Results 11 - 20
of
481
Generating Predictive Movie Recommendations from Trust in Social Networks
- Proceedings of The Fourth International Conference on Trust Management
, 2006
"... Abstract. Social networks are growing in number and size, with hundreds of millions of user accounts among them. One added benefit of these networks is that they allow users to encode more information about their relationships than just stating who they know. In this work, we are particularly intere ..."
Abstract
-
Cited by 89 (15 self)
- Add to MetaCart
accurate than other techniques when the user's opinions about a film are divergent from the average. We discuss this technique both as an application of social network analysis, as well as how it suggests other analyses that can be performed to help improve collaborative filtering algorithms of all
Web credibility, trustTRUST ON THE WEB
"... This paper forms a backdrop for work investigating trust on the semantic web. With the mass of information currently available on the web, and the low barrier to entry for the publication of information on the web, it can be difficult to classify the authority of information found on the web. We use ..."
Abstract
- Add to MetaCart
use a case study of a suspected phishing scam in South Africa to examine the methods an advanced user may use to verify the authenticity of a web site and the information it published. From this case study, we see that a website which is legitimate may easily appear to be a scam, because of the manner
Persona: An Online Social Network with User-Defined Privacy
"... Online social networks (OSNs) are immensely popular, with some claiming over 200 million users [10]. Users share private content, such as personal information or photographs, using OSN applications. Users must trust the OSN service to protect personal information even as the OSN provider benefits fr ..."
Abstract
-
Cited by 145 (4 self)
- Add to MetaCart
Online social networks (OSNs) are immensely popular, with some claiming over 200 million users [10]. Users share private content, such as personal information or photographs, using OSN applications. Users must trust the OSN service to protect personal information even as the OSN provider benefits
A Unified Scheme for Resource Protection in Automated Trust Negotiation
- In IEEE Symposium on Security and Privacy
, 2003
"... Automated trust negotiation is an approach to establishing trust between strangers through iterative disclosure of digital credentials. In automated trust negotiation, access control policies play a key role in protecting resources from unauthorized access. Unlike in traditional trust management sys ..."
Abstract
-
Cited by 90 (2 self)
- Add to MetaCart
Automated trust negotiation is an approach to establishing trust between strangers through iterative disclosure of digital credentials. In automated trust negotiation, access control policies play a key role in protecting resources from unauthorized access. Unlike in traditional trust management
Twitter Under Crisis: Can we trust what we RT?
"... In this article we explore the behavior of Twitter users under an emergency situation. In particular, we analyze the activity related to the 2010 earthquake in Chile and characterize Twitter in the hours and days following this disaster. Furthermore, we perform a preliminary study of certain social ..."
Abstract
-
Cited by 87 (2 self)
- Add to MetaCart
phenomenons, such as the dissemination of false rumors and confirmed news. We analyze how this information propagated through the Twitter network, with the purpose of assessing the reliability of Twitter as an information source under extreme circumstances. Our analysis shows that the propagation of tweets
Analyzing User Demographics and User Behavior for Trust Assessment
"... Abstract. In many systems, the determination of trust is reduced to reputation estimation. However, reputation is just one way of determin-ing trust. The estimation of trust can be tackled from a variety of other perspectives. In this chapter, we model trust relying on user reputation, user demograp ..."
Abstract
- Add to MetaCart
Abstract. In many systems, the determination of trust is reduced to reputation estimation. However, reputation is just one way of determin-ing trust. The estimation of trust can be tackled from a variety of other perspectives. In this chapter, we model trust relying on user reputation, user
Techniques for Trusted Software Engineering
- In Proceedings of the 20th International Conference on Software Engineering
, 1998
"... How do we decide if it is safe to run a given piece of software on our machine? Software used to arrive in shrink-wrapped packages from known vendors. But increasingly, software of unknown provenance arrives over the internet as applets or agents. Running such software risks serious harm to the host ..."
Abstract
-
Cited by 18 (13 self)
- Add to MetaCart
How do we decide if it is safe to run a given piece of software on our machine? Software used to arrive in shrink-wrapped packages from known vendors. But increasingly, software of unknown provenance arrives over the internet as applets or agents. Running such software risks serious harm
Bootstrapping trust evaluations through stereotypes
- In Proceedings. of 9th International Conference on Autonomous Agents and Multiagent Systems
, 2010
"... In open, dynamic multi-agent systems, agents may form short-term ad-hoc groups, such as coalitions, in order to meet their goals. Trust and reputation are crucial concepts in these environments, as agents must rely on their peers to perform as expected, and learn to avoid untrustworthy partners. How ..."
Abstract
-
Cited by 35 (7 self)
- Add to MetaCart
behaviour, whereby agents generalise their experiences with known partners as stereotypes and apply these when evaluating new and unknown partners. We show how this approach can complement existing state of the art trust models, and enhance the confidence in the evaluations that can be made about trustees
TrustMap: Towards Trust Recommendations for Maps
"... Abstract. The web is a rich environment for exchanging spatial information. When spatial information is shared in the form of images, i.e., maps, these images almost never come with meta-information about how they were generated. This kind of meta-information is often called knowledge provenance. Ac ..."
Abstract
- Add to MetaCart
. Access to knowledge provenance may facilitate users to make informed decisions about the quality of maps. In this paper, we propose TrustMap, a new approach for enhancing maps with trust recommendations. For a given map, TrustMap can generate recommendations from the knowledge provenance and a network
TrustMap: Towards Trust Recommendations for Maps
, 2008
"... Abstract. The web is a rich environment for exchanging spatial in-formation. When spatial information is shared in the form of images, i.e., maps, these images almost never come with meta-information about how they were generated. This kind of meta-information is often called knowledge provenance. A ..."
Abstract
- Add to MetaCart
. Access to knowledge provenance may facilitate users to make informed decisions about the quality of maps. In this pa-per, we propose TrustMap, a new approach for enhancing maps with trust recommendations. For a given map, TrustMap can generate rec-ommendations from the knowledge provenance and a network
Results 11 - 20
of
481