Mehrdad Nojoumian Department of Computer & Electrical Engineering and Computer Science Florida Atlantic University 4 th AAAI Workshop on Incentives and.

Slides:



Advertisements
Similar presentations
4th Module: Information Systems Development and Implementation:
Advertisements

The Beauty of Change WRSU Customer Service. Basic Customer Service Communication Other Languages.
OBJ CRITIQUE POSITIVE INTERPERSONAL SKILLS CONTRIBUTING TO EFFECTIVE WORKPLACE INTERACTIONS Positive Interpersonal Skills and the Workplace.
Chapter 7 Management and Leadership
ECEU300 Ethics in the Workplace Why talk about Ethics? Everyone is ethical, everyone knows how to behave at work. Everyone gets it about not stealing stuff.
In Search of Excellence:
When sanctions cause non-cooperative behavior in a social dilemma situation: a study using the “Industrial Waste Illegal Dumping Game” 13th International.
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Proposing new ways of resolving online conflicts: an intelligent facilitation of forgiveness in CMC Asimina Vasalou, Jeremy Pitt Intelligent Systems and.
Elements of Decision Problems
Partner reward – a help or a hindrance to effective business development? Peter Scott Peter Scott Consulting
Aug 10, 2006Trust Calculation - Nojoumian and Lethbridge1 A New Approach for Trust Calculation in Social Networks Mehrdad Nojoumian (student) Timothy C.
Ethics CS351. What are ethics? Dictionary: –1. A system or set of moral principles. –2. The rules of conduct recognized in respect to a particular class.
Chapter 9 The Performance Interview. © 2009 The McGraw-Hill Companies, Inc. All rights reserved. Chapter Summary New Visions for New Organizations Preparing.
Trust and Grid Computing Systems Presented By: Woodas Lai.
Inductive Reasoning Concepts and Principles ofConstruction.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
The Use of Counseling and Discipline to Improve Employee Productivity.
Inductive Reasoning Concepts and Principles ofConstruction.
Social Psychology of Sport 1. Group Cohesion
Training. Introduction There are several approaches that can be taken with regards to developmental needs for managers and employees. The main factors.
TEAM MORALE Team Assignment 12 SOFTWARE MEASUREMENT & ANALYSIS K15T2-Team 21.
Factors affecting contractors’ risk attitudes in construction projects: Case study from China 박병권.
thinking hats Six of Prepared by Eman A. Al Abdullah ©
Evaluation as research or research as evaluation: towards a dialogic relationship between research and evaluation in the context of development education.
Student Motivation & the Remarking Process Presented by Jirayu Chotimongkol Victoria Management School (VMS) Presented by Jirayu Chotimongkol Victoria.
Assessment Report School of The Arts, Humanities and Social Sciences________________ Department: Political Science and International Studies.
Working Effectively with Parents July 2013 Pre-Service By Laurie Ocampo.
Research Methods School of Economic Information Engineering Dr. Xu Yun Office : Phone : :
SAMPLING:REQUIREMENTS OF A GOOD SAMPLE
 The personal qualities that employers look for when choosing employees  Your success in the workplace is largely dependent on your ability to develop.
TEAMWORK WORKSHOP ICOM5047 Design Project in Computer Engineering J. Fernando Vega-Riveros, Ph.D. Associate Professor – ECE Dpt.
Reputation and Trust. Uncertainty and Risk 3 What are the Solutions to Uncertainty in the Social Environment?  Proxy’s and ‘inferred trustworthiness’
Intergroup Relations Theory and Research: An overview.
` Implementation of PBL in Kabul Medical University Assistant prof. Dr Zaman member of Physiology department Assistant Prof. Dr Nejrabi member.
DA DEGREE COLLEGE, PH-VI SEEMAB QADEER Assistant Professor DEPARTMENT OF ECONOMICS 1 ACTION PLAN.
Team # 7 Tanaz Mozafari Kunal Mhaske Yanjing Chu Shin Sesthalao.
Dysfunction #1: Absence of Trust
The Research Process From Topic to Question. Why research? The best research comes from a need to know. The best research has as its purpose enhanced.
Collecting Qualitative Data
CONFLICT.
AN INTRODUCTION Managing Change in Healthcare IT Implementations Sherrilynne Fuller, Center for Public Health Informatics School of Public Health, University.
My E-Portfolio John Contreras Allen High School Home Intro Bio Research Job Application Resume Cover Letter Reference.
Chapter 15 HRM and Service Fairness: How Being Fair with Employees Spills Over to Customers David E. Bowen, Stephan W. Gilliland and Robert Folger.
1 University of Auckland Winter Week Lectures Second Lecture 3 July 2007 Associate Professor Ananish Chaudhuri Department of Economics University of Auckland.
FECS 2007 Assessment and its Role in Accreditation Deborah Whitfield Frances Bailie Adel Abunawass.
Senate 101 California State University, Los Angeles Nancy Warter-Perez, Academic Senate Chair
The Nonrational Escalation of Commitment The Nonrational Escalation of Commitment Presented by: Hamid Shekari Omid Keivanloo.
Computer Science and Engineering 1 Mobile Computing and Security.
1 Core English 1 Listening Task – p 158 Rhetorical Function Questions.
Unit II PERFORMANCE FEEDBACK.
WHAT CONTRIBUTES TO THE BUILDING OF RESILIENT COMMUNITIES?: INTEGRATION OF KNOWLEDGE, RISK PERCEPTION, AND AWARENESS OF SOCIAL VULNERABILITY Pamela McMullin-Messier.
LEADERSHIP BEHAVIORS AND PROCESSES
Impact Evaluation of a Landing Page Used in Mercy For Animals’ Facebook Advertising Campaign Results from an Experimental Design January 20, 2015.
Wei Wu, Georgia Southern University Raja R. A. Issa, University of Florida BIM Education for New Career Options.
PhD in Social Work and Social Policy at FPN UBG Prof dr Nevenka Zegarac Department of Social work and social policy Faculty of political sciences UBG TEMPUS.
Dr. Bea Bourne 1. 2 If you have any trouble in seminar, please do call Tech Support at: They can assist if you get “bumped” from the seminar.
We thank the Office of Research and Sponsored Programs for supporting this research, and Learning & Technology Services for printing this poster. Introduction.
Contents of the Talk Preliminary Materials Motivation and Contribution
DEPARTMENT OF HUMAN AND SOCIAL CIENCES APPLIED LINGUISTICS IN ENGLISH CAREER    “THE INFLUENCE OF TEACHER’S ATTITUDES AND BELIEFS INTO TECHNOLOGY-RELATED.
Secret Sharing in a Multidisciplinary Model
What lessons to be learnt from reflective learning journals written by students to improve learning and intercultural awareness? Lars Peter Jensen Associated.
Communication Skills Lecture 1-2
Exploring Careers, Workplace Accommodations, and Mentorship
Identifying Your Scope of Competence in Autism Treatment
Understanding How the Ranking is Calculated
Leader’s Role in Process Improvement
Liberian-German Cooperation in Health Strengthening Gender Equality at Liberia’s Health Training Institutions – The Gender Audit Process – 2018.
Presentation transcript:

Mehrdad Nojoumian Department of Computer & Electrical Engineering and Computer Science Florida Atlantic University 4 th AAAI Workshop on Incentives and Trust in E-Communities (WIT-EC) January 26, 2015 Trust, Influence and Reputation Management Based on Human Reasoning

Mehrdad Nojoumian Work-in-Progress  Interdisciplinary project between the Department of Computer and Electrical Engineering and Computer Science at Florida Atlantic University and the Department of Psychology at Southern Illinois University: Mehrdad Nojoumian, Assistant Professor Department of CEECS, Florida Atlantic University Dr. Meera Komarraju, Professor and Chair Department of Psychology, Southern Illinois University Colleen Bader, Graduate Student of Applied Psychology Department of Psychology, Southern Illinois University Kristiana Feeser, Graduate Student of Applied Psychology Department of Psychology, Southern Illinois University 2

Mehrdad Nojoumian Review of a Well-Known Trust Model  Previous Solution: trust value T(p+1) is given by the following equations and it depends on the previous trust rating where:   0 and   0 [CIA’00]. 3 T(p)CooperationDefection > 0 T(p) +  ( 1-T(p) )( T(p) +  ) / ( 1- min{ |T(p)|, |  | } ) < 0 ( T(p) +  ) / ( 1 - min{ |T(p)|, |  | } ) T(p) +  ( 1+T(p) ) = 0  T(p) < 0 T(p) = 0 T(p) > 0 T(p) < 0 T(p) = 0 T(p) > 0

Mehrdad Nojoumian Our Sample Trust Model  Our Function is not just a function of a single round, but of the history: Reward more (or same) the better a participant is, Penalize more (or same) the worse a participant is. 4 DiscourageReward T Good P i  ( ,+1] OpportunitiesGive/Take T New P i : [ ,  ] PenalizeEncourage T Bad P i  [-1,  ) DefectionCooperation Trust Value Bad P i (C) Newcomer P i (C) Good P i (C) Bad P i (D) Newcomer P i (D) Good P i (D)

Mehrdad Nojoumian Intuition Behind Our Model 5 There exist some common principles for trust modeling AB A lies to B for the 1 st time: defection AB A lies to B for the 2 nd time: same defection + past history AB A cheats on B: costly defection Impact of the brain’s history

Mehrdad Nojoumian Contents of the Talk 6  Our Motivation and Objectives  Trust, Influence and Reputation  Data Collection Methodology  Sample Scenarios and Framing  Templates of Our Scenarios  Trust Modeling in Four Steps Specification, Transformation, Evaluation and Modification

Mehrdad Nojoumian Our Motivation and Objectives  Trust, influence & reputation are human factors that have been widely used in technological systems. We intend to scrutinize them from both angles.  Our intention is to construct new computational models of these notions while incorporating human reasoning factors into the models’ specifications.  We intend to utilize our models in different contexts such as cryptographic constructions and cybersecurity where players are humans, e.g., hackers.  Objectives: 1.Bridge the gap between computer and social sciences. 2.Investigate how trust measurement and influence work in humans. 3.Perform cross-cultural data collection targeting East and West. 4.Quantify our data through hypothesizing and modeling. 5.Finally, deploy our models in technological and software systems. 7

Mehrdad Nojoumian Trust, Influence and Reputation  Social Science Perspective: Trust is the willingness of a person to become vulnerable to the actions of another person irrespective of the ability to control those actions. Influence refers to any tactic used to alter the behavior, decision or attitude of other people.  Computer Science Perspective: Trust is defined as a personal expectation that a player has with respect to the future behavior of another party, i.e., a personal quantity. Reputation is the perception that players have with respect to another player’s intention, i.e., a social quantity. 8

Mehrdad Nojoumian Data Collection Methodology  First, demographic data will be collected at the beginning of the data collection to obtain a profile of our human subjects. Then, questions are asked from our subjects based on 8 distinct groups: 1.Initial Trust: scenarios that illustrate the initial trust values in the first dyadic encounters, e.g., when two people meet for the first time or after online chatting, etc. 2.Trust Escalation: scenarios that illustrate a sequence of incidents/actions that escalate trust between two parties, e.g., helping, supporting, lending money, etc. 3.Trust Reduction: scenarios that illustrate a sequence of incidents/actions that damage trust between two parties, e.g., lying, lying for the second time, cheating, etc. 4.Trust Mutation: 2 nd, 3 rd groups can be a sequence of mild incidents (lying) followed by critical incidents (cheating) and vice versa. 9

Mehrdad Nojoumian Data Collection Methodology (Cont.) 5.Re-Building Trust: scenarios that demonstrate how trust can be re- built between two parties, e.g., lying, ignoring and then apologizing, paying attention, supporting, etc. 6.Gaining Influence: scenarios that illustrate how people might be able to change the attitude of others and the ratio of this impact over time, e.g., helping, lending money, providing useful advice, etc. 7.Losing Influence: scenarios that illustrate how people may lose their influential impacts on others and the ratio of this failure over time, e.g., forcing, misleading, etc. 8.Influence Mutation: 6 th, 7 th groups can be a sequence of mild incidents (misleading) followed by critical incidents (forcing) and vice versa.  We have defined a list of positive and/or negative keywords: +lending, +helping, +supporting, +giving, -lying, -cheating, -ignoring, -misleading, +/- judging, +/- relying, +/- suggesting, etc. 10

Mehrdad Nojoumian Sample Scenario  Measurements: Untrustworthy (U) High Negative (H-) Medium Negative (M-) Low Negative (L-) Neutral (N) Low Positive (L+) Medium Positive (M+) High Positive (H+) Trustworthy (T) 11

Mehrdad Nojoumian Framing in Scenarios  Actual Scenarios: Hanna and Mary have known each other for about five years and are close friends. They were roommates during college and graduated with a Bachelor’s degree in business from UCLA in Los Angeles, California. They were delighted the company that hired them placed them with the same supervisor. As they began their employment, they decided to be roommates once again. 1.If you were Mary, how much trust would you have in Hanna after graduating from college? (Initial Trust) Complete Distrust Some Distrust Neither Distrust/Trust Some Trust Complete Trust After working together for about a year, Mary started noticing some changes in Hanna’s behavior. For instance, once, when Mary was ill and missed work on a day when there was a staff meeting, Hanna told her that she had not missed anything important. Later, Mary found out that Hanna had failed to inform her about some changes regarding a deadline for Project 1. Finally, one morning, as Mary prepared to leave for work, she realized she could not find the presentation that she and Hanna had carefully prepared the night before. She also noticed that although she and Hanna always car pooled to work, it looked like Hanna had already left for work without her. 2.If you were Mary, how much trust would you have in Hanna after you found out that she had left for work without you? (Trust Reduction) U H − M − L − N L + M + H + T 12

Mehrdad Nojoumian Templates of Our Scenarios 1.Stranger or Weak relationship, e.g., business scenarios. 2.Friends or Medium relationship, e.g., colleague scenarios. 3.Partners or Close relationship, e.g., romantic scenarios. 13 Templat-1Templat-2Template-3Template-4Templat-5Templat-6Templat-7Templat-8 Initial Trust Trust Reduction Trust Escalation Trust Reduction Further Trust Reduction Further Trust Escalation Trust Reduction Trust Escalation Trust Mutation (negative) Trust Mutation (positive) Trust Mutation (negative) Trust Mutation (positive) Trust Mutation (negative) Trust Mutation (positive) Trust Mutation (negative) Rebuild Trust Strengthen Trust Rebuild Trust

Mehrdad Nojoumian Trust Modeling in Four Steps 1.Specification: If a bad party cooperates, he is encouraged by a small reward. If a newcomer cooperates, he is rewarded. If a good party cooperates, he is rewarded by a factor more than the encouragement factor. If a good party defects, he is discouraged by a small penalty. If a newcomer defects, he is penalized. If a bad party defects, he is penalized by a factor more than the discouragement factor. 1.Transformation: 14

Mehrdad Nojoumian Trust Modeling in Four Steps (Cont.) 3.Evaluation: Behavioral: how the model performs among a large enough number of players by running standard tests, i.e., a sequence of “C” and “D” for each player. Adversarial: how vulnerable the model is to different attacks, e.g., the “Sybil attack” where the system is subverted by forging identities. 4.Modification: If all parties have cooperated, it is not required to increase the trust values or if all players have defected, it is not required to decrease the trust values. If majority of the players have cooperated, cooperation should be rewarded less and defection should be penalized more. If majority of the players have defected, defection should be penalized less and cooperation should be rewarded more. If the number of cooperative and non-cooperative players are equal, cooperation and defection should be readjusted with an equal ratio. 15

Mehrdad Nojoumian Thank You Very Much Questions? 16