Skip to main content

Digital Identity and Reputation in the Context of a Bounded Social Ecosystem

  • Conference paper
Business Process Management Workshops (BPM 2008)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 17))

Included in the following conference series:

Abstract

This paper highlights the problem of digital identity, or cross-set unique identifying tokens, inherent in the application of social software in business processes. As social software, via blogs, wikis and other Web 2.0 software, starts to bring value to the enterprise, there is a need for a unified digital identity resource. From this basis, concepts of reputation and trust may be leveraged in the context of human agents working with such software and in larger workflow processes. By analysing human agent activity within existing data sets and providing a mechanism for adding new data, it is possible to correlate human agent activities and data creation via a digital identity across disparate sources of data. From this basis, new business processes may be created using this deeper understanding of human agents. This paper highlights the need for digital identity and presents a novel method for extracting digital identity patterns from heterogeneous data sets in an automated manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akerlof, G.: Market for lemons: Quality uncertainty and the market mechanism, ideas.repec.org

  2. Binmore, K., Dasgupta, P.: Game theory: A survey. Economic Organizations as Games. Basil Blackwell, Oxford (1986)

    Google Scholar 

  3. Bird, C., Gourley, A., Devanbu, P., Gertz, M., Swaminathan, A.: Mining email social networks. In: Proceedings of the 2006 international workshop on Mining software repositories, pp. 137–143 (2006)

    Google Scholar 

  4. Bradach, J.L., Eccles, R.G.: Markets versus hierarchies: from ideal types to plural forms. Annual Review of Sociology 15, 97–118 (1989)

    Article  Google Scholar 

  5. Brooks, F.P.: The mythical man-month. Addison-Wesley Pub., Reading (1979)

    Google Scholar 

  6. Burt, R.: A note on social capital and network content. Social Networks, pp. 355–373.

    Google Scholar 

  7. Clugage, K., Shaffer, D., Nainani, B.: Workflow services in oracle bpel pm 10.1.3 (March 2006), http://tinyurl.com/2sal77

  8. Davenport, T.H.: Putting the enterprise into the enterprise system. Harvard Business Review 76(4), 121–131 (1998)

    Google Scholar 

  9. Dellarocas, C.: Analyzing the Economic Efficiency of eBay-like Online Reputation Reporting Mechanisms, MIT Sloan School of Management, pp. 4181–4101 (2001)

    Google Scholar 

  10. Efimova, L., Grudin, J.: Crossing boundaries: A case study of employee blogging. In: Proceedings of the Fortieth Hawaii International Conference on System Sciences, pp. 11–24 (2006)

    Google Scholar 

  11. Emler, N.: A social psychology of reputation. European Review of Social Psychology (1990)

    Google Scholar 

  12. Farrell, S., Lau, T.: Fringe contacts: People-tagging for the enterprise. In: Collab. Web Tagging Workshop in conj. with WWW 2006, pp. 10–100 (2008)

    Google Scholar 

  13. Fombrun, C., Shanley, M.: What’s in a name? reputation building and corporate strategy. Academy of Management Journal (1990)

    Google Scholar 

  14. Gambetta, D.: Can we trust trust. Trust: Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford, 213–237 (2000)

    Google Scholar 

  15. Good, N., Schafer, J., Konstan, J., Borchers, A.: Combining collaborative filtering with personal agents for better recommendations. In: Proceedings of AAAI, pp. 9166–9172 (1999)

    Google Scholar 

  16. Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3(4), 2–16 (2000)

    Article  Google Scholar 

  17. Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th international conference on World Wide Web, pp. 403–412 (2004)

    Google Scholar 

  18. Hiltz, S.R., Turoff, M.: Structuring computer-mediated communication systems to avoid information overload. Communications of the ACM 28(7), 3310–3312 (1985)

    Article  Google Scholar 

  19. Jennings, B., Finkelstein, A.: Flexible Workflows: Reputation-based Message Routing. In: Proceedings of BPMDS, vol. 8, p. 97

    Google Scholar 

  20. Kakizawa, Y.: In-house use of web 2.0: Enterprise 2.0. Nec Technical Journal, 8623–8635 (2007)

    Google Scholar 

  21. Li, C.: Blogging: Bubble or big deal?, Forrester Research Document, 9290–9392 (2004)

    Google Scholar 

  22. Locke, C., Weinberger, D., Searls, D.: The Cluetrain Manifesto: The End of Business As Usual. Perseus Publishing (2001)

    Google Scholar 

  23. Luna-Reyes, L., Cresswell, A., Richardson, G.: Knowledge and the development of interpersonal trust: a dynamic model. System Sciences (2004)

    Google Scholar 

  24. Massa, P.: I ITC-IRST, A survey of trust use and modeling in real online systems

    Google Scholar 

  25. Mehrabian, A.: A questionnaire measure of individual differences in stimulus screening and associated differences in arousability. Journal of Nonverbal Behavior 1(2), 89–103 (1977)

    Article  Google Scholar 

  26. Millen, D., Feinberg, J., Kerr, B.: Dogear: Social bookmarking in the enterprise. In: Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pp. 8561–8580 (2006)

    Google Scholar 

  27. Möllering, G.: The nature of trust: From georg simmel to a theory of expectation, interpretation and suspension. Sociology 35(02), 403–420 (2001)

    Article  Google Scholar 

  28. Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation for e-businesses. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS 2002), vol. 7, pp. 3184–3200 (2002)

    Google Scholar 

  29. Navarro, G.: A guided tour to approximate string matching. ACM Computing Surveys (CSUR), pp. 31–88 (2001)

    Google Scholar 

  30. Newman, M.E.J.: The structure and function of complex networks. Structure 45(2), 167–256 (2004)

    Google Scholar 

  31. Nurcan, S.: Analysis and design of co-operative work processes: a framework. Information and Software Technology, pp. 143–156 (1998)

    Google Scholar 

  32. Quan-Haase, A., Cothrel, J., Wellman, B.: Instant messaging for collaboration: A case study of a high-tech firm. Journal of Computer-Mediated Communication 10(4), 00–10 (1997)

    Google Scholar 

  33. Raub, W., Weesie, J.: Reputation and efficiency in social interactions: An example of network effects. American Journal of Sociology (1990)

    Google Scholar 

  34. Russell, N., ter Hofstede, A.H.M., Edmond, D., van der Aalst, W.M.P.: Workflow resource patterns. BETA Working Paper Series (2004)

    Google Scholar 

  35. Shapiro, C.: Consumer information, product quality, and seller reputation. Bell Journal of Economics (1982)

    Google Scholar 

  36. Stvilia, B., Twidale, M., Smith, L.: Information quality work organization in wikipedia (2008)

    Google Scholar 

  37. Tichy, W.: Should computer scientists experiment more (1998), doi:ieeecs.org

    Google Scholar 

  38. Tinsley, C., O’Connor, K., Sullivan, B.: Tough guys finish last: the perils of a distributive reputation. Organizational Behavior and Human Decision Processes (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jennings, B., Finkelstein, A. (2009). Digital Identity and Reputation in the Context of a Bounded Social Ecosystem. In: Ardagna, D., Mecella, M., Yang, J. (eds) Business Process Management Workshops. BPM 2008. Lecture Notes in Business Information Processing, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00328-8_69

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00328-8_69

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00327-1

  • Online ISBN: 978-3-642-00328-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics