SlideShare une entreprise Scribd logo
1  sur  52
Institut für Web Science & Technologien - WeST




Trust
Web
                                              WWW /
   Noone owns the Web                        E-Mail
                                              TCP/IP
   Everyone can participate, share,....
   No central control
   No centrally ensured security




                 WWW /
                 E-Mail
                 TCP/IP

                                                  © R. Grimm
Leiden, July 11, 2012         Steffen Staab              2
WWW /                           WWW /
                        E-Mail                          E-Mail
                        TCP/IP                          TCP/IP

                                                   ??



                                     Lying
                                   Deceiving
                                   Vandalism
                                 Eaves dropping
                                    Scams
                                    Stealing
                                                                 © R. Grimm
Leiden, July 11, 2012              Steffen Staab                        3
How to loose 1,000,000,000 US$ in half a day




                                           Failures:
                         Low quality of data collecting process, hence
Via @Bauckhage            currency of information was not considered
 Leiden, July 11, 2012                  Steffen Staab                    4
What is trust?


Leiden, July 11, 2012   Steffen Staab   5
Definition of Trust

http://en.wikipedia.org/wiki/Trust_%28social_sciences%29

Definitions of trust[2][3] typically refer to a situation
characterised by the following aspects:
One party (trustor) is willing to rely on the actions of another
party (trustee);
the situation is directed to the future;
the trustor (voluntarily or forcedly) abandons control over the
actions performed by the trustee;
as a consequence, the trustor is uncertain about the
outcome of the other's actions; he can only develop and
evaluate expectations. The uncertainty involves the risk of
failure or harm to the trustor if the trustee will not behave as
desired.
Leiden, July 11, 2012       Steffen Staab                     6
Core Question

What does it mean

if

              I say that I trust person P performing action A

or a

              System S trusts person or system P performing action A

?


     Leiden, July 11, 2012          Steffen Staab                7
Trust

Perspectives
Information and communication
Education
Social science
Economic/risk management
Reputation
IT security




Leiden, July 11, 2012   Steffen Staab   8
Information &
      Communication Perspective
      on Trust
Leiden, July 11, 2012   Steffen Staab   9
Communication: Should we trust that people understand what we mean?




                         Failure: Unintended recipient of information
 Leiden, July 11, 2012                  Steffen Staab                   10
Asymmetry of Communication




                                    I say or do



                                    You say or do




                                    I say or do



                                          etc.

                        Time line                      Time line
                                                                   © R. Grimm
Leiden, July 11, 2012                  Steffen Staab                     11
Give and take




                                 give




                               In order to

              requires
              trust
              in continuity
                                take



                                              © R. Grimm
Leiden, July 11, 2012         Steffen Staab         12
Information and Communication - Credibility

   About the truth of information in which we trust, believability [Metzger 07]:
      Expertise
      Trustworthiness




            Sender                                                     Receiver

                                             Message




Leiden, July 11, 2012                  Steffen Staab                                13
Education Perspective
      on Trust

Leiden, July 11, 2012   Steffen Staab   14
Online Investment Scams


                                                             Trust



                                                                     Identity of
                                       Risk                           debitors
                                     (greed)



                                             BTW: I am
                                            not sure you
                                            can trust this
                                              website




                 Failure: Identity scam & users missassess trustworthiness
Leiden, July 11, 2012                   Steffen Staab                              15
The education perspective

What do I need to teach someone such that
If he trusts person P performing action A he does not suffer?
[Metzger, 2007]

A system S trusts person P performing action A
if P satisfies the assessment criteria for trust




Leiden, July 11, 2012       Steffen Staab                   16
Credibility: What people do and what they should do

  (Teach to) Assess credibility by checklist:
     accuracy,
                                                                    Can be
     authority,                                                    reasoned
            • Identity, qualifications                              with in the
                – Whois, Traceroute, NSlookup/Dig                   semantic
       objectivity,                                                web if
       currency,                                                   described!
                                                                    (eg. [Schenk])
       and coverage or scope



                         Internet users may be easily
  Assessing what people do on the Web: Interestingly, what focus-group participants
  said they looked for in assessing credibility wasdesign. the researchers found they
                       duped by slick Web not what
                               ⇒meta strategies
  actually looked at during the observational portion of the study.

 Leiden, July 11, 2012               Steffen Staab                                17
Social science Perspective
      on Trust

Leiden, July 11, 2012   Steffen Staab   18
 A system S trusts person P performing action A
  if P belongs to trusted group




Leiden, July 11, 2012   Steffen Staab              19
Social Science – 1

Luhmann:
Levels of increasing freedom to act
    Familarity
            Based on what we know
            No deviation from the known
      Confidence
            Founded on laws, fallback positions,...
      Trust
            Acting under risk


                        Trust is the reduction of complexity



Leiden, July 11, 2012              Steffen Staab               20
Social Science – 2: Social Theory of Balance




           Friend
                                               Foe




Leiden, July 11, 2012      Steffen Staab             21
Structural Balance for Groups of 3




Leiden, July 11, 2012      Steffen Staab   22
Structural Balance for Groups of 3




     Definition:
     A triangle is balanced if all 3 relations between the
     nodes are positive or if there is exactly one positive
     relationship

Leiden, July 11, 2012         Steffen Staab                   23
Structural Balance for a Network

Definition:
A network is called structurally balanced if all groups of
triangles are structurally balanced.

Balance Theorem:
If a labeled complete graph is balanced,
then either all pairs of nodes are friend,
or else the nodes can be divided into two groups, X and Y,
     such that each pair of people in X likes each other,
     each pair of people in Y likes each other,
     and everyone in X is the enemy of everyone in Y.




Leiden, July 11, 2012      Steffen Staab                     24
Structural Balance for a Network




Leiden, July 11, 2012      Steffen Staab   25
Weakly Balanced Networks

Definition of Weak Structural Balance Property:
There is no set of three nodes
such that the edges among them consist of
exactly two positive edges and one negative edge




Leiden, July 11, 2012      Steffen Staab           26
Weak Structural Balance Property




Leiden, July 11, 2012     Steffen Staab   27
Risk Management/Economic
      perspective
      on Trust
Leiden, July 11, 2012   Steffen Staab   28
Risk Management/Economic perspective

 Risk is a pair
    Value/Cost of an event arising
    Probability that the event will arise
 Trust means willingness to bear a risk

 A system S trusts person P performing action A
  if the expected overall value/utility is positive

 In particular trust issues arise in markets with information
  asymmetry – e.g. E-Bay




Leiden, July 11, 2012       Steffen Staab                        29
A Web Market Example

 Trust issues arising in markets with information asymmetry
  – e.g. E-Bay
    Assume 50 good cars, 50 bad cars could be for sale
    200 buyers willing to buy
    Assume buyers are willing to pay up to 12 for good cars
     and up to 6 for bad cars
    Assume sellers are willing to sell from 10 upwards and 5
     upwards for good and bad cars respectively

 Information Asymmetry:
    Sellers judge good/bad accurately
    Buyers cannot judge good/bad at all, but know about
     willingness of sellers to sell

Leiden, July 11, 2012      Steffen Staab                   30
Economic perspective: Expected Value

 Information Asymmetry:
    Expected value of a car for a buyer at most (12+6)/2=9
    At 9 sellers of good cars do not sell, therefore rational buyers
     cannot expect any good cars to be on the market!
           • No good cars are sold, because of a lack of trust!


                             Self-fulfilling expectations!
                                   Market Failure!



 Solution: Reputation reduces information asymmetry
    If ¾ of cars sold as good cars are good, then expected
     value is ¾*12+1/4*6=10.5 – i.e. good cars can be sold!


Leiden, July 11, 2012               Steffen Staab                 31
Asymmetric information and Trust signals
 Used car markets
    Partial remedy
           • Guarantees by traders
              – Reduces subsequent costs for buyers of lemons
              – Strong signal that the car has decent quality
 Labor market
    Partial remedy:
           • Education certificates
              – Education leads to knowledge
              – Certificate is signal for intellectual and work capacity
 Insurance
    Buyer of insurance knows more
           • Very partial remedy: incentives system to take sports
             courses
Leiden, July 11, 2012               Steffen Staab                          32
Reputation Perspective on
      Trust

Leiden, July 11, 2012   Steffen Staab   33
+++ „Los Angeles (dpa) – In der
      kalifornischen Kleinstadt Bluewater
      soll es nach einem Bericht des
      örtlichen Senders vpk-tv zu einem
      Selbstmordanschlag gekommen
      sein. Es habe in einem Restaurant
      zwei Explosionen gegeben...“ +++




                             German Press Agency DPA, 10 Sep 2009




Leiden, July 11, 2012         Steffen Staab                         34
Guerilla Marketing




                        Failure: Information sources had no reputation from
Leiden, July 11, 2012
                                            third parties!
                                            Steffen Staab                     35
Reputation perspective

Belief in benevolence vs believe in competence

A system S trusts person P performing action A
if sufficient reputation could be aggregated




Leiden, July 11, 2012    Steffen Staab           36
Reputation scoring as link prediction




     me


   Predict which unknown link would also be good
                      to have

Standard algorithm: find friends-of-friends



Leiden, July 11, 2012   Steffen Staab          37
Leiden, July 11, 2012   Steffen Staab   38
Friend of a friend




Leiden, July 11, 2012   Steffen Staab   39
Reputation Scoring in Social Networks
• Some variation of link prediction (here is just one – big - family of methods)
• Counting and weighting paths




  Leiden, July 11, 2012                 Steffen Staab                              40
Leiden, July 11, 2012   Steffen Staab   41
Distrust computation

Prediction of negative links
Few networks with negative links (Slashdot zoo)
Several methods for handling negative links available

Social factors
Facebook unlinking prediction [Quercia et al]
    Age gap
    Low number of common friends (embeddedness)
    No common female friend
    One neurotic or introvert
Results seem to be comparable to „unlinking“ in real life



Leiden, July 11, 2012      Steffen Staab                     42
IT security perspective
      on Trust

Leiden, July 11, 2012   Steffen Staab   43
Hacked Web Sites: Did government post this?




                        Failure: IT security failed
Leiden, July 11, 2012         Steffen Staab           44
Security perspective

 Authorization
    Specific person P is allowed to do action A

 Authentication
    Proof to be a specific person

 Sometimes: Tokens that lend authority and/or
  authentication via centralized or decentralized trust center

 A system S trusts Person P to perform A if
  authentication and authorization can be proven



Leiden, July 11, 2012       Steffen Staab                    45
Trusted third party

Applications
Commercial transactions: Ebay/paypal,...
Public key infrastructures
      https://www.trustcenter.de , www.cert.dfn.de, many others




                                 3rd Party




                    A                                   B




                                                                   © R. Grimm
Leiden, July 11, 2012             Steffen Staab                           46
Conclusion


Leiden, July 11, 2012   Steffen Staab   47
Trust AND Web Data
                                                     WWW /
 How does Trust deviate for Web Data?               E-Mail
                                                     TCP/IP
    People are coupled more loosely
           • Fewer possibilities for
              – Reputation building
              – Personal ties
      Increased chance of encountering misbehavior
           • Decentralization on the Web
      Web data does not focus trust – it only extends the issue




                 WWW /
                 E-Mail
                 TCP/IP


Leiden, July 11, 2012              Steffen Staab               48
Conclusion

 Survey of trust issues
    Incomplete
    Interdisciplinary
    Interwoven
          • With each other
             – E.g. trust/reputation as computed from social network analysis
          • With further Web topics


 We need
   Experiments                    So far:
   Models                         strengths in one of these
   Analytic techniques            areas, but not in all!


 Leiden, July 11, 2012             Steffen Staab                         49
References


Leiden, July 11, 2012   Steffen Staab   50
Survey type articles

   Luhmann: Vertrauen - ein Mechanismus der Reduktion sozialer Komplexität (1968)
   N. Luhmann, Trust and Power. John Wiley & Sons, 1979.
   Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen, A Survey on Trust Management
    for Mobile Ad Hoc Networks, IEEE COMMUNICATIONS SURVEYS &
    TUTORIALS, VOL. 13, NO. 4, FOURTH QUARTER 2011
   S. Staab et al., “The Pudding of Trust,” IEEE Intelligent Systems, vol. 19, no. 5, pp.
    74-88, 2004.
   Donovan Artz, Yolanda Gil: A survey of trust in computer science and the
    Semantic Web. J. Web Sem. 5(2): 58-71 (2007)
   Jennifer Golbeck (2008) "Trust on the World Wide Web: A Survey", Foundations
    and Trends in Web Science: Vol. 1: No 2, pp 131-197.
    http:/dx.doi.org/10.1561/1800000006
   Piotr Cofta (2011) "The Trustworthy and Trusted Web",
    Foundations and Trends in Web Science: Vol. 2: No 4, pp 243-381.
    http://dx.doi.org/10.1561/1800000016
   Miriam J. Metzger: Making sense of credibility on the Web: Models for evaluating
    online information and recommendations for future research. JASIST 58(13):
    2078-2091 (2007)


Leiden, July 11, 2012                  Steffen Staab                                  51
Specific articles/books:

   Jennifer Golbeck PhD Thesis U Maryland
   Jerome Kunegis PhD Thesis U Koblenz
   Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-Molina: The Eigentrust
    algorithm for reputation management in P2P networks. WWW 2003: 640-651
   Simon Schenk, Renata Queiroz Dividino, Steffen Staab: Using provenance to
    debug changing ontologies. J. Web Sem. 9(3): 284-298 (2011)
   Xian Li, Timothy Lebo, Deborah L. McGuinness: Provenance-Based Strategies to
    Develop Trust in Semantic Web Applications. IPAW 2010: 182-197
   Luca de Alfaro, Ashutosh Kulshreshtha, Ian Pye, B. Thomas Adler: Reputation
    systems for open collaboration. Commun. ACM 54(8): 81-87 (2011)
   R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, “Propagation of trust and
    distrust,” in Proceedings of the 13th international conference on World Wide Web.
    ACM, 2004, pp. 403–412.
   Daniele Quercia, Mansoureh Bodaghi, Jon Crowcroft. Loosing “Friends” on
    Facebook. In: Proc. WebSci 2012, Evanston, June 2012. ACM.




Leiden, July 11, 2012                Steffen Staab                                52

Contenu connexe

Plus de Steffen Staab

Web Futures: Inclusive, Intelligent, Sustainable
Web Futures: Inclusive, Intelligent, SustainableWeb Futures: Inclusive, Intelligent, Sustainable
Web Futures: Inclusive, Intelligent, SustainableSteffen Staab
 
Concepts in Application Context ( How we may think conceptually )
Concepts in Application Context ( How we may think conceptually )Concepts in Application Context ( How we may think conceptually )
Concepts in Application Context ( How we may think conceptually )Steffen Staab
 
Storing and Querying Semantic Data in the Cloud
Storing and Querying Semantic Data in the CloudStoring and Querying Semantic Data in the Cloud
Storing and Querying Semantic Data in the CloudSteffen Staab
 
Ontologien und Semantic Web - Impulsvortrag Terminologietag
Ontologien und Semantic Web - Impulsvortrag TerminologietagOntologien und Semantic Web - Impulsvortrag Terminologietag
Ontologien und Semantic Web - Impulsvortrag TerminologietagSteffen Staab
 
Opinion Formation and Spreading
Opinion Formation and SpreadingOpinion Formation and Spreading
Opinion Formation and SpreadingSteffen Staab
 
10 Jahre Web Science
10 Jahre Web Science10 Jahre Web Science
10 Jahre Web ScienceSteffen Staab
 
(Semi-)Automatic analysis of online contents
(Semi-)Automatic analysis of online contents(Semi-)Automatic analysis of online contents
(Semi-)Automatic analysis of online contentsSteffen Staab
 
Programming with Semantic Broad Data
Programming with Semantic Broad DataProgramming with Semantic Broad Data
Programming with Semantic Broad DataSteffen Staab
 
Text Mining using LDA with Context
Text Mining using LDA with ContextText Mining using LDA with Context
Text Mining using LDA with ContextSteffen Staab
 
Wwsss intro2016-final
Wwsss intro2016-finalWwsss intro2016-final
Wwsss intro2016-finalSteffen Staab
 
10 Years Web Science
10 Years Web Science10 Years Web Science
10 Years Web ScienceSteffen Staab
 
Semantic Web Technologies: Principles and Practices
Semantic Web Technologies: Principles and PracticesSemantic Web Technologies: Principles and Practices
Semantic Web Technologies: Principles and PracticesSteffen Staab
 
Closing Session ISWC 2015
Closing Session ISWC 2015Closing Session ISWC 2015
Closing Session ISWC 2015Steffen Staab
 
ISWC2015 Opening Session
ISWC2015 Opening SessionISWC2015 Opening Session
ISWC2015 Opening SessionSteffen Staab
 
Bias in the Social Web
Bias in the Social WebBias in the Social Web
Bias in the Social WebSteffen Staab
 
Semantic Technologies and Programmatic Access to Semantic Data
Semantic Technologies and Programmatic Access to Semantic Data Semantic Technologies and Programmatic Access to Semantic Data
Semantic Technologies and Programmatic Access to Semantic Data Steffen Staab
 
Seamless semantics - avoiding semantic discontinuity
Seamless semantics - avoiding semantic discontinuitySeamless semantics - avoiding semantic discontinuity
Seamless semantics - avoiding semantic discontinuitySteffen Staab
 

Plus de Steffen Staab (20)

Web Futures: Inclusive, Intelligent, Sustainable
Web Futures: Inclusive, Intelligent, SustainableWeb Futures: Inclusive, Intelligent, Sustainable
Web Futures: Inclusive, Intelligent, Sustainable
 
Eyeing the Web
Eyeing the WebEyeing the Web
Eyeing the Web
 
Concepts in Application Context ( How we may think conceptually )
Concepts in Application Context ( How we may think conceptually )Concepts in Application Context ( How we may think conceptually )
Concepts in Application Context ( How we may think conceptually )
 
Storing and Querying Semantic Data in the Cloud
Storing and Querying Semantic Data in the CloudStoring and Querying Semantic Data in the Cloud
Storing and Querying Semantic Data in the Cloud
 
Semantics reloaded
Semantics reloadedSemantics reloaded
Semantics reloaded
 
Ontologien und Semantic Web - Impulsvortrag Terminologietag
Ontologien und Semantic Web - Impulsvortrag TerminologietagOntologien und Semantic Web - Impulsvortrag Terminologietag
Ontologien und Semantic Web - Impulsvortrag Terminologietag
 
Opinion Formation and Spreading
Opinion Formation and SpreadingOpinion Formation and Spreading
Opinion Formation and Spreading
 
The Web We Want
The Web We WantThe Web We Want
The Web We Want
 
10 Jahre Web Science
10 Jahre Web Science10 Jahre Web Science
10 Jahre Web Science
 
(Semi-)Automatic analysis of online contents
(Semi-)Automatic analysis of online contents(Semi-)Automatic analysis of online contents
(Semi-)Automatic analysis of online contents
 
Programming with Semantic Broad Data
Programming with Semantic Broad DataProgramming with Semantic Broad Data
Programming with Semantic Broad Data
 
Text Mining using LDA with Context
Text Mining using LDA with ContextText Mining using LDA with Context
Text Mining using LDA with Context
 
Wwsss intro2016-final
Wwsss intro2016-finalWwsss intro2016-final
Wwsss intro2016-final
 
10 Years Web Science
10 Years Web Science10 Years Web Science
10 Years Web Science
 
Semantic Web Technologies: Principles and Practices
Semantic Web Technologies: Principles and PracticesSemantic Web Technologies: Principles and Practices
Semantic Web Technologies: Principles and Practices
 
Closing Session ISWC 2015
Closing Session ISWC 2015Closing Session ISWC 2015
Closing Session ISWC 2015
 
ISWC2015 Opening Session
ISWC2015 Opening SessionISWC2015 Opening Session
ISWC2015 Opening Session
 
Bias in the Social Web
Bias in the Social WebBias in the Social Web
Bias in the Social Web
 
Semantic Technologies and Programmatic Access to Semantic Data
Semantic Technologies and Programmatic Access to Semantic Data Semantic Technologies and Programmatic Access to Semantic Data
Semantic Technologies and Programmatic Access to Semantic Data
 
Seamless semantics - avoiding semantic discontinuity
Seamless semantics - avoiding semantic discontinuitySeamless semantics - avoiding semantic discontinuity
Seamless semantics - avoiding semantic discontinuity
 

Dernier

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Dernier (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Trust

  • 1. Institut für Web Science & Technologien - WeST Trust
  • 2. Web WWW /  Noone owns the Web E-Mail TCP/IP  Everyone can participate, share,....  No central control  No centrally ensured security WWW / E-Mail TCP/IP © R. Grimm Leiden, July 11, 2012 Steffen Staab 2
  • 3. WWW / WWW / E-Mail E-Mail TCP/IP TCP/IP ?? Lying Deceiving Vandalism Eaves dropping Scams Stealing © R. Grimm Leiden, July 11, 2012 Steffen Staab 3
  • 4. How to loose 1,000,000,000 US$ in half a day Failures: Low quality of data collecting process, hence Via @Bauckhage currency of information was not considered Leiden, July 11, 2012 Steffen Staab 4
  • 5. What is trust? Leiden, July 11, 2012 Steffen Staab 5
  • 6. Definition of Trust http://en.wikipedia.org/wiki/Trust_%28social_sciences%29 Definitions of trust[2][3] typically refer to a situation characterised by the following aspects: One party (trustor) is willing to rely on the actions of another party (trustee); the situation is directed to the future; the trustor (voluntarily or forcedly) abandons control over the actions performed by the trustee; as a consequence, the trustor is uncertain about the outcome of the other's actions; he can only develop and evaluate expectations. The uncertainty involves the risk of failure or harm to the trustor if the trustee will not behave as desired. Leiden, July 11, 2012 Steffen Staab 6
  • 7. Core Question What does it mean if I say that I trust person P performing action A or a System S trusts person or system P performing action A ? Leiden, July 11, 2012 Steffen Staab 7
  • 8. Trust Perspectives Information and communication Education Social science Economic/risk management Reputation IT security Leiden, July 11, 2012 Steffen Staab 8
  • 9. Information & Communication Perspective on Trust Leiden, July 11, 2012 Steffen Staab 9
  • 10. Communication: Should we trust that people understand what we mean? Failure: Unintended recipient of information Leiden, July 11, 2012 Steffen Staab 10
  • 11. Asymmetry of Communication I say or do You say or do I say or do etc. Time line Time line © R. Grimm Leiden, July 11, 2012 Steffen Staab 11
  • 12. Give and take give In order to requires trust in continuity take © R. Grimm Leiden, July 11, 2012 Steffen Staab 12
  • 13. Information and Communication - Credibility  About the truth of information in which we trust, believability [Metzger 07]:  Expertise  Trustworthiness Sender Receiver Message Leiden, July 11, 2012 Steffen Staab 13
  • 14. Education Perspective on Trust Leiden, July 11, 2012 Steffen Staab 14
  • 15. Online Investment Scams Trust Identity of Risk debitors (greed) BTW: I am not sure you can trust this website Failure: Identity scam & users missassess trustworthiness Leiden, July 11, 2012 Steffen Staab 15
  • 16. The education perspective What do I need to teach someone such that If he trusts person P performing action A he does not suffer? [Metzger, 2007] A system S trusts person P performing action A if P satisfies the assessment criteria for trust Leiden, July 11, 2012 Steffen Staab 16
  • 17. Credibility: What people do and what they should do  (Teach to) Assess credibility by checklist:  accuracy, Can be  authority, reasoned • Identity, qualifications with in the – Whois, Traceroute, NSlookup/Dig semantic  objectivity, web if  currency, described! (eg. [Schenk])  and coverage or scope Internet users may be easily Assessing what people do on the Web: Interestingly, what focus-group participants said they looked for in assessing credibility wasdesign. the researchers found they duped by slick Web not what ⇒meta strategies actually looked at during the observational portion of the study. Leiden, July 11, 2012 Steffen Staab 17
  • 18. Social science Perspective on Trust Leiden, July 11, 2012 Steffen Staab 18
  • 19.  A system S trusts person P performing action A if P belongs to trusted group Leiden, July 11, 2012 Steffen Staab 19
  • 20. Social Science – 1 Luhmann: Levels of increasing freedom to act  Familarity  Based on what we know  No deviation from the known  Confidence  Founded on laws, fallback positions,...  Trust  Acting under risk Trust is the reduction of complexity Leiden, July 11, 2012 Steffen Staab 20
  • 21. Social Science – 2: Social Theory of Balance Friend Foe Leiden, July 11, 2012 Steffen Staab 21
  • 22. Structural Balance for Groups of 3 Leiden, July 11, 2012 Steffen Staab 22
  • 23. Structural Balance for Groups of 3 Definition: A triangle is balanced if all 3 relations between the nodes are positive or if there is exactly one positive relationship Leiden, July 11, 2012 Steffen Staab 23
  • 24. Structural Balance for a Network Definition: A network is called structurally balanced if all groups of triangles are structurally balanced. Balance Theorem: If a labeled complete graph is balanced, then either all pairs of nodes are friend, or else the nodes can be divided into two groups, X and Y,  such that each pair of people in X likes each other,  each pair of people in Y likes each other,  and everyone in X is the enemy of everyone in Y. Leiden, July 11, 2012 Steffen Staab 24
  • 25. Structural Balance for a Network Leiden, July 11, 2012 Steffen Staab 25
  • 26. Weakly Balanced Networks Definition of Weak Structural Balance Property: There is no set of three nodes such that the edges among them consist of exactly two positive edges and one negative edge Leiden, July 11, 2012 Steffen Staab 26
  • 27. Weak Structural Balance Property Leiden, July 11, 2012 Steffen Staab 27
  • 28. Risk Management/Economic perspective on Trust Leiden, July 11, 2012 Steffen Staab 28
  • 29. Risk Management/Economic perspective  Risk is a pair  Value/Cost of an event arising  Probability that the event will arise  Trust means willingness to bear a risk  A system S trusts person P performing action A if the expected overall value/utility is positive  In particular trust issues arise in markets with information asymmetry – e.g. E-Bay Leiden, July 11, 2012 Steffen Staab 29
  • 30. A Web Market Example  Trust issues arising in markets with information asymmetry – e.g. E-Bay  Assume 50 good cars, 50 bad cars could be for sale  200 buyers willing to buy  Assume buyers are willing to pay up to 12 for good cars and up to 6 for bad cars  Assume sellers are willing to sell from 10 upwards and 5 upwards for good and bad cars respectively  Information Asymmetry:  Sellers judge good/bad accurately  Buyers cannot judge good/bad at all, but know about willingness of sellers to sell Leiden, July 11, 2012 Steffen Staab 30
  • 31. Economic perspective: Expected Value  Information Asymmetry:  Expected value of a car for a buyer at most (12+6)/2=9  At 9 sellers of good cars do not sell, therefore rational buyers cannot expect any good cars to be on the market! • No good cars are sold, because of a lack of trust! Self-fulfilling expectations! Market Failure!  Solution: Reputation reduces information asymmetry  If ¾ of cars sold as good cars are good, then expected value is ¾*12+1/4*6=10.5 – i.e. good cars can be sold! Leiden, July 11, 2012 Steffen Staab 31
  • 32. Asymmetric information and Trust signals  Used car markets  Partial remedy • Guarantees by traders – Reduces subsequent costs for buyers of lemons – Strong signal that the car has decent quality  Labor market  Partial remedy: • Education certificates – Education leads to knowledge – Certificate is signal for intellectual and work capacity  Insurance  Buyer of insurance knows more • Very partial remedy: incentives system to take sports courses Leiden, July 11, 2012 Steffen Staab 32
  • 33. Reputation Perspective on Trust Leiden, July 11, 2012 Steffen Staab 33
  • 34. +++ „Los Angeles (dpa) – In der kalifornischen Kleinstadt Bluewater soll es nach einem Bericht des örtlichen Senders vpk-tv zu einem Selbstmordanschlag gekommen sein. Es habe in einem Restaurant zwei Explosionen gegeben...“ +++ German Press Agency DPA, 10 Sep 2009 Leiden, July 11, 2012 Steffen Staab 34
  • 35. Guerilla Marketing Failure: Information sources had no reputation from Leiden, July 11, 2012 third parties! Steffen Staab 35
  • 36. Reputation perspective Belief in benevolence vs believe in competence A system S trusts person P performing action A if sufficient reputation could be aggregated Leiden, July 11, 2012 Steffen Staab 36
  • 37. Reputation scoring as link prediction me Predict which unknown link would also be good to have Standard algorithm: find friends-of-friends Leiden, July 11, 2012 Steffen Staab 37
  • 38. Leiden, July 11, 2012 Steffen Staab 38
  • 39. Friend of a friend Leiden, July 11, 2012 Steffen Staab 39
  • 40. Reputation Scoring in Social Networks • Some variation of link prediction (here is just one – big - family of methods) • Counting and weighting paths Leiden, July 11, 2012 Steffen Staab 40
  • 41. Leiden, July 11, 2012 Steffen Staab 41
  • 42. Distrust computation Prediction of negative links Few networks with negative links (Slashdot zoo) Several methods for handling negative links available Social factors Facebook unlinking prediction [Quercia et al]  Age gap  Low number of common friends (embeddedness)  No common female friend  One neurotic or introvert Results seem to be comparable to „unlinking“ in real life Leiden, July 11, 2012 Steffen Staab 42
  • 43. IT security perspective on Trust Leiden, July 11, 2012 Steffen Staab 43
  • 44. Hacked Web Sites: Did government post this? Failure: IT security failed Leiden, July 11, 2012 Steffen Staab 44
  • 45. Security perspective  Authorization  Specific person P is allowed to do action A  Authentication  Proof to be a specific person  Sometimes: Tokens that lend authority and/or authentication via centralized or decentralized trust center  A system S trusts Person P to perform A if authentication and authorization can be proven Leiden, July 11, 2012 Steffen Staab 45
  • 46. Trusted third party Applications Commercial transactions: Ebay/paypal,... Public key infrastructures  https://www.trustcenter.de , www.cert.dfn.de, many others 3rd Party A B © R. Grimm Leiden, July 11, 2012 Steffen Staab 46
  • 47. Conclusion Leiden, July 11, 2012 Steffen Staab 47
  • 48. Trust AND Web Data WWW /  How does Trust deviate for Web Data? E-Mail TCP/IP  People are coupled more loosely • Fewer possibilities for – Reputation building – Personal ties  Increased chance of encountering misbehavior • Decentralization on the Web  Web data does not focus trust – it only extends the issue WWW / E-Mail TCP/IP Leiden, July 11, 2012 Steffen Staab 48
  • 49. Conclusion  Survey of trust issues  Incomplete  Interdisciplinary  Interwoven • With each other – E.g. trust/reputation as computed from social network analysis • With further Web topics  We need  Experiments So far:  Models strengths in one of these  Analytic techniques areas, but not in all! Leiden, July 11, 2012 Steffen Staab 49
  • 50. References Leiden, July 11, 2012 Steffen Staab 50
  • 51. Survey type articles  Luhmann: Vertrauen - ein Mechanismus der Reduktion sozialer Komplexität (1968)  N. Luhmann, Trust and Power. John Wiley & Sons, 1979.  Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen, A Survey on Trust Management for Mobile Ad Hoc Networks, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 4, FOURTH QUARTER 2011  S. Staab et al., “The Pudding of Trust,” IEEE Intelligent Systems, vol. 19, no. 5, pp. 74-88, 2004.  Donovan Artz, Yolanda Gil: A survey of trust in computer science and the Semantic Web. J. Web Sem. 5(2): 58-71 (2007)  Jennifer Golbeck (2008) "Trust on the World Wide Web: A Survey", Foundations and Trends in Web Science: Vol. 1: No 2, pp 131-197. http:/dx.doi.org/10.1561/1800000006  Piotr Cofta (2011) "The Trustworthy and Trusted Web", Foundations and Trends in Web Science: Vol. 2: No 4, pp 243-381. http://dx.doi.org/10.1561/1800000016  Miriam J. Metzger: Making sense of credibility on the Web: Models for evaluating online information and recommendations for future research. JASIST 58(13): 2078-2091 (2007) Leiden, July 11, 2012 Steffen Staab 51
  • 52. Specific articles/books:  Jennifer Golbeck PhD Thesis U Maryland  Jerome Kunegis PhD Thesis U Koblenz  Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-Molina: The Eigentrust algorithm for reputation management in P2P networks. WWW 2003: 640-651  Simon Schenk, Renata Queiroz Dividino, Steffen Staab: Using provenance to debug changing ontologies. J. Web Sem. 9(3): 284-298 (2011)  Xian Li, Timothy Lebo, Deborah L. McGuinness: Provenance-Based Strategies to Develop Trust in Semantic Web Applications. IPAW 2010: 182-197  Luca de Alfaro, Ashutosh Kulshreshtha, Ian Pye, B. Thomas Adler: Reputation systems for open collaboration. Commun. ACM 54(8): 81-87 (2011)  R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, “Propagation of trust and distrust,” in Proceedings of the 13th international conference on World Wide Web. ACM, 2004, pp. 403–412.  Daniele Quercia, Mansoureh Bodaghi, Jon Crowcroft. Loosing “Friends” on Facebook. In: Proc. WebSci 2012, Evanston, June 2012. ACM. Leiden, July 11, 2012 Steffen Staab 52

Notes de l'éditeur

  1. The assessment of the believability of a message depends on source, receive as well as on the message itself; Incuding source‘s expertise, trustworthiness and ! Attractiveness (Halo effect; most expensive consulting companies have the best looking Consultants; turning this around: if all your consultants look great, then you probably pay too much) Interesting: Metzger creates a dichotomy between authoritative publishers in previous times and the low authority of publishing on the web – whereas at any time, it was not truth that was most published, but the stuff the sold best (which might be news about inexisting UFOs, Hitler‘s book, etc.)
  2. Accuracy refers to the degree to which a Web site is free from errors, whether the information can be verified offline, and the reliability of the information on the site. The author- ity of a Web site may be assessed by noting who authored the site and whether contact information is provided for that person or organization, what the author’s credentials, quali- fications, and affiliations are, and whether the Web site is recommended by a trusted source. Objectivity involves iden- tifying the purpose of the site and whether the information provided is fact or opinion, which also includes understand- ing whether there might be commercial intent or a conflict of interest on the part of the source, as well as the nature of relationships between linked information sources (e.g., the meaning of “ sponsored links ” on a Google search output page). Currency refers to whether the information is up to date. Coverage refers to the comprehensiveness or depth of the information provided on the site. These recommenda- tions require a range of activities on the part of users, from simple visual inspection of a Web site to more laborious information verification and triangulation efforts. CURRENCY: TELL STORY ABOUT UNITED AIRLINES
  3. - restrict to unweighted, undirected, unipartite graphs.