Advertisement

Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics

  • Jason R. C. Nurse
  • Sadie Creese
  • Michael Goldsmith
  • Syed Sadiqur Rahman
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8030)

Abstract

The vast amount of information available online places decision makers wishing to use this content in an advantageous but also very difficult position. The advantages stem from the volume of content from a variety of sources that is readily available; the difficulties arise because of the often unknown quality and trustworthiness of the information – is it fact, opinion or purely meant to deceive? In this paper we reflect on and extend current work on information trust and quality metrics which can be used to address this difficulty. Specifically, we propose new metrics as worthy of consideration and the new combinatorics required to take measurements of the various trust factors into a single score. These feed into our existing overarching policy-based approach that uses trustworthiness metrics to support decision-making online.

Keywords

information trustworthiness information quality metrics human decision-making open-source content social-media online risks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Yin, J., Lampert, A., Cameron, M., Robinson, B., Power, R.: Using social media to enhance emergency situation awareness. IEEE Intelligent Systems 99 (2012)Google Scholar
  2. 2.
    Guardian News: How riot rumours spread on twitter (2012), http://www.guardian.co.uk/uk/interactive/2011/dec/07/london-riots-twitter
  3. 3.
    Stvilia, B., Gasser, L., Twidale, M., Smith, L.: A framework for information quality assessment. Journal of ASIST 58(12), 1720–1733 (2007)Google Scholar
  4. 4.
    Agichtein, E., Castillo, C., Donato, D., Gionis, A., Mishne, G.: Finding high-quality content in social media. In: Web Search and Web Data Mining Conference (2008)Google Scholar
  5. 5.
    Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: 20th International Conference on World Wide Web, pp. 675–684 (2011)Google Scholar
  6. 6.
    O’Mahony, M., Smyth, B.: Using readability tests to predict helpful product reviews. In: Adaptivity, Personalization, Fusion Heterogeneous Information (2010)Google Scholar
  7. 7.
    Rahman, S.S., Creese, S., Goldsmith, M.: Accepting information with a pinch of salt: handling untrusted information sources. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 223–238. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  8. 8.
    Nurse, J.R.C., Rahman, S.S., Creese, S., Goldsmith, M., Lamberts, K.: Information quality and trustworthiness: A topical state-of-the-art review. In: International Conference on Computer Applications & Network Security, pp. 492–500. IEEE (2011)Google Scholar
  9. 9.
    Weerkamp, W., de Rijke, M.: Credibility improves topical blog post retrieval. In: 46th Annual Meeting of the Assoc. for Computational Linguistics, pp. 923–931 (2008)Google Scholar
  10. 10.
    Helfert, M., Foley, O., Ge, M., Cappiello, C.: Limitations of weighted sum measures for information quality. In: 15th Americas Conf. on Information Systems (2009)Google Scholar
  11. 11.
    Blumenstock, J.: Size matters: word count as a measure of quality on Wikipedia. In: 17th International Conference on World Wide Web, pp. 1095–1096 (2008)Google Scholar
  12. 12.
    Mosquera, A., Moreda, P.: Smile: An informality classification tool for helping to assess quality and credibility in web 2.0 texts. In: 6th International AAAI Conference on Weblogs and Social Media (2012)Google Scholar
  13. 13.
    Naumann, F.: From databases to information systems-information quality makes the difference. IBM Almaden Research Center (2001)Google Scholar
  14. 14.
    Adler, B.T., Chatterjee, K., de Alfaro, L., Faella, M., Pye, I., Raman, V.: Assigning trust to Wikipedia content. In: 4th International Symposium on Wikis (2008)Google Scholar
  15. 15.
    Al-Oufi, S., Kim, H.N., Saddik, A.E.: A group trust metric for identifying people of trust in online social networks. Expert Systems with Applications 39(18) (2012)Google Scholar
  16. 16.
    Lumbreras, A., Gavalda, R.: Applying trust metrics based on user interactions to recommendation in social networks. In: International Workshop of Social Knowledge Discovery and Utilization (2012)Google Scholar
  17. 17.
    Ramachandran, S., Paulraj, S., Joseph, S., Ramaraj, V.: Enhanced trustworthy and high-quality information retrieval system for web search engines. International Journal of Computer Science (5) (2009)Google Scholar
  18. 18.
    Ward, J., Leach, J., Creese, S.: Measuring internet threat exposure scoping out a practical approach, metrics special interest group KTN. Technical report (2008)Google Scholar
  19. 19.
    Nurse, J.R.C., Creese, S., Goldsmith, M., Rahman, S.S., Lund, D., Mourikas, G., Price, D.: TEASE Project Deliverable D3.6: Consolidated report on trustworthiness measures and overlay design. Technical report (2013)Google Scholar
  20. 20.
    Agarwal, B.: Programmed Statistics. New Age International Ltd. (2007)Google Scholar
  21. 21.
    Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 2–16 (2000)Google Scholar
  22. 22.
    Gil, Y., Artz, D.: Towards content trust of web resources. Journal of Web Semantics: Science, Services and Agents on the World Wide Web 5(4), 227–239 (2007)CrossRefGoogle Scholar
  23. 23.
    Carrot2: Open Source Search Results Clustering Engine, http://project.carrot2.org
  24. 24.
    Graham, M.: Big data and the end of theory, Guardian News (2012), http://www.guardian.co.uk/news/datablog/2012/mar/09/big-data-theory
  25. 25.
    Nurse, J.R.C., Creese, S., Goldsmith, M., Lamberts, K.: Using information trustworthiness advice in decision-making. In: Socio-Technical Aspects in Security and Trust (STAST) Workshop at 25th IEEE CSF Symposium, pp. 35–42. IEEE (2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Jason R. C. Nurse
    • 1
  • Sadie Creese
    • 1
  • Michael Goldsmith
    • 1
  • Syed Sadiqur Rahman
    • 1
  1. 1.Cyber Security Centre, Department of Computer ScienceUniversity of OxfordOxfordUK

Personalised recommendations