Enhancing Trust-based Data Analytics for Forecasting Social Harm

被引:0
|
作者
Chowdhury, Nahida Sultana [1 ]
Raje, Rajeev R. [1 ]
Pandey, Saurabh [1 ]
Mohler, George [1 ]
Carter, Jeremy [1 ]
机构
[1] Indiana Univ Purdue Univ, Indianapolis, IN 46202 USA
关键词
Social harm; Subjective logic; Trust management; Hotspots; Collaborative patterns;
D O I
10.1109/isc251055.2020.9239015
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
First responders deal with a variety of social harm events (e.g. crime, traffic crashes, medical emergencies) that result in physical, emotional, and/or financial hardships. Through data analytics, resources can be efficiently allocated to increase the impact of interventions aimed at reducing social harm -T-CDASH (Trusted Community Data Analytics for Social Harm) is an ongoing joint effort between the Indiana University Purdue University Indianapolis (IUPUI), the Indianapolis Metropolitan Police Department (IMPD), and the Indianapolis Emergency Medical Services (IEMS) with this goal of using data analytics to efficiently allocate resources to respond to and reduce social harm. In this paper, we make several enhancements to our previously introduced trust estimation framework T-CDASH. These enhancements include additional metrics for measuring the effectiveness of forecasts, evaluation on new datasets, and an incorporation of collaborative trust models. To empirically validate our current work, we ran simulations on newly collected 2019 and 2020 (Jan-April) social harm data from the Indianapolis metro area. We describe the behavior and significance of the collaboration and their comparison with previously introduced stand-alone models.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Trust-Based Recommendation for the Social Web
    Oliveira, A. D. R.
    Bessa, L. N.
    Andrade, T. R.
    Filgueiras, L. V. L.
    Sichman, J. S.
    IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (02) : 1661 - 1666
  • [2] Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data
    Xu, Shouhuai
    Li, Xiaohu
    Parker, Timothy Paul
    Wang, Xueping
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 39 - 52
  • [3] A New Monitor Model for Enhancing Trust-Based Systems
    Jia, Lang
    Nixon, Paddy
    AUTONOMIC AND TRUSTED COMPUTING, 2010, 6407 : 242 - 254
  • [4] Enhancing the Trust-Based Recommendation Process with Explicit Distrust
    Victor, Patricia
    Verbiest, Nele
    Cornelis, Chris
    De Cock, Martine
    ACM TRANSACTIONS ON THE WEB, 2013, 7 (02)
  • [5] Trust-based social capital, institutions, and development
    Baliamoune-Lutz, Mina
    JOURNAL OF SOCIO-ECONOMICS, 2011, 40 (04): : 335 - 346
  • [6] Can we trust trust-based data governance models?
    van der Sloot, Bart
    Keymolen, Esther
    DATA & POLICY, 2022, 4
  • [7] A trust-based Probing to secure data routing
    Bouabana-Tebibel, Thouraya
    Tebibel, Nidal
    Zemmouri, Selma
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1592 - 1597
  • [8] Trust-Based Data Disclosure in Sensor Networks
    Aivaloglou, Efthimia
    Gritzalis, Stefanos
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 741 - 746
  • [9] CDASH Community Data Analytics for Social Harm Prevention
    Pandey, Saurabh
    Chowdhury, Nahida
    Patil, Milan
    Raje, Rajecv R.
    Shreyas, C. S.
    Mohler, George
    Carter, Jeremy
    2018 IEEE INTERNATIONAL SMART CITIES CONFERENCE (ISC2), 2018,
  • [10] Trust-Based Social Item Recommendation: A Case Study
    Xing, Xing
    Zhang, Weishi
    Jia, Zhichun
    Zhang, Xiuguo
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1050 - 1053