Trust in Computer Systems and the Cloud. Mike Bursell

Чтение книги онлайн.

Читать онлайн книгу Trust in Computer Systems and the Cloud - Mike Bursell страница 16

Trust in Computer Systems and the Cloud - Mike Bursell

Скачать книгу

number of distinct outcomes to three:

       Both prisoners stay silent, in which case they are both sentenced to one year in prison.

       One prisoner stays silent, but their colleague betrays them, in which case the betrayer goes free but the silent prisoner receives a sentence of three years in prison.

       Both prisoners betray the other, in which case they both end up in prison for two years.

      The rational position for each prisoner to take is to betray the other because betrayal provides a better reward than staying silent. Three interesting facts fall out of this game and the mountains of theoretical and experimental data associated with it:

       If the prisoners play repeatedly but know the number of repeated games, then the most rational strategy is to punish the other for bad behaviour and keep betraying.

       If they do not know the number of repetitions, then the most rational strategy is to stay silent.

       In reality, humans tend to a more cooperative strategy when playing variants of this game, working together rather than betraying each other.

       Enlarge the shadow of the future (make players more aware of future games and less bound into their—and their fellow player's—histories).

       Ensure that the payoffs are immediate, clear, and motivating.

       Teach players to care about each other.

       Teach reciprocity (rewarding positive actions—typically cooperation—and punishing negative actions—typically betrayal).

       Improve recognition abilities (being able to recognise what the other party's strategy is).

      This does not mean, however, that game theory has nothing to offer us. What Axelrod's tactics to encourage cooperation seem to be promoting are ways to build some sort of trust between the two parties. Let us revisit our definition of trust and apply it to game theory:

       “Trust is the assurance that one entity holds that another will perform particular actions according to a specific expectation”.

      We need, of course, to consider our corollaries as well: how do they apply in this case?

       First Corollary “Trust is always contextual”.

       Second Corollary “One of the contexts for trust is always time”.

       Third Corollary “Trust relationships are not symmetrical”.

      Reputation and Generalised Trust

      The Prisoner's Dilemma is not the only type of game covered in the field of game theory. There are many, of which most are two-player games, and most can also have multiple participants (with no theoretical limit). The two-player games serve to give an example of how assurances about future behaviour—what we are referring to as trust relationships—can be formed between two participants.

      What about the case for multiple participants? When I set about forming a trust relationship “from scratch”—with no prior interactions—to someone (let us call her Alice), then I do so based on my expectations, biases, and interactions over time. If, on the other hand, somebody (we will call her Carol) asks me for information on Alice in order for her to form an initial opinion, and then asks multiple other people who have also formed a trust relationship to Alice for the same or similar information, then something else is happening: Carol is finding out information not first-hand, but based on information from others.

      The standard term for this is reputation, and it does not map directly from a trust relationship that Carol has to Alice but is a second-order construct. Carol cannot directly map my views on my trust relationship to Alice, alongside the views of others on their trust relationships to Alice, directly to her trust relationship to Alice: rather, she derives enough information to describe a reputation that she can relate to Alice and use to decide how best to form a trust relationship.

Скачать книгу