Catch me, if you can: The long path from reputation to trust

Size: px
Start display at page:

Download "Catch me, if you can: The long path from reputation to trust"

Transcription

1 Catch me, if you can: The long path from reputation to trust Karl Aberer EPFL joint work with Zoran Despotovic, Le Hung Vu, Thanasis Papaiaonnou 1

2 MOTIVATION 2

3 Trust in Online Systems No trusted authority Selfish behavior Examples Peer-to-peer system Social networks Ecommerce sites Internet gaming 3

4 Selfish Behavior Example P2P: to conserve Own bandwidth Own CPU cycles Freeriding To exploit Greedily consume other s resources... before others can use that opportunity Problem 4

5 Exampleof Selfishness Freeriding in Gnutella [Adar, Hubermann 2000] Cooperation needs to be built: but how? 5

6 Cooperation Based on Trust Trust: the extent to which a peer believes the other peer will cooperate Gain is to be shared with the other peer But the peer is exposed to a risk of loss 6

7 Cooperation Based on Trust Trust: the extent to which a peer believes the other peer will cooperate Gain is to be shared with the other peer But the peer is exposed to a risk of loss 7

8 Cooperation Based on Trust Trust: the extent to which a peer believes the other peer will cooperate Gain is to be shared with the other peer But the peer is exposed to a risk of loss 8

9 Cooperation Based on Trust Trust model: the way in which the above belief is inferred Inference could be: if Bob cooperates with Alice then Bob will also cooperate with me with high probability 9

10 Cooperation Based on Trust Trust model: the way in which the above belief is inferred Inference could be: if B cooperates with C then B will also cooperate with A with high probability 10

11 Cooperation Based on Trust Trust model: the way in which the above belief is inferred Inference could be: if B cooperates with C then B will also cooperate with A with high probability 11

12 Cooperation Based on Trust Trust model: the way in which the above belief is inferred Inference could be: if B cooperates with A then B will also cooperate with C with high probability Reputation-based trust: Inference based on the collective earlier actions of a peer: it s reputation 12

13 Doesitreallymatter? Example: ebay ebay reputation profiles predictive of future performance [Resnick et al., 2002] Prices positively correlated with the feedback [Melnik and Alm, 2002] 13

14 Overview MOTIVATION REPUTATION-BASED TRUST IN ONLINE COMMUNITIES TRUST WITH RATIONAL PEERS TRUST AND IDENTITY CONCLUSIONS 14

15 REPUTATION-BASEDTRUST IN ONLINE COMMUNITIES 15

16 The Path Towards Trust Problem Countermeasure Selfish Behavior Reputation 16

17 On-line Reputation Common characteristics open community: interactions with different parties rarely repeated interactions with the same party Therefore need for recommendations of others possibility to misbehave and misreport 17

18 The Path Towards Trust Problem Countermeasure Selfish Behavior Manipulation of Reports Reputation 18

19 Model Peers provide services to other peers Know other peers they interacted with Store feedback w i on interactions withpeer i Feedback on service and reporting A social network (trust graph) 19

20 Social Networking Approach Computeglobal trust values t j for peer j By aggregating feedbacks Weighting by the trust in the recommender Similar to PageRank computation w 1 w 2 i in ( j ) w 3 peer j t j = w t i = wi i i in ( j) k in( i) t t k [Xiong, Liu TKDE 2004] 20

21 Social Networking Assessment Problems solved 1. Automatic aggregation of reputation data 2. Does not require central authority 3. Possibility of misreporting considered Shortcomings Costly(global) computation Trust values have no further meaning but ranking No distinction between propensity to provide poor service and to misreport 21

22 ProbabilisticEstimation Approach Assume probabilistic peer behavior, eg. P[peer jperforms service honestly] = θ j P[peer klies when reporting] = l k Probabilityof report y k on peer jfrompeer k P [ Y k = y k lk (1 θ j ) + (1 lk ) θ j ] = lkθ j + (1 lk )(1 θ j ) if if y y k k = 1 = 0 peer k l k = 0 report y k = 0 peer j θ j = 0 [Despotovic, Aberer Journal of Computer Networks 2004] 22

23 ProbabilisticEstimation Approach Maximum Likelihood Estimation Determine l k by checking reports on own performance Collect all reports y 1, y 2,, y n on peer j Select θ j that maximizes the probability to obtain the observed reports L θ ) = P [ Y = y ] P [ Y = y ] LP [ Y = ( j n yn ] 23

24 Comparative Evaluation Precision in correctly assessing misbehavior Maximum Likelihood Estimation Social Networking 24

25 ComparingeBay and P2P Differences 1. no centralized authority to manage and verify reputation information 2. possibility to manipulate reports of others Question Which methods do exist for efficiently and automatically managing reputation data in the absence of any centralized infrastructure? 25

26 ImplementationIssues Variant 1: use trust graph as unstructured overlay network Simple maintenance, high cost of retrieval of reports Variant 2: use a separate structured overlay network Complex maintenance, efficient retrieval Additionalproblem: manipulation of stored reports and messages Use replication of reputation data 26

27 ProbabilisticEstimation Assessment Problems solved Efficient trust computation Trust values predict probability of cooperative behavior Distinction between propensity to provide poor service and to misreport Shortcomings Reputation-based trust detects malicious and selfish behaviors (signaling) but does not consider rationality of agents (sanctioning fostering honest behavior) 27

28 The Path Towards Trust Problem Selfish Behavior Manipulation of Reports Strategic Behavior Countermeasure Reputation Reputation of recommenders Computational trust models for signalling 28

29 REPUTATION-BASEDTRUST WITH RATIONAL PEERS 29

30 A Rational Agent Reputation Detection threshold 30

31 Rationality Actions of peers have associated utility Example: prisoners dilemma u 1,u 2 Main insights One shot game: no cooperation (Nash) Repeated game: cooperation tit-for-tat (Axelrod) Common explanation of the concept of trust 31

32 ExtendedModel Model Consumers provide feedback w i on peer i sservice Peer ihas incentiveto cheat: legal gain u i < illegitimate gain u i + v i Peer behavior Honest peers never cheat Malicious peers cheat probabilistically Rational peers optimize their utility [Hung, Aberer WI 2008, TAAS 2010] 32

33 Sanctioning peer i If t=1 and w=0 or t=0 and w=1: Peer i is cheating!!! 3 Most recent feedback w 1 peer i: k cheating detections Evaluate reliability t 2 of feedback w using computational trust model If peer I has less than k cheating detections: ok! 4 Severe sanctioning mechanism! 33

34 ComputationalTrust Model may use several information sources past rating behavior of the rater, past performance of sellers, trusted sources, own belief on environment s vulnerability, relations between peers may use variety of statistical models/heuristics probabilistic approaches, collaborative filtering, similarity of rater and own experience, clustering of ratings to isolate dishonest rater Accuracy measure (known to peers) P[est+ real-] < ε, P[est - real+] < ε 34

35 Trust Accuracyvs. Cooperation Theorem: if computational trust model sufficiently accurate and gains are bounded rational peers cooperate in all but the last Δ transactions. Bounded gains (u * <u<u*, v * <v<v*) 35

36 Incentive to Leave (Δ) Example: For ε< 0.2 and k= 1, 2 peerwill leave for the last 2 transactions accuracy of computational trust model 36

37 Emergence of Cooperation #transactions of an honest seller till mistakenly blacklisted Cooperation is enforced if peers stay infinitely or long enough given εsufficiently small resilient against rating manipulation malicious peers are eliminated Example: For ε= 0.2 and k= 10 peerwill be accidentally blacklisted after 2^22 transactions #cheats of a malicious seller till being eliminated whereas a cheater will be eliminated after 2^3 cheats 37

38 Accuracy-cost Trade-off Presence of high quality dishonesty detector may prevent rating manipulation by rational sellers High accuracy implies higher implementation cost Combine two computational trust models expensive/accurate dishonesty detector with probability c trust the rating with probability 1-c Result With very low crational peers still cooperate 38

39 Sanctioning: Assessment Considering rational behavior Enforces cooperation of rational peers Eliminates malicious peers Permits to optimize computational cost for dishonesty detection Shortcomings Requires shared, secure storage for reputation data Requires stable and global identities (like all other reputation-based trust mechanisms) 39

40 The Path Towards Trust Problem Countermeasure Selfish Behavior Manipulation of Reports Strategic Behavior Whitewashing Reputation Reputation of recommenders Sanctioning 40

41 TRUST AND IDENTITY 41

42 Key Problem The problemof trust isinherentlylinkedto stable identification 42

43 How to prevent whitewashing? Remember: clients on ebay are willing to pay higher prices for reliable seller 8.1% according to a study of [Resnick2006] Can this help? Idea: sellers that stay longer in the system ask for higher prices Makes it unattractive to leave the system for whitewashing Does it work? 43

44 Identity Premium P(L) = u (1 -Ф) + f(l) L lifetime of seller f(0) = 0, f monotonically increasing 0 < Ф < 1, initial price below original price u Price P original price u price P(L) with identity premium Lifetime L 44

45 Cooperation Enforcement Theorem: If the identity costis sufficiently small there exists an identity premium function such that a rational provider will cooperate in every but the last interaction. Bound on identitycostand premium dependson Accuracy of dishonesty detector Potential cheating gain Initial price 45

46 46

47 Example Limit price above original price: Acceptable to buyers? Inefficiency? Limit price below original price: Acceptable to sellers? original price u=1 cheating gain 50% of original price Initalprice0.5 (Ф= 0.5) 47

48 Eliminating Inefficiency If the cheating gain is sufficiently small and the dishonesty detector is sufficiently accurate the price remains bounded and can approach any limit price by properly choosing Ф Thus for a finite number of services this inefficiency can be eliminated For infinite number it can be kept extremely small (order of provisioning a few services) Rationale to accept the scheme Providers: without premium no trade at all Consumers: no risk if providers are rational (provably) 48

49 CONCLUSIONS 49

50 The Path Towards Trust Problem Countermeasure Selfish Behavior Manipulation of Reports Strategic Behavior Whitewashing Reputation Reputation of recommenders Sanctioning Identity Premium 50

51 FromClosedto Open Trust So far trust managedin a closedsystem, but Multiple trust systems Transferrable identity Aggregate reputation from multiple sources Open Web Semantic Web: content-based entities All Web content on Tim-BernersLee Social Web: friend-to-friend authentication Social networks as computing substrate SensorWeb: linkthe web to physicalreality Soft biometrics, GPS, 51

52 New Opportunitiesfor Trust Systems Semantic, Social and SensorWebnot onlyhelp to buildtrust but are alsoin needof trust Semantic Web: is the content trustworthy? Social Web: are my social connections trustworthy? SensorWeb: is the measured data reliable? Trust S 3 W 52

53 Thank you for your attention! and we will continue to keep you busy for a while 53

54 Acknowledgements Work sponsored by Swiss National Science Foundation EU FP 6, projectsdip, Nepomuk NTT Docomo EuroLabs, Munich 54

55 Main Publications [Despotovic, Aberer 04] Z. Despotovic, K. Aberer: "P2P Reputation Management: ProbabilisticEstimation vs. Social Networks", Journal of Computer Networks, SpecialIssue on Management in Peer-to-Peer Systems: Trust, Reputation and Security, Elsevier, 50(4): , [Hung, Aberer 08] Le-Hung Vu, K. Aberer: «Effective Usage of Computational Trust Models in Rational Environments», Web Intelligence Conference (WI-IAT'08), December 9-12, 2008, Sydney, Australia. [Cudre-Mauroux et al 09] P. Cudré-Mauroux, P. Haghani, M. Jost, K. Aberer, H. de Meer: idmesh: graph-based disambiguation of linked data, WWW [Vu, et al 09] L.-H. Vu, T.G. Papaioannou and K. Aberer, Synergies of different reputation systems: challenges and opportunities, Proceedings of the 7th IEEE conference on Privacy, Security and Trust, [Vu, et al 10]L.H. Vu, T.G. Papaioannou and K. Aberer, Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems, Proc. of the 4th IFIP International Conference on Trust Management (IFIPTM 2010),

Reputation-based trust management systems and their applicability to grids

Reputation-based trust management systems and their applicability to grids Reputation-based trust management systems and their applicability to grids Gheorghe Cosmin Silaghi 1, Alvaro E. Arenas 1, Luis Moura Silva 2 1 {g.c.silaghi, a.e.arenas}@rl.ac.uk CCLRC, Rutherford Appleton

More information

Reputation Ontology for Reputation Systems

Reputation Ontology for Reputation Systems Reputation Ontology for Reputation Systems Elizabeth Chang 1, Farookh Khadeer Hussain 1 and Tharam Dillon 2 1 Centre for Extended Enterprise and Business Intelligence and School of Information Systems

More information

Towards Effective and Efficient Behavior-based Trust Models. Klemens Böhm Universität Karlsruhe (TH)

Towards Effective and Efficient Behavior-based Trust Models. Klemens Böhm Universität Karlsruhe (TH) Towards Effective and Efficient Behavior-based Trust Models Universität Karlsruhe (TH) Motivation: Grid Computing in Particle Physics Physicists have designed and implemented services specific to particle

More information

A Reliable Trust Model for Grid Based on Reputation

A Reliable Trust Model for Grid Based on Reputation A Reliable Trust Model for Grid Based on Reputation Vivekananth.p Lecturer-IT Department St Joseph College of Engineering and Technology Dar-Es-Salaam, Tanzania vivek.jubilant@gmail.com Abstract- Grid

More information

Efficiency and Robustness of Binary Online Feedback Mechanisms in Trading Environments with Moral Hazard

Efficiency and Robustness of Binary Online Feedback Mechanisms in Trading Environments with Moral Hazard Efficiency and Robustness of Binary Online Feedback Mechanisms in Trading Environments with Moral Hazard Chris Dellarocas MIT Sloan School of Management dell@mit.edu Introduction and Motivation Outline

More information

Incentive-Compatible Escrow Mechanisms

Incentive-Compatible Escrow Mechanisms Incentive-Compatible Escrow Mechanisms Jens Witkowski Department of Computer Sence Albert-Ludwigs-Universität Freiburg, Germany witkowsk@informatik.uni-freiburg.de Sven Seuken School of Eng. & Applied

More information

Intelligent Agents in Mobile Vehicular Ad-Hoc Networks: Leveraging Trust Modeling Based on Direct Experience with Incentives for Honesty

Intelligent Agents in Mobile Vehicular Ad-Hoc Networks: Leveraging Trust Modeling Based on Direct Experience with Incentives for Honesty 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Intelligent Agents in Mobile Vehicular Ad-Hoc Networks: Leveraging Trust Modeling Based on Direct Experience

More information

Personalized Shopping App with Customer Feedback Mining and Secure Transaction

Personalized Shopping App with Customer Feedback Mining and Secure Transaction Personalized Shopping App with Customer Feedback Mining and Secure Transaction Swati H. Kalmegh, Nutan Dhande Mtech Student, Department of CSE, swatihkalmegh@gmail.com Contact No. 9404725175 Abstract Reputation-based

More information

Edinburgh Research Explorer

Edinburgh Research Explorer Edinburgh Research Explorer User Participation and Honesty in Online Rating Systems: What a Social Network Can Do Citation for published version: Davoust, A & Esfandiari, B 2016, User Participation and

More information

A Game Theoretic Analysis of Blacklisting in Online Data Storage Systems

A Game Theoretic Analysis of Blacklisting in Online Data Storage Systems A Game Theoretic Analysis of Blacklisting in Online Data Storage Systems Bader Ali School of Computer Science McGill University Montreal, QC H3A 2A7, Canada Email: bali2@cs.mcgill.ca Muthucumaru Maheswaran

More information

Aggregating Reputation Feedback

Aggregating Reputation Feedback Aggregating Reputation Feedback Florent Garcin 1, Boi Faltings 1, and Radu Jurca 2 1 Ecole Polytechnique Fédérale de Lausanne (EPFL), Artificial Intelligence Laboratory {florent.garcin,boi.faltings}@epfl.ch

More information

Advanced Topics in Computer Science 2. Networks, Crowds and Markets. Fall,

Advanced Topics in Computer Science 2. Networks, Crowds and Markets. Fall, Advanced Topics in Computer Science 2 Networks, Crowds and Markets Fall, 2012-2013 Prof. Klara Kedem klara@cs.bgu.ac.il Office 110/37 Office hours by email appointment The textbook Chapters from the book

More information

The Economics of E-commerce and Technology. Reputation

The Economics of E-commerce and Technology. Reputation The Economics of E-commerce and Technology Reputation 1 Reputation Reputations are essential with experience goods Where experience good after buying Reputation performs two functions Allow people to learn

More information

Unraveling the Evolution of Defectors in Online Business Games

Unraveling the Evolution of Defectors in Online Business Games > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Unraveling the Evolution of Defectors in Online Business Games Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling

More information

Avoiding Ballot Stuffing in ebay-like Reputation Systems

Avoiding Ballot Stuffing in ebay-like Reputation Systems Avoiding Ballot Stuffing in ebay-like Reputation Systems Rajat Bhattacharjee Stanford University Ashish Goel Stanford University June 6, 2005 Abstract We present a preliminary study on the robustness of

More information

On the Reputation of Agent-based Web Services

On the Reputation of Agent-based Web Services On the Reputation of Agent-based Web Services Babak Khosravifar, Jamal Bentahar, Ahmad Moazin, and Philippe Thiran 2 Concordia University, Canada, 2 University of Namur, Belgium b khosr@encs.concordia.ca,

More information

ENHANCEMENTS TO REPUTATION BASED TRUST MODELS FOR IMPROVED RELIABILITY IN GRID COMPUTING

ENHANCEMENTS TO REPUTATION BASED TRUST MODELS FOR IMPROVED RELIABILITY IN GRID COMPUTING ENHANCEMENTS TO REPUTATION BASED TRUST MODELS FOR IMPROVED RELIABILITY IN GRID COMPUTING SRIVARAMANGAI.P, RENGARAMANUJAM SRINIVASAN Senior Lecturer, Retd.Prof /CSE Dept Botho College, BSA University, Chennai

More information

D ECENTRALIZED V ALUE DISTRIBUTION SYSTEM

D ECENTRALIZED V ALUE DISTRIBUTION SYSTEM D ECENTRALIZED V ALUE DISTRIBUTION SYSTEM FOR B LOCKCHAIN- B ASED A PPLICATIONS Cooperation is a powerful value creating force. Well coordinated groups of individuals can accomplish together much more

More information

REDESIGNING BITCOIN S FEE MARKET arxiv:

REDESIGNING BITCOIN S FEE MARKET arxiv: REDESIGNING BITCOIN S FEE MARKET arxiv:1709.08881 Ron Lavi - Technion Aviv Zohar - Hebrew U. Or Sattath Ben-Gurion U. Scaling Bitcoin 2017 CURRENT FEE MECHANISM IN BITCOIN Miners can only include txs that

More information

CS269I: Incentives in Computer Science Lecture #12: Asymmetric Information and Reputation Systems

CS269I: Incentives in Computer Science Lecture #12: Asymmetric Information and Reputation Systems CS69I: Incentives in Computer Science Lecture #1: Asymmetric Information and Reputation Systems Tim Roughgarden November, 016 1 Preamble Previous lectures have skirted the topic of reputation systems the

More information

Reputation in a simple online market

Reputation in a simple online market Reputation in a simple online market Are feedback systems reliable? Giorgio Delgrosso Valentina Garella Aleksandra Kolndrekaj Simulation models for economics Summary PREFACE...3 1. THE CODE...7 1.1 SETUP

More information

Mechanical Cheat: Spamming Schemes and Adversarial Techniques on Crowdsourcing Platforms

Mechanical Cheat: Spamming Schemes and Adversarial Techniques on Crowdsourcing Platforms Mechanical Cheat: Spamming Schemes and Adversarial Techniques on Crowdsourcing Platforms Djellel Eddine Difallah, Gianluca Demartini, and Philippe Cudré-Mauroux exascale Infolab U. of Fribourg Switzerland

More information

DYNAMIC RESOURCE PRICING ON FEDERATED CLOUDS

DYNAMIC RESOURCE PRICING ON FEDERATED CLOUDS DYNAMIC RESOURCE PRICING ON FEDERATED CLOUDS CCGRID 2010 The 10th IEEE/ACM Intl. Symp. on Cluster, Cloud and Grid Computing Marian Mihailescu Yong Meng Teo Department of Computer Science National University

More information

Targeting Individuals to Catalyze Collective Action in Social Networks

Targeting Individuals to Catalyze Collective Action in Social Networks Targeting Individuals to Catalyze Collective Action in Social Networks Marco A. Janssen 1 1 Center for the Study of Institutional Diversity School of Human Evolution and Social Change Arizona State University

More information

COLLABORATIVE WORKSPACE OVER SERVICE-ORIENTED GRID

COLLABORATIVE WORKSPACE OVER SERVICE-ORIENTED GRID COLLABORATIVE WORKSPACE OVER SERVICE-ORIENTED GRID SHEN ZHIQI Information Communication Institute of Singapore, School of Electrical and Electronic Engineering, Nanyang Technological University, 50 Nanyang

More information

Evolution of Cooperativeness in a Business Game Relying on Acquaintance Based Trustworthiness Assessment

Evolution of Cooperativeness in a Business Game Relying on Acquaintance Based Trustworthiness Assessment Evolution of Cooperativeness in a Business Game Relying on Acquaintance Based Trustworthiness Assessment Sanat Kumar Bista, Keshav Dahal, Peter Cowling AI Research Group University of Bradford Bradford

More information

A Dynamic Trust Network for Autonomy-Oriented Partner Finding

A Dynamic Trust Network for Autonomy-Oriented Partner Finding A Dynamic Trust Network for Autonomy-Oriented Partner Finding Hongjun Qiu Abstract The problem of partner finding is to identify which entities (agents) can provide requested services from a group of entities.

More information

Bayesian Network Based Trust Management

Bayesian Network Based Trust Management Bayesian Network Based Trust Management Yong Wang,2, Vinny Cahill, Elizabeth Gray, Colin Harris, and Lejian Liao 3 Distributed Systems Group, Department of Computer Science, Trinity College Dublin, Dublin

More information

School of Computing Science and Engineering. VIT University, Vellore (Tamilnadu), India.

School of Computing Science and Engineering. VIT University, Vellore (Tamilnadu), India. !"#$!$ E.Sathiyamoorthy 1, N.Ch.Sriman Narayana Iyenger & V.Ramachandran 3 1 School of Information Technology and Engineering, School of Computing Science and Engineering ABSTRACT VIT University, Vellore-6301

More information

FOUR MARKET MODELS. Characteristics of Oligopolies:

FOUR MARKET MODELS. Characteristics of Oligopolies: FOUR MARKET MODELS Perfect Competition Monopolistic Competition Oligopoly Pure Monopoly Characteristics of Oligopolies: A Few Large Producers (Less than 10) Identical or Differentiated Products High Barriers

More information

ECONOMIC MACHINE LEARNING FOR FRAUD DETECTION

ECONOMIC MACHINE LEARNING FOR FRAUD DETECTION ECONOMIC MACHINE LEARNING FOR FRAUD DETECTION Maytal Saar-Tsechansky 2015 UT CID Report #1511 This UT CID research was supported in part by the following organizations: identity.utexas.edu ECONOMIC MACHINE

More information

Why We Can t Be Bothered to Read Privacy Policies: Models of Privacy Economics as a Lemons Market

Why We Can t Be Bothered to Read Privacy Policies: Models of Privacy Economics as a Lemons Market Why We Can t Be Bothered to Read Privacy Policies: Models of Privacy Economics as a Lemons Market Tony Vila Rachel Greenstadt David Molnar Harvard University May 29, 2003 1 Motivation People claim valuation

More information

Reputation Mechanisms

Reputation Mechanisms Reputation Mechanisms Elodie Fourquet efourque@cgl.uwaterloo.ca University of Waterloo Abstract. With the internet, exchanges, transactions and collaborative work have multiplied, because the internet

More information

Games and Strategic Behavior. Chapter 9. McGraw-Hill/Irwin. Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved.

Games and Strategic Behavior. Chapter 9. McGraw-Hill/Irwin. Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Games and Strategic Behavior Chapter 9 McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Learning Objectives 1. List the three basic elements of a game. Recognize

More information

Recommendation-based trust model in P2P network environment

Recommendation-based trust model in P2P network environment Recommendation-based trust model in P2P network environment Yueju Lei, Guangxi Chen (Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology, Guilin 541004, China) chgx@guet.edu.cn,

More information

To trust or to control

To trust or to control To trust or to control Informal value transfer systems and computational analysis in institutional economics Claudius Gräbner a and Wolfram Elsner b January 7, 2018 a: Institute for the Comprehensive Analysis

More information

A Method for User Data Protection Based on Game Theory in Cloud Computing

A Method for User Data Protection Based on Game Theory in Cloud Computing , pp.16-22 http://dx.doi.org/10.14257/astl.2017.143.04 A Method for User Data Protection Based on Game Theory in Cloud Computing Xiaohui Li 1, Feng Liu 2, Hongxing Liang 3 1 College of Electrical and Information

More information

A comparison of reputation-based trust systems

A comparison of reputation-based trust systems Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2005 A comparison of reputation-based trust systems John Folkerts Follow this and additional works at: http://scholarworks.rit.edu/theses

More information

The Dynamics of Seller Reputation: Appendix

The Dynamics of Seller Reputation: Appendix The Dynamics of Seller Reputation: Appendix Luís Cabral New York University and CEPR Ali Hortaçsu University of Chicago and NBER July 2008 Abstract This appendix complements our paper The Dynamics of Seller

More information

Over-contribution in discretionary databases

Over-contribution in discretionary databases Over-contribution in discretionary databases Mike Klaas University of British Columbia klaas@cs.ubc.ca Abstract Interest in the study of discretionary databases has grown as numerous large-scale public

More information

Decision Support Systems

Decision Support Systems Decision Support Systems 66 (2014) 102 113 Contents lists available at ScienceDirect Decision Support Systems journal homepage: www.elsevier.com/locate/dss Filtering trust opinions through reinforcement

More information

International Vendors and Trust in Electronic Auctions

International Vendors and Trust in Electronic Auctions International Vendors and Trust in Electronic Auctions Michael Hergert, San Diego State University, San Diego, California, USA ABSTRACT The rise of electronic auctions is a major change in person-to-person

More information

Customer Experience Transformation for Growth

Customer Experience Transformation for Growth Customer Experience Transformation for Growth Bill Demakakos, Director Strategy, Customer & Operations 27 March 207 Context: We are in the age of the customer 900 960 990 200 Age of manufacturing Mass

More information

Social Networks: Service Selection and Recommendation

Social Networks: Service Selection and Recommendation Social Networks: Service Selection and Recommendation Jebrin Al-Sharawneh Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Information Systems) Faculty of Engineering

More information

Are you Capitalizing on the New Automotive Shopper Journey?

Are you Capitalizing on the New Automotive Shopper Journey? Are you Capitalizing on the New Automotive Shopper Journey? 1 Executive Summary In 2015, the U.S. auto market set a sales record of just under 17.5 million vehicles, according to PwC. While the size of

More information

Accenture Insurance. Creating Value in the Independent Agency Channel

Accenture Insurance. Creating Value in the Independent Agency Channel Accenture Insurance Creating Value in the Independent Agency Channel Reports of my death are greatly exaggerated. Akin to Mark Twain s infamous quote, rumors of the agency distribution channel in personal

More information

Incentives in Crowdsourcing: A Game-theoretic Approach

Incentives in Crowdsourcing: A Game-theoretic Approach Incentives in Crowdsourcing: A Game-theoretic Approach ARPITA GHOSH Cornell University NIPS 2013 Workshop on Crowdsourcing: Theory, Algorithms, and Applications Incentives in Crowdsourcing: A Game-theoretic

More information

The Prediction of Trust Rating Based on the Quality of Services Using Fuzzy Linear Regression

The Prediction of Trust Rating Based on the Quality of Services Using Fuzzy Linear Regression The Prediction of Trust Rating Based on the Quality of Services Using Fuzzy Linear Regression M. Hadi Mashinchi, Lei Li, Mehmet A. Orgun, and Yan Wang Department of Computing Macquarie University Sydney,

More information

Crowe Caliber. Using Technology to Enhance AML Model Risk Management Programs and Automate Model Calibration. Audit Tax Advisory Risk Performance

Crowe Caliber. Using Technology to Enhance AML Model Risk Management Programs and Automate Model Calibration. Audit Tax Advisory Risk Performance Crowe Caliber Using Technology to Enhance AML Model Risk Management Programs and Automate Model Calibration Audit Tax Advisory Risk Performance The Unique Alternative to the Big Four Crowe Caliber: Using

More information

Perfectly competitive markets: Efficiency and distribution

Perfectly competitive markets: Efficiency and distribution Perfectly competitive markets: Efficiency and distribution By Fernando del Río Assistant Professor, University of Santiago de Compostela Introduction Free markets have been the main mechanism used to allocate

More information

The Emergence of Trust Networks under Uncertainty Implications for Internet Interactions

The Emergence of Trust Networks under Uncertainty Implications for Internet Interactions Analyse & Kritik 28/2004 ( c Lucius & Lucius, Stuttgart) p. xxx xxx Coye Cheshire/Karen S. Cook The Emergence of Trust Networks under Uncertainty Implications for Internet Interactions Abstract: Computer-mediated

More information

Maintaining good Seller performance on Amazon for successful Christmas sales

Maintaining good Seller performance on Amazon for successful Christmas sales Maintaining good Seller performance on Amazon for successful Christmas sales Why a good Seller performance matters Good customer experience: - Positive feedback - Loyalty - Positive word-of mouth (more

More information

Chapter 15 Oligopoly

Chapter 15 Oligopoly Goldwasser AP Microeconomics Chapter 15 Oligopoly BEFORE YOU READ THE CHAPTER Summary This chapter explores oligopoly, a market structure characterized by a few firms producing a product that mayor may

More information

We ve come a long way... Meeting in Grand Central. We are immersed in connectivity. The Living Matrix: Creating the Future of Events

We ve come a long way... Meeting in Grand Central. We are immersed in connectivity. The Living Matrix: Creating the Future of Events We ve come a long way... The Living Matrix: Creating the Future of Events (Including: Building Strategic Alliances) Ross Dawson CEO, Advanced Human Technologies Author, Living Networks and Developing Knowledge-Based

More information

Analytic Preliminaries for Social Acceptability of Legal Norms &

Analytic Preliminaries for Social Acceptability of Legal Norms & Analytic Preliminaries for Social Acceptability of John Asker February 7, 2013 Yale Law School Roadmap Build on case studies of environments where extra-legal norms are at least as important as formal

More information

Game theory (Sections )

Game theory (Sections ) Game theory (Sections 17.5-17.6) Game theory Game theory deals with systems of interacting agents where the outcome for an agent depends on the actions of all the other agents Applied in sociology, politics,

More information

Interactive Reputation Systems

Interactive Reputation Systems Bus Inf Syst Eng DOI 10.1007/s12599-017-0493-1 RESEARCH PAPER Interactive Reputation Systems How to Cope with Malicious Behavior in Feedback Mechanisms Johannes Sänger Günther Pernul Received: 19 February

More information

Cooperation Without Enforcement? A comparative analysis of litigation and online reputation as quality assurance mechanisms

Cooperation Without Enforcement? A comparative analysis of litigation and online reputation as quality assurance mechanisms Cooperation Without Enforcement? A comparative analysis of litigation and online reputation as quality assurance mechanisms Yannis Bakos * Stern School of Business New York University New York, NY 00 Chrysanthos

More information

PREDICTIVE INTELLIGENCE SECURITY, PRIVACY, AND ARCHITECTURE

PREDICTIVE INTELLIGENCE SECURITY, PRIVACY, AND ARCHITECTURE PREDICTIVE INTELLIGENCE SECURITY, PRIVACY, AND ARCHITECTURE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers.

More information

1. Search, for finding individual or sets of documents and files

1. Search, for finding individual or sets of documents and files WHITE PAPER TURNING UNSTRUCTURED TEXT INTO INSIGHT Extending Business Intelligence With Text Analysis and Search EXECUTIVE SUMMARY While traditional business intelligence (BI) has transformed business

More information

Robust Multi-unit Auction Protocol against False-name Bids

Robust Multi-unit Auction Protocol against False-name Bids 17th International Joint Conference on Artificial Intelligence (IJCAI-2001) Robust Multi-unit Auction Protocol against False-name Bids Makoto Yokoo, Yuko Sakurai, and Shigeo Matsubara NTT Communication

More information

Principles of Economics: Seminar 1 - Game Theory

Principles of Economics: Seminar 1 - Game Theory Principles of Economics: Seminar 1 - Game Theory July 18, 2017 Principles of Economics: Seminar 1 - Game Theory July 18, 2017 1 / 20 What is a game? Definition: A game is any situation involving two or

More information

Pranav Tank, Darshan Upadhyay, Kunal Khimani Asst. Professor, I.T. Department, VVP Engineering College, Rajkot, Gujarat, India ABSTRACT

Pranav Tank, Darshan Upadhyay, Kunal Khimani Asst. Professor, I.T. Department, VVP Engineering College, Rajkot, Gujarat, India ABSTRACT 2018 IJSRSET Volume 4 Issue 2 Print ISSN: 2395-1990 Online ISSN : 2394-4099 National Conference on Advanced Research Trends in Information and Computing Technologies (NCARTICT-2018), Department of IT,

More information

ABSTRACT. CHIVUKULA, SRIVATSA V. Evolution of Trust in Anonymous Interactions. (Under the direction of Munindar P. Singh).

ABSTRACT. CHIVUKULA, SRIVATSA V. Evolution of Trust in Anonymous Interactions. (Under the direction of Munindar P. Singh). ABSTRACT CHIVUKULA, SRIVATSA V. Evolution of Trust in Anonymous Interactions. (Under the direction of Munindar P. Singh). For many applications, the success of multiagent systems depends on cooperation

More information

1 Designing Reputation Systems for the Social Web

1 Designing Reputation Systems for the Social Web 1 Designing Reputation Systems for the Social Web Chrysanthos Dellarocas How can online reputation systems be designed to meet the needs of both users and system designers? Chrysanthos Dellarocas looks

More information

A Knowledge Market Prototype: From Conception to Execution

A Knowledge Market Prototype: From Conception to Execution A Knowledge Market Prototype: From Conception to Execution Prof. Dr.-Ing. Wolfgang Maass Faculty of Digital Media & Research Center for Intelligent Media, Furtwangen University http://im.dm.hs-furtwangen.de

More information

First impressions on the Revised US and UK Merger Guidelines

First impressions on the Revised US and UK Merger Guidelines GRC Conference, 29th September, Brussels First impressions on the Revised US and UK Merger Guidelines Damien Neven* Chief Competition Economist DG COMP, European Commission *The views expressed are my

More information

Oligopoly. Quantity Price(per year) 0 $120 2,000 $100 4,000 $80 6,000 $60 8,000 $40 10,000 $20 12,000 $0

Oligopoly. Quantity Price(per year) 0 $120 2,000 $100 4,000 $80 6,000 $60 8,000 $40 10,000 $20 12,000 $0 Oligopoly 1. Markets with only a few sellers, each offering a product similar or identical to the others, are typically referred to as a. monopoly markets. b. perfectly competitive markets. c. monopolistically

More information

PATROL: a comprehensive reputation-based trust model. Ayman Tajeddine, Ayman Kayssi, Ali Chehab* and Hassan Artail

PATROL: a comprehensive reputation-based trust model. Ayman Tajeddine, Ayman Kayssi, Ali Chehab* and Hassan Artail 108 Int. J. Internet Technology and Secured Transactions, Vol. 1, Nos. 1/2, 2007 PATROL: a comprehensive reputation-based trust model Ayman Tajeddine, Ayman Kayssi, Ali Chehab* and Hassan Artail Electrical

More information

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER ARRIVAL OF GDPR IN 2018 The European Union (EU) General Data Protection Regulation (GDPR), which takes effect in 2018, will bring changes

More information

CONTRACTING WITH UNCERTAIN LEVEL OF TRUST

CONTRACTING WITH UNCERTAIN LEVEL OF TRUST Computational Intelligence, Volume 18, Number 4, 2002 CONTRACTING WITH UNCERTAIN LEVEL OF TRUST SVIATOSLAV BRAYNOV Department of Computer Science and Engineering, State University of New York at Buffalo,

More information

How Much Do You Want to Pay? Prosocial Motivations, Reciprocity, and Self- Interest in El Trato

How Much Do You Want to Pay? Prosocial Motivations, Reciprocity, and Self- Interest in El Trato How Much Do You Want to Pay? Prosocial Motivations, Reciprocity, and Self- Interest in El Trato F. J. León-Medina J. A. Noguera J. Tena-Sánchez Universitat Autònoma de Barcelona Department of Sociology

More information

Adding Next Best Action To Personalize Interactions For Known Customers Then Creating Cognitive Customer Centric Interactions

Adding Next Best Action To Personalize Interactions For Known Customers Then Creating Cognitive Customer Centric Interactions Adding Next Best Action To Personalize Interactions For Known Customers Then Creating Cognitive Customer Centric Interactions Steven Pinchuk WW Lead Customer Intelligence & Revenue Management Advanced

More information

Social Media: A Cautionary Tale

Social Media: A Cautionary Tale Michael Gotta Principal Analyst mgotta@burtongroup.com mikeg.typepad.com Alice Wang Director alice.wang@gartner.com Social Media: A Cautionary Tale Wednesday May 5, 2010 www.burtongroup.com All Contents

More information

Lecture 11 Imperfect Competition

Lecture 11 Imperfect Competition Lecture 11 Imperfect Competition Business 5017 Managerial Economics Kam Yu Fall 2013 Outline 1 Introduction 2 Monopolistic Competition 3 Oligopoly Modelling Reality The Stackelberg Leadership Model Collusion

More information

INTEGRATING THE MECHANISM OF THREE-PART TARIFFS PRICING TO THE PROVISION OF INTRA-SITE SEARCH ENGINE ADVERTISING SERVICES

INTEGRATING THE MECHANISM OF THREE-PART TARIFFS PRICING TO THE PROVISION OF INTRA-SITE SEARCH ENGINE ADVERTISING SERVICES INTEGRATING THE MECHANISM OF THREE-PART TARIFFS PRICING TO THE PROVISION OF INTRA-SITE SEARCH ENGINE ADVERTISING SERVICES Pei Li, School of Economic Information Engineering, Southwestern University of

More information

Uncovering Leadership Blind Spots

Uncovering Leadership Blind Spots Uncovering Leadership Blind Spots And Discovering the Pathway to Motivating Your Employees ISO-404-PD-EV-0913-V1.0 Agenda Study Results: Cross-Cultural Leadership Identify key leadership characteristics

More information

Measuring digital advertising revenue to infringing sites

Measuring digital advertising revenue to infringing sites Measuring digital advertising revenue to infringing sites TAG US benchmarking study September 2017 Executive summary Digital advertising has grown at a significant pace over the past several years. Although

More information

Enterprise Risk Management: Developing a Model for Organizational Success. White Paper

Enterprise Risk Management: Developing a Model for Organizational Success. White Paper Enterprise Risk Management: Developing a Model for Organizational Success White Paper January 2009 Overview Less than a decade ago, Enterprise Risk Management (ERM) was an unfamiliar concept. Today, the

More information

CYCLE 1: DEFINING LEAD FIRMS AND PRINCIPLES OF FACILITATION

CYCLE 1: DEFINING LEAD FIRMS AND PRINCIPLES OF FACILITATION WORKING PAPER CYCLE 1: DEFINING LEAD FIRMS AND PRINCIPLES OF FACILITATION AUGUST 2008 About this Document This technical brief is the first in a series being produced by the FIELD Facilitation Working

More information

Making Marketing Smarter with Analytics

Making Marketing Smarter with Analytics Making Marketing Smarter with Analytics Prof. Francisco N. de los Reyes Analytics Advisor Thakral One Measurement and Data Science University of the Philippines School of Statistics Big Data Demographics

More information

Chapter 1: The Next Transition. Chapter 1. The Next Transition

Chapter 1: The Next Transition. Chapter 1. The Next Transition Chapter 1: The Next Transition 1 Chapter 1 The Next Transition! CONTINUING TO GROW! Congratulations! You have completed the Relationship Phase of the Helpathy Group program and are now ready to embark

More information

Reputation in Export Markets: Implications for Firms Capabilities and Policy. Rocco Macchiavello Warwick University. BRAC-IGC-iiG Conference

Reputation in Export Markets: Implications for Firms Capabilities and Policy. Rocco Macchiavello Warwick University. BRAC-IGC-iiG Conference Reputation in Export Markets: Implications for Firms Capabilities and Policy Rocco Macchiavello Warwick University BRAC-IGC-iiG Conference March, 27-28 th 2011 E-mail: r.macchiavello@warwick.ac.uk Introduction

More information

Transformation confidence Helping you get closer to your transformation programme

Transformation confidence Helping you get closer to your transformation programme www.pwc.com/riskassurance Transformation confidence Helping you get closer to your transformation programme The executive summary series paper No.4 Most senior executives will only ever sponsor one or

More information

Decentralised Currencies Are Probably Impossible

Decentralised Currencies Are Probably Impossible Decentralised Currencies Are Probably Impossible But Let s At Least Make Them Efficient Ben Laurie (ben@links.org) Tue Jul 05 09:22:21 2011 +0100 (19:483a5782de61) 1 Abstract Lately, there s been a good

More information

EC493f Review Sheet 1

EC493f Review Sheet 1 Econ 493f Law and Economics Spring 2017 1 Identify and/or Define: a. Codex of Hammurabi l. Dominant Strategy b. Marginal Cost m. Nash Equilibrium c. Net Benefit n. Optimal Crime Rate d. Expected Penalty

More information

Trust-Networks in Recommender Systems

Trust-Networks in Recommender Systems San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research 2008 Trust-Networks in Recommender Systems Kristen Mori San Jose State University Follow this and additional

More information

FROM BEST PRACTICES TO NEXT PRACTICES: THIRD IN A FOUR PART SERIES

FROM BEST PRACTICES TO NEXT PRACTICES: THIRD IN A FOUR PART SERIES PERFORMANCE LEADERSHIP SERIES NUMBER GAMES: MAKING SURE METRICS DRIVE THE RIGHT BEHAVIOR FROM BEST PRACTICES TO NEXT PRACTICES: THIRD IN A FOUR PART SERIES by Frank Buytendijk, Beingfrank Research September

More information

Reputation Mechanisms

Reputation Mechanisms Reputation Mechanisms Chrysanthos Dellarocas R. H. Smith School of Business University of Maryland College Park, MD 20742 cdell@rhsmith.umd.edu June 2005 Revised: August 2005 Abstract Reputation mechanisms

More information

Lecture #18: Electronic Currencies. Prof. Dr. Sven Seuken

Lecture #18: Electronic Currencies. Prof. Dr. Sven Seuken Lecture #18: Electronic Currencies Prof. Dr. Sven Seuken 24.5.2012 Housekeeping Guest: David C. Parkes: Talk today: 17:15-18:15 (IfI Kolloquium) Mechanism Design for Kidney Exchange Exam topics + questions

More information

Mercedes CS2000 Fault Code Service Reset Scan Baum Tool

Mercedes CS2000 Fault Code Service Reset Scan Baum Tool Page 1 of 7 Listed in category: ebay Motors > Parts & Accessories > Automotive Tools > Diagnostic Tools / Equipment Mercedes CS2000 Fault Code Service Reset Scan Baum Tool alkyracer101 ( 9366 ) Item: 110622174843

More information

Cheap talk communication with dynamic information searching

Cheap talk communication with dynamic information searching DOI 6/s464-6-2332- RESEARCH Open Access Cheap talk communication with dynamic information searching Yongjie Zhang, Yuechen Liu and Xu Feng * *Correspondence: fengxu@ tju.edu.cn Yongjie Zhang, Yuechen Liu

More information

Billing Strategies for. Innovative Business Models

Billing Strategies for. Innovative Business Models Billing Strategies for Innovative Business Models How Boring Old Billing Could Be the Competitive Advantage You Never Knew You Had Billing Strategies for Innovative Business Models Page: 1 Introduction

More information

Our Commitments. Living our vision and values

Our Commitments. Living our vision and values Our Commitments Living our vision and values CEO Message Our vision is to excel at securing and enhancing the financial wellbeing of people, businesses and communities. It recognises the important role

More information

Trust-Based Collaborative Filtering

Trust-Based Collaborative Filtering Trust-Based Collaborative Filtering Neal Lathia, Stephen Hailes, Licia Capra Abstract k-nearest neighbour (knn) collaborative filtering (CF), the widely successful algorithm supporting recommender systems,

More information

Why All Leads Are Not Created Equal

Why All Leads Are Not Created Equal INDUSTRY INSIGHTS Why All Leads Are Not Created Equal How do you assess differences in lead quality when all leads come in the same format with the same info? It s easy to look at paid demand gen through

More information

The value of contributions in discretionary databases

The value of contributions in discretionary databases The value of contributions in discretionary databases Mike Klaas University of British Columbia klaas@cs.ubc.ca Abstract Interest in the study of discretionary databases has grown as numerous large-scale

More information

Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework

Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework , pp.53-70 http://dx.doi.org/10.14257/ijgdc.2014.7.6.05 Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework Yongzhi Wang 1, Jinpeng Wei 2 and Yucong Duan 3 1,2 Floridia

More information

Competitive Markets. Jeffrey Ely. January 13, This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License.

Competitive Markets. Jeffrey Ely. January 13, This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License. January 13, 2010 This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License. Profit Maximizing Auctions Last time we saw that a profit maximizing seller will choose

More information