Trust in E-Services
Latest Publications


TOTAL DOCUMENTS

12
(FIVE YEARS 0)

H-INDEX

3
(FIVE YEARS 0)

Published By IGI Global

9781599042077, 9781599042091

2011 ◽  
pp. 168-197
Author(s):  
Karen K. Fullam ◽  
K. Suzanne Barber

Information e-services are useful for exchanging information among many users, whether human or automated agent; however, e-service users are susceptible to risk of inaccurate information, since users have no traditional face-to-face interaction or past relational history with information providers. To encourage use of information e-services, individuals must have technology to assess information accuracy and information source trustworthiness. This research permits automated e-service users—here called agents—acting on behalf of humans, to employ policies, or heuristics, for predicting information accuracy when numerous pieces of information are received from multiple sources. These intuitive policies draw from human strategies for evaluating the trustworthiness of information to not only identify accurate information, but also distinguish untrustworthy information providers. These policies allow the agent to build a user’s confidence in the trust assessment technology by creating justifications for trust assessment decisions and identifying particular policies integral to a given assessment decision.


2011 ◽  
pp. 84-111 ◽  
Author(s):  
Jennifer Chandler ◽  
Khalil el-Khatib ◽  
Morad Benyoucef ◽  
Gregor Von Bochmann ◽  
Carlisle Adams

Online reputation systems have become important tools for supporting commercial as well as noncommercial online interactions. But as online users become more and more reliant on these systems, the question of whether the operators of online reputation systems may be legally liable for problems with these systems becomes both interesting and important. Indeed, lawsuits against the operators of online reputation systems have already emerged in the United States regarding errors in the information provided by such systems. In this chapter, we will take the example of eBay’s Feedback Forum to review the potential legal liabilities facing the operators of online reputation systems. In particular, the applicability of the Canadian law of negligent misrepresentation and of defamation will be covered. Similar issues may be expected to arise in the other common law jurisdictions


2011 ◽  
pp. 1-28 ◽  
Author(s):  
Tyrone Grandison

This chapter introduces the fundamental concepts of trust, with emphasis on their applicability to the e-services platform. This sets the tone for this book and creates a platform from which the topics can be explored more deeply in the other chapters. This chapter presents a description of e-services and trust environments, provides the prevailing perspectives on trust, and introduces a unifying definition that can be used for e-services. Furthermore, the indicators that influence a trust decision when e-service invocation is desired, is specified, and the current trust models are highlighted. These models may be leveraged when designing the architecture for an e-service solution. In addition to being a resource during e-service system design, this chapter focuses on making the reader cognizant of the broader technical and management-related issues surrounding trust in e-services, and providing a common platform for discussion.


2011 ◽  
pp. 140-167 ◽  
Author(s):  
Rolf Haenni ◽  
Jacek Jonczy ◽  
Reto Kohlas

This chapter describes the difficulty of managing authenticity and trust in large open networks. Participants of such networks are usually unknown to each other. Questioning somebody’s authenticity and trustworthiness is thus a natural reflex and an important security prerequisite. The resulting problem of properly managing authenticity and trust is an emerging research topic. The chapter proposes a common conceptual framework and compares it to several existing authenticity and trust models. The goal is to increase the awareness that authenticity and trust are not separable and to promote the corresponding two-layer requirement.


2011 ◽  
pp. 51-83 ◽  
Author(s):  
Paolo Massa

This chapter discusses the concept of trust and how trust is used and modeled in online systems currently available on the Web or on the Internet. It starts by describing the concept of information overload and introducing trust as a possible and powerful way to deal with it. It then provides a classification of the systems that currently use trust and, for each category, presents the most representative examples. In these systems, trust is considered as the judgment expressed by one user about another user, often directly and explicitly, sometimes indirectly through an evaluation of the artifacts produced by that user or his/her activity on the system. We hence use the term “trust” to indicate different types of social relationships between two users, such as friendship, appreciation, and interest. These trust relationships are used by the systems in order to infer some measure of importance about the different users and influence their visibility on the system. We conclude with an overview of the open and interesting challenges for online systems that use and model trust information.


2011 ◽  
pp. 235-258 ◽  
Author(s):  
Elizabeth Sillence ◽  
Pamela Briggs ◽  
Peter Harris ◽  
Lesley Fishwick

The number of people turning to the Internet to meet their various health needs is rising. As the prevalence of this form of e-health increases, so the issue of trust becomes ever more important. This chapter presents a brief overview of e-health and describes how and why people are using the Internet for health advice and information. In order to understand the trust processes behind this engagement, a staged model of trust is proposed. This model is explored through a series of in-depth qualitative studies and forms the basis for a set of design guidelines for developing trust practices in e-health.


2011 ◽  
pp. 198-216 ◽  
Author(s):  
Tyrone Grandison

After entering the realm of computing over a decade ago, the term trust management has evolved to encompass many concepts and mechanisms that bring it closer to its intuitive interpretation. This chapter will outline the evolution and present the catalyst(s) for each phase in its metamorphosis. In each stage, trust management tools were constructed to showcase the current understanding in the field. These tools will be discussed and their strengths, domains of application, and scope for improvement presented. The foundation of trust management technology can be found in security notions, for example credentials, in mathematical computation and in formal (and informal) reputation models. Each of these categories and their hybrids will be highlighted. This chapter should leave the reader with (1) a holistic view of the trust management problem, (2) a clear differentiation of trust management from other fields (and terms) in the computer security arena, and (3) knowledge of the appropriate domain of usage for each system.


2011 ◽  
pp. 293-322
Author(s):  
Jean-Marc Seigneur ◽  
Christian Damsgaard Jensen

This chapter introduces entification as a means of allowing the users of e-services to create and manage multiple pseudonyms in a decentralized way; thereby limiting the ability to link transactions and users, whilst mitigating attacks due to the ownership of multiple identities. The entification framework fills the gap between the identity and the computational trust/reputation layers. It is difficult to safely assess linked evidence about multiple virtual identities because there might be overcounting of overlapping trust pieces of evidence. The entification framework uses a new mechanism, called trust transfer, to mitigate this issue, and allows the users to trade privacy for trust. Such a framework is essential in a world where more and more e-services want to rely on user-centric identity management.


2011 ◽  
pp. 218-234
Author(s):  
George Yee

The growth of the Internet is increasing the deployment of e-commerce B2C services within such areas as e-retailing, e-learning, and e-health. However, a major impediment to the growth of e-commerce on the Internet is the lack of consumer trust in the provider of the e-service (Van Slyke, Belanger, Comunale, 2004). This chapter presents a literature survey of recent contributions to building trust in e-commerce, followed by a description of seven ways for the B2C Internet service provider to build trust in the use of its services among consumers.


2011 ◽  
pp. 29-50 ◽  
Author(s):  
Weiliang Zhao ◽  
Vijay Varadharajan ◽  
George Bryan

In this chapter, we provide a formal definition of trust relationship with a strict mathematical structure that can reflect many of the commonly used notions of trust. Based on this formal definition, we propose a unified taxonomy framework of trust. Under the taxonomy framework, we discuss classification of trust. In particular, we address the base level authentication trust at the lower layer and a hierarchy of trust relationships at a higher level. We provide a set of definitions, propositions, and operations based on the relations of trust relationships. Then we define and discuss properties of trust direction and trust symmetry. We define the trust scope label in order to describe the scope and diversity of trust relationship. All the definitions about the properties of trust become elements of the unified taxonomy framework of trust. Some example scenarios are provided to illustrate the concepts in the taxonomy framework. The taxonomy framework of trust will provide accurate terms and useful tools for enabling the analysis, design, and implementation of trust. The taxonomy framework of trust is first part of research for the overall methodology of trust relationships and trust management in distributed systems.


Sign in / Sign up

Export Citation Format

Share Document