基于反馈的C2C信任管理模型研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
C2C作为传统电子商务中最活跃的一种模式,与B2B和B2C模式相比,除了虚拟性与时空跨越性外,还包括个体参与、市场进出壁垒低、参与者可以匿名注册等特性,这些都会造成交易双方信息的不对称,导致交易不确定性,增加消费者风险感知。而随着移动商务的发展,基于位置、情境的服务技术正深刻的影响着电子商务产业的变革,推动C2C模式的改革创新。情境(上下文)相关的C2C模式给用户带来巨大商机,正逐渐被人们所接受。这种交易上下文相关性特征,也进一步加剧了信息的不对称性,给欺诈带来更多可趁之机。已有研究与实践表明建立信任关系可以降低交易不确定性和风险性,提高合作效率,抑制交易欺诈。虽然,针对传统C2C的信任管理已取得不少研究成果,但在信誉欺诈处理上还存在一些漏洞,而且缺少对这种上下文相关的C2C交易模式的信任评估研究。因此,分析不同C2C交易场景,建立在线信任管理规避交易风险,从而打造诚信交易环境已成为C2C应用与未来发展的重要问题。
     本文将从C2C电子商务交易模式出发,分析两种具有代表意义的交易场景,包括:(1)传统C2C交易场景,该场景是目前普遍被人们接受的商务形式,例如淘宝网;(2)上下文相关的C2C交易场景,该场景是在移动商务背景下,随着基于位置服务发展而提出的,C2C平台可以根据上下文进行交易推荐,用户也可以进行交易搜索,然后通过协商,最后进行线下交易的一种方式,如拼车服务。本文在基于这两类应用背景,归纳出研究需要解决的两个主要问题。
     (1)传统C2C交易信任管理中,需要分析信誉欺诈行为特征,以及已有C2C信誉模型存在的问题,最后进行改进以提高信誉模型的抗欺诈能力。
     (2)上下文相关的C2C交易信任管理中,由于交易是需要在线下一定交易上下文中完成,不同上下文对交易者会产生不同的风险感知,再加上该商务模式并不成熟,容易出现反馈稀疏、缺少同等上下文下的反馈参考,这使得信任评估需要考虑降低信任的偶然性,并处理不同风险上下文的信誉反馈。
     针对所要解决的问题,主要研究工作可以细分为以下四个方面。
     (1)对传统C2C交易场景进行描述,分析已有C2C信任管理中,信誉累计模型所容易滋生的信誉欺诈问题,详细描述了本文所提出的C2CRep模型建立准则、参数选取、各因子计算依据,及实验评价。
     (2)分析C2C信任管理中买方评论反馈对潜在买家决策的影响作用,提出一种依靠评论反馈可靠度排名方法,将可靠度高的评论优先显示从而提高评论阅读效率。为了计算反馈可靠度,本文改进加权的RFM客户价值模型以适应C2C环境,分析了RFM中各指标计算过程,通过AHP方法以确定RFM各指标权重,最后综合客户价值理论与客户信誉建立反馈可靠度计算模型。
     (3)描述上下文相关的C2C交易场景,分析不同上下文所产生的风险评估问题。借鉴信息系统风险评估方法,提出一种基于模糊集合理论的方法,分析了风险上下文因素层次结构、各层因素风险模糊定量分析、最终得到风险综合评判结果。
     (4)针对上下文相关的C2C交易中容易出现反馈稀疏、不同上下文的信任映射问题,本文提出依靠反馈偏移度进行不实反馈过滤的方法。通过反馈数量计算反馈稳固度,结合内容(3)中对上下文风险评估研究,通过风险值进行不同上下文的信任映射,建立一种上下文风险感知C2C信任管理模型。
     在以上研究内容中,本文所存在的创新点主要包括:
     (1)提出了C2CRep卖方信誉模型,该模型增加共谋因子平衡了交易次数与反馈过于集中问题;增加了差评度指标抑制反馈敲诈行为;改进价格衡量指标以动态适应商品类型个性差异。与传统C2C模型和SPORAS经典模型相比,实验结果表明,在“低价商品信誉欺诈”,“信誉共谋”,“信誉诋毁”方面都有更强的抵抗作用。
     (2)提出一种基于RFM模型的买方评论反馈可靠度计算方法,该方法综合客户价值与信誉理论,并改进了RFM客户价值模型以适应C2C电子商务环境。实验表明,与传统利用信誉的方法相比,增加了通过虚假交易获取反馈评价排名的交易时间、频率、金额的欺诈成本。
     (3)提出一种上下文风险感知的C2C信任模型,该模型基于模糊理论对上下文风险进行评估,通过交易中上下文风险值进行不同情境下的信任映射,同时在基于反馈偏移度的不实反馈过滤中考虑了反馈的稳固度,一定程度上缓解了反馈数量不足导致的偶然信任。仿真结果表明,与传统均值模型、PeerTrust模型相比,提高了信任评估的准确性,抑制了低风险上下文的信任榨取问题。
     通过本文的研究工作,取得了一点阶段性成果,这将一定程度上丰富电子商务信任管理机制,也将进一步推进未来C2C商务的应用发展。
C2C is the most active model in e-commerce. Compared to B2B and B2C, in addition to the virtual and space across, C2C has its own features including:individual participants, low barriers to entry and exit, anonymous registration and so on. It determines an uncertainty, highly dynamic and virtual trading environment which makes the high risk for C2C trading. With the development of mobile e-commerce, Location-based Service and Context-based Service will have a profound impact on the e-commerce, and conduct the innovation of C2C model. Context-sensitive C2C e-commerce will bring more business, and be accepted by user. The context-sensitive feature aggravates the asymmetry of information, and brings more fraud. The related work shows that establish a trust relationship can reduce transaction uncertainty and risk, improve the efficiency of cooperation and restraint of trade fraud. Although trust management for traditional C2C has been made a lot of research, but there are still many problems in handling reputation fraud, and lack of trust study about context-sensitive C2C. So the analysis of different C2C trading scenario is necessary, construct online trust management to avoid trading risks, and create an integrity trading environment has become a key problem in C2C application and future development.
     The paper analyzes two significance transactions including:(1) traditional C2C scene, it is generally accepted by people, such as Taobao;(2) context-related C2C scene, it is under the development of Location-based Services in mobile e-commerce environment, C2C platform can recommend trading according to the context, or allow users to search trading. And finally users can deal the trading offline after negotiation,, such as carpooling service. In this paper, two main issues need to be considered based on the two C2C scenes.
     (1) In the trust management of traditional C2C, it is need to analyze features of reputation fraud, as well as the the existing problems of C2C reputation model, and finally to improve anti-fraud ability of trust management.
     (2) In the trust management of context-related C2C scene, transactions need to be dealt offline. Different context will have different perceptions of risk. The immature business model may prone to sparse feedback, and will lack of the feedback under the same context. It makes the trust assessment need to reduce the occasional trust, and to deal with different context reputation feedback.
     The main research work can be subdivided into the following four aspects.
     (1) Describe the traditional C2C trading scenario, and analyze the fraud in existing C2C reputation model. Then introduce the proposed C2CRep model in this work, including guidelines, parameter selection, the basis of various factors, and experimental evaluation.
     (2) Analyse the effect of buyers'review feedback to potential buyers in the C2C trust management, and proposes ranking method based on feedback reliability to show the reviews. In order to calculate the feedback reliability, the work has improved the weighted RFM customer value model to adapt to the C2C environment; introduced how to compute each index in RFM model; and then determined RFM weight by AHP method; finally used the customer value theory and the reputation to establish feedback reliability calculation model.
     (3) Describe the context-sensitive C2C trading scenario, and analyse risk assessment in different contexts. Drawing on information systems risk assessment methodology, the paper has proposed a method based on fuzzy set theory, including analysis of the context of risk hierarchy, quantitative risk analysis of all factors, comprehensive evaluation results of the context risk.
     (4) Because of context-sensitive C2C transactions prone to sparse feedback, and trust mapping in different context, the paper has proposed a way to filter false feedback rely on the feedback offset, calculated the stability by the amount of feedback. By combined with work context risk assessment, the work realized the trust mapping mechanism of different context through risk value, and constructed a risk perception of context in C2C trust management model.
     The main innovations of this work are as follow.
     (1) The paper proposed a C2CRep seller's reputation model. The new model has added collusion factor to balance the number of transactions and concentrated feedback, added unsatisfied index to inhibit feedback blackmail, and improved price index to dynamically adapt to commodity's personality. Compared with the traditional C2C model and classic SPORAS model, experimental results show that in low-price reputation deception, reputation collusion, and reputation slander, it can improve the ability to resist reputation fraud.
     (2) The paper proposed a feedback reliability compute model based on RFM. It has combined the theory of customer value, and improved RFM customer value model to fit C2C environment. Compared with the reputation based model, experimental results show that it can increase the cost of transaction time, frequency, money to obtain high ranking score through fraud trading.
     (3) The paper proposed a context risk related C2C trust model. It has constructed risk assessment of context in C2C model based on fuzzy set, and realized trust mapping through the risk indicator. It also has introduced a stable index in filtering inaccurate feedback by its offset to avoid accidental factor for insufficient amount of feedback. Simulation results show that, compared with the the traditional mean model and PeerTrust model, it improve the accuracy of trust evaluation, and can inhibit reputation fraud by low-risk context.
     The work has produced some fruit, which will enrich e-commerce trust management mechanism to some extent, and also further promote the C2C business applications development in future.
引文
[1]黄渊普,艾瑞咨询:2012年中国网络购物市场交易规模超1.3万亿[EB]艾瑞网,http://ec.iresearch.cn/shopping/20130125/192011.shtml,2013.1.
    [2]李岩.中国利用后发优势发展成为世界移动大国的分析[J]。管理世界,2005(7):162-165.
    [3]Veijalainen, J., Terziyan, V.Y.,& Tirri, H. Transaction management for M-commerce at a mobile terminal [J]. Electronic Commerce Research and application,2006,5(3),229-245.
    [4]刘厚泉,谭海樵,吕琳琳,王娅森.基于动态任务模型的LBS架构的研究[J].2009,30(5):1013-1016.
    [5]Lee M K, Turban E. A Trust Model for consumer Internet Shopping[J]. International Journal of Electronic Commerce,2001,6(1):75-91.
    [6]Kleist, V.F. A transaction cost model of electronic trust:transactional return, incentives of network security and optimal risk in the digital economy [J]. Electronic Commerce Research,2004,4(-2),41-57.
    [7]Li-fang Zhang, Fu-jing Zhang. Does E-commerce Reputation Mechanism Matter?[J]. Procedia Engineering,2011,15:4885-4889.
    [8]Zhou Shandan, Feng Dan&Xu Yunyun. Influencing Factors of Credibility in C2C Ecommerce Web Sites[J]. Procedia Engineering,2012,29:509-513.
    [9]Yaobin Lu, Ling Zhao, Bin Wang. Luhmann N. From virtual community members to C2C e-commerce buyers:Trust in virtual communities and its effect on consumers' purchase intention[J]. Electronic Commerce Research and Applications,2010,9(4):346-360.
    [10]鲁耀斌,邓朝华,章淑婷.基于Trust-TAM的移动商务服务消费者采纳研究[J].信息系统学报,2007,1(1):46-59.
    [11]Resnick P., Zeckhauser R., Friedman E., Kuwabara K. Reputation system[J]. Communications of the ACM.2000,43(12):45-48.
    [12]Jie Zhang. The roles of players and reputation:Evidence from eBay online auctions[J]. Decision Support Systems,2006,42:1800-1818.
    [13]Zacharia, G., Collaborative reputation mechanisms for electronic marketplaces [J]. Decision Support System,2000,29(4):371-388.
    [14]Jau-Shien Ch. Ho-Jhen W. Selecting appropriate sellers in online auctions through a multi-attribute reputation calculation method[J]. Electronic Commerce Research and Applications.2011,10(2):144-154.
    [15]Fan Wu., Hsiao-Hui Li., Yo-Hsin Kuo. Reputation evaluation for choosing a trustworthy counterparty in C2C e-commerce[J]. Electronic Commerce Research and Applications.2011,10(4):428-436.
    [16]Zhu Lei, Nyang D H. Lee K H, et al. Fair reputation evaluating protocol for mobile ad hoc network [C]. Proceedings of 2006 International Conference on Computational Intelligence and Security. Guangzhou, China:IEEE,2006:613-616.
    [17]Sheikh I. A, Munirul M.H,et al. Design, analysis, and deployment of omnipresent formal trust model(FTM) with trust bootstrapping for pervasive environments [J]. The Journal of System and Software,2010,83:253-270.
    [18]闵庆飞,季邵波,孟德才.移动商务采纳的信任因素研究[J].管理世界,2008,12:84-85.
    [19]陶洋,宫晓静.C2C电子商务网站信用评价模型的研究.中国管理信息化,2008(22):94-95.
    [20]Ecological Communication[M]. Cambridge University of Chicago Press,1989.
    [21]Aancha, S., D'Souza,P.,Perich, F., Joshi, A.,& Yesha, Y. P2P M-Commerce in pervasive environments [J]. SIGecom Exchange,2003,3(4),1-9.
    [22]Tirole J. The theory of Industrial organization[M]. MIT Press, Cambridge, MA, 1988.
    [23]Daignault M., Shepherd M., Marche S., Watters C. Enabling trust online[C]. in Proceedings of the third international symposium on Electronic Commerce,2002:3-12.
    [24]Misra, S. K.,& Wickamasingle, N. Security of a mobile transaction:a trust model[J]. Electronic Commerce Research,2004,4(4),359-372.
    [25]Jiabao Lin, Yaobin Lu, Bin Wang, Kwok Kee Wei. The role of inter-channel trust transfer in establishing mobile commerce trust[J].Electronic Commerce Research and Applications,2011,10(6):615-625.
    [26]Werner Guth, Friederike Mengel, Axel Ockenfels. An Evolutionary Analysis of Buyer Insurance and Seller Reputation in Online Markets[J]. Theory and Decision, 2007,63(3):265-282.
    [27]Yong Seog Kim, Vinh Loc Tran. Assessing the ripple effects of online opinion leaders with trust and distrust metrics [J]. Expert Systems with Applications,2013, 40(9):3500-3511.
    [28]张喜征.基于虚拟社区的网络信任管理模式研究[J].情报杂志2006.26(4):22-24.
    [29]Elizabeth C, Tharam D, Farookh K.H. Trust and Reputation for Service-oriented Environments:Technology for Building Business Intelligence and Consumer Confidence. [M]陈德人,郑小林,于红华译,浙江大学出版社,2008.
    [30]Francis Fukuyama, Trust:The Social Virtues and the Creation of Prosperity[M]. New York:Free Press,1995.
    [31]Lee E.J. Factors influence consumer trust in human-computer interaction:an examination of interface factors and the moderating influences[D]. Tennessee University Doctor Paper,2002.
    [32]Venkatesh Shankar, Glen L. Urban, Fareena Sultan. Online trust:a stakeholder perspective, concepts, implications, and future directions. [J] Journal of Strategic Information Systems 2002,11:325-344.
    [33]Moorman C, Deshpande R, Zaltman G. Factors affecting trust in market research relationships[J]. The Journal of Marketing,1993:81-101.
    [34]Doney M., Cannon P., An examination of the nature of trust in buyer-seller relationships[J]. Journal of Marketing,1997,61(2):35-51.
    [35]Marsh S. Formalizing Trust as a Computational Concept[D]. University of Sterling,1994.
    [36]Gambetta D. Can we trust trust[J]. Trust:Making and breaking cooperative relations,2000,2000:213-237.
    [37]Abdul-Rahman A, Hailes S. Supporting trust in virtual communities[C]//System Sciences,2000. Proceedings of the 33rd Annual Hawaii International Conference on. IEEE,2000:9-19.
    [38]Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system[C]//Proceedings of the tenth international conference on Information and knowledge management. ACM,2001:310-317.
    [39]Wang Y, Vassileva J. Bayesian network-based trust model[C]//Web Intelligence, 2003. WI2003. Proceedings. IEEE, IEEE,2003:372-378.
    [40]Xiong L, Liu L. PeerTrust:Supporting reputation-based trust for peer-to-peer electronic communities [J].IEEE Trans. on Knowledge And Data Engineering, 2004,16(7):843-857.
    [41]Kamvar, S.D., Schlosser, M.T.,& Garcia-Molina, H., The Eigentrust Algorithm for Reputation Management in P2P Network, Proceddings of the 12th International World Wide Web Conference, Budapest, Hungary:ACM Press,2003: 640-651.
    [42]F Moyano, C Fernandez-Gago, J Lopez. A Conceptual Framework for Trust Models[J]. Lecture Notes in Computer Science,2012,7449:93-104.
    [43]Gambetta D. Can We Trust?[M].In Gambetta D, editor, Trust. Making and Breaking Cooperative Relations, Basil Blackwell. Oxford,1990,213-238.
    [44]Jesang, A., Ismail, R., Boyd, C., A survey of trust and reputation systems for online service provision, Decision Support System,2007,43:618-644.
    [45]Hardin R. Trust & Trustworthiness[M]. New York:Russell Sage Foundation 2002.
    [46]Cook K S. Trust in Society[M]. New York, Russell Sage Foundation,2001.
    [47]Holland P W, Leinhardt S. Holland and leinhardt reply:some evidence on the transitivity of positive interpersonal sentiment[J]. The American Journal of Sociology,1972,77(6):1205-1209.
    [48]Ziegler C N, Lausen G Spreading activation models for trust propagation[C]//e-Technology, e-Commerce and e-Service,2004. EEE'04.2004 IEEE International Conference on. IEEE,2004:83-97.
    [49]Guha R, Kumar R, Raghavan P, et al. Propagation of trust and distrust[C]//Proceedings of the 13th international conference on World Wide Web. ACM,2004:403-412.
    [50]曲德详,基于上下文感知的动态信任计算模型[J],计算机工程与设计,2009,30(7):1647-1650.
    [51]王勇,李明,崔灵果等,开放式网络环境下的上下文敏感的信任管理[J],北京理工大学学报,2008,28(3):222-225.
    [52]王勇,李明,崔灵果等,一种上下文敏感的信任管理模型[J],北京理工大学学报,2008,28(2):95-98.
    [53]杨超,王双成.一种交易上下文相关的电子商务声誉系统模型[J].小型微型计算机系统,2011,32(7):1365-1369.
    [54]Mui L. Computational Models of Trust and Reputation [D].PhD thesis, MIT,2002.
    [55]黄辰林,动态信任关系建模和管理技术研究[D].国防科学技术大学,博士学位论文,2005.
    [56]Slovic P. Trust, emotion, sex, politics, and science:Surveying the risk-assessment battlefield[J]. Risk analysis,1999,19(4):689-701.
    [57]Zhong Y, Lu Y, Bhargava B. Dynamic trust production based on interaction sequence[J]. Purdue University, Department of Computer Sciences, Purdue University, West Lafayette, IN,2003,47907:3-6.
    [58]L.Zucker, Production of trust:Institutional sources of economic structure[J]. Research in Organizational Behavior,1986,8:53-111.
    [59]Azzedin F, Maheswaran M. Evolving and managing trust in grid computing systems[C]//Electrical and Computer Engineering,2002. IEEE CCECE 2002. Canadian Conference on. IEEE,2002,3:1424-1429.
    [60]A.Donovan and G. Yolanda, A survey of trust of trust in computer science and the Semantic Web[J], Journal of Web Semantics,2007,5:58-71.
    [61]Mohan A, Blough D M. AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System[C]//Privacy, Security and Trust, 2008. PST'08. Sixth Annual Conference on. IEEE,2008:201-212.
    [62]Chakraborty S, Ray I. TrustBAC:integrating trust relationships into the RBAC model for access control in open systems [C]//Proceedings of the eleventh ACM symposium on Access control models and technologies. ACM,2006:49-58.
    [63]Huang J, Nicol D. A calculus of trust and its application to PKI and identity management[C]//Proceedings of the 8th Symposium on Identity and Trust on the Internet. ACM,2009:23-37.
    [64]Willy F. Zalatar, Evaluating the Quality of C2C Online Buy and Sell Websites Using Dimensions of E-Quality[J].Procedia-Social and Behavioral Sciences, 2012,40:71-76.
    [65]Corritore C.L., Kracher B., Wiedenbeck S., Online trust:concepts, evolving themes, a model [J]. International Journal of Human-Computer Studies, 2003,58(6):737-758.
    [66]McKnight D H, Chervany N L. What trust means in e-commerce customer relationships:An interdisciplinary conceptual typology[J]. International Journal of Electronic Commerce,2002,6:35-60.
    [67]McKnight D H, Choudhury V, Kacmar C. Developing and validating trust measures for e-commerce:An integrative typology [J]. Information systems research,2002,13(3):334-359.
    [68]鲁耀斌,董圆圆.电子商务信任问题理论框架研究[J].管理学报,2005,2(5):522-526.
    [69]S Sabater J, Sierra C. Reputation and social network analysis in multi-agent systems[C]//Proceedings of the first international joint conference on Autonomous agents and multiagent systems:part 1. ACM,2002:475-482.
    [70]Chang E, Dillon T S, Hussain F K. Trust and reputation for service-oriented environments:Technologies for building business intelligence and consumer confidence[M]. John Wiley & Sons,2006.
    [71]Liang Z, Shi W. Analysis of ratings on trust inference in open environments [J]. Journal of Performance Evaluation,2008,65(2):99-128.
    [72]Casare S, Sichman J. Towards a Functional Ontology of Reputation. In:Dignum F, Dignum V, Koenig S, et al.[C], Proceedings of 4rd International Joint Conference on Autonomous Agents and Multiagent Systems, Utrecht, The Netherlands:ACM, 2005,505-511.
    [73]J(?)sang A. Knapskog S J. A Metric for Trusted System [C]. In Proceedings of the 21th National Information System Security Conference. NSA,1998:16-29.
    [74]贺利坚,黄厚宽,张伟.多Agent系统中信任和信誉系统研究综述[J].计算机研究与发展,2008,45(7):1151-1160.
    [75]贺利坚.多Agent系统中信任和信誉系统研究综述[D].北京交通大学,博士学位论文.2011.
    [76]Ling Liu, Malcolm Munro. Systematic analysis of centralized online reputation systems Original Research Article[J]. Decision Support Systems,2012,52(2): 438-449.
    [77]纪淑娴.C2C电子商务中在线信誉系统有效性研究[D].西南交通大学,博士学位论文.2009.
    [78]Aberer K, P-grid:A self-organizing access structure for P2P information systems [C]. The 6th International Conference on Cooperative Information Systems(CoopIS 2001), LNCS 2172, Berlin:Springer,2001:179-194.
    [79]Huynh T D. Trust and reputation in open Multi-agent systems[D]. Southampton: Electronics and Computer Science, University of Southampton,2006.
    [80]Liang Z, shi W. Enforcing cooperative resource sharing in untrusted peer-to-peer environment[J]. ACM Journal of Mobile Networks and Applications(MONET), 2005,10(6):771-783.
    [81]Yu B, Singh M P, Sycara K. Developing trust in large-scale peer-to-peer systems[C]//Multi-Agent Security and Survivability,2004 IEEE First Symposium on. IEEE,2004:1-10.
    [82]李景涛,荆一楠,肖春晓等.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167.
    [83]窦文.信任敏感的P2P拓扑构造及其相关技术研究[D].长沙:国防科学技术大学,2003.
    [84]吴鹏,吴国新,方群.一种基于概率统计方法的P2P系统信任评价模型[J].计算机研究与发展,2008,45(3):408-416.
    [85]Josang A, Ismail R. The beta reputation system[C]//Proceedings of the 15th bled electronic commerce conference.2002:41-55.
    [86]朱艳春,刘鲁,张巍.在线信誉系统中的信任模型构建研究[J].控制与决策,2007,22(4):413-418.
    [87]Kiku Jones, Lori N.K. Leonard. Trust in consumer-to-consumer electronic commerce [J]. Information & Management,2008,45(2):88-95.
    [88]Jian Yang, Xiaorui Hu, Han Zhang. Effects of a reputation feedback system on an online consumer-to-consumer auction market[J].Decision Support Systems,2007,44:93-105.
    [89]Paul Resnick, Richard Zeckhauser, John Swanson and Kate Lockwood. The value of reputation on eBay:A controlled experiment[J]. Experimental Economics,2006,9(2):79-101.
    [90]Daniel Houser, John Wooders.Reputation in Auctions:Theory, and Evidence from eBay [J] Journal of Economics & Management Strategy,2006,15(2):353-369.
    [91]Jeffrey A. Livingston. Functional forms in studies of reputation in online actions[J]. Electron Commer Res.2010,10:167-190.
    [92]Weijia You, Lu Liu, Mu Xia, Chenggong Lv. Reputation inflation detection in a Chinese C2C market[J].Electronic Commerce Research and Applications,2011, 10(5):510-519.
    [93]李瑞轩,高昶,辜希武等.C2C电子商务交易的信用及风险评估方法研究[J].通信学报,2009,30(7):78-85.
    [94]林怀清.P2P网络多维模糊信任模型研究[D]华中科技大学.2009.
    [95]Lax, G., Same, G.M.L, Blue:a reputation-based multi-agent system to support C2C in P2P Bluetooth networks. In ICE-B 2006:Proceedings of the international conference on E-business.2006,97-104.
    [96]Lax, G., Same, GM.L, CellTrust:a reputation model for C2C commerce [J]. Electron Commerce Research,2008(8):193-216.
    [97]张巍,朱艳春.C2C网上拍卖中的信任计算模型研究[J].计算机工程与应用,2006,13:5-7.
    [98]Yu Zhang, Jing Bian, Weixiang Zhu. Trust fraud:A crucial challenge for China's e-commerce market[J]. Electronic Commerce Research and Applications, In Press, Corrected Proof, Available online 13 December 2012.
    [99]Rietjens, B. Trust and reputation on eBay:Towards a legal framework for feedback intermediaries[J]. Information & Communications Technology Law, 2006,15(1),55-78.
    [100]李维安,吴德胜, 徐皓.网上交易中的声誉机制——来自淘宝网的证据[J].南开管理评论,2007,10(5):36-46.
    [101]钟元生,徐娟,刘成娟.反名声合谋方法研究[J].计算机工程,2008,34(16):173-177.
    [102]Dholakia M U. The usefulness of bidders' reputation ratings to sellers in online auctions[J]. Journal of Interactive Marketing,2005,19(1):31-40.
    [103]Dahui Li, Jun Li, Zhangxi Lin, Online consumer-to-consumer market in China-A comparative study of Taobao and eBay Original Research Article[J]. Electronic Commerce Research and Applications,2012,7(1):55-67.
    [104]郑华,吴克文,朱庆华.基于神经网络和SNA的C2C电子商务信誉欺诈识别研究[J].计算机应用研究,2011,28(5):1882-1885.
    [105]杨震.网络拍卖信誉反馈系统的优化研究[D].青岛:中国海洋大学,2009.
    [106]郭洪海,姜锦虎,蔡涵.C2C电子社区成员信誉值的计算模型研究[J].管理学报.2009.6(8):1056-1060.
    [107]Chevalier J A, Mayzlin D. The effect of word of mouth on sales:Online book reviews[J]. Journal of Marketing Research,2006,43(3):35-354.
    [108]Kumar N, Benhasat I. The infulence of recommendations and consumer reviews on evaluations of websites[J]. Information System Research,2006,17(4):425-439.
    [109]Zhang Z. Weighing stars:Aggregating online product reviews for intelligent e-commerce application[J]. IEEE Intelligent System,2008,23(5):42-49.
    [110]章彦星,张铭,邓志鸿.基于特征的用户评论自动摘要[J].计算机研究与发展,2009,46:520-525.
    [111]Duan, W., Gu, B., and Whinstom, A. B. Do online reviews matter?-An empirical investigation of panel data[J]. Decision Support System,2008,45(4):1007-1016.
    [112]Ghose A, Ipeirotis P G Designing Novel Review Ranking System:Predicting the Usefulness and Impact of Reviews [C].Proceedings of the ninth international conference on Electronic commerce, New York, NY, USA:Assocation Computing Machinery (ACM),2007:303-310.
    [113]Liu Y, Huang X J, An A J, et al. Modeling and predicting the helpfulness of online reviews [C]//Proceedings of the 8th IEEE International Conference on Data Mining, Washington. DC, USA:IEEE Computer Society,2008:443-452.
    [114]Li Chen, Luole Qi, Feng Wang, Comparison of feature-level learning methods for mining online consumer reviews [J]. Expert Systems with Applications,2012, 39(10):9588-9601.
    [115]Turney, P. D. Thumbs up or thumbs down? Semantic orientation applied to unsupervised classification of reviews, Annual Meeting of Association for Computation Linguistics, Philadelphia, PA,2002,417-424.
    [116]Sonja Utz,, Peter Kerkhof, Joost van den Bos. Consumers rule:How consumer reviews influence perceived trustworthiness of online stores [J]. Electronic Commerce Research and Applications,2012,11(1):49-58.
    [117]Christy M.K. Cheung, Matthew K.O. Lee. What drives consumers to spread electronic word of mouth in online consumer-opinion platforms[J]. Decision Support Systems,2012,53(1):218-225.
    [118]Pradeep Racherla, Wesley Friske. Perceived'usefulness'of online consumer reviews:An exploratory investigation across three services categories [J]. Electronic Commerce Research and Applications,2012,11(6):548-559.
    [119]Verhoef P.C., Donkers B.. Predicting customer potential value an application in the insurance industry[J]. Decision Support System,2001(32):189-199.
    [120]Dick Alans, Kunal Basu. Customer Loyalty:Toward an Integrated Conceptual Frameword[J]. Journal of the Academy of Marketing Science,1994,22(2):37-39.
    [121]Hong, I. B.,& Cho, H. The impact of consumer trust on attitudinal loyalty and purchase intentions in B2C e-marketplaces:Intermediary trust vs. seller trust[J].International Journal of Information Management,2011,31(5):469-479.
    [122]Lloyd C. Harris, Mark M. H. Goode. The four levels of loyalty and the pivotal role of trust:a study of online service dynamics[J] Journal of Retailing,2004,04: 139-158.
    [123]Jagdip Singh, Deepak Sirdeshmukh. Agency and Trust Mechanisms in Consumer Satisfaction and Loyalty Jundgments[J]. Journal of the Academy of Marketing Science,2000,28(1):150-167.
    [124]Deepak S, Jagdip S, Barry S. Consumer Trust, Value, and Loyalty in Relational Exchanges[J] Journal of Marketing,2002 66(1):15-37.
    [125]Yung-Ming L. Chia-Hao L, Cheng-Yang L. Identifying influential reviewers for word-of-mouth marketing [J]. Electronic Commerce Research and Applications,2010 (9) 294-304.
    [126]林盛,肖旭.基于RFM的电信客户市场细分方法[J]哈尔滨工业大学学报,2006,38(5):758-760.
    [127]Miglautsch J. Thoughts on RFM scoring[J]. The Journal of Database Marketing, 2000,8(1):35-43.
    [128]刘义,万迪昉,张鹏.基于购买行为的客户细分方法比较研究[J]管理科学2003,16(1):69-72.
    [129]J R Miglautsch, Thoughts on RFM scoring [J]. Journal of Database Marketing, 2000, (8):67-72.
    [130]Hughes A M. Boosting response with RFM[J].American Demographics, 1996,(5):4-9.
    [131]Stone, Bob. Successful Direct Marketing Methods[M].Lincolnwood:NTC Business Books,1994.
    [132]佟春生.系统工程的理论与方法概论[M].北京:国防工业出版社,2000:185-186.
    [133]许树柏.实用决策方法—层次分析法原理[M].天津:天津大学出版社,1988.
    [134]吴育华,杜纲.管理科学基础[M].天津:天津大学出版社,2001.222-228.
    [135]Jose J. Canals-Cerda. The value of a good reputation online:an application to art auctions[J]. Journal of Cultural Economics,2012,36(1):67-85.
    [136]P. Resnick, R. Zeckhauser, Swanson, K. Lockwood, The value of reputation on eBay:a controlled experiment [J]. Experimental Economics,2006,9:79-101.
    [137]Anis Y., Ole-Christoffer G, and et. A User-Centric Approach for Personalized Service Provisioning in Pervasive Environments, Wireless Pers commun,2011, 61:543-566.
    [138]Ngai E W T, Gunasekaran A. A review for mobile commerce research and application[J]. Decision Support System.2005,43:3-15.
    [139]Dey A K, Abowd G D. Towards a Better Understanding of Context and Context-Awareness[J]. Lecture notes in Computer Science,1999(1707):304-307.
    [140]Mokhtari E, Noorian Z, Ladani B, et al. A context-aware reputation-based model of trust for open multi-agent environments[J]. Advances in Artificial Intelligence, 2011:301-312.
    [141]Prahalad C K. Beyond CRM:C. K. Prahalad Predicts CustomerContext Is the Next Big Thing [M]. NewYork:AMACOM,2004.
    [142]陈伟鹤,鞠时光,薛安荣.基于移动用户位置的信息服务中的访问控制模型研究综述[J].计算机科学,2008,35(10):19-26.
    [143]ITSEC. Information technology security evaluation criteria, version 1-2[S]. Office for official publications of the European communities, June 1991.
    [144]B Boehm Software risk management:principles and practices[J]. IEEE Software,1991,8(1)32-41.
    [145]王侃.基于证据理论的移动商务交易风险评估与控制决策研究[D].博士论文:华中科技大学,2009.
    [146]朱松岭,周平,韩毅等.基于模糊层次分析法的风险量化研究[J].计算机集成制造系统.2004,10(8):980-986.
    [147]李聪波,刘飞,谭显春等.基于风险矩阵和模糊集的绿色制造实施风险评估方法[J].计算机集成制造系统.2010,16(1):209-216.
    [148]付钰,吴晓平,叶清等.基于模糊集与熵权理论的信息系统安全风险评估研究[J].电子学报.2010,38(7):1489-1496.
    [149]谢季坚,刘承平.模糊数学方法及其应用[M].武汉:华中理工大学出版社,2000:205-211.
    [150]胡永宏,贺恩辉.综合评价方法[M].北京:科学出版社,2000:167-188.
    [151]PawlakZ. Rough sets and intelligent data analysis[J].Information Science,2002, 147:1-12.
    [152]李士勇.工程模糊数学及应用[M].哈尔滨:哈尔滨工业大学出版社,2004:101-108.
    [153]Williams T M. The two-dimensionality of project risk[J].International Journal of Project Management,1996,14(3):185-186.
    [154]张宇,个性化移动内容服务的模型和支持技术研究[D].博士学位论文,华中科技大学,2010.10.
    [155]范红,冯登国,吴亚非.信息安全风险评估方法与应用[M].北京:清华大学出版社,2006.
    [156]You XuGuang, Shi YuanChun, Xie WeiKai. Pervasive computing. Chinese Journal of Computers,2003,26(9):1042-1050.
    [157]王刚,邱玉辉.一种基于本体的觉察上下文计算模型[J].计算机科学,2006,33(10):138-142.
    [158]Weiser M. The future of ubiquitous computing on campus[J].Communications of the ACM.1998,41(1):41-42.
    [159]Quercia D, Hailes S, Capra L. B-trust:Bayesian trust framework for pervasive computing [C]. Proceedings of the Fourth International Conference on Trust Management. Pisa, Italy:Springer Press,2006:298-312.
    [160]乔秀全杨春李晓峰等,社交网络服务中一种基于用户上下文的信任度计算方法[J].计算机学报,2011,34(12):2403-2414.
    [161]Liu J, Issarny V. Enhanced reputation mechanism for mobile ad hoc networks[C]//Proceedings of the Second conference on Trust Management. Oxford, UK:Springer Press,2004:48-62.
    [162]Li Xiong, Resilient Reputation and Trust Management:Models and Techniques[D], Georgia Institute of Technology,2005.
    [163]李季,刘春梅.上下文感知在Web服务动态信任计算中的应用[J].计算机工程与应用,2011,47(22):76-81.
    [164]Dellarocas C. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior//Proceedings of the 2nd ACM Conference on Electronic Commerce. Minneapolis, Minnesota, United States,2000:150-157.
    [165]Chen M, Singh J P. Computing and using reputations for internet ratings// Proceedings of the 3rd ACM Conference on Electronic Commerce. Tampa, Florida, USA,2001:154-162.
    [166]Whitby A, J(?)sang A, Indulska J. Filtering out unfair ratings in Bayesian reputation system[C]//Proceedings of the 7th International workshop on Trust in Agent Societies. New York, USA,2004,204.
    [167]Zhang, J, Cohen R, A personalized approach to address unfair ratings in multiagent reputation system[C]//Proceedings of AAMAS Workshop on Trust in Agent Societies,2006.
    [168]Gianluca Lax, Giuseppe M.L.S, CellTrust:a reputation model for C2C commerce [J]. Electron Commerce Research,2008(8):193-216.
    [169]Stone, R.N. and Winter, F.W. "Risk:is it still uncertainty times consequences?", in Belk, R.W. et al.(Eds), Proceedings of the American Marketing Association, Winter Educations Conference, Chicago,1987,1L,261-265.
    [170]Pang B, Lee L, Vaithyanathan S. Sentiment classification using machine learning techniques[C]//Proceedings of the 2002 Conference on Empirical Methods in Natural Language Proceesing[EMNLP], Morristown, NJ, USA:Assocation for Computational Linguistics,2002:79-86.
    [171]Miao Fan, Guoshi Wu. Aspect Opinion Mining on Customer Reviews [C]. Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011), Melbourne, Australia, Advances in Intelligent and Soft Computing,2012:27-33.
    [172]H Bouwman, A Bejar, S Nikou. Mobile services put in context:A Q-sort analysis[J] Telematics and Informatics,2012,29(1):66-81.
    [173]Aimeur E, Brassard G, Femandez JM, et al. A Iambic:a privacy-preserving recommender system for elecronic commerce[J].International Journal of Information Security,2008,7(5):307-334.
    [174]France Belanger. Privacy in the digital age:a review of information privacy research in information systems[J]. MIS Quarterly,2011,35(4):1017-1042.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700