By Topic

Unenforced E-commerce transactions

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
T. W. Sandholm ; Dept. of Comput. Sci., Washington Univ., St. Louis, MO, USA

Electronic commerce currently relies on traditional third party enforcement mechanisms that don't necessarily translate well to cyberspace. Chunking algorithms offer one possibility for unenforced transactions between self motivated agents. This method enables transactions in settings where the parties cannot identify each other, or where litigation is not viable. It also allows computational agents to be more autonomous by not requiring them to be strictly tied to the real world parties they represent. In cases where this type of unenforced exchange is possible, it is preferable to the strictly enforced mode of exchange because it saves enforcement costs (for example, litigation costs or operations costs of trusted third party intermediaries) and it is insensitive to enforcement uncertainties. The method is based on managing the exchange between two agents-a supplier and a demander-so that the gains from completing the exchange (cooperating according to a contract) at any point are larger for both agents than the gains from terminating it (defecting the exchange prematurely by vanishing)

Published in:

IEEE Internet Computing  (Volume:1 ,  Issue: 6 )