Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation

  • Vangalur Alagar
  • Kaiyu Wan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8743)

Abstract

This paper examines the necessity to integrate Economic Theories and Trust Theories with Knowledge Science for trustworthy service automation in modern day society’s technology-driven environment. Current demands for open user-centric distributed service systems far outweigh the capabilities of existing systems in application areas such as health care, e-business, and consumer-centric power and water distribution systems. The basis of service transactions, whether in traditional market place or on-line system, is trust and lack of trust will have diminishing effect on the economic value. It is essential to identify user perspectives and relate their social psychology to meaningful trust determinants in the system to be automated. Since the systems are typically large, distributed, and deal with many heterogeneous collection of sensory devices and actuators that are specific to each service domain, it is necessary that the experts of the application domain and system developers share their knowledge and wisdom in the creation of the system. Sharing knowledge requires trust, and using the acquired knowledge requires creativity, born out of tacit knowledge, to go beyond risks. Motivated by this triangular web of Economics, Trust, and Knowledge that impacts on consumer-centric service automation, this paper explores their interesting connections, explains the different kinds of trust to be distilled from it, and identifies the design stages where the appropriate trust determinants are to be fostered in order to achieve a dependable service automation system.

Keywords

Service Automation Economic Theory Trust Theory Knowledge Science 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ackoff, R.L.: From Data to Wisdom. Journal of Applies Systems Analysis 16, 3–9 (1989)Google Scholar
  2. 2.
    Art, D., Gil, Y.: A Survey of Trust in Computer Science and the Semantic Web. Web Semantic Sci Serv Agents World Wide Web 5(2), 58–71 (2007)CrossRefGoogle Scholar
  3. 3.
    Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)CrossRefGoogle Scholar
  4. 4.
    Broy, M.: Service-Oriented Systems Engineering: Modeling Services and Layered Architectures. In: König, H., Heiner, M., Wolisz, A. (eds.) FORTE 2003. LNCS, vol. 2767, pp. 48–61. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Cross, R., Baird, L.: Technology is Not Enough: Improving Performance by Building Organizational Memory. Sloan Management Review 41(3), 69–78 (2000)Google Scholar
  6. 6.
    Fricke, M.: The Knowledge Pyramid: a critique of the DIKW hierarchy. Journal of Information Science 35(2), 131–142 (2009)CrossRefGoogle Scholar
  7. 7.
    Friedman, B., Khan, P.H., Howe, D.C.: Trust Online. Communications of the ACM 43(12) (2000)Google Scholar
  8. 8.
    Fritz, M., Hausen, T., Schefer, G., Canavari, M.: Trust and Electronic Commerce in the Agrifood Sector: a trust model and experimental experience. Presented at the XIth International Congress of the EAAE (European Association of Agricultural Economists), The Future of Rural Europe in the Global Agri-Food System, Copenhagen, Copenhagen, Denmark, August 24-27 (2005)Google Scholar
  9. 9.
    Herzberg, D., Broy, M.: Modelling layered distributed communications systems. Formal Aspects of Computing 17(1), 1–18 (2005)CrossRefMATHGoogle Scholar
  10. 10.
    Hoffmann, H., Söllner, M.: Incorporating Behavioral Trust Theory into System Development for Ubiquitous Applications. Pers. Ubiquit. Comput. 18, 117–128 (2014)CrossRefGoogle Scholar
  11. 11.
    Holste, J.S., Fields, D.: Trust and Tacit Knowledge: sharing and use. Journal of Knowledge Management 14(1), 128–140 (2010)CrossRefGoogle Scholar
  12. 12.
    Jackson, D.: A direct path to dependable software. Communications of the ACM 52(4), 78–88 (2009)CrossRefGoogle Scholar
  13. 13.
    Johnson, D., Grayson, K.: Cognitive and Affective Trust in Service Relationship. Journal of Business Research 58, 500–507 (2005)CrossRefGoogle Scholar
  14. 14.
    Lee, J.D., See, K.A.: Trust in Automation: Designing for Appropriate Reliance. Human Factors 46(1), 50–80 (2004)CrossRefGoogle Scholar
  15. 15.
    Levin, T., Irvine, C., Benzel, T., Nguyen, T., Clark, P., Bhaskara, G.: Trusted Emergency Management. Technical Report (NPS-CS-09-001), Naval Postgraduate School, Monterey, California, USA (2009)Google Scholar
  16. 16.
    McKnight, D.H., Chervany, N.L.: Trust and Distrust Definitions: One Bite at a Time. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol. 2246, pp. 27–54. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  17. 17.
    Mohammad, M., Alagar, V.: A Formal Approach for the Specification and Verification of Trustworthy Component-Based Systems. Journal of Systems and Software 84, 77–104 (2011)CrossRefGoogle Scholar
  18. 18.
    Moorman, C., Zaltman, G., Deshpande, R.: Relationship between Providers and Users of Marketing Research: the dynamics of trust within and between organizations. J Mark Res 29, 314–328 (1992)CrossRefGoogle Scholar
  19. 19.
    Muir, B.M.: Trust in Automation: Part I: Theoretical Issues in the Study of Trust and Human Intervention in Automated Systems. Ergonomics 37(11), 1905–(1922)CrossRefGoogle Scholar
  20. 20.
    Myers, A., Liskov, B.: A Decentralized Model for Information Flow Control. In: Proceedings of the 16th ACM Symposium on Operating System Principles, Saint Malo, France (October 1977)Google Scholar
  21. 21.
    Pavlou, P.A.: Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model. International Journal of Electronic Commerce 7(3), 101–134 (2003)Google Scholar
  22. 22.
    Rowley, J.: The wisdom hierarchy: representation of the DIKW hierarchy. Journal of Information Science 33(2), 163–1805 (2007)CrossRefGoogle Scholar
  23. 23.
    Sillence, E., Briggs, P., Fishwick, L., Harris, P.: Trust and Mistrust of Online Health Sites. In: ACM SIGCHI Conference on Human Factors in Computing Systems, Vienna (2004)Google Scholar
  24. 24.
    TCIPG. Trustworthy Cyber Infrastructure For The Power Grid, http://tcipg.org/
  25. 25.
    Wan, K., Alagar, V., Ibrahim, N.: An Extended Service-oriented Architecture for Consumer-centric E-Commerce. International Journal of Information and Communication Technology Research 3(1), 1–28 (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Vangalur Alagar
    • 1
  • Kaiyu Wan
    • 2
  1. 1.Concordia UniversityMontrealCanada
  2. 2.Xi’an Jiaotong-Liverpool UniversitySuzhouPRC

Personalised recommendations