Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yao-Hua Tan is active.

Publication


Featured researches published by Yao-Hua Tan.


International Journal of Electronic Commerce | 2000

Toward a Generic Model of Trust for Electronic Commerce

Yao-Hua Tan; Walter Thoen

The authors present a generic model of trust for electronic commerce consisting of two basic components, party trust and control trust, based on the concept that trust in a transaction with another party combines trust in the other party and trust in the control mechanisms that ensure the successful performance of the transaction. This generic trust model can be used in designing trust-related value-added services in e-commerce. To illustrate its design use, two e-commerce activities that require trust are compared: electronic payment and cross-border electronic trade. The model shows that each of these activities requires a different type of trust, created by completely different services.The authors present a generic model of trust for electronic commerce consisting of two basic components, party trust and control trust, based on the concept that trust in a transaction with another party combines trust in the other party and trust in the control mechanisms that ensure the successful performance of the transaction. This generic trust model can be used in designing trust-related value-added services in e-commerce. To illustrate its design use, two e-commerce activities that require trust are compared: electronic payment and cross-border electronic trade. The model shows that each of these activities requires a different type of trust, created by completely different services.


Archive | 2001

Trust and deception in virtual societies

Christiano Castelfranchi; Yao-Hua Tan

Preface. Introduction: Why Trust and Deception are Essential for Virtual Societies. 1. Trust As Type Detection M. Bacharach, D. Gambetta. 2. A Formal Specification of Automated Auditing of Trustworthy Trade Procedures for Open Electronic Commerce R.W.H. Bons, et al. 3. Social Trust: A Cognitive Approach R. Falcone, C. Castelfranchi. 4. Deceiving in GOLEM: how to strategically pilfer help R. Falcone, et al. 5. To Trust Information Sources: a proposal for a modal logical framework R. Demolombe. 6. Developing Trust with Intelligent Agents: An Exploratory Study G. Elofson. 7. Security Infrastructure for Software Agent Society Q. He, et al. 8. On the Characterisation of a Trusting Agent - Aspects of a Formal Approach A.J.I. Jones, B.S. Firozabadi. 9. Boundedly Rational and Emotional Agents Cooperation, Trust and Rumor M.J. Prietula, K.M. Carley. 10. A Reluctant Match: Models for the Analysis of Trust in Durable Two Party Relations W. Raub, C. Snijders. 11. Engendering Trust in Electronic Environments T. Rea. 12. Trust in Electronic Commerce H. Weigand, W.-J. van den Heuvel.


European Journal of Information Systems | 2006

Perceived risk and trust associated with purchasing at Electronic Marketplaces

Tibert Verhagen; Selmar Meents; Yao-Hua Tan

Understanding consumer behaviour is of vital importance to consumer-oriented e-business models today. In this paper, we study the relationships between consumer perceptions of risk and trust and the attitude towards purchasing at a consumer-to-consumer electronic marketplace (EM). Typical for EM settings is that consumer behaviour is subject to perceptions of the selling party as well as of the institutional structures of the intermediary that is operating the EM. Building upon the well-established literature of trust, we consider the concepts of intermediary trust and seller trust. We extend this categorisation by introducing the concepts of intermediary risk and seller risk. We developed measurement instruments for intermediary risk and seller risk. All measurement scales have acceptable alphas and are unidimensional. An empirical study is conducted to explore the relationships between the risk and trust types and consumer purchase attitude. The results reveal significant, direct effects of seller trust and seller risk. Second-order effects of intermediary trust and intermediary risk are investigated and reported. The paper concludes with general observations and recommendations for research and practice.


International Journal of Electronic Commerce | 2002

The Role of Trust and Deception in Virtual Societies

Cristiano Castelfranchi; Yao-Hua Tan

In hybrid situations where artificial agents and human agents interact, the artificial agents must be able to reason about the trustworthiness and deceptive actions of their human counterpart. Thus a theory of trust and deception is needed that will support interactions between agents in virtual societies. There are several theories on trust (fewer on deception!), but none that deals specifically with virtual communities. Building on these earlier theories, the role of trust and deception in virtual communities is analyzed, with examples to illustrate the objectives a theory of trust should fulfill.In hybrid situations where artificial agents and human agents interact, the artificial agents must be able to reason about the trustworthiness and deceptive actions of their human counterpart. Thus a theory of trust and deception is needed that will support interactions between agents in virtual societies. There are several theories on trust (fewer on deception!), but none that deals specifically with virtual communities. Building on these earlier theories, the role of trust and deception in virtual communities is analyzed, with examples to illustrate the objectives a theory of trust should fulfill.


Accelerating Global Supply Chains with IT-Innovation | 2011

Information Technology (IT)

Z.S. Baida; Frank Koldijk; Yao-Hua Tan; Allen Higgins

The RCN has published a guide to help assess the safety and effectiveness of systems such as electronic records that are based on information technology (IT), and that have been or will be introduced in areas of clinical practice.


Archive | 2001

Trust in Cyber-societies

Rino Falcone; Munindar P. Singh; Yao-Hua Tan

Introduction: Bringing Together Humans and Artificial Agents in Cyber-societies:A New Field of Trust Research.- Trust Rules for Trust Dilemmas: How Decision Makers Think and Act in the Shadow of Doubt.- Trust and Distrust Definitions: One Bite at a Time.- The Socio-cognitive Dynamics of Trust: Does Trust Create Trust?.- Belief Revision Process Based on Trust: Agents Evaluating Reputation of Information Sources.- Adaptive Trust and Co-operation: An Agent-Based Simulation Approach.- Experiments in Building Experiential Trust in a Society of Objective-Trust Based Agents.- Learning to Trust.- Learning Mutual Trust.- Distributed Trust in Open Multi-agent Systems.- Modelling Trust for System Design Using the i * Strategic Actors Framework.


Annals of Mathematics and Artificial Intelligence | 1999

Contrary-to-duty reasoning with preference-based dyadic obligations

Leendert W. N. van der Torre; Yao-Hua Tan

In this paper we introduce Prohairetic Deontic Logic (PDL), a preference‐based dyadic deontic logic. In our preference‐based interpretation of obligations “α should be (done) if β is (done)” is true if (1) no ¬α ∧ β state is as preferable as an α ∧ β state and (2) the preferred β states are α states. We show that this representation solves different problems of deontic logic. The first part of the definition is used to formalize contrary‐to‐duty reasoning, which, for example, occurs in Chisholm’s and Forrester’s notorious deontic paradoxes. The second part is used to make deontic dilemmas inconsistent.


Artificial Intelligence and Law | 1999

Diagnosis and decision making in normative reasoning

Leendert W. N. van der Torre; Yao-Hua Tan

Diagnosis theory reasons about incomplete knowledge and only considers the past. It distinguishes between violations and non-violations. Qualitative decision theory reasons about decision variables and considers the future. It distinguishes between fulfilled goals and unfulfilled goals. In this paper we formalize normative diagnoses and decisions in the special purpose formalism DIO(DE)2 as well as in extensions of the preference-based deontic logic PDL. The DIagnostic and DEcision-theoretic framework for DEontic reasoning DIO(DE)2 formalizes reasoning about violations and fulfillments, and is used to characterize the distinction between normative diagnosis theory and (qualitative) decision theory. The extension of the preference-based deontic logic PDL shows how normative diagnostic and decision-theoretic reasoning — i.e. reasoning about violations and fulfillments — can be formalized as an extension of deontic reasoning.


Archive | 2011

Accelerating Global Supply Chains with IT-Innovation

Yao-Hua Tan; Niels Bjørn-Andersen; Stefan Klein; Boriana Rukanova

One of the major challenges for European governments is to solve the dilemma of increasing the security and reducing fraud in international trade, while at the same time reducing the administrative burden for commercial as well as public administration organisations. To address these conflicting demands, the ITAIDE project has developed a large set of innovative IT-related tools and methods that enable companies to be better in control of their business operations. These tools and methods have been integrated in the ITAIDE Information Infrastructure (I3) framework. By using the I3 framework, companies are better positioned to apply for the Trusted Trader status, and enjoy trade facilitation benefits such as simplified customs procedures and fewer inspections of their goods. Hence, the I3 framework can contribute to making global supply chains faster, cheaper, and more secure. The I3 framework has been tested and validated in five real-life Living Labs, spanning four different sectors of industry, and conducted in five different EU countries. National Tax & Customs organizations from various European countries have actively participated in the Living Labs.The United Nations CEFACT group, experts from the World Customs Organization and representatives of key industry associations have also provided valuable feedback and ideas for the Living Labs and the project in general.www.itaide.org


Archive | 1997

The Many Faces of Defeasibility in Defeasible Deontic Logic

Leendert W. N. van der Torre; Yao-Hua Tan

Deontic logic is the logic of obligations, i.e. reasoning about what should be the case. Defeasible logic is the logic of default assumptions, i.e. reasoning about what normally is the case. In defeasible deontic logic these two are combined. An example of this combination is the sentence ‘normally, you should do p’. Now the problem is what to conclude about somebody who does not do p? Is this an exception to the normality claim, or is it a violation of the obligation to do p? This confusion arises because there is a substantial overlap between deontic and defeasibility aspects. In this article we analyze this overlap, and we also show that this confusion can be avoided if one makes the proper distinctions between different types of defeasibility. Furthermore, we also show that these distinctions are essential for an adequate analysis of notorious contrary-to-duty paradoxes such as the Chisholm and Forrester paradoxes.

Collaboration


Dive into the Yao-Hua Tan's collaboration.

Top Co-Authors

Avatar

Joris Hulstijn

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jaap Gordijn

VU University Amsterdam

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jianwei Liu

University of Amsterdam

View shared research outputs
Top Co-Authors

Avatar

Marijn Janssen

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar

Virginia Dignum

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar

Walter Thoen

Erasmus University Rotterdam

View shared research outputs
Top Co-Authors

Avatar

Jie Jiang

Delft University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge