Developer B Source: Möllering 2006 + supplements General online public
  • 10. Source: Möllering 2006 + supplements 5. Three levels of trust online [Embeddness into offline world at all three levels] actor Individual/ Interaction level actor structure Organizational level structure … Institutional level
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. 3. Wie man Vertrauen online erforschen kann What uses, what signals of trustworthiness? What constitutes good practice? How do you establish online identity, monitor reputation? How suspend vulnerability, uncertainty? How do you experience the tension of trust? How do people make trust possible through participation in online social life? Source: Möllering 2006 Enacting Experience Leap of faith Reflexivity Routine Reason Example Questions Elements
  • 16.
  • 17. Thank you for your attention! This content is licenced with a CC-BY-NC-SA licence following German Law