Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Trust Issues on Crowd-Sourcing Methods for Urban Environmental Monitoring

Published: 01 January 2012 Publication History

Abstract

This paper explores trust related issues arising from the use of a crowd-sourcing method. Crowd-sourcing is a relatively new method that utilises modern technologies to gather, analyse and visualise specific "on-the-fly" data. The data is typically acquired through the employment of mobile technology, with each device running a bespoke application that captures the desired information. The resulting "crowd sourced" data is readily available and the corresponding maps produced can in turn, be used to support strategic planning and to facilitate overall, more informed decision-making. The purpose is to provide insights into this novel approach to data collection, aggregation and subsequent visualisation. Specifically, the focus centres upon issues of trust and security that are inherent not merely to the use of crowd sourced data capture itself, but also crucially, to the stewardship and usage of the resultant data sets within e-government settings. A novel community centric usage scenario is presented that seeks to show how issues of trust pervade the technology. Hence, both rewards and risks are revealed and we go on to outline a preliminary approach intended to support a trusted and reputable "crowdy" data architecture.

References

[1]
Asimakopoulou, E., & Bessis, N. 2011, June 30-July 2. Buildings and Crowds: Forming Smart Cities for More Effective Disaster Management. In Proceedings of the 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Seoul, Korea pp. 128-135.
[2]
Bessis, N. 2009. Model Architecture for a User tailored Data Push Service in Data Grids. In Bessis, N. Ed., Grid Technology for Maximizing Collaborative Decision Management and Support: Advancing Effective Virtual Organizations pp. 235-255. Hershey, PA: IGI Global.
[3]
Bessis, N. 2010, February 15-18. Using next generation grid technologies for advancing virtual organizations. Keynote Talk at the International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland.
[4]
Bessis, N., Asimakopoulou, E., Aydin, M., & Xhafa, F. 2011. Utilizing Next Generation Emerging Technologies for enabling Collective Computational Intelligence in Disaster Management. In Bessis, N., & Xhafa, F. Eds., Next Generation Data Technologies for Collective Computational Intelligence Vol. 352, pp. 503-526. New York, NY: Springer.
[5]
Bessis, N., Asimakopoulou, E., French, T., Norrington, P., & Xhafa, F. 2010, November 4-6. The Big Picture, from Grids and Clouds to Crowds: A Data Collective Computational Intelligence Case Proposal for Managing Disasters. In Proceedings of the 5th IEEE International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Fukuoka, Japan pp. 351-356.
[6]
Clayton, R. 2005a, April 20-22. Insecure Real-World Authentication Protocols or why Phishing is so Profitable. In Proceedings of the 13th International Workshop on Security Protocols, Cambridge, MA.
[7]
Clayton, R. 2005b, February 28-March 3. Who'd Phish from the Summit of Kilimanjaro? In Proceedings of the 9th International Conference on Financial Cryptography and Data Security, Roseau, The Commonwealth of Dominica LNCS 3570, pp. 91-92.
[8]
Conrad, M., French, T., Huang, W., & Maple, C. 2006. A Lightweight Model of Trust Propagation in a Multi-Client Network Environment: To What Extent Does Experience Matter? In Proceedings of the1st IEEE International Conference on Availability, Reliability and Security pp. 482-487.
[9]
Cuppens, F., Cuppens-Boulahia, N., & Thomas, J. 2008. A Robust Reputation Scheme for Group Management in Mobile ad-Hoc Networks. In Proceedings of the Workshop on Security of Autonomous and Spontaneous Networks pp. 77-91.
[10]
French, T. 2009. Towards an e-Service Trust Framework: Trust as a Semiotic Phenomenon Unpublished doctoral dissertation. Reading University, Berkshire, UK.
[11]
French, T., Bessis, N., & Hussain, F. 2010, July 12-14. Crowd sourced "Citizen Science" Urban Environmental Monitoring and Decision Making: Trust Issues Risks and Rewards. In Proceedings of the 3rd International Conference on the Applications of Digital Information and Web Technologies, Istanbul, Turkey pp. 164-169.
[12]
French, T., Bessis, N., Xhafa, F., & Maple, C. 2011. Towards a Corporate Governance Trust Agent Scoring Model for Collaborative Virtual Organisations. International Journal of Grid and Utility Computing, 22, 98-108.
[13]
French, T., & Liu, K. 2009, April 10-12. Hidden Semiosis: Trusted security mediators. In Proceedings of the 11th International Conference on Informatics and Semiotics, Beijing, China pp. 47-55.
[14]
Hardin, R. Ed. 2002. Trust and trustworthiness. New York, NY: Russell Sage.
[15]
Josang, A., Ismail, R., & Boyd, C. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems, 432, 618-644.
[16]
Karvonen, K. 2007, June 12-13. Enabling Trust between Humans and Machines. In Proceedings of the 20th European e-Identity Conference, Paris, France. Retrieved from http://www.tml.tkk.fi/~kk/publications.html
[17]
Kindberg, T., O'Neill, E., Bevan, C., Kostakos, V., Fraser, D. S., & Jay, T. 2008. Measuring Trust in Wi-Fi Hot Spots. In Proceedings of the 26th SIGCHI Conference on Human Factors in Computer Systems pp. 173-182. Retrieved from http://portal.acm.org/citation.cfm?id=1357084
[18]
Maisonneuve, N., Stevens, M., Niessen, M., Hanappe, P., & Steels, L. 2009, May 17-19. Citizen Noise Pollution Monitoring. In Proceedings of the 10th International Digital Government Research Conference, Puebla, Mexico pp. 96-103.
[19]
Paulos, E. 2009, October 12-13. Designing for Doubt: Citizen Science and the Challenge of Change. In Proceedings of the 1st International Forum on the Application and Management of Personal Information, Cambridge, MA.
[20]
Putnam, R. D. 2000. Bowling Alone: The Collapse and revival of American Community. New York, NY: Touchstone.
[21]
Sotiriadis, S., Bessis, N., Asimakopoulou, E., & Xhafa, F. 2010, November 24-26. Crowd-sourcing and Data Mashups Challenges: A Mini Case Study for Assisting and Solving a Disaster Management Scenario. In Proceedings of the 2nd International Conference on Intelligent Networking and Collaborative Systems, Thessaloniki, Greece pp. 496-501.
[22]
World Health Organisation WHO. 2006. Air Quality Guidelines for Particulate Matter, Ozone Nitrogen Dioxide and Sulphur Dioxide: Global Update 2005. Geneva, Switzerland: Author.
[23]
Yan, S., & French, T. 2007, July 22-27. Non-Repudiable and Repudiable Authentications in E-Systems. In Proceedings of the 15th International Conference on Conceptual Structures, Sheffield, UK pp. 17-24.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image International Journal of Distributed Systems and Technologies
International Journal of Distributed Systems and Technologies  Volume 3, Issue 1
January 2012
62 pages
ISSN:1947-3532
EISSN:1947-3540
Issue’s Table of Contents

Publisher

IGI Global

United States

Publication History

Published: 01 January 2012

Author Tags

  1. Crowd-Sourcing
  2. E-Government
  3. Environmental Monitoring
  4. Trust
  5. Urban Monitoring

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media