:::

詳目顯示

回上一頁
題名:探索隨意群眾智慧之自主化信任模式研究
作者:黃元巨
作者(外文):Hwang,Yuan-Chu
校院名稱:國立政治大學
系所名稱:資訊管理研究所
指導教授:苑守慈
學位類別:博士
出版日期:2007
主題關鍵詞:隨意智能服務群眾智慧信任Ubiquitous e-ServiceCollective WisdomTrust
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:18
Ubiquitous e-service is one of the most recent links in the chain of evolution that
has characterized the different eras of the internetworking environment. In this
dissertation, the notion of ambient e-services is defined to identify a new scope of
mobile e-services in an ubiquitous environment, addressing dynamic collective efforts
between mobile users, dynamic interactions with ambient environments, the moment of
value, and low cost provision. We present an ambient e-services framework
characterizing three supporting stacks followed by several ambient e-service
applications. We propose an ambient e-service environment that explores the promise of
exploitation of the collective wisdom of proximal mobile users.
In order to leap the trust barrier for the user to embracing these ubiquitous
e-services, we propose an Autonomous Trust Model for exploring collective wisdom in
the ubiquitous environment (hereafter termed “U-ATM”) as an instance of ASEM.
ASEM (Ambient e-Service Embracing Model) addresses the core elements (of
relevance to the integrated concern of trust, reputation and privacy) required for
assuring such desired features as convenience, safety, fairness and collaboration for
mobile users when they engage with ambient e-services. The U-ATM highlights the
distributed peer-to-peer interactions under an ad-hoc network composition. It especially
accommodates the dynamic short-lived identity characteristics and lightweight
computational capacity of mobile devices. The U-ATM we have developed is based on
the ZigBee architecture as a collaborative application in the upper layer of the
ubiquitous environment. U-ATM design concepts are elaborated and evaluated. A
simulation is conducted. Simulation outcomes for trust decision quality enhancement
show significant improvement over traditional designs. U-ATM makes it possible for
users to collaborate with the nearby user groups for establishing a reliable and
trustworthy interaction environment. It also facilitates and empowers the potential
benefits of various ubiquitous e-service applications.
Aberer, K., & Despotovic, Z. (2001). Managing trust in a peer-2-peer information system. CIKM'01, 310-317.
Allen, T. J. (1977). Managing the Flow of Technology. Cambridge, MA: MIT Press.
Anderson, B. (1983). Imagined Communities. London: Verso.
Aristotle. (1934). The Nicomachean Ethics. H. Rackham, translator. Cambridge, MA: Harvard University Press.
Barber, B. (1983). The logic and limits of trustNJ: Rutgers University Press.
Bolton, G. E., Katok, E., & Ockenfels, A. (2004). Trust among internet traders: A behavioral economics approach. Analyse Und Kritik, 26, 185-202.
Buskens, V., & Raub, W. (2002). Embedded trust: Control and learning. Group Cohesion, Trust and Solidarity, 19, 167-202.
Castelfranchi, C., Falcone, R., & Pezzulo, G. (2003). Integrating trustfulness and decision using fuzzy cognitive maps. Trust Management 2003, LNCS 2692, , 195-210.
Chaum, D. (1989). Privacy protected payments: Unconditional payer and/or payee untraceability. Proceedings of Smart Card 2000, North Holland,
Chou, D. C., Yen, D. C., Lin, B., & Cheng, P. (1999). Cyberspace security management. Industrial Management & Data Systems, 99(8), 353-361.
Coleman, J. S. (1990). Foundations of social theoryCambridge, MA: The Belknap Press of Harvard University Press.
Dasgupta, P. (2000). Trust as a commodity. In Gambetta, D., Ed., Trust: Making and Breaking Cooperative Relations, Electronic Edition. Department of Sociology, University of Oxford. Http://www.Sociology.Ox.Ac.uk/papers/dasgupta49-72.Pdf,
Earle, T. C., & Cvetkovich, G. T. (1995). Social trust: Towards A cosmopolitan societyPraeger Publishers, Westport, CT.
Enzmann, M., & Schneider, M. (2005). Improving customer retention in E-commerce through a secure and privacy-enhanced loyalty system. Forthcoming: Information Systems Frontiers,
Enzmann, M., & Schneider, M. (2004). A privacy-friendly loyalty system for electronic marketplaces. Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE04), Taiwan.
Festinger, L., Schachter, S., & Back, S. (1950). Social Pressures in Informal Groups: A Study of Human Factors in Housing. Palo Alto, CA: Stanford University Press.
Friedman E. J. & Resnick P. (2001). The Social Cost of Cheap Pseudonyms. Journal of Economics & Management Strategy 10(2). 173 - 199.
George Pór, (1995). The Quest for Collective Intelligence. In Gozdz, Kazmierz (Eds.), Community Building: Renewing Spirit & Learning in Business. San Francisco: New Leaders Press.
Golbeck, J., Parsia, B., & Hendler, J. (2003). Trust networks on the semantic web. Proceedings of Cooperative Intelligent Agents 2003,
Govier, T. (1997). Social trust and human communities. McGill-Queen’s Univerisity Press.
Granovetter, M. (1973). The Strength of Weak Ties. American Journal of Sociology, 78, 1360-80.
Gupta, M., Judge, P., & Ammar, M. (2003). A reputation system for peer-to-peer networks. NOSSDAV'03, , 144-152.
Habermas, J. (1991). The structural transformation of the public sphere. Cambridge, MA: MIT Press.
Hertzum, M., Andersen, H., Andersen, V., & Hansen, C. (2002). Trust in information sources: Seeking information from people, documents, and virtual agents. Interacting with Computers, 14(5), 575-599.
Hevner, A., March, S., Park, J. & Ram, S. (2004). Design Science in Information Systems Research. MIS Quarterly 28(1): 75-105.
Hoy, Grubbs, M., & Phelps, J. (2003). Consumer privacy and security protection on church websites: Reasons for concern. Journal of Public Policy and Marketing, 22(1), 58-70.
Hwang, Y. C., & Yuan, S. T. (2007). A roadmap for ambient e-service: Applications and embracing model. International Journal of Electronic Business Research, forthcoming
Hwang, Y. C., & Yuan, S. T. (2005a). Ambient e-service embracing model. Proceedings of the Seventh IEEE International Conference on e-Commerce Technology, , 535-538.
Hwang, Y. C., & Yuan, S. T. (2005b). A roadmap to ambient e-service. Proceedings of the Second IEEE International Workshop on Mobile Commerce and Services, , 11-20.
Hwang, Y. C., & Yuan, S. T. (2004). Ambient e-service: Framework and applications. Proceedings of the 4th International Conference of Electronic Business, , 737-745.
Information Technology---Security Techniques---Evaluation Criteria for IT Security: Part 2: Security Functional Requirements. (1999).
Järvinen, P. (2000), "Research questions guiding selection of an appropriate research method", Proceedings of the 8th European Conference on Information Systems (ECIS 2000), Vienna.
Jasper, R., & Uschold, M. (1999). A framework for understanding and classifying ontology applications. Proceedings of the 12th Workshop on Knowledge Acquisition, Modeling and Management (KAW'99)
Kaliski, B.S. (2002) The MD2 Message-Digest Algorithm. RFC 1319, April 1992, Network Working Group, RSA Laboratories.
Kant, K., Iyer, R., & Tewari, V. (2002). A framework for classifying peer-to-peer technologies. [Electronic version]. 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2002., , 368-368.
Katz-Stone, A. (2001). Wireless revenue: Ads can work. Available Http://www.Wirelessauthority.Com.au/r/article/jsp/sid/445080,
Kelly, E. P., & Erickson, G. S. (2005). RFID tags: Commercial applications v.s. privacy rights. Industrial Management & Data Systems, 105(6), 703-713.
Kelly, E. P., & Erickson, G. S. (2004). Legal and privacy issues surrounding customer databases and e-merchant bankruptcies: Reflections on toymart.com. Industrial Management & Data Systems, 104(3), 209-217.
Kinateder, M., & Rothermel, K. (2003). Architecture and algorithms for a distributed reputation system. Trust Management 2003, LNCS 2692, , 1-16.
Lazarsfeld, P. and Merton, R. K. (1954). Friendship as a social Process: A Substantive and Methodological Analysis, Freedom and Control in Modern Society, M. Berger, T. Abel, and C.H. Page (editors) New York: Van Nostrand, 18-66.
Lewis, J. D., & Weigert, A. (1985). Trust as a social reality. Social Forces, 63, 967-985.
Lim, E., & Saiu, K. (2003). Advances in mobile commerce technologies. Idea group publishing.
Lin, K., Lu, H., & Yu, T. (2004). A distributed trust and reputation management framework for E-services. IEEE International Conference on Services Computing,
Lindwer, M., Marculescu, D., Basten, T., Zimmennann, R., Marculescu, R., & Jung, S., et al. (2003). Ambient intelligence visions and achievements: Linking abstract ideas to real-world concepts. Design, Automation and Test in Europe Conference and Exhibition, 2003, , 10-15.
March, S.T. & Smith, G.F. (1995). Design and natural science research on information technology. Decision Support Systems, 15. 251-266.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734.
McAllister, D. J. (1995). Affect- and cognition-based trust as foundations for interpe. Academy of Management Journal, 38(1), 24-59.
McPherson, M., L. Smith-Lovin and J. Cook. (2001). Birds of a feather: Homophily in Social Networks. Annual Review of Sociology. 27, 415-444.
Mui, L., Halberstadt, A., & Mohtashemi, M. (2003). Evaluating reputation in multi-agents systems. AAMAS2002 Ws Trust, Reputation..., LNAI 2631, , 123-137.
National Institute of Standards and Technology (NIST). (1993). FIPS Publication 180: Secure Hash Standard (SHS), May 11, 1993.
Nunamaker, J.F., Chen, M. & Purdin, T.D.M. (1991). Systems development in information systems research, Journal of Management Information Systems 7(3),. 89-106.
Odlyzko, A. (2003). Privacy, economics, and price discrimination on the internet.
Pfitzmann, A., & Hansen, M. (2004). Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Retrieved August 2005., 2005 from http://dud.inf.tu-dresden.de/Anon-Terminology
Plato. (1968: 837). Laws. Plato in twelve volumes, Vol. 11. Bury translator. Cambridge: Harvard U. Press.
Rempel, J. K., Holmes, J. G., & Zanna, M. P. (1985). Trust in close relationships. Journal of Personality and Social Psychology, 49, 95-112.
Resnick, P., Zeckhauser, R., Friedman, E., & Kuwabara, K. (2000). Reputation systems: Facilitating trust in internet interactions. Communications of the ACM, 43(12), 45-48.
Rivest, R. L. (1992a). The MD4 Message Digest Algorithm. RFC 1320, April 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc.
Rivest, R. L. (1992b). The MD5 Message Digest Algorithm. RFC 1321, April 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc.
Rohrmann, B. (1978). Empirische studien zur entwicklung von antwortskalen für die sozialwissenschaftliche forschung. Zeitschrift Für Sozialpsychologie, 9, 222-245.
Rotter, J. B. (1967). A new scale for the measurement of interpersonal trust. Journal of Personality, , 651-665.
Roussos, G., Peterson, D., & Patel, U. (2003). Mobile identity management: An enacted view. International Journal of E-Commerce, 8(1), 81-100.
Sabater, J., & Sierra, C. (2002). Reputation and social network analysis in multi-agent systems. AAMAS'02, , 475-482.
Schilit, B., Adams, N., & Want, R. (1994). Context-aware computing applications. 85-90.
Shand, B., Dimmonck, N., & Bacon, J. (2003). Trust for ubiquitous, transaparent collaboration. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications(PerCom'03),
Simon, H.A.(1996) The Sciences of the Artificial, 3rd Edition, MIT Press, Cambridge, MA.
Singh A, and Liu, L. (2003). TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. Proceedings of the Third International Conference on Peer-to-Peer Computing (P2P’03).
Singh, J., & Sirdeshmukh, D. (2000). Agency and trust mechanisms in consumer satisfaction and loyalty judgments. Academy of Marketing Science, 28(1), 150-167.
So, M., & Sculli, D. (2002). The role of trust, quality, value and risk in conducting e-business. Industrial Management & Data Systems, 102(9), 503-512.
Spiekermann, S. (2005). Perceived control: Scales for privacy in ubiquitous computing environments. Online Proceedings of the 10th International Conference on User Modeling, Edinburgh, Schottland, Juli 2005.,
Sweeney, M., Maguire M. & Schackel, B. (1993). Evaluating user-computer interaction: a framework. International. Journal.of Man-Machine Studies. 38. 689-711.
Twigg, A. (2003). A subjective approach to routing in P2P and ad hoc networks. Trust Management 2003, LNCS 2692, , 225-238.
Varshney, U., & Vetter, R. (2002). Mobile commerce: Framework, applications and networking support. [Electronic version]. Mobile Networks and Applications, 7, 185-198.
Watson, R. T., Pitt, L. F., Berthon, P., & Zinkhan, G. M. (2002). U-commerce: Extending the universe of marketing. [Electronic version]. Journal of the Academy of Marketing Science, 30(4), 329-343.
Watts D., Strogatz S., (1998), Collective Dynamics of Small-World Networks, Letters to Nature, 393. , 440-442.
Wilhelm, U. G., Staamann, S. M., & Buttyan, L. (2000). A pesimistic approach to trust in mobile agent platforms. IEEE Internet Computing, , 40-48.
Xiong, L., & Liu, L. (2004). Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities. , 16(7) 843-857.
Yu, B., & Singh, M. (2000). A social mechanism of reputation management in electronic communities. 154-165.
ZigBee Org. (2005) ZigBee Specification Ver. 1.0, http://www.zigbee.org
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE