Automating Trust Evaluation for Ensuring Information Quality

نویسنده

  • Trung Dong Huynh
چکیده

Modern warfare’s situation awareness and operation planning requires analyzing a vast amount of information, ranging broadly from intelligence reports to data from autonomous sensors. Correctly assessing the credibility of such information in a timely manner is as crucial to decision making as being able to obtain the information in the first place. However, manual information quality assessment is time-consuming and laborious, especially considering the amount of information that modern automated knowledge solutions can deliver. In this paper, we present a novel trust framework called the Personalized Trust Framework (PTF), which can assist military analysts to automate their trust evaluation process, and, as a result, significantly lighten the burden of information quality assessment. In other words, it provides a mechanism for end users to capture their trust reasoning in order for it to be automated by computers. In particulars, a user can specify how he selects a trust model based on information about the subject whose trustworthiness he needs to evaluate and how that trust model is configured. This trust evaluation process is then automated by the PTF making use of the trust models that can be flexibly plugged into the PTF by the user. By so doing, the PTF enable users to reuse and to personalize existing trust models to suit their requirements without having to reprogram them. Finally, this paper demonstrates a simple application of the PTF in automated credibility evaluation to ensure information quality.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating the Effect of Social Business Characteristics on Trust and Willingness to Partnership

Objective Social business is a sub-category of electronic business that seeks social, innovative and cooperative approaches within online markets and also uses social media to attract social partnership and cooperation of such network users to support online purchasing and services. Trust is considered as an effective factor leading to successful social business. Because of the growing populari...

متن کامل

AHP Techniques for Trust Evaluation in Semantic Web

The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...

متن کامل

AHP Techniques for Trust Evaluation in Semantic Web

The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...

متن کامل

User Interface for Trust Decision Making in Inter-Enterprise Collaborations

Trust decisions on inter-enterprise collaborations involve a trustor’s subjective evaluation of its willingness to participate in the specific collaboration, given the risks and incentives involved. In earlier work, we have built support on automating routine trust decisions based on a combination of risk, reputation and incentive information. Non-routine cases must be dealt with by human users...

متن کامل

Schematizing and Automating Trust in Named Data Networking

Securing communication in networking applications involves many complex tasks that can be daunting even for security experts. The Named Data Networking (NDN) architecture builds data authentication into the narrow waist layer by requiring all applications to sign and authenticate every network-level data packet. To make this authentication usable, the decision about which keys can sign which da...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009