Context based riskiness assessment
dc.contributor.author | Hussain, Omar | |
dc.contributor.author | Chang, Elizabeth | |
dc.contributor.author | Hussain, Farookh | |
dc.contributor.author | Dillon, Tharam S. | |
dc.contributor.author | Soh, B. | |
dc.date.accessioned | 2017-01-30T14:30:39Z | |
dc.date.available | 2017-01-30T14:30:39Z | |
dc.date.created | 2008-11-12T23:21:40Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Hussain, Omar and Chang, Elizabeth and Hussain, Farookh and Dillon, Tharam S. and Soh, Ben. 2005. : Context based riskiness assessment, in Harris, R. and King, H. (ed), IEEE TENCON, Nov 21 2005. Melbourne, Australia: IEEE. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/39133 | |
dc.description.abstract |
In almost every interaction the trusting peer might fear about the likelihood of the loss in the resources involved during the transaction. This likelihood of the loss in the resources is termed as Risk in the transaction. Hence analyzing the Risk involved in a transaction is important to decide whether to proceed with the transaction or not. If a trusting peer is unfamiliar with a trusted peer and has not interacted with it before in a specific context, then it will ask for recommendations from other peer in order to determine the trusted peer?s Riskiness value or reputation. In this paper we discuss the process of asking recommendations from other peers in a specific context and assimilating those recommendations according to its criteria of the interaction in order to determine the correct Riskiness value of the trusted peer. | |
dc.publisher | IEEE | |
dc.subject | risk transactions | |
dc.subject | P2P | |
dc.subject | trusted peer | |
dc.subject | riskiness | |
dc.subject | trust | |
dc.subject | information systems | |
dc.subject | peer-to-peer | |
dc.subject | trusting peer | |
dc.title | Context based riskiness assessment | |
dc.type | Conference Paper | |
dcterms.source.title | Proceedings of the IEEE TENCON | |
dcterms.source.series | Proceedings of the IEEE TENCON | |
dcterms.source.conference | IEEE TENCON | |
dcterms.source.conference-start-date | Nov 21 2005 | |
dcterms.source.conferencelocation | Melbourne, Australia | |
dcterms.source.place | Melbourne, Australia | |
curtin.note |
Copyright 2005 IEEE | |
curtin.note |
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.identifier | EPR-562 | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |