{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:01:24Z","timestamp":1747224084037,"version":"3.40.5"},"reference-count":48,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,1]]},"abstract":"<p>Trust and identity are the fundamental issues to both the social as well as digital environments. An individual or a group require both of these identities to recognize, interact, and communicate in the present day social and digital worlds. In the social environment, the concept of trust and identity are different than in digital environments, but without a clear sense of identity, there can be a no ground for building the trust. Trust is helpful in supporting the identity to survive and to build relations with other identity in a particular environment. Trust management on the other hand provides a basis to establish the trust and ensure its continuity and longevity. This article compares the social and digital identities with respect to trust issues in the present-day digital scenario. Characteristics, identification process, and lifecycle of both the identities have been presented along with the threats. The work is very helpful in mapping the social scenario to the digital scenario.<\/p>","DOI":"10.4018\/ijssmet.2020100102","type":"journal-article","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T12:35:24Z","timestamp":1602592524000},"page":"26-44","source":"Crossref","is-referenced-by-count":9,"title":["Trust Management"],"prefix":"10.4018","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6753-1557","authenticated-orcid":true,"given":"Vikas","family":"Kumar","sequence":"first","affiliation":[{"name":"Chaudhary Bansi Lal University, Bhiwani, India"}]},{"given":"Prasann","family":"Pradhan","sequence":"additional","affiliation":[{"name":"Shri Venkateshwara University, Gajraula, India"}]}],"member":"2432","reference":[{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-0","DOI":"10.1109\/EUC.2010.114"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-1","DOI":"10.1016\/j.euroecorev.2008.10.001"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-2","DOI":"10.4018\/IJSSMET.2017040103"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-3","DOI":"10.1504\/IJCC.2014.062271"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-4","DOI":"10.1023\/A:1007068714468"},{"unstructured":"Corcoglioniti, F., Cerri, D., Ghioni, A., Morandi, V., & Sgobbi, F. (2007). A trust model for distributed, cooperative and competitive environments. NeP4B Networked Peers for Business, Document ID code D1.3.1,1-46.","key":"IJSSMET.2020100102-5"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-6","DOI":"10.1080\/1461669032000072256"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-7","DOI":"10.1016\/S1353-4858(10)70144-6"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-8","DOI":"10.1007\/978-94-017-3614-5_3"},{"doi-asserted-by":"crossref","unstructured":"Friedwald, M., Vildjiounaite, E., Punie, Y., & Wright, D. (2007). Privacy, identity and security in ambient intelligence: A scenario analysis. Telematics and Informatics, 24, 15-29.","key":"IJSSMET.2020100102-9","DOI":"10.1016\/j.tele.2005.12.005"},{"year":"1995","author":"F.Fukuyama","journal-title":"Trust: social virtues and the creation of prosperity","key":"IJSSMET.2020100102-10"},{"unstructured":"Gambetta, D. (Ed.). (1990). Trust: Making and Breaking Cooperative Relation. Basil Blackwell.","key":"IJSSMET.2020100102-11"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-12","DOI":"10.1145\/1135777.1135861"},{"doi-asserted-by":"crossref","unstructured":"Giri\u016bnas, L., & Mackevi\u010dius, J. (2014). Evaluation of frauds in public sector. Entrepreneurship and Sustainability Issues, 143-150.","key":"IJSSMET.2020100102-13","DOI":"10.9770\/jesi.2014.1.3(3)"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-14","DOI":"10.1109\/COMST.2000.5340804"},{"unstructured":"Haenni, R., Jonczy, J., & Kohlas, R. (2006). Two-Layer Models for Managing Authenticity and Trust. Swiss National Science Foundation, Project No. PP002-102652 and Hasler Foundation, Project no. 2042, 1-27.","key":"IJSSMET.2020100102-15"},{"unstructured":"Hall, S. (1996). Introduction: who needs identity? Questions of cultural identity. London: Academic Press.","key":"IJSSMET.2020100102-16"},{"doi-asserted-by":"crossref","unstructured":"Hert, P. D. (2008). Identity management of e-ID, privacy and security in Europe. Ahuman rights view. Information Security Technical Report, 13, 71-75.","key":"IJSSMET.2020100102-17","DOI":"10.1016\/j.istr.2008.07.001"},{"unstructured":"ICT Data and Statistics Division. (2015). ICT Facts and Figures -The world in 2015. http:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Documents\/facts\/ICTFactsFigures2015.pdf","key":"IJSSMET.2020100102-18"},{"unstructured":"International Telecommunications Union. (2017). ICT Facts and Figures 2017. https:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Pages\/stat\/default.aspx","key":"IJSSMET.2020100102-19"},{"key":"IJSSMET.2020100102-20","article-title":"Distributed trust","author":"J.Ioannidis","year":"2005","journal-title":"Practical handbook of Internet Computing"},{"key":"IJSSMET.2020100102-21","first-page":"993","article-title":"Smart cheaters do prosper: defeating trust and reputation systems","author":"R.Kerr","year":"2009","journal-title":"proceedings of the Eighth International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009)"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-22","DOI":"10.1007\/978-3-642-13869-0_14"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-23","DOI":"10.4018\/IJSDS.2018010105"},{"issue":"1","key":"IJSSMET.2020100102-24","first-page":"64","article-title":"Role of Service Level Agreements in SaaS business scenario","volume":"9","author":"V.Kumar","year":"2013","journal-title":"The IUP Journal of Information Technology"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-25","DOI":"10.4018\/IJOM.2015070104"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-26","DOI":"10.4018\/IJEIS.2016010102"},{"unstructured":"Mahoney, G., Myrvold, W., & Shoja, G. C. (2005). Generic reliability trust model. PST'05 3rd annual conference on privacy, security and trust, 113-120.","key":"IJSSMET.2020100102-27"},{"year":"1999","author":"K.Marx","journal-title":"the poverty of philosophy","key":"IJSSMET.2020100102-28"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-29","DOI":"10.4018\/IJSSMET.2017070107"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-30","DOI":"10.1016\/j.jesp.2005.03.002"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-31","DOI":"10.1016\/j.future.2010.10.008"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-32","DOI":"10.1177\/0192512101222004"},{"doi-asserted-by":"crossref","unstructured":"Olsen, T., & Mahler, T. (2007). Identity management and data protection law: Risk, responsibility and compliance in \u2018Circles of Trust\u2019- Part II. Computer Law and Security Report, 23, 415-426.","key":"IJSSMET.2020100102-33","DOI":"10.1016\/j.clsr.2007.07.001"},{"doi-asserted-by":"crossref","unstructured":"Palson Kennedy, R., & Gopal, T.V. (2010). Assessing the risks and opportunities of cloud computing \u2013 defining identity management systems and maturity models. IEEE ITPro Magazine, 138\u2013142.","key":"IJSSMET.2020100102-34","DOI":"10.1109\/TISC.2010.5714625"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-35","DOI":"10.4018\/IJVCSN.2016100101"},{"unstructured":"Rahman, A. A., & Hailes, S. (2000). Supporting Trust in Virtual Communities. In HICSS \u201900: Proceedings of the 33rd Hawaii International Conference on System Sciences. IEEE Computer Society.","key":"IJSSMET.2020100102-36"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-37","DOI":"10.4018\/IJSSMET.2017070103"},{"key":"IJSSMET.2020100102-38","article-title":"Cloud Computing","author":"J. W.Rittinghouse","year":"2010","journal-title":"Implementation, Management and Security"},{"unstructured":"Rooy, D. V., & Bus, J. (2010). Trust and privacy in the future internet- a research perspective. EU Research program on Information and Communication Technologies, Brussels, Belgium.","key":"IJSSMET.2020100102-39"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-40","DOI":"10.1353\/wp.2006.0022"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-41","DOI":"10.1111\/0272-4332.203034"},{"doi-asserted-by":"crossref","unstructured":"Such, J. M., Espinosa, A., Garcia-Fornes, A., & Botti, V. (2011). Partial identities as a foundation for trust and reputation. In Engineering Applications of Artificial Intelligence. Elsevier Ltd.","key":"IJSSMET.2020100102-42","DOI":"10.1016\/j.engappai.2011.06.008"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-43","DOI":"10.4018\/IJSSMET.2017100101"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-44","DOI":"10.1007\/978-0-387-73655-6_10"},{"issue":"3","key":"IJSSMET.2020100102-45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1867713.1867715","article-title":"Evidence-Based Trust- A Mathematical Model Geared for Multiagent Systems","volume":"5","author":"Y.Wang","year":"2010","journal-title":"ACM Transactions on Autonomous and Adaptive Systems"},{"unstructured":"World Development Indicators. (2017). World Development Indicators: Population dynamics. http:\/\/wdi.worldbank.org\/table\/2.1","key":"IJSSMET.2020100102-46"},{"doi-asserted-by":"publisher","key":"IJSSMET.2020100102-47","DOI":"10.1016\/j.future.2010.12.006"}],"container-title":["International Journal of Service Science, Management, Engineering, and Technology"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=264404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T01:53:07Z","timestamp":1651888387000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSSMET.2020100102"}},"subtitle":["Social vs. Digital Identity"],"short-title":[],"issued":{"date-parts":[[2020,10,1]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijssmet.2020100102","relation":{},"ISSN":["1947-959X","1947-9603"],"issn-type":[{"type":"print","value":"1947-959X"},{"type":"electronic","value":"1947-9603"}],"subject":[],"published":{"date-parts":[[2020,10,1]]}}}