Int. J. Dependable Trust. Inf. Syst.最新文献

筛选
英文 中文
Internet Trust as a Specific Form of Technology Trust and its Influence on Online Banking Adoption 互联网信托作为技术信托的一种特殊形式及其对网上银行采用的影响
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2010-10-01 DOI: 10.4018/jdtis.2010100103
Sonja Grabner‐Kräuter, Rita Faullant
{"title":"Internet Trust as a Specific Form of Technology Trust and its Influence on Online Banking Adoption","authors":"Sonja Grabner‐Kräuter, Rita Faullant","doi":"10.4018/jdtis.2010100103","DOIUrl":"https://doi.org/10.4018/jdtis.2010100103","url":null,"abstract":"The construct of trust is important for online banking, because it underlies what is conducive to an enabling online banking environment. The authors report an empirical study with 381 bank customers in Austria that investigates the role of Internet trust as a specific form of technology trust in the context of Internet banking. Furthermore the impact of propensity to trust as a facet of personality on Internet trust is investigated. The findings stress the importance of Internet trust as a determinant of consumer attitudes toward Internet banking and its adoption. In addition, the results show that propensity to trust is a determinant not only for trust in interpersonal relationships but also for trust in technological systems.","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129334204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Mobile Service Platform for Trustworthy E-Learning Service Provisioning 面向可信赖电子学习服务提供的移动服务平台
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2010-07-01 DOI: 10.4018/jdtis.2010070101
Zongwei Luo, Tianle Zhang
{"title":"A Mobile Service Platform for Trustworthy E-Learning Service Provisioning","authors":"Zongwei Luo, Tianle Zhang","doi":"10.4018/jdtis.2010070101","DOIUrl":"https://doi.org/10.4018/jdtis.2010070101","url":null,"abstract":"Distant e-learning emerges as one of promising means for people to learn online. Although there is a substantial increase in computer and network performance in recent years, mainly as a result of faster hardware and more sophisticated software, there are still problems in the fields of integrating various resources towards enabling distant e-learning. Further, with the advances of technologies in RFID, sensors, GPS, GPRS, IP networks, and wireless networks, mobile learning is becoming a viable means for teaching and learning. In this book chapter, we develop a service platform for mobile learning with trustworthy service provisioning based on an organic integration of our prior research results in service grid, on demand e-learning, and trusted mobile asset tracking. In this platform, the virtual learning services for students, instructors and course providers are provided leveraging on service grid resource management capabilities on group collaboration, ubiquitous data access, and computing power. Challenges and requirements for mobile learning service platform are discussed. An RFID based e-learning data integration is proposed with integrated service networks for intelligent e-learning information access and delivery. DOI: 10.4018/978-1-60566-882-6.ch006 2 International Journal of Dependable and Trustworthy Information Systems, 1(3), 1-13, July-September 2010 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. The approach of “On-Demand e-Learning” intends to tackle the problems inherited from the inefficient use of data resources of existing database technology and traditional approach in offering e-learning package (Luo, Z., Fei, Y., & Liang, J., 2006) . The primary objective is to develop virtual learning service community for all community participants including students, instructors, and courseware providers leveraging on Service Grid technologies (Luo, Z., Zhang, J., & Badia, R. 2005), for e-learning services development and access, ubiquitous data access, group collaboration, and computing resource management. Furthermore, today’s world has witnessed the trend of convergence of computing and communication, and integration of sensor and mobile technologies for enabling a new generation of e-learning applications in a mobile and pervasive manner. With mobile applications becoming more and more attractive, location awareness is becoming a fundamental requirement in mobile e-learning solutions offering functions for such as mobile e-learning asset management to enable efficient utilization of resources. A key enabling technology for such location awareness is through positioning technologies, of which GPS, global poisoning system, is becoming more and more popular in outdoor environment. Other enabling technologies include Radio Frequency Identification (RFID), which could be used to uniquely identify an object. This RFID technology is particularly help","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121278403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Framework for Studying the Problem of Trust in Online Settings 网络环境下信任问题的研究框架
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2010-07-01 DOI: 10.4018/jdtis.2010070102
T. Guenther, Guido Möllering
{"title":"A Framework for Studying the Problem of Trust in Online Settings","authors":"T. Guenther, Guido Möllering","doi":"10.4018/jdtis.2010070102","DOIUrl":"https://doi.org/10.4018/jdtis.2010070102","url":null,"abstract":"The chapter contributes to the conceptual foundations of research on trust in online settings by introducing a framework of the preconditions and constitutive elements of trust. Moving beyond simplistic, narrow, and vague applications of the notion of trust, researchers are enabled by this framework to recognize when trust is relevant and to address a broader range of elements and processes involved in the social constitution of trust. By way of illustration and differentiation, the authors discuss trust issues in online marketplaces and online communities in greater detail. An important message from the chapter is that the problem of trust does not only occur in specific activities on a particular website but, more importantly, through the interconnectedness of the websites used and the development of complex online biographies. Accordingly, the authors advocate research methods that are not only are well-grounded conceptually but also geared praxeologically toward the actual experience and enactment of trust. DOI: 10.4018/978-1-61520-901-9.ch002 International Journal of Dependable and Trustworthy Information Systems, 1(3), 14-31, July-September 2010 15 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. elements involved in the constitution of trust and how they play out in online settings. We then discuss the implications of our framework, with particular emphasis on the methodological requirements and opportunities for empirical work in this area. In the conclusion, we highlight the value of a sound conceptual grounding of trust instead of invoking it too loosely in research on online relationships.","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129381791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trust Issues and Solutions in Multimedia Content Distribution 多媒体内容分发中的信任问题及解决方案
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2010-07-01 DOI: 10.4018/jdtis.2010070103
Shiguo Lian
{"title":"Trust Issues and Solutions in Multimedia Content Distribution","authors":"Shiguo Lian","doi":"10.4018/jdtis.2010070103","DOIUrl":"https://doi.org/10.4018/jdtis.2010070103","url":null,"abstract":"Multimedia content distribution is a key technique for multimedia services, which transmits multimedia content from a sender to certain receiver(s). With the popularity of multimedia services, the trust issues in content distribution becomes urgent, including the authorized access, privacy protection, trusted payment, piracy surveillance, and so forth. This chapter introduces the trust issues in multimedia content distribution (e.g., authorization, authentication, privacy, payment, ownership, illegal distribution, forgery, etc.), reviews the latest research progress of the solutions, and presents some open issues and promising research topics. It is expected to provide valuable information to researchers or engineers in this field. DOI: 10.4018/978-1-61520-682-7.ch005 International Journal of Dependable and Trustworthy Information Systems, 1(3), 32-54, July-September 2010 33 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. an important topic (Kelton, et al., 2008). And, many discussions of trust in this environment focus on issues like security or technical reliability. Specially, in security engineering, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy (Taipale, 2005). As such, a trusted system is one whose failure may break a specified security policy. It is often defined from four aspects, i.e., classified information, trusted computing, policy analysis and information theory. In classified information, trusted systems are used for the processing, storage and retrieval of sensitive or classified information. In trusted computing, trust is used by the Trusted Computing Group (TCG, 2009) mainly in the sense of authorization that defines whether a user is authorized to do something. In policy analysis, trusted systems in the context of national or homeland security, law enforcement, or social control policy are systems in which some conditional prediction about the behavior of people or objects within the system has been determined prior to authorizing access to system resources. In information theory, a trusted system is based on the definition of ‘Trust is that which is essential to a communication channel but cannot be transferred from a source to a destination using that channel’ (Gerck, 1998). This chapter will focus on the trust in security engineering. Multimedia content distribution (e.g., digital TV, mobile TV, IPTV, online music, etc.) is a kind of digital information system (Lian & Zhang, 2009), which becomes more and more popular with the rapid development of network technology and multimedia technology. Thus, the trust in multimedia content distribution is urgent, especially the security aspects. Generally, a multimedia distribution system, composed of the sender (and device), receiver (and device), transmission channel, storage device, etc., distributes the multimedia content from the","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125270619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trusted Platform Validation and Management 可信平台验证与管理
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2010-04-01 DOI: 10.4018/jdtis.2010040101
A. Schmidt, Andreas Leicher, Inhyok Cha, Yogendra Shah
{"title":"Trusted Platform Validation and Management","authors":"A. Schmidt, Andreas Leicher, Inhyok Cha, Yogendra Shah","doi":"10.4018/jdtis.2010040101","DOIUrl":"https://doi.org/10.4018/jdtis.2010040101","url":null,"abstract":"","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130476192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Information Technology, Political Institutions, and Generalized Trust: An Empirical Assessment Using Structural Equation Models 信息技术、政治制度与广义信任:使用结构方程模型的实证评估
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2010-04-01 DOI: 10.4018/jdtis.2010040103
Blaine G. Robbins, M. Grigoryeva
{"title":"Information Technology, Political Institutions, and Generalized Trust: An Empirical Assessment Using Structural Equation Models","authors":"Blaine G. Robbins, M. Grigoryeva","doi":"10.4018/jdtis.2010040103","DOIUrl":"https://doi.org/10.4018/jdtis.2010040103","url":null,"abstract":"In a recent study, the authors reveal with structural equation models that the positive effect of information technology on generalized trust is mediated by political institutions. Although insightful, a key question remains: Is it the effectiveness and efficiency, the universality, and/or the power-sharing capacity of the state that mediates this effect? Drawing on new institutional economics, political culture, and theories of the welfare state, the authors derive a number of hypotheses connecting information technology to generalized trust vis-à-vis elements of the state. The study shows with structural equation models that what accounts for the technology-trust relationship is not necessarily the public allocation of resources or political mechanisms of sharing power, but the incentive structures found in effective and efficient legal institutions that reduce uncertainty and increase generalized trust. The paper concludes by outlining the implications and directions for future research. DOI: 10.4018/jdtis.2010040103 56 International Journal of Dependable and Trustworthy Information Systems, 1(2), 55-69, April-June 2010 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Nannestad (2008) recently noted that the determinants of trust can generally be categorized within four broad explanations—institutions (Delhey & Newton, 2005; Knack & Keefer, 1997), social relationships (Putnam, 2000), homophily (Brewer, 1981; Putnam, 2007), and cultural values (Uslaner, 2000)—relatively little attention has been paid to the role that information technology plays in producing trust. In an attempt to address this empirical void, Robbins and Grigoryeva (2010) tested a new institutional model of trust (Greif, 2006; North, 1990), while contrasting this approach with divergent predictions from an overjustification and crowding perspective (Mulder, Dijk, De Cremer, & Wilke, 2006; Deci, Koestner, & Ryan, 1999). They found with structural equation models (SEM) that political institutions foster generalized trust, and to the extent that technology encourages generalized trust, it does so indirectly, operating through political institutions. They suggest that the effect of political institutions is observed because technology alters relative prices and/ or strengthens monitoring and sanctioning capacity. This promotes the emergence and expansion of political institutions that then reduce perceived uncertainty and cultivate trust. While this is a key contribution to the generalized trust literature, we argue that it is difficult to determine, with their current measurement of “formal institutions”, which elements of the state mediate the technologytrust relationship. In this vein, we place political institutions at the center of our analysis and attempt to disentangle the features of political institutions that account for how information technology produces trust. Our hypotheses foll","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"1 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134287559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Benchmarking Untrustworthiness: An Alternative to Security Measurement 对不可信度进行基准测试:安全度量的替代方案
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2010-04-01 DOI: 10.4018/jdtis.2010040102
Afonso Araújo Neto, M. Vieira
{"title":"Benchmarking Untrustworthiness: An Alternative to Security Measurement","authors":"Afonso Araújo Neto, M. Vieira","doi":"10.4018/jdtis.2010040102","DOIUrl":"https://doi.org/10.4018/jdtis.2010040102","url":null,"abstract":"Benchmarking security is hard and, although there are many proposals of security metrics in the literature, no consensual quantitative security metric has been previously proposed. A key difficulty is that security is usually more influenced by what is unknown about a system than by what is known. In this paper, the authors propose the use of an untrustworthiness metric for benchmarking security. This metric, based on the idea of quantifying and exposing the trustworthiness relationship between a system and its owner, represents a powerful alternative to traditional security metrics. As an example, the authors propose a benchmark for Database Management Systems (DBMS) that can be easily used to assess and compare alternative database configurations based on minimum untrustworthiness, which is a low-cost and high-reward trust-based metric. The practical application of the benchmark in four real large database installations shows that untrustworthiness is a powerful metric for administrators to make informed security decisions by taking into account the specifics needs and characteristics of the environment being managed. DOI: 10.4018/jdtis.2010040102 International Journal of Dependable and Trustworthy Information Systems, 1(2), 32-54, April-June 2010 33 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. consider complex environments where security vulnerabilities may exist due to the combination of several distinct characteristics of the system, including the environment around it and how it is used (e.g., a database accessed by several applications and users). Insecurity metrics based on risk (Jelen & Williams, 1998) try to cope with the uncertainty associated with security goals by incorporating the probability of attacks. Risk is usually defined as the product of the likelihood of an attack by the damage expected if it happens. This metric can be used to decide if the risks are acceptable and to decide which ones have to be mitigated first. The problem is that it is very easy to underestimate or overestimate these values. This is, obviously, a major problem when they are used for supporting security related decisions. Traditional security and insecurity metrics are hard to define and compute (Torgerson, 2007) because they involve making isolated estimations about the ability of an unknown individual (e.g., a hacker) to discover and maliciously exploit an unknown system characteristic (e.g., vulnerability). In practice, it is assumed that such metrics can be computed using information about the system itself, and they depend only on the systems properties. Therefore, they are universal and have the same value when seen from different perspectives (e.g., the administrators’ versus the attackers’ point of view). In spite of the usefulness of such metrics, they are not necessarily the only way of quantifying security aspects. Consider the definition of a useful ","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Trust Over the Net: The Case of Israeli Youth 网络上的信任:以色列青年的案例
Int. J. Dependable Trust. Inf. Syst. Pub Date : 2010-04-01 DOI: 10.4018/jdtis.2010040104
Oren Golan
{"title":"Trust Over the Net: The Case of Israeli Youth","authors":"Oren Golan","doi":"10.4018/jdtis.2010040104","DOIUrl":"https://doi.org/10.4018/jdtis.2010040104","url":null,"abstract":"","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"43 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125888660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Interpretive Study of Critical Issues in Electronic Health Information Exchange 电子卫生信息交换关键问题的解释性研究
Int. J. Dependable Trust. Inf. Syst. Pub Date : 1900-01-01 DOI: 10.4018/jdtis.2011010101
S. Cannoy
{"title":"An Interpretive Study of Critical Issues in Electronic Health Information Exchange","authors":"S. Cannoy","doi":"10.4018/jdtis.2011010101","DOIUrl":"https://doi.org/10.4018/jdtis.2011010101","url":null,"abstract":"In this paper, the author examines the critical issues that have emerged in the area of electronic healthcare information exchange (HIE) in the United States. An interpretive, longitudinal study was conducted over a total of four years through a study of seven field cases. This paper aggregates findings from these seven efforts into one research study for a more comprehensive view of HIE issues. The findings provide a framework for understanding the issues of HIE for researchers and practitioners. Research, teaching, and practitioner implications are discussed. medication lists could put the patient at risk for interactions. There are also an increasing number of patients with chronic illnesses or patients who are transient (moving from one doctor to another, perhaps due to changes in employment and insurance coverage). Due to these reasons, it will be critical to improve the management of health information so that it is accessible at the point of care and will improve health outcomes. In response to the need to share patient information between providers, the healthcare industry is transforming the way that it manages health information. In the United States, the federal government has mandated that Electronic Health Records (EHR) be adopted by 2014 (Durkin, 2009). Electronic Health Record systems can capture and store patient health information. The sharing of EHR information DOI: 10.4018/jdtis.2011010101 2 International Journal of Dependable and Trustworthy Information Systems, 2(1), 1-17, January-March 2011 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. between providers is called Health Information Exchange (HIE), and the goals are to improve the quality of healthcare and to reduce costs (Jha, 2006; Barrick & Iyer, 2010). If healthcare providers have accurate patient records at the point-of-care, the premise is that they will be able to make better medical decisions and avoid duplicate tests (CHCF, 2007; Mertz & Folkemer, 2008). Unfortunately, one issue impeding Health Information Exchange has been the reluctance of physicians to implement EHR systems due to cost, workflow interruptions, privacy and security issues, and uncertainty about which system to implement (DesRoches et al., 2008). There are conflicting adoption rate of EHR systems reported in research (DesRoches et al., 2008; Jha et al., 2008), but the rates for adoption of “basic” EHR systems seem to have risen between 2007 to 2008 to approximately 44% to 50% (Bakhtiari, 2010; McKinney, 2010). Reporting of EHR adoption depends on how a “functional” EHR system is defined in the studies since there is no standard definition of EHR adoption (Jha et al., 2006). This is because EHRs contain many functionalities such as patient demographics; medication lists; clinical notes; electronic order-entry management for prescriptions, lab tests, radiology tests; results management of electronic results fo","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115984430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Structured Content Analytic Assessment of Business Services Advertisements in the Cloud-Based Web Services Marketplace 基于云的Web服务市场中商业服务广告的结构化内容分析评估
Int. J. Dependable Trust. Inf. Syst. Pub Date : 1900-01-01 DOI: 10.4018/jdtis.2011010102
Sandra A. Vannoy
{"title":"A Structured Content Analytic Assessment of Business Services Advertisements in the Cloud-Based Web Services Marketplace","authors":"Sandra A. Vannoy","doi":"10.4018/jdtis.2011010102","DOIUrl":"https://doi.org/10.4018/jdtis.2011010102","url":null,"abstract":"The Internet and emerging technologies are facilitating the creation of new marketplaces designed to address a diverse range of business and societal needs. As companies are utilizing technology to manage their business processes, such a marketplace has emerged that is designed to provide third-party availability of business services delivered via Web services technology, particularly in the context of Cloud Computing. The Web Services Marketplace creates a common trading ground wherein buyers and sellers of business services can come together within a centralized marketplace. However, sellers of business services must provide a mechanism by which knowledge and awareness of the service is created for the buyer and a means by which sellers can effectively compete in the marketplace. The most widely accepted method for accomplishing these tasks is advertising. This study investigates the nascent phenomenon of the advertising of business services within the Web services marketplace, develops a theoretically grounded definition and characteristics of business services offered in the Web Services Marketplace, and develops a model for the effective advertisement of business services offered in the Web Services Marketplace. sellers come together to complete a satisfactory transaction. Recent research indicates (Roth, 2007) that in order for new emerging markets to survive, market designers must understand the workings and requirements of the marketplace in question. In particular, equilibrium of buyers and sellers must be achieved wherein buyers are capable of making acceptable choices among alternative offerings. As technology is DOI: 10.4018/jdtis.2011010102 International Journal of Dependable and Trustworthy Information Systems, 2(1), 18-49, January-March 2011 19 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. increasingly being utilized to automate business processes, we are witnessing the emergence of the Web Services electronic marketplace that has been designed to provide a mechanism by which buyers and sellers of business services delivered via Web Services technologies can benefit from the efficiencies provided by a centralized marketplace. In question, however, is whether an effective mechanism is in place within the marketplace that will enable buyers of business services to make suitable choices among the various alternatives available. The purpose of this research is to conduct an examination of a Web Services Marketplace in an effort to determine the effectiveness of the buyer/seller relationship and to develop the tools necessary for such an examination. Business Services Delivered via the Web Services Mechanism A 2006 IDC report states that 2007 will see the beginning of a “hyper-disruption” in business models as business processes are offered as business services through online delivery mechanisms (IDC, 2006). Emerging Internet standards such as X","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130569236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信