Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources

This paper describes on-going research developing a system to allow incident controllers and similar decision makers to augment official information input streams with information contributed by the wider public (either explicitly submitted to them or harvested from social networks such as Facebook and Twitter), and to be able to handle inconsistencies and uncertainty arising from the unreliability of such sources in a flexible way.

[1]  J. Lewis,et al.  Trust as a Social Reality , 1985 .

[2]  K. Blomqvist The many faces of trust , 1997 .

[3]  Blair H. Sheppard,et al.  The Grammars of Trust: A Model and General Implications , 1998 .

[4]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[5]  K. Suzanne Barber,et al.  Using policies for information valuation to justify beliefs , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[6]  Christian Bizer,et al.  Quality-Driven Information Filtering- In the Context of Web-Based Information Systems , 2007 .

[7]  Yolanda Gil,et al.  Towards content trust of web resources , 2007, J. Web Semant..

[8]  Matthias Sutter,et al.  Trust and trustworthiness across different age groups , 2007, Games Econ. Behav..

[9]  Wang Chiew Tan Provenance in Databases: Past, Current, and Future , 2007, IEEE Data Eng. Bull..

[10]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[11]  Elisa Bertino,et al.  An Approach to Evaluate Data Trustworthiness Based on Data Provenance , 2008, Secure Data Management.

[12]  Kenneth R. Fleischmann,et al.  Trust in digital information , 2008 .

[13]  Olaf Hartig Provenance Information in the Web of Data , 2009, LDOW.

[14]  Shouhuai Xu,et al.  TIUPAM: A Framework for Trustworthiness-Centric Information Sharing , 2009, IFIPTM.

[15]  Elisa Bertino,et al.  Trust Management III, Third IFIP WG 11.11 International Conference, IFIPTM 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings , 2009, IFIPTM.

[16]  Olaf Hartig,et al.  Using Web Data Provenance for Quality Assessment , 2009, SWPM.

[17]  Collin Jackson,et al.  Web 2.0 Security and Privacy , 2011, Encyclopedia of Cryptography and Security.

[18]  Christian Bizer Quality-Driven Information Filtering , 2012 .