Skip to main content

Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources

  • Conference paper
Security and Trust Management (STM 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7170))

Included in the following conference series:

Abstract

This paper describes on-going research developing a system to allow incident controllers and similar decision makers to augment official information input streams with information contributed by the wider public (either explicitly submitted to them or harvested from social networks such as Facebook and Twitter), and to be able to handle inconsistencies and uncertainty arising from the unreliability of such sources in a flexible way.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Journal of Web Semantics: Science, Services and Agents on the World Wide Web 5(2), 58–71 (2007)

    Article  Google Scholar 

  2. BBC News: As it happened: Mumbai attacks (November 27, 2008), http://news.bbc.co.uk/1/hi/world/south_asia/7752003.stm

  3. Bellantoni, C., Dinan, S.: Obama’s twitter site hacked. The Washington Times (January 2009), http://www.washingtontimes.com/news/2009/jan/05/obamas-twitter-site-hacked/

  4. Bizer, C.: Quality-Driven Information Filtering in the Context of Web-Based Information Systems. VDM Verlag (2007)

    Google Scholar 

  5. Blomqvist, K.: The many faces of trust. Scandinavian Journal of Management 13(3), 271–286 (1997)

    Article  Google Scholar 

  6. CNN International (2008), http://edition.cnn.com/2008/WORLD/asiapcf/11/27/mumbai.twitter/index.html

  7. (2010), http://www.computerworld.com/s/article/9145259/Facebook_creates_site_dedicated_to_providing_earthquake_info

  8. Tracking a rumor: Indian government, twitter, and common sense (2008), http://www.contentious.com/2008/11/27/tracking-a-rumor-indian-government-twitter-and-common-sens/sic

  9. Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An Approach to Evaluate Data Trustworthiness Based on Data Provenance. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 82–98. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  10. Fullam, K.K., Barber, K.S.: Using policies for information valuation to justify beliefs. In: Third International Joint Conference on Autonomous Agents and Multi Agent Systems (AAMAS 2004) (July 2004)

    Google Scholar 

  11. Gil, Y., Artz, D.: Towards content trust of web resources. Journal of Web Semantics: Science, Services and Agents on the World Wide Web 5(4), 227–239 (2007)

    Article  Google Scholar 

  12. Google Public Data Explorer: Internet users as percentage of population, Haiti, http://www.google.com/publicdata?ds=wb-wdi&met=it_net_user_p2&idim=country:HTI&dl=en&hl=en&q=internet+user+in+haiti#met=it_net_user_p2&idim=country:HTI

  13. Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 2–16 (Fourth Quarter 2000)

    Google Scholar 

  14. Bbc admits it made mistakes using Mumbai Twitter coverage (November 2008), http://www.guardian.co.uk/media/pda/2008/dec/05/bbc-twitter

  15. Hartig, O.: Provenance information in the web of data. In: Linked Data on The Web (LDOW 2009) (April 2009), http://ceur-ws.org/Vol-538/ldow2009_paper18.pdf

  16. Hartig, O., Zhao, J.: Using web data provenance for quality assessment. In: First International Workshop on the Role of Semantic Web in Provenance Management (SWPM 2009) (2009)

    Google Scholar 

  17. P.I.B.G. of India, HM announces measures to enhance security (December 2008) (press release), http://pib.nic.in/release/release.asp?relid=45446

  18. Kelton, K., Fleischmann, K.R., Wallace, W.A.: Trust in digital information. Journal of the American Society for Information Science and Technology 59(3), 363–374 (2008)

    Article  Google Scholar 

  19. Lahiri, M.: Gaming foursquare with 9 lines of perl (August 2010), http://compbio.cs.uic.edu/~mayank/4sq.html

  20. Lewis, J.D., Weigert, A.: Trust as a social reality. Social Forces 63(4), 967–985 (1985)

    Google Scholar 

  21. (2010), http://nationnewmedia.com/2010/01/17/opinion/opinion_30120439.php

  22. Network, T.E.: (ENISA), I.S.A.: Web 2.0 survey, http://www.enisa.europa.eu/act/it/oar/web-2.0-security-and-privacy/enisa_survey_web2.pdf/view

  23. Network, T.E.: (ENISA), I.S.A.: Web 2.0 security and privacy (December 2008), http://www.enisa.europa.eu/act/it/oar/web2sec/report

  24. Rahman, S.S.: Phishing Attack. Master’s thesis, University of East London (2006)

    Google Scholar 

  25. Sheppard, B.H., Sherman, D.M.: The grammars of trust: A model and general implications. Academy of Management Review 23(3), 422–437 (1998)

    Google Scholar 

  26. SMS packet format, http://www.gsmfavorites.com/documents/sms/packetformat/

  27. Suttera, M., Kocher, M.G.: Trust and trustworthiness across different age groups. Games and Economic Behavior 59(2), 364–382 (2007)

    Article  Google Scholar 

  28. Tan, W.C.: Provenance in databases: Past, current, and future. IEEE Data Engineering Bulletin 30(4), 3–12 (2007)

    Google Scholar 

  29. http://simple.wikipedia.org/wiki/November_2008_Mumbai_attacks

  30. Xu, S., Sandhu, R., Bertino, E.: TIUPAM: A Framework for Trustworthiness-Centric Information Sharing. In: Ferrari, E., Li, N., Bertino, E., Karabulut, Y. (eds.) IFIPTM 2009. IFIP AICT, vol. 300, pp. 164–175. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rahman, S.S., Creese, S., Goldsmith, M. (2012). Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources. In: Meadows, C., Fernandez-Gago, C. (eds) Security and Trust Management. STM 2011. Lecture Notes in Computer Science, vol 7170. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29963-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29963-6_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29962-9

  • Online ISBN: 978-3-642-29963-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics