{"id":"https://openalex.org/W2052434846","doi":"https://doi.org/10.1109/trustcom.2013.182","title":"A Trust Evaluation Method for Supplier Selection","display_name":"A Trust Evaluation Method for Supplier Selection","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2052434846","doi":"https://doi.org/10.1109/trustcom.2013.182","mag":"2052434846"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.182","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036858449","display_name":"Xiaofeng Qiu","orcid":null},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Qiu","raw_affiliation_strings":["Beijing Key Lab. of Network Syst. Archit. & Convergence, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Lab. of Network Syst. Archit. & Convergence, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070935834","display_name":"Lei Cao","orcid":"https://orcid.org/0000-0002-6995-0122"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Cao","raw_affiliation_strings":["Sch. of Inf. & Commun. Eng., Beijing Univ. of Posts & Telecommun., Beijing, , China"],"affiliations":[{"raw_affiliation_string":"Sch. of Inf. & Commun. Eng., Beijing Univ. of Posts & Telecommun., Beijing, , China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100339743","display_name":"Pengfei Li","orcid":"https://orcid.org/0000-0002-1484-0698"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengfei Li","raw_affiliation_strings":["Sch. of Inf. & Commun. Eng., Beijing Univ. of Posts & Telecommun., Beijing, , China"],"affiliations":[{"raw_affiliation_string":"Sch. of Inf. & Commun. Eng., Beijing Univ. of Posts & Telecommun., Beijing, , China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037338962","display_name":"Liang Zhao","orcid":"https://orcid.org/0000-0002-9262-6451"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Zhao","raw_affiliation_strings":["NSFocus, Beijing, China"],"affiliations":[{"raw_affiliation_string":"NSFocus, Beijing, China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":65},"biblio":{"volume":null,"issue":null,"first_page":"1498","last_page":"1503"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information Security Policy Compliance and Awareness","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information Security Policy Compliance and Awareness","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Trust and Reputation Systems in Online Environments","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9971,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.48770556},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.482272}],"concepts":[{"id":"https://openalex.org/C87345402","wikidata":"https://www.wikidata.org/wiki/Q485202","display_name":"Analytic hierarchy process","level":2,"score":0.8245977},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7842111},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.73627394},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.6042163},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5466892},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5358611},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.49472448},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.48770556},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.4689198},{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.43919012},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.43846324},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.42336142},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.42221916},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.40801206},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.34488222},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32956344},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31265193},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15572122},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1403543},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.108121514},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.182","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1869500814","https://openalex.org/W1986441503","https://openalex.org/W2008371596","https://openalex.org/W2065031766","https://openalex.org/W2149351842","https://openalex.org/W2150883220","https://openalex.org/W2170809953","https://openalex.org/W2735750907","https://openalex.org/W643058322"],"related_works":["https://openalex.org/W4318028252","https://openalex.org/W4206658728","https://openalex.org/W3134416257","https://openalex.org/W2605508318","https://openalex.org/W24713225","https://openalex.org/W2385683470","https://openalex.org/W2322155822","https://openalex.org/W2102271161","https://openalex.org/W189760887","https://openalex.org/W1745582813"],"abstract_inverted_index":{"Trust":[0],"and":[1,20,49,68,91,113],"reputation":[2],"systems":[3],"play":[4],"important":[5,45],"roles":[6],"in":[7],"supplier":[8,33],"selection,":[9],"a":[10,18,43,59],"topic":[11],"that":[12,61,106,116],"has":[13],"been":[14],"widely":[15],"investigated":[16],"from":[17,89],"business":[19],"operation":[21],"point":[22],"of":[23,29,71,84,120,132,145],"view.":[24],"However,":[25],"we":[26],"still":[27],"lack":[28],"effective":[30],"studies":[31],"on":[32,80,125,143],"selection":[34],"with":[35,139],"security":[36],"as":[37],"the":[38,66,72,81,85,108,118],"optimal":[39],"target,":[40],"which":[41,93],"is":[42,77,137],"very":[44],"factor":[46],"for":[47],"Information":[48],"Communication":[50],"Technology":[51],"(ICT)":[52],"systems.":[53],"In":[54],"response,":[55],"this":[56],"paper":[57],"outlines":[58],"method":[60],"enables":[62,117],"people":[63],"to":[64,96],"evaluate":[65],"relative":[67,121],"objective":[69,114],"trustworthiness":[70],"alternative":[73],"suppliers.":[74],"Our":[75],"analysis":[76,115],"based":[78,124,142],"solely":[79],"original":[82],"data":[83],"vulnerabilities":[86],"publicly":[87],"available":[88],"OSVDB":[90],"NVD,":[92],"are":[94,100],"impossible":[95],"tamper":[97],"with.":[98],"They":[99],"then":[101],"interpreted":[102],"by":[103],"an":[104],"approach":[105],"combines":[107],"Analytic":[109],"Hierarchy":[110],"Process":[111],"(AHP)":[112],"inference":[119],"trust":[122],"valuations":[123],"different":[126],"evaluation":[127],"indexes.":[128],"A":[129],"case":[130],"study":[131],"five":[133],"well":[134],"known":[135],"vendors":[136],"demonstrated":[138],"qualitative":[140],"comparison":[141],"visualization":[144],"data.":[146]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2052434846","counts_by_year":[],"updated_date":"2024-11-30T23:46:00.424370","created_date":"2016-06-24"}