SlideShare uma empresa Scribd logo
1 de 14
Understanding How Emergency Managers
Evaluate Crowdsourced Data:
A Trust Game-Based Approach
Kathleen Moore
Andrea H. Tapia
Christopher Griffin
The Pennsylvania State University
College of Information Sciences & Technology
ISCRAM 2013 – Baden-Baden, Germany
Problem Statement
• Crowdsourced data by Emergency Managers
(EM) has been a significant topic of scholarly
discussion
• Strongest barrier to use identified as data quality
• Focus on data quality is a small part of problem
space
• Need to understand info behavior
Background
• Role of EMs
• Avoid and mitigate risk
• Prepare, respond, recover from disasters
• EM decision making
• Hampered by stress of time
• Cognitive limits of EM
• Amount and quality of information
• Not necessarily problematic as research has shown that
even with all available information, managers do not
always make optimal decision regarding events and can
misinterpret information
From Data to Decisions
• EMs overcome through satisficing
• Choosing good-enough solutions over perfect
ones
• Social media a technical solution to
enhance dissemination
• Problem: flow, quality, usability,
trustworthiness, verifiability
• Overwhelms the process/EM
• Any technical solutions must account for
information culture of the organization/EM
receiving the data
Assessing Trust in Data
• Trust: acceptance of a certain amount
of risk when lacking full knowledge and
lacking the ability to fully control a
situation (Alpern 1997)
• Ability, benevolence, integrity
• Fluid, dynamic, reiterative
• Trust, mistrust, distrust, untrust
• Better understood in static Web,
ecommerce, old social media, less so in
new social media
• Primarily studied from perspective of
information provider and not receptor
Trust & Social Media
• Old rules/understandings do not apply
• Trust IS NOT one, two, or even three data points
• One Tweet may yield OVER 30 pieces of information!
• Meredith Morris @ Microsoft
• Social Cues are less understood
• What is ability, benevolence, integrity in 140 characters?
• To study trust in microblogging:
• Person providing information
• Quality, consistency of that information
• ACT of the person ACCEPTING that information
Research Goal
• Study EM as a trustworthy data analyst
• Propose: develop model for capturing trust-
analytical behavior through game theory and
semantic content
Research Design
• Phase I
• Measuring trustworthy data, modeling trust behavior, and
building a game
• Non-cooperative, and Game Theory perspective
• Game Theory (loosely)
• System for analysis of behavior where consequences of
actors’ decisions depend on information provided by others
for EM to act upon
• System to organize, capture and learn from future experience
• Game setting creates sense of competitiveness/urgency to
mimic stress of pressing events facing EM
The Math!
• Beautiful! Elegant!
• It will change what you have for breakfast!
• Refer to paper in ISCRAM Proceedings
• PLEASE email any questions!!
The Game
• Multi-turn 2 player game
• Player 1 – Teller (microblogger)
• Player 2 – Actor (EM)
• Player 2 does or does not act on info by Player 1 in a finite set of sentences
• Every piece of information is either consistent with what we know, inconsistent
or could be consistent, but no way to tell
• Halting play occurs when Player 2 no longer wishes to accept information from
Player 1 (deemed untrustworthy)
• The objective of game is to obtain largest net payoff possible
• Component of experimentation, develop tool to help EM detect less than
credible information
• Determine impact information has on quality of a player’s responses to
stimuli
Game Format
Implications/Future Work
• Develop models of how trust works in a
microblogged environment providing
crowdsourced data during crisis events
• Will need to address veracity of trust factors in
crowdsourced data as viewed by analysts rather
than everyday persons/technical specialists
• Also reconcile potential discrepancies between
what is perceived as trustworthy versus what is
acted upon given perception of trustworthy.
Thank You
ISCRAM 2014
Kathleen Moore
kam6015@psu.edu

Mais conteúdo relacionado

Semelhante a Understanding How Emergency Managers Evaluate Crowdsourced Data: A Trust Game-Based Approach

4th Workshop on Strategic Crisis Management, Keynote Presentation - Strategic...
4th Workshop on Strategic Crisis Management, Keynote Presentation - Strategic...4th Workshop on Strategic Crisis Management, Keynote Presentation - Strategic...
4th Workshop on Strategic Crisis Management, Keynote Presentation - Strategic...OECD Governance
 
Online Educa Berlin conference: Big Data in Education - theory and practice
Online Educa Berlin conference: Big Data in Education - theory and practiceOnline Educa Berlin conference: Big Data in Education - theory and practice
Online Educa Berlin conference: Big Data in Education - theory and practiceMike Moore
 
د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة D...
د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة  D...د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة  D...
د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة D...د حاتم البيطار
 
Social Engineering: Frames and Frame Control
Social Engineering: Frames and Frame ControlSocial Engineering: Frames and Frame Control
Social Engineering: Frames and Frame ControlSocial Exploits
 
A design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction DesignA design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction DesignSónia
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
 
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on TrackYour AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on TrackPrecisely
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsSónia
 
20 06-2014
20 06-201420 06-2014
20 06-2014Sónia
 
Engaging with Users on Public Social Media
Engaging with Users on Public Social MediaEngaging with Users on Public Social Media
Engaging with Users on Public Social MediaJeffrey Nichols
 
Brighttalk reason 114 for learning math - final
Brighttalk   reason 114 for learning math - finalBrighttalk   reason 114 for learning math - final
Brighttalk reason 114 for learning math - finalAndrew White
 
Trust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social MediaTrust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social MediaTeradata Aster
 
Effective data governance for customer intelligence
Effective data governance for customer intelligenceEffective data governance for customer intelligence
Effective data governance for customer intelligenceGary Allemann
 
10 challenges that market research companies face
10 challenges that market research companies face10 challenges that market research companies face
10 challenges that market research companies faceEminenture
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOnRamp
 

Semelhante a Understanding How Emergency Managers Evaluate Crowdsourced Data: A Trust Game-Based Approach (20)

4th Workshop on Strategic Crisis Management, Keynote Presentation - Strategic...
4th Workshop on Strategic Crisis Management, Keynote Presentation - Strategic...4th Workshop on Strategic Crisis Management, Keynote Presentation - Strategic...
4th Workshop on Strategic Crisis Management, Keynote Presentation - Strategic...
 
Online Educa Berlin conference: Big Data in Education - theory and practice
Online Educa Berlin conference: Big Data in Education - theory and practiceOnline Educa Berlin conference: Big Data in Education - theory and practice
Online Educa Berlin conference: Big Data in Education - theory and practice
 
د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة D...
د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة  D...د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة  D...
د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة D...
 
Michigan Bankers Association Best 2014 enterprise risk management ppt
Michigan Bankers Association Best 2014 enterprise risk management pptMichigan Bankers Association Best 2014 enterprise risk management ppt
Michigan Bankers Association Best 2014 enterprise risk management ppt
 
Social Engineering: Frames and Frame Control
Social Engineering: Frames and Frame ControlSocial Engineering: Frames and Frame Control
Social Engineering: Frames and Frame Control
 
A design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction DesignA design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction Design
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on TrackYour AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
 
Organizational Security Compliance - a Narrative Review
Organizational Security Compliance - a Narrative ReviewOrganizational Security Compliance - a Narrative Review
Organizational Security Compliance - a Narrative Review
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactions
 
20 06-2014
20 06-201420 06-2014
20 06-2014
 
Engaging with Users on Public Social Media
Engaging with Users on Public Social MediaEngaging with Users on Public Social Media
Engaging with Users on Public Social Media
 
Brighttalk reason 114 for learning math - final
Brighttalk   reason 114 for learning math - finalBrighttalk   reason 114 for learning math - final
Brighttalk reason 114 for learning math - final
 
Trust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social MediaTrust and Influence in the Complex Network of Social Media
Trust and Influence in the Complex Network of Social Media
 
Contextual Biometrics
Contextual BiometricsContextual Biometrics
Contextual Biometrics
 
Effective data governance for customer intelligence
Effective data governance for customer intelligenceEffective data governance for customer intelligence
Effective data governance for customer intelligence
 
10 challenges that market research companies face
10 challenges that market research companies face10 challenges that market research companies face
10 challenges that market research companies face
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Module 1
Module 1Module 1
Module 1
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 

Último

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Último (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Understanding How Emergency Managers Evaluate Crowdsourced Data: A Trust Game-Based Approach

  • 1. Understanding How Emergency Managers Evaluate Crowdsourced Data: A Trust Game-Based Approach Kathleen Moore Andrea H. Tapia Christopher Griffin The Pennsylvania State University College of Information Sciences & Technology ISCRAM 2013 – Baden-Baden, Germany
  • 2. Problem Statement • Crowdsourced data by Emergency Managers (EM) has been a significant topic of scholarly discussion • Strongest barrier to use identified as data quality • Focus on data quality is a small part of problem space • Need to understand info behavior
  • 3. Background • Role of EMs • Avoid and mitigate risk • Prepare, respond, recover from disasters • EM decision making • Hampered by stress of time • Cognitive limits of EM • Amount and quality of information • Not necessarily problematic as research has shown that even with all available information, managers do not always make optimal decision regarding events and can misinterpret information
  • 4. From Data to Decisions • EMs overcome through satisficing • Choosing good-enough solutions over perfect ones • Social media a technical solution to enhance dissemination • Problem: flow, quality, usability, trustworthiness, verifiability • Overwhelms the process/EM • Any technical solutions must account for information culture of the organization/EM receiving the data
  • 5. Assessing Trust in Data • Trust: acceptance of a certain amount of risk when lacking full knowledge and lacking the ability to fully control a situation (Alpern 1997) • Ability, benevolence, integrity • Fluid, dynamic, reiterative • Trust, mistrust, distrust, untrust • Better understood in static Web, ecommerce, old social media, less so in new social media • Primarily studied from perspective of information provider and not receptor
  • 6. Trust & Social Media • Old rules/understandings do not apply • Trust IS NOT one, two, or even three data points • One Tweet may yield OVER 30 pieces of information! • Meredith Morris @ Microsoft • Social Cues are less understood • What is ability, benevolence, integrity in 140 characters? • To study trust in microblogging: • Person providing information • Quality, consistency of that information • ACT of the person ACCEPTING that information
  • 7. Research Goal • Study EM as a trustworthy data analyst • Propose: develop model for capturing trust- analytical behavior through game theory and semantic content
  • 8. Research Design • Phase I • Measuring trustworthy data, modeling trust behavior, and building a game • Non-cooperative, and Game Theory perspective • Game Theory (loosely) • System for analysis of behavior where consequences of actors’ decisions depend on information provided by others for EM to act upon • System to organize, capture and learn from future experience • Game setting creates sense of competitiveness/urgency to mimic stress of pressing events facing EM
  • 9. The Math! • Beautiful! Elegant! • It will change what you have for breakfast! • Refer to paper in ISCRAM Proceedings • PLEASE email any questions!!
  • 10. The Game • Multi-turn 2 player game • Player 1 – Teller (microblogger) • Player 2 – Actor (EM) • Player 2 does or does not act on info by Player 1 in a finite set of sentences • Every piece of information is either consistent with what we know, inconsistent or could be consistent, but no way to tell • Halting play occurs when Player 2 no longer wishes to accept information from Player 1 (deemed untrustworthy) • The objective of game is to obtain largest net payoff possible • Component of experimentation, develop tool to help EM detect less than credible information • Determine impact information has on quality of a player’s responses to stimuli
  • 12.
  • 13. Implications/Future Work • Develop models of how trust works in a microblogged environment providing crowdsourced data during crisis events • Will need to address veracity of trust factors in crowdsourced data as viewed by analysts rather than everyday persons/technical specialists • Also reconcile potential discrepancies between what is perceived as trustworthy versus what is acted upon given perception of trustworthy.
  • 14. Thank You ISCRAM 2014 Kathleen Moore kam6015@psu.edu