Bad actors can erode trust,‌ but so can faulty or poorly-planned systems
 ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Click here to see a web copy of this email

Add resources.email@computer.org to your address book

IEEE Computer Society: Career Accelerator

JUNE 2025

Digital Trust

As technology develops, digital systems must meet the highest possible standard for integrity—especially with the digitalization of critical services related to health, wealth, and identity. Bad actors can erode trust, but so can faulty or poorly-planned systems. Learn more about the need for digital trust and thoughts on how to build and support that trust by anticipating and responding to problems in digital ecosystems in the articles below.

1

Personal Digital Assistants: The Need for Governance

New technologies such as voice-based personal digital assistants (PDA) provide many benefits and new efficiencies however, there are a number of ways in which PDAs could be used that can create new ethical and legal issues. This article discusses the conceptual and practical challenges around PDAs and their impact on digital governance.

2

Digital Trust - Trusted Computing and Beyond: A Position Paper

Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment. The concept of digital environments begins with the trust (established in the real world) in the organisation/individual that manages the digital resources.  This paper looks at digital trust from the point of view of security and examines how valid trust approaches from other domains are now making their way into secure computing.

3

TURP: Managing Trust for Regulating Privacy in Internet of Things

Internet of Things (IoT) applications, such as smart home or ambient-assisted living systems, promise useful services to end users. Most of these services rely heavily on sharing and aggregating information among devices, many times raising privacy concerns. This paper presents a technique, where an IoT device collects information from others, evaluates the trustworthiness of the information sources to decide the suitability of sharing information with others. 

Videos

Facilitating Security and Trust among Multiple Parties through Blockchain Techniques

Facilitating Security and Trust among Multiple Parties through Blockchain Techniques


This talk shares some key characteristics of blockchain and a few promising applications of blockchain that can facilitate security and trust among multiple parties.

Posteriori Trust: Behavior Driven Trust on a
Network Graph at Scale

Posterior Trust: Behavior Driven Trust on a Network Graph at Scale


Mobile networks can connect everyone with a simple call or message and recent years have seen a dramatic increase in abuse through robocalling and messaging. 

Featured Jobs in our Career Center

Full-time Assistant/Associate/ Full Professors in the Department of Computer Science and Information Engineering at Chang Gung University


Assistant Teaching Professor of Computer Science at University of Rhode Island

Please share the email with your committee members, fellow volunteers, and colleagues!

SHARE THIS EMAIL
Logo: IEEE Computer Society

© 2025 IEEE Computer Society | Contact Us | Privacy Policy

This message was intended for: newsletter@newslettercollector.com

Unsubscribe from Career Accelerator | Unsubscribe from all emails

Note to Members: Unsubscribing from all emails will also unsubscribe you from membership updates. Edit your email preferences if you would like to continue receiving membership notices.

IEEE Computer Society, 10662 Los Vaqueros Circle, Los Alamitos, California 90720-1314, United States