420 research outputs found
Trust and reputation policy-based mechanisms for self-protection in autonomic communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not sufficiently robust to protect each management system and/or subsystem from web-based intrusions, malware, and hacking attacks. This paper presents research challenges in autonomic management to provide self-protection mechanisms and tools by using trust and reputation concepts based on policy-based management to decentralize management decisions. This work also uses user-based reputation mechanisms to help enforce trust management in pervasive and communications services. The scope of this research is founded in social models, where the application of trust and reputation applied in communication systems helps detect potential users as well as hackers attempting to corrupt management operations and services. These so-called âcheating servicesâ act as âattacksâ, altering the performance and the security in communication systems by consumption of computing or network resources unnecessarily
Complex ecologies of trust in data practices and data-driven systems
Trust in data practices and data-driven systems is widely seen as both important and elusive. A data trust deficit has been identified, to which proposed solutions are often localised or individualised, focusing either on what institutions can do to increase user trust in their data practices or on data management models that empower the individual user. Scholarship on trust often focuses on typologies of trust. This paper shifts the emphasis to those doing the trusting, by presenting findings from empirical research which explored user perspectives on the data practices of the BBC. These findings challenge the assumption that localised or individualised solutions can be effective. They also suggest that conceptualisations of trust in data practices need to account for the complex range of factors which come into play in relation to trust in data and so move beyond the production of typologies. In this paper, we propose the concept of âcomplex ecologies of trustâ as a way of addressing all of these issues
Binary Models for Marginal Independence
Log-linear models are a classical tool for the analysis of contingency
tables. In particular, the subclass of graphical log-linear models provides a
general framework for modelling conditional independences. However, with the
exception of special structures, marginal independence hypotheses cannot be
accommodated by these traditional models. Focusing on binary variables, we
present a model class that provides a framework for modelling marginal
independences in contingency tables. The approach taken is graphical and draws
on analogies to multivariate Gaussian models for marginal independence. For the
graphical model representation we use bi-directed graphs, which are in the
tradition of path diagrams. We show how the models can be parameterized in a
simple fashion, and how maximum likelihood estimation can be performed using a
version of the Iterated Conditional Fitting algorithm. Finally we consider
combining these models with symmetry restrictions
Trauma as counter-revolutionary colonisation: narratives from (post)revolutionary Egypt
We argue that multiple levels of trauma were present in Egypt before, during and after the 2011 revolution. Individual, social and political trauma constitute a triangle of traumatisation which was strategically employed by the Egyptian counter-revolutionary forces â primarily the army and the leadership of the Muslim Brotherhood â to maintain their political and economic power over and above the social, economic and political interests of others. Through the destruction of physical bodies, the fragmentation and polarisation of social relations and the violent closure of the newly emerged political public sphere, these actors actively repressed the potential for creative and revolutionary transformation. To better understand this multi-layered notion of trauma, we turn to Habermasâ âcolonisation of the lifeworldâ thesis which offers a critical lens through which to examine the wider political and economic structures and context in which trauma occurred as well as its effects on the personal, social and political realms. In doing so, we develop a novel conception of trauma that acknowledges individual, social and political dimensions. We apply this conceptual framing to empirical narratives of trauma in Egyptâs pre- and post-revolutionary phases, thus both developing a non-Western application of Habermasâ framework and revealing ethnographic accounts of the revolution by activists in Cairo
A calculus for distrust and mistrust
Properties of trust are becoming widely studied in several applications within the computational domain. On the contrary, negative trust attribution is less well-defined and related issues are yet to be approached and resolved. We present a natural deduction calculus for trust protocols and its negative forms, distrust and mistrust. The calculus deals efficiently with forms of trust transitivity and negative trust multiplication and we briefly illustrate some possible applications
Data trustworthiness and user reputation as indicators of VGI quality
ABSTRACTVolunteered geographic information (VGI) has entered a phase where there are both a substantial amount of crowdsourced information available and a big interest in using it by organizations. But the issue of deciding the quality of VGI without resorting to a comparison with authoritative data remains an open challenge. This article first formulates the problem of quality assessment of VGI data. Then presents a model to measure trustworthiness of information and reputation of contributors by analyzing geometric, qualitative, and semantic aspects of edits over time. An implementation of the model is running on a small data-set for a preliminary empirical validation. The results indicate that the computed trustworthiness provides a valid approximation of VGI quality
Linking the subcultures of physics: Virtual empiricism and the bonding role of trust
This article draws on empirical material concerning the communication and use of knowledge in experimental physics and their relations to the culture of theoretical physics. The role that trust plays in these interactions is used to create a model of social distance between interacting theoretical and experimental cultures. This article thus seeks to reintroduce trust as a fundamental element in answering the problem of disunity in the sociology of knowledge
The Cold Peace: Russo-Western Relations as a Mimetic Cold War
In 1989â1991 the geo-ideological contestation between two blocs was swept away, together with the ideology of civil war and its concomitant Cold War played out on the larger stage. Paradoxically, while the domestic sources of Cold War confrontation have been transcended, its external manifestations remain in the form of a âlegacyâ geopolitical contest between the dominant hegemonic power (the United States) and a number of potential rising great powers, of which Russia is one. The post-revolutionary era is thus one of a âcold peaceâ. A cold peace is a mimetic cold war. In other words, while a cold war accepts the logic of conflict in the international system and between certain protagonists in particular, a cold peace reproduces the behavioural patterns of a cold war but suppresses acceptance of the logic of behaviour. A cold peace is accompanied by a singular stress on notions of victimhood for some and undigested and bitter victory for others. The perceived victim status of one set of actors provides the seedbed for renewed conflict, while the âvictoryâ of the others cannot be consolidated in some sort of relatively unchallenged post-conflict order. The âuniversalismâ of the victors is now challenged by Russia's neo-revisionist policy, including not so much the defence of Westphalian notions of sovereignty but the espousal of an international system with room for multiple systems (the Schmittean pluriverse)
Trust in Food
Trust is important in the food sector. This is primarily because households entrust some of the tasks related to food preparation to food processors. The public is concerned about pesticides, food additives, preservatives, and processed foods that may harbor unwanted chemicals or additives. After numerous food scandals, consumers expect food processing industries and retailers to take responsibility for food safety. Meanwhile, the food industry focuses on profit growth and costs reduction to achieve higher production efficiency and competitiveness. It means that they introduce innovations, such as new production methods, processing techniques, and additives. Consumers have to delegate the responsibility for ensuring food safety to food producers, retailers, and regulatory authorities who ensure that the foods are safe, healthy, and pose no risks. For consumers, trusting these actors can reduce feelings of uncertainty. It is helpful for companies to be responsible for their activities through transparency and traceability. In turn, the food industry tries to gain consumersâ trust by providing objective information, such as ranked brands or labels on food packages
JOINT COMMITMENT, COERCION AND FREEDOM IN SCIENCE Conceptual Analysis and Case Studies
International audienceThis paper deals with the Ethics of group life in the sciences, if not directly with the policy of science that might evolve from it, and more precisely with the issue of democracy within scientific life
- âŠ