DOI QR코드

DOI QR Code

Trust-based business model in trust economy: External interaction, data orchestration and ecosystem value

  • Received : 2018.02.03
  • Accepted : 2018.02.27
  • Published : 2018.03.30

Abstract

The aim of this study is to formulate a trust-based business model of Internet services in so called the "trust economy." For it, firstly concepts of trust and trust economy are discussed. Then, we present previous literatures' review of trust in social science prism and trust economy in economic prism. This study classified the literatures' stances with two viewpoints of the 'system' and the 'user'. With this backdrop, we discuss three contradictory stances: Internal optimization vs. external interaction, personal data control vs. orchestration, and end-user vs. ecosystem value. In the result, we formulate a trust-based business model framework with three trust issues in user perspective and suggests three strategic directions related three issues along with representative use cases.

Keywords

References

  1. D.H. McKnight and N.L. Chervany, The Meanings of Trust, Scientific report, University of Minnesota, 1996.
  2. R.C. Mayer, J.H. Davis, and F.D. Schoorman, "An integrative model of organizational trust," Academy of Management Review, Vol. 20, No. 3, pp. 709-734, 1996. https://doi.org/10.5465/AMR.1995.9508080335
  3. W. Bamberger, "Interpersonal Trust - Attempt of a Definition. Scientific report," Technische Universitat Munchen. Retrieved on Aug. 16, 2011.
  4. A.B. Seligman, "On the limits of Confidence and Role Expectations," American Journal of Economics and Sociology, Volume 57, Issue 4, pp. 391-404, October 1998. https://doi.org/10.1111/j.1536-7150.1998.tb03372.x
  5. A. McCullagh, "Trust, Contract and Economic Cooperateion," Cambridge Journal of Economics, Vol. 23, pp 301-315, 1998.
  6. A. Kine and J. Choobineh, "Trust in Electronic Commerce; Definition and Theoretical Considerations," in W. Blanning and D. King(eds.), Proceeding s of the 31 Annual Hawaii Conference on System Sciences, Volume IV, IEEE Computer Society, 1998.
  7. M. Kosfeld, M. Heinrichs, P.J. Zak, U. Fischbacher, and E. Fehr, "Oxytocin increases trust in humans," Nature435, pp. 673-676, 2005. https://doi.org/10.1038/nature03701
  8. R. Hardin, (eds.), Trust and trustworthiness. Russell Sage Foundation, 2002.
  9. B. Shneiderman, "Designing trust into online experiences," Communications of the ACM, Volume 43, Nr.12. pp. 57-59, 2000.
  10. M. Taddeo, "Defining trust and e-trust," in: A. Mesquita, Sociological and Philosophical Aspects of human interaction with technology, Information Science Reference, pp. 23-25, 2011.
  11. D. Helbing, "A mathematical model for the behavior of individuals in a social field," J. Math. Sociol., Vol. 19, Nr. 3, pp. 189-219, 1994. https://doi.org/10.1080/0022250X.1994.9990143
  12. G. Mollering, "The nature of trust: From geog simmel to a theory of expectation, interpretation and suspension", Sociol., Vol. 35, pp. 403-420, 2002.
  13. L.D. Molm, N. Takahashi, and G. Peterson, "Risk and trust in social exchange: An experimental test of a classical proposition," Amer. J. Sociol., Vol. 5, Nr. 105, pp. 1396-1427, 2000
  14. F. Huang, "Building social trust: A human-capital approach," J. Institut. Theor. Econ., Vol. 163, Nr. 4, pp. 552-573, 2007. https://doi.org/10.1628/093245607783242981
  15. M. Maheswaran, H.C. Tang, and A. Ghunaim, "Towards a gravity-based trust model for social networking systems," in International Conference on Distributed Computing Systems Workshops. IEEE Computer Society, Los Alamitos, CA, Sep. 24, 2007.
  16. D. Hughes, G. Coulson, and J. Walkerdine, "Free riding on gnutella revisited: The bell tolls?" IEEE Distrib. Syst. Online 6, Nr. 1, 2005.
  17. J. Yao, S. Chen, S. Nepal, D. Levy, and J. Zic, "Truststore: Making amazon s3 trustworthy with services composition," in the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGRID'10). IEEE Computer Society, Los Alamitos, CA, pp. 600-605, 2010.
  18. D. Moreland, S. Nepal, H. Hwang, and J. Zic, "A snapshot of trusted personal devices applicable to transaction processing," Personal Ubiq. Comput, Vol.14, Nr. 4, pp. 347-361, 2010. https://doi.org/10.1007/s00779-009-0235-6
  19. A. Seshadri, A. Perrig, L. Van Doorn, and P.K. Khosla, "SWATT: Software-based attestation for embedded devices," in the IEEE Symposium on Security and Privacy, pp. 272-282, 2004.
  20. L. Chen & J. Li, "Revocation of direct anonymous attestation," in the 2nd International Conference on Trusted Systems (INTRUST'10), pp.128-147, 2010.
  21. L. Mui, Computational models of trust and reputation: Agents, evolutionary games, and social networks, Ph.D. thesis, http://groups.csail.mit.edu/medg/people/lmui/docs/phddissertation.pdf., 2003.
  22. W. Sherchan, S. Nepal, and C. Paris, "A Survey of Trust in Social Networks," ACM Computing Surveys, Vol. 45, Nr. 4, Article 47, Aug. 2013.
  23. P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, "Reputation systems," Comm. ACM, Vol. 43, Nr. 12, pp. 45-48, 2000.
  24. S. Ruhomaa, L. Kutvonen, and E. Koutrouli, "Reputation management survey," in the 2nd International Conference on Availability, Reliability and Security (ARES'07), IEEE Computer Society, pp. 103-111, 2007.
  25. M. Momani & S. Challa, "Survey of trust models in different network domains," Int. J. Ad Hoc Sensor Ubiq. Comput., Vol. 1, Nr. 3, pp. 1-19, 2010. https://doi.org/10.5121/ijasuc.2010.1301
  26. G. Suryanarayana & Taylor. R., "A survey of trust management and resource discovery technologies in peer-to-peer applications," Tech. rep. UCI-ISR-04-6, Institute for Software Research, University of California, Irvine, 2004.
  27. P. Beatty, I. Reay, S. Dick, and J. Miller, "Consumer trust in e-commerce web sites: A metastudy," ACM Comput. Surv., Vol. 43, Nr.2, pp. 1-46, 2011.
  28. T. Grandison & M. Sloman, "A survey of trust in Internet applications," IEEE Comm. Surv. Tutorials 3, Nr. 4, 2000.
  29. Z. Malik, I. Akbar, and A. Bouguettaya, "Web services reputation assessment using a hidden markov model," in the 7th International Joint Conference on Service-Oriented Computing (ICSOCServiceWave'09), pp.576-591, 2009.
  30. E. Chang, T.S. Dillon, and F. Hussain, "Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence," Wiley Periodicals, 2006.
  31. Y. Wang & J. Vassileva, "A review on trust and reputation for web service selection," in the 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07). IEEE Computer Society, pp. 25-32, 2007.
  32. A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decis. Support Syst., Vol. 43, Nr. 2, pp. 618-644, 2007. https://doi.org/10.1016/j.dss.2005.05.019
  33. J. Golbeck, "Trust on the World Wide Web: A survey," Found. Trends Web Sci. Vol. 1, Nr. 2, pp. 131-197, 2006. https://doi.org/10.1561/1800000006
  34. W.C. Hang & M.P. Singh, "Trust based recommendation based on graph similarities," http://www.csc.ncsu.edu/faculty/mpsingh/papers/mas/aamas-trust-10-graph.pdf., 2010
  35. Y. Zuo, W.-C. Hu, and T, O'Keefe, "Trust computing for social networking," in the 6th International Conference on Information Technology: New Generations, IEEE Computer Society, Los Alamitos, CA, pp. 1534-1539, 2009.
  36. J. Caverlee, L. Liu, and S. Webb, "Socialtrust: Tamper-resilient trust establishment in online communities," in the 8th ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL'08). ACM Press, New York, pp.104-114, 2008.
  37. H. Liu, E.-P. Lim, H.W. Lauw, M.-T. Le, A. Sun, J. Srivastava, and Y.A. Kim, "Predicting trusts among users of online communities: An epinions case study," in the 9th ACM Conference on Electronic Commerce (EC'08), ACM Press, New York, pp. 310-319, 2008.
  38. J. O'Donovan, B. Smyth, V. Evrim, and D. Mcleod, "Extracting and visualizing trust relationships from online auction feedback comments," in the 20th International Joint Conference on Artificial Intelligence, Morgan Kaufmann Publishers, San Francisco, pp. 2826-2831, 2007.
  39. A. Guerriero, S. Kubicki, and G. Halin, "Trust-oriented multi-visualization of cooperation context," in the 2nd International Conference in Visualisation (VIZ'09), IEEE Computer Society, Los Alamitos, CA, pp. 96-101, 2009.
  40. K.K. Bimrah, H. Mouratidis, and D. Preston, "Modelling trust requirements by means of a visualization language," in the Conference on Requirements Engineering Visualization (REV'08), IEEE Computer Society, Los Alamitos, CA, 26-30, 2008.
  41. P. Massa & P. Aversani, "Trust-aware recommender systems," in the 1st ACM Conference on Recommender Systems (RecSys'07), ACM Press, New York, 2007.
  42. G.A. Guerra, D.J. Zizzo, W.H. Dutton, and M. Peltu, "Economics of Trust in the Information Economy: Issues of Identity, Privacy and Security," Oxford Internet Institute, Research Report No.1, April 2003.
  43. Y. Wang, Y. Hori, and K. Sakurai, "Economic-inspired truthful reputation feedback mechanism in p2p networks," in the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, pp.80-88, 2007.
  44. M.W. Van Alstyne, G.G. Parker, and P.G. Sangeet, "Pipeline, Platforms, and the New Rules of strategy," HBR.org., April 2016.
  45. B. Carminati, E. Ferrari, and M. Viviani, "Security and Trust in Online Social Networks," in Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2014
  46. Y. Cheng, J. Park, and R. Sandhu, "Relationship-based access control for online social networks: Beyond user-touser relationships," in 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing, 2012.