Category Archives: Trust

Lies vs the Truth

Psychological research has shown that the saying “Repeat a lie often enough and it becomes the truth”, a law of propaganda often attributed to the Nazi Joseph Goebbels, does have some validity. Of course this does not really make something the truth but people start believing it is and among psychologists something like this is…

Gamergate Discrediting Wikipedia?!

Mark Bernstein has written a 3 part series on the serious issue of how Wikipedia is being used as a weapon against feminists who have been criticizing the portrayal of women in games. Gamergate refers to gaming developers and enthusiasts who are using Wikipedia and other media to discredit their critics. Mark’s articles are an…

The truth about Internet Rumours revealed

I have found as a quite useful and trustworthy site for research on Internet rumours and scams. It is a bit like the mythbusters tv show as it strives to provide the truth on information being spread especially when the sources aren’t usually known. Some items that I have recently checked on. Hallmark Postcard…

Apple IOS is an Example of Trustworthy Computing that Started with Microsoft

Anil Dash has written another excellent article that provides a short history of trustworthy computing. It is illuminating because: It explains how Apple’s IOS is an example of a new computing model based on trustworthy computing principles It gives credit to Microsoft research for establishing some of the principles of trustworthy computing. Another theme that…

Biometric Personalization

With the trend to touch interfaces it is inevitable that biometrics will be used for personalization. There needs to be at least a minimal identity recognition capability for personalization to be useful. It doesn’t have to be perfect though as has already been shown with iPhoto facial recognition.

Adding Trust to Wikipedia, and Beyond

Adding Trust to Wikipedia, and Beyond: “The official motto of the Internet could be ‘don’t believe everything you read,’ but moves are afoot to help users know better what to be skeptical about and what to trust.” (Via Technology Review.)

Risk Based Authentication

Risk based authentication matches the authentication checks and requests with the level of perceived risk. If there is suspicious activity then the authentication requested increases.

Who to Trust Online?

I have recently done some research on trust and reputation in the online world and how you can differentiate online between the good guys and the bad guys. Google can be helpful but you need to decide which sources you believe. It started with a computer article about not needing to upgrade HW/SW as a…