Filtering out content that does not meet reputation criteria through pre-filtering (by moderators) or post-filtering (by community)
Reputation for content, creators and spaces
Objects come with reputation metadata
Implies an authoring and management system for those metadata
Reputation metadata must be trustworthy, i.e., authenticated while respecting privacy
Reputation system must be user-centric (i.e., trust decisions are controlled by user) and must offer choices for transparency (must not get into the way of using content, leaves it to the user how to handle trust decisions)
Example of ORMS Interactions B about C and C about B User B User C Interaction Feedback Feedback Reputation Store I Reputation Server Reputation Feedback Feedback Interaction User D Reputation Store II Reputation Server Common Data/Context Common Schema for Rep Score Common Protocol Convertible credentials B about D and D about B Reputation Aggregator User E Inquire about Score of D within a context ; Access to Reputation of II Reputation Reputation Store I Reputation Server Reputation
To develop an Open Reputation Management System (ORMS) that provides the ability to use common data formats for representing reputation data, and standard definitions of reputation scores.
The system will not define algorithms for computing the scores. It will provide the means for understanding the relevancy of a score within a given transaction. The TC's output will enable the deployment of a distributed reputation systems that can be either centralized or decentralized with the ability for aggregators and intermediaries to be part of the business model. The standard does not tie itself to a specific IDM, but let implementers plug-in their identity-schemes to ORMS.
List of deliverables:
XML Schema for representing ORMS data
XML Schema for Reputation Score
Assertions/claims (tokens) profiles
Protocol(s) for exchanging of reputation data and assertion tokens
Use cases to gather requirements that ORMS will need to meet and understand the business and social impact of such a system including security, privacy, threats and risks requirements will also be developed. Explore the use of reputation mechanisms in novel settings.
Document that analyzes performance of existing reputation mechanisms with respect to the requirements developed in the previous steps and identify current gaps.
Algorithms that can be used for generating a reputation score are out of scope of this work. The work will define a standard way to infer what a given score will mean but will not specify how to compute that value.
The work does not exclude methods for asserting equivalence or relationships between scoring systems. A possible output of the TC work might include methods to facilitate the calculation of comparisons between score ratings, or operations that take multiple scores as inputs.
Reputation Technology Summary of actual past behavior, by service provider Real identity Background check against external data Peer reviews portable specific Identity Verification, Identity Proofing = Strong Identity Trust in specific attribute or future behavior? Digital Identity