Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1282100.1282179acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicecConference Proceedingsconference-collections
Article

Modeling trust in e-commerce: an approach based on user requirements

Published: 19 August 2007 Publication History

Abstract

E-commerce is presently operating under its expected capacity, mainly because traders find it very difficult to trust one another online for trading decisions. It is therefore very important to develop an effective trust management system that assists e-commerce participants to make good trust decisions. This paper describes an approach based on users. requirements towards such a system. The benefits of this approach are threefold: First, it gives a better understanding of the components that can be used in a trust management system. Secondly, it illustrates that the components contributing to the trust making process can be different from one environment to another. Thirdly, it shows that the way one person trusts can be different from others. This approach, rather than using the same static attributes to calculate trust for everyone, uses specific attributes based on each truster's goals. Moreover, by using GRL and UCM as notations for trust modeling, this approach provides a visual representation of trust, its components and the trusting process.

References

[1]
Daniel Amyot. Introduction to the User Requirements Notation: Learning by Example. In Computer Networks, 42(3), 285--301, 2003.
[2]
Sulin Ba and Paul A. Pavlon. Evidence of the Effective Trust Building Technology in Electronic Markets, Price Premiums and Buyer Behavior. In Electronic Economy Research Program, Marshall School of Business, MIS Quarterly, 26(3): 243--268, 2002.
[3]
Kari Chopra and William A. Wallace. Trust in Electronic Environments. In Proceedings of the 36th Annual Hawaii International Conference, 2003.
[4]
Deloitte and Touche. E-Commerce Security- A Global Status Report. In Information Systems Audit and Control Association, page 52, 2000.
[5]
Yenta Lenny Foner. A Multi Agent Referral Based Matchmaking System. In Proceedings of First International Conference on Autonomous Agents, 1997.
[6]
GRL: http://www.cs.toronto.edu/km/GRL/, 2006.
[7]
Rohit Khare and Adam Rifkin. Weaving a Web of Trust, World Wide Web. In World Wide Web Journal, 1997.
[8]
Kathryn M. Kimery and Mary McCord. Third-Party Assurances the Road to Trust. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2002.
[9]
Wei-chang Kong and Yu-Ting Caisy Hung. Modeling Initial and Repeat Online Trust in B2C E-commerce. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences, 2006.
[10]
HyoungYong Lee, Hyunchul Ahn, and Ingoo Han. Analysis of Trust in the E-Commerce Adoption. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), Track 6, p. 113c, 2006.
[11]
Hui Lei and Gholamali C. Shoja. A Distributed Trust Model for E-Commerce Applications. In Proceedings of IEEE Conference on E-Technology, E-Commerce and E-Service, 2005.
[12]
Stephen Paul Marsh. Formalizing Trust as a Computational Concept. PhD Thesis, Department of Mathematics and Computer Science, University of Stirling, 1994.
[13]
E. Michael Maximilien and Munindar P. Singh. Agent Based Trust Model. In Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), Utrecht, 2005.
[14]
Roger C. Mayer and James H. Davis. An Integrative Mode of Organizational Trust. In Academy of Management Review, Vol 20, pages 709--734, 1995.
[15]
Samia Nefti, Farid Meziane, and Khairudin Kasiran. A Fuzzy Trust Model for E-Commerce. In Proceedings Seventh IEEE International Conference on E-Commerce Technology, 2005.
[16]
J. B. Rotter. Generalized Expectancies for Interpersonal Trust. In American Psychologist, Vol. 26, pages 443--452, 1971.
[17]
Jordi Sabater and Carles Sierra. Regret: A Reputation Model for Gregarious Societies. In Proceedings of International Conference on Autonomous Agents, 2001.
[18]
F. B. Schneider. Trust in Cyberspace. In National Academy Press, 1998.
[19]
Supriya Singh and Claudia Slegers. Trust and Electronic Money. CIRCIT Ltd. 1997, Policy research paper, No 42, 1997.
[20]
Yan Lindsay Sun, Wei Yu, Zhu Han, and K. J. Ray Liu. Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. In IEEE JSAC Special Issue on Security in Wireless Ad Hoc Networks, Vol. 24, No 2, pages 305--317, 2006.
[21]
Girish Suryanarayana, Justin R. Erenkrantz, and Richard N. Taylor. An Architectural Approach for Decentralized Trust Management. In Internet Computing, IEEE, 2005.
[22]
George Theodorakopoulos and John S. Baras. On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks. In IEEE Journal on Selected Areas in Communications (JSAC), 2006.
[23]
M. Weis and D. Amyot. Designing and Evolving Business Models with URN. In Proceedings of the Montreal Conference on E-Technologies (MCETECH), pages 149--162, 2005.
[24]
Bin Yu and Munindar P. Singh. A Social Mechanism of Reputation Management in Electronic Communities. In Proceedings of the Fourth International Workshop on Cooperative Information Agents, pages 154--165, 2000.
[25]
Bin Yu, Munindar P. Singh, and Katia Sycara. Developing Trust in Large-Scale Peer-to-Peer Systems. In Proceedings of First IEEE Symposium on Multi-Agent Security and Survivability (MASS), pages 1--10, 2004.
[26]
Giorgos Zacharia, Alexandros Moukas, and Pattie Maes. Collaborative Reputation Mechanisms in Electronic Marketplaces. In Proceedings of HICSS, Maui, Hawaii, USA, 1999.
[27]
Chung, L., Nixon, B. A, Yu, E., and Mylopoulos, J: Non-Functional Requirements in Software Engineering Kluwer Academic Publishers, Dordrecht, USA, 2000.
[28]
Yu, E.: Modeling Strategic Relationships for Process Reengineering. PhD thesis, Department of Computer Science, University of Toronto, Canada, 1995.
[29]
Eric Yu and L. Liu. Modeling Trust in the i* Strategic Actors Framework. 3rd Workshop on Deception, Fraud, and Trust in Agent Societies, Barcelona, Catalonia, Spain, June 3--7, 2000.
[30]
Ruggero Morselli, Jonathan Katz, Bobby Bhattacharjee, A Game-Theoretic Framework for Analyzing Trust-Inference Protocols, Second workshop on the economics of the peer-to-peer systems, 2004.
[31]
Yan Lindsay Sun, Wei Yuy, Zhu Hany, and K. J. Ray Liuy, Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, Feb. 2006.

Cited By

View all
  • (2022)Patient Empoverment and its Connection to TrustProceedings of the 18th international symposium on health information management research10.15626/ishimr.2020.06Online publication date: 3-May-2022
  • (2022)Measuring and Comparing the Consistency of IR Models for Query Pairs with Similar and Different Information NeedsProceedings of the 31st ACM International Conference on Information & Knowledge Management10.1145/3511808.3557637(4449-4453)Online publication date: 17-Oct-2022
  • (2016)Web of Credit: Adaptive Personalized Trust Network Inference From Online Rating DataIEEE Transactions on Computational Social Systems10.1109/TCSS.2016.26390163:4(176-189)Online publication date: Dec-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICEC '07: Proceedings of the ninth international conference on Electronic commerce
August 2007
482 pages
ISBN:9781595937001
DOI:10.1145/1282100
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 August 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. GRL
  2. UCM
  3. URN
  4. e-commerce
  5. trust
  6. trust modeling

Qualifiers

  • Article

Conference

ICEC07

Acceptance Rates

Overall Acceptance Rate 150 of 244 submissions, 61%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Patient Empoverment and its Connection to TrustProceedings of the 18th international symposium on health information management research10.15626/ishimr.2020.06Online publication date: 3-May-2022
  • (2022)Measuring and Comparing the Consistency of IR Models for Query Pairs with Similar and Different Information NeedsProceedings of the 31st ACM International Conference on Information & Knowledge Management10.1145/3511808.3557637(4449-4453)Online publication date: 17-Oct-2022
  • (2016)Web of Credit: Adaptive Personalized Trust Network Inference From Online Rating DataIEEE Transactions on Computational Social Systems10.1109/TCSS.2016.26390163:4(176-189)Online publication date: Dec-2016
  • (2014)Modeling Trust Relationships for Developing Trustworthy Information SystemsInternational Journal of Information System Modeling and Design10.4018/ijismd.20140101025:1(25-48)Online publication date: 1-Jan-2014
  • (2013)Applying Continuous Authentication to Protect Electronic TransactionsIT Policy and Ethics10.4018/978-1-4666-2919-6.ch081(1848-1875)Online publication date: 2013
  • (2013)A Paradigm Approach to Generate Trust Index Using 3C3G Framework for B2C E-Commerce WebsitesAdvances in Information Technology10.1007/978-3-319-03783-7_8(80-92)Online publication date: 2013
  • (2012)Applying Continuous Authentication to Protect Electronic TransactionsInformation Assurance and Security Technologies for Risk Assessment and Threat Management10.4018/978-1-61350-507-6.ch005(134-161)Online publication date: 2012
  • (2012)Dealing with trust and control: A meta-model for trustworthy information systems development2012 Sixth International Conference on Research Challenges in Information Science (RCIS)10.1109/RCIS.2012.6240441(1-9)Online publication date: May-2012
  • (2012)A reputation model based on hierarchical bayesian estimation for Web servicesProceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD.2012.6221802(88-93)Online publication date: May-2012
  • (2012)A Meta-model for Legal Compliance and Trustworthiness of Information SystemsProgress in Pattern Recognition, Image Analysis, Computer Vision, and Applications10.1007/978-3-642-31069-0_4(46-60)Online publication date: 2012
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media