Skip to main content
Log in

The Semantics of Untrustworthiness

  • Published:
Topoi Aims and scope Submit manuscript

Abstract

We offer a formal treatment of the semantics of both complete and incomplete mistrustful or distrustful information transmissions. The semantics of such relations is analysed in view of rules that define the behaviour of a receiving agent. We justify this approach in view of human agent communications and secure system design. We further specify some properties of such relations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Notes

  1. For a genealogical overview of the notion see Simpson (2012).

  2. See also the large list of references about trust in labour organizations available at http://www.ilocarib.org.tt/Promalco_tool/productivity-tools/manual07/m7_12.htm.

  3. Notice that while in the following we will be speaking of the actual information transmission from Bob to Alice, the definition of trust as second order relation does not in fact require the first order relation to be actualized: one could perfectly well consider a property instead of a relation— like (GoodMathematician B ) and a second-order property trust A (GoodMathematician B ), which would actualize in any relation trust A (TheoremTransmission B ).

  4. It is here important to stress how this notion does not coincide with that of reliance, where one terminal relies on the other to perform some action without it knowing it or not.

  5. In the following examples, we will use italic fonts when referring to human agents, and typewriter fonts when referring to mechanical principals.

  6. See Floridi (2011).

  7. In computer security, a principal is an entity that can be authenticated in information transactions.

  8. Such a schema \(\langle{\tt Metadata},\mathcal{G}\rangle\) seems particularly apt to enrich the dynamics of design of online scientific databases so as to facilitate the selection of appropriate datasets specific to the purposes of given users. For an analysis of the epistemological issues related to this problem and the connected notion of distributed understanding, see e.g. Leonelli (2014).

  9. The processing of metadata depends on its typology: for \({\tt procedure}\) it will be execution; for \({\tt source}\) it will be reachability; for \({\tt tags}\) it will be checking; for \({\tt user}\) it will be targeting.

  10. As an example, consider the pair \(\langle {\tt geotags}, \mathcal{PWD}\rangle\) for identification on access requests, where geolocalization is superfluous, while \({\tt procedure}\) or \({\tt source}\) would be appropriate.

  11. Converse cases of transmissions including metadata but no goal are also possible to formulate. An example would be a set of building instructions, or deductive steps, that miss a declaration of the building task or the theorem: \(\langle {\tt procedure:R1, R2, \dots}, \mathcal{G}\_{\tt empty}\rangle\).

  12. The present definition of untrustworthy transmission implies that mistrust and distrust cannot be defined in absence of communication. In other words, one can judge a source untrustworthy only with respect to a given information transmission. This is an immediate consequence of defining trust as a second order property of first order relations. Nothing, however, prevents from extending this framework in view of memory-based agents who are able to assess trustworthiness of peers in view of previous communications. Notice, however, that even in the present treatment, the notion of (un)trust is not content-bounded, i.e. the formal treatment is not strictly dependent on tokens of information: the definition uses a data/metadata structure such that the assessment of untrustworthiness can be induced only by evaluation of the sender’s properties.

  13. For a complete analysis of a theory of strongly semantic information, see Floridi (2011). According to such theory, information cannot be properly false. The problem of the veridicality of information content has been long debated and it is not a settled theoretical issue. For the present purposes, we shall not enter this debate and suffice to say that, in the following, we understand ‘false information’ as tantamount to false data with meaning. For the introduction of the notion of (un)intentionally false information see also Floridi (2011, p. 260).

  14. In fact, we can think of an unintentional transmission of intentionally false information (e.g. the wrongful selection of a REPLY-ALL method in an email communication to transmit a consciously formulated excuse to miss a meeting), as well as an intentional transmission of unintentionally false information (e.g. the correctly addressed email to my boss, where I claim I will be missing the meeting this Friday because of a research workshop in Germany, while I meant in the UK).

  15. See Jespersen and Primiero (2013), also for a brief overview of the literature in formal semantics of modal modifiers.

  16. The characteristic behaviour of a modal modification operation is precisely that of oscillating between a subsective relation and a privative one: an ‘alleged assassin’ is an assassin (hence subsecting on the set of assassins by inducing one that is also suspected to be one) or is not (hence inducing the privative case).

  17. See Primiero and Jespersen (2010), also for a brief overview of the literature in formal semantics for privative modifiers.

  18. Notice that this means that a standard upwards monotonic intuitionistic semantics would, for example, not be feasible for this purpose. This is the reason why the model for trust introduced in Primiero and Taddeo (2012), though intuitively based on a verificationist semantics, extends the standard setting with a weak truth predicate based on missing refutations. A full calculus for the latter is given in Primiero (2012).

  19. Notice how this is the case for our treatment of trust as a second-order property characterizing first-order relations of information transmission on specified contents. Trust defined as first-order relation requires a restriction on transitivity, what is called in the literature promiscuous trust.

  20. In what follows we abbreviate Metadata with simply M for simplicity of reading.

  21. In the following, we will be using two obvious simplifications: that no double-games are in place, and that the untrustworthiness assessments are public.

  22. A more powerful framework allowing us to express the reasons for untrust assessments, would make it possible to formulate the reactions of i to j’s response to the initial message. In this way, i’s further assessment could be dictated on the basis of the correctness of j’s one. We leave this to further research.

  23. Other, even more optimistic social epistemological attempts to deal with the problem of adjudicating between rival experts are due to Goldman (2001) and Haack (2004). However as suggested by Miller (forthcoming), they do not significantly enhance the layperson’s epistemic arsenal.

References

  • Abdul-Rahman A, Hailes S (1997) A distributed trust model. In: New security paradigms workshop. Cumbria, UK, pp 48–60

  • Audi R (1997) The place of testimony in the fabric of justification and knowledge. Am Philos Q 34:405–422

    Google Scholar 

  • Beth T, Borcherding M, Klein B (1994) Valuation of trust in open networks. In: Proceedings of the third European symposium on research in computer security, ESORICS ’94. Springer, London, pp 3–18

  • Borgs C, Chayes J, Kalai AT, Malekian A, Tennenholtz M (2010) A novel approach to propagating distrust. In: Proceedings of the 6th international conference on Internet and network economics, WINE’10. Springer, Berlin, pp 87–105

  • Brewer S (1998) Scientific expert testimony and intellectual due process. Yale Law J 107(6):1535–1681

    Article  Google Scholar 

  • Castelfranchi C (2004) Trust mediation in knowledge management and sharing, volume 2995 of Lecture notes in computer science. Springer, Berlin, pp 304–318

  • Chen R, Yeager W (2003) Poblano: a distributed trust model for peer-to-peer networks. Technical report. Sun Microsystems, Santa Clara

  • Christianson B, Harbison (1997) Why isn’t trust transitive? In: Security protocols 4, volume 1189 of Lecture notes in computer science. Springer, Berlin, pp 171–176

  • Collins HM, Evans R (2002) The third wave of science studies: studies of expertise and experience. Soc Stud Sci 32(2):235–296

    Article  Google Scholar 

  • Dalton R (2001) Peers under pressure. Nature 413:102–110

    Article  Google Scholar 

  • Dastani M, Herzig A, Hulstijn J, Van Der Torre L (2004) Inferring trust. In: Proceedings of the fifth workshop on computational logic in multi-agent systems (CLIMA V), volume 3487 of Lecture notes in artificial intelligence. Springer, Berlin, pp 144–160

  • Demolombe R (2004) Reasoning about trust: a formal logic framework, volume 2995 of Lecture notes in computer science. Springer, Berlin, pp 291–303

  • De Winter J, Kosolosky L (2012) The epistemic integrity of scientific research. Sci Eng Ethics 19(3):1–18

    Google Scholar 

  • De Winter J, Kosolosky L (2013) The epistemic integrity of NASA practices in the space shuttle program. Account Res 20(2):72–92

    Article  Google Scholar 

  • Faulkner P (2012) The practical rationality of trust. Synthese 1–15. doi:10.1007/s11229-012-0103-1

  • Floridi L (2011) The philosophy of information. Oxford University Press, Oxford

    Book  Google Scholar 

  • Frances B (2005) Skepticism comes alive. Oxford University Press, Oxford

    Book  Google Scholar 

  • Gans G, Jarke M, Kethers S, Lakemeyer G May (2001) Modeling the impact of trust and distrust in agent networks. In: Proceedings of the third international bi-conference workshop on agent-oriented information systems. Montreal, Canada

  • Goldman A (2001) Experts: which ones should you trust? Philos Phenomenol Res 63(1):85–111

    Article  Google Scholar 

  • Guha R, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: Proceedings of the 13th international conference on World Wide Web, WWW ’04. ACM, New York, pp 403–412

  • Haack S (2004) Truth and justice, inquiry and advocacy, science and law. Ratio Iuris 17(1):15–26

    Article  Google Scholar 

  • Hardwig J (1991) The role of trust in knowledge. J Philos 88:693–708

    Article  Google Scholar 

  • Herzig A, Lorini E, Hübner JF, Vercouter L (2010) A logic of trust and reputation. Log J IGPL 18(1):214–244

    Article  Google Scholar 

  • Jespersen B, Primiero G (2013) Alleged assassins: realist and constructivist semantics for modal modification. In: Bezhanishvili G et al (Ed) TbiLLC 2011, volume 7758 of Lecture notes in computer science. Springer, Berlin

  • Kamvar SD, Garcia-Molina H, Schlosser MT (2003) The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on World Wide Web, WWW ’03. ACM, NewYork, pp 640–651

  • Kosolosky L ‘Peer review is melting our glaciers’: exploring how and why the intergovernmental panel on climate change (ipcc) went astray. J General Philos Sci. Special Issue on Climate Change to appear

  • Kramer S, Goré R, Okamoto E (2012) Computer-aided decision-making with trust relations and trust domains (cryptographic applications). J Log Comput. doi:10.1093/logcom/exs013

  • Leonelli S (2014) Data interpretation in the digital age. In: Perspective on Science. MIT Press (forthcoming)

  • Lewis JD, Weigert AJ (1985) Trust as a social reality. Soc Forces 63:967–985

    Article  Google Scholar 

  • McKnight DH, Chervany NL (2000) Trust and distrust definitions: one bite at a time. In: Falcone R, Singh MP, Tan Y-H (eds) Trust in cyber-societies, integrating the human and artificial perspectives, volume 2246 of Lecture notes in computer science. Springer, berlin, pp 27–54

  • Miller B (forthcoming) Scientific consensus and expert testimony in courts: lessons from the bendectin litigation. In: Froeyman A, Kosolosky L, van Bouwel J (eds) Foundations of science, special Issue on ‘science vs. society: social epistemology meets the philosophy of the humanities

  • Primiero G (2012) A contextual type theory with judgemental modalities for reasoning from open assumptions. Logique Anal 220:579-600

    Google Scholar 

  • Primiero G (2013) A taxonomy of errors for information systems. Minds Machines. doi:10.1007/s11023-013-9307-5

  • Primiero G, Jespersen B (2010) Two kinds of procedural semantics for privative modification, volume 6284 of Lecture notes in artificial intelligence. Springer, Berlin, pp 252–271

  • Primiero G, Taddeo M (2012) A modal type theory for formalizing trusted communications. J Appl Log 10:92–114

    Article  Google Scholar 

  • Rotter JB (1971) Generalized expectancies for interpersonal trust. Am Psychol 26:443–452

    Article  Google Scholar 

  • Shapiro SP (1987) The social control of impersonal trust. Am J Sociol 93(3):623–658

    Article  Google Scholar 

  • Simpson T (2012) What is trust. Pacif Philos Q 93(4):55–569

    Google Scholar 

  • Taddeo M (2010) An information-based solution for the puzzle of testimony and trust. Soc Epistemol 24(4):285–299

    Article  Google Scholar 

  • Taddeo M (2010) Modelling trust inartificial agents, a first step toward the analysis of e-Trust. Minds Machines 20(2):243–257

    Article  Google Scholar 

Download references

Acknowledgments

The first author wishes to thank the participants to the Fifth Workshop on the Philosophy of Information held at the University of Hertfordshire where this paper was first presented, for useful comments and discussions. The second author wishes to thank Jan de Winter for comments on previous versions of the paper. Both authors would like to thank the reviewers for their comments that helped improve the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giuseppe Primiero.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Primiero, G., Kosolosky, L. The Semantics of Untrustworthiness. Topoi 35, 253–266 (2016). https://doi.org/10.1007/s11245-013-9227-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11245-013-9227-2

Keywords

Navigation