{"title":"数字信任是我们与技术关系的核心","authors":"Deepika Chauhan","doi":"10.12968/s1353-4858(23)70047-0","DOIUrl":null,"url":null,"abstract":"Technology is now so central to our lives and to our businesses that it's essential that we can trust it. If we overlook this critical relationship, we stand in danger of being undermined or betrayed by the technology due to vulnerabilities and flaws, and we can never utilise it to its maximum potential. But how do you go about defining and achieving digital trust?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Digital trust is core to our relationship with technology\",\"authors\":\"Deepika Chauhan\",\"doi\":\"10.12968/s1353-4858(23)70047-0\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Technology is now so central to our lives and to our businesses that it's essential that we can trust it. If we overlook this critical relationship, we stand in danger of being undermined or betrayed by the technology due to vulnerabilities and flaws, and we can never utilise it to its maximum potential. But how do you go about defining and achieving digital trust?\",\"PeriodicalId\":100949,\"journal\":{\"name\":\"Network Security\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1353-4858(23)70047-0\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(23)70047-0","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Digital trust is core to our relationship with technology
Technology is now so central to our lives and to our businesses that it's essential that we can trust it. If we overlook this critical relationship, we stand in danger of being undermined or betrayed by the technology due to vulnerabilities and flaws, and we can never utilise it to its maximum potential. But how do you go about defining and achieving digital trust?