Enhancing Trust-based Data Analytics for Forecasting Social Harm

被引:0
|
作者
Chowdhury, Nahida Sultana [1 ]
Raje, Rajeev R. [1 ]
Pandey, Saurabh [1 ]
Mohler, George [1 ]
Carter, Jeremy [1 ]
机构
[1] Indiana Univ Purdue Univ, Indianapolis, IN 46202 USA
关键词
Social harm; Subjective logic; Trust management; Hotspots; Collaborative patterns;
D O I
10.1109/isc251055.2020.9239015
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
First responders deal with a variety of social harm events (e.g. crime, traffic crashes, medical emergencies) that result in physical, emotional, and/or financial hardships. Through data analytics, resources can be efficiently allocated to increase the impact of interventions aimed at reducing social harm -T-CDASH (Trusted Community Data Analytics for Social Harm) is an ongoing joint effort between the Indiana University Purdue University Indianapolis (IUPUI), the Indianapolis Metropolitan Police Department (IMPD), and the Indianapolis Emergency Medical Services (IEMS) with this goal of using data analytics to efficiently allocate resources to respond to and reduce social harm. In this paper, we make several enhancements to our previously introduced trust estimation framework T-CDASH. These enhancements include additional metrics for measuring the effectiveness of forecasts, evaluation on new datasets, and an incorporation of collaborative trust models. To empirically validate our current work, we ran simulations on newly collected 2019 and 2020 (Jan-April) social harm data from the Indianapolis metro area. We describe the behavior and significance of the collaboration and their comparison with previously introduced stand-alone models.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Trust-Based Data Controller for Personal Information Management
    Jayasinghe, Upul
    Lee, Gyu Myoung
    MacDermott, Aine
    PROCEEDINGS OF THE 2018 13TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2018, : 123 - 128
  • [22] A trust-based framework for data forwarding in opportunistic networks
    Li, Na
    Das, Sajal K.
    AD HOC NETWORKS, 2013, 11 (04) : 1497 - 1509
  • [23] Enhancing Security in the Internet of Things: A Trust-Based Protocol for Resilient Communication
    Althaf Ali A.
    Hussain M.M.
    Subramaneswara Rao A.
    Lavanya S.
    Feroz Khan A.B.
    SN Computer Science, 5 (1)
  • [24] TRUST-BASED MEDICINE
    Nemcekova, Maria
    HUMAN AFFAIRS-POSTDISCIPLINARY HUMANITIES & SOCIAL SCIENCES QUARTERLY, 2013, 23 (01): : 114 - 116
  • [25] Social networks data analytical approaches for trust-based recommender systems: A systematic literature review
    Vatani, Nasim
    Rahmani, Amir Masoud
    Javadi, Hamid Haj Seyyed
    Jassbi, Somayyeh Jafarali
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2024, 37 (05)
  • [26] Integrated Computing, Caching, and Communication for Trust-based Social Networks: A Big Data DRL Approach
    He, Ying
    Liang, Chengchao
    Yu, F. Richard
    Leung, Victor C. M.
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [27] Trust-based Misinformation Containment in Directed Online Social Networks
    Ghoshal, Arnab Kumar
    Das, Nabanita
    Das, Soham
    Dhar, Subhankar
    2023 15TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS, COMSNETS, 2023,
  • [28] GroupTrust: Finding Trust-based Group Structures in Social Communities
    Comi, Antonello
    Fotia, Lidia
    Messina, Fabrizio
    Rosaci, Domenico
    Sarne, Giuseppe M. L.
    INTELLIGENT DISTRIBUTED COMPUTING X, 2017, 678 : 143 - 152
  • [30] The relational impact of social rights judgments: a trust-based analysis
    Vitale, David
    LEGAL STUDIES, 2022, 42 (03) : 408 - 424