The document discusses trust networks in interpersonal, social, and sensor contexts. It provides motivational examples for tracking trust, defines trust and related concepts like trustworthiness and reputation, and presents a trust ontology. It also discusses how to glean trustworthiness using practical examples like beta distributions and trust metrics. Finally, it outlines research challenges in modeling trust for sensor, social, and interpersonal networks.
Computer Assisted Review and Reasonable Solutions under Rule26Michael Geske
The document discusses various studies conducted by the Electronic Discovery Institute on topics related to meeting reasonableness requirements for discovery responses under the Federal Rules of Civil Procedure. It summarizes several studies, including ones on de-duplication of documents, categorization of documents, and email threading. The studies found that these technology-assisted processes can help reduce costs and improve accuracy and speed of discovery compared to solely human review.
Cognitive Legal Science is a joint venture that uses scientific methods to optimize trial lawyers' arguments and maximize the likelihood of a favorable verdict. They used their Addressable Minds approach on a $370 million defamation case, testing different argument elements and messages with an online panel to identify the most compelling combination. This helped the lead attorney, Rex Parris, achieve one of the biggest verdicts in Los Angeles County history. Their process involves segmenting different mindsets among triers of fact and tailoring the optimal messages for each segment.
The document discusses open research issues in measuring and managing trust. It defines trust and examines the relationship between trust and risk. It outlines a basic trust management scenario involving building, shaking, and restoring trust between two parties. More complex scenarios involving multiple parties and events that impact trust are also discussed. Several challenges are presented for research in measuring trust quantitatively and developing models and methods for managing trust over time.
The Industrial Marketing and Purchasing IMP ModelGan Chun Chet
The IMP Model is an interaction model developed in 1982 by the Industrial Marketing and Purchasing Group to analyze 1300 business relationships in Europe. The model examines customer and supplier interactions through four elements: the interaction process between parties, the characteristics of the interacting parties, the business environment, and the atmosphere that develops between parties over time. The interaction process includes product/service exchanges, information exchanges, financial exchanges, and social exchanges. The model provides a framework for understanding long-term business relationships.
Marketing implications of Freud’s theoryAsif Hussain
Freud's theory of personality posits that personality results from the interaction between the id, ego, and superego. The id operates on the pleasure principle, seeking instant gratification of needs. The superego incorporates societal morals and standards. The ego balances the demands of the id and superego using the reality principle. Freud also proposed psychosexual stages of development from infancy through adulthood that shape personality. Marketers can apply these concepts to better understand consumer behavior and develop persuasive branding strategies that tap into unconscious desires.
This document outlines the key concepts and theories related to personality and consumer behavior. It discusses how personality reflects individual differences and influences consumer attitudes and choices. Several theories of personality are examined, including Freudian, Neo-Freudian, and Trait theories. Specific traits like innovativeness, materialism, and need for cognition are also covered. The document explores how personality relates to understanding consumer behaviors and concepts like brand personality, consumer ethnocentrism, and compulsive consumption.
The document discusses personality and consumer behavior. It notes that every person has unique characteristics that make up their personality. Personality reflects individual differences and is consistent, though it can change over time due to major life events. There are different theories of personality, such as Freudian theory which sees personality arising from the id, ego, and superego. Brand personality involves attributing human traits to a brand to differentiate it and develop relationships with customers. Common brand personality dimensions include sincerity, excitement, competence, sophistication, and ruggedness.
The document discusses trust networks and methods for determining trustworthiness. It begins by providing real-life examples where trust is important, such as deciding who to leave children with or which sensor data to rely on. It then defines trust and related concepts, and presents a trust ontology with elements like trust type, value, and scope. The document also discusses challenges around gleaning trustworthiness and provides practical examples using metrics like reputation over time or among communities. The goal is to better understand and represent trust to help make important decisions with incomplete information.
Computer Assisted Review and Reasonable Solutions under Rule26Michael Geske
The document discusses various studies conducted by the Electronic Discovery Institute on topics related to meeting reasonableness requirements for discovery responses under the Federal Rules of Civil Procedure. It summarizes several studies, including ones on de-duplication of documents, categorization of documents, and email threading. The studies found that these technology-assisted processes can help reduce costs and improve accuracy and speed of discovery compared to solely human review.
Cognitive Legal Science is a joint venture that uses scientific methods to optimize trial lawyers' arguments and maximize the likelihood of a favorable verdict. They used their Addressable Minds approach on a $370 million defamation case, testing different argument elements and messages with an online panel to identify the most compelling combination. This helped the lead attorney, Rex Parris, achieve one of the biggest verdicts in Los Angeles County history. Their process involves segmenting different mindsets among triers of fact and tailoring the optimal messages for each segment.
The document discusses open research issues in measuring and managing trust. It defines trust and examines the relationship between trust and risk. It outlines a basic trust management scenario involving building, shaking, and restoring trust between two parties. More complex scenarios involving multiple parties and events that impact trust are also discussed. Several challenges are presented for research in measuring trust quantitatively and developing models and methods for managing trust over time.
The Industrial Marketing and Purchasing IMP ModelGan Chun Chet
The IMP Model is an interaction model developed in 1982 by the Industrial Marketing and Purchasing Group to analyze 1300 business relationships in Europe. The model examines customer and supplier interactions through four elements: the interaction process between parties, the characteristics of the interacting parties, the business environment, and the atmosphere that develops between parties over time. The interaction process includes product/service exchanges, information exchanges, financial exchanges, and social exchanges. The model provides a framework for understanding long-term business relationships.
Marketing implications of Freud’s theoryAsif Hussain
Freud's theory of personality posits that personality results from the interaction between the id, ego, and superego. The id operates on the pleasure principle, seeking instant gratification of needs. The superego incorporates societal morals and standards. The ego balances the demands of the id and superego using the reality principle. Freud also proposed psychosexual stages of development from infancy through adulthood that shape personality. Marketers can apply these concepts to better understand consumer behavior and develop persuasive branding strategies that tap into unconscious desires.
This document outlines the key concepts and theories related to personality and consumer behavior. It discusses how personality reflects individual differences and influences consumer attitudes and choices. Several theories of personality are examined, including Freudian, Neo-Freudian, and Trait theories. Specific traits like innovativeness, materialism, and need for cognition are also covered. The document explores how personality relates to understanding consumer behaviors and concepts like brand personality, consumer ethnocentrism, and compulsive consumption.
The document discusses personality and consumer behavior. It notes that every person has unique characteristics that make up their personality. Personality reflects individual differences and is consistent, though it can change over time due to major life events. There are different theories of personality, such as Freudian theory which sees personality arising from the id, ego, and superego. Brand personality involves attributing human traits to a brand to differentiate it and develop relationships with customers. Common brand personality dimensions include sincerity, excitement, competence, sophistication, and ruggedness.
The document discusses trust networks and methods for determining trustworthiness. It begins by providing real-life examples where trust is important, such as deciding who to leave children with or which sensor data to rely on. It then defines trust and related concepts, and presents a trust ontology with elements like trust type, value, and scope. The document also discusses challenges around gleaning trustworthiness and provides practical examples using metrics like reputation over time or among communities. The goal is to better understand and represent trust to help make important decisions with incomplete information.
Krishnaprasad Thirunarayan, Trust Management: Multimodal Data Perspective,
Invited Tutorial, The 2015 International Conference on Collaboration
Technologies and Systems (CTS 2015), June 2015
Tapping the trust value of the blockchain - showAlex Todd
Introduction to blockchain technology and exploration of the implications of migrating trust to automated applications and infrastructure on creating business value and established business models. Includes tools product managers can use to begin evaluating the business implications of blockchain technology on their business.
The document outlines the distributed science value proposition, which includes better science through improved reproducibility, cheaper research through increased return on investment, and faster medical breakthroughs by reducing administrative delays. It notes current issues like a lack of reproducibility in 20% of U.S. health research and the high costs of non-replicable studies. Blockchain and related technologies could help address these problems by enabling greater transparency, standardization, and data sharing to improve research quality while reducing costs and speeding up the research process.
Data Catalogs Are the Answer – What is the Question?DATAVERSITY
Organizations with governed metadata made available through their data catalog can answer questions their people have about the organization’s data. These organizations get more value from their data, protect their data better, gain improved ROI from data-centric projects and programs, and have more confidence in their most strategic data.
Join Bob Seiner for this lively webinar where he will talk about the value of a data catalog and how to build the use of the catalog into your stewards’ daily routines. Bob will share how the tool must be positioned for success and viewed as a must-have resource that is a steppingstone and catalyst to governed data across the organization.
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
Ralph Holz (Technische Universitat Munchen)
Pablo Aragon (Barcelona Media)
Katleen Gabriels (IBBT-SMIT, Vrije Univeriteit Brussel)
Janet Xue (Macquaire University)
Anna Satsiou (Centre for Research and Technology Hellas- Information Technologies Institute)
Sorana Cimpan (Universite De Savoie)
Norbert Blenn (Delft University of Technology)
More information: http://www.internet-science.eu/
In this presentation: interpersonal trust and trust forming process
- organizational context, cognition-based trust
- Building benevolence, integrity, and ability based trust
- Routes for trust building
- Swift trust
- Some practical guidelines
- Elaboration likelihood model
This document proposes a Trust Aggregation Portal that would aggregate trust and reputation data from various social networks and identity systems. It discusses problems with existing isolated systems and the need to collect and combine both overlapping and non-overlapping user profile and activity information. A literature review covers research on identity ecosystems, data collection methods, and existing trust and reputation models. The portal would provide a trust mark for individuals based on feedback, activities, and context to help address issues of trust across disconnected online systems.
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
Presented on PHPID Online Learning 35.
Komunitas PHP Indonesia
Title: Enabling Data Governance - The Journey through Data Trust, Ethics, and Quality
Eryk B. Pratama
Global IT & Cybersecurity Advisor
A key contribution for leveraging trustful interactionsSónia
This document discusses human-computer trust from both an HCI and trust perspective. It examines trust as a crucial element in human relationships and represents value-centered interactions between humans and computers. The research aims to identify the social values and qualities that underlie people's trust beliefs and how those trustworthy qualities are represented with technology becoming more ubiquitous. Through literature reviews and participatory design sessions, the research models trust as a social phenomenon and validates how trust relates to users' activities. It identifies factors like honesty, reliability, and predictability that influence users' attitudes around sharing, relating, and communicating. The results are used to develop a model of human-computer trust and a design space toolset to assess and evaluate trust-en
This document discusses human-computer trust from both an HCI and trust perspective. It examines trust as a crucial element in human relationships and represents value-centered interactions between humans and computers. The research aims to identify the social values and qualities that underlie people's trust beliefs and how those trustworthy qualities are represented with technology becoming more ubiquitous. Through literature reviews and participatory design sessions, the research models trust as a social phenomenon and validates how trust relates to users' activities. It identifies factors like honesty, reliability, and predictability that influence users' trust and willingness to cooperate. The resulting human-computer trust model shows how qualities, beliefs, intentions and attitudes contribute to relationships and commitments between humans and computers.
A design space for Trust-enabling Interaction DesignSónia
This document discusses trust-enabling interaction design from multiple perspectives. It examines trust from HCI, social, and technical views. Key points discussed include:
- Trust is a key element in human relationships and enables more decisive actions and smooth activities.
- A multidiciplinary approach is needed as trust has been studied in fields like sociology, political science, economics, and more.
- In human-computer interactions, trust is important and qualities like honesty, predictability, and benevolence can help enable trust.
- A proposed model examines factors that influence user trust predisposition and systems' trustworthiness. Designing for qualities like enabling honest behavior and facilitating prediction of others can help foster social engagement
C-DeepTrust A Context-Aware Deep Trust Prediction Model in Online Social Netw...OKOKPROJECTS
https://okokprojects.com/
IEEE PROJECTS 2023-2024 TITLE LIST
WhatsApp : +91-8144199666
From Our Title List the Cost will be,
Mail Us: okokprojects@gmail.com
Website: : https://www.okokprojects.com
: http://www.ieeeproject.net
Support Including Packages
=======================
* Complete Source Code
* Complete Documentation
* Complete Presentation Slides
* Flow Diagram
* Database File
* Screenshots
* Execution Procedure
* Video Tutorials
* Supporting Softwares
Support Specialization
=======================
* 24/7 Support
* Ticketing System
* Voice Conference
* Video On Demand
* Remote Connectivity
* Document Customization
* Live Chat Support
This document discusses the concept of trust in artificial intelligence, machine learning, and robotics. It first reviews definitions of trust in relationships between humans as well as between humans and technology. Trust is viewed as beliefs, attitudes, intentions, and behaviors related to another party's competence, integrity, and benevolence. The document then examines factors that influence initial trust formation and continuous trust development when interacting with AI, including reliability, validity, and understandability of the technology's processes and purposes.
This document summarizes a webinar on trust in digital policy. It discusses the etymology and definitions of trust, examining the difference between trust and trustworthiness. It explores why trust has become a major focus, and frameworks for understanding trust concepts. An applied ethics case study looks at trust issues regarding data. Key questions addressed include how user trust can be restored, and the roles of different stakeholders like governments and companies.
This document discusses data ethics and supporting researchers dealing with ethical issues. It is divided into three parts. Part 1 discusses ethical concerns around data collection, storage, sharing and reuse that technical researchers may face. Part 2 covers privacy issues related to research data reuse. Part 3 proposes infrastructure like workshops, data clinics, and an expanded role for libraries to help support researchers in navigating ethical challenges with their work. The document argues that as data science progresses, support systems are needed to help address new types of ethical issues that may arise.
This document discusses PKI implementation issues and case studies within the Australian Higher Education and Research sector. It introduces PKI concepts and the eSecurity Framework project to develop a PKI for the sector. Various trust model approaches are examined, including having AusCERT act as a bridging CA or single CA. The identification process is identified as the basis for developing a trust fabric between institutions. Future steps involve further developing policies and evaluating technologies to support the PKI.
What Sets Verified Users apart? Insights Into, Analysis of and Prediction of ...IIIT Hyderabad
Social network and publishing platforms, such as Twitter, support the concept of verification. Veri-
fied accounts are deemed worthy of platform-wide public interest and are separately authenticated by the platform itself. There have been repeated assertions by these platforms about verification not being tan-
tamount to endorsement. However, a significant body of prior work suggests that possessing a verified
status symbolizes enhanced credibility in the eyes of the platform audience. As a result, such a station
is highly coveted among public figures and influencers. Hence, we attempt to characterize the network
of verified users on Twitter and compare the results to similar analyses performed for the entire Twit-
ter network. We extracted the whole graph of verified users on Twitter (as of July 2018) and obtained
231,246 English user-profiles and 79,213,811 connections. Subsequently, in the network analysis, we
found that the sub-graph of verified users mirrors the full Twitter users graph in some aspects, such as
possessing a short diameter. However, our findings contrast with earlier results on multiple fronts, such
as the possession of a power-law out-degree distribution, slight dissortativity, and a significantly higher
reciprocity rate, as elucidated in the paper. Moreover, we attempt to gauge the presence of salient com-
ponents within this sub-graph and detect the absence of homophily with respect to popularity, which
again is in stark contrast to the full Twitter graph. Finally, we demonstrate stationarity in the time series
of verified user activity levels.
It is in this backdrop that we attempt to deconstruct the extent to which Twitter’s verification policy
mingles the notions of authenticity and authority. To this end, we seek to unravel the aspects of a user’s
profile, which likely engender or preclude verification. The aim of the paper is two-fold: First, we test
if discerning the verification status of a handle from profile metadata and content features is feasible.
Second, we unravel the characteristics which have the most significant bearing on a handle’s verification
status. We augmented our dataset with all the 494 million tweets of the aforementioned users over a one
year collection period along with their temporal social reach and activity characteristics. Our proposed
models are able to reliably identify verification status (Area under curve AUC > 99%). We show that
the number of public list memberships, presence of neutral sentiment in tweets and an authoritative
language style are the most pertinent predictors of verification status.
To the best of our knowledge, this work represents the first quantitative attempt at characterizing
verified users on Twitter and also the first attempt at discerning and classifying verification worthy users
on Twitter.
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
In grid computing, trust has massive significance. There is lot of research to propose various models in providing trusted resource sharing mechanisms. The trust is a belief or perception that various researchers have tried to correlate with some computational model. Trust on any entity can be direct or indirect. Direct trust is the impact of either first impression over the entity or acquired during some direct interaction. Indirect trust is the trust may be due to either reputation gained or recommendations received from various recommenders of a particular domain in a grid or any other domain outside that grid or outside that grid itself. Unfortunately, malicious indirect trust leads to the misuse of valuable resources of the grid. This paper proposes the mechanism of identifying and purging the untrustworthy recommendations in the grid environment. Through the obtained results, we show the way of purging of untrustworthy entities.
Krishnaprasad Thirunarayan, Trust Management: Multimodal Data Perspective,
Invited Tutorial, The 2015 International Conference on Collaboration
Technologies and Systems (CTS 2015), June 2015
Tapping the trust value of the blockchain - showAlex Todd
Introduction to blockchain technology and exploration of the implications of migrating trust to automated applications and infrastructure on creating business value and established business models. Includes tools product managers can use to begin evaluating the business implications of blockchain technology on their business.
The document outlines the distributed science value proposition, which includes better science through improved reproducibility, cheaper research through increased return on investment, and faster medical breakthroughs by reducing administrative delays. It notes current issues like a lack of reproducibility in 20% of U.S. health research and the high costs of non-replicable studies. Blockchain and related technologies could help address these problems by enabling greater transparency, standardization, and data sharing to improve research quality while reducing costs and speeding up the research process.
Data Catalogs Are the Answer – What is the Question?DATAVERSITY
Organizations with governed metadata made available through their data catalog can answer questions their people have about the organization’s data. These organizations get more value from their data, protect their data better, gain improved ROI from data-centric projects and programs, and have more confidence in their most strategic data.
Join Bob Seiner for this lively webinar where he will talk about the value of a data catalog and how to build the use of the catalog into your stewards’ daily routines. Bob will share how the tool must be positioned for success and viewed as a must-have resource that is a steppingstone and catalyst to governed data across the organization.
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
Ralph Holz (Technische Universitat Munchen)
Pablo Aragon (Barcelona Media)
Katleen Gabriels (IBBT-SMIT, Vrije Univeriteit Brussel)
Janet Xue (Macquaire University)
Anna Satsiou (Centre for Research and Technology Hellas- Information Technologies Institute)
Sorana Cimpan (Universite De Savoie)
Norbert Blenn (Delft University of Technology)
More information: http://www.internet-science.eu/
In this presentation: interpersonal trust and trust forming process
- organizational context, cognition-based trust
- Building benevolence, integrity, and ability based trust
- Routes for trust building
- Swift trust
- Some practical guidelines
- Elaboration likelihood model
This document proposes a Trust Aggregation Portal that would aggregate trust and reputation data from various social networks and identity systems. It discusses problems with existing isolated systems and the need to collect and combine both overlapping and non-overlapping user profile and activity information. A literature review covers research on identity ecosystems, data collection methods, and existing trust and reputation models. The portal would provide a trust mark for individuals based on feedback, activities, and context to help address issues of trust across disconnected online systems.
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
Presented on PHPID Online Learning 35.
Komunitas PHP Indonesia
Title: Enabling Data Governance - The Journey through Data Trust, Ethics, and Quality
Eryk B. Pratama
Global IT & Cybersecurity Advisor
A key contribution for leveraging trustful interactionsSónia
This document discusses human-computer trust from both an HCI and trust perspective. It examines trust as a crucial element in human relationships and represents value-centered interactions between humans and computers. The research aims to identify the social values and qualities that underlie people's trust beliefs and how those trustworthy qualities are represented with technology becoming more ubiquitous. Through literature reviews and participatory design sessions, the research models trust as a social phenomenon and validates how trust relates to users' activities. It identifies factors like honesty, reliability, and predictability that influence users' attitudes around sharing, relating, and communicating. The results are used to develop a model of human-computer trust and a design space toolset to assess and evaluate trust-en
This document discusses human-computer trust from both an HCI and trust perspective. It examines trust as a crucial element in human relationships and represents value-centered interactions between humans and computers. The research aims to identify the social values and qualities that underlie people's trust beliefs and how those trustworthy qualities are represented with technology becoming more ubiquitous. Through literature reviews and participatory design sessions, the research models trust as a social phenomenon and validates how trust relates to users' activities. It identifies factors like honesty, reliability, and predictability that influence users' trust and willingness to cooperate. The resulting human-computer trust model shows how qualities, beliefs, intentions and attitudes contribute to relationships and commitments between humans and computers.
A design space for Trust-enabling Interaction DesignSónia
This document discusses trust-enabling interaction design from multiple perspectives. It examines trust from HCI, social, and technical views. Key points discussed include:
- Trust is a key element in human relationships and enables more decisive actions and smooth activities.
- A multidiciplinary approach is needed as trust has been studied in fields like sociology, political science, economics, and more.
- In human-computer interactions, trust is important and qualities like honesty, predictability, and benevolence can help enable trust.
- A proposed model examines factors that influence user trust predisposition and systems' trustworthiness. Designing for qualities like enabling honest behavior and facilitating prediction of others can help foster social engagement
C-DeepTrust A Context-Aware Deep Trust Prediction Model in Online Social Netw...OKOKPROJECTS
https://okokprojects.com/
IEEE PROJECTS 2023-2024 TITLE LIST
WhatsApp : +91-8144199666
From Our Title List the Cost will be,
Mail Us: okokprojects@gmail.com
Website: : https://www.okokprojects.com
: http://www.ieeeproject.net
Support Including Packages
=======================
* Complete Source Code
* Complete Documentation
* Complete Presentation Slides
* Flow Diagram
* Database File
* Screenshots
* Execution Procedure
* Video Tutorials
* Supporting Softwares
Support Specialization
=======================
* 24/7 Support
* Ticketing System
* Voice Conference
* Video On Demand
* Remote Connectivity
* Document Customization
* Live Chat Support
This document discusses the concept of trust in artificial intelligence, machine learning, and robotics. It first reviews definitions of trust in relationships between humans as well as between humans and technology. Trust is viewed as beliefs, attitudes, intentions, and behaviors related to another party's competence, integrity, and benevolence. The document then examines factors that influence initial trust formation and continuous trust development when interacting with AI, including reliability, validity, and understandability of the technology's processes and purposes.
This document summarizes a webinar on trust in digital policy. It discusses the etymology and definitions of trust, examining the difference between trust and trustworthiness. It explores why trust has become a major focus, and frameworks for understanding trust concepts. An applied ethics case study looks at trust issues regarding data. Key questions addressed include how user trust can be restored, and the roles of different stakeholders like governments and companies.
This document discusses data ethics and supporting researchers dealing with ethical issues. It is divided into three parts. Part 1 discusses ethical concerns around data collection, storage, sharing and reuse that technical researchers may face. Part 2 covers privacy issues related to research data reuse. Part 3 proposes infrastructure like workshops, data clinics, and an expanded role for libraries to help support researchers in navigating ethical challenges with their work. The document argues that as data science progresses, support systems are needed to help address new types of ethical issues that may arise.
This document discusses PKI implementation issues and case studies within the Australian Higher Education and Research sector. It introduces PKI concepts and the eSecurity Framework project to develop a PKI for the sector. Various trust model approaches are examined, including having AusCERT act as a bridging CA or single CA. The identification process is identified as the basis for developing a trust fabric between institutions. Future steps involve further developing policies and evaluating technologies to support the PKI.
What Sets Verified Users apart? Insights Into, Analysis of and Prediction of ...IIIT Hyderabad
Social network and publishing platforms, such as Twitter, support the concept of verification. Veri-
fied accounts are deemed worthy of platform-wide public interest and are separately authenticated by the platform itself. There have been repeated assertions by these platforms about verification not being tan-
tamount to endorsement. However, a significant body of prior work suggests that possessing a verified
status symbolizes enhanced credibility in the eyes of the platform audience. As a result, such a station
is highly coveted among public figures and influencers. Hence, we attempt to characterize the network
of verified users on Twitter and compare the results to similar analyses performed for the entire Twit-
ter network. We extracted the whole graph of verified users on Twitter (as of July 2018) and obtained
231,246 English user-profiles and 79,213,811 connections. Subsequently, in the network analysis, we
found that the sub-graph of verified users mirrors the full Twitter users graph in some aspects, such as
possessing a short diameter. However, our findings contrast with earlier results on multiple fronts, such
as the possession of a power-law out-degree distribution, slight dissortativity, and a significantly higher
reciprocity rate, as elucidated in the paper. Moreover, we attempt to gauge the presence of salient com-
ponents within this sub-graph and detect the absence of homophily with respect to popularity, which
again is in stark contrast to the full Twitter graph. Finally, we demonstrate stationarity in the time series
of verified user activity levels.
It is in this backdrop that we attempt to deconstruct the extent to which Twitter’s verification policy
mingles the notions of authenticity and authority. To this end, we seek to unravel the aspects of a user’s
profile, which likely engender or preclude verification. The aim of the paper is two-fold: First, we test
if discerning the verification status of a handle from profile metadata and content features is feasible.
Second, we unravel the characteristics which have the most significant bearing on a handle’s verification
status. We augmented our dataset with all the 494 million tweets of the aforementioned users over a one
year collection period along with their temporal social reach and activity characteristics. Our proposed
models are able to reliably identify verification status (Area under curve AUC > 99%). We show that
the number of public list memberships, presence of neutral sentiment in tweets and an authoritative
language style are the most pertinent predictors of verification status.
To the best of our knowledge, this work represents the first quantitative attempt at characterizing
verified users on Twitter and also the first attempt at discerning and classifying verification worthy users
on Twitter.
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
In grid computing, trust has massive significance. There is lot of research to propose various models in providing trusted resource sharing mechanisms. The trust is a belief or perception that various researchers have tried to correlate with some computational model. Trust on any entity can be direct or indirect. Direct trust is the impact of either first impression over the entity or acquired during some direct interaction. Indirect trust is the trust may be due to either reputation gained or recommendations received from various recommenders of a particular domain in a grid or any other domain outside that grid or outside that grid itself. Unfortunately, malicious indirect trust leads to the misuse of valuable resources of the grid. This paper proposes the mechanism of identifying and purging the untrustworthy recommendations in the grid environment. Through the obtained results, we show the way of purging of untrustworthy entities.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Communicating effectively and consistently with students can help them feel at ease during their learning experience and provide the instructor with a communication trail to track the course's progress. This workshop will take you through constructing an engaging course container to facilitate effective communication.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Trust networks infotech2010
1. Trust Networks:
Interpersonal, Social, and Sensor
Krishnaprasad Thirunarayan, Pramod Anantharam,
Cory Henson, and Amit Sheth
Kno.e.sis - Ohio Center of Excellence in Knowledge-enabled Computing
Wright State University, Dayton, OH-45435
2/18/2011 Trust Networks: T. K. Prasad 1
2. Broad Outline
• Real-life Motivational Examples (Why?)
• Trust : Characteristics and Related Concepts (What?)
• Trust Ontology (What?)
– Type, Value, Process, Scope
• Gleaning Trustworthiness (How?)
– Practical Examples of Trust Metrics
• Research Challenges (Why-What-How?)
– Sensor Networks
– Social Networks
– Interpersonal
2/18/2011 Trust Networks: T. K. Prasad 2
4. Interpersonal
• With which neighbor should we leave our
children over the weekend when we are
required to be at the hospital?
• Who should be named as a guardian for our
children in the Will?
2/18/2011 Trust Networks: T. K. Prasad 4
5. Social
• In Email:
– SUBJECT: [TitanPad] Amit Sheth invited you to an
EtherPad document.
– CONTENT: View it here:
http://knoesis.titanpad.com/200
• Issue: Is the request genuine or a trap?
2/18/2011 Trust Networks: T. K. Prasad 5
6. Social
• To click or not to click a http://bit.ly-URL
• To rely or not to rely on a product review
(when only a few reviews are present)?
2/18/2011 Trust Networks: T. K. Prasad 6
7. Sensors
2/18/2011 Trust Networks: T. K. Prasad 7
• Weather sensor network-based prediction of a potential
tornado in the vicinity of a city.
• Issue: Should we mobilize emergency response teams
ahead of time?
• Van’s TCS (Traction Control System) indicator light came
on intermittently, while driving.
• Issue: Which was faulty: the indicator light or the
traction control system?
• Van’s Check Engine light came on, while driving.
• Issue: Which was faulty: the indicator light or the
transmission control system ?
8. Common Issues and Context
• Uncertainty
– About the validity of a claim or assumption
• Need for action
• Critical decision with potential for loss
– Past Experience : Vulnerability Examples
• Irresponsible / selfish guardian => Marred future.
• Illegal invitation / attachment => Loss of private data.
• Malfunctioning sensor => Loss of funds.
2/18/2011 Trust Networks: T. K. Prasad 8
9. Why Track Trust?
• To predict future behavior.
• To incentivize “good” behavior and
discourage “bad” behavior.
• To detect malicious entities.
2/18/2011 Trust Networks: T. K. Prasad 10
10. Trust and Related Concepts
2/18/2011 Trust Networks: T. K. Prasad 11
(What is trust?)
11. Trust Definition : Psychology slant
Trust is the psychological state
comprising a willingness to be
vulnerable in expectation of a
valued result.
2/18/2011 Trust Networks: T. K. Prasad
Ontology of Trust, Huang and Fox, 2006
Josang et al’s Decision Trust
12
12. Trust Definition : Psychology slant
Trust in a person is a commitment to
an action based on a belief that the
future actions of that person will
lead to good outcome.
2/18/2011 Trust Networks: T. K. Prasad
Golbeck and Hendler, 2006
13
13. Trust Definition : Probability slant
Trust (or, symmetrically, distrust)
is a level of subjective probability
with which an agent assesses
that another agent will perform
a particular action, both before
and independently of such an
action being monitored …
2/18/2011 Trust Networks: T. K. Prasad
Can we Trust Trust?, Diego Gambetta, 2000
Josang et al’s Reliability Trust
14
14. Trustworthiness Definition :
Psychology Slant
Trustworthiness is a collection of
qualities of an agent that leads them
to be considered as deserving of
trust from others (in one or more
environments, under different
conditions, and to different degrees).
2/18/2011 Trust Networks: T. K. Prasad
http://www.iarpa.gov/rfi_trust.html
15
15. Trustworthiness Definition :
Probability slant
Trustworthiness is the
objective probability that the
trustee performs a particular
action on which the interests
of the trustor depend.
2/18/2011 Trust Networks: T. K. Prasad
Solhaug et al, 2007
16
16. Trust vs Trustworthiness : My View
Trust Disposition
Depends on
Potentially Quantified Trustworthiness Qualities
+
Context-based Trust Threshold
E.g.*, In the context of trusting strangers, people in
the West will trust for lower levels of trustworthiness
than people in the Gulf.
2/18/2011 Trust Networks: T. K. Prasad
*Bohnet et al, 5/2010
17
17. (Community-based) Reputation
• Reputation* is the community or public
estimation of standing for merit,
achievement, reliability, etc.
• Reputation** is the opinion (or a social
evaluation) of a community toward a
person, a group of people, or an
organization on a certain criterion.
• Cf. Brand-value, PageRank, eBay profile, etc.
2/18/2011 Trust Networks: T. K. Prasad
*dictionary.com
20
**Wikipedia
18. Trust vs. (Community-based)
Reputation
Reputation can be a basis for trust.
However, they are different notions*.
• I trust you because of your good reputation.
• I trust you despite your bad reputation.
• Do you still trust Toyota brand?
2/18/2011 Trust Networks: T. K. Prasad
*Josang et al, 2007
21
19. Trust vs. (Community-based)
Reputation
Trust :: Reputation
::::
Local :: Global
::::
Subjective :: Objective
(Cf. Security refers to resistance to attacks.)
2/18/2011 Trust Networks: T. K. Prasad 22
20. Reputation is Overloaded
Community-based Reputation
vs.
Temporal Reputation-based Process
(Cf. Sustained good behavior over time elicits
temporal reputation-based trust.)
2/18/2011 Trust Networks: T. K. Prasad 23
21. Trust vs. Belief
• Trust is a relationship among agents.
• Belief is a relationship between an
agent and a statement.
2/18/2011 Trust Networks: T. K. Prasad 25
22. Trust Ontology
2/18/2011 Trust Networks: T. K. Prasad 26
(What is trust?)
Illustration of Knowledge Representation and Reasoning:
Relating Semantics to Data Structures and Algorithms
23. Example Trust Network -
Different Trust Links with Local Order on out-links
• Alice trusts Bob for recommending good car
mechanic.
• Bob trusts Dick to be a good car mechanic.
• Charlie does not trust Dick to be a good car
mechanic.
• Alice trusts Bob more than Charlie, for
recommending good car mechanic.
• Alice trusts Charlie more than Bob, for
recommending good baby sitter.
2/18/2011 Trust Networks: T. K. Prasad
*Thirunarayan et al, IICAI 2009
27
24. Digression: Illustration of Knowledge
Representation and Reasoning
• Abstract and encode clearly delineated “subarea”
of knowledge in a formal language.
– Trust Networks => node-labeled, edge-labeled
directed graph (DATA STRUCTURES)
• Specify the meaning in terms of how “network
elements” relate to or compose with each other.
– Semantics of Trust, Trust Metrics => using logic or
probabilistic basis, constraints, etc. (SEMANTICS)
• Develop efficient graph-based procedures
– Trust value determination/querying (INFERENCE
ALGORITHMS)
2/18/2011 Trust Networks: T. K. Prasad 28
25. 2/18/2011 Trust Networks: T. K. Prasad 29
(In recommendations)
(For capacity to act)
(For lack of
capacity to act)
26. Trust Ontology*
6-tuple representing a trust relationship:
{type, value, scope, process}
Type – Represents the nature of trust relationship.
Value – Quantifies trustworthiness for comparison.
Scope – Represents applicable context for trust.
Process – Represents the method by which the value is
created and maintained.
trustor trustee
2/18/2011 Trust Networks: T. K. Prasad
*Anantharam et al, NAECON 2010
30
27. Trust Ontology:
Trust Type, Trust Value, and Trust Scope
Trust Type*
Referral Trust – Agent a1 trusts agent a2’s ability to
recommend another agent.
(Non-)Functional Trust – Agent a1 (dis)trusts agent a2’s
ability to perform an action.
Cf. ** trust in belief vs. trust in performance
Trust Value
E.g., Star rating, numeric rating, or partial ordering.
Trust Scope*
E.g., Car Mechanic context.
2/18/2011 Trust Networks: T. K. Prasad
*Thirunarayan et al, IICAI 2009
** Huang and Fox, 2006
31
28. Trust Ontology:
Trust Process
Represents the method by which the value
is computed and maintained.
Primitive (for functional and referral links)*
(Temporal) Reputation – based on past behavior.
Policy – based on explicitly stated constraints.
Evidence – based on seeking/verifying evidence.
Provenance – based on lineage information.
Composite (for admissible paths)**
Propagation (Chaining and Aggregation)
2/18/2011 Trust Networks: T. K. Prasad
*Anantharam et al, NAECON 2010
**Thirunarayan et al, IICAI 2009
33
30. Bob is a car
aficionado
Alice
Bob
Charlie
Dick
type: referral
process: reputation
scope: car mechanic
value: TAB
type: non-functional
process: reputation
scope: car mechanic
value: 3
Dick is a
certified
mechanic
type: functional
process: policy
scope: car mechanic
value: 10
ASE certified
type: referral
process: reputation
scope: car mechanic
value: TAC
TAB > TAC
Example Trust Network illustrating Ontology Concepts
2/18/2011 Trust Networks: T. K. Prasad 35
31. Unified Illustration of Trust Processes
Scenario : Hiring Web Search Engineer - An R&D Position
Various Trust Processes :
• (Temporal) Reputation-based: Past job
experience
• Policy-based: Scores on screening test
• Provenance-based: Department/University
of graduation
• Evidence-based: Multiple interviews (phone,
on-site, R&D team)
2/18/2011 Trust Networks: T. K. Prasad 36
33. Direct Trust : Functional
Reputation-based Process
2/18/2011 Trust Networks: T. K. Prasad 38
(Using large number of observations)
34. Using Large Number of Observations
• Over time (<= Referral + Functional) :
Temporal Reputation-based Process
– Mobile Ad-Hoc Networks
– Sensor Networks
• Quantitative information
(Numeric data)
• Over agents (<= Referral + Functional) :
Community Reputation-based Process
– Product Rating Systems
• Quantitative + Qualitative information
(Numeric + text data)
2/18/2011 Trust Networks: T. K. Prasad 39
35. Desiderata for Trustworthiness
Computation Function
• Initialization Problem : How do we get initial value?
• Update Problem : How do we reflect the observed
behavior in the current value dynamically?
• Trusting Trust* Issue: How do we mirror uncertainty
in our estimates as a function of observations?
• Law of Large Numbers: The average of the results obtained from a
large number of trials should be close to the expected value.
• Efficiency Problem : How do we store and update
values efficiently?
2/18/2011 Trust Networks: T. K. Prasad
*Ken Thompson’s Turing Award Lecture: “Reflections on Trusting Trust”
40
36. Beta Probability Density Function(PDF)
x is a probability,
so it ranges from 0-1
If the prior distribution of p is
uniform, then the beta
distribution gives posterior
distribution of p after
observing a-1 occurrences
of event with probability p
and b-1 occurrences of the
complementary event with
probability (1-p).
2/18/2011 Trust Networks: T. K. Prasad 41
37. a= 5
b= 5
a= 1
b= 1
a= 2
b= 2
a= 10
b= 10
a = b, so the pdf’s are symmetric w.r.t 0.5.
Note that the graphs get narrower as (a+b) increases.
2/18/2011 Trust Networks: T. K. Prasad 43
38. Beta-distribution - Applicability
• Dynamic trustworthiness can be
characterized using beta probability
distribution function gleaned from total
number of correct (supportive) r = (a-1)
and total number of erroneous
(opposing) s = (b-1) observations so far.
• Overall trustworthiness (reputation) is its
mean: a/a +b
2/18/2011 Trust Networks: T. K. Prasad 46
39. Why Beta-distribution?
• Intuitively satisfactory, Mathematically precise, and
Computationally tractable
• Initialization Problem : Assumes that all probability values
are equally likely.
• Update Problem : Updates (a, b) by incrementing a for
every correct (supportive) observation and b for every
erroneous (opposing) observation.
• Trusting Trust Issue: The graph peaks around the mean, and
the variance diminishes as the number of observations
increase, if the agent is well-behaved.
• Efficiency Problem: Only two numbers stored/updated.
2/18/2011 Trust Networks: T. K. Prasad 47
40. Direct Trust : Functional
Policy-based Process
2/18/2011 Trust Networks: T. K. Prasad 52
(Using Trustworthiness Qualities)
41. General Approach to Trust Assessment
• Domain dependent qualities for determining
trustworthiness
– Based on Content / Data
– Based on External Cues / Metadata
• Domain independent mapping to trust values
or levels
– Quantification through aggregation and
classification
2/18/2011 Trust Networks: T. K. Prasad 53
42. Example: Wikipedia Articles
• Quality (content-based)
– Appraisal of information provenance
• References to peer-reviewed publication
• Proportion of paragraphs with citation
– Article size
• Credibility (metadata-based)
– Author connectivity
– Edit pattern and development history
• Revision count
• Proportion of reverted edits - (i) normal (ii) due to vandalism
• Mean time between edits
• Mean edit length.
2/18/2011 Trust Networks: T. K. Prasad 54
Sai Moturu, 8/2009
43. (cont’d)
• Quantification of Trustworthiness
– Based on Dispersion Degree Score
(Extent of deviation from mean)
• Evaluation Metric
– Ranking based on trust level (determined from
trustworthiness scores), and compared to gold
standard classification using Normalized
Discounted Cumulative Gain (NDCG)
2/18/2011 Trust Networks: T. K. Prasad 55
44. Example: Websites
• Trustworthiness estimated based on criticality
of data exchanged.
• Email address / Username / password
• Phone number / Home address
• Date of birth
• Social Security Number / Bank Account Number
• Intuition: A piece of data is critical if and only
if it is exchanged with a small number of
highly trusted sites.
2/18/2011 Trust Networks: T. K. Prasad 56
45. Indirect Trust : Referral + Functional
Variety of Trust Metrics
2/18/2011 Trust Networks: T. K. Prasad 57
(Using Propagation – Chaining and Fusing over Paths)
46. Trust Propagation Frameworks
• Chaining, Aggregation, and Overriding
• Trust Management
• Abstract properties of operators
• Reasoning with trust
• Matrix-based trust propagation
• The Beta-Reputation System
• Algebra on opinion = (belief, disbelief, uncertainty)
2/18/2011 Trust Networks: T. K. Prasad
Guha et al., 2004
Richardson et al, 2003
Josang and Ismail, 2002
63
Massa-Avesani, 2005
Bintzios et al, 2006
Golbeck – Hendler, 2006 Sun et al, 2006
Thirunarayan et al, 2010
48. Generic Directions
• Finding online substitutes for traditional cues
to derive measures of trust.
• Creating efficient and secure systems for
managing and deriving trust, in order to
support decision making.
2/18/2011 Trust Networks: T. K. Prasad
Josang et al, 2007
68
50. Abstract trustworthiness of sensors and
observations to perceptions to obtain actionable
situation awareness!
observe perceive
Web
“real-world”
T
T T
Our Research
2/18/2011 Trust Networks: T. K. Prasad 70
52. Concrete Application
• Applied Beta-pdf to Mesowest Weather Data
– Used quality flags (OK, CAUTION, SUSPECT)
associated with observations from a sensor
station over time to derive reputation of a sensor
and trustworthiness of a perceptual theory that
explains the observation.
– Perception cycle used data from ~800 stations,
collected for a blizzard during 4/1-6/03.
2/18/2011 Trust Networks: T. K. Prasad 72
53. 0
0.2
0.4
0.6
0.8
1
1.2
3/31/2003 0:00 4/1/2003 0:00 4/2/2003 0:00 4/3/2003 0:00 4/4/2003 0:00 4/5/2003 0:00 4/6/2003 0:00 4/7/2003 0:00
Mean Beta
Value
Time
Mean of beta pdf vs. Time (for stnID = SBE)
2/18/2011 Trust Networks: T. K. Prasad 73
54. Research Issues
• Outlier Detection
– Homogeneous Networks
• Statistical Techniques
– Heterogeneous Networks (sensor + social)
• Domain Models
• Distinguishing between abnormal phenomenon
(observation), malfunction (of a sensor), and
compromised behavior (of a sensor)
– Abnormal situations
– Faulty behaviors
– Malicious attacks
2/18/2011 Trust Networks: T. K. Prasad 74
56. Our Research
• Study semantic issues relevant to trust
• Proposed model of trust/trust metrics to
formalize indirect trust
2/18/2011 Trust Networks: T. K. Prasad 76
57. Our Approach
Trust formalized in terms of partial orders
(with emphasis on relative magnitude)
Local but realistic semantics
Distinguishes functional and referral trust
Distinguishes direct and inferred trust
Direct trust overrides conflicting inferred trust
Represents ambiguity explicitly
2/18/2011 Trust Networks: T. K. Prasad
Thirunarayan et al , 2010
58. Practical Issues
• Refinement of numeric ratings using
reviews in product rating networks
– Relevance : Separate ratings of vendor or about
extraneous features from ratings of product
• E.g., Issues about Amazon’s policies
• E.g., Publishing under multiple titles (Paul Davies’ “The Goldilock’s
Enigma” vs. “Cosmic Jackpot”)
– Polarity/Degree of support: Check consistency
between rating and review using sentiment
analysis; amplify hidden sentiments
• E.g., rate a phone as 1-star because it is the best
2/18/2011 Trust Networks: T. K. Prasad 79
59. Research Issues
• Determination of trust / influence from
social networks
–Text analytics on communication
–Analysis of network topology
• E.g., follower relationship, friend relationship, etc.
• Determination of untrustworthy and
anti-social elements in social networks
2/18/2011 Trust Networks: T. K. Prasad 81
60. Research Issues
• Evolving trust ontology
• Introducing trust threshold
– For binary decision to act in spite of vulnerability/risk
• Structuring trust scope
– Class hierarchy
• Structuring trust value
– Or does relative trust suffice?
• Refining trust types
– Or does trust scope suffice?
• Restrictions on trust propagation
– Limited horizon
2/18/2011 Trust Networks: T. K. Prasad 83
61. Research Issues
• Improving Security : Robustness to Attack
– How to exploit different trust processes to detect
and recover from attacks?
• Bad mouthing attack
• Ballot stuffing attack
• Sleeper attack
– Temporal trust discounting proportional to trust value
– Using policy-based process to ward-off attack using
reputation-based process
• Sybil attack
• Newcomer attack
2/18/2011 Trust Networks: T. K. Prasad 84
63. Research Issues
• Linguistic clues that betray
trustworthiness
• Experiments for gauging interpersonal
trust in real world situations
– *Techniques and tools to detect and amplify
useful signals in Self to more accurately predict
trust and trustworthiness in Others
2/18/2011 Trust Networks: T. K. Prasad 86
*IARPA-TRUST program
64. Research Issues
• Study of cross-cultural differences in
trustworthiness qualities and trust thresholds
to better understand
–Influence
• What aspects improve influence?
–Manipulation
• What aspects flag manipulation?
2/18/2011 Trust Networks: T. K. Prasad 87
65. Conclusion
• Provided simple examples of trust (Why?)
• Explained salient features of trust (What?)
• Showed examples of gleaning trustworthiness
(How?)
• Touched upon research challenges for
gleaning trustworthiness in
• Sensor Networks
• Social Networks
• Interpersonal Networks
2/18/2011 Trust Networks: T. K. Prasad 88