Abstract
Information asymmetry makes network transaction at risk, and trust is the foundation of network transactions. Under network transactions environment, the trust evaluation is important to predict the trust object’s credit risk. Therefore, on the basis of analyzing the influential factors of trust, we proposed an improved trust evaluation model based on cloud model; further, credit risk evaluation methodology was proposed based on the trust evaluation model. Taking C2C as an example to do the numerical experiment, results show that the trust evaluation model and credit risk evaluation method proposed in this paper, can make a reasonable evaluation and interpretation of the credit risk under network transactions.
This research has been supported by National Natural Science Foundation of China (No.71271043 and No.71473031), the special research Foundation of Ph.D program of China (No.20110185110021) and SiChuan Province Science and technology support project (No.2012SZ0001).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhang, S., Xu, C., An, Y.: Study on the risk evaluation approach based on cloud model. J. Univ. Electron. Technol. China 42(1), 92–104 (2013)
McKnight, D.H., Choud Hury, V., Kacmar, C.: The impact of initial consumer on intentions to transact with a web site; a trust building model. J. Strateg. Inf. Syst. 11(5), 297–323 (2002)
Baba, M.L.: Dangerous liaisons: trust, distrust, and information technology in the American work organizations. Hum. Organ. 58(3), 331–346 (1999)
Lu, Y., Zhou, T.: An empirical analysis of factors influencing consumers’ initial trust under B2C environment. Nankai Bus. Rev. 8(6), 96–101 (2005)
Ma, Q., ZhaoJia, Z.Y., Hao, J.: A research on the formation mechanism of customers’ initial trust under C2C environment: the moderation effect of network shopping experience. Manage. Rev. 24(7), 70–81 (2012)
Ganeriwal, S., Sarivastava, M.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Senor Networks, pp. 66–77 (2004)
Kim, T.K., Seo, H.S.: A trust model using fuzzy logic in wireless sensor network. In: Proceedings of World Academy of Science, Engineering and Technology, pp. 63–66 (2008)
Wang, S., Zhang, L., Li, H.: Evaluation approach of subjective trust based on cloud model. J. Softw. 21(6), 1341–1352 (2010)
Min, X., Zongfang, Z., Lin, C.: A study on the frequency of related party transactions by listed Chinese enterprise groups. Manag. Rev. 23(7), 124–130 (2011)
Shi, Y., Peng, Y., Xu, W.X., Tang, X.W.: Data mining via multiple criteria linear programming: applications in credit card portfolio management. Int. J. Inf. Technol. Decis. Making 1(1), 131–151 (2002)
Chen, J., Zhang, S.: Study on trust evaluation model based on cloud model and trust chain. Appl. Res. Comput. 32(1), 249–253 (2015)
Ruixuan, L., Chang, G., Xiwu, G., Zhengding, L.: Research on credit counting and risk evaluation for C2C e-commerce. J. Commun. 30(7), 76–85 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Hui, L., Yumeng, H., Zongfang, Z. (2015). Credit Risk Evaluation Based on Improved Trust Evaluation Method Under Network Transaction. In: Zhang, C., et al. Data Science. ICDS 2015. Lecture Notes in Computer Science(), vol 9208. Springer, Cham. https://doi.org/10.1007/978-3-319-24474-7_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-24474-7_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24473-0
Online ISBN: 978-3-319-24474-7
eBook Packages: Computer ScienceComputer Science (R0)