92,312 research outputs found

    Goal generation with relevant and trusted beliefs

    Get PDF
    A rational agent adopts (or changes) its goals when new information (beliefs) becomes available or its desires (e.g., tasks it is supposed to carry out) change. In conventional approaches to goal generation in which a goal is considered as a \u201cparticular\u201d desire, a goal is adopted if and only if all conditions leading to its generation are satisfied. It is then supposed that all beliefs are equally relevant and their sources completely trusted. However, that is not a realistic setting. In fact, depending on the agent's trust in the source of a piece of information, an agent may decide how strongly it takes into consideration such piece of information in goal generation. On the other hand, not all beliefs are equally relevant to the adoption of a given goal, and a given belief may not be equally relevant to the adoption of different goals. We propose an approach which takes into account both the relevance of beliefs and the trust degree of the source from which the corresponding piece of information comes, in desire/goal generation. Two algorithms for updating the mental state of an agent in this new setting and three ways for comparing the resulting fuzzy set of desires have been given. Finally, two fundamental postulates any rational goal election function should obey have been stated

    An Expectancy-Value Approach to Determinants of Trust

    Get PDF
    An Expectancy-Value model was used to test various attributes of trustworthiness, as determinants of people’s trust in 5 Swedish organizations (public and commercial). Trust was conceptualized as an attitude, dependent on respondents’ beliefs about and evaluations of the organization with respect to these attributes. A survey was sent out to a sample representative of the Swedish population (response rate: 55.5%; N = 347). It was found that the Expectancy-Value Model was powerful in explaining trust in 3 organizations. However, it was also found that a model including only values as predictors of trust was more powerful in explaining trust in 2 organizations: the Swedish Government and advertising firms. The phenomenon of double denial (Sjöberg & Montgomery, 1999) was very strong, which could be an important explanation of these findings. It is discussed whether double denial could be caused by trust ratings based on ideologies (e.g., political or general anti-business) subscribed to and emotional reactions, rather than analytical evaluations of an organization.trust; attitude; organizations; expectancy-value

    Users' trust in information resources in the Web environment: a status report

    Get PDF
    This study has three aims; to provide an overview of the ways in which trust is either assessed or asserted in relation to the use and provision of resources in the Web environment for research and learning; to assess what solutions might be worth further investigation and whether establishing ways to assert trust in academic information resources could assist the development of information literacy; to help increase understanding of how perceptions of trust influence the behaviour of information users

    The Extended Mind and Network-Enabled Cognition

    No full text
    In thinking about the transformative potential of network technologies with respect to human cognition, it is common to see network resources as playing a largely assistive or augmentative role. In this paper we propose a somewhat more radical vision. We suggest that the informational and technological elements of a network system can, at times, constitute part of the material supervenience base for a human agent’s mental states and processes. This thesis (called the thesis of network-enabled cognition) draws its inspiration from the notion of the extended mind that has been propounded in the philosophical and cognitive science literature. Our basic claim is that network systems can do more than just augment cognition; they can also constitute part of the physical machinery that makes mind and cognition mechanistically possible. In evaluating this hypothesis, we identify a number of issues that seem to undermine the extent to which contemporary network systems, most notably the World Wide Web, can legitimately feature as part of an environmentally-extended cognitive system. Specific problems include the reliability and resilience of network-enabled devices, the accessibility of online information content, and the extent to which network-derived information is treated in the same way as information retrieved from biological memory. We argue that these apparent shortfalls do not necessarily merit the wholesale rejection of the network-enabled cognition thesis; rather, they point to the limits of the current state-of-the-art and identify the targets of many ongoing research initiatives in the network and information sciences. In addition to highlighting the importance of current research and technology development efforts, the thesis of network-enabled cognition also suggests a number of areas for future research. These include the formation and maintenance of online trust relationships, the subjective assessment of information credibility and the long-term impact of network access on human psychological and cognitive functioning. The nascent discipline of web science is, we suggest, suitably placed to begin an exploration of these issues

    Validation of Ultrahigh Dependability for Software-Based Systems

    Get PDF
    Modern society depends on computers for a number of critical tasks in which failure can have very high costs. As a consequence, high levels of dependability (reliability, safety, etc.) are required from such computers, including their software. Whenever a quantitative approach to risk is adopted, these requirements must be stated in quantitative terms, and a rigorous demonstration of their being attained is necessary. For software used in the most critical roles, such demonstrations are not usually supplied. The fact is that the dependability requirements often lie near the limit of the current state of the art, or beyond, in terms not only of the ability to satisfy them, but also, and more often, of the ability to demonstrate that they are satisfied in the individual operational products (validation). We discuss reasons why such demonstrations cannot usually be provided with the means available: reliability growth models, testing with stable reliability, structural dependability modelling, as well as more informal arguments based on good engineering practice. We state some rigorous arguments about the limits of what can be validated with each of such means. Combining evidence from these different sources would seem to raise the levels that can be validated; yet this improvement is not such as to solve the problem. It appears that engineering practice must take into account the fact that no solution exists, at present, for the validation of ultra-high dependability in systems relying on complex software

    Agent oriented AmI engineering

    Get PDF

    On Cognitive Preferences and the Plausibility of Rule-based Models

    Get PDF
    It is conventional wisdom in machine learning and data mining that logical models such as rule sets are more interpretable than other models, and that among such rule-based models, simpler models are more interpretable than more complex ones. In this position paper, we question this latter assumption by focusing on one particular aspect of interpretability, namely the plausibility of models. Roughly speaking, we equate the plausibility of a model with the likeliness that a user accepts it as an explanation for a prediction. In particular, we argue that, all other things being equal, longer explanations may be more convincing than shorter ones, and that the predominant bias for shorter models, which is typically necessary for learning powerful discriminative models, may not be suitable when it comes to user acceptance of the learned models. To that end, we first recapitulate evidence for and against this postulate, and then report the results of an evaluation in a crowd-sourcing study based on about 3.000 judgments. The results do not reveal a strong preference for simple rules, whereas we can observe a weak preference for longer rules in some domains. We then relate these results to well-known cognitive biases such as the conjunction fallacy, the representative heuristic, or the recogition heuristic, and investigate their relation to rule length and plausibility.Comment: V4: Another rewrite of section on interpretability to clarify focus on plausibility and relation to interpretability, comprehensibility, and justifiabilit

    Secure data sharing and processing in heterogeneous clouds

    Get PDF
    The extensive cloud adoption among the European Public Sector Players empowered them to own and operate a range of cloud infrastructures. These deployments vary both in the size and capabilities, as well as in the range of employed technologies and processes. The public sector, however, lacks the necessary technology to enable effective, interoperable and secure integration of a multitude of its computing clouds and services. In this work we focus on the federation of private clouds and the approaches that enable secure data sharing and processing among the collaborating infrastructures and services of public entities. We investigate the aspects of access control, data and security policy languages, as well as cryptographic approaches that enable fine-grained security and data processing in semi-trusted environments. We identify the main challenges and frame the future work that serve as an enabler of interoperability among heterogeneous infrastructures and services. Our goal is to enable both security and legal conformance as well as to facilitate transparency, privacy and effectivity of private cloud federations for the public sector needs. © 2015 The Authors

    College Students' Credibility Judgments in the Information-Seeking Process

    Get PDF
    Part of the Volume on Digital Media, Youth, and CredibilityThis chapter presents an in-depth exploration of how college students identify credible information in everyday information-seeking tasks. The authors find that credibility assessment is an over-time process rather than a discrete evaluative event. Moreover, the context in which credibility assessment occurs is crucial to understand because it affects both the level of effort as well as the strategies that people use to evaluate credibility. College students indicate that although credibility was an important consideration during information seeking, they often compromised information credibility for speed and convenience, especially when the information sought was less consequential
    • …
    corecore