Catch me, if you can: The long path from reputation to trust
|
|
- Albert Thornton
- 6 years ago
- Views:
Transcription
1 Catch me, if you can: The long path from reputation to trust Karl Aberer EPFL joint work with Zoran Despotovic, Le Hung Vu, Thanasis Papaiaonnou 1
2 MOTIVATION 2
3 Trust in Online Systems No trusted authority Selfish behavior Examples Peer-to-peer system Social networks Ecommerce sites Internet gaming 3
4 Selfish Behavior Example P2P: to conserve Own bandwidth Own CPU cycles Freeriding To exploit Greedily consume other s resources... before others can use that opportunity Problem 4
5 Exampleof Selfishness Freeriding in Gnutella [Adar, Hubermann 2000] Cooperation needs to be built: but how? 5
6 Cooperation Based on Trust Trust: the extent to which a peer believes the other peer will cooperate Gain is to be shared with the other peer But the peer is exposed to a risk of loss 6
7 Cooperation Based on Trust Trust: the extent to which a peer believes the other peer will cooperate Gain is to be shared with the other peer But the peer is exposed to a risk of loss 7
8 Cooperation Based on Trust Trust: the extent to which a peer believes the other peer will cooperate Gain is to be shared with the other peer But the peer is exposed to a risk of loss 8
9 Cooperation Based on Trust Trust model: the way in which the above belief is inferred Inference could be: if Bob cooperates with Alice then Bob will also cooperate with me with high probability 9
10 Cooperation Based on Trust Trust model: the way in which the above belief is inferred Inference could be: if B cooperates with C then B will also cooperate with A with high probability 10
11 Cooperation Based on Trust Trust model: the way in which the above belief is inferred Inference could be: if B cooperates with C then B will also cooperate with A with high probability 11
12 Cooperation Based on Trust Trust model: the way in which the above belief is inferred Inference could be: if B cooperates with A then B will also cooperate with C with high probability Reputation-based trust: Inference based on the collective earlier actions of a peer: it s reputation 12
13 Doesitreallymatter? Example: ebay ebay reputation profiles predictive of future performance [Resnick et al., 2002] Prices positively correlated with the feedback [Melnik and Alm, 2002] 13
14 Overview MOTIVATION REPUTATION-BASED TRUST IN ONLINE COMMUNITIES TRUST WITH RATIONAL PEERS TRUST AND IDENTITY CONCLUSIONS 14
15 REPUTATION-BASEDTRUST IN ONLINE COMMUNITIES 15
16 The Path Towards Trust Problem Countermeasure Selfish Behavior Reputation 16
17 On-line Reputation Common characteristics open community: interactions with different parties rarely repeated interactions with the same party Therefore need for recommendations of others possibility to misbehave and misreport 17
18 The Path Towards Trust Problem Countermeasure Selfish Behavior Manipulation of Reports Reputation 18
19 Model Peers provide services to other peers Know other peers they interacted with Store feedback w i on interactions withpeer i Feedback on service and reporting A social network (trust graph) 19
20 Social Networking Approach Computeglobal trust values t j for peer j By aggregating feedbacks Weighting by the trust in the recommender Similar to PageRank computation w 1 w 2 i in ( j ) w 3 peer j t j = w t i = wi i i in ( j) k in( i) t t k [Xiong, Liu TKDE 2004] 20
21 Social Networking Assessment Problems solved 1. Automatic aggregation of reputation data 2. Does not require central authority 3. Possibility of misreporting considered Shortcomings Costly(global) computation Trust values have no further meaning but ranking No distinction between propensity to provide poor service and to misreport 21
22 ProbabilisticEstimation Approach Assume probabilistic peer behavior, eg. P[peer jperforms service honestly] = θ j P[peer klies when reporting] = l k Probabilityof report y k on peer jfrompeer k P [ Y k = y k lk (1 θ j ) + (1 lk ) θ j ] = lkθ j + (1 lk )(1 θ j ) if if y y k k = 1 = 0 peer k l k = 0 report y k = 0 peer j θ j = 0 [Despotovic, Aberer Journal of Computer Networks 2004] 22
23 ProbabilisticEstimation Approach Maximum Likelihood Estimation Determine l k by checking reports on own performance Collect all reports y 1, y 2,, y n on peer j Select θ j that maximizes the probability to obtain the observed reports L θ ) = P [ Y = y ] P [ Y = y ] LP [ Y = ( j n yn ] 23
24 Comparative Evaluation Precision in correctly assessing misbehavior Maximum Likelihood Estimation Social Networking 24
25 ComparingeBay and P2P Differences 1. no centralized authority to manage and verify reputation information 2. possibility to manipulate reports of others Question Which methods do exist for efficiently and automatically managing reputation data in the absence of any centralized infrastructure? 25
26 ImplementationIssues Variant 1: use trust graph as unstructured overlay network Simple maintenance, high cost of retrieval of reports Variant 2: use a separate structured overlay network Complex maintenance, efficient retrieval Additionalproblem: manipulation of stored reports and messages Use replication of reputation data 26
27 ProbabilisticEstimation Assessment Problems solved Efficient trust computation Trust values predict probability of cooperative behavior Distinction between propensity to provide poor service and to misreport Shortcomings Reputation-based trust detects malicious and selfish behaviors (signaling) but does not consider rationality of agents (sanctioning fostering honest behavior) 27
28 The Path Towards Trust Problem Selfish Behavior Manipulation of Reports Strategic Behavior Countermeasure Reputation Reputation of recommenders Computational trust models for signalling 28
29 REPUTATION-BASEDTRUST WITH RATIONAL PEERS 29
30 A Rational Agent Reputation Detection threshold 30
31 Rationality Actions of peers have associated utility Example: prisoners dilemma u 1,u 2 Main insights One shot game: no cooperation (Nash) Repeated game: cooperation tit-for-tat (Axelrod) Common explanation of the concept of trust 31
32 ExtendedModel Model Consumers provide feedback w i on peer i sservice Peer ihas incentiveto cheat: legal gain u i < illegitimate gain u i + v i Peer behavior Honest peers never cheat Malicious peers cheat probabilistically Rational peers optimize their utility [Hung, Aberer WI 2008, TAAS 2010] 32
33 Sanctioning peer i If t=1 and w=0 or t=0 and w=1: Peer i is cheating!!! 3 Most recent feedback w 1 peer i: k cheating detections Evaluate reliability t 2 of feedback w using computational trust model If peer I has less than k cheating detections: ok! 4 Severe sanctioning mechanism! 33
34 ComputationalTrust Model may use several information sources past rating behavior of the rater, past performance of sellers, trusted sources, own belief on environment s vulnerability, relations between peers may use variety of statistical models/heuristics probabilistic approaches, collaborative filtering, similarity of rater and own experience, clustering of ratings to isolate dishonest rater Accuracy measure (known to peers) P[est+ real-] < ε, P[est - real+] < ε 34
35 Trust Accuracyvs. Cooperation Theorem: if computational trust model sufficiently accurate and gains are bounded rational peers cooperate in all but the last Δ transactions. Bounded gains (u * <u<u*, v * <v<v*) 35
36 Incentive to Leave (Δ) Example: For ε< 0.2 and k= 1, 2 peerwill leave for the last 2 transactions accuracy of computational trust model 36
37 Emergence of Cooperation #transactions of an honest seller till mistakenly blacklisted Cooperation is enforced if peers stay infinitely or long enough given εsufficiently small resilient against rating manipulation malicious peers are eliminated Example: For ε= 0.2 and k= 10 peerwill be accidentally blacklisted after 2^22 transactions #cheats of a malicious seller till being eliminated whereas a cheater will be eliminated after 2^3 cheats 37
38 Accuracy-cost Trade-off Presence of high quality dishonesty detector may prevent rating manipulation by rational sellers High accuracy implies higher implementation cost Combine two computational trust models expensive/accurate dishonesty detector with probability c trust the rating with probability 1-c Result With very low crational peers still cooperate 38
39 Sanctioning: Assessment Considering rational behavior Enforces cooperation of rational peers Eliminates malicious peers Permits to optimize computational cost for dishonesty detection Shortcomings Requires shared, secure storage for reputation data Requires stable and global identities (like all other reputation-based trust mechanisms) 39
40 The Path Towards Trust Problem Countermeasure Selfish Behavior Manipulation of Reports Strategic Behavior Whitewashing Reputation Reputation of recommenders Sanctioning 40
41 TRUST AND IDENTITY 41
42 Key Problem The problemof trust isinherentlylinkedto stable identification 42
43 How to prevent whitewashing? Remember: clients on ebay are willing to pay higher prices for reliable seller 8.1% according to a study of [Resnick2006] Can this help? Idea: sellers that stay longer in the system ask for higher prices Makes it unattractive to leave the system for whitewashing Does it work? 43
44 Identity Premium P(L) = u (1 -Ф) + f(l) L lifetime of seller f(0) = 0, f monotonically increasing 0 < Ф < 1, initial price below original price u Price P original price u price P(L) with identity premium Lifetime L 44
45 Cooperation Enforcement Theorem: If the identity costis sufficiently small there exists an identity premium function such that a rational provider will cooperate in every but the last interaction. Bound on identitycostand premium dependson Accuracy of dishonesty detector Potential cheating gain Initial price 45
46 46
47 Example Limit price above original price: Acceptable to buyers? Inefficiency? Limit price below original price: Acceptable to sellers? original price u=1 cheating gain 50% of original price Initalprice0.5 (Ф= 0.5) 47
48 Eliminating Inefficiency If the cheating gain is sufficiently small and the dishonesty detector is sufficiently accurate the price remains bounded and can approach any limit price by properly choosing Ф Thus for a finite number of services this inefficiency can be eliminated For infinite number it can be kept extremely small (order of provisioning a few services) Rationale to accept the scheme Providers: without premium no trade at all Consumers: no risk if providers are rational (provably) 48
49 CONCLUSIONS 49
50 The Path Towards Trust Problem Countermeasure Selfish Behavior Manipulation of Reports Strategic Behavior Whitewashing Reputation Reputation of recommenders Sanctioning Identity Premium 50
51 FromClosedto Open Trust So far trust managedin a closedsystem, but Multiple trust systems Transferrable identity Aggregate reputation from multiple sources Open Web Semantic Web: content-based entities All Web content on Tim-BernersLee Social Web: friend-to-friend authentication Social networks as computing substrate SensorWeb: linkthe web to physicalreality Soft biometrics, GPS, 51
52 New Opportunitiesfor Trust Systems Semantic, Social and SensorWebnot onlyhelp to buildtrust but are alsoin needof trust Semantic Web: is the content trustworthy? Social Web: are my social connections trustworthy? SensorWeb: is the measured data reliable? Trust S 3 W 52
53 Thank you for your attention! and we will continue to keep you busy for a while 53
54 Acknowledgements Work sponsored by Swiss National Science Foundation EU FP 6, projectsdip, Nepomuk NTT Docomo EuroLabs, Munich 54
55 Main Publications [Despotovic, Aberer 04] Z. Despotovic, K. Aberer: "P2P Reputation Management: ProbabilisticEstimation vs. Social Networks", Journal of Computer Networks, SpecialIssue on Management in Peer-to-Peer Systems: Trust, Reputation and Security, Elsevier, 50(4): , [Hung, Aberer 08] Le-Hung Vu, K. Aberer: «Effective Usage of Computational Trust Models in Rational Environments», Web Intelligence Conference (WI-IAT'08), December 9-12, 2008, Sydney, Australia. [Cudre-Mauroux et al 09] P. Cudré-Mauroux, P. Haghani, M. Jost, K. Aberer, H. de Meer: idmesh: graph-based disambiguation of linked data, WWW [Vu, et al 09] L.-H. Vu, T.G. Papaioannou and K. Aberer, Synergies of different reputation systems: challenges and opportunities, Proceedings of the 7th IEEE conference on Privacy, Security and Trust, [Vu, et al 10]L.H. Vu, T.G. Papaioannou and K. Aberer, Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems, Proc. of the 4th IFIP International Conference on Trust Management (IFIPTM 2010),
Reputation-based trust management systems and their applicability to grids
Reputation-based trust management systems and their applicability to grids Gheorghe Cosmin Silaghi 1, Alvaro E. Arenas 1, Luis Moura Silva 2 1 {g.c.silaghi, a.e.arenas}@rl.ac.uk CCLRC, Rutherford Appleton
More informationReputation Ontology for Reputation Systems
Reputation Ontology for Reputation Systems Elizabeth Chang 1, Farookh Khadeer Hussain 1 and Tharam Dillon 2 1 Centre for Extended Enterprise and Business Intelligence and School of Information Systems
More informationTowards Effective and Efficient Behavior-based Trust Models. Klemens Böhm Universität Karlsruhe (TH)
Towards Effective and Efficient Behavior-based Trust Models Universität Karlsruhe (TH) Motivation: Grid Computing in Particle Physics Physicists have designed and implemented services specific to particle
More informationA Reliable Trust Model for Grid Based on Reputation
A Reliable Trust Model for Grid Based on Reputation Vivekananth.p Lecturer-IT Department St Joseph College of Engineering and Technology Dar-Es-Salaam, Tanzania vivek.jubilant@gmail.com Abstract- Grid
More informationEfficiency and Robustness of Binary Online Feedback Mechanisms in Trading Environments with Moral Hazard
Efficiency and Robustness of Binary Online Feedback Mechanisms in Trading Environments with Moral Hazard Chris Dellarocas MIT Sloan School of Management dell@mit.edu Introduction and Motivation Outline
More informationIncentive-Compatible Escrow Mechanisms
Incentive-Compatible Escrow Mechanisms Jens Witkowski Department of Computer Sence Albert-Ludwigs-Universität Freiburg, Germany witkowsk@informatik.uni-freiburg.de Sven Seuken School of Eng. & Applied
More informationIntelligent Agents in Mobile Vehicular Ad-Hoc Networks: Leveraging Trust Modeling Based on Direct Experience with Incentives for Honesty
2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Intelligent Agents in Mobile Vehicular Ad-Hoc Networks: Leveraging Trust Modeling Based on Direct Experience
More informationPersonalized Shopping App with Customer Feedback Mining and Secure Transaction
Personalized Shopping App with Customer Feedback Mining and Secure Transaction Swati H. Kalmegh, Nutan Dhande Mtech Student, Department of CSE, swatihkalmegh@gmail.com Contact No. 9404725175 Abstract Reputation-based
More informationEdinburgh Research Explorer
Edinburgh Research Explorer User Participation and Honesty in Online Rating Systems: What a Social Network Can Do Citation for published version: Davoust, A & Esfandiari, B 2016, User Participation and
More informationA Game Theoretic Analysis of Blacklisting in Online Data Storage Systems
A Game Theoretic Analysis of Blacklisting in Online Data Storage Systems Bader Ali School of Computer Science McGill University Montreal, QC H3A 2A7, Canada Email: bali2@cs.mcgill.ca Muthucumaru Maheswaran
More informationAggregating Reputation Feedback
Aggregating Reputation Feedback Florent Garcin 1, Boi Faltings 1, and Radu Jurca 2 1 Ecole Polytechnique Fédérale de Lausanne (EPFL), Artificial Intelligence Laboratory {florent.garcin,boi.faltings}@epfl.ch
More informationAdvanced Topics in Computer Science 2. Networks, Crowds and Markets. Fall,
Advanced Topics in Computer Science 2 Networks, Crowds and Markets Fall, 2012-2013 Prof. Klara Kedem klara@cs.bgu.ac.il Office 110/37 Office hours by email appointment The textbook Chapters from the book
More informationThe Economics of E-commerce and Technology. Reputation
The Economics of E-commerce and Technology Reputation 1 Reputation Reputations are essential with experience goods Where experience good after buying Reputation performs two functions Allow people to learn
More informationUnraveling the Evolution of Defectors in Online Business Games
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Unraveling the Evolution of Defectors in Online Business Games Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling
More informationAvoiding Ballot Stuffing in ebay-like Reputation Systems
Avoiding Ballot Stuffing in ebay-like Reputation Systems Rajat Bhattacharjee Stanford University Ashish Goel Stanford University June 6, 2005 Abstract We present a preliminary study on the robustness of
More informationOn the Reputation of Agent-based Web Services
On the Reputation of Agent-based Web Services Babak Khosravifar, Jamal Bentahar, Ahmad Moazin, and Philippe Thiran 2 Concordia University, Canada, 2 University of Namur, Belgium b khosr@encs.concordia.ca,
More informationENHANCEMENTS TO REPUTATION BASED TRUST MODELS FOR IMPROVED RELIABILITY IN GRID COMPUTING
ENHANCEMENTS TO REPUTATION BASED TRUST MODELS FOR IMPROVED RELIABILITY IN GRID COMPUTING SRIVARAMANGAI.P, RENGARAMANUJAM SRINIVASAN Senior Lecturer, Retd.Prof /CSE Dept Botho College, BSA University, Chennai
More informationD ECENTRALIZED V ALUE DISTRIBUTION SYSTEM
D ECENTRALIZED V ALUE DISTRIBUTION SYSTEM FOR B LOCKCHAIN- B ASED A PPLICATIONS Cooperation is a powerful value creating force. Well coordinated groups of individuals can accomplish together much more
More informationREDESIGNING BITCOIN S FEE MARKET arxiv:
REDESIGNING BITCOIN S FEE MARKET arxiv:1709.08881 Ron Lavi - Technion Aviv Zohar - Hebrew U. Or Sattath Ben-Gurion U. Scaling Bitcoin 2017 CURRENT FEE MECHANISM IN BITCOIN Miners can only include txs that
More informationCS269I: Incentives in Computer Science Lecture #12: Asymmetric Information and Reputation Systems
CS69I: Incentives in Computer Science Lecture #1: Asymmetric Information and Reputation Systems Tim Roughgarden November, 016 1 Preamble Previous lectures have skirted the topic of reputation systems the
More informationReputation in a simple online market
Reputation in a simple online market Are feedback systems reliable? Giorgio Delgrosso Valentina Garella Aleksandra Kolndrekaj Simulation models for economics Summary PREFACE...3 1. THE CODE...7 1.1 SETUP
More informationMechanical Cheat: Spamming Schemes and Adversarial Techniques on Crowdsourcing Platforms
Mechanical Cheat: Spamming Schemes and Adversarial Techniques on Crowdsourcing Platforms Djellel Eddine Difallah, Gianluca Demartini, and Philippe Cudré-Mauroux exascale Infolab U. of Fribourg Switzerland
More informationDYNAMIC RESOURCE PRICING ON FEDERATED CLOUDS
DYNAMIC RESOURCE PRICING ON FEDERATED CLOUDS CCGRID 2010 The 10th IEEE/ACM Intl. Symp. on Cluster, Cloud and Grid Computing Marian Mihailescu Yong Meng Teo Department of Computer Science National University
More informationTargeting Individuals to Catalyze Collective Action in Social Networks
Targeting Individuals to Catalyze Collective Action in Social Networks Marco A. Janssen 1 1 Center for the Study of Institutional Diversity School of Human Evolution and Social Change Arizona State University
More informationCOLLABORATIVE WORKSPACE OVER SERVICE-ORIENTED GRID
COLLABORATIVE WORKSPACE OVER SERVICE-ORIENTED GRID SHEN ZHIQI Information Communication Institute of Singapore, School of Electrical and Electronic Engineering, Nanyang Technological University, 50 Nanyang
More informationEvolution of Cooperativeness in a Business Game Relying on Acquaintance Based Trustworthiness Assessment
Evolution of Cooperativeness in a Business Game Relying on Acquaintance Based Trustworthiness Assessment Sanat Kumar Bista, Keshav Dahal, Peter Cowling AI Research Group University of Bradford Bradford
More informationA Dynamic Trust Network for Autonomy-Oriented Partner Finding
A Dynamic Trust Network for Autonomy-Oriented Partner Finding Hongjun Qiu Abstract The problem of partner finding is to identify which entities (agents) can provide requested services from a group of entities.
More informationBayesian Network Based Trust Management
Bayesian Network Based Trust Management Yong Wang,2, Vinny Cahill, Elizabeth Gray, Colin Harris, and Lejian Liao 3 Distributed Systems Group, Department of Computer Science, Trinity College Dublin, Dublin
More informationSchool of Computing Science and Engineering. VIT University, Vellore (Tamilnadu), India.
!"#$!$ E.Sathiyamoorthy 1, N.Ch.Sriman Narayana Iyenger & V.Ramachandran 3 1 School of Information Technology and Engineering, School of Computing Science and Engineering ABSTRACT VIT University, Vellore-6301
More informationFOUR MARKET MODELS. Characteristics of Oligopolies:
FOUR MARKET MODELS Perfect Competition Monopolistic Competition Oligopoly Pure Monopoly Characteristics of Oligopolies: A Few Large Producers (Less than 10) Identical or Differentiated Products High Barriers
More informationECONOMIC MACHINE LEARNING FOR FRAUD DETECTION
ECONOMIC MACHINE LEARNING FOR FRAUD DETECTION Maytal Saar-Tsechansky 2015 UT CID Report #1511 This UT CID research was supported in part by the following organizations: identity.utexas.edu ECONOMIC MACHINE
More informationWhy We Can t Be Bothered to Read Privacy Policies: Models of Privacy Economics as a Lemons Market
Why We Can t Be Bothered to Read Privacy Policies: Models of Privacy Economics as a Lemons Market Tony Vila Rachel Greenstadt David Molnar Harvard University May 29, 2003 1 Motivation People claim valuation
More informationReputation Mechanisms
Reputation Mechanisms Elodie Fourquet efourque@cgl.uwaterloo.ca University of Waterloo Abstract. With the internet, exchanges, transactions and collaborative work have multiplied, because the internet
More informationGames and Strategic Behavior. Chapter 9. McGraw-Hill/Irwin. Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Games and Strategic Behavior Chapter 9 McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Learning Objectives 1. List the three basic elements of a game. Recognize
More informationRecommendation-based trust model in P2P network environment
Recommendation-based trust model in P2P network environment Yueju Lei, Guangxi Chen (Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology, Guilin 541004, China) chgx@guet.edu.cn,
More informationTo trust or to control
To trust or to control Informal value transfer systems and computational analysis in institutional economics Claudius Gräbner a and Wolfram Elsner b January 7, 2018 a: Institute for the Comprehensive Analysis
More informationA Method for User Data Protection Based on Game Theory in Cloud Computing
, pp.16-22 http://dx.doi.org/10.14257/astl.2017.143.04 A Method for User Data Protection Based on Game Theory in Cloud Computing Xiaohui Li 1, Feng Liu 2, Hongxing Liang 3 1 College of Electrical and Information
More informationA comparison of reputation-based trust systems
Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2005 A comparison of reputation-based trust systems John Folkerts Follow this and additional works at: http://scholarworks.rit.edu/theses
More informationThe Dynamics of Seller Reputation: Appendix
The Dynamics of Seller Reputation: Appendix Luís Cabral New York University and CEPR Ali Hortaçsu University of Chicago and NBER July 2008 Abstract This appendix complements our paper The Dynamics of Seller
More informationOver-contribution in discretionary databases
Over-contribution in discretionary databases Mike Klaas University of British Columbia klaas@cs.ubc.ca Abstract Interest in the study of discretionary databases has grown as numerous large-scale public
More informationDecision Support Systems
Decision Support Systems 66 (2014) 102 113 Contents lists available at ScienceDirect Decision Support Systems journal homepage: www.elsevier.com/locate/dss Filtering trust opinions through reinforcement
More informationInternational Vendors and Trust in Electronic Auctions
International Vendors and Trust in Electronic Auctions Michael Hergert, San Diego State University, San Diego, California, USA ABSTRACT The rise of electronic auctions is a major change in person-to-person
More informationCustomer Experience Transformation for Growth
Customer Experience Transformation for Growth Bill Demakakos, Director Strategy, Customer & Operations 27 March 207 Context: We are in the age of the customer 900 960 990 200 Age of manufacturing Mass
More informationSocial Networks: Service Selection and Recommendation
Social Networks: Service Selection and Recommendation Jebrin Al-Sharawneh Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Information Systems) Faculty of Engineering
More informationAre you Capitalizing on the New Automotive Shopper Journey?
Are you Capitalizing on the New Automotive Shopper Journey? 1 Executive Summary In 2015, the U.S. auto market set a sales record of just under 17.5 million vehicles, according to PwC. While the size of
More informationAccenture Insurance. Creating Value in the Independent Agency Channel
Accenture Insurance Creating Value in the Independent Agency Channel Reports of my death are greatly exaggerated. Akin to Mark Twain s infamous quote, rumors of the agency distribution channel in personal
More informationIncentives in Crowdsourcing: A Game-theoretic Approach
Incentives in Crowdsourcing: A Game-theoretic Approach ARPITA GHOSH Cornell University NIPS 2013 Workshop on Crowdsourcing: Theory, Algorithms, and Applications Incentives in Crowdsourcing: A Game-theoretic
More informationThe Prediction of Trust Rating Based on the Quality of Services Using Fuzzy Linear Regression
The Prediction of Trust Rating Based on the Quality of Services Using Fuzzy Linear Regression M. Hadi Mashinchi, Lei Li, Mehmet A. Orgun, and Yan Wang Department of Computing Macquarie University Sydney,
More informationCrowe Caliber. Using Technology to Enhance AML Model Risk Management Programs and Automate Model Calibration. Audit Tax Advisory Risk Performance
Crowe Caliber Using Technology to Enhance AML Model Risk Management Programs and Automate Model Calibration Audit Tax Advisory Risk Performance The Unique Alternative to the Big Four Crowe Caliber: Using
More informationPerfectly competitive markets: Efficiency and distribution
Perfectly competitive markets: Efficiency and distribution By Fernando del Río Assistant Professor, University of Santiago de Compostela Introduction Free markets have been the main mechanism used to allocate
More informationThe Emergence of Trust Networks under Uncertainty Implications for Internet Interactions
Analyse & Kritik 28/2004 ( c Lucius & Lucius, Stuttgart) p. xxx xxx Coye Cheshire/Karen S. Cook The Emergence of Trust Networks under Uncertainty Implications for Internet Interactions Abstract: Computer-mediated
More informationMaintaining good Seller performance on Amazon for successful Christmas sales
Maintaining good Seller performance on Amazon for successful Christmas sales Why a good Seller performance matters Good customer experience: - Positive feedback - Loyalty - Positive word-of mouth (more
More informationChapter 15 Oligopoly
Goldwasser AP Microeconomics Chapter 15 Oligopoly BEFORE YOU READ THE CHAPTER Summary This chapter explores oligopoly, a market structure characterized by a few firms producing a product that mayor may
More informationWe ve come a long way... Meeting in Grand Central. We are immersed in connectivity. The Living Matrix: Creating the Future of Events
We ve come a long way... The Living Matrix: Creating the Future of Events (Including: Building Strategic Alliances) Ross Dawson CEO, Advanced Human Technologies Author, Living Networks and Developing Knowledge-Based
More informationAnalytic Preliminaries for Social Acceptability of Legal Norms &
Analytic Preliminaries for Social Acceptability of John Asker February 7, 2013 Yale Law School Roadmap Build on case studies of environments where extra-legal norms are at least as important as formal
More informationGame theory (Sections )
Game theory (Sections 17.5-17.6) Game theory Game theory deals with systems of interacting agents where the outcome for an agent depends on the actions of all the other agents Applied in sociology, politics,
More informationInteractive Reputation Systems
Bus Inf Syst Eng DOI 10.1007/s12599-017-0493-1 RESEARCH PAPER Interactive Reputation Systems How to Cope with Malicious Behavior in Feedback Mechanisms Johannes Sänger Günther Pernul Received: 19 February
More informationCooperation Without Enforcement? A comparative analysis of litigation and online reputation as quality assurance mechanisms
Cooperation Without Enforcement? A comparative analysis of litigation and online reputation as quality assurance mechanisms Yannis Bakos * Stern School of Business New York University New York, NY 00 Chrysanthos
More informationPREDICTIVE INTELLIGENCE SECURITY, PRIVACY, AND ARCHITECTURE
PREDICTIVE INTELLIGENCE SECURITY, PRIVACY, AND ARCHITECTURE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers.
More information1. Search, for finding individual or sets of documents and files
WHITE PAPER TURNING UNSTRUCTURED TEXT INTO INSIGHT Extending Business Intelligence With Text Analysis and Search EXECUTIVE SUMMARY While traditional business intelligence (BI) has transformed business
More informationRobust Multi-unit Auction Protocol against False-name Bids
17th International Joint Conference on Artificial Intelligence (IJCAI-2001) Robust Multi-unit Auction Protocol against False-name Bids Makoto Yokoo, Yuko Sakurai, and Shigeo Matsubara NTT Communication
More informationPrinciples of Economics: Seminar 1 - Game Theory
Principles of Economics: Seminar 1 - Game Theory July 18, 2017 Principles of Economics: Seminar 1 - Game Theory July 18, 2017 1 / 20 What is a game? Definition: A game is any situation involving two or
More informationPranav Tank, Darshan Upadhyay, Kunal Khimani Asst. Professor, I.T. Department, VVP Engineering College, Rajkot, Gujarat, India ABSTRACT
2018 IJSRSET Volume 4 Issue 2 Print ISSN: 2395-1990 Online ISSN : 2394-4099 National Conference on Advanced Research Trends in Information and Computing Technologies (NCARTICT-2018), Department of IT,
More informationABSTRACT. CHIVUKULA, SRIVATSA V. Evolution of Trust in Anonymous Interactions. (Under the direction of Munindar P. Singh).
ABSTRACT CHIVUKULA, SRIVATSA V. Evolution of Trust in Anonymous Interactions. (Under the direction of Munindar P. Singh). For many applications, the success of multiagent systems depends on cooperation
More information1 Designing Reputation Systems for the Social Web
1 Designing Reputation Systems for the Social Web Chrysanthos Dellarocas How can online reputation systems be designed to meet the needs of both users and system designers? Chrysanthos Dellarocas looks
More informationA Knowledge Market Prototype: From Conception to Execution
A Knowledge Market Prototype: From Conception to Execution Prof. Dr.-Ing. Wolfgang Maass Faculty of Digital Media & Research Center for Intelligent Media, Furtwangen University http://im.dm.hs-furtwangen.de
More informationFirst impressions on the Revised US and UK Merger Guidelines
GRC Conference, 29th September, Brussels First impressions on the Revised US and UK Merger Guidelines Damien Neven* Chief Competition Economist DG COMP, European Commission *The views expressed are my
More informationOligopoly. Quantity Price(per year) 0 $120 2,000 $100 4,000 $80 6,000 $60 8,000 $40 10,000 $20 12,000 $0
Oligopoly 1. Markets with only a few sellers, each offering a product similar or identical to the others, are typically referred to as a. monopoly markets. b. perfectly competitive markets. c. monopolistically
More informationPATROL: a comprehensive reputation-based trust model. Ayman Tajeddine, Ayman Kayssi, Ali Chehab* and Hassan Artail
108 Int. J. Internet Technology and Secured Transactions, Vol. 1, Nos. 1/2, 2007 PATROL: a comprehensive reputation-based trust model Ayman Tajeddine, Ayman Kayssi, Ali Chehab* and Hassan Artail Electrical
More informationSOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER
EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER ARRIVAL OF GDPR IN 2018 The European Union (EU) General Data Protection Regulation (GDPR), which takes effect in 2018, will bring changes
More informationCONTRACTING WITH UNCERTAIN LEVEL OF TRUST
Computational Intelligence, Volume 18, Number 4, 2002 CONTRACTING WITH UNCERTAIN LEVEL OF TRUST SVIATOSLAV BRAYNOV Department of Computer Science and Engineering, State University of New York at Buffalo,
More informationHow Much Do You Want to Pay? Prosocial Motivations, Reciprocity, and Self- Interest in El Trato
How Much Do You Want to Pay? Prosocial Motivations, Reciprocity, and Self- Interest in El Trato F. J. León-Medina J. A. Noguera J. Tena-Sánchez Universitat Autònoma de Barcelona Department of Sociology
More informationAdding Next Best Action To Personalize Interactions For Known Customers Then Creating Cognitive Customer Centric Interactions
Adding Next Best Action To Personalize Interactions For Known Customers Then Creating Cognitive Customer Centric Interactions Steven Pinchuk WW Lead Customer Intelligence & Revenue Management Advanced
More informationSocial Media: A Cautionary Tale
Michael Gotta Principal Analyst mgotta@burtongroup.com mikeg.typepad.com Alice Wang Director alice.wang@gartner.com Social Media: A Cautionary Tale Wednesday May 5, 2010 www.burtongroup.com All Contents
More informationLecture 11 Imperfect Competition
Lecture 11 Imperfect Competition Business 5017 Managerial Economics Kam Yu Fall 2013 Outline 1 Introduction 2 Monopolistic Competition 3 Oligopoly Modelling Reality The Stackelberg Leadership Model Collusion
More informationINTEGRATING THE MECHANISM OF THREE-PART TARIFFS PRICING TO THE PROVISION OF INTRA-SITE SEARCH ENGINE ADVERTISING SERVICES
INTEGRATING THE MECHANISM OF THREE-PART TARIFFS PRICING TO THE PROVISION OF INTRA-SITE SEARCH ENGINE ADVERTISING SERVICES Pei Li, School of Economic Information Engineering, Southwestern University of
More informationUncovering Leadership Blind Spots
Uncovering Leadership Blind Spots And Discovering the Pathway to Motivating Your Employees ISO-404-PD-EV-0913-V1.0 Agenda Study Results: Cross-Cultural Leadership Identify key leadership characteristics
More informationMeasuring digital advertising revenue to infringing sites
Measuring digital advertising revenue to infringing sites TAG US benchmarking study September 2017 Executive summary Digital advertising has grown at a significant pace over the past several years. Although
More informationEnterprise Risk Management: Developing a Model for Organizational Success. White Paper
Enterprise Risk Management: Developing a Model for Organizational Success White Paper January 2009 Overview Less than a decade ago, Enterprise Risk Management (ERM) was an unfamiliar concept. Today, the
More informationCYCLE 1: DEFINING LEAD FIRMS AND PRINCIPLES OF FACILITATION
WORKING PAPER CYCLE 1: DEFINING LEAD FIRMS AND PRINCIPLES OF FACILITATION AUGUST 2008 About this Document This technical brief is the first in a series being produced by the FIELD Facilitation Working
More informationMaking Marketing Smarter with Analytics
Making Marketing Smarter with Analytics Prof. Francisco N. de los Reyes Analytics Advisor Thakral One Measurement and Data Science University of the Philippines School of Statistics Big Data Demographics
More informationChapter 1: The Next Transition. Chapter 1. The Next Transition
Chapter 1: The Next Transition 1 Chapter 1 The Next Transition! CONTINUING TO GROW! Congratulations! You have completed the Relationship Phase of the Helpathy Group program and are now ready to embark
More informationReputation in Export Markets: Implications for Firms Capabilities and Policy. Rocco Macchiavello Warwick University. BRAC-IGC-iiG Conference
Reputation in Export Markets: Implications for Firms Capabilities and Policy Rocco Macchiavello Warwick University BRAC-IGC-iiG Conference March, 27-28 th 2011 E-mail: r.macchiavello@warwick.ac.uk Introduction
More informationTransformation confidence Helping you get closer to your transformation programme
www.pwc.com/riskassurance Transformation confidence Helping you get closer to your transformation programme The executive summary series paper No.4 Most senior executives will only ever sponsor one or
More informationDecentralised Currencies Are Probably Impossible
Decentralised Currencies Are Probably Impossible But Let s At Least Make Them Efficient Ben Laurie (ben@links.org) Tue Jul 05 09:22:21 2011 +0100 (19:483a5782de61) 1 Abstract Lately, there s been a good
More informationEC493f Review Sheet 1
Econ 493f Law and Economics Spring 2017 1 Identify and/or Define: a. Codex of Hammurabi l. Dominant Strategy b. Marginal Cost m. Nash Equilibrium c. Net Benefit n. Optimal Crime Rate d. Expected Penalty
More informationTrust-Networks in Recommender Systems
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research 2008 Trust-Networks in Recommender Systems Kristen Mori San Jose State University Follow this and additional
More informationFROM BEST PRACTICES TO NEXT PRACTICES: THIRD IN A FOUR PART SERIES
PERFORMANCE LEADERSHIP SERIES NUMBER GAMES: MAKING SURE METRICS DRIVE THE RIGHT BEHAVIOR FROM BEST PRACTICES TO NEXT PRACTICES: THIRD IN A FOUR PART SERIES by Frank Buytendijk, Beingfrank Research September
More informationReputation Mechanisms
Reputation Mechanisms Chrysanthos Dellarocas R. H. Smith School of Business University of Maryland College Park, MD 20742 cdell@rhsmith.umd.edu June 2005 Revised: August 2005 Abstract Reputation mechanisms
More informationLecture #18: Electronic Currencies. Prof. Dr. Sven Seuken
Lecture #18: Electronic Currencies Prof. Dr. Sven Seuken 24.5.2012 Housekeeping Guest: David C. Parkes: Talk today: 17:15-18:15 (IfI Kolloquium) Mechanism Design for Kidney Exchange Exam topics + questions
More informationMercedes CS2000 Fault Code Service Reset Scan Baum Tool
Page 1 of 7 Listed in category: ebay Motors > Parts & Accessories > Automotive Tools > Diagnostic Tools / Equipment Mercedes CS2000 Fault Code Service Reset Scan Baum Tool alkyracer101 ( 9366 ) Item: 110622174843
More informationCheap talk communication with dynamic information searching
DOI 6/s464-6-2332- RESEARCH Open Access Cheap talk communication with dynamic information searching Yongjie Zhang, Yuechen Liu and Xu Feng * *Correspondence: fengxu@ tju.edu.cn Yongjie Zhang, Yuechen Liu
More informationBilling Strategies for. Innovative Business Models
Billing Strategies for Innovative Business Models How Boring Old Billing Could Be the Competitive Advantage You Never Knew You Had Billing Strategies for Innovative Business Models Page: 1 Introduction
More informationOur Commitments. Living our vision and values
Our Commitments Living our vision and values CEO Message Our vision is to excel at securing and enhancing the financial wellbeing of people, businesses and communities. It recognises the important role
More informationTrust-Based Collaborative Filtering
Trust-Based Collaborative Filtering Neal Lathia, Stephen Hailes, Licia Capra Abstract k-nearest neighbour (knn) collaborative filtering (CF), the widely successful algorithm supporting recommender systems,
More informationWhy All Leads Are Not Created Equal
INDUSTRY INSIGHTS Why All Leads Are Not Created Equal How do you assess differences in lead quality when all leads come in the same format with the same info? It s easy to look at paid demand gen through
More informationThe value of contributions in discretionary databases
The value of contributions in discretionary databases Mike Klaas University of British Columbia klaas@cs.ubc.ca Abstract Interest in the study of discretionary databases has grown as numerous large-scale
More informationSecuring MapReduce Result Integrity via Verification-based Integrity Assurance Framework
, pp.53-70 http://dx.doi.org/10.14257/ijgdc.2014.7.6.05 Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework Yongzhi Wang 1, Jinpeng Wei 2 and Yucong Duan 3 1,2 Floridia
More informationCompetitive Markets. Jeffrey Ely. January 13, This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License.
January 13, 2010 This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License. Profit Maximizing Auctions Last time we saw that a profit maximizing seller will choose
More information