Show simple item record

dc.contributor.authorHussain, Omar
dc.contributor.authorChang, Elizabeth
dc.contributor.authorHussain, Farookh
dc.contributor.authorDillon, Tharam S.
dc.contributor.authorSoh, B.
dc.date.accessioned2017-01-30T14:30:39Z
dc.date.available2017-01-30T14:30:39Z
dc.date.created2008-11-12T23:21:40Z
dc.date.issued2005
dc.identifier.citationHussain, Omar and Chang, Elizabeth and Hussain, Farookh and Dillon, Tharam S. and Soh, Ben. 2005. : Context based riskiness assessment, in Harris, R. and King, H. (ed), IEEE TENCON, Nov 21 2005. Melbourne, Australia: IEEE.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/39133
dc.description.abstract

In almost every interaction the trusting peer might fear about the likelihood of the loss in the resources involved during the transaction. This likelihood of the loss in the resources is termed as Risk in the transaction. Hence analyzing the Risk involved in a transaction is important to decide whether to proceed with the transaction or not. If a trusting peer is unfamiliar with a trusted peer and has not interacted with it before in a specific context, then it will ask for recommendations from other peer in order to determine the trusted peer?s Riskiness value or reputation. In this paper we discuss the process of asking recommendations from other peers in a specific context and assimilating those recommendations according to its criteria of the interaction in order to determine the correct Riskiness value of the trusted peer.

dc.publisherIEEE
dc.subjectrisk transactions
dc.subjectP2P
dc.subjecttrusted peer
dc.subjectriskiness
dc.subjecttrust
dc.subjectinformation systems
dc.subjectpeer-to-peer
dc.subjecttrusting peer
dc.titleContext based riskiness assessment
dc.typeConference Paper
dcterms.source.titleProceedings of the IEEE TENCON
dcterms.source.seriesProceedings of the IEEE TENCON
dcterms.source.conferenceIEEE TENCON
dcterms.source.conference-start-dateNov 21 2005
dcterms.source.conferencelocationMelbourne, Australia
dcterms.source.placeMelbourne, Australia
curtin.note

Copyright 2005 IEEE

curtin.note

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.identifierEPR-562
curtin.accessStatusOpen access
curtin.facultyCurtin Business School
curtin.facultySchool of Information Systems


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record