92,655 research outputs found
Food supply chain stakeholders' perspectives on sharing information to detect and prevent food integrity issues
One of the biggest challenges facing the food industry is assuring food integrity. Dealing with complex food integrity issues requires a multi-dimensional approach. Preventive actions and early reactive responses are key for the food supply chain. Information sharing could facilitate the detection and prevention of food integrity issues. This study investigates attitudes towards a food integrity information sharing system (FI-ISS) among stakeholders in the European food supply chain. Insights into stakeholders' interest in participating and their conditions for joining an FI-ISS are assessed. The stakeholder consultation consisted of three rounds. During the first round, a total of 143 food industry stakeholders-covering all major food sectors susceptible to food integrity issues-participated in an online quantitative survey between November 2017 and February 2018. The second round, an online qualitative feedback survey in which the findings were presented, received feedback from 61 stakeholders from the food industry, food safety authorities and the science community. Finally, 37 stakeholders discussed the results in further detail during an interactive workshop in May 2018. Three distinct groups of industry stakeholders were identified based on reported frequency of occurrence and likelihood of detecting food integrity issues. Food industry stakeholders strongly support the concept of an FI-ISS, with an attitude score of 4.49 (standard deviation (S. D.) = 0.57) on a 5-point scale, and their willingness to participate is accordingly high (81%). Consensus exists regarding the advantages an FI-ISS can yield towards detection and prevention. A stakeholder's perception of the advantages was identified as a predictor of their intention to join an FI-ISS, while their perception of the disadvantages and the perceived risk of food integrity issues were not. Medium-sized companies perceive the current detection of food integrity issues as less likely compared to smaller and large companies. Interestingly, medium-sized companies also have lower intentions to join an FI-ISS. Four key success factors for an FI-ISS are defined, more specifically with regards to (1) the actors to be involved in a system, (2) the information to be shared, (3) the third party to manage the FI-ISS and (4) the role of food safety authorities. Reactions diverged concerning the required level of transparency, the type of data that stakeholders might be willing to share in an FI-ISS and the role authorities can have within an FI-ISS
Trust beyond reputation: A computational trust model based on stereotypes
Models of computational trust support users in taking decisions. They are
commonly used to guide users' judgements in online auction sites; or to
determine quality of contributions in Web 2.0 sites. However, most existing
systems require historical information about the past behavior of the specific
agent being judged. In contrast, in real life, to anticipate and to predict a
stranger's actions in absence of the knowledge of such behavioral history, we
often use our "instinct"- essentially stereotypes developed from our past
interactions with other "similar" persons. In this paper, we propose
StereoTrust, a computational trust model inspired by stereotypes as used in
real-life. A stereotype contains certain features of agents and an expected
outcome of the transaction. When facing a stranger, an agent derives its trust
by aggregating stereotypes matching the stranger's profile. Since stereotypes
are formed locally, recommendations stem from the trustor's own personal
experiences and perspective. Historical behavioral information, when available,
can be used to refine the analysis. According to our experiments using
Epinions.com dataset, StereoTrust compares favorably with existing trust models
that use different kinds of information and more complete historical
information
The state-of-the-art in personalized recommender systems for social networking
With the explosion of Web 2.0 application such as blogs, social and professional networks, and various other types of social media, the rich online information and various new sources of knowledge flood users and hence pose a great challenge in terms of information overload. It is critical to use intelligent agent software systems to assist users in finding the right information from an abundance of Web data. Recommender systems can help users deal with information overload problem efficiently by suggesting items (e.g., information and products) that match users’ personal interests. The recommender technology has been successfully employed in many applications such as recommending films, music, books, etc. The purpose of this report is to give an overview of existing technologies for building personalized recommender systems in social networking environment, to propose a research direction for addressing user profiling and cold start problems by exploiting user-generated content newly available in Web 2.0
Australian commercial-critical infrastructure management protection
Secure management of Australia\u27s commercial critical infrastructure presents ongoing challenges to owners and the government. Although managed via a high-level information sharing collaboration of government and business, critical infrastructure protection is further complicated by the lack of a lower-level scalable model exhibiting its various levels, sectors and sub-sectors. This research builds on the work of Marasea (2003) to establish a descriptive critical infrastructure model and also considers the influence and proposed modelling of critical infrastructure dependency inter-relationships.<br /
TRIDEnT: Building Decentralized Incentives for Collaborative Security
Sophisticated mass attacks, especially when exploiting zero-day
vulnerabilities, have the potential to cause destructive damage to
organizations and critical infrastructure. To timely detect and contain such
attacks, collaboration among the defenders is critical. By correlating
real-time detection information (alerts) from multiple sources (collaborative
intrusion detection), defenders can detect attacks and take the appropriate
defensive measures in time. However, although the technical tools to facilitate
collaboration exist, real-world adoption of such collaborative security
mechanisms is still underwhelming. This is largely due to a lack of trust and
participation incentives for companies and organizations. This paper proposes
TRIDEnT, a novel collaborative platform that aims to enable and incentivize
parties to exchange network alert data, thus increasing their overall detection
capabilities. TRIDEnT allows parties that may be in a competitive relationship,
to selectively advertise, sell and acquire security alerts in the form of
(near) real-time peer-to-peer streams. To validate the basic principles behind
TRIDEnT, we present an intuitive game-theoretic model of alert sharing, that is
of independent interest, and show that collaboration is bound to take place
infinitely often. Furthermore, to demonstrate the feasibility of our approach,
we instantiate our design in a decentralized manner using Ethereum smart
contracts and provide a fully functional prototype.Comment: 28 page
- …