14,299 research outputs found
The mechanics of trust: a framework for research and design
With an increasing number of technologies supporting transactions over distance and replacing traditional forms of interaction, designing for trust in mediated interactions has become a key concern for researchers in human computer interaction (HCI). While much of this research focuses on increasing usersâ trust, we present a framework that shifts the perspective towards factors that support trustworthy behavior. In a second step, we analyze how the presence of these factors can be signalled. We argue that it is essential to take a systemic perspective for enabling well-placed trust and trustworthy behavior in the long term. For our analysis we draw on relevant research from sociology, economics, and psychology, as well as HCI. We identify contextual properties (motivation based on temporal, social, and institutional embeddedness) and the actor's intrinsic properties (ability, and motivation based on internalized norms and benevolence) that form the basis of trustworthy behavior. Our analysis provides a frame of reference for the design of studies on trust in technology-mediated interactions, as well as a guide for identifying trust requirements in design processes. We demonstrate the application of the framework in three scenarios: call centre interactions, B2C e-commerce, and voice-enabled on-line gaming
Modeling and estimation of multi-source clustering in crime and security data
While the presence of clustering in crime and security event data is well
established, the mechanism(s) by which clustering arises is not fully
understood. Both contagion models and history independent correlation models
are applied, but not simultaneously. In an attempt to disentangle contagion
from other types of correlation, we consider a Hawkes process with background
rate driven by a log Gaussian Cox process. Our inference methodology is an
efficient Metropolis adjusted Langevin algorithm for filtering of the intensity
and estimation of the model parameters. We apply the methodology to property
and violent crime data from Chicago, terrorist attack data from Northern
Ireland and Israel, and civilian casualty data from Iraq. For each data set we
quantify the uncertainty in the levels of contagion vs. history independent
correlation.Comment: Published in at http://dx.doi.org/10.1214/13-AOAS647 the Annals of
Applied Statistics (http://www.imstat.org/aoas/) by the Institute of
Mathematical Statistics (http://www.imstat.org
Mathematics Is Biology's Next Microscope, Only Better; Biology Is Mathematics' Next Physics, Only Better
Joel Cohen offers a historical and prospective analysis of the relationship between mathematics and biolog
Knowing Your Population: Privacy-Sensitive Mining of Massive Data
Location and mobility patterns of individuals are important to environmental
planning, societal resilience, public health, and a host of commercial
applications. Mining telecommunication traffic and transactions data for such
purposes is controversial, in particular raising issues of privacy. However,
our hypothesis is that privacy-sensitive uses are possible and often beneficial
enough to warrant considerable research and development efforts. Our work
contends that peoples behavior can yield patterns of both significant
commercial, and research, value. For such purposes, methods and algorithms for
mining telecommunication data to extract commonly used routes and locations,
articulated through time-geographical constructs, are described in a case study
within the area of transportation planning and analysis. From the outset, these
were designed to balance the privacy of subscribers and the added value of
mobility patterns derived from their mobile communication traffic and
transactions data. Our work directly contrasts the current, commonly held
notion that value can only be added to services by directly monitoring the
behavior of individuals, such as in current attempts at location-based
services. We position our work within relevant legal frameworks for privacy and
data protection, and show that our methods comply with such requirements and
also follow best-practice
- âŠ