- Educate and give information about security and privacy problems to patrons;
- Learn more about trust ourselves;
- try to understand patrons perspective, cultural and otherwise;
- People need to be wary of sources — check facts, even of sources you think are trusted;
- In creating information systems, ensure information is secure;
- “Librarian’s like to search and everyone else likes to find”. As librarians we are inclined to find the most accruate, timely information. However, depending on information need, a thorough, exhaustive search is not always necessary. This method may wind up pushing people away (e.g. Wikipedia for quick and dirty information about a topic;response: most patrons can find the quick and dirty information, so if they come to information professionals, it is our responsibility tin enculcate idea that accuracy is important
response: leads to a marketing opportunity for us to teach patrons the value of quality informationresponse:Credibility is decreased if don’t give patrons the correct answer from the start
response: is it our responsibility to find the best information or train patrons to find and assess information (i.e. self-reliance and responsiblity). We have to stop picking on/dismiss Google and give patrons tools to find good informationresponse: key is to instill awareness of assessing a quality information source
- Is information good information or the best information?
Example: when buying a car, consult Consumer Reports but another person will only want to be sure front seat is comfortable.
response: speaks to information needs and fundamentals of a reference interview
response: patrons may avoid a librarian who spends too much time finding the *perfect* piece of informationresponse: Democracy of trust is exemplified with Google’s popularity. The more people use a source, the more it is trusted
Should a government be allowed to (try to) censor information that its citizens receive? Are there circumstances under which this practice should be considered explicitly acceptable or explicitly unacceptable?
Is it acceptable for a government to monitor channels of digital information, including personal information, that pass within its borders? If a government has a legitimate interest in doing so, how may it build trust among its citizens that it is not unnecessarily monitoring their communications or collecting their personal information? When should a government have its powers in this regard limited?
In the case of the current wiretapping operatings in the U.S. (outlined in this article by Dan Mitchell in The New York Times), to what extent should people around the world be concerned that the U.S. Government may be monitoring their Internet communications?
(The NY times requires a login to read their articles online. Creating a login and password for the NY Times is free and may be done here).
Even a casual review of the literature on trust reveals a cacophony of issues on the subject. From the list below, which one to three issues would you consider most significant
– to you as an information professional
– to you as a consumer of information
when evaluating a website? Why?
– The presence of a logo from a third party organization certifying a site is trustworthy, such as Verisign
– The interests of an electronic retailer in mining data on the information behavior of visitors to its own website
– The interests of an electronic retailer in monitoring data on the information behavior of Internet users in general
– The influence of the blogosphere on a public’s willingness to trust a piece of information
– The environment rich with personal data created by social networking sites such as MySpace, Xanga, Friendster, or LinkedIn
– How perceptions of trust change from culture to culture
Here are some articles relating to this question:
Shanker, L. 2006. In Google we Trust. First Monday, v. 11: 4.
Wakefield, R., and Whitten, D. 2006. Examining User Perceptions of Third Party Organization Credibility and Trust in an E-retailer.Journal of Organizational and End User Computing, v. 18: 2.
Holland C. P. and Lockett A. G. Business trust and the formation of virtual organizations, in 31st Annual Hawaii International Conference on System Sciences, IEEE, 1998, Hawaii.
Gefen, D., Rose, G.M., Warkentin, M., Pavlou, P.A. 2005. Cultural Diversity and Trust in IT Adoption: A Comparison of Potential e-Voters in the USA and South Africa. Journal of Global Information Management, v. 13: 1.
What are the key elements of any definition of trust? Also, why talk about it? Why should we as information professionals take an interest (or not take an interest) in discussing trust in information?
Here is an article discussing how trust may be defined:
Grandison, T., and Sloman, M. 2001. A Survey of Trust in Internet Applications. IEEE Communications Surveys and Tutorials.