Hal Fan Hour

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 18 October 2009

Thoughts on Trust

Posted on 06:38 by Unknown
I was asked for my thoughts on trust, in relation to groups and networks. This was my response, not directly addressing the issue, but framing it I think in a relevant way.

I wrote this, which touches on it: http://www.downes.ca/post/12

I have very mixed feelings about trust in and of itself.

My first reaction is that discussions of trust get started precisely in cases where there is no trust, and that this manifests itself in two areas:

- software and content vendors do not trust their consumers, and attempt to for conditions of authentication and registration on them - hence the misnamed miniker "trusted computing", which is actually an area of your own computer that is outside your control, and completely in the hands of the companies. Similarily, mobile phone are often thought of as "trusted platforms" precidely because complete control of the operating system environment is in the hands of the vendor - which is why Apple, eg., can remove applications at will

- customers do not trust the software and content vendors. Hence the need for people to be reassured that it is 'safe' for them to submit their credit card numbers and personal information to commerce sites and social networks. There are also issues regarding the ownership of their own content (vendors, so protective opf their own content, are careless to the point of irresponsibility with the rights of their customers)

A lot of the time, people talking about "trust" will say things that sound like they're talking about the second sort (whether people truth the vendors) but the solutions they propose (such as suthentication) are intended to solve issues of the first sort.

Two other dimensions of trust are almost never discussed at all:

- vendor-to-vendor trust. For the most part, companies on the internet do not trust each other at all. With good reason. This is why interactions between the vendors are tightly controled, via APIs or other arms-length mechanisms. Varioius trust mechanistms are build into the the technology, like anonymizing of data (notice how this applies in everything from financial transactions to OAuth to distribution of research results). These mechanisms are not put in place to protect users (though that is what will be said) but instead to protect themselves from the other vendors. Over time, this dimension mof (lack of) truth tends to lead toward the development of (closed) federations, rather than open networks, to the detriment of the wider internet.

- person to person. We don't truth each other (and we shouldn't). Spam, viruses and phishing are the most manifest cases of this sort of breach of trust. Consequently, we have attempted to create walls around ourselves - spam filters, social network buddy lists, so-not-call registries. We seek control over the flow of information into and out of our systems through technology over which we have less and less control (because of the needs of the other forms of 'trust'). How ironic it is that the mechanisms used to ensure vendors can trust computers are precisely those that lead to abuses such as spam and identity theft!

So what do I conclude from all this?

- the root of trust is mistrust
- different forms of trust are at odds with each other
- mechanisms that create trust often hurt the network as a whole
- for the network to work, we must all give up control - but at a measured pace, in step with each other, to avoid one element of the other abusing this greater openness
- and yet, this giving up of control cannot be absolute - in the final analysis, we must be able to assert ownership over out own environments (which means, either absolute ownership over the contents of them, or the right to remove that which we do not own)

So - there's a full paper, I think (or it would be after references and summaries of the discussion were added). Hope it was useful.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Blogs in Education
    Submission for a forthcoming STRIDE handbook for The Indira Gandhi National Open University (IGNOU). See related handbooks here . What is a ...
  • Learning and Performance Support Systems
    This post is to introduce you to our Learning and Performance Support Systems program, a new $19 million 5-year initiative at the National R...
  • E-Learning: Générations
    ( English version ) Ces dernières années, j'ai travaillé sur deux grands concepts: d'abord, la théorie de l'apprentissage ...
  • E-Learning Generations
    ( version française ) In recent years I have been working on two major concepts: first, the connectivist theory of online learning, wh...
  • Open Educational Resources: A Definition
    The Definition Open educational resources are materials used to support education that may be freely accessed, reused, modified and shared b...
  • McLuhan - Understanding Media - Summary of Chapters 11-14
    My contribution to the Understanding Media Reading Group Chapter 11 McLuhan writes, in Chapter 11 of Understanding Media, that "The mys...
  • TTI Vanguard Conference Notes - 4
    Erin McKean, Wordnik The language is the Dictionary If you took the language, and you got rid of the dictionary, what would be left would be...
  • Progressive Taxation and Prosperity
    Responding to Justin Fox, editorial director of the Harvard Business Review Group, How big should a government be? in the Harvard Business ...
  • Bob Dylan in Moncton
  • International MOOCs Past and Present
    OpenLearning.com , a venture born out of the University of New South Wales ( UNSW ) in Sydney, Australia. Starting this week, you can begin ...

Categories

  • #change11
  • Connectivism
  • http://www.blogger.com/img/gl.link.gif
  • Shakespeare

Blog Archive

  • ►  2013 (68)
    • ►  December (1)
    • ►  November (5)
    • ►  October (6)
    • ►  September (7)
    • ►  July (3)
    • ►  June (5)
    • ►  May (6)
    • ►  April (18)
    • ►  March (8)
    • ►  February (2)
    • ►  January (7)
  • ►  2012 (56)
    • ►  December (3)
    • ►  November (7)
    • ►  October (7)
    • ►  September (7)
    • ►  August (2)
    • ►  July (2)
    • ►  June (3)
    • ►  May (1)
    • ►  April (5)
    • ►  March (6)
    • ►  February (6)
    • ►  January (7)
  • ►  2011 (86)
    • ►  December (7)
    • ►  November (11)
    • ►  October (8)
    • ►  September (6)
    • ►  August (1)
    • ►  July (8)
    • ►  June (7)
    • ►  May (10)
    • ►  April (2)
    • ►  March (4)
    • ►  February (11)
    • ►  January (11)
  • ►  2010 (108)
    • ►  December (9)
    • ►  November (9)
    • ►  October (12)
    • ►  September (4)
    • ►  August (6)
    • ►  July (10)
    • ►  June (9)
    • ►  May (9)
    • ►  April (9)
    • ►  March (12)
    • ►  February (9)
    • ►  January (10)
  • ▼  2009 (85)
    • ►  December (3)
    • ▼  October (8)
      • On Open Access
      • Thoughts on Trust
      • A liberal Liberal leader
      • What Would It Take?
      • Peace
      • Intelligent Communities Summit - Day Two
      • Intelligent Communities Summit - Day One
      • Origins of the Term 'Personal Learning Network'
    • ►  September (7)
    • ►  August (4)
    • ►  July (15)
    • ►  June (5)
    • ►  May (7)
    • ►  April (6)
    • ►  March (17)
    • ►  February (7)
    • ►  January (6)
  • ►  2008 (94)
    • ►  December (5)
    • ►  November (7)
    • ►  October (7)
    • ►  September (6)
    • ►  August (16)
    • ►  July (11)
    • ►  June (6)
    • ►  May (6)
    • ►  April (5)
    • ►  March (4)
    • ►  February (7)
    • ►  January (14)
  • ►  2007 (3)
    • ►  December (3)
Powered by Blogger.

About Me

Unknown
View my complete profile