Composition and combination‐based object trust evaluation for knowledge management in virtual organizations

Purpose – This paper aims to develop a framework for object trust evaluation and related object trust principles to facilitate knowledge management in a virtual organization. It proposes systematic methods to quantify the trust of an object and defines the concept of object trust management. The study aims to expand the domain of subject trust to object trust evaluation in terms of whether an object is correct and accurate in expressing a topic or issue and whether the object is secure and safe to execute (in the case of an executable program). By providing theoretical and empirical insights about object trust composition and combination, this research facilitates better knowledge identification, creation, evaluation, and distribution.Design/methodology/approach – This paper presents two object trust principles – trust composition and trust combination. These principles provide formal methodologies and guidelines to assess whether an object has the required level of quality and security features (hence it...

[1]  Didier Dubois,et al.  The principle of minimum specificity as a basis for evidential reasoning , 1986, IPMU.

[2]  Jaideep Srivastava,et al.  Predicting trusts among users of online communities: an epinions case study , 2008, EC '08.

[3]  K. Sherif,et al.  The combinative effect of electronic open networks and closed interpersonal networks on knowledge creation in academic communities , 2012 .

[4]  H. Raghav Rao,et al.  Security in grid computing: A review and synthesis , 2008, Decis. Support Syst..

[5]  Stuart E. Madnick,et al.  Data quality requirements analysis and modeling , 2011, Proceedings of IEEE 9th International Conference on Data Engineering.

[6]  Yanjun Zuo,et al.  Two-level trust-based decision model for information assurance in a virtual organization , 2008, Decis. Support Syst..

[7]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[8]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[9]  Kathleen Shearer,et al.  Understanding knowledge management and information management: the need for an empirical perspective , 2002, Inf. Res..

[10]  Izak Benbasat,et al.  Organizational Buyers' Adoption and Use of B2B Electronic Marketplaces: Efficiency- and Legitimacy-Oriented Perspectives , 2007, J. Manag. Inf. Syst..

[11]  Chrysanthos Dellarocas,et al.  The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..

[12]  W. Scacchi,et al.  Free Software Development: Cooperation and Conflict in a Virtual Organizational Culture , 2005 .

[13]  Massimo Marchiori,et al.  The Limits of Web Metadata, and Beyond , 1998, Comput. Networks.

[14]  Diane M. Strong,et al.  Information quality benchmarks: product and service performance , 2002, CACM.

[15]  Elisa Bertino,et al.  PP-trust-X: A system for privacy preserving trust negotiations , 2007, TSEC.

[16]  Kashif Akram,et al.  Role of Knowledge Management to Bring Innovation: An Integrated Approach , 2011 .

[17]  H. Raghav Rao,et al.  A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents , 2008, Decis. Support Syst..

[18]  Chunhui Piao,et al.  Research on Trust Management Model for E-Commerce Based on Fuzzy Clustering Method , 2009, 2009 IEEE International Conference on e-Business Engineering.

[19]  Yanjun Zuo Component comparison based information quality assurance , 2007, Int. J. Inf. Qual..

[20]  Catherine E. Connelly,et al.  In Justice We Trust: Predicting User Acceptance of E-Customer Services , 2008, J. Manag. Inf. Syst..

[21]  Yoona Kang,et al.  Physical temperature effects on trust behavior: the role of insula. , 2011, Social cognitive and affective neuroscience.

[22]  Bill Martin,et al.  LIS professionals and knowledge management: some recent perspectives , 2006 .

[23]  Yanjun Zuo,et al.  Information trustworthiness evaluation based on trust combination , 2006, SAC '06.

[24]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[25]  Ben Shneiderman,et al.  Balancing Systematic and Flexible Exploration of Social Networks , 2006, IEEE Transactions on Visualization and Computer Graphics.

[26]  Huajun Chen,et al.  Building trust in electronic communities by mining web content , 2010, Int. J. Comput. Sci. Eng..

[27]  Chih-Cheng Hung,et al.  The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking , 2009, WISM.

[28]  David A. Bray,et al.  Virtual worlds: multi-disciplinary research opportunities , 2007, DATB.

[29]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[30]  Virgil D. Gligor,et al.  Towards a Theory of Trust in Networks of Humans and Computers , 2011, Security Protocols Workshop.

[31]  Steven Furnell,et al.  Risk and restitution: Assessing how users establish online trust , 2006, Comput. Secur..

[32]  Brent A. Scott,et al.  Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. , 2007, The Journal of applied psychology.

[33]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[34]  Christina Soh,et al.  Electronic Marketplaces and Price Transparency: Strategy, Information Technology, and Success , 2006, MIS Q..

[35]  Elisa Bertino,et al.  Achieving privacy in trust negotiations with an ontology-based approach , 2006, IEEE Transactions on Dependable and Secure Computing.

[36]  P. Ward,et al.  Trust, Social Quality and Wellbeing: A Sociological Exegesis , 2009 .

[37]  Young Ae Kim,et al.  A trust prediction framework in rating-based experience sharing social networks without a Web of Trust , 2012, Inf. Sci..

[38]  E. Clemons,et al.  When Online Reviews Meet Hyperdifferentiation: A Study of the Craft Beer Industry , 2006 .

[39]  K. Wei,et al.  The role of trust in promoting organizational knowledge seeking using knowledge management systems: An empirical investigation , 2009, J. Assoc. Inf. Sci. Technol..

[40]  W. Rogers,et al.  Trust in the health system: An analysis and extension of the social theories of Giddens and Luhmann , 2008 .

[41]  Izak Benbasat,et al.  Do I Trust You Online, and If So, Will I Buy? An Empirical Study of Two Trust-Building Strategies , 2006, J. Manag. Inf. Syst..

[42]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[43]  Aniello Cimitile,et al.  From Knowledge Management Concepts Toward Software Engineering Practices , 2002, PROFES.

[44]  T. Earle,et al.  Trust in Risk Management: A Model‐Based Review of Empirical Research , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[45]  Eric Dubois,et al.  Towards a Decision Model Based on Trust and Security Risk Management , 2009, AISC.

[46]  Ronald W. Perry,et al.  Organizational Trust, Trust in the Chief Executive and Work Satisfaction , 2007 .

[47]  V. Wickramasinghe,et al.  Effects of interpersonal trust, team leader support, rewards, and knowledge sharing mechanisms on knowledge sharing in project teams , 2012 .