824 resultados para trust graph
Resumo:
Online social networks can be modelled as graphs; in this paper, we analyze the use of graph metrics for identifying users with anomalous relationships to other users. A framework is proposed for analyzing the effectiveness of various graph theoretic properties such as the number of neighbouring nodes and edges, betweenness centrality, and community cohesiveness in detecting anomalous users. Experimental results on real-world data collected from online social networks show that the majority of users typically have friends who are friends themselves, whereas anomalous users’ graphs typically do not follow this common rule. Empirical analysis also shows that the relationship between average betweenness centrality and edges identifies anomalies more accurately than other approaches.
Resumo:
Traffic congestion has a significant impact on the economy and environment. Encouraging the use of multimodal transport (public transport, bicycle, park’n’ride, etc.) has been identified by traffic operators as a good strategy to tackle congestion issues and its detrimental environmental impacts. A multi-modal and multi-objective trip planner provides users with various multi-modal options optimised on objectives that they prefer (cheapest, fastest, safest, etc) and has a potential to reduce congestion on both a temporal and spatial scale. The computation of multi-modal and multi-objective trips is a complicated mathematical problem, as it must integrate and utilize a diverse range of large data sets, including both road network information and public transport schedules, as well as optimising for a number of competing objectives, where fully optimising for one objective, such as travel time, can adversely affect other objectives, such as cost. The relationship between these objectives can also be quite subjective, as their priorities will vary from user to user. This paper will first outline the various data requirements and formats that are needed for the multi-modal multi-objective trip planner to operate, including static information about the physical infrastructure within Brisbane as well as real-time and historical data to predict traffic flow on the road network and the status of public transport. It will then present information on the graph data structures representing the road and public transport networks within Brisbane that are used in the trip planner to calculate optimal routes. This will allow for an investigation into the various shortest path algorithms that have been researched over the last few decades, and provide a foundation for the construction of the Multi-modal Multi-objective Trip Planner by the development of innovative new algorithms that can operate the large diverse data sets and competing objectives.
Resumo:
Trust is widely recognised as one of the key qualities that a successful leader needs to bring about change within their organization. Browning’s study aimed to identify practices which a school leader can effectively use to inspire, build, and maintain trust between themselves, their staff and Chair of governing body. The study was undertaken in two phases. Phase One was the identification of four highly trusted transformational leaders from the Australian independent schooling sector. Phase Two was a multicase study of the four school leaders. The findings provide practical advice for school leaders wishing to have a positive impact on the outcomes of the students in their school.
Resumo:
The main theme of this thesis is to allow the users of cloud services to outsource their data without the need to trust the cloud provider. The method is based on combining existing proof-of-storage schemes with distance-bounding protocols. Specifically, cloud customers will be able to verify the confidentiality, integrity, availability, fairness (or mutual non-repudiation), data freshness, geographic assurance and replication of their stored data directly, without having to rely on the word of the cloud provider.
Resumo:
In this paper, we propose a semi-supervised approach of anomaly detection in Online Social Networks. The social network is modeled as a graph and its features are extracted to detect anomaly. A clustering algorithm is then used to group users based on these features and fuzzy logic is applied to assign degree of anomalous behavior to the users of these clusters. Empirical analysis shows effectiveness of this method.
Resumo:
Due to economic and demographic changes highly educated women play an important role on the Chinese labour market. Gender has been shown to be an important characteristic that influences behaviour in economic experiments, as have, to a lesser degree, academic major, age and income. We provide a study looking at trust and reciprocity and their determinants in a labour market laboratory experiment. Our experimental data is based on two games, the Gift Exchange Game (GEG) and a variant of this game (the Wage Promising Game, WPG) where the employer's wage offer is non-binding and the employer can choose the wage freely after observing the workers effort. We and that women are less trusting and reciprocal than men in the GEG while this cannot be found in the WPG. Letting participants play the GEG and the WPG, allows us to disentangle reciprocal and risk attitudes. While in the employer role, it seems to be that risk attitude is the main factor, this is not confirmed analysing decisions in the worker role.
Resumo:
A people-to-people matching system (or a match-making system) refers to a system in which users join with the objective of meeting other users with the common need. Some real-world examples of these systems are employer-employee (in job search networks), mentor-student (in university social networks), consume-to-consumer (in marketplaces) and male-female (in an online dating network). The network underlying in these systems consists of two groups of users, and the relationships between users need to be captured for developing an efficient match-making system. Most of the existing studies utilize information either about each of the users in isolation or their interaction separately, and develop recommender systems using the one form of information only. It is imperative to understand the linkages among the users in the network and use them in developing a match-making system. This study utilizes several social network analysis methods such as graph theory, small world phenomenon, centrality analysis, density analysis to gain insight into the entities and their relationships present in this network. This paper also proposes a new type of graph called “attributed bipartite graph”. By using these analyses and the proposed type of graph, an efficient hybrid recommender system is developed which generates recommendation for new users as well as shows improvement in accuracy over the baseline methods.
Resumo:
Disagreement within the global science community about the certainty and causes of climate change has led the general public to question what to believe and who to trust on matters related to this issue. This paper reports on qualitative research undertaken with Australian residents from two rural areas to explore their perceptions of climate change and trust in information providers. While overall, residents tended to agree that climate change is a reality, perceptions varied in terms of its causes and how best to address it. Politicians, government, and the media were described as untrustworthy sources of information about climate change, with independent scientists being the most trusted. The vested interests of information providers appeared to be a key reason for their distrust. The findings highlight the importance of improved transparency and consultation with the public when communicating information about climate change and related policies.
Resumo:
In this response to Tom G. K. Bryce and Stephen P. Day’s (Cult Stud Sci Educ. doi:10.1007/s11422-013-9500-0, 2013) original article, I share with them their interest in the teaching of climate change in school science, but I widen it to include other contemporary complex socio-scientific issues that also need to be discussed. I use an alternative view of the relationship between science, technology and society, supported by evidence from both science and society, to suggest science-informed citizens as a more realistic outcome image of school science than the authors’ one of mini-scientists. The intellectual independence of students Bryce and Day assume, and intend for school science, is countered with an active intellectual dependence. It is only in relation to emerging and uncertain scientific contexts that students should be taught about scepticism, but they also need to learn when, and why to trust science as an antidote to the expressions of doubting it. Some suggestions for pedagogies that could lead to these new learnings are made. The very recent fifth report of the IPCC answers many of their concerns about climate change.
Resumo:
There is increasing evidence of a weakened platform of consumer trust in mass produced food products. The resistance shown by consumers to the agro-industrial paradigm is evident in an emergent phase of reflexive consumerism, public reactions to an overly-concentrated retail sector and the rise of alternative food networks such as farmers' markets and organic box schemes. Supermarkets are responding strategically by aiming to manufacture new trust relations with consumers. This paper identifies three key strategies of trust manufacturing: (i) reputational enhancement though the institution of “behind the scenes,” business-to-business private standards; (ii) direct quality claims via private standard certification badges on food products, and ; (iii) discursive claimsmaking through symbolic representations of “authenticity” and “tradition.” Drawing upon the food governance literature and a “visual sociology” of supermarkets and supermarket produce, we highlight how trust is both commoditized and increasingly embedded into the marketing of mass-produced foods.
Resumo:
Purpose This paper examines the relationship between flood exposure and levels of social trust among a cohort of adult men from refugee backgrounds who were affected by the 2011 Queensland floods in Australia. Design/methodology/approach A quantitative questionnaire was administered to 141 men from refugee backgrounds almost two years after the 2011 Queensland floods. The survey was administered in person by trained peer in-terviewers, and included a number of standardised instruments assessing respondents’ so-cio-demographic characteristics, levels of social trust towards and from neighbours, the police, the wider Australian community, and the media, and exposure to and impact of the floods. Multiple logistic regression analyses were used to assess the relationship between flood exposure and social trust adjusting for pre-disaster levels of trust and other potentially confounding variables. Findings Participants with higher levels of flood exposure were significantly more likely to report greater levels of trust both towards and from their neighbours, the wider Australian community, and the media, and they were also more likely to believe that most people can be trusted. Research limitations/implications Although the study reports on data collected two years after the floods, the analysis has adjusted for pre-disaster measures of social trust and other socio-demographic variables. Originality/value Our paper has highlighted the important place of social trust and social capital for refugee communities in a post-disaster setting. Disaster responses that support social capital among marginalised populations are critical to increasing community resilience and supporting recovery.
Resumo:
In this environmental scan of research and policy literature, the authors consider various definitions of trust as they seek to address and inform the hypothesis that ‘a culture of trust enhances performance’ in schools. The discussion draws on the work of the Australian Institute for Teaching and School Leadership in school leadership and research by Caldwell and Harris (2008) to consider ways in which trust is linked to performance in schools and organisations. It explores the concept of trust as a form of capital available to schools, and highlights how successful school leaders work to align trust, strategy and passion in implementing effective change. At the heart of the review is the relationship between trust and school improvement. An adapted model of the elements of a culture of trust developed by Bryk and Schneider in their influential study of trust in school reform in Chicago is used to frame this aspect of the review. The authors identify four essential categories of relationships that enable schools to be described as having a culture of trust. The review concludes with a discussion of the relationship between trust and school governance.
Resumo:
We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.
Resumo:
The purpose of this paper is to describe a new decomposition construction for perfect secret sharing schemes with graph access structures. The previous decomposition construction proposed by Stinson is a recursive method that uses small secret sharing schemes as building blocks in the construction of larger schemes. When the Stinson method is applied to the graph access structures, the number of such “small” schemes is typically exponential in the number of the participants, resulting in an exponential algorithm. Our method has the same flavor as the Stinson decomposition construction; however, the linear programming problem involved in the construction is formulated in such a way that the number of “small” schemes is polynomial in the size of the participants, which in turn gives rise to a polynomial time construction. We also show that if we apply the Stinson construction to the “small” schemes arising from our new construction, both have the same information rate.