SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
Realizing the Potential
of Trust Management
       Tyrone Grandison
Legal Disclaimer
The thoughts expressed here are solely my own and do
not reflect the positions or viewpoints of any entity that
                I have an association with.
Brief Intro
B.S. degree in Computer Studies (Computer Science and
Economics) from the University of the West Indies in 1997.
M.S. degree in Software Engineering in 1998. Ph.D. degree
in Computer Science from the Imperial College of
Science, Technology & Medicine in London.

Joined IBM Almaden Research Center – California in 2003.

Currently, Program Manager for Core Healthcare Services
in the Global Healthcare Transformation team at the
Thomas J. Watson Research Center.

http://researcher.ibm.com/view.php?person=us-tyroneg
My Basic Premise
As a general community, we need
to do more to unlock the full
potential of our work.

Lots of great work on
                                         Business     Legal
   Trust Models and Formalisms
   Reputation and recommendation
   Risk and Experience
   Reliability, Dependability, Compete   Technical   Societal
   nce and Honesty
   Identity Management
   Privacy and Security
So, what’s the concern?
Impact
    Not scholarly publication

          Approximate Number of Published Trust
             Management Papers and Articles
3000
2500
2000
 1500
1000                                              # TM papers
 500
   0
So, what’s the concern?
Impact
  Industry Penetration
Why is it so important now?
                The time is right
     Big Data                       Interest
                                Trust Management




                                Trust




                               Google Trends. Sampled March 17, 2012
Additional Concern
Trust Management is potentially at a critical stage in the
Hype Cycle
   Gartner’s Hype Cycle is a graphic representation of the
   maturity, adoption and social application of specific
   technologies
How to have Industry Impact
   Impact the Corporation’s Products
    Infuse solutions in their bedrock
   Impact the Corporation
    Facilitate internal connections
Impacting Products
Work with a partner, client, problem with a
huge footprint
  Startups, Enterprises, …

Define solutions for the current and next
wave of technology
  Boot2Gecko, Mobile Apps, Big Data, “Smarter
  Planet”-esque solutions
TM Solution Characteristics
  Foundational
  Embedded
  Data-Level
  Invisible-ish
  Simple
  Scalable
  Context really matters
Impacting the Corporation
 Typical Corporate Competency Statement

  Company X builds “360 degrees of trust” across the full
            spectrum of our constituents – our
  organizations, clients, and communities. We do this by
  acting with integrity, assuming positive intent, holding
   ourselves accountable, trusting in the capabilities of
    others, and taking responsibility for remedying the
             situation if we see trust eroding.
Building Mutual Trust
Avoid traps:
  Over-focusing on what went wrong over what went right.
  Assuming you are objective. Reflect on your assumptions
  and beliefs and try to determine your biases. This may
  require feedback from others.
  Thinking that the other person is solely responsible for
  earning your trust and thus taking no responsibility and
  making no efforts to remedy an existing lack of trust.
  Making premature judgments of others. Listen to what
  they say first. Evaluate it later.
  Positive thinking is not always rational thinking. Optimism
  must be supported by a realistic assessment.
Maintaining this Competency
  Analyze the level of trust in your
  relationship with others
  Communicate openly and honestly with
  colleagues
  Coach a colleague to build a trusting
  relationship
Wanted
A Trust Management System that:
 Is Integrity-based
 Assumes honest (and positive) intent
 Has accountability controls built-in
 Constructs for trusting the capabilities of others
 Mechanisms for ameliorating the relationship (on
 both sides) when trust erodes
 Makes trust evolution decisions solely based on
 experience
 Balances negative and positive experiences.
 Is aware, i.e. automatically analyzes relationship
 and accepts feedback (and also provides feedback to
 others)
ENGAGE
      @tyrgr
tyroneg@us.ibm.com

Mais conteúdo relacionado

Destaque

Teaching in libraries
Teaching in librariesTeaching in libraries
Teaching in librariesShane Sher
 
Linked in for career development MBA Talk (08.12.11)
Linked in for career development MBA Talk (08.12.11)Linked in for career development MBA Talk (08.12.11)
Linked in for career development MBA Talk (08.12.11)WalterAkana
 
Intro computer
Intro computerIntro computer
Intro computerturm2506
 
Paul brewster presentation
Paul brewster presentationPaul brewster presentation
Paul brewster presentationGreen17Creative
 
Women in South Korea
Women in South KoreaWomen in South Korea
Women in South KoreaKyle
 
Living Online: The WordPress Resume
Living Online: The WordPress ResumeLiving Online: The WordPress Resume
Living Online: The WordPress ResumeChristopher Spencer
 
Tws Brand Vs. Bland Presentation Low Res
Tws Brand Vs. Bland Presentation Low ResTws Brand Vs. Bland Presentation Low Res
Tws Brand Vs. Bland Presentation Low ResThe Creative Stable
 
Dermot byrne presentation
Dermot byrne presentationDermot byrne presentation
Dermot byrne presentationGreen17Creative
 
Jw history of written english 9.19.11
Jw history of written english 9.19.11Jw history of written english 9.19.11
Jw history of written english 9.19.11Angala Maria
 
Self-Employed Academy Overview
Self-Employed Academy OverviewSelf-Employed Academy Overview
Self-Employed Academy OverviewIASECP
 
Affect and the Objects of Robert Croma’s Web Cinema
Affect and the Objects of Robert Croma’s Web CinemaAffect and the Objects of Robert Croma’s Web Cinema
Affect and the Objects of Robert Croma’s Web Cinemavogmae
 
Adcorp board presentation_july_2011_fg
Adcorp board presentation_july_2011_fgAdcorp board presentation_july_2011_fg
Adcorp board presentation_july_2011_fgOdette Wyk
 
Network Media - A Final Lecture
Network Media - A Final LectureNetwork Media - A Final Lecture
Network Media - A Final Lecturevogmae
 
Quantity and Quality in University Teaching
Quantity and Quality in University TeachingQuantity and Quality in University Teaching
Quantity and Quality in University Teachingvogmae
 

Destaque (20)

Foursquare for Biz
Foursquare for BizFoursquare for Biz
Foursquare for Biz
 
Teaching in libraries
Teaching in librariesTeaching in libraries
Teaching in libraries
 
Linked in for career development MBA Talk (08.12.11)
Linked in for career development MBA Talk (08.12.11)Linked in for career development MBA Talk (08.12.11)
Linked in for career development MBA Talk (08.12.11)
 
Goldpp
GoldppGoldpp
Goldpp
 
Justin's
Justin's Justin's
Justin's
 
Intro computer
Intro computerIntro computer
Intro computer
 
Paul brewster presentation
Paul brewster presentationPaul brewster presentation
Paul brewster presentation
 
Women in South Korea
Women in South KoreaWomen in South Korea
Women in South Korea
 
Living Online: The WordPress Resume
Living Online: The WordPress ResumeLiving Online: The WordPress Resume
Living Online: The WordPress Resume
 
Tws Brand Vs. Bland Presentation Low Res
Tws Brand Vs. Bland Presentation Low ResTws Brand Vs. Bland Presentation Low Res
Tws Brand Vs. Bland Presentation Low Res
 
Summer Books 2010
Summer Books 2010Summer Books 2010
Summer Books 2010
 
Dermot byrne presentation
Dermot byrne presentationDermot byrne presentation
Dermot byrne presentation
 
Jw history of written english 9.19.11
Jw history of written english 9.19.11Jw history of written english 9.19.11
Jw history of written english 9.19.11
 
Self-Employed Academy Overview
Self-Employed Academy OverviewSelf-Employed Academy Overview
Self-Employed Academy Overview
 
Affect and the Objects of Robert Croma’s Web Cinema
Affect and the Objects of Robert Croma’s Web CinemaAffect and the Objects of Robert Croma’s Web Cinema
Affect and the Objects of Robert Croma’s Web Cinema
 
Jw day 6 (unit 3)
Jw day 6 (unit 3)Jw day 6 (unit 3)
Jw day 6 (unit 3)
 
Tibatiantest
TibatiantestTibatiantest
Tibatiantest
 
Adcorp board presentation_july_2011_fg
Adcorp board presentation_july_2011_fgAdcorp board presentation_july_2011_fg
Adcorp board presentation_july_2011_fg
 
Network Media - A Final Lecture
Network Media - A Final LectureNetwork Media - A Final Lecture
Network Media - A Final Lecture
 
Quantity and Quality in University Teaching
Quantity and Quality in University TeachingQuantity and Quality in University Teaching
Quantity and Quality in University Teaching
 

Semelhante a Realizing the potential of trust management

Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementMighty Guides, Inc.
 
Andrew Gilleran - Is Ireland ready for the social enterprise?
Andrew Gilleran - Is Ireland ready for the social enterprise?Andrew Gilleran - Is Ireland ready for the social enterprise?
Andrew Gilleran - Is Ireland ready for the social enterprise?Andrew Gilleran
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Evolved Role of the Information Securtiy Professional
Evolved Role of the Information Securtiy ProfessionalEvolved Role of the Information Securtiy Professional
Evolved Role of the Information Securtiy Professionalguestb58577
 
Social Media & Employee Engagement
Social Media & Employee EngagementSocial Media & Employee Engagement
Social Media & Employee EngagementMichael Specht
 
THIS IS THE FEEDBACK I RECEEIVED. Only one patient responded to my.docx
THIS IS THE FEEDBACK I RECEEIVED. Only one patient responded to my.docxTHIS IS THE FEEDBACK I RECEEIVED. Only one patient responded to my.docx
THIS IS THE FEEDBACK I RECEEIVED. Only one patient responded to my.docxkbrenda
 
Iq management cindy_seibel_share_it 2013 final
Iq management cindy_seibel_share_it 2013 finalIq management cindy_seibel_share_it 2013 final
Iq management cindy_seibel_share_it 2013 finalIQManagement
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Group
 
Chief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership RoleChief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership RoleBrian Donovan
 
Trust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology RiskTrust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology RiskSwatantra Kumar
 
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...Dana Gardner
 
Trust: How to Get It, Keep It, Measure It and Regain It
Trust: How to Get It, Keep It, Measure It and Regain It Trust: How to Get It, Keep It, Measure It and Regain It
Trust: How to Get It, Keep It, Measure It and Regain It Paine Publishing
 
Nazanine Matin: Encouraging Women Entrepreneurs to Take Charge
Nazanine Matin: Encouraging Women Entrepreneurs to Take ChargeNazanine Matin: Encouraging Women Entrepreneurs to Take Charge
Nazanine Matin: Encouraging Women Entrepreneurs to Take ChargeCIO Look Magazine
 
Presentation of Research Findings, by YouGov’s Oliver Rowe, Director of Reput...
Presentation of Research Findings, by YouGov’s Oliver Rowe, Director of Reput...Presentation of Research Findings, by YouGov’s Oliver Rowe, Director of Reput...
Presentation of Research Findings, by YouGov’s Oliver Rowe, Director of Reput...Mattcartmell
 
Fortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipFortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipMighty Guides, Inc.
 

Semelhante a Realizing the potential of trust management (20)

Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
Andrew Gilleran - Is Ireland ready for the social enterprise?
Andrew Gilleran - Is Ireland ready for the social enterprise?Andrew Gilleran - Is Ireland ready for the social enterprise?
Andrew Gilleran - Is Ireland ready for the social enterprise?
 
The 10 Most Influential Leaders in Business 2019
The 10 Most Influential Leaders in Business 2019The 10 Most Influential Leaders in Business 2019
The 10 Most Influential Leaders in Business 2019
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Evolved Role of the Information Securtiy Professional
Evolved Role of the Information Securtiy ProfessionalEvolved Role of the Information Securtiy Professional
Evolved Role of the Information Securtiy Professional
 
Social Media & Employee Engagement
Social Media & Employee EngagementSocial Media & Employee Engagement
Social Media & Employee Engagement
 
THIS IS THE FEEDBACK I RECEEIVED. Only one patient responded to my.docx
THIS IS THE FEEDBACK I RECEEIVED. Only one patient responded to my.docxTHIS IS THE FEEDBACK I RECEEIVED. Only one patient responded to my.docx
THIS IS THE FEEDBACK I RECEEIVED. Only one patient responded to my.docx
 
Iq management cindy_seibel_share_it 2013 final
Iq management cindy_seibel_share_it 2013 finalIq management cindy_seibel_share_it 2013 final
Iq management cindy_seibel_share_it 2013 final
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attack
 
Sourcing I.T. Value
Sourcing I.T. ValueSourcing I.T. Value
Sourcing I.T. Value
 
Reputation in real time
Reputation in real timeReputation in real time
Reputation in real time
 
Chief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership RoleChief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership Role
 
Trust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology RiskTrust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology Risk
 
The JMT Network Program
The JMT Network ProgramThe JMT Network Program
The JMT Network Program
 
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
 
Trust: How to Get It, Keep It, Measure It and Regain It
Trust: How to Get It, Keep It, Measure It and Regain It Trust: How to Get It, Keep It, Measure It and Regain It
Trust: How to Get It, Keep It, Measure It and Regain It
 
External Trends
External TrendsExternal Trends
External Trends
 
Nazanine Matin: Encouraging Women Entrepreneurs to Take Charge
Nazanine Matin: Encouraging Women Entrepreneurs to Take ChargeNazanine Matin: Encouraging Women Entrepreneurs to Take Charge
Nazanine Matin: Encouraging Women Entrepreneurs to Take Charge
 
Presentation of Research Findings, by YouGov’s Oliver Rowe, Director of Reput...
Presentation of Research Findings, by YouGov’s Oliver Rowe, Director of Reput...Presentation of Research Findings, by YouGov’s Oliver Rowe, Director of Reput...
Presentation of Research Findings, by YouGov’s Oliver Rowe, Director of Reput...
 
Fortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipFortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused Leadership
 

Mais de Tyrone Grandison

Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicTyrone Grandison
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessTyrone Grandison
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Tyrone Grandison
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodTyrone Grandison
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...Tyrone Grandison
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab LaunchTyrone Grandison
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanTyrone Grandison
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusTyrone Grandison
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of InnovationTyrone Grandison
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMETyrone Grandison
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceTyrone Grandison
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social GoodTyrone Grandison
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationTyrone Grandison
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of AmericaTyrone Grandison
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsTyrone Grandison
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeTyrone Grandison
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in HealthcareTyrone Grandison
 
Publishing in Biomedical Data Science
Publishing in Biomedical Data SciencePublishing in Biomedical Data Science
Publishing in Biomedical Data ScienceTyrone Grandison
 

Mais de Tyrone Grandison (20)

Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global Pandemic
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and Access
 
COVID and the Ederly
COVID and the EderlyCOVID and the Ederly
COVID and the Ederly
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater Good
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab Launch
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic Plan
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and Focus
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of Innovation
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHME
 
The Power Of Open
The Power Of OpenThe Power Of Open
The Power Of Open
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data Service
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social Good
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT Modernization
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of America
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public Collaborations
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With Purpose
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in Healthcare
 
Publishing in Biomedical Data Science
Publishing in Biomedical Data SciencePublishing in Biomedical Data Science
Publishing in Biomedical Data Science
 

Último

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 

Último (20)

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 

Realizing the potential of trust management

  • 1. Realizing the Potential of Trust Management Tyrone Grandison
  • 2. Legal Disclaimer The thoughts expressed here are solely my own and do not reflect the positions or viewpoints of any entity that I have an association with.
  • 3. Brief Intro B.S. degree in Computer Studies (Computer Science and Economics) from the University of the West Indies in 1997. M.S. degree in Software Engineering in 1998. Ph.D. degree in Computer Science from the Imperial College of Science, Technology & Medicine in London. Joined IBM Almaden Research Center – California in 2003. Currently, Program Manager for Core Healthcare Services in the Global Healthcare Transformation team at the Thomas J. Watson Research Center. http://researcher.ibm.com/view.php?person=us-tyroneg
  • 4. My Basic Premise As a general community, we need to do more to unlock the full potential of our work. Lots of great work on Business Legal Trust Models and Formalisms Reputation and recommendation Risk and Experience Reliability, Dependability, Compete Technical Societal nce and Honesty Identity Management Privacy and Security
  • 5. So, what’s the concern? Impact Not scholarly publication Approximate Number of Published Trust Management Papers and Articles 3000 2500 2000 1500 1000 # TM papers 500 0
  • 6. So, what’s the concern? Impact Industry Penetration
  • 7. Why is it so important now? The time is right Big Data Interest Trust Management Trust Google Trends. Sampled March 17, 2012
  • 8. Additional Concern Trust Management is potentially at a critical stage in the Hype Cycle Gartner’s Hype Cycle is a graphic representation of the maturity, adoption and social application of specific technologies
  • 9. How to have Industry Impact Impact the Corporation’s Products Infuse solutions in their bedrock Impact the Corporation Facilitate internal connections
  • 10. Impacting Products Work with a partner, client, problem with a huge footprint Startups, Enterprises, … Define solutions for the current and next wave of technology Boot2Gecko, Mobile Apps, Big Data, “Smarter Planet”-esque solutions
  • 11. TM Solution Characteristics Foundational Embedded Data-Level Invisible-ish Simple Scalable Context really matters
  • 12. Impacting the Corporation Typical Corporate Competency Statement Company X builds “360 degrees of trust” across the full spectrum of our constituents – our organizations, clients, and communities. We do this by acting with integrity, assuming positive intent, holding ourselves accountable, trusting in the capabilities of others, and taking responsibility for remedying the situation if we see trust eroding.
  • 13. Building Mutual Trust Avoid traps: Over-focusing on what went wrong over what went right. Assuming you are objective. Reflect on your assumptions and beliefs and try to determine your biases. This may require feedback from others. Thinking that the other person is solely responsible for earning your trust and thus taking no responsibility and making no efforts to remedy an existing lack of trust. Making premature judgments of others. Listen to what they say first. Evaluate it later. Positive thinking is not always rational thinking. Optimism must be supported by a realistic assessment.
  • 14. Maintaining this Competency Analyze the level of trust in your relationship with others Communicate openly and honestly with colleagues Coach a colleague to build a trusting relationship
  • 15. Wanted A Trust Management System that: Is Integrity-based Assumes honest (and positive) intent Has accountability controls built-in Constructs for trusting the capabilities of others Mechanisms for ameliorating the relationship (on both sides) when trust erodes Makes trust evolution decisions solely based on experience Balances negative and positive experiences. Is aware, i.e. automatically analyzes relationship and accepts feedback (and also provides feedback to others)
  • 16. ENGAGE @tyrgr tyroneg@us.ibm.com

Notas do Editor

  1. A hype cycle in Gartner's interpretation comprises five phases:"Technology Trigger" — The first phase of a hype cycle is the "technology trigger" or breakthrough, product launch or other event that generates significant press and interest."Peak of Inflated Expectations" — In the next phase, a frenzy of publicity typically generates over-enthusiasm and unrealistic expectations. There may be some successful applications of a technology, but there are typically more failures."Trough of Disillusionment" — Technologies enter the "trough of disillusionment" because they fail to meet expectations and quickly become unfashionable. Consequently, the press usually abandons the topic and the technology."Slope of Enlightenment" — Although the press may have stopped covering the technology, some businesses continue through the "slope of enlightenment" and experiment to understand the benefits and practical application of the technology."Plateau of Productivity" — A technology reaches the "plateau of productivity" as the benefits of it become widely demonstrated and accepted. The technology becomes increasingly stable and evolves in second and third generations. The final height of the plateau varies according to whether the technology is broadly applicable or benefits only a niche market.