Managing Trust in Online Social Networks

Chapter

Abstract

In recent years, there is a dramatic growth in number and popularity of online social networks. There are many networks available with more than 100 million registered users such as Facebook, MySpace, QZone, Windows Live Spaces etc. People may connect, discover and share by using these online social networks. The exponential growth of online communities in the area of social networks attracts the attention of the researchers about the importance of managing trust in online environment. Users of the online social networks may share their experiences and opinions within the networks about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Recommendations may be received through a chain of friends network, so the problem for the user is to be able to evaluate various types of trust opinions and recommendations. This opinion or recommendation has a great influence to choose to use or enjoy the item by the other user of the community. Collaborative filtering system is the most popular method in recommender system. The task in collaborative filtering is to predict the utility of items to a particular user based on a database of user rates from a sample or population of other users. Because of the different taste of different people, they rate differently according to their subjective taste. If two people rate a set of items similarly, they share similar tastes. In the recommender system, this information is used to recommend items that one participant likes, to other persons in the same cluster. But the collaborative filtering system performs poor when there is insufficient previous common rating available between users; commonly known as cost start problem. To overcome the cold start problem and with the dramatic growth of online social networks, trust based approach to recommendation has emerged. This approach assumes a trust network among users and makes recommendations based on the ratings of the users that are directly or indirectly trusted by the target user.

Keywords

Coherence Turkey Argentina Indonesia Colombia 

References

  1. 1.
    A. Jøsang and R. Ismail, The Beta Reputation System. In Proceedings of the 15th Bled Electronic Commerce Conference, 2002.Google Scholar
  2. 2.
    A. Jøsang, S. Hird, and E. Faccer, Simulating the Effect of Reputation Systems on e-Markets. In P. Nixon and S. Terzis (Eds), Proceedings of the First International Conference on Trust Management (iTrust), Crete, Greece, 2003.Google Scholar
  3. 3.
    A. Withby, A. Jøsang, and J. Indulska, Filtering Out Unfair Ratings in Bayesian Reputation Systems. The ICFAIN Journal of Management Research, 4(2), 2005, 48–64.Google Scholar
  4. 4.
    A. Jøsang and J. Haller, Dirichlet Reputation Systems. In The Proceedings of the International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria, 2007.Google Scholar
  5. 5.
    A. Jøsang and S. Pope, Semantic Constraints for Trust Tansitivity. In S. Hartmann and M. Stumptner (Eds), Proceedings of the Asia-Pacific Conference of Conceptual Modelling (APCCM) (Volume 43 of Conferences in Research and Practice in Information Technology), Newcastle, Australia, 2005.Google Scholar
  6. 6.
    A. Jøsang, R. Hayward, and S. Pope, Trust Network Analysis with Subjective Logic. In Proceedings of the 29th Australasian Computer Science Conference (ACSC2006), CRPIT, Vol 48, Hobart, Australia, 2006.Google Scholar
  7. 7.
    A. Jøsang, E. Gray, and M. Kinateder, Simplification and Analysis of Transitive Trust Networks. Web Intelligence and Agent Systems, 4(2), 2006, 139–161.Google Scholar
  8. 8.
    A. Jøsang and T. Bhuiyan, Optimal Trust Network Analysis with Subjective Logic, The Second International Conference on Emerging Security Information, Systems and Technologies, Cap Esterel, France, 2008.Google Scholar
  9. 9.
    A. Jøsang, X. Luo, and X. Chen, Continuous Ratings in Discrete Bayesian Reputation Systems. In The Proceedings of the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, Trondheim, Norway, 2008.Google Scholar
  10. 10.
    J. A. Barnes, Politics in a Changing Society: A Political History of the Fort Jameson Ngoni, Manchester University Press, UK, 1967.Google Scholar
  11. 11.
    D. Teten, and S. Allen, The Virtual Handshake: Opening Doors and Closing Deals Online. AMACOM/American Management Association, 2005.Google Scholar
  12. 12.
    A. Kazeniac, Social Networks: Facebook Takes Over Top Spot, Twitter Climbs. Compete.com. http://blog.compete.com/2009/02/09/facebook-myspace-twitter-social-network/. Retrieved 10-02-2010, 2009.
  13. 13.
    D. H. McKnight and N. L. Chervany, What Trust Means in e-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology. International Journal of Electronic Commerce, 6(2), 2002, 35–59.Google Scholar
  14. 14.
    F. K. Hussain and E. Chang, An Overview of the Interpretations of Trust and Reputation. The Third Advanced International Conference on Telecommunications, Mauritius, 2007.Google Scholar
  15. 15.
    A. Jøsang, R. Ismail, and C. Boyd, A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, 43(2), 2007, 618–644.CrossRefGoogle Scholar
  16. 16.
    X. Abdul-Rahman and S. Hailes, Supporting Trust in Virtual Communities. Proceedings of the Hawaii International Conference on System Sciences, USA, 2000.Google Scholar
  17. 17.
    S. Marsh, Formalising Trust as a Computational Concept. PhD thesis, University of Stirling, 1994.Google Scholar
  18. 18.
    M. Schillo, P. Funk, and M. Rovatsos, Using Trust for Detecting Deceitful Agents in Artificial Societies. Applied Artificial Intelligence, 14(8), 2000, 825–848.CrossRefGoogle Scholar
  19. 19.
    B. Esfandiari and S. Chandrasekharan, On How Agents Make Friends: Mechanisms for Trust Acquisition. The Proceedings of the Fifth International Conference on Autonomous Agents Workshop on Deception, Fraud and Trust in Agent Societies, 2001.Google Scholar
  20. 20.
    B. Yu and M. P. Singh, Distributed Reputation Management for Electronic Commerce. Computational Intelligence, 18(4), 2002, 535–549.CrossRefMathSciNetGoogle Scholar
  21. 21.
    L. Mui, M. Mohtashemi, and A. Halberstadt, A Computational Model of Trust and Reputation. In Proceedings of the 35th Hawaii International Conference on System Science, 2002.Google Scholar
  22. 22.
    J. M. Pujol, R. Sanguesa, J. Delgado, Extracting Reputation in Multi-Agent System by Means of Social Network Topology. The Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems, Italy, 2002, 467–474.Google Scholar
  23. 23.
    T. Dimitrakos, A Service-Oriented Trust Management Framework. International Workshop on Deception, Fraud, and Trust in Agent Societies, 2003, 53–72.Google Scholar
  24. 24.
    A. Selcuk, E. Uzun, and M. R. Pariente, A Reputation-Based Trust Management System for P2P Networks. IEEE International Symposium on Cluster Computing and the Grid, 2004.Google Scholar
  25. 25.
    J. Sabater and C. Sierra, Review on Computational Trust and Reputation Models. Artificial Intelligence Review, 24, 2005, 33–60.MATHCrossRefGoogle Scholar
  26. 26.
    J. O’Donovan and B. Smyth, Trust in Recommender Systems. IUI’05, USA, 2005.Google Scholar
  27. 27.
    R. V. Guha, R. Kumar, P. Raghavan, and A. Tomkins, Propagation of Trust and Distrust. The Proceedings of the 13th International World Wide Web Conference, USA, 2004, 403–412.Google Scholar
  28. 28.
    R. Levien, Attack-resistant Trust Metrics. Ph.D. thesis, University of California at Berkeley, USA, 2004.Google Scholar
  29. 29.
    C. N. Ziegler, Towards Decentralized Recommender Systems. PhD Thesis, University of Freiburg, Germany, 2005.Google Scholar
  30. 30.
    V. Shmatikov and C. Talcott, Reputation-Based Trust Management. Journal of Computer Security 13(1), 2005, 167–190.Google Scholar
  31. 31.
    W. T. L. Teacy, An Investigation into Trust & Reputation for Agent-Based Virtual Organisations. University of Southampton, UK, 2005.Google Scholar
  32. 32.
    L. Xiong, Resilient Reputation and Trust Management: Models and Techniques. PhD thesis, Georgia Institute of Technology, USA, 2005.Google Scholar
  33. 33.
    W. Xue and Z. Fan, A New Trust Model based on Social Characteristic and Reputation Mechanism for the Semantic Web. In the Proceedings of the Workshop on Knowledge Discovery and Data Mining, 2008.Google Scholar
  34. 34.
    C. Q. Tian, S. H. Zou, W. D. Wang, and S. D. Cheng, Trust Model Based on Reputation for Peer-to-Peer Networks. Journal on Communication, 29(4), 2008, 63–70.Google Scholar
  35. 35.
    M. Jamali and M. Ester, TrustWalker: A Random Walk Model for Combining Trust-based and Item-based Recommendation. KDD’09, 2009.Google Scholar
  36. 36.
    A. Jøsang, Artificial reasoning with subjective logic. In Proceedings of the 2nd Australian Workshop on Commonsense Reasoning, Perth, Australia, 1997.Google Scholar
  37. 37.
    A. Jøsang, A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3), 2001, 279–311.MathSciNetGoogle Scholar
  38. 38.
    A. Jøsang, Probabilistic Logic Under Uncertainty. In The Proceedings of Computing: The Australian Theory Symposium (CATS2007), CRPIT, Vol 65, Ballarat, Australia, 2007.Google Scholar
  39. 39.
    A. Jøsang and S. Pope, Semantic Constraints for Trust Tansitivity. The Proceedings of the Asia-Pacific Conference of Conceptual Modelling, Vol 43, Australia, 2005.Google Scholar
  40. 40.
    A. Jøsang, Subjective Logic, 2009. Draft Book available at http://persons.unik.no/josang/papers/subjective_logic.pdf

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.School of Information TechnologyQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations