121,521 research outputs found
Trust beyond reputation: A computational trust model based on stereotypes
Models of computational trust support users in taking decisions. They are
commonly used to guide users' judgements in online auction sites; or to
determine quality of contributions in Web 2.0 sites. However, most existing
systems require historical information about the past behavior of the specific
agent being judged. In contrast, in real life, to anticipate and to predict a
stranger's actions in absence of the knowledge of such behavioral history, we
often use our "instinct"- essentially stereotypes developed from our past
interactions with other "similar" persons. In this paper, we propose
StereoTrust, a computational trust model inspired by stereotypes as used in
real-life. A stereotype contains certain features of agents and an expected
outcome of the transaction. When facing a stranger, an agent derives its trust
by aggregating stereotypes matching the stranger's profile. Since stereotypes
are formed locally, recommendations stem from the trustor's own personal
experiences and perspective. Historical behavioral information, when available,
can be used to refine the analysis. According to our experiments using
Epinions.com dataset, StereoTrust compares favorably with existing trust models
that use different kinds of information and more complete historical
information
Users' trust in information resources in the Web environment: a status report
This study has three aims; to provide an overview of the ways in which trust is either assessed or asserted in relation to the use and provision of resources in the Web environment for research and learning; to assess what solutions might be worth further investigation and whether establishing ways to assert trust in academic information resources could assist the development of information literacy; to help increase understanding of how perceptions of trust influence the behaviour of information users
Delivering services by building and running virtual organisations
Non peer reviewedPostprin
An Intelligent QoS Identification for Untrustworthy Web Services Via Two-phase Neural Networks
QoS identification for untrustworthy Web services is critical in QoS
management in the service computing since the performance of untrustworthy Web
services may result in QoS downgrade. The key issue is to intelligently learn
the characteristics of trustworthy Web services from different QoS levels, then
to identify the untrustworthy ones according to the characteristics of QoS
metrics. As one of the intelligent identification approaches, deep neural
network has emerged as a powerful technique in recent years. In this paper, we
propose a novel two-phase neural network model to identify the untrustworthy
Web services. In the first phase, Web services are collected from the published
QoS dataset. Then, we design a feedforward neural network model to build the
classifier for Web services with different QoS levels. In the second phase, we
employ a probabilistic neural network (PNN) model to identify the untrustworthy
Web services from each classification. The experimental results show the
proposed approach has 90.5% identification ratio far higher than other
competing approaches.Comment: 8 pages, 5 figure
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments
Decentralized systems are a subset of distributed systems where multiple
authorities control different components and no authority is fully trusted by
all. This implies that any component in a decentralized system is potentially
adversarial. We revise fifteen years of research on decentralization and
privacy, and provide an overview of key systems, as well as key insights for
designers of future systems. We show that decentralized designs can enhance
privacy, integrity, and availability but also require careful trade-offs in
terms of system complexity, properties provided, and degree of
decentralization. These trade-offs need to be understood and navigated by
designers. We argue that a combination of insights from cryptography,
distributed systems, and mechanism design, aligned with the development of
adequate incentives, are necessary to build scalable and successful
privacy-preserving decentralized systems
Recommended from our members
An integrated framework to classify healthcare virtual communities
Healthcare (HC) strives to improve service quality through its cost-effective social computing strategy. However, sudden rise in the count of virtual community of practices (VCoPs) introduced many choices for physicians; As a result, it is not surprising to observe current literature reporting lack of study to investigate ideas integration within and between VCoPs. VCoPs need to be categorized for HC physicians so they will be able to pin-point effective a VC to attain assistance from. This paper is one of the first investigative studies, in HC sector, that proposed a framework to classify and pin-point appropriate VCoPs, for physicians, after it reviewed and analyzed traditional and up-to-date theoretical, empirical and case study literature in the area of social computing, knowledge management (KM) and VCoPs. The implementation of this framework pinpointed professional VCoPs as most appropriate for physicians based on strict requirements, i.e. closed physician communities holding many participants, which are older than 5 years with high boundary crossing. This framework is also a “one-size-fit-all” formula to build an organizational VCoP, utilizable by other business sectors
Please, talk about it! When hotel popularity boosts preferences
Many consumers post on-line reviews, affecting the average evaluation of products and services. Yet, little is known about the importance of the number of reviews for consumer decision making. We conducted an on-line experiment (n= 168) to assess the joint impact of the average evaluation, a measure of quality, and the number of reviews, a measure of popularity, on hotel preference. The results show that consumers' preference increases with the number of reviews, independently of the average evaluation being high or low. This is not what one would expect from an informational point of view, and review websites fail to take this pattern into account. This novel result is mediated by demographics: young people, and in particular young males, are less affected by popularity, relying more on quality. We suggest the adoption of appropriate ranking mechanisms to fit consumer preferences. © 2014 Elsevier Ltd
Modelling and testing consumer trust dimensions in e-commerce
Prior research has found trust to play a significant role in shaping purchase intentions of a consumer. However there has been limited research where consumer trust dimensions have been empirically defined and tested. In this paper we empirically test a path model such that Internet vendors would have adequate solutions to increase trust. The path model presented in this paper measures the three main dimensions of trust, i.e. competence, integrity, and benevolence. And assesses the influence of overall trust of consumers. The paper also analyses how various sources of trust, i.e. consumer characteristics, firm characteristic, website infrastructure and interactions with consumers, influence dimensions of trust. The model is tested using 365 valid responses. Findings suggest that consumers with high overall trust demonstrate a higher intention to purchase online
Reputation and Certification in Online Shops
We investigate the impact of self-organized reputation versus certification by an independent institution on demand for online shops. Using data from a large Austrian price comparison site, we show that quality seals issued by a credible and independent institution increase demand more than feedback-based reputation. This result is important for markets where the market-maker must deal with issues of asymmetric information concerning the quality of goods and services in the market.Online markets, search engines, signaling, certification, reputation
A Trust-based Recruitment Framework for Multi-hop Social Participatory Sensing
The idea of social participatory sensing provides a substrate to benefit from
friendship relations in recruiting a critical mass of participants willing to
attend in a sensing campaign. However, the selection of suitable participants
who are trustable and provide high quality contributions is challenging. In
this paper, we propose a recruitment framework for social participatory
sensing. Our framework leverages multi-hop friendship relations to identify and
select suitable and trustworthy participants among friends or friends of
friends, and finds the most trustable paths to them. The framework also
includes a suggestion component which provides a cluster of suggested friends
along with the path to them, which can be further used for recruitment or
friendship establishment. Simulation results demonstrate the efficacy of our
proposed recruitment framework in terms of selecting a large number of
well-suited participants and providing contributions with high overall trust,
in comparison with one-hop recruitment architecture.Comment: accepted in DCOSS 201
- …