Visible to the public Biblio

Filters: Keyword is web of trust  [Clear All Filters]
2017-08-02
Qundus, Jamal Al.  2016.  Generating Trust in Collaborative Annotation Environments. Proceedings of the 12th International Symposium on Open Collaboration Companion. :3:1–3:4.

The main goal of this work is to create a model of trust which can be considered as a reference for developing applications oriented on collaborative annotation. Such a model includes design parameters inferred from online communities operated on collaborative content. This study aims to create a static model, but it could be dynamic or more than one model depending on the context of an application. An analysis on Genius as a peer production community was done to understand user behaviors. This study characterizes user interactions based on the differentiation between Lightweight Peer Production (LWPP) and Heavyweight Peer Production (HWPP). It was found that more LWPP- interactions take place in the lower levels of this system. As the level in the role system increases, there will be more HWPP-interactions. This can be explained as LWPP-interacions are straightforward, while HWPP-interations demand more agility by the user. These provide more opportunities and therefore attract other users for further interactions.

Seyler, Dominic, Yahya, Mohamed, Berberich, Klaus, Alonso, Omar.  2016.  Automated Question Generation for Quality Control in Human Computation Tasks. Proceedings of the 8th ACM Conference on Web Science. :360–362.

When running large human computation tasks in the real-world, honeypots play an important role for assessing the overall quality of the work produced. The generation of such honeypots can be a significant burden on the task owner as they require specific characteristics in their design and implementation and continuous maintenance when operating data pipelines that include a human computation component. In this extended abstract we outline a novel approach for creating honeypots using automatically generated questions from a reference knowledge base with the ability to control such parameters as topic and difficulty.

Wu, Zhaoming, Aggarwal, Charu C., Sun, Jimeng.  2016.  The Troll-Trust Model for Ranking in Signed Networks. Proceedings of the Ninth ACM International Conference on Web Search and Data Mining. :447–456.

Signed social networks have become increasingly important in recent years because of the ability to model trust-based relationships in review sites like Slashdot, Epinions, and Wikipedia. As a result, many traditional network mining problems have been re-visited in the context of networks in which signs are associated with the links. Examples of such problems include community detection, link prediction, and low rank approximation. In this paper, we will examine the problem of ranking nodes in signed networks. In particular, we will design a ranking model, which has a clear physical interpretation in terms of the sign of the edges in the network. Specifically, we propose the Troll-Trust model that models the probability of trustworthiness of individual data sources as an interpretation for the underlying ranking values. We will show the advantages of this approach over a variety of baselines.

Jang, Min-Hee, Faloutsos, Christos, Kim, Sang-Wook, Kang, U, Ha, Jiwoon.  2016.  PIN-TRUST: Fast Trust Propagation Exploiting Positive, Implicit, and Negative Information. Proceedings of the 25th ACM International on Conference on Information and Knowledge Management. :629–638.

Given "who-trusts/distrusts-whom" information, how can we propagate the trust and distrust? With the appearance of fraudsters in social network sites, the importance of trust prediction has increased. Most such methods use only explicit and implicit trust information (e.g., if Smith likes several of Johnson's reviews, then Smith implicitly trusts Johnson), but they do not consider distrust. In this paper, we propose PIN-TRUST, a novel method to handle all three types of interaction information: explicit trust, implicit trust, and explicit distrust. The novelties of our method are the following: (a) it is carefully designed, to take into account positive, implicit, and negative information, (b) it is scalable (i.e., linear on the input size), (c) most importantly, it is effective and accurate. Our extensive experiments with a real dataset, Epinions.com data, of 100K nodes and 1M edges, confirm that PIN-TRUST is scalable and outperforms existing methods in terms of prediction accuracy, achieving up to 50.4 percentage relative improvement. 

Cao, Cong, Yan, Jun, Li, Mengxiang.  2016.  Understanding the Influence and Service Type of Trusted Third Party on Consumers' Online Trust: Evidence from Australian B2C Marketplace. Proceedings of the 18th Annual International Conference on Electronic Commerce: E-Commerce in Smart Connected World. :18:1–18:8.

In this study, the trusted third party (TTP) in Australia's B2C marketplace is studied and the factors influencing consumers' trust behaviour are examined from the perspective of consumers' online trust. Based on the literature review and combined with the development status and background of Australia's e-commerce, underpinned by the Theory of Planned Behaviour (TPB) and a conceptual trust model, this paper expatiates the specific factors and influence mechanism of TTP on consumers' trust behaviour. Also this paper explains two different functions of TTP to solve the online trust problem faced by consumers. Meanwhile, this paper summarizes five different types of services provided by TTPs during the establishment of the trust relationship. Finally, the present study selects 100 B2C enterprises by the simple random sampling method and makes a detailed analysis of their TTPs, to verify the services and functions of the proposed TTP in the trust model. This study is of some significance for comprehending the influence mechanism, functions and services of TTPs on consumers' trust behaviour in the realistic Australian B2C environment.

Yu, Kun, Berkovsky, Shlomo, Conway, Dan, Taib, Ronnie, Zhou, Jianlong, Chen, Fang.  2016.  Trust and Reliance Based on System Accuracy. Proceedings of the 2016 Conference on User Modeling Adaptation and Personalization. :223–227.

Trust plays an important role in various user-facing systems and applications. It is particularly important in the context of decision support systems, where the system's output serves as one of the inputs for the users' decision making processes. In this work, we study the dynamics of explicit and implicit user trust in a simulated automated quality monitoring system, as a function of the system accuracy. We establish that users correctly perceive the accuracy of the system and adjust their trust accordingly.

Krawiecka, Klaudia, Paverd, Andrew, Asokan, N..  2016.  Protecting Password Databases Using Trusted Hardware. Proceedings of the 1st Workshop on System Software for Trusted Execution. :9:1–9:6.