Skip to main content

Incorporating Trust, Certainty and Importance of Information into Knowledge Processing Systems – An Approach

  • Conference paper
  • First Online:
Book cover Future Data and Security Engineering (FDSE 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10018))

Included in the following conference series:

Abstract

The origin of data (data provenance), should always be measured or categorized within the context of trusting the source of data. Can we be sure that the information we receive is trustworthy and reliable? Is the source trustable? Is the data certain? And how important is the received data the our current and next step of processing? We face these questions in the context of knowledge processing systems by developing a convenient approach to bring all these questions and values – trustability, certainty, importance – into a computable, measurable, and comparable way of expression. Not yet facing the question “How to compute trust or certainty?”, but how to incorporate and process their measured values in knowledge processing systems to receive a representative view on the whole environment and its output.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In our work, we combine the data and information layer, referring to the Data-Information-Knowledge-Wisdom (DIKW) architecture in [12] from Russell Lincoln Ackoff, so data has the role of information and belongs to the information layer.

References

  1. Online: Wikipedia, the free Encyclopedia (2015)

    Google Scholar 

  2. Christodorescu, M., Sailer, R., Schales, D.L., Sgandurra, D., Zamboni, D.: Cloud security is not (just) virtualization security: a short paper. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security (2009)

    Google Scholar 

  3. Rousseau, D., Sitkin, S., Burt, R., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manage. Rev. 23(3), 393–404 (1998)

    Article  Google Scholar 

  4. Jäger, M., Nadschläger, S., Nhan Phan, T.: Towards the trustworthiness of data, information, knowledge and knowledge processing systems in smart homes. In: IDIMT-2015 Information Technology and Society Interaction and Interdependence, vol. 23. Trauner, September 2015. http://www.idimt.org, ISBN:978-3-99033-395-2

  5. McKnight, D.H.: Trust in Information Technology. Blackwell Encycl. Manage. Oper. Manage. 7, 329–331 (2005). Blackwell Pub

    Google Scholar 

  6. Hertzum, M., Andersen, H.H., Andersen, V., Hansen, C.B.: Trust in information sources: seeking information from people, documents, and virtual agents. Interact. Comput. 14(5), 575–599 (2002)

    Article  Google Scholar 

  7. Denize, S., Young, L.: Concerning trust and information. Ind. Mark. Manage. 36(7), 968–982 (2007). Opening the network - Bridging the IMP tradition and other research perspectives2006 IMP Conference Special Issue22nd Industrial Marketing and Purchasing Group Conference

    Article  Google Scholar 

  8. Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An approach to evaluate data trustworthiness based on data provenance. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 82–98. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  9. Buneman, P., Davidson, S.B.: Data provenance-the foundation of data quality (2010)

    Google Scholar 

  10. Buneman, P., Khanna, S., Tan, W.-C.: Data provenance: some basic issues. In: Kapoor, S., Prasad, S. (eds.) FSTTCS 2000. LNCS, vol. 1974, pp. 87–93. Springer, Heidelberg (2000). doi:10.1007/3-540-44450-5_6

    Chapter  Google Scholar 

  11. Tan, W.C.: Research problems in data provenance. IEEE Data Eng. Bull. 27, 45–52 (2004)

    Google Scholar 

  12. Ackoff, R.L.: From data to wisdom. J. Appl. Syst. Anal. 16(1), 3–9 (1989)

    Google Scholar 

  13. Prat, N., Madnick, S.: Measuring data believability: a provenance approach. In: Hawaii International Conference on System Sciences, p. 393 (2008)

    Google Scholar 

  14. European Commission: http://www.clafis-project.eu/ y.n.: CLAFIS: Crop, livestock and forests integrated system for intelligent automation

Download references

Acknowledgments

The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement no.604659.

The authors would like to thank all partners in CLAFIS [14] for the good cooperation within the project. The collaboration between experts from different fields made it possible, to write a paper with this content. Special thanks to our colleagues from LUKE in Finland for the development of the DPM (disease pressure model) to give a possibility, to apply the approach on a practical and real world scenario in our current project-work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Markus Jäger .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Jäger, M., Phan, T.N., Huber, C., Küng, J. (2016). Incorporating Trust, Certainty and Importance of Information into Knowledge Processing Systems – An Approach. In: Dang, T., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds) Future Data and Security Engineering. FDSE 2016. Lecture Notes in Computer Science(), vol 10018. Springer, Cham. https://doi.org/10.1007/978-3-319-48057-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48057-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48056-5

  • Online ISBN: 978-3-319-48057-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics