2010
DOI: 10.1007/s10660-010-9064-y
|View full text |Cite
|
Sign up to set email alerts
|

The design of a reliable reputation system

Abstract: Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains. Zero accountability via anonymous online identities and divergent interests result in selfish behavior that can disrupt or manipulate networks for personal gain. While "reputation systems" are recognized as a promising means to establish social control for such communities, developing reliable reputation systems remains a challenge. Seve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
42
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 72 publications
(44 citation statements)
references
References 60 publications
0
42
0
1
Order By: Relevance
“…The rising importance of security and privacy issues has fostered security and privacy policy research (6 %) in recent years (e.g., Aljukhadar et al 2010;Swamynathan et al 2010;Choi and Jiang 2013;Dhillon and Chowdhuri 2013;Phan and Cavusoglu 2013;Wilson et al 2014;Xu et al 2013). These articles solely investigate social networking sites (5 articles) and social shopping websites (2 articles).…”
Section: Research Theme: Security and Privacy Policymentioning
confidence: 99%
See 1 more Smart Citation
“…The rising importance of security and privacy issues has fostered security and privacy policy research (6 %) in recent years (e.g., Aljukhadar et al 2010;Swamynathan et al 2010;Choi and Jiang 2013;Dhillon and Chowdhuri 2013;Phan and Cavusoglu 2013;Wilson et al 2014;Xu et al 2013). These articles solely investigate social networking sites (5 articles) and social shopping websites (2 articles).…”
Section: Research Theme: Security and Privacy Policymentioning
confidence: 99%
“…They find that perceived impression management capabilities serve as a primary driver not only of perceived social benefits but also as primary driver of usage intentions and hence as key counterweight in the tension between users' benefits using online social networks and their privacy concerns. Concerning security issues in reputation systems, Swamynathan et al (2010) propose solutions to address the two main reasons for erroneous values produced by reputation systems, namely user collusion and short-lived online identities. Hence, all of these articles provide detailed and hands-on criteria that influence users' privacy and security concerns, which in turn enables businesses to get the most out of social commerce by reducing their customers' concerns.…”
Section: Research Theme: Security and Privacy Policymentioning
confidence: 99%
“…1. Generic process of a reputation system, inspired by [9] information are two areas being intensively studied. Among others, trust is one important topic at this juncture.…”
Section: A Big Datamentioning
confidence: 99%
“…Those steps were adapted from the three fundamental phases of reputation systems identified by [10] and [11]: feedback generation/collection, feedback aggregation and feedback distribution. Feedback aggregation as the central part of every trust and reputation system was furthermore divided into three process-steps filtering, weighting and aggregation taken together as computation.…”
Section: The Generic Process Of Reputation Systemsmentioning
confidence: 99%
“…1. Generic process of a reputation system, inspired by [10] Computation The computation phase is the central part of every reputation system which takes the reputation information collected as input and generates a trust/reputation value as output. This phase can be divided into the three generic process-steps filtering, weighting and aggregation.…”
Section: The Generic Process Of Reputation Systemsmentioning
confidence: 99%