用数据来源评估来源的可信度:一份研究报告

A. Badia
{"title":"用数据来源评估来源的可信度:一份研究报告","authors":"A. Badia","doi":"10.1109/ISI.2012.6284145","DOIUrl":null,"url":null,"abstract":"One of the main challenges in intelligence work is to assess the trustworthiness of data sources. In an adversarial setting, in which the subjects under study actively try to disturb the data gathering process, trustworthiness is one of the most important properties of a source. The recent increase in usage of open source data has exacerbated the problem, due to the proliferation of sources. In this paper we propose computerized methods to help analysts evaluate the truthfulness of data sources (open or not). We apply methods developed in database and Semantic Web research to determine data quality (which includes truthfulness but also other related aspects like accuracy, timeliness, etc.). Research on data quality has made frequent use of provenance metadata. This is metadata related to the origin of the data: where it comes from, how and when it was obtained, and any relevant conditions that might help determine how it came to be in its current form. We study the application of similar methods to the particular situation of the Intelligence analyst, focusing on trust. This paper describes ongoing research; what is explained here is a first attempt at tackling this complex but very important problem. Due to lack of space, relevant work in the research literature is not discussed, and several technical considerations are omitted; finally, further research directions are only sketched.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Evaluating source trustability with data provenance: A research note\",\"authors\":\"A. Badia\",\"doi\":\"10.1109/ISI.2012.6284145\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the main challenges in intelligence work is to assess the trustworthiness of data sources. In an adversarial setting, in which the subjects under study actively try to disturb the data gathering process, trustworthiness is one of the most important properties of a source. The recent increase in usage of open source data has exacerbated the problem, due to the proliferation of sources. In this paper we propose computerized methods to help analysts evaluate the truthfulness of data sources (open or not). We apply methods developed in database and Semantic Web research to determine data quality (which includes truthfulness but also other related aspects like accuracy, timeliness, etc.). Research on data quality has made frequent use of provenance metadata. This is metadata related to the origin of the data: where it comes from, how and when it was obtained, and any relevant conditions that might help determine how it came to be in its current form. We study the application of similar methods to the particular situation of the Intelligence analyst, focusing on trust. This paper describes ongoing research; what is explained here is a first attempt at tackling this complex but very important problem. Due to lack of space, relevant work in the research literature is not discussed, and several technical considerations are omitted; finally, further research directions are only sketched.\",\"PeriodicalId\":199734,\"journal\":{\"name\":\"2012 IEEE International Conference on Intelligence and Security Informatics\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-06-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE International Conference on Intelligence and Security Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISI.2012.6284145\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Conference on Intelligence and Security Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2012.6284145","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

情报工作的主要挑战之一是评估数据源的可信度。在对抗性环境中,研究对象积极地试图干扰数据收集过程,可信度是信息源最重要的属性之一。由于数据源的激增,最近开源数据使用量的增加加剧了这个问题。在本文中,我们提出了计算机化的方法来帮助分析人员评估数据源(开放或不开放)的真实性。我们应用数据库和语义网研究中开发的方法来确定数据质量(包括真实性,以及其他相关方面,如准确性,及时性等)。在数据质量的研究中,经常使用来源元数据。这是与数据来源相关的元数据:数据来自何处、如何以及何时获得,以及可能有助于确定数据如何以当前形式出现的任何相关条件。我们研究了类似方法在情报分析员的特殊情况下的应用,重点是信任。本文描述了正在进行的研究;这里解释的是解决这个复杂但非常重要的问题的第一次尝试。由于篇幅所限,没有对研究文献中的相关工作进行讨论,并省略了一些技术考虑;最后,对进一步的研究方向进行了概述。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Evaluating source trustability with data provenance: A research note
One of the main challenges in intelligence work is to assess the trustworthiness of data sources. In an adversarial setting, in which the subjects under study actively try to disturb the data gathering process, trustworthiness is one of the most important properties of a source. The recent increase in usage of open source data has exacerbated the problem, due to the proliferation of sources. In this paper we propose computerized methods to help analysts evaluate the truthfulness of data sources (open or not). We apply methods developed in database and Semantic Web research to determine data quality (which includes truthfulness but also other related aspects like accuracy, timeliness, etc.). Research on data quality has made frequent use of provenance metadata. This is metadata related to the origin of the data: where it comes from, how and when it was obtained, and any relevant conditions that might help determine how it came to be in its current form. We study the application of similar methods to the particular situation of the Intelligence analyst, focusing on trust. This paper describes ongoing research; what is explained here is a first attempt at tackling this complex but very important problem. Due to lack of space, relevant work in the research literature is not discussed, and several technical considerations are omitted; finally, further research directions are only sketched.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Detecting criminal networks: SNA models are compared to proprietary models Securing cyberspace: Identifying key actors in hacker communities Emergency decision support using an agent-based modeling approach Payment card fraud: Challenges and solutions Extracting action knowledge in security informatics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1