Abstract
This paper describes on-going research developing a system to allow incident controllers and similar decision makers to augment official information input streams with information contributed by the wider public (either explicitly submitted to them or harvested from social networks such as Facebook and Twitter), and to be able to handle inconsistencies and uncertainty arising from the unreliability of such sources in a flexible way.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Journal of Web Semantics: Science, Services and Agents on the World Wide Web 5(2), 58–71 (2007)
BBC News: As it happened: Mumbai attacks (November 27, 2008), http://news.bbc.co.uk/1/hi/world/south_asia/7752003.stm
Bellantoni, C., Dinan, S.: Obama’s twitter site hacked. The Washington Times (January 2009), http://www.washingtontimes.com/news/2009/jan/05/obamas-twitter-site-hacked/
Bizer, C.: Quality-Driven Information Filtering in the Context of Web-Based Information Systems. VDM Verlag (2007)
Blomqvist, K.: The many faces of trust. Scandinavian Journal of Management 13(3), 271–286 (1997)
CNN International (2008), http://edition.cnn.com/2008/WORLD/asiapcf/11/27/mumbai.twitter/index.html
Tracking a rumor: Indian government, twitter, and common sense (2008), http://www.contentious.com/2008/11/27/tracking-a-rumor-indian-government-twitter-and-common-sens/sic
Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An Approach to Evaluate Data Trustworthiness Based on Data Provenance. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 82–98. Springer, Heidelberg (2008)
Fullam, K.K., Barber, K.S.: Using policies for information valuation to justify beliefs. In: Third International Joint Conference on Autonomous Agents and Multi Agent Systems (AAMAS 2004) (July 2004)
Gil, Y., Artz, D.: Towards content trust of web resources. Journal of Web Semantics: Science, Services and Agents on the World Wide Web 5(4), 227–239 (2007)
Google Public Data Explorer: Internet users as percentage of population, Haiti, http://www.google.com/publicdata?ds=wb-wdi&met=it_net_user_p2&idim=country:HTI&dl=en&hl=en&q=internet+user+in+haiti#met=it_net_user_p2&idim=country:HTI
Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 2–16 (Fourth Quarter 2000)
Bbc admits it made mistakes using Mumbai Twitter coverage (November 2008), http://www.guardian.co.uk/media/pda/2008/dec/05/bbc-twitter
Hartig, O.: Provenance information in the web of data. In: Linked Data on The Web (LDOW 2009) (April 2009), http://ceur-ws.org/Vol-538/ldow2009_paper18.pdf
Hartig, O., Zhao, J.: Using web data provenance for quality assessment. In: First International Workshop on the Role of Semantic Web in Provenance Management (SWPM 2009) (2009)
P.I.B.G. of India, HM announces measures to enhance security (December 2008) (press release), http://pib.nic.in/release/release.asp?relid=45446
Kelton, K., Fleischmann, K.R., Wallace, W.A.: Trust in digital information. Journal of the American Society for Information Science and Technology 59(3), 363–374 (2008)
Lahiri, M.: Gaming foursquare with 9 lines of perl (August 2010), http://compbio.cs.uic.edu/~mayank/4sq.html
Lewis, J.D., Weigert, A.: Trust as a social reality. Social Forces 63(4), 967–985 (1985)
(2010), http://nationnewmedia.com/2010/01/17/opinion/opinion_30120439.php
Network, T.E.: (ENISA), I.S.A.: Web 2.0 survey, http://www.enisa.europa.eu/act/it/oar/web-2.0-security-and-privacy/enisa_survey_web2.pdf/view
Network, T.E.: (ENISA), I.S.A.: Web 2.0 security and privacy (December 2008), http://www.enisa.europa.eu/act/it/oar/web2sec/report
Rahman, S.S.: Phishing Attack. Master’s thesis, University of East London (2006)
Sheppard, B.H., Sherman, D.M.: The grammars of trust: A model and general implications. Academy of Management Review 23(3), 422–437 (1998)
SMS packet format, http://www.gsmfavorites.com/documents/sms/packetformat/
Suttera, M., Kocher, M.G.: Trust and trustworthiness across different age groups. Games and Economic Behavior 59(2), 364–382 (2007)
Tan, W.C.: Provenance in databases: Past, current, and future. IEEE Data Engineering Bulletin 30(4), 3–12 (2007)
http://simple.wikipedia.org/wiki/November_2008_Mumbai_attacks
Xu, S., Sandhu, R., Bertino, E.: TIUPAM: A Framework for Trustworthiness-Centric Information Sharing. In: Ferrari, E., Li, N., Bertino, E., Karabulut, Y. (eds.) IFIPTM 2009. IFIP AICT, vol. 300, pp. 164–175. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rahman, S.S., Creese, S., Goldsmith, M. (2012). Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources. In: Meadows, C., Fernandez-Gago, C. (eds) Security and Trust Management. STM 2011. Lecture Notes in Computer Science, vol 7170. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29963-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-29963-6_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29962-9
Online ISBN: 978-3-642-29963-6
eBook Packages: Computer ScienceComputer Science (R0)