Using a Trust Inference Model for Flexible and Controlled Information Sharing During Crises

This article is dedicated to Alan Jarman, a founding influence in the Journal of Contingencies and Crisis Management who died in Canberra 15 July 2010. Alan's quantitative, engineering background and his long standing commitment to improving crisis decision making prompted him to encourage our applying fuzzy logic to crisis information sharing. We are grateful for Alan's encouragement and advice. The fluid, urgent nature of crises requires flexible, responsive information sharing. Recent studies show, however, that in business catastrophes and other kinds of crises conventional access control mechanisms favor security over flexibility. Our work addresses these seemingly contradictory needs for security and flexibility and designs a trust inference model based on fuzzy logic, a model that can be used with pervasive computing technologies using sensors and mobile devices. Drawing upon research on trust, we design a trust inference model using attributes of affiliation, task performance, and urgency; apply the model to a known crisis; discuss implementation issues; and explore issues for further research. This article is dedicated to Alan Jarman, a founding influence in the Journal of Contingencies and Crisis Management who died in Canberra 15 July 2010. Alan's quantitative, engineering background and his long standing commitment to improving crisis decision making prompted him to encourage our applying fuzzy logic to crisis information sharing. We are grateful for Alan's encouragement and advice.

[1]  Jenny Palm,et al.  Developing Local Emergency Management by Co-Ordination between Municipalities in Policy Networks: Experiences from Sweden , 2007 .

[2]  J. H. Davis,et al.  An Integrative Model of Organizational Trust: Past, Present, and Future , 2007 .

[3]  Angappa Gunasekaran,et al.  Knowledge and Information Technology Management: Human and Social Perspectives , 2002 .

[4]  Robert Lee Chartrand The many potentials of information technology for emergency management , 1985, Inf. Soc..

[5]  Toshinori Munakata,et al.  Fuzzy systems: an overview , 1994, CACM.

[6]  Dale E. Zand Trust and Managerial Problem Solving , 1972 .

[7]  Richard T. Sylves,et al.  Organizing the War on Terrorism , 2002 .

[8]  Guido Deboeck,et al.  Trading on the Edge: Neural, Genetic, and Fuzzy Systems for Chaotic Financial Markets , 1994 .

[9]  Qilian Liang,et al.  Fuzzy logic-optimized secure media access control (FSMAC) protocol wireless sensor networks , 2005, CIHSPS 2005. Proceedings of the 2005 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2005..

[10]  L. Comfort Crisis Management in Hindsight: Cognition, Communication, Coordination, and Control , 2007 .

[11]  István Mezgár,et al.  The role of trust in information technology management , 2002 .

[12]  William Yu Chung Wang,et al.  Supply Chain Management: Issues in the New Era of Collaboration And Competition , 2006 .

[13]  D. A. MacDonald Communication and Trust in Global Virtual Teams , 2007 .

[14]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[15]  Arnon Rosenthal,et al.  Specifying data sharing agreements , 2006, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06).

[16]  George P. Huber,et al.  The Decision-Making Paradigm of Organizational Design , 1986 .

[17]  Sushil Jajodia,et al.  Redirection policies for mission-based information sharing , 2006, SACMAT '06.

[18]  P. Williams Crisis Management , 1972, Contemporary Strategy.

[19]  Ian I. Mitroff The Role of Computers and Decision Aids in Crisis Management: A Developer's Report , 1994 .

[20]  Lotfi A. Zadeh,et al.  Fuzzy Logic , 2009, Encyclopedia of Complexity and Systems Science.

[21]  Alexander Kouzmin,et al.  Communicating throughout Katrina: Competing and Complementary Conceptual Lenses on Crisis Communication , 2007 .

[22]  Lotfi A. Zadeh,et al.  Fuzzy logic, neural networks, and soft computing , 1993, CACM.

[23]  Lotfi A. Zadeh,et al.  Fuzzy logic = computing with words , 1996, IEEE Trans. Fuzzy Syst..

[24]  William H. Sanders,et al.  Automatic Verification of Distributed and Layered Security Policy Implementations , 2008 .

[25]  Chuen-Chien Lee,et al.  Fuzzy logic in control systems: fuzzy logic controller. I , 1990, IEEE Trans. Syst. Man Cybern..

[26]  Roger C. Mayer,et al.  The trusted general manager and business unit performance: empirical evidence of a competitive advantage , 2000 .

[27]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[28]  Starr Roxanne Hiltz,et al.  Controversies in the design of computer-mediated communication systems: A Delphi study , 1982, CHI '82.

[29]  Colin Camerer,et al.  Not So Different After All: A Cross-Discipline View Of Trust , 1998 .

[30]  A. Kouzmin,et al.  Crisis Management: Toward a New Informational “Localisim” in Local Government Reform , 2000 .

[31]  L. Comfort,et al.  Coordination in Rapidly Evolving Disaster Response Systems , 2004 .

[32]  Shanshan Song,et al.  Trusted Grid Computing with Security Binding and Trust Integration , 2005, Journal of Grid Computing.

[33]  A. Boin,et al.  Institutional crises and reforms in policy sectors: the case of asylum policy in Europe , 2001 .

[34]  Chuen-Chien Lee,et al.  Fuzzy logic in control systems: fuzzy logic controller. II , 1990, IEEE Trans. Syst. Man Cybern..

[35]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[36]  Martha Derthick Where Federalism Didn’t Fail , 2007 .

[37]  T. Drabek Human System Responses to Disaster: An Inventory of Sociological Findings , 2011 .

[38]  Chuen-Chien Lee FUZZY LOGIC CONTROL SYSTEMS: FUZZY LOGIC CONTROLLER - PART I , 1990 .

[39]  Paul J. Hart,et al.  Power and Trust: Critical Factors in the Adoption and Use of Electronic Data Interchange , 1997 .

[40]  Irfan A. Essa,et al.  Parameterized Authentication , 2004, ESORICS.

[41]  Ueli Maurer,et al.  Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence , 2000, Public Key Cryptography.

[42]  Kishor S. Trivedi,et al.  Network survivability modeling , 2009, Comput. Networks.

[43]  A. Boin,et al.  Preparing for the Future: Critical Challenges in Crisis Management , 2000 .

[44]  Claudia Keser,et al.  Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[45]  C. Wise,et al.  Organizing for Homeland Security after Katrina: Is Adaptive Management What’s Missing? , 2006 .

[46]  Ross T. Newkirk Extending Geographic Information Systems for Risk Analysis and Management , 1993 .

[47]  Allen C. Amason Distinguishing the Effects of Functional and Dysfunctional Conflict on Strategic Decision Making: Resolving a Paradox for Top Management Teams , 1996 .

[48]  C. L. Scott Interpersonal Trust: A Comparison of Attitudinal and Situational Factors , 1980 .

[49]  Peter Nijkamp,et al.  Decision Support Tools for Urban Contingency Policy. A Scenario Approach to Risk Management of the Vesuvio Area in Naples, Italy , 2002 .

[50]  Roberto Tamassia,et al.  Role-based cascaded delegation , 2004, SACMAT '04.

[51]  Mikhail J. Atallah,et al.  Point-Based Trust: Define How Much Privacy Is Worth , 2006, ICICS.

[52]  Roberto Tamassia,et al.  On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[53]  Jean Bacon,et al.  Trust for Ubiquitous, Transparent Collaboration , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[54]  Alan M.G. Jarman ‘Reliability’ Reconsidered: A Critique of the HRO‐NAT Debate , 2001 .

[55]  Johan Eriksson Cyberplagues, IT, and Security: Threat Politics in the Information Age , 2001 .

[56]  Henry W. Fischer Enhancing Disaster Mitigation Planning and Response Through the Use of Cyberspace: Suggestions and Issues to Consider , 1999 .

[57]  Richard Elmore,et al.  How to Manage Urban School Districts , 2006 .

[58]  R. Hurley The decision to trust. , 2011, Harvard business review.