Xem mẫu

A Roadmap for Ambient E-Service ambient environments. The ambient e-service DSSOLFDWLRQVDUHFDWHJRUL]HGUHÀHFWLQJWKHLBS types (transaction service, information service, navigation, and tracking service and safety ser-vice) as well as exhibiting dynamic collected efforts based on the peer-to-peer design. :H¶OOWDNHWKH³$PELHQWVKRSSLQJPDOOVFH-nario” for example. The Ambient shopping mall VFHQDULRLVFODVVL¿HGDVDGLVWULEXWHGWUDQVDFWLRQ service. In a shopping mall (fully equipped with wireless network infrastructures), information items (e.g., advertisement or sales promotion information) can be broadcast to passing-by peers with information broadcast station. Peers in different locations receive different information items depending on their preference. This means the experience and attained information items of peers are different to their locations and user context (e.g., user preference or interest). That is, the attained information items of a peer vary based on the peer’s interactions with the shopping mall ambient environments. The customers are not required to go all over the shopping mall to receive the broadcast information items, but just pay little money to acquire a suitable information items service package based on their preferences. Alternatively, a mobile agent peer for customer can inquire with nearby peers for what they want and proceed a bartering process. This will help WKHQHZHQWHULQJFXVWRPHUVLQKXUU\WRHI¿FLHQWO\ acquire the shopping mall information. This scenario delineates not only the case of new customers with high buyer perishability (entering the shopping mall and being in a rush to buy certain items without the knowledge of where to buy and how to buy cheap given relevant sales promotion), but also carry out the collective efforts of mobile users (e.g., collective bargaining, collective buy, or some collective agreement). Through a transaction e-service, information items (e.g., e-coupons) can be distributed not only to the mobile users falling into the broadcast range of the distributor companies, but also to the primary target peers (who really need the certain e-coupons in the right time and right place). However, in such an ad-hoc structured environment, peers might not recognize each other. Should we trust the entire information sources? There are no evidences that all the peers are trustable. What if there is someone trying to acquire my sensitive information? There is a pos-sibility of act of swindling; hence, users should protect themselves from any possible forms of harm. Considering a mobile user’s willingness of participation, the safety and privacy issue remain the major concern. If the number of participants of an e-service diminishes, the e-service application would collapse. Accordingly, a convenient and safe environment would encourage users to participate and interact with each other. Since different e-service applications should cope with different circumstances and bear different restrictions, the framework of ASEM outlines the guidelines for the implementation of ambient e-service. For example, if the trading process employs a bartering mechanism (that does not involve real money), the required level of trust is comparatively lower than those using RI¿FLDOFXUUHQF\,QRWKHUZRUGVYDULRXVDPELHQW e-service applications are of particularly different concerns of the factors outlined in ASEM and lead to different ambient e-service implementation. ASEM also enables diminishing the chance of fraud and deceit. Mobile users can obtain necessary decision information of certain assured quality from nearby sources (e.g. mobile users, service providers). Different information sources are exerted to facilitate great utilities derived in behalf of users. Once the risk level of transactions can be curtailed, the convenience interactions of ambient e-services would be more prevalent and aggrandizing the chances of realizing the power of the collective efforts between mobile users. Platform Design Domain In this section, we bring up some ideas for the future design of ambient e-service platforms (that constitute dynamic identity management, ambient 2354 A Roadmap for Ambient E-Service data access control, seamless unlinkability management, and convenience data access control). Dynamic identity management and ambient data access control particularly concern the nature of an ambient e-service’s environment (e.g., wireless communication distance, handheld device storage capacity, and temporary identity). For the example of the shopping mall scenario application, the communication ranges of the ad-hoc wireless networks centered on a mobile user vary from place to place. The mobile user is required to update the surrounding nearby peer list at their current location, and check if there are RWKHUSHHUV¶RIIHULQJV¿WWLQJWKHLUQHHGV7KDWLV the information update of the surrounding peers is necessary. However, the desired update type (update frequency) varies between applications. In the shopping mall application, it is not necessary to engage a constant update of the list of the surrounding peers because the movement of a user often is not so fast. Accordingly, a periodical update type is a right choice of the update-type design for the ambient shopping mall scenario. This short-term lifetime identity is a unique property in ambient environments. As men-tioned in the ASEM section, Dynamic Identity Management aims to issue different identities for a mobile peer when the peer leaves the en-vironment and re-enters the environment again (even though the mobile device used is the same). However, existing P2P systems/solutions are still with long-lived identities. For instance, as addressed in Resnick, Zeckhauser, Friedman, and Kuwabara (2000), reputation systems generally take on three properties: (1) entities are long-lived; (2) feedback about current interactions is captured and distributed; (3) past feedback guides buyer decisions. In other words, the identities in ambi-ent e-service environments are short-lived and localized, and thus existing methods/solutions requiring long-lived identities can not be applied to our environments. On the other hand, the nature of ambient environment (localized/short period lifetime’s identities) could result in the material change of the reputation’s basics as well as other is-sues (trust/traceability/privacy). How to derive a reputation system coping with the nature of ambient environments accordingly becomes new a challenge to straighten out. Regarding seamless unlinkability management, the requirements for different ambient e-service scenarios are also different. In the ambient shopping mall scenario, if a transaction involves just information items, the amount of necessary information required would be less than those transactions that involve real money. Required security level for privacy concern (e.g., identity tracing back concern, transaction records) can be handled by associating weights with respect to a user’s unique needs and circumstances. A blind signature method provides higher untraceable level than the pseudo identity. Alternatively, a user may have various role identities for different transactions, and this then involves both dynamic identity management and seamlessunlinkability management. Convenience data access control facilitates the ambient e-service realization. A single sign-on authorization is more acceptable than those complex authorization processes. While the identity authentication can be achieved by various techniques (e.g., Strong authentication, password, etc.), the proper method is based on a users’ unique needs and preference. Respecting the heterogeneity of data sources, since all data sources have their own risk levels (e.g., risk probabilities), carefree heterogeneous data sources should draw upon the entire data sources so as to enable the computation required for decision making. This computation takes into account the risk level, heterogeneity, and the quantity of available data. However, an economic evaluation method is indispensable due to the computational limitation of ambient handheld devices. 2355 A Roadmap for Ambient E-Service %HQH¿WVRIASEM ASEM aims to provide the design guidelines of the platforms/infrastructures for supporting ambient e-services with a safety and trustworthy environment as well as congregating the collective effort of mobile users within the environment. ,QWKLVVHFWLRQWKHEHQH¿WVRIASEM from the VRFLRHFRQRPLFSHUVSHFWLYHDUHEULHÀ\GLVFXVVHG LQDGGLWLRQWRWKHMXVWL¿FDWLRQRIASEM rendered being technologically possible as addressed in previous sections). From the economic view for privacy invasion, anecdotal evidence shows that people are willing to disclose personal information for potential monetary savings (Russell, 1989), and people do join Web sites for free gifts and catalogs. Those evidence supports that individuals respond to economic incentives in deciding whether to dis-close information. On the other hand, in various organizational and marketing contexts, concern of privacy invasion have been shown to depend on information control, outcomes arising from disclosures, information type and sensitivity, per-ceived relevancy of information use, and target of disclosures. Hoffman, Novak, and Peralta (1999) claimed that nearly 63% of consumers would not provide information to Web sites owing to lack of trust. From the socio-economic view, our method LV WR EH HYDOXDWHG LQ WHUPV RI D FRVWEHQH¿W DQDO\VLVDQGH[SHFWWKHPDMRULW\EHQH¿WZRXOG eliminate privacy invasion. In other words, with our method privacy of a person’s persona would be appropriately protected because all the real personal identities are hidden. Seamless Unlinkability Management enables users to control their owned information in accord with the information type and sensitivity; users are able to decide whether to disclosure the information or not, as well as the target of their information disclosed to. Furthermore, users within the ambient envi-ronment may provide various data sources (i.e., experience or subjective opinions) for others to make a strategic decision. These collective efforts encourage the building of the sense of ambient trust by engaging the reliability of fraud detection in ambient e-service environments. However, some systematical costs are required. Making decisions with heterogeneous data source provide a comparative reliability rather than depending on their own information, especially in the dynamic environment. When the number of peers exceeds the limit of computation capability, the complexity of data management and computation will become a major problem especially in a Peer-to-Peer environment. For preliminary estimates, establishing a trustworthy ambient environment with privacy protection PLJKWKDYHWRWUDGHZLWKVRPHHI¿FLHQF\ORVV Therefore, the trade-off between the cost and EHQH¿W LV D PDMRU LVVXH IRU IXUWKHU UHVHDUFK At the moment, this chapter mainly focuses on the framework prospect, but we intend to provide a vision of collective wisdom within ambient e-service environment. However, the implementation or systematical evaluations are not the focus of this chapter. In summary, with the supporting infrastructures (delimited by ASEM), ambient e-service applications are believed to bring us a new carefree information/service era. Let’s take the shopping mall scenario for example. Mobile users can acquire desired information items very conveniently. That is, even a user communicating with other unknown mobile users, there is still measurable data for the user to consider, such as numerous nearby unknown users’ experience or opinions gathered to serve as a reference material for advanced transaction decisions. Users can determine their actions based on various informa-tion sources, and decide which one is suitable for their current needs. Fraud and untruthful activities can also be diminished with the collective effort from those participants. 2356 A Roadmap for Ambient E-Service CONCLUSION Ambient e-services address dynamic collective efforts of mobile users dynamically engaging interactions in the ambient environments, ren-dering a new paradigm of mobile commerce promising revolutionary business models. This chapter presents an ambient e-services framework characterizing three supporting stacks. The am-bient value stack describes the value process in ambient environments. The ambient technology VWDFNLGHQWL¿HVWKHWHFKQRORJ\SURFHVVWRHQVXUH connectivity and security in ambient interactions and cooperation between peers and then realize powerful collective efforts. The environment stack then represents the ambient basics for the collaborations. Ambient e-services applications can be divided into two types. One is for the distributed trading; another is for the distributed collaboration. How-HYHUVRFLDOFRQWH[WDQGVLJQL¿FDQWUDSLGJURZWK of connections enabled by P2P are the two major incentives for applying ambient e-service to such revolutionary business models. We exemplify several ambient e-service applications. Those ap-plications differ from existing mobile e-services (grounded on client/server design) in terms of the focus of the dynamic interactions between peers in dynamic ambient e-service environments. In this chapter, we also present another framework called Ambient e-Service Embracing Model (ASEM) that addresses the core elements (of relevance to the integrated concern of trust, reputation and privacy) required for assuring such desired features as convenience, safety, fairness and collaboration for mobile users when they engage ambient e-services. This framework manifests the relationship between the issues of dynamic identity management and ambient data management. The framework abstracts the trust, reputation, and privacy concerns into an integrated consideration. Since different e-service applications are of different circumstances and bear different restrictions, the framework of ASEM also outlines the guidelines for the implementation of ambient e-service applications and the platforms. The fruitful future research includes a further in-depth evaluation of ASEM, a complete design of the ASEM core elements, and a ¿HOGHG LPSOHPHQWDWLRQ RI FHUWDLQ ambient e-services deriving economic models of ambient e-services. REFERENCES Aberer, K., & Despotovic, Z. (2001). Managing trust in a peer-2-peer information system. InPro-ceedings of the Conference on Information and Knowledge Management(pp. 310-317). CIKM01. November 5-10, 2001, Atlanta, Georgia. $VKUD¿1 .XLOERHU-33ULYDF\ protection via technology: Platform for privacy preferences (P3P). International Journal of E-Business Research, 1(2), 56-69. Baida, Z., Gordijn, J., Akkermans, H., Saele, H., & Morch, A. Z. (2005). Finding e-service offerings by computer-supported customer need reasoning, International Journal of E-Business Research, 1(3), 91-112. Castelfranchi, C., Falcone, R., & Pezzulo, G. (2003). Integrating trustfulness and decision using fuzzy cognitive maps. Trust Management 2003, LNCS 2692 (pp. 195-210). Enzmann, M., & Schneider, M. (2004). A privacy-friendly loyalty system for electronic marketplac-es. InProceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE04), Taiwan. Enzmann, M., & Schneider, M. (2005). Improv-ing customer retention in e-commerce through a secure and privacy-enhanced loyalty system. Information Systems Frontiers, 7(4-5), 359-370, December 2005. 2357 A Roadmap for Ambient E-Service Golbeck, J., Parsia, B., & Hendler, J. (2003). Trust networks on the semantic Web. Proceedings of Cooperative Intelligent Agents 2003. Gupta, M., Judge, P., & Ammar, M. (2003). A reputation system for peer-to-peer networks. NOSSDAV’03. (Jun. 1-3, 2003) 144-152. Hertzum, M., Andersen, H., Andersen, V., & Hansen, C. (2002). Trust in information sources: Seeking information from people, documents, and virtual agents. Interacting with Computers, 14(5), 575-599. Hoffman, D. L., Novak, T. P., & Peralta, M. A. (1999). Building consumer trust online. Com-munications of the ACM, 42(4), 80-85. Hoy, Grubbs, M., & Phelps, J. (2003). Consumer privacy and security protection on church Web sites: Reasons for concern. Journal of Public Policy and Marketing, 22(1), 58-70. Hwang, Y. C., & Yuan, S. T. (2005). Ambient e-services. IEEE International Conference on Services Computing, Shanghai, China. Mui, L., Halberstadt, A., & Mohtashemi, M. (2003). Evaluating reputation in multi-agents systems. In R. Falcone, S. Barber, L. Korba, & M. Singh (Eds), Trust, reputation, and security: theories and practice (pp. 123-137). Berlin: Springer-Verlag. Odlyzko, A. (2003). Privacy, economics, and price discrimination on the Internet. The 5th In-ternational Conference on Electronic Commerce (ICEC 2003). ACM Press. Paternò, F. (2003). Understanding interaction with mobile devices.Interacting with Computers, 15(4), 473-478. Resnick, P., Zeckhauser, R., Friedman, E., & Ku-wabara, K. (2000). Reputation systems: Facilitat-ing trust in Internet interactions.Communications of the ACM, 43(12), 45-48. e-service embracing model. In Proceedings Roussos, G., Peterson, D., & Patel, U. (2003). of the 7h IEEE International Conference on E-Commerce Technology(pp. 535-538). (CEC2005) Germany. Hwang Y. C., & Yuan S. T. (2006). Technical report: Exploring collective wisdom in ambient e-service environment: implementation method and evaluations. Taiwan: National Cheng-Chi University. Kinateder, M., & Rothermel, K. (2003). Architec-ture and algorithms for a distributed reputation system. Trust Management 2003, LNCS 2692 (pp. 1-16). Lim, E., & Saiu, K. (2003). Advances in mobile commerce technologies.Hershey, PA: Idea Group Publishing. Lin, K., Lu, H., & Yu, T. (2004). A distributed trust and reputation management framework for Mobile identity management: An enacted view. International Journal of E-Commerce, 8(1), 81-100. Russell, C. (1989). Kiss and tellAmerican Demo-graphics, 11(12), 2. Sabater, J., & Sierra, C. (2002). Reputation and social network analysis in multi-agent systems. The 1t International Joint Conference on Autono-mous Agents & Multiagent Systems(pp. 475-482). AAMAS’02, July 15-19, 2002, Bologna, Italy. Schilit, B., Adams, N., & Want, R. (1994). Context-aware computing applications.In Proceedings of the 1t International Workshop on Mobile Comput-ing Systems and Applications (pp. 85-90). Shand, B., Dimmonck, N., & Bacon, J. (2003). Trust for ubiquitous, transparent collaboration. In Proceedings of the 1t IEEE International 2358 ... - tailieumienphi.vn
nguon tai.lieu . vn