Publications-Theses

題名 探索隨意群眾智慧之自主化信任模式研究
U-ATM: An Autonomous Trust Model for Exploring Ubiquitous Collective Wisdom
作者 黃元巨
Hwang,Yuan-Chu
貢獻者 苑守慈
Yuan,Soe-Tsyr
黃元巨
Hwang,Yuan-Chu
關鍵詞 隨意智能服務
群眾智慧
信任
Ubiquitous e-Service
Collective Wisdom
Trust
日期 2006
上傳時間 18-Sep-2009 20:15:33 (UTC+8)
摘要 Ubiquitous e-service is one of the most recent links in the chain of evolution that
has characterized the different eras of the internetworking environment. In this
dissertation, the notion of ambient e-services is defined to identify a new scope of
mobile e-services in an ubiquitous environment, addressing dynamic collective efforts
between mobile users, dynamic interactions with ambient environments, the moment of
value, and low cost provision. We present an ambient e-services framework
characterizing three supporting stacks followed by several ambient e-service
applications. We propose an ambient e-service environment that explores the promise of
exploitation of the collective wisdom of proximal mobile users.
In order to leap the trust barrier for the user to embracing these ubiquitous
e-services, we propose an Autonomous Trust Model for exploring collective wisdom in
the ubiquitous environment (hereafter termed “U-ATM”) as an instance of ASEM.
ASEM (Ambient e-Service Embracing Model) addresses the core elements (of
relevance to the integrated concern of trust, reputation and privacy) required for
assuring such desired features as convenience, safety, fairness and collaboration for
mobile users when they engage with ambient e-services. The U-ATM highlights the
distributed peer-to-peer interactions under an ad-hoc network composition. It especially
accommodates the dynamic short-lived identity characteristics and lightweight
computational capacity of mobile devices. The U-ATM we have developed is based on
the ZigBee architecture as a collaborative application in the upper layer of the
ubiquitous environment. U-ATM design concepts are elaborated and evaluated. A
simulation is conducted. Simulation outcomes for trust decision quality enhancement
show significant improvement over traditional designs. U-ATM makes it possible for
users to collaborate with the nearby user groups for establishing a reliable and
trustworthy interaction environment. It also facilitates and empowers the potential
benefits of various ubiquitous e-service applications.
參考文獻 Aberer, K., & Despotovic, Z. (2001). Managing trust in a peer-2-peer information system. CIKM`01, 310-317.
Allen, T. J. (1977). Managing the Flow of Technology. Cambridge, MA: MIT Press.
Anderson, B. (1983). Imagined Communities. London: Verso.
Aristotle. (1934). The Nicomachean Ethics. H. Rackham, translator. Cambridge, MA: Harvard University Press.
Barber, B. (1983). The logic and limits of trustNJ: Rutgers University Press.
Bolton, G. E., Katok, E., & Ockenfels, A. (2004). Trust among internet traders: A behavioral economics approach. Analyse Und Kritik, 26, 185-202.
Buskens, V., & Raub, W. (2002). Embedded trust: Control and learning. Group Cohesion, Trust and Solidarity, 19, 167-202.
Castelfranchi, C., Falcone, R., & Pezzulo, G. (2003). Integrating trustfulness and decision using fuzzy cognitive maps. Trust Management 2003, LNCS 2692, , 195-210.
Chaum, D. (1989). Privacy protected payments: Unconditional payer and/or payee untraceability. Proceedings of Smart Card 2000, North Holland,
Chou, D. C., Yen, D. C., Lin, B., & Cheng, P. (1999). Cyberspace security management. Industrial Management & Data Systems, 99(8), 353-361.
Coleman, J. S. (1990). Foundations of social theoryCambridge, MA: The Belknap Press of Harvard University Press.
Dasgupta, P. (2000). Trust as a commodity. In Gambetta, D., Ed., Trust: Making and Breaking Cooperative Relations, Electronic Edition. Department of Sociology, University of Oxford. Http://www.Sociology.Ox.Ac.uk/papers/dasgupta49-72.Pdf,
Earle, T. C., & Cvetkovich, G. T. (1995). Social trust: Towards A cosmopolitan societyPraeger Publishers, Westport, CT.
Enzmann, M., & Schneider, M. (2005). Improving customer retention in E-commerce through a secure and privacy-enhanced loyalty system. Forthcoming: Information Systems Frontiers,
Enzmann, M., & Schneider, M. (2004). A privacy-friendly loyalty system for electronic marketplaces. Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE04), Taiwan.
Festinger, L., Schachter, S., & Back, S. (1950). Social Pressures in Informal Groups: A Study of Human Factors in Housing. Palo Alto, CA: Stanford University Press.
Friedman E. J. & Resnick P. (2001). The Social Cost of Cheap Pseudonyms. Journal of Economics & Management Strategy 10(2). 173 - 199.
George Pór, (1995). The Quest for Collective Intelligence. In Gozdz, Kazmierz (Eds.), Community Building: Renewing Spirit & Learning in Business. San Francisco: New Leaders Press.
Golbeck, J., Parsia, B., & Hendler, J. (2003). Trust networks on the semantic web. Proceedings of Cooperative Intelligent Agents 2003,
Govier, T. (1997). Social trust and human communities. McGill-Queen’s Univerisity Press.
Granovetter, M. (1973). The Strength of Weak Ties. American Journal of Sociology, 78, 1360-80.
Gupta, M., Judge, P., & Ammar, M. (2003). A reputation system for peer-to-peer networks. NOSSDAV`03, , 144-152.
Habermas, J. (1991). The structural transformation of the public sphere. Cambridge, MA: MIT Press.
Hertzum, M., Andersen, H., Andersen, V., & Hansen, C. (2002). Trust in information sources: Seeking information from people, documents, and virtual agents. Interacting with Computers, 14(5), 575-599.
Hevner, A., March, S., Park, J. & Ram, S. (2004). Design Science in Information Systems Research. MIS Quarterly 28(1): 75-105.
Hoy, Grubbs, M., & Phelps, J. (2003). Consumer privacy and security protection on church websites: Reasons for concern. Journal of Public Policy and Marketing, 22(1), 58-70.
Hwang, Y. C., & Yuan, S. T. (2007). A roadmap for ambient e-service: Applications and embracing model. International Journal of Electronic Business Research, forthcoming
Hwang, Y. C., & Yuan, S. T. (2005a). Ambient e-service embracing model. Proceedings of the Seventh IEEE International Conference on e-Commerce Technology, , 535-538.
Hwang, Y. C., & Yuan, S. T. (2005b). A roadmap to ambient e-service. Proceedings of the Second IEEE International Workshop on Mobile Commerce and Services, , 11-20.
Hwang, Y. C., & Yuan, S. T. (2004). Ambient e-service: Framework and applications. Proceedings of the 4th International Conference of Electronic Business, , 737-745.
Information Technology---Security Techniques---Evaluation Criteria for IT Security: Part 2: Security Functional Requirements. (1999).
Järvinen, P. (2000), "Research questions guiding selection of an appropriate research method", Proceedings of the 8th European Conference on Information Systems (ECIS 2000), Vienna.
Jasper, R., & Uschold, M. (1999). A framework for understanding and classifying ontology applications. Proceedings of the 12th Workshop on Knowledge Acquisition, Modeling and Management (KAW`99)
Kaliski, B.S. (2002) The MD2 Message-Digest Algorithm. RFC 1319, April 1992, Network Working Group, RSA Laboratories.
Kant, K., Iyer, R., & Tewari, V. (2002). A framework for classifying peer-to-peer technologies. [Electronic version]. 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2002., , 368-368.
Katz-Stone, A. (2001). Wireless revenue: Ads can work. Available Http://www.Wirelessauthority.Com.au/r/article/jsp/sid/445080,
Kelly, E. P., & Erickson, G. S. (2005). RFID tags: Commercial applications v.s. privacy rights. Industrial Management & Data Systems, 105(6), 703-713.
Kelly, E. P., & Erickson, G. S. (2004). Legal and privacy issues surrounding customer databases and e-merchant bankruptcies: Reflections on toymart.com. Industrial Management & Data Systems, 104(3), 209-217.
Kinateder, M., & Rothermel, K. (2003). Architecture and algorithms for a distributed reputation system. Trust Management 2003, LNCS 2692, , 1-16.
Lazarsfeld, P. and Merton, R. K. (1954). Friendship as a social Process: A Substantive and Methodological Analysis, Freedom and Control in Modern Society, M. Berger, T. Abel, and C.H. Page (editors) New York: Van Nostrand, 18-66.
Lewis, J. D., & Weigert, A. (1985). Trust as a social reality. Social Forces, 63, 967-985.
Lim, E., & Saiu, K. (2003). Advances in mobile commerce technologies. Idea group publishing.
Lin, K., Lu, H., & Yu, T. (2004). A distributed trust and reputation management framework for E-services. IEEE International Conference on Services Computing,
Lindwer, M., Marculescu, D., Basten, T., Zimmennann, R., Marculescu, R., & Jung, S., et al. (2003). Ambient intelligence visions and achievements: Linking abstract ideas to real-world concepts. Design, Automation and Test in Europe Conference and Exhibition, 2003, , 10-15.
March, S.T. & Smith, G.F. (1995). Design and natural science research on information technology. Decision Support Systems, 15. 251-266.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734.
McAllister, D. J. (1995). Affect- and cognition-based trust as foundations for interpe. Academy of Management Journal, 38(1), 24-59.
McPherson, M., L. Smith-Lovin and J. Cook. (2001). Birds of a feather: Homophily in Social Networks. Annual Review of Sociology. 27, 415-444.
Mui, L., Halberstadt, A., & Mohtashemi, M. (2003). Evaluating reputation in multi-agents systems. AAMAS2002 Ws Trust, Reputation..., LNAI 2631, , 123-137.
National Institute of Standards and Technology (NIST). (1993). FIPS Publication 180: Secure Hash Standard (SHS), May 11, 1993.
Nunamaker, J.F., Chen, M. & Purdin, T.D.M. (1991). Systems development in information systems research, Journal of Management Information Systems 7(3),. 89-106.
Odlyzko, A. (2003). Privacy, economics, and price discrimination on the internet.
Pfitzmann, A., & Hansen, M. (2004). Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Retrieved August 2005., 2005 from http://dud.inf.tu-dresden.de/Anon-Terminology
Plato. (1968: 837). Laws. Plato in twelve volumes, Vol. 11. Bury translator. Cambridge: Harvard U. Press.
Rempel, J. K., Holmes, J. G., & Zanna, M. P. (1985). Trust in close relationships. Journal of Personality and Social Psychology, 49, 95-112.
Resnick, P., Zeckhauser, R., Friedman, E., & Kuwabara, K. (2000). Reputation systems: Facilitating trust in internet interactions. Communications of the ACM, 43(12), 45-48.
Rivest, R. L. (1992a). The MD4 Message Digest Algorithm. RFC 1320, April 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc.
Rivest, R. L. (1992b). The MD5 Message Digest Algorithm. RFC 1321, April 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc.
Rohrmann, B. (1978). Empirische studien zur entwicklung von antwortskalen für die sozialwissenschaftliche forschung. Zeitschrift Für Sozialpsychologie, 9, 222-245.
Rotter, J. B. (1967). A new scale for the measurement of interpersonal trust. Journal of Personality, , 651-665.
Roussos, G., Peterson, D., & Patel, U. (2003). Mobile identity management: An enacted view. International Journal of E-Commerce, 8(1), 81-100.
Sabater, J., & Sierra, C. (2002). Reputation and social network analysis in multi-agent systems. AAMAS`02, , 475-482.
Schilit, B., Adams, N., & Want, R. (1994). Context-aware computing applications. 85-90.
Shand, B., Dimmonck, N., & Bacon, J. (2003). Trust for ubiquitous, transaparent collaboration. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications(PerCom`03),
Simon, H.A.(1996) The Sciences of the Artificial, 3rd Edition, MIT Press, Cambridge, MA.
Singh A, and Liu, L. (2003). TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. Proceedings of the Third International Conference on Peer-to-Peer Computing (P2P’03).
Singh, J., & Sirdeshmukh, D. (2000). Agency and trust mechanisms in consumer satisfaction and loyalty judgments. Academy of Marketing Science, 28(1), 150-167.
So, M., & Sculli, D. (2002). The role of trust, quality, value and risk in conducting e-business. Industrial Management & Data Systems, 102(9), 503-512.
Spiekermann, S. (2005). Perceived control: Scales for privacy in ubiquitous computing environments. Online Proceedings of the 10th International Conference on User Modeling, Edinburgh, Schottland, Juli 2005.,
Sweeney, M., Maguire M. & Schackel, B. (1993). Evaluating user-computer interaction: a framework. International. Journal.of Man-Machine Studies. 38. 689-711.
Twigg, A. (2003). A subjective approach to routing in P2P and ad hoc networks. Trust Management 2003, LNCS 2692, , 225-238.
Varshney, U., & Vetter, R. (2002). Mobile commerce: Framework, applications and networking support. [Electronic version]. Mobile Networks and Applications, 7, 185-198.
Watson, R. T., Pitt, L. F., Berthon, P., & Zinkhan, G. M. (2002). U-commerce: Extending the universe of marketing. [Electronic version]. Journal of the Academy of Marketing Science, 30(4), 329-343.
Watts D., Strogatz S., (1998), Collective Dynamics of Small-World Networks, Letters to Nature, 393. , 440-442.
Wilhelm, U. G., Staamann, S. M., & Buttyan, L. (2000). A pesimistic approach to trust in mobile agent platforms. IEEE Internet Computing, , 40-48.
Xiong, L., & Liu, L. (2004). Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities. , 16(7) 843-857.
Yu, B., & Singh, M. (2000). A social mechanism of reputation management in electronic communities. 154-165.
ZigBee Org. (2005) ZigBee Specification Ver. 1.0, http://www.zigbee.org
描述 博士
國立政治大學
資訊管理研究所
90356508
95
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0903565081
資料類型 thesis
dc.contributor.advisor 苑守慈zh_TW
dc.contributor.advisor Yuan,Soe-Tsyren_US
dc.contributor.author (Authors) 黃元巨zh_TW
dc.contributor.author (Authors) Hwang,Yuan-Chuen_US
dc.creator (作者) 黃元巨zh_TW
dc.creator (作者) Hwang,Yuan-Chuen_US
dc.date (日期) 2006en_US
dc.date.accessioned 18-Sep-2009 20:15:33 (UTC+8)-
dc.date.available 18-Sep-2009 20:15:33 (UTC+8)-
dc.date.issued (上傳時間) 18-Sep-2009 20:15:33 (UTC+8)-
dc.identifier (Other Identifiers) G0903565081en_US
dc.identifier.uri (URI) https://nccur.lib.nccu.edu.tw/handle/140.119/36952-
dc.description (描述) 博士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊管理研究所zh_TW
dc.description (描述) 90356508zh_TW
dc.description (描述) 95zh_TW
dc.description.abstract (摘要) Ubiquitous e-service is one of the most recent links in the chain of evolution that
has characterized the different eras of the internetworking environment. In this
dissertation, the notion of ambient e-services is defined to identify a new scope of
mobile e-services in an ubiquitous environment, addressing dynamic collective efforts
between mobile users, dynamic interactions with ambient environments, the moment of
value, and low cost provision. We present an ambient e-services framework
characterizing three supporting stacks followed by several ambient e-service
applications. We propose an ambient e-service environment that explores the promise of
exploitation of the collective wisdom of proximal mobile users.
In order to leap the trust barrier for the user to embracing these ubiquitous
e-services, we propose an Autonomous Trust Model for exploring collective wisdom in
the ubiquitous environment (hereafter termed “U-ATM”) as an instance of ASEM.
ASEM (Ambient e-Service Embracing Model) addresses the core elements (of
relevance to the integrated concern of trust, reputation and privacy) required for
assuring such desired features as convenience, safety, fairness and collaboration for
mobile users when they engage with ambient e-services. The U-ATM highlights the
distributed peer-to-peer interactions under an ad-hoc network composition. It especially
accommodates the dynamic short-lived identity characteristics and lightweight
computational capacity of mobile devices. The U-ATM we have developed is based on
the ZigBee architecture as a collaborative application in the upper layer of the
ubiquitous environment. U-ATM design concepts are elaborated and evaluated. A
simulation is conducted. Simulation outcomes for trust decision quality enhancement
show significant improvement over traditional designs. U-ATM makes it possible for
users to collaborate with the nearby user groups for establishing a reliable and
trustworthy interaction environment. It also facilitates and empowers the potential
benefits of various ubiquitous e-service applications.
zh_TW
dc.description.tableofcontents CHAPTER 1 INTRODUCTION 1
1.1 UBIQUITOUS E-SERVICE TODAY 1
1.1.1 Two Different Design Paradigms (Client/Server vs. P2P) 2
1.1.2 From P2P to Ambient e-service 2
1.1.3 Beyond Sensor Network: The Power of Social Context 3
1.2 TRUST IN UBIQUITOUS ENVIRONMENT 4
1.3 DISSERTATION ROADMAP 6
CHAPTER 2 AMBIENT E-SERVICE 9
2.1 THE AMBIENT E-SERVICE FRAMEWORK 9
2.1.1 Value Stack 10
2.1.2 Environment Stack 11
2.1.3 Technology Stack 12
2.2 AMBIENT E-SERVICE APPLICATIONS 14
2.2.1 Ambient shopping mall scenario 16
2.2.2 Information Distribution Cooperation Scenario 18
2.2.3 Ambient Location Information Acquisition Scenario 20
2.2.4 Cooperative Peer Group Scenario 21
2.2.5 Conceptual Scenario Infrastructure 22
2.3 FEATURES OF AMBIENT E-SERVICE 23
CHAPTER 3 STATE OF THE ART & ASEM 25
3.1 CHALLENGES 25
3.1.1 Issues for Ambient e-Service 25
3.1.2 Core Issues for Embracing Ambient e-Service 27
3.1.3 Relationships between trust, reputation and privacy 28
3.1.4 Current Status of the Core issue of Trust 29
3.2 CURRENT RESEARCH IN AMBIENT E-SERVICE IMPLEMENTATION 31
3.2.1 Dynamic identity management for ambient e-service 32
3.2.2 Ambient data management for ambient e-service 32
3.3 AMBIENT E-SERVICE EMBRACING MODEL (ASEM) 35
3.3.1 ASEM Framework Design 35
3.3.2 ASEM Measurement Design 37
3.4 ROADMAP FOR AMBIENT E-SERVICE 41
3.4.1 Application service domain 41
3.4.2 Platform design domain 43
CHAPTER 4 PROBLEM STATEMENT 45
4.1 CONSTRAINTS OF UBIQUITOUS ENVIRONMENT 45
4.1.1 New challenges due to the Ubiquitous Environment 45
4.1.2 Basic Ideas 47
4.2 RESEARCH APPROACH 50
4.3 VALUES OF THE ASEM 52
CHAPTER 5 AN AUTONOMOUS TRUST MODEL 57
5.1 U-ATM: AN INSTANCE OF ASEM 57
5.2 U-ATM CORE ELEMENTS 57
5.2.1 U-ATM Privacy Design 58
5.2.2 U-ATM Reputation Management 59
5.2.3 U-ATM Trust Management 59
5.3 U-ATM PLATFORM INFRASTRUCTURE 60
5.4 ZIGBEE BASED U-ATM PLATFORM 64
5.4.1 ZigBee Introduction 64
5.4.2 Why ZigBee 66
CHAPTER 6 PRIVACY DESIGN IN THE U-ATM 73
6.1 CASE SCENARIO 73
6.2 ISSUES 74
6.3 THE U-ATM DESIGN 75
6.3.1 Unlinkability 76
6.3.2 Anonymizer 82
6.3.3 Confidential reputation design 87
6.4 JUSTIFICATION (QUESTIONNAIRE ON PERSONAL PRIVACY AWARENESS) 89
CHAPTER 7 REPUTATION MANAGEMENT IN THE U-ATM 95
7.1 CASE SCENARIO 95
7.2 ISSUES 99
7.3 THE U-ATM DESIGN 100
7.3.1 General reputation issues 100
7.3.2 Environment issues for ambient e-service 103
7.3.3 U-ATM Reputation Management Design 104
7.4 ALTERNATIVES 107
7.4.1 The Public Key Infrastructure. 107
7.4.2 Computational Efficiency on Reputation design:Counter-Based vs. Token Based 108
7.4.3 General Message Encryption: to be or not to be? 109
7.4.4 Contribution and Significance 111
7.5 JUSTIFICATION 113
CHAPTER 8 TRUST MANAGEMENT IN THE U-ATM 115
8.1 CASE SCENARIO 115
8.2 ISSUES 117
8.3 U-ATM DESIGN CONCEPT FOR TRUST MANAGEMENT 118
8.3.1 Exploring alternative data source for trust estimation: the Interaction-based experience 119
8.3.2 Determining acceptable targets for information acquisition 121
8.3.3 Data coordination for heterogeneous information sources 122
8.4 THE U-ATM TRUST MANAGEMENT DESIGN 125
8.4.1 Local Trust Evaluation 125
8.4.2 Interpersonal experience aggregation for heterogeneous data sources 130
8.5 JUSTIFICATION 132
8.5.1 Simulation 1: Effect of Collective Wisdom 134
8.5.2 Simulation 2: Dynamic Environmental Construct 138
8.5.3 Simulation 3: Interaction Cost vs. Decision Quality 143
CHAPTER 9 THEORETICAL SUPPORT OF PROXIMITY VALUE 147
9.1 CHANGES OF PROXIMITY IN THE U-COMMERCE ERA 147
9.2 SIGNIFICANCE OF PROXIMITY E-SERVICE 149
9.3 JUSTIFICATION OF THEORETICAL SUPPORT 150
9.4 CONFERENCE PROXIMITY E-SERVICE: A CASE SCENARIO 154
CHAPTER 10 CONCLUSIONS 159
10.1 VISION OF U-ATM 159
10.2 COMPARISON TO RELATED WORKS 161
10.3 CONCLUSIONS 163
REFERENCES 167
APPENDIX 173
A. QUESTIONNAIRE FOR USER PERCEIVED PRIVACY CONTROL (U-ATM ITRUST MODE) 173
B. QUESTIONNAIRE FOR USER PERCEIVED PRIVACY CONTROL (PASSWORD MODE) 174
C. SIMULATION EXPERIMENT DESIGN 175
C1. Experiment Settings 175
C2. Experiment Procedures 176
zh_TW
dc.format.extent 332600 bytes-
dc.format.extent 16300 bytes-
dc.format.extent 61359 bytes-
dc.format.extent 213854 bytes-
dc.format.extent 821559 bytes-
dc.format.extent 405222 bytes-
dc.format.extent 435484 bytes-
dc.format.extent 438447 bytes-
dc.format.extent 548698 bytes-
dc.format.extent 284535 bytes-
dc.format.extent 561601 bytes-
dc.format.extent 374464 bytes-
dc.format.extent 192211 bytes-
dc.format.extent 76744 bytes-
dc.format.extent 224477 bytes-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0903565081en_US
dc.subject (關鍵詞) 隨意智能服務zh_TW
dc.subject (關鍵詞) 群眾智慧zh_TW
dc.subject (關鍵詞) 信任zh_TW
dc.subject (關鍵詞) Ubiquitous e-Serviceen_US
dc.subject (關鍵詞) Collective Wisdomen_US
dc.subject (關鍵詞) Trusten_US
dc.title (題名) 探索隨意群眾智慧之自主化信任模式研究zh_TW
dc.title (題名) U-ATM: An Autonomous Trust Model for Exploring Ubiquitous Collective Wisdomen_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) Aberer, K., & Despotovic, Z. (2001). Managing trust in a peer-2-peer information system. CIKM`01, 310-317.zh_TW
dc.relation.reference (參考文獻) Allen, T. J. (1977). Managing the Flow of Technology. Cambridge, MA: MIT Press.zh_TW
dc.relation.reference (參考文獻) Anderson, B. (1983). Imagined Communities. London: Verso.zh_TW
dc.relation.reference (參考文獻) Aristotle. (1934). The Nicomachean Ethics. H. Rackham, translator. Cambridge, MA: Harvard University Press.zh_TW
dc.relation.reference (參考文獻) Barber, B. (1983). The logic and limits of trustNJ: Rutgers University Press.zh_TW
dc.relation.reference (參考文獻) Bolton, G. E., Katok, E., & Ockenfels, A. (2004). Trust among internet traders: A behavioral economics approach. Analyse Und Kritik, 26, 185-202.zh_TW
dc.relation.reference (參考文獻) Buskens, V., & Raub, W. (2002). Embedded trust: Control and learning. Group Cohesion, Trust and Solidarity, 19, 167-202.zh_TW
dc.relation.reference (參考文獻) Castelfranchi, C., Falcone, R., & Pezzulo, G. (2003). Integrating trustfulness and decision using fuzzy cognitive maps. Trust Management 2003, LNCS 2692, , 195-210.zh_TW
dc.relation.reference (參考文獻) Chaum, D. (1989). Privacy protected payments: Unconditional payer and/or payee untraceability. Proceedings of Smart Card 2000, North Holland,zh_TW
dc.relation.reference (參考文獻) Chou, D. C., Yen, D. C., Lin, B., & Cheng, P. (1999). Cyberspace security management. Industrial Management & Data Systems, 99(8), 353-361.zh_TW
dc.relation.reference (參考文獻) Coleman, J. S. (1990). Foundations of social theoryCambridge, MA: The Belknap Press of Harvard University Press.zh_TW
dc.relation.reference (參考文獻) Dasgupta, P. (2000). Trust as a commodity. In Gambetta, D., Ed., Trust: Making and Breaking Cooperative Relations, Electronic Edition. Department of Sociology, University of Oxford. Http://www.Sociology.Ox.Ac.uk/papers/dasgupta49-72.Pdf,zh_TW
dc.relation.reference (參考文獻) Earle, T. C., & Cvetkovich, G. T. (1995). Social trust: Towards A cosmopolitan societyPraeger Publishers, Westport, CT.zh_TW
dc.relation.reference (參考文獻) Enzmann, M., & Schneider, M. (2005). Improving customer retention in E-commerce through a secure and privacy-enhanced loyalty system. Forthcoming: Information Systems Frontiers,zh_TW
dc.relation.reference (參考文獻) Enzmann, M., & Schneider, M. (2004). A privacy-friendly loyalty system for electronic marketplaces. Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE04), Taiwan.zh_TW
dc.relation.reference (參考文獻) Festinger, L., Schachter, S., & Back, S. (1950). Social Pressures in Informal Groups: A Study of Human Factors in Housing. Palo Alto, CA: Stanford University Press.zh_TW
dc.relation.reference (參考文獻) Friedman E. J. & Resnick P. (2001). The Social Cost of Cheap Pseudonyms. Journal of Economics & Management Strategy 10(2). 173 - 199.zh_TW
dc.relation.reference (參考文獻) George Pór, (1995). The Quest for Collective Intelligence. In Gozdz, Kazmierz (Eds.), Community Building: Renewing Spirit & Learning in Business. San Francisco: New Leaders Press.zh_TW
dc.relation.reference (參考文獻) Golbeck, J., Parsia, B., & Hendler, J. (2003). Trust networks on the semantic web. Proceedings of Cooperative Intelligent Agents 2003,zh_TW
dc.relation.reference (參考文獻) Govier, T. (1997). Social trust and human communities. McGill-Queen’s Univerisity Press.zh_TW
dc.relation.reference (參考文獻) Granovetter, M. (1973). The Strength of Weak Ties. American Journal of Sociology, 78, 1360-80.zh_TW
dc.relation.reference (參考文獻) Gupta, M., Judge, P., & Ammar, M. (2003). A reputation system for peer-to-peer networks. NOSSDAV`03, , 144-152.zh_TW
dc.relation.reference (參考文獻) Habermas, J. (1991). The structural transformation of the public sphere. Cambridge, MA: MIT Press.zh_TW
dc.relation.reference (參考文獻) Hertzum, M., Andersen, H., Andersen, V., & Hansen, C. (2002). Trust in information sources: Seeking information from people, documents, and virtual agents. Interacting with Computers, 14(5), 575-599.zh_TW
dc.relation.reference (參考文獻) Hevner, A., March, S., Park, J. & Ram, S. (2004). Design Science in Information Systems Research. MIS Quarterly 28(1): 75-105.zh_TW
dc.relation.reference (參考文獻) Hoy, Grubbs, M., & Phelps, J. (2003). Consumer privacy and security protection on church websites: Reasons for concern. Journal of Public Policy and Marketing, 22(1), 58-70.zh_TW
dc.relation.reference (參考文獻) Hwang, Y. C., & Yuan, S. T. (2007). A roadmap for ambient e-service: Applications and embracing model. International Journal of Electronic Business Research, forthcomingzh_TW
dc.relation.reference (參考文獻) Hwang, Y. C., & Yuan, S. T. (2005a). Ambient e-service embracing model. Proceedings of the Seventh IEEE International Conference on e-Commerce Technology, , 535-538.zh_TW
dc.relation.reference (參考文獻) Hwang, Y. C., & Yuan, S. T. (2005b). A roadmap to ambient e-service. Proceedings of the Second IEEE International Workshop on Mobile Commerce and Services, , 11-20.zh_TW
dc.relation.reference (參考文獻) Hwang, Y. C., & Yuan, S. T. (2004). Ambient e-service: Framework and applications. Proceedings of the 4th International Conference of Electronic Business, , 737-745.zh_TW
dc.relation.reference (參考文獻) Information Technology---Security Techniques---Evaluation Criteria for IT Security: Part 2: Security Functional Requirements. (1999).zh_TW
dc.relation.reference (參考文獻) Järvinen, P. (2000), "Research questions guiding selection of an appropriate research method", Proceedings of the 8th European Conference on Information Systems (ECIS 2000), Vienna.zh_TW
dc.relation.reference (參考文獻) Jasper, R., & Uschold, M. (1999). A framework for understanding and classifying ontology applications. Proceedings of the 12th Workshop on Knowledge Acquisition, Modeling and Management (KAW`99)zh_TW
dc.relation.reference (參考文獻) Kaliski, B.S. (2002) The MD2 Message-Digest Algorithm. RFC 1319, April 1992, Network Working Group, RSA Laboratories.zh_TW
dc.relation.reference (參考文獻) Kant, K., Iyer, R., & Tewari, V. (2002). A framework for classifying peer-to-peer technologies. [Electronic version]. 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2002., , 368-368.zh_TW
dc.relation.reference (參考文獻) Katz-Stone, A. (2001). Wireless revenue: Ads can work. Available Http://www.Wirelessauthority.Com.au/r/article/jsp/sid/445080,zh_TW
dc.relation.reference (參考文獻) Kelly, E. P., & Erickson, G. S. (2005). RFID tags: Commercial applications v.s. privacy rights. Industrial Management & Data Systems, 105(6), 703-713.zh_TW
dc.relation.reference (參考文獻) Kelly, E. P., & Erickson, G. S. (2004). Legal and privacy issues surrounding customer databases and e-merchant bankruptcies: Reflections on toymart.com. Industrial Management & Data Systems, 104(3), 209-217.zh_TW
dc.relation.reference (參考文獻) Kinateder, M., & Rothermel, K. (2003). Architecture and algorithms for a distributed reputation system. Trust Management 2003, LNCS 2692, , 1-16.zh_TW
dc.relation.reference (參考文獻) Lazarsfeld, P. and Merton, R. K. (1954). Friendship as a social Process: A Substantive and Methodological Analysis, Freedom and Control in Modern Society, M. Berger, T. Abel, and C.H. Page (editors) New York: Van Nostrand, 18-66.zh_TW
dc.relation.reference (參考文獻) Lewis, J. D., & Weigert, A. (1985). Trust as a social reality. Social Forces, 63, 967-985.zh_TW
dc.relation.reference (參考文獻) Lim, E., & Saiu, K. (2003). Advances in mobile commerce technologies. Idea group publishing.zh_TW
dc.relation.reference (參考文獻) Lin, K., Lu, H., & Yu, T. (2004). A distributed trust and reputation management framework for E-services. IEEE International Conference on Services Computing,zh_TW
dc.relation.reference (參考文獻) Lindwer, M., Marculescu, D., Basten, T., Zimmennann, R., Marculescu, R., & Jung, S., et al. (2003). Ambient intelligence visions and achievements: Linking abstract ideas to real-world concepts. Design, Automation and Test in Europe Conference and Exhibition, 2003, , 10-15.zh_TW
dc.relation.reference (參考文獻) March, S.T. & Smith, G.F. (1995). Design and natural science research on information technology. Decision Support Systems, 15. 251-266.zh_TW
dc.relation.reference (參考文獻) Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734.zh_TW
dc.relation.reference (參考文獻) McAllister, D. J. (1995). Affect- and cognition-based trust as foundations for interpe. Academy of Management Journal, 38(1), 24-59.zh_TW
dc.relation.reference (參考文獻) McPherson, M., L. Smith-Lovin and J. Cook. (2001). Birds of a feather: Homophily in Social Networks. Annual Review of Sociology. 27, 415-444.zh_TW
dc.relation.reference (參考文獻) Mui, L., Halberstadt, A., & Mohtashemi, M. (2003). Evaluating reputation in multi-agents systems. AAMAS2002 Ws Trust, Reputation..., LNAI 2631, , 123-137.zh_TW
dc.relation.reference (參考文獻) National Institute of Standards and Technology (NIST). (1993). FIPS Publication 180: Secure Hash Standard (SHS), May 11, 1993.zh_TW
dc.relation.reference (參考文獻) Nunamaker, J.F., Chen, M. & Purdin, T.D.M. (1991). Systems development in information systems research, Journal of Management Information Systems 7(3),. 89-106.zh_TW
dc.relation.reference (參考文獻) Odlyzko, A. (2003). Privacy, economics, and price discrimination on the internet.zh_TW
dc.relation.reference (參考文獻) Pfitzmann, A., & Hansen, M. (2004). Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Retrieved August 2005., 2005 from http://dud.inf.tu-dresden.de/Anon-Terminologyzh_TW
dc.relation.reference (參考文獻) Plato. (1968: 837). Laws. Plato in twelve volumes, Vol. 11. Bury translator. Cambridge: Harvard U. Press.zh_TW
dc.relation.reference (參考文獻) Rempel, J. K., Holmes, J. G., & Zanna, M. P. (1985). Trust in close relationships. Journal of Personality and Social Psychology, 49, 95-112.zh_TW
dc.relation.reference (參考文獻) Resnick, P., Zeckhauser, R., Friedman, E., & Kuwabara, K. (2000). Reputation systems: Facilitating trust in internet interactions. Communications of the ACM, 43(12), 45-48.zh_TW
dc.relation.reference (參考文獻) Rivest, R. L. (1992a). The MD4 Message Digest Algorithm. RFC 1320, April 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc.zh_TW
dc.relation.reference (參考文獻) Rivest, R. L. (1992b). The MD5 Message Digest Algorithm. RFC 1321, April 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc.zh_TW
dc.relation.reference (參考文獻) Rohrmann, B. (1978). Empirische studien zur entwicklung von antwortskalen für die sozialwissenschaftliche forschung. Zeitschrift Für Sozialpsychologie, 9, 222-245.zh_TW
dc.relation.reference (參考文獻) Rotter, J. B. (1967). A new scale for the measurement of interpersonal trust. Journal of Personality, , 651-665.zh_TW
dc.relation.reference (參考文獻) Roussos, G., Peterson, D., & Patel, U. (2003). Mobile identity management: An enacted view. International Journal of E-Commerce, 8(1), 81-100.zh_TW
dc.relation.reference (參考文獻) Sabater, J., & Sierra, C. (2002). Reputation and social network analysis in multi-agent systems. AAMAS`02, , 475-482.zh_TW
dc.relation.reference (參考文獻) Schilit, B., Adams, N., & Want, R. (1994). Context-aware computing applications. 85-90.zh_TW
dc.relation.reference (參考文獻) Shand, B., Dimmonck, N., & Bacon, J. (2003). Trust for ubiquitous, transaparent collaboration. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications(PerCom`03),zh_TW
dc.relation.reference (參考文獻) Simon, H.A.(1996) The Sciences of the Artificial, 3rd Edition, MIT Press, Cambridge, MA.zh_TW
dc.relation.reference (參考文獻) Singh A, and Liu, L. (2003). TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. Proceedings of the Third International Conference on Peer-to-Peer Computing (P2P’03).zh_TW
dc.relation.reference (參考文獻) Singh, J., & Sirdeshmukh, D. (2000). Agency and trust mechanisms in consumer satisfaction and loyalty judgments. Academy of Marketing Science, 28(1), 150-167.zh_TW
dc.relation.reference (參考文獻) So, M., & Sculli, D. (2002). The role of trust, quality, value and risk in conducting e-business. Industrial Management & Data Systems, 102(9), 503-512.zh_TW
dc.relation.reference (參考文獻) Spiekermann, S. (2005). Perceived control: Scales for privacy in ubiquitous computing environments. Online Proceedings of the 10th International Conference on User Modeling, Edinburgh, Schottland, Juli 2005.,zh_TW
dc.relation.reference (參考文獻) Sweeney, M., Maguire M. & Schackel, B. (1993). Evaluating user-computer interaction: a framework. International. Journal.of Man-Machine Studies. 38. 689-711.zh_TW
dc.relation.reference (參考文獻) Twigg, A. (2003). A subjective approach to routing in P2P and ad hoc networks. Trust Management 2003, LNCS 2692, , 225-238.zh_TW
dc.relation.reference (參考文獻) Varshney, U., & Vetter, R. (2002). Mobile commerce: Framework, applications and networking support. [Electronic version]. Mobile Networks and Applications, 7, 185-198.zh_TW
dc.relation.reference (參考文獻) Watson, R. T., Pitt, L. F., Berthon, P., & Zinkhan, G. M. (2002). U-commerce: Extending the universe of marketing. [Electronic version]. Journal of the Academy of Marketing Science, 30(4), 329-343.zh_TW
dc.relation.reference (參考文獻) Watts D., Strogatz S., (1998), Collective Dynamics of Small-World Networks, Letters to Nature, 393. , 440-442.zh_TW
dc.relation.reference (參考文獻) Wilhelm, U. G., Staamann, S. M., & Buttyan, L. (2000). A pesimistic approach to trust in mobile agent platforms. IEEE Internet Computing, , 40-48.zh_TW
dc.relation.reference (參考文獻) Xiong, L., & Liu, L. (2004). Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities. , 16(7) 843-857.zh_TW
dc.relation.reference (參考文獻) Yu, B., & Singh, M. (2000). A social mechanism of reputation management in electronic communities. 154-165.zh_TW
dc.relation.reference (參考文獻) ZigBee Org. (2005) ZigBee Specification Ver. 1.0, http://www.zigbee.orgzh_TW