This paper describes how cryptographic provenance can serve as a proactive, partial solution for mitigating misinformation. Drawing on literature from human-centered computing and usable security, journalism, and cryptography, we discuss the advantages and limitations of both content-based and technical approaches to the problem of online misinformation. We argue cryptographic provenance systems designed for usability can reduce the spread of misinformation by surfacing provenance information and making this information salient and acceptable to information consumers. We highlight challenges and open research areas related to designing usable cryptographic provenance systems, specifically concerning two key stakeholder groups: journalists and news consumers.
more »
« less
Usable Cryptographic Provenance: A Proactive Complement to Fact-Checking for Mitigating Misinformation
This paper describes how cryptographic provenance can serve as a proactive, partial solution for mitigating misinformation. Drawing on literature from human-centered computing and usable security, journalism, and cryptography, we discuss the advantages and limitations of both content-based and technical approaches to the problem of online misinformation. We argue cryptographic provenance systems designed for usability can reduce the spread of misinformation by surfacing provenance information and making this information salient and acceptable to information consumers. We highlight challenges and open research areas related to designing usable cryptographic provenance systems, specifically concerning two key stakeholder groups: journalists and news consumers.
more »
« less
- Award ID(s):
- 1940679
- PAR ID:
- 10380214
- Date Published:
- Journal Name:
- Proceedings of the International AAAI Conference on Weblogs and Social Media
- Volume:
- 16
- ISSN:
- 2334-0770
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Cryptographic tools for authenticating the provenance of web-based information are a promising approach to increasing trust in online news and information. However, making these tools’ technical assurances sufficiently usable for news consumers is essential to realizing their potential. We conduct an online study with 160 participants to investigate how the presentation (visual vs. textual) and location (on a news article page or a third-party site) of the provenance information affects news consumers’ perception of the content’s credibility and trustworthiness, as well as the usability of the tool itself. We find that although the visual presentation of provenance information is more challenging to adopt than its text-based counterpart, this approach leads its users to put more faith in the credibility and trustworthiness of digital news, especially when situated internally to the news article.more » « less
-
Americans' trust in news is declining, and authenticity and transparency challenges in digital publishing contexts pose unique challenges to the ability to effectively gratify their information-seeking needs via online media. Cryptographic technologies and web-based provenance indicators have the potential to enhance the trustworthiness and transparency of digital communication, but better understandings of news consumers practices and needs are required to develop practical tools. Through a representative online survey of 400 digital news consumers and 19 follow-up interviews, we investigate how users authenticate and assign trust to news content, and identify specific needs pertaining to news transparency and authentication that could be met by digital news authentication tools. While many users currently rely on political ideology to assess news trustworthiness, we find that users of all political orientations see value in independent provenance and authentication tools for digital news.more » « less
-
Connected vehicles (CVs) have facilitated the development of intelligent transportation system that supports critical safety information sharing with minimum latency. However, CVs are vulnerable to different external and internal attacks. Though cryptographic techniques can mitigate external attacks, preventing internal attacks imposes challenges due to authorized but malicious entities. Thwarting internal attacks require identifying the trustworthiness of the participating vehicles. This paper proposes a trust management framework for CVs using interaction provenance that ensures privacy, considers both in-vehicle and vehicular network security incidents, and supports flexible security policies. For this purpose, we present an interaction provenance recording and trust management protocol. Different events are extracted from interaction provenance, and trustworthiness is calculated using fuzzy policies based on the events.more » « less
-
null (Ed.)Data provenance tools aim to facilitate reproducible data science and auditable data analyses, by tracking the processes and inputs responsible for each result of an analysis. Fine-grained provenance further enables sophisticated reasoning about why individual output results appear or fail to appear. However, for reproducibility and auditing, we need a provenance archival system that is tamper-resistant , and efficiently stores provenance for computations computed over time (i.e., it compresses repeated results). We study this problem, developing solutions for storing fine-grained provenance in relational storage systems while both compressing and protecting it via cryptographic hashes. We experimentally validate our proposed solutions using both scientific and OLAP workloads.more » « less
An official website of the United States government

