3,761 research outputs found

    BUILDING TRUST FOR SERVICE ASSESSMENT IN INTERNET-ENABLED COLLABORATIVE PRODUCT DESIGN & REALIZATION ENVIRONMENTS

    Get PDF
    Reducing costs, increasing speed and leveraging the intelligence of partners involved during product design processes are important benefits of Internet-enabled collaborative product design and realization environments. The options for cost-effective product design, re-design or improvement are at their peak during the early stages of the design process and designers can collaborate with suppliers, manufacturers and other relevant contributors to acquire a better understanding of associated costs and product viability. Collaboration is by no means a new paradigm. However, companies have found distrust of collaborative partners to be the most intractable obstacle to collaborative commerce and Internet-enabled business especially in intellectual property environments, which handle propriety data on a constant basis. This problem is also reinforced in collaborative environments that are distributed in nature. Thus trust is the main driver or enabler of successful collaborative efforts or transactions in Internet-enabled product design environments. Focus is on analyzing the problem of ÂĄÂźtrust for servicesÂĄÂŻ in distributed collaborative service provider assessment and selection, concentrating on characteristics specific to electronic product design (e-Design) environments. Current tools for such collaborative partner/provider assessment are inadequate or non-existent and researching network, user, communication and service trust problems, which hinder the growth and acceptance of true collaboration in product design, can foster new frontiers in manufacturing, business and technology. Trust and its associated issues within the context of a secure Internet-enabled product design & realization platform is a multifaceted and complex problem, which demands a strategic approach crossing disciplinary boundaries. A Design Environment Trust Service (DETS) framework is proposed to incorporate trust for services in product design environments based on client specified (or default) criteria. This involves the analysis of validated network (objective) data and non-network (subjective) data and the use of Multi Criteria Decision Making (MCDM) methodology for the selection of the most efficient service provision alternative through the minimization of distance from a specified ideal point and interpreted as a Dynamic (Design) Trust Index (DTI) or rank. Hence, the service requestor is provided with a quantifiable degree of belief to mitigate information asymmetry and enable knowledgeable decision-making regarding trustworthy service provision in a distributed environment

    Sustainable cloud service provider development by a Z-number-based DNMA method with Gini-coefficient-based weight determination

    Get PDF
    The sustainable development of cloud service providers (CSPs) is a significant multiple criteria decision making (MCDM) problem, involving the intrinsic relations among multiple alternatives, (quantitative and qualitative) decision criteria and decision-experts for the selection of trustworthy CSPs. Most existing MCDM methods for CSP selection incorporated only one normalization technique in benefit and cost criteria, which would mislead the decision results and limit the applications of these methods. In addition, these methods did not consider the reliability of information given by decision-makers. Given these research gaps, this study introduces a Z-number-based double normalization-based multiple aggregation (DNMA) method to tackle quantitative and qualitative criteria in forms of benefit, cost, and target types for sustainable CSP development. We extend the original DNMA method to the Z-number environment to handle the uncertain and unreliability information of decision-makers. To make trade-offs between normalized criteria values, we develop a Gini-coefficient based weighting method to replace the mean-square-based weighting method used in the original DNMA method to enhance the applicability and isotonicity of the DNMA method. A case study is conducted to demonstrate the effectiveness of the proposed method. Furthermore, comparative analysis and sensitivity analysis are implemented to test the stability and applicability of the proposed method.info:eu-repo/semantics/publishedVersio

    A MULTI-FUNCTIONAL PROVENANCE ARCHITECTURE: CHALLENGES AND SOLUTIONS

    Get PDF
    In service-oriented environments, services are put together in the form of a workflow with the aim of distributed problem solving. Capturing the execution details of the services' transformations is a significant advantage of using workflows. These execution details, referred to as provenance information, are usually traced automatically and stored in provenance stores. Provenance data contains the data recorded by a workflow engine during a workflow execution. It identifies what data is passed between services, which services are involved, and how results are eventually generated for particular sets of input values. Provenance information is of great importance and has found its way through areas in computer science such as: Bioinformatics, database, social, sensor networks, etc. Current exploitation and application of provenance data is very limited as provenance systems started being developed for specific applications. Thus, applying learning and knowledge discovery methods to provenance data can provide rich and useful information on workflows and services. Therefore, in this work, the challenges with workflows and services are studied to discover the possibilities and benefits of providing solutions by using provenance data. A multifunctional architecture is presented which addresses the workflow and service issues by exploiting provenance data. These challenges include workflow composition, abstract workflow selection, refinement, evaluation, and graph model extraction. The specific contribution of the proposed architecture is its novelty in providing a basis for taking advantage of the previous execution details of services and workflows along with artificial intelligence and knowledge management techniques to resolve the major challenges regarding workflows. The presented architecture is application-independent and could be deployed in any area. The requirements for such an architecture along with its building components are discussed. Furthermore, the responsibility of the components, related works and the implementation details of the architecture along with each component are presented

    Understanding and Managing Behavioural Risks -The Case of Food Risks Caused by Malpractice in Poultry Production

    Get PDF
    The probability that actors in economic relationships break rules increases with the profits they thus expect to earn. It decreases with the probability and level of short- and long-term losses resulting from disclosure. It also decreases with the level of social context factors and intrinsic values which shield actors from yielding to economic temptations. This paper assesses the relative merits of various scientific approaches concerned with risks in economic relationships and outlines their contribution to the study of opportunistic rule-breaking. Since the identification of (misdirected) economic incentives faced by firms and individuals represents the starting point for a systematic analysis of opportunism in any field, we also outline a microeconomic approach that systematically provides this crucial information. The approach is applied to the problem of food quality and safety threatened by opportunistic malpractice of food business operators. Its essentials are illustrated through a study which systematically searches for the temptations to break production-related rules in the poultry industries.asymmetric information, control theories, economic misconduct, game theory, moral hazard, principal-agent model, opportunism, protective factors, relational risks, Food Consumption/Nutrition/Food Safety, A13, K32, K42,
    • 

    corecore