1,337,761 research outputs found
Altruism and Gender in the Trust Game
This paper analyses gender differences in the trust game. Our experiment implements the triadic design proposed by Cox (2004) to discriminate between transfers resulting from trust or trustworthiness and transfers resulting from altruistic preferences. We observe that women exhibit a higher degree of altruism than men for both trust and trustworthiness but relatively more for trustworthiness. This result provides an explanation to the experimental finding that women reciprocate more than men.gender differences; trust; trustworthiness; altruism; gender pairing
A Classification Model for Sensing Human Trust in Machines Using EEG and GSR
Today, intelligent machines \emph{interact and collaborate} with humans in a
way that demands a greater level of trust between human and machine. A first
step towards building intelligent machines that are capable of building and
maintaining trust with humans is the design of a sensor that will enable
machines to estimate human trust level in real-time. In this paper, two
approaches for developing classifier-based empirical trust sensor models are
presented that specifically use electroencephalography (EEG) and galvanic skin
response (GSR) measurements. Human subject data collected from 45 participants
is used for feature extraction, feature selection, classifier training, and
model validation. The first approach considers a general set of
psychophysiological features across all participants as the input variables and
trains a classifier-based model for each participant, resulting in a trust
sensor model based on the general feature set (i.e., a "general trust sensor
model"). The second approach considers a customized feature set for each
individual and trains a classifier-based model using that feature set,
resulting in improved mean accuracy but at the expense of an increase in
training time. This work represents the first use of real-time
psychophysiological measurements for the development of a human trust sensor.
Implications of the work, in the context of trust management algorithm design
for intelligent machines, are also discussed.Comment: 20 page
Trusted operational scenarios - Trust building mechanisms and strategies for electronic marketplaces.
This document presents and describes the trusted operational scenarios, resulting from the research and work carried out in Seamless project. The report presents identified collaboration habits of small and medium enterprises with low e-skills, trust building mechanisms and issues as main enablers of online business relationships on the electronic marketplace, a questionnaire analysis of the level of trust acceptance and necessity of trust building mechanisms, a proposal for the development of different strategies for the different types of trust mechanisms and recommended actions for the SEAMLESS project or other B2B marketplaces.trust building mechanisms, trust, B2B networks, e-marketplaces
Simultaneous Inference of User Representations and Trust
Inferring trust relations between social media users is critical for a number
of applications wherein users seek credible information. The fact that
available trust relations are scarce and skewed makes trust prediction a
challenging task. To the best of our knowledge, this is the first work on
exploring representation learning for trust prediction. We propose an approach
that uses only a small amount of binary user-user trust relations to
simultaneously learn user embeddings and a model to predict trust between user
pairs. We empirically demonstrate that for trust prediction, our approach
outperforms classifier-based approaches which use state-of-the-art
representation learning methods like DeepWalk and LINE as features. We also
conduct experiments which use embeddings pre-trained with DeepWalk and LINE
each as an input to our model, resulting in further performance improvement.
Experiments with a dataset of 356K user pairs show that the proposed
method can obtain an high F-score of 92.65%.Comment: To appear in the proceedings of ASONAM'17. Please cite that versio
Effects of a Trust Mechanism on Complex Adaptive Supply Networks: An Agent-Based Social Simulation Study
This paper models a supply network as a complex adaptive system (CAS), in which firms or agents interact with one another and adapt themselves. And it applies agent-based social simulation (ABSS), a research method of simulating social systems under the CAS paradigm, to observe emergent outcomes. The main purposes of this paper are to consider a social factor, trust, in modeling the agents\' behavioral decision-makings and, through the simulation studies, to examine the intermediate self-organizing processes and the resulting macro-level system behaviors. The simulations results reveal symmetrical trust levels between two trading agents, based on which the degree of trust relationship in each pair of trading agents as well as the resulting collaboration patterns in the entire supply network emerge. Also, it is shown that agents\' decision-making behavior based on the trust relationship can contribute to the reduction in the variability of inventory levels. This result can be explained by the fact that mutual trust relationship based on the past experiences of trading diminishes an agent\'s uncertainties about the trustworthiness of its trading partners and thereby tends to stabilize its inventory levels.Complex Adaptive System, Agent-Based Social Simulation, Supply Network, Trust
Numerical recovery of material parameters in Euler-Bernoulli beam models
A fully Sinc-Galerkin method for recovering the spatially varying stiffness parameter in fourth-order time-dependence problems with fixed and cantilever boundary conditions is presented. The forward problems are discretized with a sinc basis in both the spatial and temporal domains. This yields an approximation solution which converges exponentially and is valid on the infinite time interval. When the forward methods are applied to parameter recovery problems, the resulting inverse problems are ill-posed. Tikhonov regularization is applied and the resulting minimization problems are solved via a quasi-Newton/trust region algorithm. The L-curve method is used to determine an appropriate value of the regularization parameter. Numerical results which highlight the method are given for problems with both fixed and cantilever boundary conditions
Recommended from our members
On the horns of a dilemma
Illegality, as a concept, covers a multitude of sins and the differences that arise and the decisions of the courts are based on the principle of public policy. Under this heading it is the author's intention to examine the resulting trust, through the transfer of property in furtherance of a fraud, and illegality
Multi-dimensional key generation of ICMetrics for cloud computing
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service. This paper explores an approach to assure trust and provenance in cloud based services via the generation of digital signatures using properties or features derived from their own construction and software behaviour. The resulting system removes the need for a server to store a private key in a typical Public/Private-Key Infrastructure for data sources. Rather, keys are generated at run-time by features obtained as service execution proceeds. In this paper we investigate several potential software features for suitability during the employment of a cloud service identification system. The generation of stable and unique digital identity from features in Cloud computing is challenging because of the unstable operation environments that implies the features employed are likely to vary under normal operating conditions. To address this, we introduce a multi-dimensional key generation technology which maps from multi-dimensional feature space directly to a key space. Subsequently, a smooth entropy algorithm is developed to evaluate the entropy of key space
- …
