Hostname: page-component-cd9895bd7-mkpzs Total loading time: 0 Render date: 2024-12-18T01:53:21.089Z Has data issue: false hasContentIssue false

On agent technology for e-commerce: trust, security and legal issues

Published online by Cambridge University Press:  01 March 2007

MARIA FASLI
Affiliation:
University of Essex, Department of Computer Science, Wivenhoe Park, Colchester CO4 3SQ, UK; e-mail: [email protected]

Abstract

The vision of future electronic marketplaces (e-markets) is that of markets being populated by autonomous intelligent entities—software, trading, e-agents—representing their users or owners and conducting business on their behalf. For this vision to materialize, one fundamental issue that needs to be addressed is that of trust. First, users need to be able to trust that the agents will do what they say they do. Second, they need to be confident that their privacy is protected and that the security risks involved in entrusting agents to perform transactions on their behalf are minimized. Finally, users need to be assured that any legal issues relating to agents trading electronically are fully covered as they are in traditional trading practices. In this paper we consider the barriers for the adoption of agent technology in electronic commerce (e-commerce) which pertain to trust, security and legal issues. We discuss the perceived risks of the use of agents in e-commerce and the fundamental issue of trust in this context. Issues regarding security, and how some of these can be addressed through the use of cryptography, are described. The impact of the use of agent technology on the users' privacy and how it can be both protected as well as hindered by it is also examined. Finally, we discuss the legal issues that arise in agent-mediated e-commerce and discuss the idea of attributing to software agents the status of legal persons or e-persons and the various implications.

Type
Original Article
Copyright
Copyright © Cambridge University Press 2007

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Andrade, F., Novais, P. & Neves, J. 2004 Issues on intelligent electronic agents and legal relations. In Proceedings of the Law of Electronic Agents Workshop (LEA-04), Rome, Italy, June 30, pp. 81–94.Google Scholar
Apistola, M., Brazier, F., Kubbe, O., Oskamp, A., Schellekens, M. & Voulon, M. 2002 Legal aspects of agent technology. In Proceedings of the 17th BILETA Conference, Amsterdam, The Netherlands, April 5–6.Google Scholar
Arunachalam, R. & Sadeh, N. 2004 The 2003 supply chain management trading agent competition. In Proceedings of the Trading Agent Design and Analysis Workshop (TADA), Acapulco, Mexico, August 11.Google Scholar
Axelrod, R. 1984 The Evolution of Cooperation. New York, NY: Basic Books.Google Scholar
Baker, S. A. & Hurst, P. R. 1998 The Limits of Trust. The Hague: Kluwer Law International.Google Scholar
Bickmore, T. W. & Cassell, J. 2001 Relational agents: a model and implementation of building user trust. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems CHI, Seattle, WA, March 31–April 5, New York, NY: ACM Press, pp. 396–403.Google Scholar
Brazier, F. M. T., Oskamp, A., Prins, C., Schellekens, M. H. M. & Wijngaards, N. J. E. 2004a Anonymity and software agents: an interdisciplinary challenge. Artificial Intelligence and Law 12(1–2), 137157.CrossRefGoogle Scholar
Brazier, F. M. T., Oskamp, A., Schellekens, M. H. M. & Wijngaards, N. J. E. 2003 Can agents close contracts? In Oskamp, A. & Weitzenboeck, E. (eds.), Proceedings of the Law of Electronic Agents Workshop (LEA-03), Edinburgh, UK, June 24, pp. 9–20.Google Scholar
Brazier, F. M. T., Oskamp, A., Prins, J. E. J., Schellekens, M. H. M. & Wijngaards, N. J. E. 2004b Law-abiding and integrity on the Internet: a case for agents. Artificial Intelligence and Law 12(1–2), 537.CrossRefGoogle Scholar
Bromley, D. B. 1993 Reputation, Image and Impression Management. Chichester, UK: Wiley.Google Scholar
Bygrave, L. A. 2001 Electronic agents and privacy: a Cyberspace Odyssey 2001. International Journal of Law and Information Technology 9(3), 275294.CrossRefGoogle Scholar
Chaum, D. 1982 Blind signatures for untraceable payments. In Chaum, D., Rivest, R. L. & Sherman, A. T. (eds.), Advances in Cryptology: Proceedings of CRYPTO’82 Conference, Santa Barbara, CA, August, New York: Plenum, pp. 199–203.Google Scholar
Child, M. & Linketscher, N. 2001 Trust issues and user reactions to e-services and electronic marketplaces: a customer survey. Technical Report HPL-2001-32, Hewlett Packard, Trusted E-Services Laboratory, HP Laboratories, Bristol.Google Scholar
Claessens, J., Preneel, B. & Vandewalle, J. 2003 (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. ACM Transactions on Internet Technology 3(1), 2848.CrossRefGoogle Scholar
Dash, R. K., Jennings, N. R. & Parkes, D. C. 2003 Computational-mechanism design: a call to arms. IEEE Intelligent Systems 18(6), 4047.CrossRefGoogle Scholar
Dellarocas, C. 2000a Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of the 2nd ACM conference on Electronic commerce (EC-00), Minneapolis, MN, October 17–20, New York, NY: ACM Press, pp. 150–157.Google Scholar
Dellarocas, C. 2000b Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In Proceedings of the 21st International Conference on Information Systems (ICIS-00), Brisbane, Australia, December 10–13. Atlanta, GA: Association for Information Systems Press, pp. 520–525.Google Scholar
Dellarocas, C. & Klein, M. 1999 Civil agent societies: tools for inventing open agent-mediated electronic marketplaces. In Moukas, A., Sierra, C. & Ygge, F. (eds.), Agent Mediated Electronic Commerce II, Towards Next-Generation Agent-Based Electronic Commerce Systems, IJCAI 1999 Workshop (Lecture Notes in Artificial Intelligence, 1788), Stockholm, Sweden, July 31. Berlin: Springer, pp. 24–39.Google Scholar
Diffie, W. & Hellman, M. 1976 Multiuser cryptographic techniques. In Proceedings of the AFIPS National Computer Conference, New York, June. Montvale, NJ: AFIPS Press, pp. 109–112.Google Scholar
Dignum, F. 2001 Agents, markets, institutions, and protocols. In Dignum, F. & Sierra, C. (eds.), Agent Mediated Electronic Commerce, The European AgentLink Perspective (Lecture Notes in Artificial Intelligence, 1991). Berlin: Springer, pp. 98–114.CrossRefGoogle Scholar
Dignum, F. 2002 Abstract norms and electronic institutions. In Lindemann, G., Moldt, D., Paolucci, M. & Yu, B. (eds.), Proceedings of the Regulated Agent-based Social Systems: Theory and Applications Workshop (RASTA’02), Bologna, Italy, July 16, pp. 93–103.Google Scholar
Doorenbos, R. B., Etzioni, O. & Weld, D. S. 1997 A scalable comparison-shopping agent for the World Wide Web. In Proceedings of the 1st International Conference on Autonomous Agents (Agents 97), Marina del Rey, CA, February 5–8, New York, NY: ACM Press, pp. 39–48.Google Scholar
Esteva, M., Rodríguez-Aguilar, J. A., Sierra, C., Garcia, P. & Arcos, J. L. 2001 On the formal specification of electronic institutions. In Dignum, F. & Sierra, C. (eds.), Agent Mediated Electronic Commerce, The European AgentLink Perspective (Lecture Notes in Artificial Intelligence, 1991). Berlin: Springer, pp. 126–147.Google Scholar
Falcone, R. &Castelfranchi, C. 2004 Trust dynamics: How trust is influenced by direct experiences and by trust itself. In Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-04), New York, NY, July 23–25, IEEE Computer Society, pp. 740–747.Google Scholar
Fasli, M. 2006 Shopbots: A syntactic present, a semantic future. IEEE Internet Computing 10(6), 6975.Google Scholar
Froomkin, A. M. 1995 Anonymity and its enmities. Journal of Online Law Art. 4. Available at http://www.wm.edu/law/publications/jol/95_96/froomkin.htmlGoogle Scholar
Froomkin, A. M. 1996 Flood control on the information ocean: living with anonymity, digital cash, and distributed databases. Journal of Law and Commerce 15, 395479.Google Scholar
Geurts, R. 2002 Legal aspects of software agents. In Prins, J. E. J., Ribbers, P. M. A., van Tilborg, H. C. A., Veth, A. F. L. & van der Wees, J. G. L. (eds.), Trust in Electronic Commerce: The Role of Trust from a Legal, an Organizational and a Technical Point of View. The Hague: Kluwer, pp. 231–270.Google Scholar
Guttman, A. G., Moukas, R. H. & Maes, P. 1999 Agent-mediated integrative negotiation for retail electronic commerce. In Noriega, P. & Sierra, C. (eds.), Agent Mediated Electronic Commerce, 1st International Workshop on Agent Mediated Electronic Trading (AMET’98), Selected Papers (Lecture Notes in Artificial Intelligence, 1571). Berlin: Springer, pp. 70–90.Google Scholar
He, M., Jennings, N. R. & Leung, H.-F. 2003 On agent-mediated electronic commerce. IEEE Transactions on Knowledge and Data Engineering 15(4), 9851003.Google Scholar
Jansen, W. & Karygiannis, T. 1999 Mobile agent security. Technical Report NIST Special Publication 800-19, National Institute of Standards and Technology. Available at csrc.nist.gov/publications/nistpubs/.Google Scholar
Jenks, J. M. & Kelly, J. M. 1985 Don't Do, Delegate! New York: Franklin Watts.Google Scholar
Kollock, P. 1999 The production of trust in online markets. In Lawler, E. J., Macy, M., Thyne, S. & Walker, H. A. (eds.), Advances in Group Processes, vol. 16. Greenwich, CT: JAI Press.Google Scholar
Krulwich, B. T. 1996 The BargainFinder agent: comparing price shopping on the Internet. In Williams, J. (ed.) Bots and Other Internet Beasties, SAMS.NET. London: Macmillan, pp. 258–263.Google Scholar
Lee, J. & Moray, N. 1992 Trust, control strategies and allocation of function in human–machine systems. Ergonomics 35(10), 12431270.CrossRefGoogle ScholarPubMed
Linden, G., Smith, B. & York, J. 2003 Amazon.com recommendations: item-to-item collaborative filtering. IEEE Internet Computing 7(1), 7680.CrossRefGoogle Scholar
Luhmann, N. 1979 Trust and Power: Two Works. Chichester: Wiley.Google Scholar
Luhmann, N. 1990 Familiarity, confidence, trust: problems and alternatives. In Gambetta, D. (ed.), Trust: Making and Breaking Cooperative Relations. Oxford: Blackwell, pp. 94–109.Google Scholar
Maes, P., Guttman, R. & Moukas, A. 1999 Agents that buy and sell: transforming commerce as we know it. Communications of the ACM 42(3), 8191.CrossRefGoogle Scholar
Marsh, S. 1994 Formalising trust as a computational concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling, UK.Google Scholar
Martin, D. 1998 Internet anonymizing techniques. login:Magazine. Available at www.usenix.org/publications/login/1998-5/martin.html.Google Scholar
McAfee, R. P. & McMillan, J. 1987 Auctions and bidding. Journal of Economic Literature 25(2), 699738.Google Scholar
Menczer, F., Street, W. N.,Vishwakarma, N., Monge, A. E. & Jakobsson, M. 2002 IntelliShopper: a proactive, personal, private shopping assistant. In Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-02), Bologna, Italy, July 15–19, New York, NY: ACM Press, pp. 1001–1008.Google Scholar
Michalakopoulos, M. & Fasli, M. 2005 On deciding to trust. In Proceedings of the 3rd International Conference on Trust Management (iTrust) (Lecture Notes in Artificial Intelligence, 3477). Berlin: Springer, pp. 61–76.Google Scholar
Montaner, M., Lopez, B. & Dela, J. 2003 A taxonomy of recommender agents on the Internet. Artificial Intelligence Review 19(4), 285330.CrossRefGoogle Scholar
Muir, B. M. 1987 Trust between humans and machines and the design of decision aids. International Journal of Man–Machine Studies 46, 485500.Google Scholar
Norman, D. A. 1990 The “problem” of automation: inappropriate feedback and interaction, not “over-automation”. In Broadbent, D. E., Baddeley, A. & Reason, J. T. (eds.), Human Factors in Hazardous Situations. Oxford: Oxford University Press, pp. 585–593.Google Scholar
North, D. C. 1990 Institutions, Institutional Change and Economic Performance. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Oates, D. 1993 Leadership: The Art of Delegation. London: Century Business.Google Scholar
Patrick, A. S. 2002 Building trustworthy agents. IEEE Internet Computing 6(6), 4653.CrossRefGoogle Scholar
Pine, B. J. 1999 Mass Customisation. Boston, MA: Harvard Business School Press.Google Scholar
Reagle, J. M. Jr. 1996 Trust in electronic markets: the convergence of cryptographers and economists. First Monday. Available at: www.firstmonday.dk/issues/issue2/markets/.CrossRefGoogle Scholar
Resnick, P., Kuwabara, K., Zeckhauser, R. & Friedman, E. 2000. Reputation systems. Communications of the ACM 43(12), 4548.CrossRefGoogle Scholar
Resnick, P. & Varian, H. R. 1997 Recommender systems. Communications of the ACM 40(3), 5658.CrossRefGoogle Scholar
Rhee, M. Y. 2003 Internet Security: Cryptographic Principles, Algorithms and Protocols. Chichester: Wiley.Google Scholar
Riegelsberger, J. & Sasse, A. M. 2001 Trustbuilders and trustbusters: the role of trust in interfaces to e-commerce applications. In Towards The E-Society: E-Commerce, E-Business, and E-Government, Proceedings of the 1st IFIP Conference on E-Commerce, E-Business, E-Government (I3E 2001), Zurich, Switzerland, pp. 17–30.Google Scholar
Rotter, J. B. 1980 Interpersonal trust, trustworthiness and gullibility. American Psychologist 35(1), 17.CrossRefGoogle Scholar
Sartor, G. 2002 Agents in Cyberlaw. In Sartor, G. & Cevenini, C. (eds.), Proceedings of theWorkshop on the Law of Electronic Agents (LEA 2002), Bologna, Italy, July 13.Google Scholar
Schneider, J., Kortuem, G., Jager, J., Fickas, S. & Segall, S. 2000 Disseminating trust information in wearable communities. Personal and Ubiquitous Computing 4(4), 245248.Google Scholar
Senicar, V., Jerman-Blazic, B. & Klobucar, T. 2003 Privacy-enhancing technologies: approaches and development. Computer Standards and Interfaces 25(2), 147158.CrossRefGoogle Scholar
Shapiro, S. P. 1987 The social control of impersonal trust. American Journal of Sociology 93(3), 623658.CrossRefGoogle Scholar
Sierra, C. & Noriega, P. 2002 Agent-mediated interaction: From auctions to negotiation and argumentation. In d'Inverno, W., Luck, M., Fisher, M. & Priest, C. (eds.), Foundations and Applications of Multi-agent Systems: UKMAS Workshops 1996–2000, Selected Papers (Lecture Notes in Artificial Intelligence, 2403). Berlin: Springer, pp. 27–48.Google Scholar
Stallings, W. 2003 Network Security Essentials: Applications and Standards. Upper Saddle River, NJ: Prentice-Hall.Google Scholar
Tschudin, C. F. 1999 Mobile agent security. In Klusch, M. (ed.), Intelligent Information Agents: Agent-Based Information Discovery and Management on the Internet. Berlin: Springer, ch. 18, pp. 431–446.Google Scholar
Ulfelder, S. June 2000 Undercover Agents. Computer World. Available at www.computerworld.com/news/2000/story/0,11280,45452,00.html.Google Scholar
Vázquez-Salceda, J., Padget, J., Cortés, U., López-Navidad, A. & Caballero, F. 2003 Formalizing an electronic institution for the distribution of human tissues. Artificial Intelligence in Medicine 27(3), 233258.CrossRefGoogle ScholarPubMed
Vulkan, N. 2003 The Economics of E-commerce. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Weitzenbock, E. M. 2001 Electronic agents and the formation of contracts. International Journal of Law and Information Technology 9(3), 204234.CrossRefGoogle Scholar
Weitzenbock, E. M. 2002 Electronic agents and contract performance: good faith and fair dealing. In Proceedings of the Law of Electronic Agents Workshop (LEA-02): Selected Revised Papers, Bologna, Italy, July 13, pp. 67–73.Google Scholar
Wellman, M. P., Greenwald, A. R., Stone, P. & Wurman, P. R. 2003 The 2001 Trading Agent Competition. Electronic Markets 13(1).CrossRefGoogle Scholar
Wettig, S. & Zehender, E. 2004 A legal analysis of human and electronic agents. Artificial Intelligence and Law 12(1–2), 111135.CrossRefGoogle Scholar
Wooldridge, M. & Jennings, N. R. 1995 Intelligent agents: theory and practice. Knowledge Engineering Review 10(2), 115152.CrossRefGoogle Scholar
Youll, J. 2001 Agent-based electronic commerce: opportunities and challenges. In Proceedings of the 5th International Symposium on Autonomous Decentralized Systems (ISADS), Dallas, TX, pp. 146–148.Google Scholar
Yu, B. & Singh, M. P. 2002 An evidential model of distributed reputation management. In Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’02), Bologna, Italy, July 15–19, New York, NY: ACM Press, pp. 294–301.Google Scholar