SlideShare a Scribd company logo
1 of 47
Trust in Pervasive  Social Computing Licia Capra Dept of Computer Science University College London
EVOLUTION OF MOBILE TECHNOLOGY
TRANSFORMATION OF INTERNET USERS
A DIGITAL  TAPESTRY
PERVASIVE SOCIAL COMPUTING
A DIGITAL TAPESTRY ,[object Object],[object Object]
A DIGITAL TAPESTRY ,[object Object],[object Object]
CONNECTING SYPPLY & DEMAND ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COLLABORATIVE FILTERING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SOCIAL NETWORKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BROWSING THE  TAPESTRY Joint work with Matteo Dell’Amico @ Eurecom Presented at the  Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 08
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object],A B C D Direct Trust Inferred Trust ,[object Object],[object Object],[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object],A B X Y Direct Trust Inferred Trust ,[object Object],[object Object],[object Object]
= Intent & Competence
PHILOSOPHY OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A D X Y Direct Trust for Judgements Direct Trust for Users C B Inferred Trust for Judgements
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],X A B C D ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Lawrence Page, Sergey Brin, Rajeev Motwani, Terry Winograd. “ The PageRank Citation Ranking: Bringing Order to the Web”. Stanford Digital Library. 1998
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],J. M. Kleinberg. “Authoritative Sources in a Hyperlinked Environment”. Journal of the ACM, 1999 ,[object Object],[object Object],0.25 0.25 0.25 0.25 0.75 0.25 0.50 0.25 0.75 1.00 1.25 0.75 0.20 0.27 0.33 0.20
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],R. Lempel and S. Moran. “SALSA: the Stochastic Approach to for Link Structure Analysis”. ACM TOIS, 2001
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS – ACCURACY  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS – ACCURACY ,[object Object],Parameters:   =0.5,   =0.3 for SOFIA;   =0.3 for PPR;   =0.05 for N-SOFIA 1709 115 30 8 2 1 PPR 1136 63 12 3 1 1 N-SOFIA 855 31 4 1 1 1 SOFIA 90 75 50 25 10 5
EXPERIMENTS – ACCURACY ,[object Object],Parameters:   =0.9,   =0.05 for SOFIA;   =0.5 for PPR;   =0.01 for N-SOFIA 16025 2188 344 66 12 5 PPR 6954 822 157 32 6 2 N-SOFIA 7429 992 174 32 6 2 SOFIA 90 75 50 25 10 5
EXPERIMENTS – ROBUSTNESS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS – ROBUSTNESS 2583 5 5165 10 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
EXPERIMENTS – ROBUSTNESS 2297 1285 334 2583 5 4459 2353 559 5165 10 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
EXPERIMENTS – ROBUSTNESS 1 34 2297 1285 334 2583 5 1 85 4459 2353 559 5165 10 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
EXPERIMENTS – ROBUSTNESS Lower values of    improve attack resilience, at the expense (small) of accuracy 679 2264 41 1082 1 215 1 34 2297 1285 334 2583 5 1386 4409 132 2126 2 391 1 85 4459 2353 559 5165 10 31765 33064 2815 14718 197 5571 11182 19186 1311 8779 74 2649 3406 9599 469 4612 13 1040 Victim Other Victim Other Victim Other 1 10 100 SOFIA 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
UNLOCKING THE  TAPESTRY
UNLOCKING THE TAPESTRY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNLOCKING THE TAPESTRY Evaluate Browse Build
UNLOCKING THE TAPESTRY HOW TO  BUILD  AN UNLOCKED TAPESTRY
HOW TO BUILD AN UNLOCKED TAPESTRY ,[object Object],[object Object],[object Object],[object Object],[object Object]
UNLOCKING THE TAPESTRY HOW TO  BROWSE  AN UNLOCKED TAPESTRY
HOW TO BROWSE AN UNLOCKED TAPESTRY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNLOCKING THE TAPESTRY HOW TO  EVALUATE  OUR APPROACHES
HOW TO EVALUATE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THANK YOU! ,[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Mobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness PresentationMobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness Presentation
Licia Capra
 
Shd Portfolio Pdf Presentation
Shd Portfolio Pdf PresentationShd Portfolio Pdf Presentation
Shd Portfolio Pdf Presentation
Liquis
 
Jg Barker Publishing
Jg Barker PublishingJg Barker Publishing
Jg Barker Publishing
jeannebarker
 
Michal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementuMichal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementu
WebExpo
 

Viewers also liked (16)

Mobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness PresentationMobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness Presentation
 
Shd Portfolio Pdf Presentation
Shd Portfolio Pdf PresentationShd Portfolio Pdf Presentation
Shd Portfolio Pdf Presentation
 
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
 
Tomáš Procházka: Moje zápisky z designu
Tomáš Procházka: Moje zápisky z designuTomáš Procházka: Moje zápisky z designu
Tomáš Procházka: Moje zápisky z designu
 
Petr Dvořák: Mobilní webové služby pohledem iPhone developera
Petr Dvořák: Mobilní webové služby pohledem iPhone developeraPetr Dvořák: Mobilní webové služby pohledem iPhone developera
Petr Dvořák: Mobilní webové služby pohledem iPhone developera
 
Jg Barker Publishing
Jg Barker PublishingJg Barker Publishing
Jg Barker Publishing
 
Michal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementuMichal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementu
 
Hotmail Add Other Account
Hotmail Add Other AccountHotmail Add Other Account
Hotmail Add Other Account
 
Jakub Vrána: Code Reviews with Phabricator
Jakub Vrána: Code Reviews with PhabricatorJakub Vrána: Code Reviews with Phabricator
Jakub Vrána: Code Reviews with Phabricator
 
Endoscopy skills 2 2-2015
Endoscopy skills 2 2-2015Endoscopy skills 2 2-2015
Endoscopy skills 2 2-2015
 
Richard Fridrich: Buď punkový konzument!
Richard Fridrich: Buď punkový konzument!Richard Fridrich: Buď punkový konzument!
Richard Fridrich: Buď punkový konzument!
 
WebExpo 2008 Glogster
WebExpo 2008 GlogsterWebExpo 2008 Glogster
WebExpo 2008 Glogster
 
Lukáš Zaplatílek: Kašlete na uživatele
Lukáš Zaplatílek: Kašlete na uživateleLukáš Zaplatílek: Kašlete na uživatele
Lukáš Zaplatílek: Kašlete na uživatele
 
Jakub Krč: Typografie v elektronických médiích
Jakub Krč: Typografie v elektronických médiíchJakub Krč: Typografie v elektronických médiích
Jakub Krč: Typografie v elektronických médiích
 
Jiří Sekera: Vzory: dobrý sluha, ale špatný pán
Jiří Sekera: Vzory: dobrý sluha, ale špatný pánJiří Sekera: Vzory: dobrý sluha, ale špatný pán
Jiří Sekera: Vzory: dobrý sluha, ale špatný pán
 
Petr Ludwig: Jak bojovat s prokrastinací?
Petr Ludwig: Jak bojovat s prokrastinací?Petr Ludwig: Jak bojovat s prokrastinací?
Petr Ludwig: Jak bojovat s prokrastinací?
 

Similar to ARM'08 - Keynote Talk

TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
Lora Aroyo
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Nicolas Kourtellis
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and more
Wael Elrifai
 

Similar to ARM'08 - Keynote Talk (20)

Content-based link prediction
Content-based link predictionContent-based link prediction
Content-based link prediction
 
Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systems
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
 
Telefonica Lunch Seminar
Telefonica Lunch SeminarTelefonica Lunch Seminar
Telefonica Lunch Seminar
 
SocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfSocialCom09-tutorial.pdf
SocialCom09-tutorial.pdf
 
Dissertation Social Network Sites
Dissertation Social Network SitesDissertation Social Network Sites
Dissertation Social Network Sites
 
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
 
Sas web 2010 lora-aroyo
Sas web 2010 lora-aroyoSas web 2010 lora-aroyo
Sas web 2010 lora-aroyo
 
Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and more
 
Social network analysis (SNA) - Big data and social data - Telecommunications...
Social network analysis (SNA) - Big data and social data - Telecommunications...Social network analysis (SNA) - Big data and social data - Telecommunications...
Social network analysis (SNA) - Big data and social data - Telecommunications...
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
A recommender system for social learning platforms
A recommender system for social learning platformsA recommender system for social learning platforms
A recommender system for social learning platforms
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Ppt
PptPpt
Ppt
 
18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence
 
09 Diffusion Models & Peer Influence
09 Diffusion Models & Peer Influence09 Diffusion Models & Peer Influence
09 Diffusion Models & Peer Influence
 
Learning to Classify Users in Online Interaction Networks
Learning to Classify Users in Online Interaction NetworksLearning to Classify Users in Online Interaction Networks
Learning to Classify Users in Online Interaction Networks
 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

ARM'08 - Keynote Talk

  • 1. Trust in Pervasive Social Computing Licia Capra Dept of Computer Science University College London
  • 2. EVOLUTION OF MOBILE TECHNOLOGY
  • 4. A DIGITAL TAPESTRY
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. BROWSING THE TAPESTRY Joint work with Matteo Dell’Amico @ Eurecom Presented at the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 08
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. = Intent & Competence
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. EXPERIMENTS – ROBUSTNESS 2583 5 5165 10 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 35. EXPERIMENTS – ROBUSTNESS 2297 1285 334 2583 5 4459 2353 559 5165 10 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 36. EXPERIMENTS – ROBUSTNESS 1 34 2297 1285 334 2583 5 1 85 4459 2353 559 5165 10 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 37. EXPERIMENTS – ROBUSTNESS Lower values of  improve attack resilience, at the expense (small) of accuracy 679 2264 41 1082 1 215 1 34 2297 1285 334 2583 5 1386 4409 132 2126 2 391 1 85 4459 2353 559 5165 10 31765 33064 2815 14718 197 5571 11182 19186 1311 8779 74 2649 3406 9599 469 4612 13 1040 Victim Other Victim Other Victim Other 1 10 100 SOFIA 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 38. UNLOCKING THE TAPESTRY
  • 39.
  • 40. UNLOCKING THE TAPESTRY Evaluate Browse Build
  • 41. UNLOCKING THE TAPESTRY HOW TO BUILD AN UNLOCKED TAPESTRY
  • 42.
  • 43. UNLOCKING THE TAPESTRY HOW TO BROWSE AN UNLOCKED TAPESTRY
  • 44.
  • 45. UNLOCKING THE TAPESTRY HOW TO EVALUATE OUR APPROACHES
  • 46.
  • 47.