420 research outputs found

    Trust and reputation policy-based mechanisms for self-protection in autonomic communications

    Get PDF
    Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not sufficiently robust to protect each management system and/or subsystem from web-based intrusions, malware, and hacking attacks. This paper presents research challenges in autonomic management to provide self-protection mechanisms and tools by using trust and reputation concepts based on policy-based management to decentralize management decisions. This work also uses user-based reputation mechanisms to help enforce trust management in pervasive and communications services. The scope of this research is founded in social models, where the application of trust and reputation applied in communication systems helps detect potential users as well as hackers attempting to corrupt management operations and services. These so-called “cheating services” act as “attacks”, altering the performance and the security in communication systems by consumption of computing or network resources unnecessarily

    Complex ecologies of trust in data practices and data-driven systems

    Get PDF
    Trust in data practices and data-driven systems is widely seen as both important and elusive. A data trust deficit has been identified, to which proposed solutions are often localised or individualised, focusing either on what institutions can do to increase user trust in their data practices or on data management models that empower the individual user. Scholarship on trust often focuses on typologies of trust. This paper shifts the emphasis to those doing the trusting, by presenting findings from empirical research which explored user perspectives on the data practices of the BBC. These findings challenge the assumption that localised or individualised solutions can be effective. They also suggest that conceptualisations of trust in data practices need to account for the complex range of factors which come into play in relation to trust in data and so move beyond the production of typologies. In this paper, we propose the concept of ‘complex ecologies of trust’ as a way of addressing all of these issues

    Binary Models for Marginal Independence

    Full text link
    Log-linear models are a classical tool for the analysis of contingency tables. In particular, the subclass of graphical log-linear models provides a general framework for modelling conditional independences. However, with the exception of special structures, marginal independence hypotheses cannot be accommodated by these traditional models. Focusing on binary variables, we present a model class that provides a framework for modelling marginal independences in contingency tables. The approach taken is graphical and draws on analogies to multivariate Gaussian models for marginal independence. For the graphical model representation we use bi-directed graphs, which are in the tradition of path diagrams. We show how the models can be parameterized in a simple fashion, and how maximum likelihood estimation can be performed using a version of the Iterated Conditional Fitting algorithm. Finally we consider combining these models with symmetry restrictions

    Trauma as counter-revolutionary colonisation: narratives from (post)revolutionary Egypt

    Get PDF
    We argue that multiple levels of trauma were present in Egypt before, during and after the 2011 revolution. Individual, social and political trauma constitute a triangle of traumatisation which was strategically employed by the Egyptian counter-revolutionary forces – primarily the army and the leadership of the Muslim Brotherhood – to maintain their political and economic power over and above the social, economic and political interests of others. Through the destruction of physical bodies, the fragmentation and polarisation of social relations and the violent closure of the newly emerged political public sphere, these actors actively repressed the potential for creative and revolutionary transformation. To better understand this multi-layered notion of trauma, we turn to Habermas’ ‘colonisation of the lifeworld’ thesis which offers a critical lens through which to examine the wider political and economic structures and context in which trauma occurred as well as its effects on the personal, social and political realms. In doing so, we develop a novel conception of trauma that acknowledges individual, social and political dimensions. We apply this conceptual framing to empirical narratives of trauma in Egypt’s pre- and post-revolutionary phases, thus both developing a non-Western application of Habermas’ framework and revealing ethnographic accounts of the revolution by activists in Cairo

    A calculus for distrust and mistrust

    Get PDF
    Properties of trust are becoming widely studied in several applications within the computational domain. On the contrary, negative trust attribution is less well-defined and related issues are yet to be approached and resolved. We present a natural deduction calculus for trust protocols and its negative forms, distrust and mistrust. The calculus deals efficiently with forms of trust transitivity and negative trust multiplication and we briefly illustrate some possible applications

    Data trustworthiness and user reputation as indicators of VGI quality

    Get PDF
    ABSTRACTVolunteered geographic information (VGI) has entered a phase where there are both a substantial amount of crowdsourced information available and a big interest in using it by organizations. But the issue of deciding the quality of VGI without resorting to a comparison with authoritative data remains an open challenge. This article first formulates the problem of quality assessment of VGI data. Then presents a model to measure trustworthiness of information and reputation of contributors by analyzing geometric, qualitative, and semantic aspects of edits over time. An implementation of the model is running on a small data-set for a preliminary empirical validation. The results indicate that the computed trustworthiness provides a valid approximation of VGI quality

    Linking the subcultures of physics: Virtual empiricism and the bonding role of trust

    Get PDF
    This article draws on empirical material concerning the communication and use of knowledge in experimental physics and their relations to the culture of theoretical physics. The role that trust plays in these interactions is used to create a model of social distance between interacting theoretical and experimental cultures. This article thus seeks to reintroduce trust as a fundamental element in answering the problem of disunity in the sociology of knowledge

    The Cold Peace: Russo-Western Relations as a Mimetic Cold War

    Get PDF
    In 1989–1991 the geo-ideological contestation between two blocs was swept away, together with the ideology of civil war and its concomitant Cold War played out on the larger stage. Paradoxically, while the domestic sources of Cold War confrontation have been transcended, its external manifestations remain in the form of a ‘legacy’ geopolitical contest between the dominant hegemonic power (the United States) and a number of potential rising great powers, of which Russia is one. The post-revolutionary era is thus one of a ‘cold peace’. A cold peace is a mimetic cold war. In other words, while a cold war accepts the logic of conflict in the international system and between certain protagonists in particular, a cold peace reproduces the behavioural patterns of a cold war but suppresses acceptance of the logic of behaviour. A cold peace is accompanied by a singular stress on notions of victimhood for some and undigested and bitter victory for others. The perceived victim status of one set of actors provides the seedbed for renewed conflict, while the ‘victory’ of the others cannot be consolidated in some sort of relatively unchallenged post-conflict order. The ‘universalism’ of the victors is now challenged by Russia's neo-revisionist policy, including not so much the defence of Westphalian notions of sovereignty but the espousal of an international system with room for multiple systems (the Schmittean pluriverse)

    Trust in Food

    Get PDF
    Trust is important in the food sector. This is primarily because households entrust some of the tasks related to food preparation to food processors. The public is concerned about pesticides, food additives, preservatives, and processed foods that may harbor unwanted chemicals or additives. After numerous food scandals, consumers expect food processing industries and retailers to take responsibility for food safety. Meanwhile, the food industry focuses on profit growth and costs reduction to achieve higher production efficiency and competitiveness. It means that they introduce innovations, such as new production methods, processing techniques, and additives. Consumers have to delegate the responsibility for ensuring food safety to food producers, retailers, and regulatory authorities who ensure that the foods are safe, healthy, and pose no risks. For consumers, trusting these actors can reduce feelings of uncertainty. It is helpful for companies to be responsible for their activities through transparency and traceability. In turn, the food industry tries to gain consumers’ trust by providing objective information, such as ranked brands or labels on food packages
    • 

    corecore