Context and time based riskiness assessment for decision making
|dc.contributor.author||Dillon, Tharam S.|
|dc.identifier.citation||Hussain, Omar and Chang, Elizabeth and Hussain, Farookh and Dillon, Tharam S. and Soh, Ben. 2006. : Context and time based riskiness assessment for decision making, in Dini, P. and Lorenz, P. and Atmaca, T. and de Souza, J.N. (ed), International Conference on Internet and Web (ICIW), Feb 19 2006, pp. 104-109. Guadeloupe, French Caribbean: IEEE Computer Society Press.|
In an e-commerce interaction carried out in a Peer-to-Peer environment it is rational for the trusting peer to analyze the Risk that could be involved in dealing with a trusted peer as there is a lack of central management in these type of interactions. Risk analysis can be done by assimilating recommendations from other peers if there is no previous interaction history between the trusting peer and the trusted peer. But the assimilated recommendations might be according to the criteria of the recommending peer with the trusted peer, and it is not necessary for the trusting peer to have the same criteria in its interaction with the trusted peer as that of the recommending peer even thought it is interacting in the same context. Further it might interact in a different time as that of the recommending peer. The Risk that was present in a particular context and at a particular time might not be the same at a different time. Hence in this paper we discuss the process of the trusting peer assimilating the recommendations from the recommending peers according to the context, criteria and time of its interaction in order to determine the Riskiness value of the trusted peer, which would help it considerably in decision making.
|dc.publisher||IEEE Computer Society Press|
|dc.title||Context and time based riskiness assessment for decision making|
|dcterms.source.title||Proceedings of the Advanced International Conference on Telecommunications (AICT) and the International Conference on Internet and Web (ICIW)|
|dcterms.source.series||Proceedings of the Advanced International Conference on Telecommunications (AICT) and the International Conference on Internet and Web (ICIW)|
|dcterms.source.conference||International Conference on Internet and Web (ICIW)|
|dcterms.source.conference-start-date||Feb 19 2006|
|dcterms.source.conferencelocation||Guadeloupe, French Caribbean|
Copyright 2006 IEEE
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
|curtin.department||Centre for Extended Enterprises and Business Intelligence|
|curtin.faculty||Curtin Business School|