skip to main content
10.1145/1282100.1282179acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicecConference Proceedingsconference-collections
Article

Modeling trust in e-commerce: an approach based on user requirements

Published:19 August 2007Publication History

ABSTRACT

E-commerce is presently operating under its expected capacity, mainly because traders find it very difficult to trust one another online for trading decisions. It is therefore very important to develop an effective trust management system that assists e-commerce participants to make good trust decisions. This paper describes an approach based on users. requirements towards such a system. The benefits of this approach are threefold: First, it gives a better understanding of the components that can be used in a trust management system. Secondly, it illustrates that the components contributing to the trust making process can be different from one environment to another. Thirdly, it shows that the way one person trusts can be different from others. This approach, rather than using the same static attributes to calculate trust for everyone, uses specific attributes based on each truster's goals. Moreover, by using GRL and UCM as notations for trust modeling, this approach provides a visual representation of trust, its components and the trusting process.

References

  1. Daniel Amyot. Introduction to the User Requirements Notation: Learning by Example. In Computer Networks, 42(3), 285--301, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Sulin Ba and Paul A. Pavlon. Evidence of the Effective Trust Building Technology in Electronic Markets, Price Premiums and Buyer Behavior. In Electronic Economy Research Program, Marshall School of Business, MIS Quarterly, 26(3): 243--268, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Kari Chopra and William A. Wallace. Trust in Electronic Environments. In Proceedings of the 36th Annual Hawaii International Conference, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Deloitte and Touche. E-Commerce Security- A Global Status Report. In Information Systems Audit and Control Association, page 52, 2000.Google ScholarGoogle Scholar
  5. Yenta Lenny Foner. A Multi Agent Referral Based Matchmaking System. In Proceedings of First International Conference on Autonomous Agents, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. GRL: http://www.cs.toronto.edu/km/GRL/, 2006.Google ScholarGoogle Scholar
  7. Rohit Khare and Adam Rifkin. Weaving a Web of Trust, World Wide Web. In World Wide Web Journal, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kathryn M. Kimery and Mary McCord. Third-Party Assurances the Road to Trust. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Wei-chang Kong and Yu-Ting Caisy Hung. Modeling Initial and Repeat Online Trust in B2C E-commerce. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. HyoungYong Lee, Hyunchul Ahn, and Ingoo Han. Analysis of Trust in the E-Commerce Adoption. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), Track 6, p. 113c, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hui Lei and Gholamali C. Shoja. A Distributed Trust Model for E-Commerce Applications. In Proceedings of IEEE Conference on E-Technology, E-Commerce and E-Service, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Stephen Paul Marsh. Formalizing Trust as a Computational Concept. PhD Thesis, Department of Mathematics and Computer Science, University of Stirling, 1994.Google ScholarGoogle Scholar
  13. E. Michael Maximilien and Munindar P. Singh. Agent Based Trust Model. In Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), Utrecht, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Roger C. Mayer and James H. Davis. An Integrative Mode of Organizational Trust. In Academy of Management Review, Vol 20, pages 709--734, 1995.Google ScholarGoogle Scholar
  15. Samia Nefti, Farid Meziane, and Khairudin Kasiran. A Fuzzy Trust Model for E-Commerce. In Proceedings Seventh IEEE International Conference on E-Commerce Technology, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. B. Rotter. Generalized Expectancies for Interpersonal Trust. In American Psychologist, Vol. 26, pages 443--452, 1971.Google ScholarGoogle ScholarCross RefCross Ref
  17. Jordi Sabater and Carles Sierra. Regret: A Reputation Model for Gregarious Societies. In Proceedings of International Conference on Autonomous Agents, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. F. B. Schneider. Trust in Cyberspace. In National Academy Press, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Supriya Singh and Claudia Slegers. Trust and Electronic Money. CIRCIT Ltd. 1997, Policy research paper, No 42, 1997.Google ScholarGoogle Scholar
  20. Yan Lindsay Sun, Wei Yu, Zhu Han, and K. J. Ray Liu. Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. In IEEE JSAC Special Issue on Security in Wireless Ad Hoc Networks, Vol. 24, No 2, pages 305--317, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Girish Suryanarayana, Justin R. Erenkrantz, and Richard N. Taylor. An Architectural Approach for Decentralized Trust Management. In Internet Computing, IEEE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. George Theodorakopoulos and John S. Baras. On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks. In IEEE Journal on Selected Areas in Communications (JSAC), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Weis and D. Amyot. Designing and Evolving Business Models with URN. In Proceedings of the Montreal Conference on E-Technologies (MCETECH), pages 149--162, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Bin Yu and Munindar P. Singh. A Social Mechanism of Reputation Management in Electronic Communities. In Proceedings of the Fourth International Workshop on Cooperative Information Agents, pages 154--165, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Bin Yu, Munindar P. Singh, and Katia Sycara. Developing Trust in Large-Scale Peer-to-Peer Systems. In Proceedings of First IEEE Symposium on Multi-Agent Security and Survivability (MASS), pages 1--10, 2004.Google ScholarGoogle Scholar
  26. Giorgos Zacharia, Alexandros Moukas, and Pattie Maes. Collaborative Reputation Mechanisms in Electronic Marketplaces. In Proceedings of HICSS, Maui, Hawaii, USA, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Chung, L., Nixon, B. A, Yu, E., and Mylopoulos, J: Non-Functional Requirements in Software Engineering Kluwer Academic Publishers, Dordrecht, USA, 2000.Google ScholarGoogle Scholar
  28. Yu, E.: Modeling Strategic Relationships for Process Reengineering. PhD thesis, Department of Computer Science, University of Toronto, Canada, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Eric Yu and L. Liu. Modeling Trust in the i* Strategic Actors Framework. 3rd Workshop on Deception, Fraud, and Trust in Agent Societies, Barcelona, Catalonia, Spain, June 3--7, 2000.Google ScholarGoogle Scholar
  30. Ruggero Morselli, Jonathan Katz, Bobby Bhattacharjee, A Game-Theoretic Framework for Analyzing Trust-Inference Protocols, Second workshop on the economics of the peer-to-peer systems, 2004.Google ScholarGoogle Scholar
  31. Yan Lindsay Sun, Wei Yuy, Zhu Hany, and K. J. Ray Liuy, Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, Feb. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Modeling trust in e-commerce: an approach based on user requirements

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICEC '07: Proceedings of the ninth international conference on Electronic commerce
        August 2007
        482 pages
        ISBN:9781595937001
        DOI:10.1145/1282100

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 19 August 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate150of244submissions,61%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader