Advertisement

Application of Social Network Metrics to a Trust-Aware Collaborative Model for Generating Personalized User Recommendations

  • Iraklis VarlamisEmail author
  • Magdalini Eirinaki
  • Malamati Louta
Chapter
Part of the Lecture Notes in Social Networks book series (LNSN, volume 6)

Abstract

Social network analysis has emerged as a key technique in modern sociology, but has recently gained a lot of interest in Web mining research, because of the advent and the increasing popularity of social media, such as blogs, social networks, micro-blogging, customer review sites etc. Such media often serve as platforms for information dissemination and product placement or promotion. One way to improve the quality of recommendations provided to the members of social networks is to use trustworthy resources. In this environment, community-based reputation can help estimating the trustworthiness of individual users. Consequently, influence and trust are becoming essential qualities among user interactions. In this work, we perform an extensive study of various metrics related to the aforementioned elements, and of their effect in the process of information propagation in social networks. In order to better understand the properties of links and the dynamics of social networks, we distinguish between permanent and transient links and in the latter case, we consider the link freshness. Moreover, we distinguish between the propagation of trust in a local level and the effect of global influence and compare suggestions provided by locally trusted or globally influential users.

Keywords

Social Network Betweenness Centrality Social Graph Local Score Influential User 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Adar, E., Zhang, L., Adamic, L.A., Lukose, R.M.: Implicit structure and the dynamics of blogspace. In: Workshop on the Weblogging Ecosystem at the 13th International World Wide Web Conference, New York (2004)Google Scholar
  2. 2.
    Agarwal, N., Liu, H., Tang, L., Yu, P.S.: Identifying the influential bloggers in a community. In: WSDM ’08: Proceedings of the International Conference on Web Search and Web Data Mining, pp. 207–218. ACM, New York (2008)Google Scholar
  3. 3.
    Akritidis, L., Katsaros, D., Bozanis, P.: Identifying influential bloggers: time does matter. In: Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, WI-IAT ’09, vol. 1, pp. 76–83. IEEE Computer Society, Washington (2009)Google Scholar
  4. 4.
    Bonanich, P.: Power and centrality: a family of measures. Am. J. Sociol. 5(92), 1170–1182 (1987)CrossRefGoogle Scholar
  5. 5.
    Domingos, P., Richardson, M.: Mining the network value of customers. In: KDD ’01: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 57–66. ACM, New York (2001)Google Scholar
  6. 6.
    Estévez, P.A., Vera, P.A., Saito, K.: Selecting the most influential nodes in social networks. In: The International Joint Conference on Neural Networks, IJCNN. IEEE, Piscataway (2007)Google Scholar
  7. 7.
    Freeman, L.: A set of measures of centrality based on betweenness. Sociometry 40(1), 35–41 (1977)CrossRefGoogle Scholar
  8. 8.
    Freeman, L.: Centrality in social networks: Conceptual clarification. Soc. Netw. 3(1), 215–239 (1979)Google Scholar
  9. 9.
    Golbeck, J.: Generating predictive movie recommendations from trust in social networks. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) Proceedings of the 4th International Conference on Trust Management (iTrust). Lecture Notes in Computer Science, pp. 93–104. Springer, Berlin (2006)Google Scholar
  10. 10.
    Golbeck, J.: Trust on the world wide web: a survey. Found. Trend Web Sci. 1, 131–197 (2006)CrossRefGoogle Scholar
  11. 11.
    Golbeck, J.: Trust and nuanced profile similarity in online social networks. ACM Trans. Web 3, 12:1–12:33 (2009)Google Scholar
  12. 12.
    Guha, S., Koudas, N., Marathe, A., Srivastava, D.: Merging the results of approximate match operations. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB ’04, Toronto, vol. 30, pp. 636–647. VLDB Endowment, Morgan Kaufmann Publishers, St. Louis (2004)Google Scholar
  13. 13.
    Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th International Conference on World Wide Web, WWW ’04, pp. 403–412. ACM, New York (2004)Google Scholar
  14. 14.
    Hoi, S.C.H., Jin, R.: Semi-supervised ensemble ranking. In: Proceedings of the 23rd National Conference on Artificial Intelligence, vol. 2, pp. 634–639. AAAI Press, Menlo Park (2008)Google Scholar
  15. 15.
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web, WWW ’03, pp. 640–651. ACM, New York (2003)Google Scholar
  16. 16.
    Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’03, pp. 137–146. ACM, New York (2003)Google Scholar
  17. 17.
    Kim, E.S., Han, S.S.: An analytical way to find influencers on social networks and validate their effects in disseminating social games. In: Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, pp. 41–46. IEEE Computer Society, Washington, DC (2009)Google Scholar
  18. 18.
    Kimura, M., Saito, K., Nakano, R.: Extracting influential nodes for information diffusion on a social network. In: Proceedings of the 22nd National Conference on Artificial Intelligence, Vol. 2, pp. 1371–1376. AAAI Press, Menlo Park (2007)Google Scholar
  19. 19.
    Kimura, M., Yamakawa, K., Saito, K., Motoda, H.: Community analysis of influential nodes for information diffusion on a social network. In: The International Joint Conference on Neural Networks, IJCNN. IEEE, Piscataway (2008)Google Scholar
  20. 20.
    Kleinberg, J.: Authoritative sources in a hyperlinked environment. J. ACM 46(5), 604–632 (1999)MathSciNetzbMATHCrossRefGoogle Scholar
  21. 21.
    Kritikopoulos, A., Sideri, M., Varlamis, I.: Blogrank: ranking blogs based on connectivity and similarity features. In: Proceedings of the 2nd International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications AAA-IDEA’06. ACM, New York (2006)Google Scholar
  22. 22.
    Liu, B.: Web Data Mining. Exploring Hyperlinks, Contents, and Usage Data. Springer, Berlin (2007)Google Scholar
  23. 23.
    Louta, M., Varlamis, I.: Blog rating as an iterative collaborative process. In: Wallace, M., et al. (eds.) Semantics in Adaptive and Personalized Services. Springer Series on Studies in Computational Intelligence SCI 279, pp. 187–203. Springer, Berlin/Heidelberg (2010)Google Scholar
  24. 24.
    Massa, P., Avesani, P.: Controversial users demand local trust metrics: an experimental study on epinions.com community. In: Proceedings of the 20th National Conference on Artificial Intelligence (AAAI-05). AAAI, Menlo Park (2005)Google Scholar
  25. 25.
    Massa, P., Avesani, P.: Trust metrics on controversial users: balancing between tyranny of the majority and echo chambers. Int J. Semant. Web Inf. Syst. 3, 39–64 (2007)CrossRefGoogle Scholar
  26. 26.
    Massa, P., Avesani, P.: Trust metrics in recommender systems. In: Golbeck, J. (ed.) Computing with Social Trust,  Chap. 10. Springer, London (2009)
  27. 27.
    Nakajima, S., Tatemura, J., Hino, Y., Hara, Y., Tanaka, K.: Discovering important bloggers based on analyzing blog threads. In: 2nd Annual Workshop on the Blogging Ecosystem: Aggregation, Analysis and Dynamics, Chiba, Japan, May 10–14, (2005)Google Scholar
  28. 28.
    O’Donovan, J.: Capturing trust in social web applications. In: Golbeck, J. (ed.) Computing with Social Trust,  Chap. 9. Springer, London (2009)
  29. 29.
    Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: bringing order to the web. Technical report. Stanford InfoLab (1998). http://ilpubs.stanford.edu:8090/422/1/1999-66.pdf
  30. 30.
    Richardson, M., Domingos, P.: Mining knowledge-sharing sites for viral marketing. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’02, pp. 61–70. ACM, New York (2002)Google Scholar
  31. 31.
    Song, X., Chi, Y., Hino, K., Tseng, B.: Identifying opinion leaders in the blogosphere. In: Proceedings of the 16th ACM conference on Conference on Information and Knowledge Management, CIKM ’07, pp. 971–974. ACM, New York (2007)Google Scholar
  32. 32.
    Varlamis, I., Louta, M.: Towards a personalized blog site recommendation system: a collaborative rating approach. The International IEEE Workshop on Semantic Media Adaptation and Personalization, SMAP, San Sebastián, Spain, December 14–15, (2009)Google Scholar
  33. 33.
    Varlamis, I., Eirinaki, M., Louta, M.: A study on social network metrics and their application in trust networks. In: Proceedings of the 2010 International Conference on Advances in Social Networks Analysis and Mining, ASONAM ’10, pp. 168–175. IEEE Computer Society, Washington, DC (2010)Google Scholar
  34. 34.
    Wasserman, S., Faust, K.: Social Network Analysis. Cambridge University Press, Cambridge/New York (1994)Google Scholar
  35. 35.
    Weng, J., Lim, E.P., Jiang, J., He, Q.: Twitterrank: finding topic-sensitive influential twitterers. In: Proceedings of the third ACM international conference on Web search and data mining, WSDM ’10, pp. 261–270. ACM, New York (2010)Google Scholar
  36. 36.
    Ziegler, C.N.: On propagating interpersonal trust in social networks. In: Golbeck, J. (ed.) Computing with Social Trust,  Chap. 6. Springer, London (2009)
  37. 37.
    Ziegler, C.N., Lausen, G.: Spreading activation models for trust propagation. In: Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04), pp. 83–97. IEEE Computer Society, Washington, DC (2004)Google Scholar

Copyright information

© Springer-Verlag Wien 2013

Authors and Affiliations

  • Iraklis Varlamis
    • 1
    Email author
  • Magdalini Eirinaki
    • 2
  • Malamati Louta
    • 3
  1. 1.Department of Informatics and TelematicsHarokopio University of AthensAthensGreece
  2. 2.Computer Engineering DepartmentSan Jose State UniversitySan JoseUSA
  3. 3.Department of Informatics and Telecommunications EngineeringUniversity of Western MacedoniaKozaniGreece

Personalised recommendations