English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113160/144130 (79%)
Visitors : 50754161      Online Users : 723
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/36952
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/36952


    Title: 探索隨意群眾智慧之自主化信任模式研究
    U-ATM: An Autonomous Trust Model for Exploring Ubiquitous Collective Wisdom
    Authors: 黃元巨
    Hwang,Yuan-Chu
    Contributors: 苑守慈
    Yuan,Soe-Tsyr
    黃元巨
    Hwang,Yuan-Chu
    Keywords: 隨意智能服務
    群眾智慧
    信任
    Ubiquitous e-Service
    Collective Wisdom
    Trust
    Date: 2006
    Issue Date: 2009-09-18 20:15:33 (UTC+8)
    Abstract: Ubiquitous e-service is one of the most recent links in the chain of evolution that
    has characterized the different eras of the internetworking environment. In this
    dissertation, the notion of ambient e-services is defined to identify a new scope of
    mobile e-services in an ubiquitous environment, addressing dynamic collective efforts
    between mobile users, dynamic interactions with ambient environments, the moment of
    value, and low cost provision. We present an ambient e-services framework
    characterizing three supporting stacks followed by several ambient e-service
    applications. We propose an ambient e-service environment that explores the promise of
    exploitation of the collective wisdom of proximal mobile users.
    In order to leap the trust barrier for the user to embracing these ubiquitous
    e-services, we propose an Autonomous Trust Model for exploring collective wisdom in
    the ubiquitous environment (hereafter termed “U-ATM”) as an instance of ASEM.
    ASEM (Ambient e-Service Embracing Model) addresses the core elements (of
    relevance to the integrated concern of trust, reputation and privacy) required for
    assuring such desired features as convenience, safety, fairness and collaboration for
    mobile users when they engage with ambient e-services. The U-ATM highlights the
    distributed peer-to-peer interactions under an ad-hoc network composition. It especially
    accommodates the dynamic short-lived identity characteristics and lightweight
    computational capacity of mobile devices. The U-ATM we have developed is based on
    the ZigBee architecture as a collaborative application in the upper layer of the
    ubiquitous environment. U-ATM design concepts are elaborated and evaluated. A
    simulation is conducted. Simulation outcomes for trust decision quality enhancement
    show significant improvement over traditional designs. U-ATM makes it possible for
    users to collaborate with the nearby user groups for establishing a reliable and
    trustworthy interaction environment. It also facilitates and empowers the potential
    benefits of various ubiquitous e-service applications.
    Reference: Aberer, K., & Despotovic, Z. (2001). Managing trust in a peer-2-peer information system. CIKM`01, 310-317.
    Allen, T. J. (1977). Managing the Flow of Technology. Cambridge, MA: MIT Press.
    Anderson, B. (1983). Imagined Communities. London: Verso.
    Aristotle. (1934). The Nicomachean Ethics. H. Rackham, translator. Cambridge, MA: Harvard University Press.
    Barber, B. (1983). The logic and limits of trustNJ: Rutgers University Press.
    Bolton, G. E., Katok, E., & Ockenfels, A. (2004). Trust among internet traders: A behavioral economics approach. Analyse Und Kritik, 26, 185-202.
    Buskens, V., & Raub, W. (2002). Embedded trust: Control and learning. Group Cohesion, Trust and Solidarity, 19, 167-202.
    Castelfranchi, C., Falcone, R., & Pezzulo, G. (2003). Integrating trustfulness and decision using fuzzy cognitive maps. Trust Management 2003, LNCS 2692, , 195-210.
    Chaum, D. (1989). Privacy protected payments: Unconditional payer and/or payee untraceability. Proceedings of Smart Card 2000, North Holland,
    Chou, D. C., Yen, D. C., Lin, B., & Cheng, P. (1999). Cyberspace security management. Industrial Management & Data Systems, 99(8), 353-361.
    Coleman, J. S. (1990). Foundations of social theoryCambridge, MA: The Belknap Press of Harvard University Press.
    Dasgupta, P. (2000). Trust as a commodity. In Gambetta, D., Ed., Trust: Making and Breaking Cooperative Relations, Electronic Edition. Department of Sociology, University of Oxford. Http://www.Sociology.Ox.Ac.uk/papers/dasgupta49-72.Pdf,
    Earle, T. C., & Cvetkovich, G. T. (1995). Social trust: Towards A cosmopolitan societyPraeger Publishers, Westport, CT.
    Enzmann, M., & Schneider, M. (2005). Improving customer retention in E-commerce through a secure and privacy-enhanced loyalty system. Forthcoming: Information Systems Frontiers,
    Enzmann, M., & Schneider, M. (2004). A privacy-friendly loyalty system for electronic marketplaces. Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE04), Taiwan.
    Festinger, L., Schachter, S., & Back, S. (1950). Social Pressures in Informal Groups: A Study of Human Factors in Housing. Palo Alto, CA: Stanford University Press.
    Friedman E. J. & Resnick P. (2001). The Social Cost of Cheap Pseudonyms. Journal of Economics & Management Strategy 10(2). 173 - 199.
    George Pór, (1995). The Quest for Collective Intelligence. In Gozdz, Kazmierz (Eds.), Community Building: Renewing Spirit & Learning in Business. San Francisco: New Leaders Press.
    Golbeck, J., Parsia, B., & Hendler, J. (2003). Trust networks on the semantic web. Proceedings of Cooperative Intelligent Agents 2003,
    Govier, T. (1997). Social trust and human communities. McGill-Queen’s Univerisity Press.
    Granovetter, M. (1973). The Strength of Weak Ties. American Journal of Sociology, 78, 1360-80.
    Gupta, M., Judge, P., & Ammar, M. (2003). A reputation system for peer-to-peer networks. NOSSDAV`03, , 144-152.
    Habermas, J. (1991). The structural transformation of the public sphere. Cambridge, MA: MIT Press.
    Hertzum, M., Andersen, H., Andersen, V., & Hansen, C. (2002). Trust in information sources: Seeking information from people, documents, and virtual agents. Interacting with Computers, 14(5), 575-599.
    Hevner, A., March, S., Park, J. & Ram, S. (2004). Design Science in Information Systems Research. MIS Quarterly 28(1): 75-105.
    Hoy, Grubbs, M., & Phelps, J. (2003). Consumer privacy and security protection on church websites: Reasons for concern. Journal of Public Policy and Marketing, 22(1), 58-70.
    Hwang, Y. C., & Yuan, S. T. (2007). A roadmap for ambient e-service: Applications and embracing model. International Journal of Electronic Business Research, forthcoming
    Hwang, Y. C., & Yuan, S. T. (2005a). Ambient e-service embracing model. Proceedings of the Seventh IEEE International Conference on e-Commerce Technology, , 535-538.
    Hwang, Y. C., & Yuan, S. T. (2005b). A roadmap to ambient e-service. Proceedings of the Second IEEE International Workshop on Mobile Commerce and Services, , 11-20.
    Hwang, Y. C., & Yuan, S. T. (2004). Ambient e-service: Framework and applications. Proceedings of the 4th International Conference of Electronic Business, , 737-745.
    Information Technology---Security Techniques---Evaluation Criteria for IT Security: Part 2: Security Functional Requirements. (1999).
    Järvinen, P. (2000), "Research questions guiding selection of an appropriate research method", Proceedings of the 8th European Conference on Information Systems (ECIS 2000), Vienna.
    Jasper, R., & Uschold, M. (1999). A framework for understanding and classifying ontology applications. Proceedings of the 12th Workshop on Knowledge Acquisition, Modeling and Management (KAW`99)
    Kaliski, B.S. (2002) The MD2 Message-Digest Algorithm. RFC 1319, April 1992, Network Working Group, RSA Laboratories.
    Kant, K., Iyer, R., & Tewari, V. (2002). A framework for classifying peer-to-peer technologies. [Electronic version]. 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2002., , 368-368.
    Katz-Stone, A. (2001). Wireless revenue: Ads can work. Available Http://www.Wirelessauthority.Com.au/r/article/jsp/sid/445080,
    Kelly, E. P., & Erickson, G. S. (2005). RFID tags: Commercial applications v.s. privacy rights. Industrial Management & Data Systems, 105(6), 703-713.
    Kelly, E. P., & Erickson, G. S. (2004). Legal and privacy issues surrounding customer databases and e-merchant bankruptcies: Reflections on toymart.com. Industrial Management & Data Systems, 104(3), 209-217.
    Kinateder, M., & Rothermel, K. (2003). Architecture and algorithms for a distributed reputation system. Trust Management 2003, LNCS 2692, , 1-16.
    Lazarsfeld, P. and Merton, R. K. (1954). Friendship as a social Process: A Substantive and Methodological Analysis, Freedom and Control in Modern Society, M. Berger, T. Abel, and C.H. Page (editors) New York: Van Nostrand, 18-66.
    Lewis, J. D., & Weigert, A. (1985). Trust as a social reality. Social Forces, 63, 967-985.
    Lim, E., & Saiu, K. (2003). Advances in mobile commerce technologies. Idea group publishing.
    Lin, K., Lu, H., & Yu, T. (2004). A distributed trust and reputation management framework for E-services. IEEE International Conference on Services Computing,
    Lindwer, M., Marculescu, D., Basten, T., Zimmennann, R., Marculescu, R., & Jung, S., et al. (2003). Ambient intelligence visions and achievements: Linking abstract ideas to real-world concepts. Design, Automation and Test in Europe Conference and Exhibition, 2003, , 10-15.
    March, S.T. & Smith, G.F. (1995). Design and natural science research on information technology. Decision Support Systems, 15. 251-266.
    Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734.
    McAllister, D. J. (1995). Affect- and cognition-based trust as foundations for interpe. Academy of Management Journal, 38(1), 24-59.
    McPherson, M., L. Smith-Lovin and J. Cook. (2001). Birds of a feather: Homophily in Social Networks. Annual Review of Sociology. 27, 415-444.
    Mui, L., Halberstadt, A., & Mohtashemi, M. (2003). Evaluating reputation in multi-agents systems. AAMAS2002 Ws Trust, Reputation..., LNAI 2631, , 123-137.
    National Institute of Standards and Technology (NIST). (1993). FIPS Publication 180: Secure Hash Standard (SHS), May 11, 1993.
    Nunamaker, J.F., Chen, M. & Purdin, T.D.M. (1991). Systems development in information systems research, Journal of Management Information Systems 7(3),. 89-106.
    Odlyzko, A. (2003). Privacy, economics, and price discrimination on the internet.
    Pfitzmann, A., & Hansen, M. (2004). Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Retrieved August 2005., 2005 from http://dud.inf.tu-dresden.de/Anon-Terminology
    Plato. (1968: 837). Laws. Plato in twelve volumes, Vol. 11. Bury translator. Cambridge: Harvard U. Press.
    Rempel, J. K., Holmes, J. G., & Zanna, M. P. (1985). Trust in close relationships. Journal of Personality and Social Psychology, 49, 95-112.
    Resnick, P., Zeckhauser, R., Friedman, E., & Kuwabara, K. (2000). Reputation systems: Facilitating trust in internet interactions. Communications of the ACM, 43(12), 45-48.
    Rivest, R. L. (1992a). The MD4 Message Digest Algorithm. RFC 1320, April 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc.
    Rivest, R. L. (1992b). The MD5 Message Digest Algorithm. RFC 1321, April 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc.
    Rohrmann, B. (1978). Empirische studien zur entwicklung von antwortskalen für die sozialwissenschaftliche forschung. Zeitschrift Für Sozialpsychologie, 9, 222-245.
    Rotter, J. B. (1967). A new scale for the measurement of interpersonal trust. Journal of Personality, , 651-665.
    Roussos, G., Peterson, D., & Patel, U. (2003). Mobile identity management: An enacted view. International Journal of E-Commerce, 8(1), 81-100.
    Sabater, J., & Sierra, C. (2002). Reputation and social network analysis in multi-agent systems. AAMAS`02, , 475-482.
    Schilit, B., Adams, N., & Want, R. (1994). Context-aware computing applications. 85-90.
    Shand, B., Dimmonck, N., & Bacon, J. (2003). Trust for ubiquitous, transaparent collaboration. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications(PerCom`03),
    Simon, H.A.(1996) The Sciences of the Artificial, 3rd Edition, MIT Press, Cambridge, MA.
    Singh A, and Liu, L. (2003). TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. Proceedings of the Third International Conference on Peer-to-Peer Computing (P2P’03).
    Singh, J., & Sirdeshmukh, D. (2000). Agency and trust mechanisms in consumer satisfaction and loyalty judgments. Academy of Marketing Science, 28(1), 150-167.
    So, M., & Sculli, D. (2002). The role of trust, quality, value and risk in conducting e-business. Industrial Management & Data Systems, 102(9), 503-512.
    Spiekermann, S. (2005). Perceived control: Scales for privacy in ubiquitous computing environments. Online Proceedings of the 10th International Conference on User Modeling, Edinburgh, Schottland, Juli 2005.,
    Sweeney, M., Maguire M. & Schackel, B. (1993). Evaluating user-computer interaction: a framework. International. Journal.of Man-Machine Studies. 38. 689-711.
    Twigg, A. (2003). A subjective approach to routing in P2P and ad hoc networks. Trust Management 2003, LNCS 2692, , 225-238.
    Varshney, U., & Vetter, R. (2002). Mobile commerce: Framework, applications and networking support. [Electronic version]. Mobile Networks and Applications, 7, 185-198.
    Watson, R. T., Pitt, L. F., Berthon, P., & Zinkhan, G. M. (2002). U-commerce: Extending the universe of marketing. [Electronic version]. Journal of the Academy of Marketing Science, 30(4), 329-343.
    Watts D., Strogatz S., (1998), Collective Dynamics of Small-World Networks, Letters to Nature, 393. , 440-442.
    Wilhelm, U. G., Staamann, S. M., & Buttyan, L. (2000). A pesimistic approach to trust in mobile agent platforms. IEEE Internet Computing, , 40-48.
    Xiong, L., & Liu, L. (2004). Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities. , 16(7) 843-857.
    Yu, B., & Singh, M. (2000). A social mechanism of reputation management in electronic communities. 154-165.
    ZigBee Org. (2005) ZigBee Specification Ver. 1.0, http://www.zigbee.org
    Description: 博士
    國立政治大學
    資訊管理研究所
    90356508
    95
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0903565081
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    56508101.pdf324KbAdobe PDF2964View/Open
    56508102.pdf15KbAdobe PDF2841View/Open
    56508103.pdf59KbAdobe PDF2905View/Open
    56508104.pdf208KbAdobe PDF2841View/Open
    56508105.pdf802KbAdobe PDF2976View/Open
    56508106.pdf395KbAdobe PDF2836View/Open
    56508107.pdf425KbAdobe PDF23186View/Open
    56508108.pdf428KbAdobe PDF2961View/Open
    56508109.pdf535KbAdobe PDF21067View/Open
    56508110.pdf277KbAdobe PDF2819View/Open
    56508111.pdf548KbAdobe PDF21018View/Open
    56508112.pdf365KbAdobe PDF21042View/Open
    56508113.pdf187KbAdobe PDF2812View/Open
    56508114.pdf74KbAdobe PDF2930View/Open
    56508115.pdf219KbAdobe PDF2849View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback