more spoiled opinion a source has, the smaller is the
parameter
1/2
i
which multiplies its influence. For
sources without dependencies, this order is not
necessary. The influence is only multiplied by the
1/2
i
value as expressed by the equation (12).
()
∑∑
==
+=
=
mi
i
ni
i
l
mn
GCp
GGppC
i
...1...1
,0
1,01,0
2
1
),...,,,...,(
(12)
2.5 Conclusions from Known Sentences
Apart from source information, the rating system
also estimates the credibility of information on the
basis of this which it already accepted as true. For
example, when the rating system is verifying
whether a sentence p is true or not and it already
accepted as true sentences r and t such that r
∧ t→p,
this fact is included in evaluation of credibility. The
question is how important such known sentences
should be in truth verification. In the example given
above r
∧ t→p will be treated by the rating system in
the same way as the independent source claiming p.
The value added to the C function will be equal 1.
When apart from sentences r and t there will be
sentences g and h such as r
∧ g∧ h→p then these
sentences g and h will add ½ to the value of C
function. It is because the sentence r has already
been taken into account. The addition of aspect of
known sentences to the function C is expressed by
equations (13).
()
()
()
prrrrC
rCRC
rrrR
RCGCp
RGGppC
jj
i
vjjvjj
ki
i
k
mi
i
ni
i
l
mn
→∧∧=
=
=
++=
=
++
=
==
∑
∑∑
... if 1,...,
)()(
,...,,
)(
2
1
),,...,,,...,(
...1
21
...1...1
11
(13)
R – set of known sentences
r
1
,...,r
k
– known sentences
k – number of known sentences
r
j
,..,r
j+vj
–any known sentences which implicates p
Function C(R) expressed by equations (13) can
be calculated in various ways. In the rating system
this function is not ambiguous. It first assigns values
for relations with the smallest number of known
sentences and then, iteratively, for those relations
where the number of known sentences is greater.
3 CONCLUSIONS
Current researches on the computer science tend to
focus rather on trust in terms of security and on
reliability in the meaning of the systems' stability,
than on credibility. Nevertheless, even if
requirements of security and reliability are fulfilled,
the matter of providing credible information still
remains unresolved. Structures such as Knowledge
Grid and Semantic Web where information is stored
in a formalized manner create much more
possibilities in detecting falseness automatically. It
was used in the algorithm presented in this paper.
Truth verification is more effective when
information copied from the other source is
published with reference to the original source. Such
notes can prevent from propagation of false data.
Including data about the original source of
information should be a common practice in
Knowledge Grid and Semantics Web.
REFERENCES
Abdulla R. A., Garrison B., Salwen M., Driscoll P., Casey
D., 2002. The Credibility of Newspapers, Television
News, and Online News, In Proc. of the Association
for Education in Journalism and Mass Communication
Annual Convention, Miami Beach, FL
Berners-Lee T., 1998. Semantic Web: Inconsistent data,
http://www.w3.org/DesignIssues/Inconsistent.html
Fogg B.J., 2003. Persuasive Technology: Using
Computers to Change What We Think and Do,
Morgan Kaufmann Publishers
Google News, 2003. Google News Patent Aplication,
http://www.webpronews.com/topnews/2005/05/03/go
ogle-news-patent-application-full-text
Nagura R., Seki Y., Kando N., Aono M., 2006 A Method
of Rating the Credibility of News Documents on the
Web, In Proceedings of the 29th annual international
ACM SIGIR conference on Research and development
in information retrieval
Palmer S. B., 2001. The Semantic Web: An Introduction,
http://infomesh.net/2001/swintro/
Schaffert S., Bry F., Besnard P., Decker H., Decker S.,
Enguix C., Herzig A., 2005. Position Paper:
Paraconsistent Reasoning for the Semantic Web, In
Proceedings of Workshop Uncertainty Reasoning for
the Semantic Web, Galway, Ireland
Zhuge H., 2004. The Knowledge Grid, World Scientific
Publishing Company
WEBIST 2008 - International Conference on Web Information Systems and Technologies
278