DocumentCode :
3126044
Title :
Evaluating source trustability with data provenance: A research note
Author :
Badia, Antonio
Author_Institution :
Comput. Eng. & Comput. Sci. Dept., Univ. of Louisville, Louisville, KY, USA
fYear :
2012
fDate :
11-14 June 2012
Firstpage :
129
Lastpage :
131
Abstract :
One of the main challenges in intelligence work is to assess the trustworthiness of data sources. In an adversarial setting, in which the subjects under study actively try to disturb the data gathering process, trustworthiness is one of the most important properties of a source. The recent increase in usage of open source data has exacerbated the problem, due to the proliferation of sources. In this paper we propose computerized methods to help analysts evaluate the truthfulness of data sources (open or not). We apply methods developed in database and Semantic Web research to determine data quality (which includes truthfulness but also other related aspects like accuracy, timeliness, etc.). Research on data quality has made frequent use of provenance metadata. This is metadata related to the origin of the data: where it comes from, how and when it was obtained, and any relevant conditions that might help determine how it came to be in its current form. We study the application of similar methods to the particular situation of the Intelligence analyst, focusing on trust. This paper describes ongoing research; what is explained here is a first attempt at tackling this complex but very important problem. Due to lack of space, relevant work in the research literature is not discussed, and several technical considerations are omitted; finally, further research directions are only sketched.
Keywords :
data acquisition; public domain software; semantic Web; trusted computing; adversarial setting; data gathering process; data provenance; data source truthfulness; database research; intelligence work; metadata; open source data; semantic Web research; source trustability evaluation; trustworthiness; Computers; Conferences; Data mining; Electric breakdown; Equations; Monitoring; Terrorism;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on
Conference_Location :
Arlington, VA
Print_ISBN :
978-1-4673-2105-1
Type :
conf
DOI :
10.1109/ISI.2012.6284145
Filename :
6284145
Link To Document :
بازگشت