ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
A survey of trust and reputation systems for online service provision
Decision Support Systems
Measuring trust in wi-fi hotspots
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Citizen noise pollution monitoring
Proceedings of the 10th Annual International Conference on Digital Government Research: Social Networks: Making Connections between Citizens, Data and Government
Insecure real-world authentication protocols: or why phishing is so profitable
Proceedings of the 13th international conference on Security protocols
3PGCIC '10 Proceedings of the 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing
INCOS '10 Proceedings of the 2010 International Conference on Intelligent Networking and Collaborative Systems
Towards a corporate governance trust agent scoring model for collaborative virtual organisations
International Journal of Grid and Utility Computing
Buildings and Crowds: Forming Smart Cities for More Effective Disaster Management
IMIS '11 Proceedings of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
Who'd phish from the summit of kilimanjaro?
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Hi-index | 0.00 |
This paper explores trust related issues arising from the use of a crowd-sourcing method. Crowd-sourcing is a relatively new method that utilises modern technologies to gather, analyse and visualise specific "on-the-fly" data. The data is typically acquired through the employment of mobile technology, with each device running a bespoke application that captures the desired information. The resulting "crowd sourced" data is readily available and the corresponding maps produced can in turn, be used to support strategic planning and to facilitate overall, more informed decision-making. The purpose is to provide insights into this novel approach to data collection, aggregation and subsequent visualisation. Specifically, the focus centres upon issues of trust and security that are inherent not merely to the use of crowd sourced data capture itself, but also crucially, to the stewardship and usage of the resultant data sets within e-government settings. A novel community centric usage scenario is presented that seeks to show how issues of trust pervade the technology. Hence, both rewards and risks are revealed and we go on to outline a preliminary approach intended to support a trusted and reputable "crowdy" data architecture.