The improvement of wireless technologies and the increasing spread of mobile phones open new possibilities to perform mobile Customer-to-Customer commercial activities. In this new scenario, where users cannot rely on stable connections, it assumes a great relevance how to trust the counterpart in a transaction and how to avoid that a disconnection, possible in wireless connections, can encourage users to cheat. To tackle these issues we propose a feedback-based reputation mechanism able to detect malicious users better than other state-of-the-art techniques, as shown by the large number of experiments run to measure the accuracy of the compared methods in the most common situations.
The improvement of wireless technologies and the increasing spread of mobile phones open new possibilities to perform mobile Customer-to-Customer commercial activities. In this new scenario, where users cannot rely on stable connections, it assumes a great relevance how to trust the counterpart in a transaction and how to avoid that a disconnection, possible in wireless connections, can encourage users to cheat. To tackle these issues we propose a feedback-based reputation mechanism able to detect malicious users better than other state-of-the-art techniques, as shown by the large number of experiments run to measure the accuracy of the compared methods in the most common situations.
CellTrust: a Reputation Model for C2C Commerce / Lax, Gianluca; Sarne', GIUSEPPE MARIA LUIGI. - In: ELECTRONIC COMMERCE RESEARCH. - ISSN 1389-5753. - 8:4(2008), pp. 193-216. [10.1007/s10660-008-9019-8]
CellTrust: a Reputation Model for C2C Commerce
GIANLUCA LAX;GIUSEPPE MARIA LUIGI SARNÈ
2008-01-01
Abstract
The improvement of wireless technologies and the increasing spread of mobile phones open new possibilities to perform mobile Customer-to-Customer commercial activities. In this new scenario, where users cannot rely on stable connections, it assumes a great relevance how to trust the counterpart in a transaction and how to avoid that a disconnection, possible in wireless connections, can encourage users to cheat. To tackle these issues we propose a feedback-based reputation mechanism able to detect malicious users better than other state-of-the-art techniques, as shown by the large number of experiments run to measure the accuracy of the compared methods in the most common situations.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.