62,168 research outputs found

    Linking consumer trust perception in constructing an e-commerce trust model

    Get PDF
    Trust issues is still considered as a main obstacle in the implementation of eCommerce Due to the increasing numbers of cyber crimes committed today, consumers are faced with doubt to engage in online shopping. As a safety precaution, consumers will take certain measures to protect their information by evaluating and assessing these websites trustworthiness before an actual purchase occurs. This paper describes a model that examines the elements related to online consumer behavior and to investigate this behavior towards building and increasing trust. The applicability of the model was tested in attempt to view consumers' acceptance towards the model and its component. The fmdings indicate the respondents are aware of the trust issue surrounding e-Commerce implementation as they accept and agreed with the model and its components

    Data centric trust evaluation and prediction framework for IOT

    Get PDF
    Ā© 2017 ITU. Application of trust principals in internet of things (IoT) has allowed to provide more trustworthy services among the corresponding stakeholders. The most common method of assessing trust in IoT applications is to estimate trust level of the end entities (entity-centric) relative to the trustor. In these systems, trust level of the data is assumed to be the same as the trust level of the data source. However, most of the IoT based systems are data centric and operate in dynamic environments, which need immediate actions without waiting for a trust report from end entities. We address this challenge by extending our previous proposals on trust establishment for entities based on their reputation, experience and knowledge, to trust estimation of data items [1-3]. First, we present a hybrid trust framework for evaluating both data trust and entity trust, which will be enhanced as a standardization for future data driven society. The modules including data trust metric extraction, data trust aggregation, evaluation and prediction are elaborated inside the proposed framework. Finally, a possible design model is described to implement the proposed ideas

    The Mediation Effect of Trusting Beliefs on the Relationship Between Expectation-Confirmation and Satisfaction with the Usage of Online Product Recommendation

    Full text link
    Online Product Recommendations (OPRs) are increasingly available to onlinecustomers as a value-added self-service in evaluating and choosing a product.Research has highlighted several advantages that customers can gain from usingOPRs. However, the realization of these advantages depends on whether and towhat extent customers embrace and fully utilise them. The relatively low OPR USAgerate indicates that customers have not yet developed trust in OPRs’ performance.Past studies also have established that satisfaction is a valid measure of systemperformance and a consistent significant determinant of users’ continuous systemusage. Therefore, this study aimed to examine the mediation effect of trustingbeliefs on the relationship between expectation-confirmation and satisfaction. Theproposed research model is tested using data collected via an online survey from626 existing users of OPRs. The empirical results revealed that social-psychologicalbeliefs (perceived confirmation and trust) are significant contributors to customersatisfaction with OPRs. Additionally, trusting beliefs partially mediate the impactof perceived confirmation on customer satisfaction. Moreover, this study validatesthe extensions of the interpersonal trust construct to trust in OPRs and examinesthe nomological validity of trust in terms of competence, benevolence, andintegrity. The findings provide a number of theoretical and practical implications.&nbsp

    The case of online trust

    Get PDF
    ā€œThe original publication is available at www.springerlink.comā€. Copyright SpringerThis paper contributes to the debate on online trust addressing the problem of whether an online environment satisfies the necessary conditions for the emergence of trust. The paper defends the thesis that online environments can foster trust, and it does so in three steps. Firstly, the arguments proposed by the detractors of online trust are presented and analysed. Secondly, it is argued that trust can emerge in uncertain and risky environments and that it is possible to trust online identities when they are diachronic and sufficient data are available to assess their reputation. Finally, a definition of trust as a second-order property of first-order relation is endorsed in order to present a new definition of online trust. According to such a definition, online trust is an occurrence of trust that specifically qualifies the relation of communication ongoing among individuals in digital environments. On the basis of this analysis, the paper concludes by arguing that online trust promotes the emergence of social behaviours rewarding honest and transparent communications.Peer reviewe

    Users' trust in information resources in the Web environment: a status report

    Get PDF
    This study has three aims; to provide an overview of the ways in which trust is either assessed or asserted in relation to the use and provision of resources in the Web environment for research and learning; to assess what solutions might be worth further investigation and whether establishing ways to assert trust in academic information resources could assist the development of information literacy; to help increase understanding of how perceptions of trust influence the behaviour of information users

    Ignore These At Your Peril: Ten principles for trust design

    Get PDF
    Online trust has been discussed for more than 10 years, yet little practical guidance has emerged that has proven to be applicable across contexts or useful in the long run. 'Trustworthy UI design guidelines' created in the late 90ies to address the then big question of online trust: how to get shoppers online, are now happily employed by people preparing phishing scams. In this paper we summarize, in practical terms, a conceptual framework for online trust we've established in 2005. Because of its abstract nature it is still useful as a lens through which to view the current big questions of the online trust debate - large focused on usable security and phishing attacks. We then deduct practical 10 rules for providing effective trust support to help practitioners and researchers of usable security

    TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources

    No full text
    In many dynamic open systems, agents have to interact with one another to achieve their goals. Here, agents may be self-interested, and when trusted to perform an action for another, may betray that trust by not performing the action as required. In addition, due to the size of such systems, agents will often interact with other agents with which they have little or no past experience. There is therefore a need to develop a model of trust and reputation that will ensure good interactions among software agents in large scale open systems. Against this background, we have developed TRAVOS (Trust and Reputation model for Agent-based Virtual OrganisationS) which models an agent's trust in an interaction partner. Specifically, trust is calculated using probability theory taking account of past interactions between agents, and when there is a lack of personal experience between agents, the model draws upon reputation information gathered from third parties. In this latter case, we pay particular attention to handling the possibility that reputation information may be inaccurate

    Authentication and authorisation in entrusted unions

    Get PDF
    This paper reports on the status of a project whose aim is to implement and demonstrate in a real-life environment an integrated eAuthentication and eAuthorisation framework to enable trusted collaborations and delivery of services across different organisational/governmental jurisdictions. This aim will be achieved by designing a framework with assurance of claims, trust indicators, policy enforcement mechanisms and processing under encryption to address the security and confidentiality requirements of large distributed infrastructures. The framework supports collaborative secure distributed storage, secure data processing and management in both the cloud and offline scenarios and is intended to be deployed and tested in two pilot studies in two different domains, viz, Bio-security incident management and Ambient Assisted Living (eHealth). Interim results in terms of security requirements, privacy preserving authentication, and authorisation are reported
    • ā€¦
    corecore