Introduction
It is imperative to note that the safety of computer systems is a fascinating topic that is actively discussed by scholars. Many approaches have been developed over the years and currently, there is no consensus on which framework is the most reasonable. The problem is that most companies that have tried to achieve satisfactory levels of privacy were not successful, and they had to deal with numerous difficulties. Furthermore, a review of articles on this subject matter may be quite beneficial because it will help to improve an understanding of this issue, and it would be much easier to identify differences between these two concepts.
Discussion
Hurley, Gillespie, Ferrin, & Dietz (2013) have focused on the development of a model that can be utilized to ensure that a company is trustworthy. Authors of the first article suggest that a set of approaches must be used to ensure that the rules of an organization are not broken by employees. The focus on violations of trust is also critical, and it is an aspect that is not frequently discussed. The issue needs to be addressed because the system may not be regarded safe if an individual that is aware of the defense will be able to access the required information without any issues (Hurley et al., 2013).
Moreover, it would be beneficial if each session consisted of several verifications, and all activities were monitored. Sprague (2006) suggests that many computers are trusted when their safety is not guaranteed, and numerous approaches to avoid defense can be considered. It is stated that corporations are incredibly vulnerable at the moment, and they should devote many more resources to support research. The problem that occurs when a computer that is trusted is used by an individual is that he or she is not aware of possible consequences, and it may hurt the business in the long-term (Sprague, 2006).
The similarity between these two frameworks is that they both are focused on the protection of data, but a misunderstanding may be critical at this point. Such definitions seem practical but they are not clear most of the time, and it may not be an easy task to identify why a particular system is viewed as trustworthy, and another one is trusted.
The approach suggested by Kazemi & Shahabi (2013) is much more focused on reliability and developers are determined to ensure that a system is safe, and possible risks are avoided. The authors propose a particular framework that should be safe and would help to address current problems related to privacy. Also, it is suggested that such factors as associated with data and its validity are of utmost importance. Moreover, a trustworthy system would help to deal with such barriers.
The level of effectiveness of this approach varies when it comes to trust, and it is quite problematic and indicates that the approach may have to be improved because it cannot be viewed as appropriate based on available data. Another fascinating aspect that needs to be highlighted is that an individual may select a privacy level, and this is an approach that may be viewed as innovative (Kazemi & Shahabi, 2013).
Alshar’e, Sulaiman, Mukhtar, & Zin (2014) suggest that even the latest techniques used to protect the data have several weaknesses. The issue is that they are vulnerable to physical attacks, and authors suggest that such changes may be considered if it is necessary. It is paramount to note that such aspects as smaller levels of performance and limitations are viewed as especially problematic (Alshar’e et al., 2014).
The similarity between these concepts is that it is focused on the assessment of current weaknesses and how they may be addressed. However, different approaches are suggested in this case. The dissimilarity is that many more aspects should be acknowledged to classify a system as trustworthy. They will always have particular weaknesses, and it is not likely that a situation will change anytime soon. Such frameworks are easy to understand, and they are practical. Overall, a trusted system should be the one that is considered to be reliable based on the evidence. It will need to be verified to ensure that all core factors are taken into account. Another possible approach is to classify systems that are used by enterprises focused on protecting the most as trusted because it signifies that many view them as the most reasonable choice.
Conclusion
In conclusion, it is evident that a significant difference between these two terms is present, but it may be hard to identify in most cases because the primary goal is to increase the level of safety of a computer. It is necessary to mention that several factors should be assessed to determine if an approach is appropriate and such aspects as confidentiality and integrity play a vital role most of the time. Overall, it is necessary to understand that they vary in their effectiveness, and an enterprise must select the one that is more appropriate in a particular situation.
References
Alshar’e, M. I., Sulaiman, R., Mukhtar, M. R., & Zin, A. M. (2014). A User Protection Model for the Trusted Computing Environment. Journal of Computer Science, 10(9), 1692-1702. Web.
Hurley, R. F., Gillespie, N., Ferrin, D. L., & Dietz, G. (2013). Designing Trustworthy Organizations. MIT Sloan Management Review, 54(4), 75-82. Web.
Kazemi, L., & Shahabi, C. (2013). TAPAS: Trustworthy Privacy-aware Participatory Sensing. Knowledge and Information Systems, 37(1), 105-128. Web.
Sprague, S. (2006). Getting Started with Trusted Computing. EDPACS, 34(5), 14-20. Web.