92,655 research outputs found

    Food supply chain stakeholders' perspectives on sharing information to detect and prevent food integrity issues

    Get PDF
    One of the biggest challenges facing the food industry is assuring food integrity. Dealing with complex food integrity issues requires a multi-dimensional approach. Preventive actions and early reactive responses are key for the food supply chain. Information sharing could facilitate the detection and prevention of food integrity issues. This study investigates attitudes towards a food integrity information sharing system (FI-ISS) among stakeholders in the European food supply chain. Insights into stakeholders' interest in participating and their conditions for joining an FI-ISS are assessed. The stakeholder consultation consisted of three rounds. During the first round, a total of 143 food industry stakeholders-covering all major food sectors susceptible to food integrity issues-participated in an online quantitative survey between November 2017 and February 2018. The second round, an online qualitative feedback survey in which the findings were presented, received feedback from 61 stakeholders from the food industry, food safety authorities and the science community. Finally, 37 stakeholders discussed the results in further detail during an interactive workshop in May 2018. Three distinct groups of industry stakeholders were identified based on reported frequency of occurrence and likelihood of detecting food integrity issues. Food industry stakeholders strongly support the concept of an FI-ISS, with an attitude score of 4.49 (standard deviation (S. D.) = 0.57) on a 5-point scale, and their willingness to participate is accordingly high (81%). Consensus exists regarding the advantages an FI-ISS can yield towards detection and prevention. A stakeholder's perception of the advantages was identified as a predictor of their intention to join an FI-ISS, while their perception of the disadvantages and the perceived risk of food integrity issues were not. Medium-sized companies perceive the current detection of food integrity issues as less likely compared to smaller and large companies. Interestingly, medium-sized companies also have lower intentions to join an FI-ISS. Four key success factors for an FI-ISS are defined, more specifically with regards to (1) the actors to be involved in a system, (2) the information to be shared, (3) the third party to manage the FI-ISS and (4) the role of food safety authorities. Reactions diverged concerning the required level of transparency, the type of data that stakeholders might be willing to share in an FI-ISS and the role authorities can have within an FI-ISS

    Trust beyond reputation: A computational trust model based on stereotypes

    Full text link
    Models of computational trust support users in taking decisions. They are commonly used to guide users' judgements in online auction sites; or to determine quality of contributions in Web 2.0 sites. However, most existing systems require historical information about the past behavior of the specific agent being judged. In contrast, in real life, to anticipate and to predict a stranger's actions in absence of the knowledge of such behavioral history, we often use our "instinct"- essentially stereotypes developed from our past interactions with other "similar" persons. In this paper, we propose StereoTrust, a computational trust model inspired by stereotypes as used in real-life. A stereotype contains certain features of agents and an expected outcome of the transaction. When facing a stranger, an agent derives its trust by aggregating stereotypes matching the stranger's profile. Since stereotypes are formed locally, recommendations stem from the trustor's own personal experiences and perspective. Historical behavioral information, when available, can be used to refine the analysis. According to our experiments using Epinions.com dataset, StereoTrust compares favorably with existing trust models that use different kinds of information and more complete historical information

    The state-of-the-art in personalized recommender systems for social networking

    Get PDF
    With the explosion of Web 2.0 application such as blogs, social and professional networks, and various other types of social media, the rich online information and various new sources of knowledge flood users and hence pose a great challenge in terms of information overload. It is critical to use intelligent agent software systems to assist users in finding the right information from an abundance of Web data. Recommender systems can help users deal with information overload problem efficiently by suggesting items (e.g., information and products) that match users’ personal interests. The recommender technology has been successfully employed in many applications such as recommending films, music, books, etc. The purpose of this report is to give an overview of existing technologies for building personalized recommender systems in social networking environment, to propose a research direction for addressing user profiling and cold start problems by exploiting user-generated content newly available in Web 2.0

    Australian commercial-critical infrastructure management protection

    Full text link
    Secure management of Australia\u27s commercial critical infrastructure presents ongoing challenges to owners and the government. Although managed via a high-level information sharing collaboration of government and business, critical infrastructure protection is further complicated by the lack of a lower-level scalable model exhibiting its various levels, sectors and sub-sectors. This research builds on the work of Marasea (2003) to establish a descriptive critical infrastructure model and also considers the influence and proposed modelling of critical infrastructure dependency inter-relationships.<br /

    TRIDEnT: Building Decentralized Incentives for Collaborative Security

    Full text link
    Sophisticated mass attacks, especially when exploiting zero-day vulnerabilities, have the potential to cause destructive damage to organizations and critical infrastructure. To timely detect and contain such attacks, collaboration among the defenders is critical. By correlating real-time detection information (alerts) from multiple sources (collaborative intrusion detection), defenders can detect attacks and take the appropriate defensive measures in time. However, although the technical tools to facilitate collaboration exist, real-world adoption of such collaborative security mechanisms is still underwhelming. This is largely due to a lack of trust and participation incentives for companies and organizations. This paper proposes TRIDEnT, a novel collaborative platform that aims to enable and incentivize parties to exchange network alert data, thus increasing their overall detection capabilities. TRIDEnT allows parties that may be in a competitive relationship, to selectively advertise, sell and acquire security alerts in the form of (near) real-time peer-to-peer streams. To validate the basic principles behind TRIDEnT, we present an intuitive game-theoretic model of alert sharing, that is of independent interest, and show that collaboration is bound to take place infinitely often. Furthermore, to demonstrate the feasibility of our approach, we instantiate our design in a decentralized manner using Ethereum smart contracts and provide a fully functional prototype.Comment: 28 page
    corecore