Social Network Analysis and Mining

, Volume 3, Issue 4, pp 981–999

Robust features of trust in social networks

  • Zoheb Hassan Borbora
  • Muhammad Aurangzeb Ahmad
  • Jehwan Oh
  • Karen Zita Haigh
  • Jaideep Srivastava
  • Zhen Wen
Original Article

Abstract

We identify robust features of trust in social networks; these are features which are discriminating yet uncorrelated and can potentially be used to predict trust formation between agents in other social networks. The features we investigate are based on an agent’s individual properties as well as those based on the agent’s location within the network. In addition, we analyze features which take into account the agent’s participation in other social interactions within the same network. Three datasets were used in our study—Sony Online Entertainment’s EverQuest II game dataset, a large email network with sentiments and the publicly available Epinions dataset. The first dataset captures activities from a complex persistent game environment characterized by several types of in-game social interactions, whereas the second dataset has anonymized information about people’s email and instant messaging communication. We formulate the problem as one of the link predictions, intranetwork and internetwork, in social networks. We first build machine learning models and then perform an ablation study to identify robust features of trust. Results indicate that shared skills and interests between two agents, their level of activity and level of expertise are the top three predictors of trust in a social network. Furthermore, if only network topology information were available, then an agent’s propensity to connect or communicate, the cosine similarity between two agents and shortest distance between them are found to be the top three predictors of trust. In our study, we have identified the generic characteristics of the networks used as well as the features investigated so that they can be used as guidelines for studying the problem of predicting trust formation in other social networks.

Keywords

Trust formation Link prediction Feature selection Ablation study 

References

  1. Abdul-Rahman A, Hailes S (1997) A distributed trust model. In: Proceedings of the 1997 workshop on New security paradigms, NSPW ’97, New York, NY, USA. ACM, pp 48–60Google Scholar
  2. Adamic LA, Adar E (2003) Friends and neighbors on the web. Soc Netw 25(3):211–230CrossRefGoogle Scholar
  3. Ahmad MA, Huffaker D, Wang J, Treem J, Kumar D, Poole MS, Srivastava J (2010a) The many faces of mentoring in an mmorpg. In: 2010 IEEE Second International Conference on Social Computing (SocialCom), pp 270 –275Google Scholar
  4. Ahmad M, Borbora ZH, Srivastava J, Contractor N (2010b) Link prediction across multiple social networks. In: ICDM Workshops, pp 911–918Google Scholar
  5. Ahmad M, Huffaker DA, Wang J, William Treem J, Scott Poole M, Srivastava J (2010c) Gtpa: a generative model for online mentor-apprentice networks. In: AAAIGoogle Scholar
  6. Ahmad MA, Ahmad I, Srivastava J, Poole M (2011) Trust me, i am an expert: trust, homophily and expertise in mmos. In: IEEE international conference on social computingGoogle Scholar
  7. Ahmad MA, Borbora ZH, Shen C, Srivastava J, Williams D (2011) Guilds play in mmos: rethinking common group dynamics models. In: 3rd International conference on social informaticsGoogle Scholar
  8. Artz D, Gil Y (2007) A survey of trust in computer science and the semantic web. Web Semantics: science, services and agents on the world wide web. Softw Eng Semantic Web 5(2):58–71Google Scholar
  9. Borbora ZH, Ahmad MA, Haigh KZ, Srivastava J, Wen Z (2011) Exploration of robust features of trust across multiple social networks. In: Workshop on trustworthy self-organizing systems, 2nd edn.Google Scholar
  10. Castelfranchi C, Falcone R (1998) Principles of trust for mas: cognitive anatomy, social importance, and quantification, pp 72–79Google Scholar
  11. Castronova E, Williams D, Shen C, Ratan R, Xiong L, Huang Y, Keegan B (2009) As real as real? macroeconomic behavior in a large-scale virtual world. 11(5):685–707Google Scholar
  12. Davis D, Lichtenwalter R, Chawla N (2013) Supervised methods for multi-relational link prediction. Soc Netw Anal Min, pp 1–15. doi:10.1007/s13278-012-0068-6
  13. Douceur JR, Donath JS (2002) The sybil attack, pp 251–260Google Scholar
  14. Freeman L (1977) A set of measures of centrality based upon betweenness. Sociometry, pp 35–41Google Scholar
  15. Gambetta D (1988) Can we trust trust? In: Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213–237Google Scholar
  16. Golbeck J (2008) Computing with social trust, 1st edn. Springer, BerlinGoogle Scholar
  17. Golbeck J (2005) Computing and applying trust in web-based social networks. University of Maryland, College ParkGoogle Scholar
  18. Gray E, Seigneur J-M, Chen Y, Jensen C (2003) Trust propagation in small worlds, Trust management. In: Nixon P, Terzis S (eds) Lecture notes in computer science, vol 2692. Springer, Berlin, p 1072Google Scholar
  19. Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The weka data mining software: an update. SIGKDD Explor 11(1):10–18CrossRefGoogle Scholar
  20. Hall MA (2000) Correlation-based feature selection for discrete and numeric class machine learning. In: Proceedings of 17th international conference on machine learning, pp 359–366Google Scholar
  21. Al Hasan M, Chaoji V, Salem S, Zaki M (2006) Link prediction using supervised learning. In: Workshop on Link Analysis, Counter-terrorism and Security, SIAMGoogle Scholar
  22. Huffaker D, (Annie) Wang J, Treem J, Ahmad MA, Fullerton L, Williams D, Poole MS, Contractor N (2009) The social behaviors of experts in massive multiplayer online role-playing games. In: IEEE international conference on computational science and engineering, vol 4, pp 326–331Google Scholar
  23. Jaccard P (1901) Distribution de la flore alpine dans le bassin des dranses et dans quelques régions voisines. Bulletin de la Société Vaudoise des Sciences Naturelles 37:241–272Google Scholar
  24. Levien R (2004) Attack resistant trust metrics. Technical reportGoogle Scholar
  25. Marsh SP (1994) Formalising trust as a computational concept. Technical report, University of Stirling. Department of Mathematics and Computer ScienceGoogle Scholar
  26. Massa P, Avesani P (2006) Trust-aware bootstrapping of recommender systems. In: Proceedings of ECAI workshop on recommender systems, pp 29–33Google Scholar
  27. Massa P, Avesani P (2004) Trust-aware collaborative filtering for recommender systems. In: Proceedings of Federated international conference on the move to meaningful internet: CoopIS, DOA, ODBASE, pp 492–508Google Scholar
  28. Mitchell TM. (1997) Machine learning. McGraw-Hill, New YorkGoogle Scholar
  29. Monge PR, Contractor N (2003) Theories of communication networks. Oxford University Press, CambridgeGoogle Scholar
  30. Mui L, Mohtashemi M (2002) A computational model of trust and reputation. In: Proceedings of the 35th Hawaii international conference on system science (HICSS)Google Scholar
  31. Newman MEJ (2001) The structure of scientific collaboration networks. Proc Natl Acad Sci 98(2):404–409MathSciNetCrossRefMATHGoogle Scholar
  32. Nieminen J (1974) On the centrality in a graph. Scand J Psychol 15:332–336CrossRefGoogle Scholar
  33. O’Donovan J, Smyth B (2005) Trust in recommender systems. In: Proceedings of the 10th international conference on Intelligent user interfaces, IUI ’05. ACM, New York, pp 167–174Google Scholar
  34. Pang B, Lee L (2008) Opinion mining and sentiment analysis. Found Trends Inf Retr 2(1–2):1–135CrossRefGoogle Scholar
  35. Ramchurn SD, Huynh D, Jennings NR (2004) Trust in multi-agent systems. Knowl Eng Rev 19:2004CrossRefGoogle Scholar
  36. Sabater J, Sierra C (2001) Regret: a reputation model for gregarious societies, pp 61–69Google Scholar
  37. Salton G, McGill MJ (1983) Introduction to modern information retrieval. McGraw-Hill, New YorkMATHGoogle Scholar
  38. Sørensen T (1948) A method of establishing groups of equal amplitude in plant sociology based on similarity of species content and its application to analyses of the vegetation on danish commons. Biologiske Skrifter / udg. af det Kgl. Danske Videnskabernes Selskab, pp 1–34Google Scholar
  39. Wang D, Sutcliffe A, Zeng X-J (2011) A trust-based multi-ego social network model to investigate emotion diffusion. Soc Netw Anal Min 1:287–299. doi:10.1007/s13278-011-0019-7
  40. Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, CambridgeCrossRefGoogle Scholar
  41. Wilson T, Wiebe J, Hoffmann P (2005) Recognizing contextual polarity in phrase-level sentiment analysis. In: Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, HLT ’05. Association for Computational Linguistics, Stroudsburg, pp 347–354Google Scholar
  42. Witkowski M, Artikis E, Pitt J (2001) Experiments in building experiential trust in a society of objective-trust based agents. In: Trust in cyber-societies, vol LNAI 2246. Springer, Berlin, pp 111–132Google Scholar
  43. Wu L, Lin C, Aral S, Brynjolfsson E (2009) Value of social network—a large-scale analysis on network structure impact to financial revenue of information technology consultants. In: The winter conference on business intelligenceGoogle Scholar
  44. Yang J, Wen Z, Adamic LA, Ackerma MS, Li C-Y (2011) Collaborating globally: culture and organizational computer-mediated communications. In: Proceedings of the international conference on information systems (ICIS), Shanghai, ChinaGoogle Scholar
  45. Yu B, Singh MP (2002) An evidential model of distributed reputation management. In: Proceedings of first international joint conference on autonomous agents and multiagent systems. ACM Press, New York, pp 294–301Google Scholar
  46. Zhang Z, Wang K (2013) A trust model for multimedia social networks. Soc Netw Anal Min, pp 1–11. doi:10.1007/s13278-012-0078-4
  47. Zhou T, Lü L, Zhang Y-C (2009) Predicting missing links via local information. Eur Phys J B Condens Matter Complex Syst 71(4):623–630CrossRefMATHGoogle Scholar
  48. Ziegler C-N, Lausen G (2004) Spreading activation models for trust propagation. In: 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE ’04, pp 83–97Google Scholar

Copyright information

© Springer-Verlag Wien 2013

Authors and Affiliations

  • Zoheb Hassan Borbora
    • 1
  • Muhammad Aurangzeb Ahmad
    • 1
  • Jehwan Oh
    • 1
  • Karen Zita Haigh
    • 2
  • Jaideep Srivastava
    • 1
  • Zhen Wen
    • 3
  1. 1.Department of Computer ScienceUniversity of MinnesotaMinneapolisUSA
  2. 2.Raytheon BBN TechnologiesLouis ParkUSA
  3. 3.IBM Thomas J. Watson Research CenterHawthorneUSA

Personalised recommendations