Abstract
The origin of data (data provenance), should always be measured or categorized within the context of trusting the source of data. Can we be sure that the information we receive is trustworthy and reliable? Is the source trustable? Is the data certain? And how important is the received data the our current and next step of processing? We face these questions in the context of knowledge processing systems by developing a convenient approach to bring all these questions and values – trustability, certainty, importance – into a computable, measurable, and comparable way of expression. Not yet facing the question “How to compute trust or certainty?”, but how to incorporate and process their measured values in knowledge processing systems to receive a representative view on the whole environment and its output.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In our work, we combine the data and information layer, referring to the Data-Information-Knowledge-Wisdom (DIKW) architecture in [12] from Russell Lincoln Ackoff, so data has the role of information and belongs to the information layer.
References
Online: Wikipedia, the free Encyclopedia (2015)
Christodorescu, M., Sailer, R., Schales, D.L., Sgandurra, D., Zamboni, D.: Cloud security is not (just) virtualization security: a short paper. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security (2009)
Rousseau, D., Sitkin, S., Burt, R., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manage. Rev. 23(3), 393–404 (1998)
Jäger, M., Nadschläger, S., Nhan Phan, T.: Towards the trustworthiness of data, information, knowledge and knowledge processing systems in smart homes. In: IDIMT-2015 Information Technology and Society Interaction and Interdependence, vol. 23. Trauner, September 2015. http://www.idimt.org, ISBN:978-3-99033-395-2
McKnight, D.H.: Trust in Information Technology. Blackwell Encycl. Manage. Oper. Manage. 7, 329–331 (2005). Blackwell Pub
Hertzum, M., Andersen, H.H., Andersen, V., Hansen, C.B.: Trust in information sources: seeking information from people, documents, and virtual agents. Interact. Comput. 14(5), 575–599 (2002)
Denize, S., Young, L.: Concerning trust and information. Ind. Mark. Manage. 36(7), 968–982 (2007). Opening the network - Bridging the IMP tradition and other research perspectives2006 IMP Conference Special Issue22nd Industrial Marketing and Purchasing Group Conference
Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An approach to evaluate data trustworthiness based on data provenance. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 82–98. Springer, Heidelberg (2008)
Buneman, P., Davidson, S.B.: Data provenance-the foundation of data quality (2010)
Buneman, P., Khanna, S., Tan, W.-C.: Data provenance: some basic issues. In: Kapoor, S., Prasad, S. (eds.) FSTTCS 2000. LNCS, vol. 1974, pp. 87–93. Springer, Heidelberg (2000). doi:10.1007/3-540-44450-5_6
Tan, W.C.: Research problems in data provenance. IEEE Data Eng. Bull. 27, 45–52 (2004)
Ackoff, R.L.: From data to wisdom. J. Appl. Syst. Anal. 16(1), 3–9 (1989)
Prat, N., Madnick, S.: Measuring data believability: a provenance approach. In: Hawaii International Conference on System Sciences, p. 393 (2008)
European Commission: http://www.clafis-project.eu/ y.n.: CLAFIS: Crop, livestock and forests integrated system for intelligent automation
Acknowledgments
The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement no.604659.
The authors would like to thank all partners in CLAFIS [14] for the good cooperation within the project. The collaboration between experts from different fields made it possible, to write a paper with this content. Special thanks to our colleagues from LUKE in Finland for the development of the DPM (disease pressure model) to give a possibility, to apply the approach on a practical and real world scenario in our current project-work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Jäger, M., Phan, T.N., Huber, C., Küng, J. (2016). Incorporating Trust, Certainty and Importance of Information into Knowledge Processing Systems – An Approach. In: Dang, T., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds) Future Data and Security Engineering. FDSE 2016. Lecture Notes in Computer Science(), vol 10018. Springer, Cham. https://doi.org/10.1007/978-3-319-48057-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-48057-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48056-5
Online ISBN: 978-3-319-48057-2
eBook Packages: Computer ScienceComputer Science (R0)