Rating credibility of sources for profiling risk and business context of service requests

Rebecca Copeland, Noel Crespi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Attributes credibility, trustiness and accuracy are often considered, but not incorporated in decision making algorithms. In this paper a credibility-based risk/business context model is proposed, to profile communication service requests using sources' credibility, as well as observed intensity and customizable policy-based prioritization. The paper proves that this Credibility-based approach can cope with the complexity and uncertainty of context models, which Bayes probabilities cannot, and with degrees of discordance and uncertainty, which DST cannot. The paper provides reviews of concepts and techniques to determine credibility from its components and aggregate corroborated credibility within observations and ultimately key factors of the model. The paper tests and proves the effectiveness of the modelled credibility, intensity and policy, and shows that incorporating Credibility is a better way to make informed decisions.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE International Conference on Services Computing, SCC 2014
EditorsElena Ferrari, Ravindran Kaliappa, Patrick C.K. Hung
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages416-423
Number of pages8
ISBN (Electronic)9781479950669
DOIs
Publication statusPublished - 17 Oct 2014
Externally publishedYes
Event11th IEEE International Conference on Services Computing, SCC 2014 - Anchorage, United States
Duration: 27 Jun 20142 Jul 2014

Publication series

NameProceedings - 2014 IEEE International Conference on Services Computing, SCC 2014

Conference

Conference11th IEEE International Conference on Services Computing, SCC 2014
Country/TerritoryUnited States
CityAnchorage
Period27/06/142/07/14

Keywords

  • AHP
  • Bayes
  • Belief function
  • Context
  • Credibility
  • DST
  • Dempster rule
  • Discordance
  • Entropy
  • OWA
  • SAW
  • WPM

Fingerprint

Dive into the research topics of 'Rating credibility of sources for profiling risk and business context of service requests'. Together they form a unique fingerprint.

Cite this