Abstract
This paper highlights the problem of digital identity, or cross-set unique identifying tokens, inherent in the application of social software in business processes. As social software, via blogs, wikis and other Web 2.0 software, starts to bring value to the enterprise, there is a need for a unified digital identity resource. From this basis, concepts of reputation and trust may be leveraged in the context of human agents working with such software and in larger workflow processes. By analysing human agent activity within existing data sets and providing a mechanism for adding new data, it is possible to correlate human agent activities and data creation via a digital identity across disparate sources of data. From this basis, new business processes may be created using this deeper understanding of human agents. This paper highlights the need for digital identity and presents a novel method for extracting digital identity patterns from heterogeneous data sets in an automated manner.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akerlof, G.: Market for lemons: Quality uncertainty and the market mechanism, ideas.repec.org
Binmore, K., Dasgupta, P.: Game theory: A survey. Economic Organizations as Games. Basil Blackwell, Oxford (1986)
Bird, C., Gourley, A., Devanbu, P., Gertz, M., Swaminathan, A.: Mining email social networks. In: Proceedings of the 2006 international workshop on Mining software repositories, pp. 137–143 (2006)
Bradach, J.L., Eccles, R.G.: Markets versus hierarchies: from ideal types to plural forms. Annual Review of Sociology 15, 97–118 (1989)
Brooks, F.P.: The mythical man-month. Addison-Wesley Pub., Reading (1979)
Burt, R.: A note on social capital and network content. Social Networks, pp. 355–373.
Clugage, K., Shaffer, D., Nainani, B.: Workflow services in oracle bpel pm 10.1.3 (March 2006), http://tinyurl.com/2sal77
Davenport, T.H.: Putting the enterprise into the enterprise system. Harvard Business Review 76(4), 121–131 (1998)
Dellarocas, C.: Analyzing the Economic Efficiency of eBay-like Online Reputation Reporting Mechanisms, MIT Sloan School of Management, pp. 4181–4101 (2001)
Efimova, L., Grudin, J.: Crossing boundaries: A case study of employee blogging. In: Proceedings of the Fortieth Hawaii International Conference on System Sciences, pp. 11–24 (2006)
Emler, N.: A social psychology of reputation. European Review of Social Psychology (1990)
Farrell, S., Lau, T.: Fringe contacts: People-tagging for the enterprise. In: Collab. Web Tagging Workshop in conj. with WWW 2006, pp. 10–100 (2008)
Fombrun, C., Shanley, M.: What’s in a name? reputation building and corporate strategy. Academy of Management Journal (1990)
Gambetta, D.: Can we trust trust. Trust: Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford, 213–237 (2000)
Good, N., Schafer, J., Konstan, J., Borchers, A.: Combining collaborative filtering with personal agents for better recommendations. In: Proceedings of AAAI, pp. 9166–9172 (1999)
Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3(4), 2–16 (2000)
Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th international conference on World Wide Web, pp. 403–412 (2004)
Hiltz, S.R., Turoff, M.: Structuring computer-mediated communication systems to avoid information overload. Communications of the ACM 28(7), 3310–3312 (1985)
Jennings, B., Finkelstein, A.: Flexible Workflows: Reputation-based Message Routing. In: Proceedings of BPMDS, vol. 8, p. 97
Kakizawa, Y.: In-house use of web 2.0: Enterprise 2.0. Nec Technical Journal, 8623–8635 (2007)
Li, C.: Blogging: Bubble or big deal?, Forrester Research Document, 9290–9392 (2004)
Locke, C., Weinberger, D., Searls, D.: The Cluetrain Manifesto: The End of Business As Usual. Perseus Publishing (2001)
Luna-Reyes, L., Cresswell, A., Richardson, G.: Knowledge and the development of interpersonal trust: a dynamic model. System Sciences (2004)
Massa, P.: I ITC-IRST, A survey of trust use and modeling in real online systems
Mehrabian, A.: A questionnaire measure of individual differences in stimulus screening and associated differences in arousability. Journal of Nonverbal Behavior 1(2), 89–103 (1977)
Millen, D., Feinberg, J., Kerr, B.: Dogear: Social bookmarking in the enterprise. In: Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pp. 8561–8580 (2006)
Möllering, G.: The nature of trust: From georg simmel to a theory of expectation, interpretation and suspension. Sociology 35(02), 403–420 (2001)
Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation for e-businesses. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS 2002), vol. 7, pp. 3184–3200 (2002)
Navarro, G.: A guided tour to approximate string matching. ACM Computing Surveys (CSUR), pp. 31–88 (2001)
Newman, M.E.J.: The structure and function of complex networks. Structure 45(2), 167–256 (2004)
Nurcan, S.: Analysis and design of co-operative work processes: a framework. Information and Software Technology, pp. 143–156 (1998)
Quan-Haase, A., Cothrel, J., Wellman, B.: Instant messaging for collaboration: A case study of a high-tech firm. Journal of Computer-Mediated Communication 10(4), 00–10 (1997)
Raub, W., Weesie, J.: Reputation and efficiency in social interactions: An example of network effects. American Journal of Sociology (1990)
Russell, N., ter Hofstede, A.H.M., Edmond, D., van der Aalst, W.M.P.: Workflow resource patterns. BETA Working Paper Series (2004)
Shapiro, C.: Consumer information, product quality, and seller reputation. Bell Journal of Economics (1982)
Stvilia, B., Twidale, M., Smith, L.: Information quality work organization in wikipedia (2008)
Tichy, W.: Should computer scientists experiment more (1998), doi:ieeecs.org
Tinsley, C., O’Connor, K., Sullivan, B.: Tough guys finish last: the perils of a distributive reputation. Organizational Behavior and Human Decision Processes (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jennings, B., Finkelstein, A. (2009). Digital Identity and Reputation in the Context of a Bounded Social Ecosystem. In: Ardagna, D., Mecella, M., Yang, J. (eds) Business Process Management Workshops. BPM 2008. Lecture Notes in Business Information Processing, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00328-8_69
Download citation
DOI: https://doi.org/10.1007/978-3-642-00328-8_69
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00327-1
Online ISBN: 978-3-642-00328-8
eBook Packages: Computer ScienceComputer Science (R0)