dc.contributor.advisor | 苑守慈 | zh_TW |
dc.contributor.advisor | Yuan,Soe-Tsyr | en_US |
dc.contributor.author (Authors) | 黃元巨 | zh_TW |
dc.contributor.author (Authors) | Hwang,Yuan-Chu | en_US |
dc.creator (作者) | 黃元巨 | zh_TW |
dc.creator (作者) | Hwang,Yuan-Chu | en_US |
dc.date (日期) | 2006 | en_US |
dc.date.accessioned | 18-Sep-2009 20:15:33 (UTC+8) | - |
dc.date.available | 18-Sep-2009 20:15:33 (UTC+8) | - |
dc.date.issued (上傳時間) | 18-Sep-2009 20:15:33 (UTC+8) | - |
dc.identifier (Other Identifiers) | G0903565081 | en_US |
dc.identifier.uri (URI) | https://nccur.lib.nccu.edu.tw/handle/140.119/36952 | - |
dc.description (描述) | 博士 | zh_TW |
dc.description (描述) | 國立政治大學 | zh_TW |
dc.description (描述) | 資訊管理研究所 | zh_TW |
dc.description (描述) | 90356508 | zh_TW |
dc.description (描述) | 95 | zh_TW |
dc.description.abstract (摘要) | Ubiquitous e-service is one of the most recent links in the chain of evolution thathas characterized the different eras of the internetworking environment. In thisdissertation, the notion of ambient e-services is defined to identify a new scope ofmobile e-services in an ubiquitous environment, addressing dynamic collective effortsbetween mobile users, dynamic interactions with ambient environments, the moment ofvalue, and low cost provision. We present an ambient e-services frameworkcharacterizing three supporting stacks followed by several ambient e-serviceapplications. We propose an ambient e-service environment that explores the promise ofexploitation of the collective wisdom of proximal mobile users.In order to leap the trust barrier for the user to embracing these ubiquitouse-services, we propose an Autonomous Trust Model for exploring collective wisdom inthe ubiquitous environment (hereafter termed “U-ATM”) as an instance of ASEM.ASEM (Ambient e-Service Embracing Model) addresses the core elements (ofrelevance to the integrated concern of trust, reputation and privacy) required forassuring such desired features as convenience, safety, fairness and collaboration formobile users when they engage with ambient e-services. The U-ATM highlights thedistributed peer-to-peer interactions under an ad-hoc network composition. It especiallyaccommodates the dynamic short-lived identity characteristics and lightweightcomputational capacity of mobile devices. The U-ATM we have developed is based onthe ZigBee architecture as a collaborative application in the upper layer of theubiquitous environment. U-ATM design concepts are elaborated and evaluated. Asimulation is conducted. Simulation outcomes for trust decision quality enhancementshow significant improvement over traditional designs. U-ATM makes it possible forusers to collaborate with the nearby user groups for establishing a reliable andtrustworthy interaction environment. It also facilitates and empowers the potentialbenefits of various ubiquitous e-service applications. | zh_TW |
dc.description.tableofcontents | CHAPTER 1 INTRODUCTION 11.1 UBIQUITOUS E-SERVICE TODAY 11.1.1 Two Different Design Paradigms (Client/Server vs. P2P) 21.1.2 From P2P to Ambient e-service 21.1.3 Beyond Sensor Network: The Power of Social Context 31.2 TRUST IN UBIQUITOUS ENVIRONMENT 41.3 DISSERTATION ROADMAP 6CHAPTER 2 AMBIENT E-SERVICE 92.1 THE AMBIENT E-SERVICE FRAMEWORK 92.1.1 Value Stack 102.1.2 Environment Stack 112.1.3 Technology Stack 122.2 AMBIENT E-SERVICE APPLICATIONS 142.2.1 Ambient shopping mall scenario 162.2.2 Information Distribution Cooperation Scenario 182.2.3 Ambient Location Information Acquisition Scenario 202.2.4 Cooperative Peer Group Scenario 212.2.5 Conceptual Scenario Infrastructure 222.3 FEATURES OF AMBIENT E-SERVICE 23CHAPTER 3 STATE OF THE ART & ASEM 253.1 CHALLENGES 253.1.1 Issues for Ambient e-Service 253.1.2 Core Issues for Embracing Ambient e-Service 273.1.3 Relationships between trust, reputation and privacy 283.1.4 Current Status of the Core issue of Trust 293.2 CURRENT RESEARCH IN AMBIENT E-SERVICE IMPLEMENTATION 313.2.1 Dynamic identity management for ambient e-service 323.2.2 Ambient data management for ambient e-service 323.3 AMBIENT E-SERVICE EMBRACING MODEL (ASEM) 353.3.1 ASEM Framework Design 353.3.2 ASEM Measurement Design 373.4 ROADMAP FOR AMBIENT E-SERVICE 413.4.1 Application service domain 413.4.2 Platform design domain 43CHAPTER 4 PROBLEM STATEMENT 454.1 CONSTRAINTS OF UBIQUITOUS ENVIRONMENT 454.1.1 New challenges due to the Ubiquitous Environment 454.1.2 Basic Ideas 474.2 RESEARCH APPROACH 504.3 VALUES OF THE ASEM 52CHAPTER 5 AN AUTONOMOUS TRUST MODEL 575.1 U-ATM: AN INSTANCE OF ASEM 575.2 U-ATM CORE ELEMENTS 575.2.1 U-ATM Privacy Design 585.2.2 U-ATM Reputation Management 595.2.3 U-ATM Trust Management 595.3 U-ATM PLATFORM INFRASTRUCTURE 605.4 ZIGBEE BASED U-ATM PLATFORM 645.4.1 ZigBee Introduction 645.4.2 Why ZigBee 66CHAPTER 6 PRIVACY DESIGN IN THE U-ATM 736.1 CASE SCENARIO 736.2 ISSUES 746.3 THE U-ATM DESIGN 756.3.1 Unlinkability 766.3.2 Anonymizer 826.3.3 Confidential reputation design 876.4 JUSTIFICATION (QUESTIONNAIRE ON PERSONAL PRIVACY AWARENESS) 89CHAPTER 7 REPUTATION MANAGEMENT IN THE U-ATM 957.1 CASE SCENARIO 957.2 ISSUES 997.3 THE U-ATM DESIGN 1007.3.1 General reputation issues 1007.3.2 Environment issues for ambient e-service 1037.3.3 U-ATM Reputation Management Design 1047.4 ALTERNATIVES 1077.4.1 The Public Key Infrastructure. 1077.4.2 Computational Efficiency on Reputation design:Counter-Based vs. Token Based 1087.4.3 General Message Encryption: to be or not to be? 1097.4.4 Contribution and Significance 1117.5 JUSTIFICATION 113CHAPTER 8 TRUST MANAGEMENT IN THE U-ATM 1158.1 CASE SCENARIO 1158.2 ISSUES 1178.3 U-ATM DESIGN CONCEPT FOR TRUST MANAGEMENT 1188.3.1 Exploring alternative data source for trust estimation: the Interaction-based experience 1198.3.2 Determining acceptable targets for information acquisition 1218.3.3 Data coordination for heterogeneous information sources 1228.4 THE U-ATM TRUST MANAGEMENT DESIGN 1258.4.1 Local Trust Evaluation 1258.4.2 Interpersonal experience aggregation for heterogeneous data sources 1308.5 JUSTIFICATION 1328.5.1 Simulation 1: Effect of Collective Wisdom 1348.5.2 Simulation 2: Dynamic Environmental Construct 1388.5.3 Simulation 3: Interaction Cost vs. Decision Quality 143CHAPTER 9 THEORETICAL SUPPORT OF PROXIMITY VALUE 1479.1 CHANGES OF PROXIMITY IN THE U-COMMERCE ERA 1479.2 SIGNIFICANCE OF PROXIMITY E-SERVICE 1499.3 JUSTIFICATION OF THEORETICAL SUPPORT 1509.4 CONFERENCE PROXIMITY E-SERVICE: A CASE SCENARIO 154CHAPTER 10 CONCLUSIONS 15910.1 VISION OF U-ATM 15910.2 COMPARISON TO RELATED WORKS 16110.3 CONCLUSIONS 163REFERENCES 167APPENDIX 173A. QUESTIONNAIRE FOR USER PERCEIVED PRIVACY CONTROL (U-ATM ITRUST MODE) 173B. QUESTIONNAIRE FOR USER PERCEIVED PRIVACY CONTROL (PASSWORD MODE) 174C. SIMULATION EXPERIMENT DESIGN 175C1. Experiment Settings 175C2. Experiment Procedures 176 | zh_TW |
dc.format.extent | 332600 bytes | - |
dc.format.extent | 16300 bytes | - |
dc.format.extent | 61359 bytes | - |
dc.format.extent | 213854 bytes | - |
dc.format.extent | 821559 bytes | - |
dc.format.extent | 405222 bytes | - |
dc.format.extent | 435484 bytes | - |
dc.format.extent | 438447 bytes | - |
dc.format.extent | 548698 bytes | - |
dc.format.extent | 284535 bytes | - |
dc.format.extent | 561601 bytes | - |
dc.format.extent | 374464 bytes | - |
dc.format.extent | 192211 bytes | - |
dc.format.extent | 76744 bytes | - |
dc.format.extent | 224477 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en_US | - |
dc.source.uri (資料來源) | http://thesis.lib.nccu.edu.tw/record/#G0903565081 | en_US |
dc.subject (關鍵詞) | 隨意智能服務 | zh_TW |
dc.subject (關鍵詞) | 群眾智慧 | zh_TW |
dc.subject (關鍵詞) | 信任 | zh_TW |
dc.subject (關鍵詞) | Ubiquitous e-Service | en_US |
dc.subject (關鍵詞) | Collective Wisdom | en_US |
dc.subject (關鍵詞) | Trust | en_US |
dc.title (題名) | 探索隨意群眾智慧之自主化信任模式研究 | zh_TW |
dc.title (題名) | U-ATM: An Autonomous Trust Model for Exploring Ubiquitous Collective Wisdom | en_US |
dc.type (資料類型) | thesis | en |
dc.relation.reference (參考文獻) | Aberer, K., & Despotovic, Z. (2001). Managing trust in a peer-2-peer information system. CIKM`01, 310-317. | zh_TW |
dc.relation.reference (參考文獻) | Allen, T. J. (1977). Managing the Flow of Technology. Cambridge, MA: MIT Press. | zh_TW |
dc.relation.reference (參考文獻) | Anderson, B. (1983). Imagined Communities. London: Verso. | zh_TW |
dc.relation.reference (參考文獻) | Aristotle. (1934). The Nicomachean Ethics. H. Rackham, translator. Cambridge, MA: Harvard University Press. | zh_TW |
dc.relation.reference (參考文獻) | Barber, B. (1983). The logic and limits of trustNJ: Rutgers University Press. | zh_TW |
dc.relation.reference (參考文獻) | Bolton, G. E., Katok, E., & Ockenfels, A. (2004). Trust among internet traders: A behavioral economics approach. Analyse Und Kritik, 26, 185-202. | zh_TW |
dc.relation.reference (參考文獻) | Buskens, V., & Raub, W. (2002). Embedded trust: Control and learning. Group Cohesion, Trust and Solidarity, 19, 167-202. | zh_TW |
dc.relation.reference (參考文獻) | Castelfranchi, C., Falcone, R., & Pezzulo, G. (2003). Integrating trustfulness and decision using fuzzy cognitive maps. Trust Management 2003, LNCS 2692, , 195-210. | zh_TW |
dc.relation.reference (參考文獻) | Chaum, D. (1989). Privacy protected payments: Unconditional payer and/or payee untraceability. Proceedings of Smart Card 2000, North Holland, | zh_TW |
dc.relation.reference (參考文獻) | Chou, D. C., Yen, D. C., Lin, B., & Cheng, P. (1999). Cyberspace security management. Industrial Management & Data Systems, 99(8), 353-361. | zh_TW |
dc.relation.reference (參考文獻) | Coleman, J. S. (1990). Foundations of social theoryCambridge, MA: The Belknap Press of Harvard University Press. | zh_TW |
dc.relation.reference (參考文獻) | Dasgupta, P. (2000). Trust as a commodity. In Gambetta, D., Ed., Trust: Making and Breaking Cooperative Relations, Electronic Edition. Department of Sociology, University of Oxford. Http://www.Sociology.Ox.Ac.uk/papers/dasgupta49-72.Pdf, | zh_TW |
dc.relation.reference (參考文獻) | Earle, T. C., & Cvetkovich, G. T. (1995). Social trust: Towards A cosmopolitan societyPraeger Publishers, Westport, CT. | zh_TW |
dc.relation.reference (參考文獻) | Enzmann, M., & Schneider, M. (2005). Improving customer retention in E-commerce through a secure and privacy-enhanced loyalty system. Forthcoming: Information Systems Frontiers, | zh_TW |
dc.relation.reference (參考文獻) | Enzmann, M., & Schneider, M. (2004). A privacy-friendly loyalty system for electronic marketplaces. Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE04), Taiwan. | zh_TW |
dc.relation.reference (參考文獻) | Festinger, L., Schachter, S., & Back, S. (1950). Social Pressures in Informal Groups: A Study of Human Factors in Housing. Palo Alto, CA: Stanford University Press. | zh_TW |
dc.relation.reference (參考文獻) | Friedman E. J. & Resnick P. (2001). The Social Cost of Cheap Pseudonyms. Journal of Economics & Management Strategy 10(2). 173 - 199. | zh_TW |
dc.relation.reference (參考文獻) | George Pór, (1995). The Quest for Collective Intelligence. In Gozdz, Kazmierz (Eds.), Community Building: Renewing Spirit & Learning in Business. San Francisco: New Leaders Press. | zh_TW |
dc.relation.reference (參考文獻) | Golbeck, J., Parsia, B., & Hendler, J. (2003). Trust networks on the semantic web. Proceedings of Cooperative Intelligent Agents 2003, | zh_TW |
dc.relation.reference (參考文獻) | Govier, T. (1997). Social trust and human communities. McGill-Queen’s Univerisity Press. | zh_TW |
dc.relation.reference (參考文獻) | Granovetter, M. (1973). The Strength of Weak Ties. American Journal of Sociology, 78, 1360-80. | zh_TW |
dc.relation.reference (參考文獻) | Gupta, M., Judge, P., & Ammar, M. (2003). A reputation system for peer-to-peer networks. NOSSDAV`03, , 144-152. | zh_TW |
dc.relation.reference (參考文獻) | Habermas, J. (1991). The structural transformation of the public sphere. Cambridge, MA: MIT Press. | zh_TW |
dc.relation.reference (參考文獻) | Hertzum, M., Andersen, H., Andersen, V., & Hansen, C. (2002). Trust in information sources: Seeking information from people, documents, and virtual agents. Interacting with Computers, 14(5), 575-599. | zh_TW |
dc.relation.reference (參考文獻) | Hevner, A., March, S., Park, J. & Ram, S. (2004). Design Science in Information Systems Research. MIS Quarterly 28(1): 75-105. | zh_TW |
dc.relation.reference (參考文獻) | Hoy, Grubbs, M., & Phelps, J. (2003). Consumer privacy and security protection on church websites: Reasons for concern. Journal of Public Policy and Marketing, 22(1), 58-70. | zh_TW |
dc.relation.reference (參考文獻) | Hwang, Y. C., & Yuan, S. T. (2007). A roadmap for ambient e-service: Applications and embracing model. International Journal of Electronic Business Research, forthcoming | zh_TW |
dc.relation.reference (參考文獻) | Hwang, Y. C., & Yuan, S. T. (2005a). Ambient e-service embracing model. Proceedings of the Seventh IEEE International Conference on e-Commerce Technology, , 535-538. | zh_TW |
dc.relation.reference (參考文獻) | Hwang, Y. C., & Yuan, S. T. (2005b). A roadmap to ambient e-service. Proceedings of the Second IEEE International Workshop on Mobile Commerce and Services, , 11-20. | zh_TW |
dc.relation.reference (參考文獻) | Hwang, Y. C., & Yuan, S. T. (2004). Ambient e-service: Framework and applications. Proceedings of the 4th International Conference of Electronic Business, , 737-745. | zh_TW |
dc.relation.reference (參考文獻) | Information Technology---Security Techniques---Evaluation Criteria for IT Security: Part 2: Security Functional Requirements. (1999). | zh_TW |
dc.relation.reference (參考文獻) | Järvinen, P. (2000), "Research questions guiding selection of an appropriate research method", Proceedings of the 8th European Conference on Information Systems (ECIS 2000), Vienna. | zh_TW |
dc.relation.reference (參考文獻) | Jasper, R., & Uschold, M. (1999). A framework for understanding and classifying ontology applications. Proceedings of the 12th Workshop on Knowledge Acquisition, Modeling and Management (KAW`99) | zh_TW |
dc.relation.reference (參考文獻) | Kaliski, B.S. (2002) The MD2 Message-Digest Algorithm. RFC 1319, April 1992, Network Working Group, RSA Laboratories. | zh_TW |
dc.relation.reference (參考文獻) | Kant, K., Iyer, R., & Tewari, V. (2002). A framework for classifying peer-to-peer technologies. [Electronic version]. 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2002., , 368-368. | zh_TW |
dc.relation.reference (參考文獻) | Katz-Stone, A. (2001). Wireless revenue: Ads can work. Available Http://www.Wirelessauthority.Com.au/r/article/jsp/sid/445080, | zh_TW |
dc.relation.reference (參考文獻) | Kelly, E. P., & Erickson, G. S. (2005). RFID tags: Commercial applications v.s. privacy rights. Industrial Management & Data Systems, 105(6), 703-713. | zh_TW |
dc.relation.reference (參考文獻) | Kelly, E. P., & Erickson, G. S. (2004). Legal and privacy issues surrounding customer databases and e-merchant bankruptcies: Reflections on toymart.com. Industrial Management & Data Systems, 104(3), 209-217. | zh_TW |
dc.relation.reference (參考文獻) | Kinateder, M., & Rothermel, K. (2003). Architecture and algorithms for a distributed reputation system. Trust Management 2003, LNCS 2692, , 1-16. | zh_TW |
dc.relation.reference (參考文獻) | Lazarsfeld, P. and Merton, R. K. (1954). Friendship as a social Process: A Substantive and Methodological Analysis, Freedom and Control in Modern Society, M. Berger, T. Abel, and C.H. Page (editors) New York: Van Nostrand, 18-66. | zh_TW |
dc.relation.reference (參考文獻) | Lewis, J. D., & Weigert, A. (1985). Trust as a social reality. Social Forces, 63, 967-985. | zh_TW |
dc.relation.reference (參考文獻) | Lim, E., & Saiu, K. (2003). Advances in mobile commerce technologies. Idea group publishing. | zh_TW |
dc.relation.reference (參考文獻) | Lin, K., Lu, H., & Yu, T. (2004). A distributed trust and reputation management framework for E-services. IEEE International Conference on Services Computing, | zh_TW |
dc.relation.reference (參考文獻) | Lindwer, M., Marculescu, D., Basten, T., Zimmennann, R., Marculescu, R., & Jung, S., et al. (2003). Ambient intelligence visions and achievements: Linking abstract ideas to real-world concepts. Design, Automation and Test in Europe Conference and Exhibition, 2003, , 10-15. | zh_TW |
dc.relation.reference (參考文獻) | March, S.T. & Smith, G.F. (1995). Design and natural science research on information technology. Decision Support Systems, 15. 251-266. | zh_TW |
dc.relation.reference (參考文獻) | Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734. | zh_TW |
dc.relation.reference (參考文獻) | McAllister, D. J. (1995). Affect- and cognition-based trust as foundations for interpe. Academy of Management Journal, 38(1), 24-59. | zh_TW |
dc.relation.reference (參考文獻) | McPherson, M., L. Smith-Lovin and J. Cook. (2001). Birds of a feather: Homophily in Social Networks. Annual Review of Sociology. 27, 415-444. | zh_TW |
dc.relation.reference (參考文獻) | Mui, L., Halberstadt, A., & Mohtashemi, M. (2003). Evaluating reputation in multi-agents systems. AAMAS2002 Ws Trust, Reputation..., LNAI 2631, , 123-137. | zh_TW |
dc.relation.reference (參考文獻) | National Institute of Standards and Technology (NIST). (1993). FIPS Publication 180: Secure Hash Standard (SHS), May 11, 1993. | zh_TW |
dc.relation.reference (參考文獻) | Nunamaker, J.F., Chen, M. & Purdin, T.D.M. (1991). Systems development in information systems research, Journal of Management Information Systems 7(3),. 89-106. | zh_TW |
dc.relation.reference (參考文獻) | Odlyzko, A. (2003). Privacy, economics, and price discrimination on the internet. | zh_TW |
dc.relation.reference (參考文獻) | Pfitzmann, A., & Hansen, M. (2004). Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Retrieved August 2005., 2005 from http://dud.inf.tu-dresden.de/Anon-Terminology | zh_TW |
dc.relation.reference (參考文獻) | Plato. (1968: 837). Laws. Plato in twelve volumes, Vol. 11. Bury translator. Cambridge: Harvard U. Press. | zh_TW |
dc.relation.reference (參考文獻) | Rempel, J. K., Holmes, J. G., & Zanna, M. P. (1985). Trust in close relationships. Journal of Personality and Social Psychology, 49, 95-112. | zh_TW |
dc.relation.reference (參考文獻) | Resnick, P., Zeckhauser, R., Friedman, E., & Kuwabara, K. (2000). Reputation systems: Facilitating trust in internet interactions. Communications of the ACM, 43(12), 45-48. | zh_TW |
dc.relation.reference (參考文獻) | Rivest, R. L. (1992a). The MD4 Message Digest Algorithm. RFC 1320, April 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc. | zh_TW |
dc.relation.reference (參考文獻) | Rivest, R. L. (1992b). The MD5 Message Digest Algorithm. RFC 1321, April 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc. | zh_TW |
dc.relation.reference (參考文獻) | Rohrmann, B. (1978). Empirische studien zur entwicklung von antwortskalen für die sozialwissenschaftliche forschung. Zeitschrift Für Sozialpsychologie, 9, 222-245. | zh_TW |
dc.relation.reference (參考文獻) | Rotter, J. B. (1967). A new scale for the measurement of interpersonal trust. Journal of Personality, , 651-665. | zh_TW |
dc.relation.reference (參考文獻) | Roussos, G., Peterson, D., & Patel, U. (2003). Mobile identity management: An enacted view. International Journal of E-Commerce, 8(1), 81-100. | zh_TW |
dc.relation.reference (參考文獻) | Sabater, J., & Sierra, C. (2002). Reputation and social network analysis in multi-agent systems. AAMAS`02, , 475-482. | zh_TW |
dc.relation.reference (參考文獻) | Schilit, B., Adams, N., & Want, R. (1994). Context-aware computing applications. 85-90. | zh_TW |
dc.relation.reference (參考文獻) | Shand, B., Dimmonck, N., & Bacon, J. (2003). Trust for ubiquitous, transaparent collaboration. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications(PerCom`03), | zh_TW |
dc.relation.reference (參考文獻) | Simon, H.A.(1996) The Sciences of the Artificial, 3rd Edition, MIT Press, Cambridge, MA. | zh_TW |
dc.relation.reference (參考文獻) | Singh A, and Liu, L. (2003). TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. Proceedings of the Third International Conference on Peer-to-Peer Computing (P2P’03). | zh_TW |
dc.relation.reference (參考文獻) | Singh, J., & Sirdeshmukh, D. (2000). Agency and trust mechanisms in consumer satisfaction and loyalty judgments. Academy of Marketing Science, 28(1), 150-167. | zh_TW |
dc.relation.reference (參考文獻) | So, M., & Sculli, D. (2002). The role of trust, quality, value and risk in conducting e-business. Industrial Management & Data Systems, 102(9), 503-512. | zh_TW |
dc.relation.reference (參考文獻) | Spiekermann, S. (2005). Perceived control: Scales for privacy in ubiquitous computing environments. Online Proceedings of the 10th International Conference on User Modeling, Edinburgh, Schottland, Juli 2005., | zh_TW |
dc.relation.reference (參考文獻) | Sweeney, M., Maguire M. & Schackel, B. (1993). Evaluating user-computer interaction: a framework. International. Journal.of Man-Machine Studies. 38. 689-711. | zh_TW |
dc.relation.reference (參考文獻) | Twigg, A. (2003). A subjective approach to routing in P2P and ad hoc networks. Trust Management 2003, LNCS 2692, , 225-238. | zh_TW |
dc.relation.reference (參考文獻) | Varshney, U., & Vetter, R. (2002). Mobile commerce: Framework, applications and networking support. [Electronic version]. Mobile Networks and Applications, 7, 185-198. | zh_TW |
dc.relation.reference (參考文獻) | Watson, R. T., Pitt, L. F., Berthon, P., & Zinkhan, G. M. (2002). U-commerce: Extending the universe of marketing. [Electronic version]. Journal of the Academy of Marketing Science, 30(4), 329-343. | zh_TW |
dc.relation.reference (參考文獻) | Watts D., Strogatz S., (1998), Collective Dynamics of Small-World Networks, Letters to Nature, 393. , 440-442. | zh_TW |
dc.relation.reference (參考文獻) | Wilhelm, U. G., Staamann, S. M., & Buttyan, L. (2000). A pesimistic approach to trust in mobile agent platforms. IEEE Internet Computing, , 40-48. | zh_TW |
dc.relation.reference (參考文獻) | Xiong, L., & Liu, L. (2004). Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities. , 16(7) 843-857. | zh_TW |
dc.relation.reference (參考文獻) | Yu, B., & Singh, M. (2000). A social mechanism of reputation management in electronic communities. 154-165. | zh_TW |
dc.relation.reference (參考文獻) | ZigBee Org. (2005) ZigBee Specification Ver. 1.0, http://www.zigbee.org | zh_TW |