Page 277 - Trust in ICT 2017
P. 277

Trust in ICT                                                5


                    owner attaches on-board diagnostic scanner in the car, he can confirm the condition of the car and
                    identify problems via applications on a smartphone.
            4)      A dealer registers the car with explanatory data about the car in the marketplaces connecting with
                    a number of service brokers. At this time, the car is ready for sales.
            5)      A buyer can search number of used cars in order to purchase the car.
            6)      When a buyer is interested in a specific car, he or she can ask the service brokers relevant data and
                    information.  Then,  trust  information  provider  replies  service  broker’s  requests  by  providing
                    processed trustful data including the trust index of owner, registered car, and seller (or dealer).
            7)      In order to help a buyer’s purchase decision, a service broker visualizes the analysis results.
            8)      A buyer can make a purchase decision with relatively low risk and uncertainty.
            9)      The used car transaction occurs among parties.
            10)     After completing the transaction, transaction commission can be transferred. The commission rate
                    and recipient depends on business model and pre-determined rules.




                                                     Bibliography

            [b-Chen-2014]       J. Chen, et al., “Waas: Wisdom as a Service,” IEEE Intelligent Systems, vol. 29, no. 6,
                                pp. 40-47, 2014.
            [b-Rowley]          J. Rowley, “The wisdom hierarchy: representations of the DIKW hierarchy,” Journal of
                                Information Science, vol. 33, no. 2, pp. 163-180, April 2007.
            [b-Mayer]           R.Mayer, J. Davis, and F. Schoorman, An Integrated Model of Organizational Trust,
                                Academy of Management Review, 1995, vol.20, N0. 3, pp. 709-734
            [b-Colquitt]        J. A. Colquitt, B. A. Scott, and J. A. LePine, “Trust, trustworthiness, and trust
                                propensity: a meta-analytic test of their unique relationships with risk taking and job
                                performance,” Journal of Applied Psychology, vol. 92, no. 4, pp. 909-927, 2007.
            [b-Brauch]          H. G. Brauch, “Concepts of Security Threats, Challenges, Vulnerabilities and Risks,”
                                Copying with Global Environmental Change, Disasters and Security, vol. 5, pp. 61-106,
                                2011.
            [b-Wilson]          C.Wilson, “Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues
                                for congress,” CRS Report for Congress DTIC Document, Washington DC, 2008.
            [b-Weber]           R. H. Weber, “Internet of Things – New security and privacy challenges,” Computer
                                Law & Security Review, vol. 26, no. 1, pp. 23-30, 2010.
            [b-Chen-2015]       F. B. J. G. Ing-Ray Chen, “Trust-based Service Management for Social Internet of
                                Things Systems,” IEEE Transactions on Dependable and Secure Computing, 2015.
            [b-Bao]             F. Bao, I. R. Chen, and J. Guo, “Scalable, Adaptive and Survivable Trust Management
                                for Community of Interest Based Internet of Things Systems,” 11th International
                                Symposium on Autonomous Decentralized System, Mexico City, Mexico, 2013.


















                                                                                                         269
   272   273   274   275   276   277   278   279   280   281   282