SlideShare une entreprise Scribd logo
1  sur  61
Trust and the Web  George Metakides Veria December 11 2009
Trust undelries the foundations of Civilization             Agricultural                Industrial Information…. 21st 19th-20th 15th 3000 B.C.   Writing Electricity Τelephony Τelevision  Printing Internet
Cryptography : Security(how to tell a secret) The Caesar Cipher abcdefghijklmnopqrstuvwxyz k=4 defghijklmnopqrstuvwxyzabc DwwdfnQrz (Suetonius : (De Vita caesarum ,2ndcent.a.d.)
Electricity :  Safety 1880      First Applications (factories)  Few houses(lighting) Lack of Trust !                                                              1920         Invasion of households (appliances) Integrated everywhere                     « Reasonable» trust TodayThe Internet/Web is around…1900 !
Cryptography(how to tell a secret) The Caesar Cipher abcdefghijklmnopqrstuvwxyz k=4 defghijklmnopqrstuvwxyzabc DwwdfnQrz (Suetonius : (De Vita caesarum ,2ndcent.a.d.)
WWW : The explosion raises new trust issues black on black routes and the missing .mil, .gov. ,[object Object]
Commerce,governance,entertainment
Education /Learning
Political priority,[object Object]
Issues at stake Network Security – Threats System Safety – Software Privacy –Personal Data Data  Authenticity  /Integrity
Issues at stake Network Security – Threats System Safety – Software Privacy –Personal Data
Network securityEvolution of threats courtesy
Security in Converged Networks (inherited problems / inherited solutions?) Multi Play Multi Play a la carte Eavesdropping Masquerading VoIP ISPs CABLE MOBILE NETWORKS FIXED NETWORKS VNOs NGN/IMS Denial of Serice Service fraud
Example: Mobile Security IP-Based 3G/4GMobileNetworksIncrease MobileOperators’ ExposuretoRisksfrom: ,[object Object],untrustedexternalnetworks. ,[object Object],applicationsaremore “vulnerable” to worms, virusesandDDoSattacks ,[object Object]
Peer-to-peerApplications,[object Object]
75-90% of Upstream Traffic is P2P
Traditionally, client requests accommodated by caching
Computation is moving to the edge of the network to aggregate, synthesize and filter data
The massive deployment of smart, networked sensors will dramatically affect network volume and traffic patterns
More computation datapaths and data volume – more security problems …,[object Object]
Types inwww.bank.com
DNS request goes to ISP
DNS points to the firewall of the bank
Firewall redirects the packets to the webserverwww.bank.com 176.43.2.54 Internet- Wireless DMZ /  Service Network ,[object Object]
Client starts browser for home banking
Types inwww.bank.com
DNS request goes to ISP
DNS points to the server of hacker
Hacker simulates the websites of the bank
Client tansfers PIN & TAN
Hacker got PIN & aunusedTANHacker ISP DNS 186.47.3.63 Webservices Home banking
Client VoIP Server UPS VoIP conversation SNMP SNMP LAN The Weakest Link .... SNMP Normal operation ,[object Object]
UPS will provide power for 24 hours
After 24 hours UPS will send SNMP trap to call server  SHUTDOWN SNMP spoofing ,[object Object]
Call Server shutdown
TELEPHONE SYSTEM GOES DOWN !!!!!,[object Object]
Issues at stake Network Security – Threats System Safety – Software Privacy –Personal Data
System Safety Software ,[object Object]
Financial Transactions
Critical Infrastructures
“Verification”;
 Insurance
The Economics of Safety!Safety metrics ? Safety “Seal of Approval” What is “satisfacory” ?
Issues at stake Network Security – Threats System Safety – Software Privacy –Personal Data
Privacy and Personal data Companies: Customer profiling Governments: Service provision and … Google street ,Webcams ,Facebook ,You Tube … Options for users(opt-in / opt-out) Data retention Data deletion Νew legislation
Thank you!
Investing in Security How much should organizations spend on information security? Governments, vendors say: much more than at present (But they’ve been saying this for 20 years!) Measurements of security return-on-investment suggest current expenditure may be about right ! “negative “ incentives just starting (regulatory framework, fines ). Benefits for early adopters elusive.
Security Market ROI + - Coming….      Liability as an Incentive Class actions? We are here
But Reality is pressing ! Internet security Code red ICT Systems Security Le cyber-espionnage économique entre dans le Top 3 des menaces  Grosse faille du web, et solution en chemin Cyberwar and real war collide in Georgia Revealed: 8 million victims in the world's biggest cyber heist Critical infrastructures open to attack, says study YouTube case opens can of worms on online privacy Privacy La colère associative monte contre Edvige, le fichier policier de données personnelles Phorm to use BT customers to test precision advertising system on net (Aug) Google To Slice Existing 18 Month Data Retention Period In Half Big Brother Spying on Americans' Internet Data? Trust The dangers of cloud computing  Lesson From a Crisis: When Trust Vanishes, Worry Internet key to Obama victories (Apr) Article 29 Working Party of EDPOs: the EU’s Data Protection Directive generally applies to the processing of personal data by search engines, even when their headquarters are outside the EU
Trust and Society Trustworthy systems and practices play important role in democratic our society: legal code, institutions, moral code, reliable technology, …  It took generations to build our democratic values – Europe must  nurture them into the digital age.
EU Legal framework on Data protection and Privacy and Technology  DP Directive: 95/46/EC, Privacy Directive:2002/58/EC Personal Data: information relating to an identified or identifiable person Scope: Material: which information and processes addressed Personal: which roles (data controller, processor, subject) Territorial: applicable law, cross-border data transfer Issues: Linked data, smart data mining and Personal Data Accountability and transparency of controller and processor; need for technology support Risk assessment and user control, need for technology support
[object Object]
 Role of end-users
 Society-protecting business models  Technology & Innovation End-Users & the Society Trustworthy  Information Society? ,[object Object]
 “Economics of security”
 Policies for privacy-respecting   Trust and Identity?
 Security, privacy, identity
 Protection of human values
 Transparency, accountability
 Auditing and Law enforcementPolicy & Regulation Security, Privacy, Trust Interplay in the Information Society

Contenu connexe

Tendances

Todays Mobile Cybersecurity
Todays Mobile CybersecurityTodays Mobile Cybersecurity
Todays Mobile CybersecurityVivastream
 
Network 2020: Connecting Everyone to Everything
Network 2020: Connecting Everyone to Everything Network 2020: Connecting Everyone to Everything
Network 2020: Connecting Everyone to Everything Verizon Thought Leadership
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksWilliam Chipman
 
5G System Trends and Development
5G System Trends and Development5G System Trends and Development
5G System Trends and Developmentijtsrd
 
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...CSCJournals
 
The Internet of Everything: Tom Lee, Stanford School of Engineering
The Internet of Everything:  Tom Lee, Stanford School of EngineeringThe Internet of Everything:  Tom Lee, Stanford School of Engineering
The Internet of Everything: Tom Lee, Stanford School of EngineeringStanford School of Engineering
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
Dubai 2
Dubai 2Dubai 2
Dubai 2mmavis
 
The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...
The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...
The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...Cisco Service Provider Mobility
 
Lecture 5 - VDIS10047 Fashion Marketing - The Growth of eBusiness
Lecture 5 - VDIS10047 Fashion Marketing - The Growth of eBusinessLecture 5 - VDIS10047 Fashion Marketing - The Growth of eBusiness
Lecture 5 - VDIS10047 Fashion Marketing - The Growth of eBusinessVirtu Institute
 
convergence of technologies
convergence of technologiesconvergence of technologies
convergence of technologiesdeepinder07
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
An Overview of 5G Wireless Cellular Technologies
An Overview of 5G Wireless Cellular TechnologiesAn Overview of 5G Wireless Cellular Technologies
An Overview of 5G Wireless Cellular TechnologiesEditor IJCATR
 
The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ...
 The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ... The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ...
The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ...Virtu Institute
 

Tendances (20)

Wi Fi
Wi FiWi Fi
Wi Fi
 
Todays Mobile Cybersecurity
Todays Mobile CybersecurityTodays Mobile Cybersecurity
Todays Mobile Cybersecurity
 
Wp 3g
Wp 3gWp 3g
Wp 3g
 
Network 2020: Connecting Everyone to Everything
Network 2020: Connecting Everyone to Everything Network 2020: Connecting Everyone to Everything
Network 2020: Connecting Everyone to Everything
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
5G System Trends and Development
5G System Trends and Development5G System Trends and Development
5G System Trends and Development
 
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
 
The Internet of Everything: Tom Lee, Stanford School of Engineering
The Internet of Everything:  Tom Lee, Stanford School of EngineeringThe Internet of Everything:  Tom Lee, Stanford School of Engineering
The Internet of Everything: Tom Lee, Stanford School of Engineering
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
Dubai 2
Dubai 2Dubai 2
Dubai 2
 
Mobile telecoms
Mobile telecomsMobile telecoms
Mobile telecoms
 
The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...
The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...
The Next Generation of the Internet Revolutionizing the Way We Work, Live, Pl...
 
Lecture 5 - VDIS10047 Fashion Marketing - The Growth of eBusiness
Lecture 5 - VDIS10047 Fashion Marketing - The Growth of eBusinessLecture 5 - VDIS10047 Fashion Marketing - The Growth of eBusiness
Lecture 5 - VDIS10047 Fashion Marketing - The Growth of eBusiness
 
convergence of technologies
convergence of technologiesconvergence of technologies
convergence of technologies
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
An Overview of 5G Wireless Cellular Technologies
An Overview of 5G Wireless Cellular TechnologiesAn Overview of 5G Wireless Cellular Technologies
An Overview of 5G Wireless Cellular Technologies
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ...
 The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ... The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ...
The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ...
 

Similaire à Trust and the web veria 11 12- 09

Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologyJohn D. Johnson
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxSharifulShishir
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 IntroducationTushar Rajput
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...Andris Soroka
 
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsSecurity workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsCynthia Calongne
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docxAmir Khan
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAJorge Sebastiao
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so farPayamBarnaghi
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so farCityPulse Project
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet   Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet Bill Harpley
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing BotBellaj Badr
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
 

Similaire à Trust and the web veria 11 12- 09 (20)

Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Rogerio PC do Nascimento EATIS 2009
Rogerio PC do Nascimento EATIS 2009Rogerio PC do Nascimento EATIS 2009
Rogerio PC do Nascimento EATIS 2009
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
 
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsSecurity workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet   Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 

Plus de vafopoulos

publicspending.gr
publicspending.grpublicspending.gr
publicspending.grvafopoulos
 
2011 05-02 linked data intro
2011 05-02 linked data intro2011 05-02 linked data intro
2011 05-02 linked data introvafopoulos
 
2011 05-01 linked data
2011 05-01 linked data2011 05-01 linked data
2011 05-01 linked datavafopoulos
 
2010 06-08 chania stochastic web modelling - copy
2010 06-08 chania stochastic web modelling - copy2010 06-08 chania stochastic web modelling - copy
2010 06-08 chania stochastic web modelling - copyvafopoulos
 
Amaxus con webdoc_10773
Amaxus con webdoc_10773Amaxus con webdoc_10773
Amaxus con webdoc_10773vafopoulos
 
Ws13 1(2010-11)
Ws13 1(2010-11)Ws13 1(2010-11)
Ws13 1(2010-11)vafopoulos
 
Ws13 2(2010-11)
Ws13 2(2010-11)Ws13 2(2010-11)
Ws13 2(2010-11)vafopoulos
 
Ws 13-3(2010-11)
Ws 13-3(2010-11)Ws 13-3(2010-11)
Ws 13-3(2010-11)vafopoulos
 
Ws 13-4(2010-11)
Ws 13-4(2010-11)Ws 13-4(2010-11)
Ws 13-4(2010-11)vafopoulos
 
2010 07 modeling web evolution amarantidis antoniou vafopoulos final
2010 07 modeling web evolution amarantidis antoniou vafopoulos final2010 07 modeling web evolution amarantidis antoniou vafopoulos final
2010 07 modeling web evolution amarantidis antoniou vafopoulos finalvafopoulos
 
Presentation gr
Presentation grPresentation gr
Presentation grvafopoulos
 
Vafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janusVafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janusvafopoulos
 
2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiouvafopoulos
 
κοινωνια της πληροφοριας ευκαιριες και απειλες
κοινωνια της πληροφοριας ευκαιριες και απειλεςκοινωνια της πληροφοριας ευκαιριες και απειλες
κοινωνια της πληροφοριας ευκαιριες και απειλεςvafopoulos
 
2010 02-24 ws gm logic
2010 02-24 ws gm logic2010 02-24 ws gm logic
2010 02-24 ws gm logicvafopoulos
 
Wiki technologies nov_2008_ye
Wiki technologies nov_2008_yeWiki technologies nov_2008_ye
Wiki technologies nov_2008_yevafopoulos
 
Issue 11834$pdf
Issue 11834$pdfIssue 11834$pdf
Issue 11834$pdfvafopoulos
 
Gget 30 webscience
Gget 30 webscienceGget 30 webscience
Gget 30 websciencevafopoulos
 
Mit csail-tr-2007-034
Mit csail-tr-2007-034Mit csail-tr-2007-034
Mit csail-tr-2007-034vafopoulos
 

Plus de vafopoulos (20)

publicspending.gr
publicspending.grpublicspending.gr
publicspending.gr
 
2011 05-02 linked data intro
2011 05-02 linked data intro2011 05-02 linked data intro
2011 05-02 linked data intro
 
2011 05-01 linked data
2011 05-01 linked data2011 05-01 linked data
2011 05-01 linked data
 
D bpedia
D bpediaD bpedia
D bpedia
 
2010 06-08 chania stochastic web modelling - copy
2010 06-08 chania stochastic web modelling - copy2010 06-08 chania stochastic web modelling - copy
2010 06-08 chania stochastic web modelling - copy
 
Amaxus con webdoc_10773
Amaxus con webdoc_10773Amaxus con webdoc_10773
Amaxus con webdoc_10773
 
Ws13 1(2010-11)
Ws13 1(2010-11)Ws13 1(2010-11)
Ws13 1(2010-11)
 
Ws13 2(2010-11)
Ws13 2(2010-11)Ws13 2(2010-11)
Ws13 2(2010-11)
 
Ws 13-3(2010-11)
Ws 13-3(2010-11)Ws 13-3(2010-11)
Ws 13-3(2010-11)
 
Ws 13-4(2010-11)
Ws 13-4(2010-11)Ws 13-4(2010-11)
Ws 13-4(2010-11)
 
2010 07 modeling web evolution amarantidis antoniou vafopoulos final
2010 07 modeling web evolution amarantidis antoniou vafopoulos final2010 07 modeling web evolution amarantidis antoniou vafopoulos final
2010 07 modeling web evolution amarantidis antoniou vafopoulos final
 
Presentation gr
Presentation grPresentation gr
Presentation gr
 
Vafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janusVafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janus
 
2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou
 
κοινωνια της πληροφοριας ευκαιριες και απειλες
κοινωνια της πληροφοριας ευκαιριες και απειλεςκοινωνια της πληροφοριας ευκαιριες και απειλες
κοινωνια της πληροφοριας ευκαιριες και απειλες
 
2010 02-24 ws gm logic
2010 02-24 ws gm logic2010 02-24 ws gm logic
2010 02-24 ws gm logic
 
Wiki technologies nov_2008_ye
Wiki technologies nov_2008_yeWiki technologies nov_2008_ye
Wiki technologies nov_2008_ye
 
Issue 11834$pdf
Issue 11834$pdfIssue 11834$pdf
Issue 11834$pdf
 
Gget 30 webscience
Gget 30 webscienceGget 30 webscience
Gget 30 webscience
 
Mit csail-tr-2007-034
Mit csail-tr-2007-034Mit csail-tr-2007-034
Mit csail-tr-2007-034
 

Dernier

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Dernier (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

Trust and the web veria 11 12- 09

  • 1. Trust and the Web George Metakides Veria December 11 2009
  • 2. Trust undelries the foundations of Civilization Agricultural Industrial Information…. 21st 19th-20th 15th 3000 B.C. Writing Electricity Τelephony Τelevision Printing Internet
  • 3. Cryptography : Security(how to tell a secret) The Caesar Cipher abcdefghijklmnopqrstuvwxyz k=4 defghijklmnopqrstuvwxyzabc DwwdfnQrz (Suetonius : (De Vita caesarum ,2ndcent.a.d.)
  • 4. Electricity : Safety 1880 First Applications (factories) Few houses(lighting) Lack of Trust ! 1920 Invasion of households (appliances) Integrated everywhere « Reasonable» trust TodayThe Internet/Web is around…1900 !
  • 5. Cryptography(how to tell a secret) The Caesar Cipher abcdefghijklmnopqrstuvwxyz k=4 defghijklmnopqrstuvwxyzabc DwwdfnQrz (Suetonius : (De Vita caesarum ,2ndcent.a.d.)
  • 6.
  • 9.
  • 10. Issues at stake Network Security – Threats System Safety – Software Privacy –Personal Data Data Authenticity /Integrity
  • 11. Issues at stake Network Security – Threats System Safety – Software Privacy –Personal Data
  • 12. Network securityEvolution of threats courtesy
  • 13. Security in Converged Networks (inherited problems / inherited solutions?) Multi Play Multi Play a la carte Eavesdropping Masquerading VoIP ISPs CABLE MOBILE NETWORKS FIXED NETWORKS VNOs NGN/IMS Denial of Serice Service fraud
  • 14.
  • 15.
  • 16. 75-90% of Upstream Traffic is P2P
  • 17. Traditionally, client requests accommodated by caching
  • 18. Computation is moving to the edge of the network to aggregate, synthesize and filter data
  • 19. The massive deployment of smart, networked sensors will dramatically affect network volume and traffic patterns
  • 20.
  • 23. DNS points to the firewall of the bank
  • 24.
  • 25. Client starts browser for home banking
  • 28. DNS points to the server of hacker
  • 29. Hacker simulates the websites of the bank
  • 31. Hacker got PIN & aunusedTANHacker ISP DNS 186.47.3.63 Webservices Home banking
  • 32.
  • 33. UPS will provide power for 24 hours
  • 34.
  • 36.
  • 37. Issues at stake Network Security – Threats System Safety – Software Privacy –Personal Data
  • 38.
  • 43. The Economics of Safety!Safety metrics ? Safety “Seal of Approval” What is “satisfacory” ?
  • 44.
  • 45. Issues at stake Network Security – Threats System Safety – Software Privacy –Personal Data
  • 46. Privacy and Personal data Companies: Customer profiling Governments: Service provision and … Google street ,Webcams ,Facebook ,You Tube … Options for users(opt-in / opt-out) Data retention Data deletion Νew legislation
  • 48. Investing in Security How much should organizations spend on information security? Governments, vendors say: much more than at present (But they’ve been saying this for 20 years!) Measurements of security return-on-investment suggest current expenditure may be about right ! “negative “ incentives just starting (regulatory framework, fines ). Benefits for early adopters elusive.
  • 49. Security Market ROI + - Coming…. Liability as an Incentive Class actions? We are here
  • 50. But Reality is pressing ! Internet security Code red ICT Systems Security Le cyber-espionnage économique entre dans le Top 3 des menaces Grosse faille du web, et solution en chemin Cyberwar and real war collide in Georgia Revealed: 8 million victims in the world's biggest cyber heist Critical infrastructures open to attack, says study YouTube case opens can of worms on online privacy Privacy La colère associative monte contre Edvige, le fichier policier de données personnelles Phorm to use BT customers to test precision advertising system on net (Aug) Google To Slice Existing 18 Month Data Retention Period In Half Big Brother Spying on Americans' Internet Data? Trust The dangers of cloud computing Lesson From a Crisis: When Trust Vanishes, Worry Internet key to Obama victories (Apr) Article 29 Working Party of EDPOs: the EU’s Data Protection Directive generally applies to the processing of personal data by search engines, even when their headquarters are outside the EU
  • 51. Trust and Society Trustworthy systems and practices play important role in democratic our society: legal code, institutions, moral code, reliable technology, … It took generations to build our democratic values – Europe must nurture them into the digital age.
  • 52. EU Legal framework on Data protection and Privacy and Technology DP Directive: 95/46/EC, Privacy Directive:2002/58/EC Personal Data: information relating to an identified or identifiable person Scope: Material: which information and processes addressed Personal: which roles (data controller, processor, subject) Territorial: applicable law, cross-border data transfer Issues: Linked data, smart data mining and Personal Data Accountability and transparency of controller and processor; need for technology support Risk assessment and user control, need for technology support
  • 53.
  • 54. Role of end-users
  • 55.
  • 56. “Economics of security”
  • 57. Policies for privacy-respecting Trust and Identity?
  • 59. Protection of human values
  • 61. Auditing and Law enforcementPolicy & Regulation Security, Privacy, Trust Interplay in the Information Society
  • 62. Game Machine DVC STB TV PC e t Audio r c a a Energy Networks m p DVD S Telephone S Future Internet Digital Living eHealth & Health networks Transport Networks Trusted & Smart “everything”
  • 63. RISEPTIS Advisory Board Research and Innovation in SEcurity, Privacy and Trustworthiness in the Information Society Objective: provide visionary guidance on policy and research challenges in the field of security and trust in the Information Society. Chair: George Metakides (U Patras, CTI) Members: Dario Avallone(Engineering), Giovanni Barontini (Finmeccanica), Kim Cameron (Microsoft), William Dutton (Oxford Internet Institute), Anja Feldmann (Deutsche Telekom), Laila Gide (Thales), Carlos Jimenez (Secuware), Willem Jonker (Philips), Mika Lauhde (Nokia), Sachar Paulus (U. Brandenburg, ISSECO), Reinhard Posch (CIO GOV. Austria, TU Graz, A-SIT), Bart Preneel (KU Leuven), Kai Rannenberg (U. Frankfurt, CEPIS), Jacques Seneca (Gemalto); Observer: Peter Hustinx (Observer)Support: Willie Donnelly (WIT), Keith Howker (WIT), Sathya Rao (Telscom), Michel Riguidel (ENST), Neeraj Suri (U. Darmstadt) Jacques Bus, Thomas Skordas, Dirk van Rooy (EC)
  • 64. RISEPTIS Mission and Objectives Mission: develop a European vision on research and policy for trustworthiness in the future Information Society Policy http://www.think-trust.eu/riseptis.html Research Personalised Services Future Internet Trustworthiness Input to: Two sides: “User Centricity”: From Principles to Action!
  • 65.
  • 66.
  • 67.
  • 68. Recommendation 2: The EC should support concrete initiatives that bring together technology, policy, legal and social-economic actors for the development of a trustworthy Information Society. Trust and Trustworthiness is the basis for economic and social transaction It will facilitate economic growth and a stable society Transpose old social values into digital space, by building platforms and tools to help citizens, enterprises and public organisations to measure trust, control assets and data Partnership for “Trust in Digital Life”initiated by Gemalto, Microsoft, Nokiaand Philips
  • 69. Recommendation 3: The EC, together with the Member States and industrial stakeholders, must give high priority to the development of a common EU framework for identity and authentication management Federative, based on MS’s eID systems Compliant with legal frameworkon data protection and privacy Based on “Laws of Privacy”(user control, minimal disclosureconstraint use, justifiable parties, …) Facilitating full spectrum: public admin, banking with strong authentication simple web activities in anonymity
  • 70. Recommendation 4: The EC should work towards the further development of the EU data protection and privacy legal frameworks as part of an overall consistent ecosystem of law and technology Data breach notification extended Definition of personal data Strengthen accountability & transparency tools Consider consumer & liability laws Part of an overall policy that should be closely interlinked with technology progress Continuity, usability, trustworthiness and user-centric privacy protection are essential
  • 71. Recommendation 5: The EC together with industrial and public stakeholders should develop large-scale actions towards building a trustworthy Information Society Europe has: long-established social trust, scientific and technology capacities well-developed industrial and service structures Large-scale projects are needed to take advantage of these strengths Develop a techno-legal ecosystem for trust, security and privacy, that is amenable globally
  • 72. Recommendation 6: The EC should recognise that, in order to be effective, it should address the global dimension and foster engagement in international discussions Global Open Standards Federated frameworks forinteroperability (travel and ID) Global Law Enforcement in theInternet Consumer protection for use of global e-services Privacy and data protection in global data exchange With respect for local cultures
  • 73. Trustworthiness An Interdisciplinary Approach Internet/Web Engineering SW Systems Networks Critical Infrastuctures Citizens Society Regulation Multi-disciplinary! Trustworthiness andWeb Science
  • 74.
  • 78.
  • 81.
  • 85.
  • 86. Macro and Micro economics
  • 88.
  • 89.
  • 92.
  • 94. Public engage vs indifferent
  • 95.
  • 97. Human Information Processing
  • 98.
  • 101. New trust matrix: NGOs
  • 103.
  • 105.
  • 107. Single issue moral panics
  • 109.
  • 110. Theory of groups
  • 112.
  • 115.
  • 117.
  • 118. How to understand trust in the age of the Web?
  • 119. How does trust influence activity in the Digital Economy and e-Gov?
  • 120. Balance between social and technical solutions to these problems?
  • 121. The role of security and privacyPhoto Credit Yuri Arcurs
  • 122. 42 Trust 101 X trusts Y Meaningless: trust can only be understood in the context of trustworthiness Trustworthiness is a property of Y Y is trustworthy = she represents her intentions and motivations accurately Trust is an attitude of X X trusts Y = X believes that Y is trustworthy Trust is a 3-way relation – includes a context X trusts Y to do P
  • 123. 43 The Disconnect X benefits from Y being trustworthy BUT only controls his trust Y benefits from X’s trust BUT only controls her trustworthiness Fundamental, ineradicable uncertainties of cooperative behaviour
  • 124. 44 The Essential Problem of Trust NOT: How can we increase trust? BUT: How can we causally connect trust and trustworthiness so that we trust someone if and only if they are trustworthy?
  • 125. 45 Costs & Benefits of Trust
  • 126. 46 3 Sources of Uncertainty Y sends signals of her trustworthiness Are the signals accurate? Is Y gaming the signal system? Period of time between X investing resources and Y delivering performance X cannot act until Y is proven to have defected Possibility of X applying sanctions to Y Will sanctions be effective? Can X apply them to Y? All these three exacerbated by the Web Connected world by jvwarehouse on Photobucket
  • 127. 47 Signalling on the Web Dramatic reduction in bandwidth compared to offline transactions New conventions, not widely understood Trust distributed across many types of agent Human Software agent Website Organisation Distributed coalition Knowledge source Protocol Infrastructure Image technexus.com
  • 128. 48 Time on the Web Digital information can be copied or transferred at speed of light E-crime is instantaneous Reputation information is backward-facing Provides no certainty about future behaviour World At Work by Theo Deutinger
  • 129. 49 Sanctions on the Web Uncertain identity Uncertain jurisdiction Fewer repeat transactions More one-shot interactions
  • 130. Content on the Web Provenance – what, who, when and where Much valuable content is authorless What is the role of government public data and what is its value? 50 Web Science research issue: Does open public data increase trust?
  • 131. Online Institutions Traditional Solutions Physical Institutions Reputation management Note: Solutions can only be partial Decentralised Web makes institutions hard to set up Problems of enforcement Online institutions also suffer from problems of jurisdiction, low bandwidth (compared to offline) Systemic risk Usability issues (e.g. PKI) 51 Web Science research issue: how to design institutions for certifying trustworthiness and promoting trust
  • 132. 52 Online Reputation Assembly of historical data How to stop changes of identity How to interpret ratings Is the reputation for the buyer’s convenience? He uses historical data to estimate future trustworthiness Uncertain Is it for the seller’s convenience? She wants to preserve her reputation Only works if she wants to interact again in the future Web Science research issue: how best to represent and manage reputation, and understand its significance for buyer and seller
  • 133. 53 The Dark Side Not all trust is good Criminal fraternity have low-risk solutions to trust problem Auction sites for selling identities, credit cards etc Fast assembly of short-term criminal coalitions Web Science research issue: how can we disrupt trust (increase mistrust) in degenerate systems
  • 134. 54 Which Way Round? Does trustworthiness cause trust? Y proves her trustworthiness via certificates, behaviour, qualifications etc Weber Does trust cause trustworthiness? X trusts Y and accepts her into his moral community Y learns trustworthy behaviour Durkheim Web Science research issue: understand the causal direction of the relation
  • 135. 55 Changes in Attitude early Web: trust => trustworthiness Assumption of good faith Knowledge sharing tool middle Web: trustworthiness => trust E-commerce Security/identity infrastructures Current Web: trust <=> trustworthiness Elements of both Social networking Generational issues
  • 136. 56 Role of Web Science Clearly a problem with social and technological aspects How does offline behaviour transfer to the Web? How do we cope with the lowered information bandwidth? What new forms of behaviour have arrived? How can infrastructure be designed? Usability Effectiveness
  • 137.
  • 138. develop the framework and institutions needed to govern interactions in the digital ecology
  • 139. understand the balance role of the social and the technicalImage courtesy IET
  • 140. Trusta Web Science Perspective Understanding trust in the age of the Web is about Technology Sociology Psychology Economics Law It is about Web Science
  • 141. Technology evolutions New generations of threats to trust as well ! Fiber optics : High data-rate & Massive (flows, data, services) Radio : Pervasive : Ubiquity => cooperation Software : Diversity => Complex, heterogeneous Linked Data / Semantic Search Peer to Peer / Cloud 59
  • 142. Governance, Management issues Trust Management Designing security policies and process -- Identity Management (Multiple identities?) Data Archive : auditability, signature of contracts Communication: security of exchanges Software Threats and Vulnerability Management Monitoring activities and events Benchmarking Supervision, observation, Recording :Measuring ! 60
  • 143.
  • 144. The Semantic web and beyond
  • 145. The Internet /Web of things
  • 146. Trustworthiness as a prerequisite and driver
  • 147. Social –Economic- Legal – Technical Issues all bound up[www.aquarium-berlin.de]

Notes de l'éditeur

  1. There is really a fourth aspect – it is the nature of the content of the trust transaction – if it is a product or process, material or processSome reference to nature of content in the trust relationship is needed and this allows discussion of open gov public data
  2. The image is from the eBay reputation system
  3. I think we have a mixed regime now – the bi conditional is the ideal future architecture but generally at the moment it holds one way or the other over particular transactions