Ascertaining the semantic and linguistic level of perceived risk in e-business interactions
|dc.contributor.author||Dillon, Tharam S.|
|dc.contributor.author||Hussain, Farookh Khadeer|
|dc.identifier.citation||Hussain, Omar and Chang, Elizabeth and Dillon, Tharam and Hussain, Farookh Khadeer. 2008. Ascertaining the semantic and linguistic level of perceived risk in e-business interactions, in Chung, J-Y. and Miller, S. and Qi, Y. (ed), Workshop on Business Intelligence Methodologies and Applications, Oct 22 2008, pp. 723-727. Xian, China: Institute of Electrical and Electronics Engineers (IEEE) Computer Society.|
By analyzing the level of perceived risk in the domain of e-business, the interaction initiating agent can determine beforehand whether or not it will achieve its desired outcomes and the associated consequences to it in interacting with the other agent. In our previous work, we have proposed a methodology by which the initiating agent ascertains the numeric level of perceived risk in forming an interaction. In this paper, we propose a methodology by which the initiating agent of the interaction determines the semantic level of perceived risk, for it to be utilized while making an informed interaction-based decision with an agent.
|dc.publisher||Institute of Electrical and Electronics Engineers (IEEE) Computer Society|
|dc.title||Ascertaining the semantic and linguistic level of perceived risk in e-business interactions|
|dcterms.source.title||Proceedings of the workshop on business intelligence methodologies and applications (BIMA) collocated with IEEE international conference on e-business engineering (ICEBE 2008)|
|dcterms.source.series||Proceedings of the workshop on business intelligence methodologies and applications (BIMA) collocated with IEEE international conference on e-business engineering (ICEBE 2008)|
|dcterms.source.conference||Workshop on Business Intelligence Methodologies and Applications (BIMA 2008)|
|dcterms.source.conference-start-date||22 Oct 2008|
Copyright © 2008 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
|curtin.department||Centre for Extended Enterprises and Business Intelligence|
|curtin.faculty||Curtin Business School|
|curtin.faculty||School of Information Systems|