1,314 Hits in 6.6 sec

A Taxonomy to Express Open Challenges in Trust and Reputation Systems

Mozhgan Tavakolifard, Kevin C. Almeroth
2012 Journal of Communications  
Furthermore, we present a set of our contributions as a way to address some of these challenges.  ...  In this paper, we briefly present characteristics of existing online trust and reputation models and systems through a multidimensional framework that can serve as a basis to understand the current state  ...  Some of the various methods for computing reputation and trust measures include. 1) Rank ordering: This method has no explicit reputation score and acts as an implicit indicator of reputation.  ... 
doi:10.4304/jcm.7.7.538-551 fatcat:z6wtluf6grbhbiabfmuy5notkm

Trust in Relevance

Fabio Paglieri, Cristiano Castelfranchi
2012 International Conference on Agreement Technologies  
In this paper we outline some desiderata for modeling relevance as one of the key features in deciding whether to trust an information source, we analyze its related role in determining belief formation  ...  The agent needs to be able to (i) rely on the relevance of the information provided by a source before or without being able to directly verify such relevance, and thus (ii) estimate the quality of sources  ...  both a subjective and an objective side, the former relative to goals, the latter to interests; (vi) several formal and computational models developed for trust in general are easily adapted to capture  ... 
dblp:conf/at/PaglieriC12 fatcat:mjxqg6d7jffv7bwtfeowuorufq

The Rhetorical Construction of Trust Online

Josh Boyd
2003 Communication Theory  
For the purposes of this article, the truster will be an individual Internet user and the trustee will be the Internet agent being trusted: a particular website, a credit card company, a bank, an online  ...  The individual user trusts these Internet agents with money or information in exchange for help, prestige, a desired purchase, safekeeping, a quick and successful transaction free from fraud or misrepresentation  ... 
doi:10.1111/j.1468-2885.2003.tb00298.x fatcat:57rsmr3tmbd2dazix4o4n6qwny

Trusted Autonomy and Cognitive Cyber Symbiosis: Open Challenges

Hussein A. Abbass, Eleni Petraki, Kathryn Merrick, John Harvey, Michael Barlow
2015 Cognitive Computation  
In CoCyS, human-machine teams are viewed as a network with each node comprising humans (as computational machines) or computers.  ...  These entities can be humans, machines, or a mix of the two. Cognitive Cyber Symbiosis (CoCyS) is a cloud that uses humans and machines for decision-making.  ...  of 1975, as revised in 2008 (5).  ... 
doi:10.1007/s12559-015-9365-5 pmid:27257440 pmcid:PMC4867784 fatcat:zi6klz6m2je25lsrljoejhmr7m

Trust in Online Technology: Towards Practical Guidelines Based on Experimentally Verified Theory [chapter]

Christian Detweiler, Joost Broekens
2009 Lecture Notes in Computer Science  
A strong correlation was found between subjects' level of trust in the software and the ability they perceived the software as having.  ...  To test the applicability of the proposed model to an instance of human-technology interaction, we constructed a website which required subjects to depend on an intelligent software agent to accomplish  ...  As stated by Bhattacherjee, the Internet is the most effective way to reach a population of online users [15] .  ... 
doi:10.1007/978-3-642-02580-8_66 fatcat:63mepwv2affylcphd6viquzezu

The Case of Online Trust

Matteo Turilli, Antonino Vaccaro, Mariarosaria Taddeo
2010 Knowledge, Technology and Policy  
Finally, a definition of trust as a second-order property of first-order relation is endorsed in order to present a new definition of on-line trust.  ...  The whole point of e-commerce is the communication of the correct information in the most effective way, so as to capture the users' attention and trust.  ...  Two conditions for the occurrence of trust Trust is generally understood as a decision taken by an agent A (the trustor) to rely on another agent B (the trustee) to perform a given action.  ... 
doi:10.1007/s12130-010-9117-5 fatcat:mghzkmhjazfkvbiwhxivmrovfe

A Classification and Investigation of Trustees in B-to-C e-Commerce: General vs. Specific Trust

Jason Bennett Thatcher, Michelle Carter, Xin Li, Guang Rong
2013 Communications of the Association for Information Systems  
Existing literature lacks a common taxonomy and systematic integration necessary for building cumulative knowledge on the nature of trust in an information systems context.  ...  In contrast, when shopping in a familiar e-commerce store, consumers pay more attention to the current Web experience, diminishing the salience of general trust.  ...  as a key agent in online transactions.  ... 
doi:10.17705/1cais.03204 fatcat:uxtnal53lvd5lorvrgmnxubvnm

Trust: Different Views, One Goal

Mubarak Almutairi
2018 Zenodo  
A thorough review of trust models is carried out in this paper to reveal the key capabilities of existing trust models and compare how they differ among disciplines.  ...  Trust decisions are risky due to uncertainties and the loss of control. On the other hand, not trusting might mean giving up some potential benefits  ...  Some of the sited reasons for having a false positive feedback are: • Reciprocation: a positive feedback for a positive feedback in return. • Being rewarded with a discounted price. • Building a good reputation  ... 
doi:10.5281/zenodo.1208768 fatcat:3wzcgtsqu5c45hzmzdjwvnfy4a

Trust: Different Views, One Goal

Mubarak Almutairi
2017 International Journal of Security Privacy and Trust Management  
The development of such models will allow for trust reasoning and decisions to be made in situations with high risk and uncertainty.  ...  A thorough review of trust models is carried out in this paper to reveal the key capabilities of existing trust models and compare how they differ among disciplines.  ...  Some of the sited reasons for having a false positive feedback are: • Reciprocation: a positive feedback for a positive feedback in return. • Being rewarded with a discounted price. • Building a good reputation  ... 
doi:10.5121/ijsptm.2017.6101 fatcat:lpfrtey6crcflipjqxq6k3xlpm

Shared expectations for protection of identifiable health care information

Matthew K. Wynia, Steven S. Coughlin, Sheri Alpert, Deborah S. Cummins, Linda L. Emanuel
2001 Journal of general internal medicine  
OBJECTIVE: The Ethical Force Program is a collaborative effort to create performance measures for ethics in health care.  ...  A set of specific and assessable expectations for ethical conduct in this domain was then drafted and refined through seven meetings over 16 months.  ...  In the absence of passed legislation, in November 1999, the Secretary of Health and Human Services provided a Notice of Proposed Rulemaking, which proposed rights that individuals should have with respect  ... 
doi:10.1111/j.1525-1497.2001.00515.x pmid:11251761 pmcid:PMC1495179 fatcat:yh4kfwpiovalnhweujlooaomjq

Trust and Reputation for Successful Software Self-organisation [chapter]

Jean-Marc Seigneur, Pierpaolo Dondio
2011 Natural Computing Series  
harmful and malicious (for example, a new piece of software may contain hidden spyware or it may be a virus).  ...  Secondly, in protection of open collaborative software, such as Wikipedia.  ...  The eBay feedback system has a boolean representation for each feedback, where +1 is the value of a positive feedback and -1 of a negative one.  ... 
doi:10.1007/978-3-642-17348-6_8 fatcat:zikljtdwmzd5bn3nn7hial4vne

An overview of online trust: Concepts, elements, and implications

Ye Diana Wang, Henry H. Emurian
2005 Computers in Human Behavior  
Lack of trust has been repeatedly identified as one of the most formidable barriers to people for engaging in e-commerce, involving transactions in which financial and personal information is submitted  ...  Building consumer trust on the Internet presents a challenge for online merchants and is a research topic of increasing interest and importance.  ...  Acknowledgements The authors appreciate the assistance of Mary Madden, Pew Internet and American Life Project, who clarified our interpretation of the survey data and who improved our presentation of that  ... 
doi:10.1016/j.chb.2003.11.008 fatcat:uiph5rxzfre5xddraax7aywbjm

Panama: Detailed Assessment Report—FATF Recommendations for Anti-Money Laundering and Combating the Financing of Terrorism

International Monetary Fund
2014 IMF Staff Country Reports  
The assessment was conducted by a team of assessors composed of two staff of the International Monetary Fund (IMF) and four expert(s) acting under the supervision of the IMF.  ...  A list of the agencies and entities met is set out in Annex 1 to the detailed assessment report.  ...  In practice it only acts as a conduit for reports sent to the UAF. 1109.  ... 
doi:10.5089/9781475559743.002 fatcat:t2tk7fdpondv5pqcxzmzs7wa2u

Trust and Reputation Management in Web-based Social Network [chapter]

Touhid Bhuiyan, Audun Josang, Yue Xu
2010 Web Intelligence and Intelligent Agents  
Wireless and Internet technology act as enablers and facilitators for enhanced social interaction with a global reach.  ...  In addition to the customer ratings about the product or services, there is also a good number of online customer feedback information available over the Internet as free text customer reviews, comments  ...  This book presents a unique and diversified collection of research work ranging from controlling the activities in virtual world to optimization of productivity in games, from collaborative recommendations  ... 
doi:10.5772/8375 fatcat:llhbmefwwzddzhk6hejfwx366a

A Social-Feedback Enriched Interface for Software Download

Gianluca Dini, Pierfrancesco Foglia, C. Antonio Prete, Michele Zanda
2013 Journal of Organizational and End User Computing  
Software downloading over the Internet is a major solution for publishers to deliver their software products. In this context, user interfaces for software downloading must be designed carefully.  ...  This work proposes to enrich a common browser interface for software downloading with a reputation system -a mechanism for collecting and presenting user feedback.  ...  Trust and Reputation Systems Trust for Mayer, Davis, and Schoorman (1995) is the willingness of a trustor to be vulnerable to the actions of a trustee based on the expectation that the trustee will perform  ... 
doi:10.4018/joeuc.2013010102 fatcat:n6evmuyaxzgg7h6papy4urfvg4
« Previous Showing results 1 — 15 out of 1,314 results