Trust-based decision-making for smart and adaptive environments

Smart environments are able to support users during their daily life. For example, smart energy systems can be used to support energy saving by controlling devices, such as lights or displays, depending on context information, such as the brightness in a room or the presence of users. However, proactive decisions should also match the users’ preferences to maintain the users’ trust in the system. Wrong decisions could negatively influence the users’ acceptance of a system and at worst could make them abandon the system. In this paper, a trust-based model, called User Trust Model (UTM), for automatic decision-making is proposed, which is based on Bayesian networks. The UTM’s construction, the initialization with empirical data gathered in an online survey, and its integration in an office setting are described. Furthermore, the results of a live study and a live survey analyzing the users’ experience and acceptance are presented.

[1]  Stephen Marsh,et al.  Trust in Distributed Artificial Intelligence , 1992, MAAMAW.

[2]  Touradj Ebrahimi,et al.  Comparative Study of Trust Modeling for Automatic Landmark Tagging , 2013, IEEE Transactions on Information Forensics and Security.

[3]  Bernt Schiele,et al.  Towards improving trust in context-aware systems by displaying system confidence , 2005, Mobile HCI.

[4]  Keith Cheverst,et al.  Exploring Issues of User Model Transparency and Proactive Behaviour in an Office Environment Control System , 2005, User Modeling and User-Adapted Interaction.

[5]  Jonathan Klein,et al.  Computers that recognise and respond to user emotion: theoretical and practical implications , 2002, Interact. Comput..

[6]  Eve E. Hoggan,et al.  Tailoring Feedback to Users' Actions in a Persuasive Game for Household Electricity Conservation , 2012, PERSUASIVE.

[7]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[8]  Audun Jøsang,et al.  Trust network analysis with subjective logic , 2006, ACSC.

[9]  Joanna Lumsden Triggering trust: to what extent does the question influence the answer when evaluating the perceived importance of trust triggers? , 2009, BCS HCI.

[10]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[11]  Joachim Biskup,et al.  Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings , 2007, ESORICS.

[12]  Yue Xu,et al.  A Review of Trust in Online Social Networks to Explore New Research Agenda , 2010, International Conference on Internet Computing.

[13]  John D. Lee,et al.  Trust in Automation: Designing for Appropriate Reliance , 2004 .

[14]  Zheng Yan,et al.  Trust Modeling and Management: From Social Trust to Digital Trust , 2008 .

[15]  Uwe Hansmann,et al.  Pervasive Computing , 2003 .

[16]  Elisabeth André,et al.  The Automatic Trust Management of Self-Adaptive Multi-Display Environments , 2012 .

[17]  Adrian Friday,et al.  Look Back before Leaping Forward : Four Decades of Domestic-Energy Inquiry , 2022 .

[18]  Elisabeth André,et al.  Managing user trust for self-adaptive ubiquitous computing systems , 2010, MoMM.

[19]  Anind K. Dey,et al.  Toolkit to support intelligibility in context-aware applications , 2010, UbiComp.

[20]  Elisabeth André,et al.  Trust-based Decision-making for the Adaptation of Public Displays in Changing Social Contexts , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.

[21]  Tsvi Kuflik,et al.  When user modeling intersects software engineering: the info-bead user modeling approach , 2015, User Modeling and User-Adapted Interaction.

[22]  Valtteri Niemi,et al.  Effects of Displaying Trust Information on Mobile Application Usage , 2010, ATC.

[23]  Rino Falcone,et al.  Trust Theory: A Socio-Cognitive and Computational Model , 2010 .

[24]  George Vogiatzis,et al.  A probabilistic model for trust and reputation , 2010, AAMAS.

[25]  Paul C. van Oorschot,et al.  Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts , 2014, USENIX Security Symposium.

[26]  Julita Vassileva,et al.  Bayesian Network Trust Model in Peer-to-Peer Networks , 2003, AP2PC.

[27]  CheverstKeith,et al.  Exploring Issues of User Model Transparency and Proactive Behaviour in an Office Environment Control System , 2005 .

[28]  Shambhu J. Upadhyaya,et al.  Towards Modeling Trust Based Decisions: A Game Theoretic Approach , 2007, ESORICS.

[29]  Phoebe Sengers,et al.  Mapping the landscape of sustainable HCI , 2010, CHI.

[30]  Marco Jahn,et al.  Saving energy at work: the design of a pervasive game for office spaces , 2012, MUM.

[31]  Elisabeth André,et al.  Personalization of Content on Public Displays Driven by the Recognition of Group Context , 2012, AmI.

[32]  Barry Smyth,et al.  Trust in recommender systems , 2005, IUI.

[33]  Xingshe Zhou,et al.  Autonomic and Trusted Computing , 2010, Lecture Notes in Computer Science.

[34]  Katia P. Sycara,et al.  Trust Decision-Making in Multi-Agent Systems , 2011, IJCAI.

[35]  Isaac Woungang,et al.  Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..

[36]  Antonio Krüger,et al.  ReflectiveSigns: Digital Signs That Adapt to Audience Attention , 2009, Pervasive.

[37]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[38]  Sibel Adali,et al.  Measuring behavioral trust in social networks , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.

[39]  Sonia Bergamaschi,et al.  Agents and Peer-to-Peer Computing - 5th International Workshop, AP2PC 2006, Hakodate, Japan, May 9, 2006, Revised and Invited Papers , 2008, AP2PC.

[40]  Elisabeth André,et al.  Trust Management of Ubiquitous Multi-Display Environments , 2012, Ubiquitous Display Environments.

[41]  Cécile Paris,et al.  A survey of trust in social networks , 2013, CSUR.

[42]  Alfred Kobsa,et al.  Dimensionality of information disclosure behavior , 2013, Int. J. Hum. Comput. Stud..

[43]  Jörg Hähner,et al.  Trustworthy Organic Computing Systems: Challenges and Perspectives , 2010, ATC.

[44]  Ponnurangam Kumaraguru,et al.  Privacy Indexes: A Survey of Westin's Studies , 2005 .

[45]  Deborah L. McGuinness,et al.  Toward establishing trust in adaptive agents , 2008, IUI '08.

[46]  Masahiro Fujita,et al.  i/k-Contact: A context-aware user authentication using physical social trust , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.

[47]  Moshe Tennenholtz,et al.  Artificial Social Systems , 1992, Lecture Notes in Computer Science.