Yhprum's law is the opposite of Murphy's law. The simple formula of Yhprum's law is: "Everything that can work, will work." "Yhprum" is "Murphy", spelled backwards.
A more specific formulation of the law by Richard Zeckhauser, a professor of political economy at Harvard University, states: "Sometimes systems that should not work, work nevertheless."
Resnick et al. (2006) used this law to describe how intensive and seemingly altruistic participation by giving ranking is observed in the eBay feedback system. [1] Jøsang, in a discussion of online trust management, suggests that all similar "trust and reputation systems" are manifestations of Yhprum's law. He states the law in a similar form to Zeckhauser: "Something that shouldn't work sometimes does work." [2] Arenas et al. in a similar discussion add the adjunct "...or at least work fairly well" to the law. [3]
Although Zeckhauser is often credited with coining, the first reference to Yhprum's law may have been by Alan Abelson in the financial newspaper Barron's in December 1974. [4] [5] Barron's version of the law is more in the way of a corollary to Murphy's law than its opposite: "anything that should go wrong, won't". Abelson coined the term to describe the gloomy financial predictions of the time which he thought were wrong, or at least wildly exaggerated. In Abelson's opinion, a depression only occurs when the warning signs are missed or ignored. The very act of predicting one will ensure that it does not happen. [6]
Hanlon's razor is an adage or rule of thumb that states:
Never attribute to malice that which is adequately explained by stupidity.
Murphy's law is an adage or epigram that is typically stated as: "Anything that can go wrong will go wrong.".
Authorization or authorisation is the function of specifying rights/privileges for accessing resources, which is related to general information security and computer security, and to IAM in particular. More formally, "to authorize" is to define an access policy during the configuration of systems and user accounts. For example, user accounts for human resources staff are typically configured with authorization for accessing employee records, and this policy gets formalized as access control rules in a computer system. Authorization must not be confused with access control. During usage, access control enforces the authorization policy by deciding whether access requests to resources from (authenticated) consumers shall be approved (granted) or disapproved (rejected). Resources include individual files or an item's data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer software and other hardware on the computer.
Alan Greenspan is an American economist who served as the 13th chairman of the Federal Reserve from 1987 to 2006. He worked as a private adviser and provided consulting for firms through his company, Greenspan Associates LLC.
A closed-end fund, also known as a closed-end mutual fund, is an investment vehicle fund that raises capital by issuing a fixed number of shares at its inception, and then invests that capital in financial assets such as stocks and bonds. After inception it is closed to new capital, although fund managers sometimes employ leverage. Investors can buy and sell the existing shares in secondary markets.
In physics, the magnetomotive force is a quantity appearing in the equation for the magnetic flux in a magnetic circuit, Hopkinson's law. It is the property of certain substances or phenomena that give rise to magnetic fields: where Φ is the magnetic flux and is the reluctance of the circuit. It can be seen that the magnetomotive force plays a role in this equation analogous to the voltage V in Ohm's law, V = IR, since it is the cause of magnetic flux in a magnetic circuit:
In psychology and sociology, a trust metric is a measurement or metric of the degree to which one social actor trusts another social actor. Trust metrics may be abstracted in a manner that can be implemented on computers, making them of interest for the study and engineering of virtual communities, such as Friendster and LiveJournal.
Reputation management, originally a public relations term, refers to the influencing, controlling, enhancing, or concealing of an individual's or group's reputation. The growth of the internet and social media led to growth of reputation management companies, with search results as a core part of a client's reputation. Online reputation management, sometimes abbreviated as ORM, focuses on the management of product and service search engine results.
Barron's is an American weekly magazine/newspaper published by Dow Jones & Company, a division of News Corp, since 1921.
Computer-supported collaboration research focuses on technology that affects groups, organizations, communities and societies, e.g., voice mail and text chat. It grew from cooperative work study of supporting people's work activities and working relationships. As net technology increasingly supported a wide range of recreational and social activities, consumer markets expanded the user base, enabling more and more people to connect online to create what researchers have called a computer supported cooperative work, which includes "all contexts in which technology is used to mediate human activities such as communication, coordination, cooperation, competition, entertainment, games, art, and music".
A reputation system is a program or algorithm that allow users of an online community to rate each other in order to build trust through reputation. Some common uses of these systems can be found on E-commerce websites such as eBay, Amazon.com, and Etsy as well as online advice communities such as Stack Exchange. These reputation systems represent a significant trend in "decision support for Internet mediated service provisions". With the popularity of online communities for shopping, advice, and exchange of other important information, reputation systems are becoming vitally important to the online experience. The idea of reputation systems is that even if the consumer can't physically try a product or service, or see the person providing information, that they can be confident in the outcome of the exchange through trust built by recommender systems.
Alan Abelson was a veteran financial journalist, and longtime writer of the influential Up and Down Wall Street column in Barron's Magazine.
Herbert Eugene Ives was a scientist and engineer who headed the development of facsimile and television systems at AT&T in the first half of the twentieth century. He is best known for the 1938 Ives–Stilwell experiment, which provided direct confirmation of special relativity's time dilation, although Ives himself did not accept special relativity, and argued instead for an alternative interpretation of the experimental results. Ives has been described as "the most authoritative opponent of relativity in United States between the late 1930s and the early 1950s."
A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder. The name was suggested in or before 2002 by Brian Zill at Microsoft Research. The term pseudospoofing had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".
Subjective logic is a type of probabilistic logic that explicitly takes epistemic uncertainty and source trust into account. In general, subjective logic is suitable for modeling and analysing situations involving uncertainty and relatively unreliable sources. For example, it can be used for modeling and analysing trust networks and Bayesian networks.
Richard Jay Zeckhauser is an American economist and the Frank P. Ramsey Professor of Political Economy at Harvard Kennedy School at Harvard University.
Zooko Wilcox-O'Hearn, is an American Colorado-based computer security specialist, self-proclaimed cypherpunk, and ex-CEO of the Electric Coin Company (ECC), a for-profit company leading the development of Zcash.
In information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security is typically based on the authenticated identity of external parties. Rigid authentication mechanisms, such as public key infrastructures (PKIs) or Kerberos, have allowed this model to be extended to distributed systems within a few closely collaborating domains or within a single administrative domain. During recent years, computer science has moved from centralised systems to distributed computing. This evolution has several implications for security models, policies and mechanisms needed to protect users’ information and resources in an increasingly interconnected computing infrastructure.
GroupLens Research is a human–computer interaction research lab in the Department of Computer Science and Engineering at the University of Minnesota, Twin Cities specializing in recommender systems and online communities. GroupLens also works with mobile and ubiquitous technologies, digital libraries, and local geographic information systems.
An Initial exchange offering (IEO) is the cryptocurrency exchange equivalent to a stock launch or Initial public offering (IPO). An IEO is the process of digital asset procurement through an established exchange for the purpose of raising capital for start-up companies. Exchanges act as a middleman between investors and the startup, profiting from fees generated by services rendered during the due diligence process and funding phase. IEO's and initial coin offerings (ICO) share similar characteristics with, however, an IEO can be seen as an evolution from the ICO due to legal influence and an increase in financial regulations within the cryptocurrency market.