This site was archived on 24 April 2012. No new content can be posted. The mailing list remains online and the site will stay in this archived state for the forseeable future. If you find any technical errors on the site, please contact Callum.



Tag Archive for 'trust'

Trust decreasing among CouchSurfers?

Trust metrics are techniques for predicting how much a certain user can be trusted by the other users.CouchSurfing doesn’t really have a prediction mechanism, but trust values are registered for every friendship link.

I never thought the denominators for the trust value made a lot of sense for the friendship links on CS (especially when translated, I don’t really know how to best translate “I somewhat trust this person” into my mother tongue). Still, there seems to be a definite trend of linearly (in time) decreasing trust on the Quality of Service page. It would be interesting to compare this to values from before and do a deeper analysis. The “average quality” doesn’t seem to be changing significantly on the other hand, maybe slightly going up? Possibly because it’s actually visible to the receiver.

Joe Edelman wrote the QoS code, and wrote to me:

Wow, that *is* interesting!

So the avg trust is calculated among introductions added in the last
week that are reported as due to CS and in-person. So it’s not because
of virtual users, and it’s not because CS is accelerating and includes
less pre-existing friends.

The only confounding factor I can think of, is that it doesn’t take the
“date you met this person” field into account — a lot of people don’t
fill it out, or don’t fill it out correctly. So it includes
introductions that are finally being reported from the past, as well as
those that actually occurred that week.

We could be seeing an ever-greater percentage of weirdos from the past.
You know, those random people that blew through a collective, and much
later are friending everyone. And the people they are friending hardly
remember them and so don’t trust them. This would be a result of social
graph “fill-in”, perhaps as a kind of recoil from expansion last summer.

Or, perhaps it’s an accurate result, and as CS grows, people that meet
find they have less in common, since CS includes more demographics.

In that case, it could be interpretted as a *positive* result: perhaps
the ideal would be to take people who DON’T trust each other INITIALLY,
and give them POSITIVE EXPERIENCES such that later they DO trust each
other, or they start to trust other people from a new demographic MORE.

Let’s just hope this trend does not continue. If it would, the average trust would be zero by the end of 2010.

In the meanwhile, some active work can be done on designing and implementing a trust system from scratch on BeWelcome.

The data:

year   week introductions users  quality  trust

2008    16         6625   3890    1.526   0.370

2008    15        14238   7345    1.506   0.377

2008    14        14818   7591    1.490   0.379

2008    13        16520   8201    1.527   0.388

2008    12        13895   6952    1.500   0.387

2008    11        12252   6291    1.479   0.379

2008    10        12303   6490    1.493   0.392

2008    09        12796   6482    1.480   0.382

2008    08        11336   5875    1.483   0.376

2008    07        12484   6408    1.486   0.391

2008    06        11778   6215    1.469   0.409

2008    05        11201   5945    1.453   0.406

2008    04        10570   5998    1.479   0.415

2008    03        10757   5983    1.489   0.410

2008    02         9560   4872    1.503   0.410

2008    01        13972   6425    1.484   0.417

2007    52         7749   4279    1.476   0.414

2007    51         9332   5118    1.467   0.421

2007    50        10975   5500    1.480   0.422

2007    49        10309   5632    1.454   0.415

2007    48        10664   5500    1.454   0.413

2007    47        10335   5734    1.487   0.425

2007    46        10835   5762    1.492   0.429

Trust circles, reputation and the perception of trust.

Studying trust and perceived trust I came across this excerpt in the brainstorm group

the only reason i am waiting, is because i see certain things which these people are planning to do half done technically and i know how easily they can be undone by people who know how to buck the system…and we do know of people who are VERY GOOD at bucking the system

i hate cloak and dagger myself, and to be fair, the information has been liberally shared with all the people who were there in the meet over a phone call, so i do not really think it is only being given to a few privileged members….

but i do understand that some information on a forum like brainstorm might defeat the purpose…i myself am cagey about spelling out some of the stuff i would be involved in (when they are of the sensitive nature) on this forum as i know who are the people watching this group…

A couple of keywords caught my attention “Cloak and dagger” “Bucking the system”

What does bucking the system mean? And how does Cloak and dagger come into the couchsurfing equation.

wikipedia
Cloak and dagger is a term sometimes used to refer to situations involving espionage, mystery, or even assassination. The
phrase dates from the early 19th century.
thefreedictionary
cloak-and-dagger cloak-and-dagger – conducted with or marked by hidden aims or methods; “clandestine intelligence operations”; “cloak-and-dagger activities behind enemy lines”; “hole-and-corner intrigue”; “secret missions”; “a secret agent”; “secret sales of arms”; “surreptitious mobilization of troops”; “an undercover investigation”; “underground resistance”
Some of reference I found about “Bucking the system“. So I am not sure what cryptic message where hidden in those words.

Bucking the system: Andrew Wilkie and the difficult task of the whistleblower

Buck the System, Cosby Tells Teachers — nytimes
I want you to realize who you are and stop these people from grading you until they grade the system,” he said. ”How can you teach if you have no books? The system ties their legs and says, ‘Run.’ It ties their arms and says, ‘Defend yourself.’ ”

The post was very interesting because of the trust matrices involved and a the different in the perception of trust on a global scale.

Effect of Culture, Medium, and Task on Trust Perception Qiping Zhang

DISCUSSION
Most of hypotheses were confirmed except that the interaction effect of culture and media on trust perception.
The results of higher level of trust perceived by Americans than by Chinese actually contradicted with our hypothesis.
The theory of nationality trust and social distance provide a possible explanation. In our study, AA pairs seemed more willing to treat each other as a temporary in-group member instead of a “real stranger”, while CC pairs seemed treating the partner as an out-group relationship due to lack of longterm relationship.

The ambassador system is placed on the two factors perceived trust and reputation .It is perceived and not real trust as you can see the scales fluctuating so wildly. People going from best friend to no friend to being deleted from the friends list.

http://www.trustlet.org/ A trust metric is a technique for predicting how much a certain user can be trusted by the other users of the community.

But by the above interactions you can see the perception of trust.

A recent definition of trust has been put forth by Grandison and Sloman [Grandison and Sloman, 2000] who define trust as – the firm belief in the competence of an entity to act dependably, securely, and reliably within a specified context.

Related to trust is the concept of reputation. Abdul-Rehman and Hailes define reputation as an expectation about an individual’s behavior based on information about or observations of its past behavior

The cloak-and-daggercloak-and-dagger – conducted with or marked by hidden aims or methods; “clandestine intelligence operations“; “cloak-and-dagger activities behind enemy lines“; “hole-and-corner intrigue”; “secret missions”; “a secret agent”; “secret sales of arms”; “surreptitious mobilization of troops”; “an undercover investigation”; “underground resistance

Got me thinking on trying to see if Kerckhoff’s Principle can be applied to member safety and perceived trust.

The following article relate to cryptography and they have been used before by kasper to highlight security concerns. In the code. I feel these laws are universal and can be used to highlight global social networking trust perceptions as related to global member security.

Kerckhoff’s Principle states.
“a cryptosystem should be secure even if everything about the system, except the key, is public knowledge”

The team moves on trust and this perceived trust fluctuates wildly as shown above. The weakest link needs to be located to gain trust.

Social engineering reloaded
Kevin Mitnick,in his book The Art of Deception, goes further to explain that people inherently want to be helpful and therefore are easily duped. They assume a level of trust in order to avoid conflict.

http://www.securityfocus.com/infocus/1860/2

“anyone who thinks that security products alone offer true security is settling for the illusion of security.”

Risky business: Keeping security a secret — zdnet.com
If you depend on a secret for your security, what do you do when the secret is discovered? If it is easy to change, like a cryptographic key, you do so. If it’s hard to change, like a cryptographic system or an operating system, you’re stuck. You will be vulnerable until you invest the time and money to design another system.

How to use cryptography in computer security –itmanagersjournal.com
Myth 3: Secrecy is important for security.
The prevalence of this myth may be attributed to the historical confusion between keeping your data secret and keeping your security algorithms themselves secret. On the contrary, the only worthwhile insurance of security comes from having your algorithm published and well analyzed by as many cryptographers as possible. The principle that security should not rely on algorithms being secret has been well-established for over a century, and various pithy restatements of it are often cited:
“Security should reside only in the key” (Kerckhoff), “The enemy knows the system” (Shannon), and “Anyone can design a cryptosystem which he himself cannot break” (Schneier).

wikipedia.org http://en.wikipedia.org/wiki/Kerckhoffs’_principle
http://www.fplc.edu/risk/vol7/spring/kunreuth.htm

At this juncture, we need to move forward in one of two directions. One path that has been advocated by a number of researchers is to work toward increasing public trust in risk management. While it is much too soon to express either optimism or pessimism about the likely success of this strategy, it is a significantly challenging problem that at the moment appears to have no easy answers.

Now what we need to find out is, does it help making the system public knowledge .Or does it help having a system which is continuously leaking information due to the perception of trust.

Would a system be more secure with the system being public knowledge (only the system not the cases)?