Artificial Intelligence Review

, Volume 37, Issue 2, pp 119–132

The state-of-the-art in personalized recommender systems for social networking

  • Xujuan Zhou
  • Yue Xu
  • Yuefeng Li
  • Audun Josang
  • Clive Cox


With the explosion of Web 2.0 application such as blogs, social and professional networks, and various other types of social media, the rich online information and various new sources of knowledge flood users and hence pose a great challenge in terms of information overload. It is critical to use intelligent agent software systems to assist users in finding the right information from an abundance of Web data. Recommender systems can help users deal with information overload problem efficiently by suggesting items (e.g., information and products) that match users’ personal interests. The recommender technology has been successfully employed in many applications such as recommending films, music, books, etc. The purpose of this report is to give an overview of existing technologies for building personalized recommender systems in social networking environment, to propose a research direction for addressing user profiling and cold start problems by exploiting user-generated content newly available in Web 2.0.


Social networking Recommender systems Trust User profiles User generated content 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Adomavicius G, Tuzhilin A (2005) Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans Knowl Data Eng 17(6): 734–749CrossRefGoogle Scholar
  2. Andersen R, Borgs C, Chayes J, Feige U, Flaxman A, Kalai A, Mirrokni V, Tennenholtz M (2008) Trust-based recommendation systems: an axiomatic approach. In: Proceeding of the 17th international conference on World Wide Web. ACM, New York, WWW ’08, pp 199–208Google Scholar
  3. Avesani P, Paolo M, Roberto T (2005) A trust-enhanced recommender system application: Moleskiing. In: SAC ’05: Proceedings of the 2005 ACM symposium on applied computing. ACM, Santa Fe, pp 1589–1593Google Scholar
  4. Bedi P, Kaur H, Marwaha S (2007) Trust based recommender system for the semantic web. In: IJCAI’07: Proceedings of the 20th international joint conference on artifical intelligence, Morgan Kaufmann Publishers Inc., San Francisco, pp 2677–2682Google Scholar
  5. Breese JS, Heckerman D, Kadie C (1998) Empirical analysis of predictive algorithms for collaborative filtering. Morgan Kaufmann, Massachusetts, pp 43–52Google Scholar
  6. Ding X, Liu B, Yu PS (2008) A holistic lexicon-based approach to opinion mining. In: Proceedings of the conference on Web search and Web data mining (WSDM’08). ACM, Palo Alto, pp 231–240Google Scholar
  7. Gamon M, Aue A, Corston-Oliver S, Ringger E (2005) Pulse: mining customer opinions from free text. pp 121–132Google Scholar
  8. Gauch S, Speretta M, Chandramouli A, Micarelli A (2007) User profiles for personalized information access. The Adaptive Web, vol 4321/2007. pp 54–89Google Scholar
  9. Golbeck J (2006) Generating predictive movie recommendations from trust in social networks. In: Proceccdings of the 4th international conference on trust management. Springer, Pisa, pp 93–104Google Scholar
  10. Golbeck J, Hendler J (2006) Inferring binary trust relationships in web-based social networks. ACM Trans Inter Technol 6(4): 497–529CrossRefGoogle Scholar
  11. Guha R, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: Proceedings of the 13th international conference on World Wide Web. ACM Press, New York, pp 403–412Google Scholar
  12. Halpin H, Robu V, Shepherd H (2007) The complex dynamics of collaborative tagging. In: Proceedings of the 16th international conference on World Wide Web. ACM, New York, pp 211–220Google Scholar
  13. Heymann P, Koutrika G, Garcia-Molina H (2008) Can social bookmarking improve web search? In: Proceedings of the international conference on Web search and web data mining. ACM, New York, pp 195–206Google Scholar
  14. Hoffman T (2008) Online reputation management is hot—but is it ethical? ComputerWorldGoogle Scholar
  15. Jensen C, Davis J, Farnham S (2002) Finding others online: reputation systems for social online spaces. In: CHI ’02: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 447–454Google Scholar
  16. Jøsang A, Bhuiyan T (2008) Optimal trust network analysis with subjective logic. In: SECURWARE ’08: Proceedings of the 2008 second international conference on emerging security information, systems and technologies. IEEE Computer Society, Washington, DC, pp 179–184Google Scholar
  17. Jøsang A, Hayward R, Pope S (2006) Trust network analysis with subjective logic. In: ACSC ’06: Proceedings of the 29th Australasian Computer Science Conference, Australian Computer Society, Inc., Darlinghurst, Australia, Australia, pp 85–94Google Scholar
  18. Joshi M, Belsare N (2006) Blogharvest: Blog mining and search framework. In: International conference on management of data. Computer Society of India, Delhi, pp 226–229Google Scholar
  19. Kelly D, Teevan J (2003) Implicit feedback for inferring user preference: a bibliography. SIGIR Forum 37(2): 18–28CrossRefGoogle Scholar
  20. Liang H, Xu Y, Li Y, Nayak R, Weng L (2009) Personalized recommender systems integrating social tags and item taxonomy. In: Proceedings of the 2009 IEEE/WIC/ACM international joint conference on Web intelligence and intelligent agent technology. IEEE Computer Society, Washington, DC, pp 540–547Google Scholar
  21. Lueg C (1997) Social filtering and social reality. In: In Proceedings of the 5th DELOS workshop on filtering and collaborative filtering. ERCIM Press, pp 10–12Google Scholar
  22. Ma H, King I, Lyu MR (2009) Learning to recommend with social trust ensemble. In: SIGIR ’09: Proceedings of the 32nd international ACM SIGIR conference on research and development in information retrieval. ACM, New York, pp 203–210Google Scholar
  23. Massa P, Avesani P (2007) Trust-aware recommender systems. In: RecSys ’07: Proceedings of the 2007 ACM conference on recommender systems, ACM, New York, pp 17–24Google Scholar
  24. Massa P, Bhattacharjee B (2004) Using trust in recommender systems: an experimental analysis. In: Proceedings of iTrust2004 international conference. pp 221–235Google Scholar
  25. Mayer RC, Davis JH, Schoorman DF (1995) An integrative model of organizational trust. Acad Manag Rev 20((3): 709–734Google Scholar
  26. Mooney RJ, Roy L (2002) Content-based book recommending using learning for text categorization. In: Proceedings of 5th ACM conference on digital libraries. ACM Press, San Antonio, pp 195–204Google Scholar
  27. Morita M, Shinoda Y (1994) Information filtering based on user behavior analysis and best match text retrieval. Proceedings of SIGIR ’94. ACM, pp 272–281Google Scholar
  28. Mui L, Mohtashemi M (2002) A computational model of trust and reputation. In: Proceedings of the 35th Hawaii international conference on system science (HICSS)Google Scholar
  29. O’Donovan J, Smyth B (2005) Trust in recommender systems. In: IUI ’05: Proceedings of the 10th international conference on intelligent user interfaces. ACM, New York, pp 167–174Google Scholar
  30. Olmedilla D, Rana OF, Matthews B, Nejdl W (2005) Security and trust issues in semantic grids. In: Proceedings of the Dagsthul seminar, Semantic Grid: The Convergence of Technologies, p 05271Google Scholar
  31. Perugini S, Gonçalves MA, Fox E (2004) Recommender systems research: a connection-centric survey. J Intell Inf Syst 23(2):107–143. Kluwer Academic PublishersGoogle Scholar
  32. Resnick P, Iacovou N, Suchak M, Bergstrom P, Riedl J (1994) Grouplens: an open architecture for collaborative filtering of netnews. In: CSCW. pp 175–186Google Scholar
  33. Rosa CD, Havens JCA, Hawk J, Jenkins L (2007) Sharing, privacy and trust in our networked world. A report to the oclc membership. OCLC, DublinGoogle Scholar
  34. Sarwar B, Karypis G, Konstan J, Riedl J (2001) Item-based collaborative filtering recommendation algorithms, In: Proceedings of the 10th international conference on World Wide Web. ACM Press, Hong Kong, pp 285–295Google Scholar
  35. Schein AI, Popescul A, Ungar LH, Pennock DM (2002) Methods and metrics for cold-start recommendations. In: SIGIR ’02: Proceedings of the 25th annual international ACM SIGIR conference on research and development in information retrieval. ACM, New York, pp 253–260Google Scholar
  36. Shardanand U, Maes P (1995) Social information filtering: algorithms for automating “word of mouth”. In: CHI. pp 210–217Google Scholar
  37. Sen S, Vig J, Riedl J (2009) Tagommenders: connecting users to items through tags. In: Proceedings of the 18th international conference on World wide web. ACM Press, Madrid, pp 671–680Google Scholar
  38. Sinha R, Sinha R, Swearingen K (2001) Comparing recommendations made by online systems and friends. In: Proceedings of the DELOS-NSF workshop on personalization and recommender systems in digital librariesGoogle Scholar
  39. Stewart A, Chen L, Paiu R, Nejdl W (2007) Discovering information diffusion paths from blogosphere for online advertising. In: ADKDD ’07: Proceedings of the 1st international workshop on data mining and audience intelligence for advertising. ACM, New York, pp 46–54Google Scholar
  40. Tatemura J (2000) Virtual reviewers for collaborative exploration of movie reviews. In: Proceedings of intelligent user interfaces (IUI). pp 272–275Google Scholar
  41. Tso-Sutter, KHL, Marinho L, Schmidt-Thieme L (2008) Tag-aware recommender systems by fusion of collaborative filtering algorithms. In: Proceedings of applied computing. pp 1995–1999Google Scholar
  42. Walter FE, Battiston S, Schweitzer F (2008) A model of a trust-based recommendation system on a social network. Auton Agent Multi Agent Syst 16(1): 57–74CrossRefGoogle Scholar
  43. Yu B, Singh M (2003) Detecting deception in reputation management. In: Proceedings of the second international joint conference on autonomous agents and multiagent systems. ACM, Melbourne, pp 73–80Google Scholar
  44. Zhuang L, Jing F, Zhu X, Zhang L (2006) Movie review mining and summarization. In: Proceedings of the 15th ACM international conference on information and knowledge management. ACM, New York, pp 43–50Google Scholar
  45. Ziegler C-N, Golbeck J (2005) Investigating correlations of trust and interest similarity—do birds of a feather really flock together? Decis Support Syst, pp 1–34Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2011

Authors and Affiliations

  • Xujuan Zhou
    • 1
  • Yue Xu
    • 1
  • Yuefeng Li
    • 1
  • Audun Josang
    • 2
  • Clive Cox
    • 3
  1. 1.Faculty of Science and TechnologyQueensland University of TechnologyBrisbaneAustralia
  2. 2.UNIK Graduate CenterUniversity of OsloOsloNorway
  3. 3.Rummble.comCambridgeEngland

Personalised recommendations