skip to main content
research-article

A survey of trust in social networks

Published:30 August 2013Publication History
Skip Abstract Section

Abstract

Web-based social networks have become popular as a medium for disseminating information and connecting like-minded people. The public accessibility of such networks with the ability to share opinions, thoughts, information, and experience offers great promise to enterprises and governments. In addition to individuals using such networks to connect to their friends and families, governments and enterprises have started exploiting these platforms for delivering their services to citizens and customers. However, the success of such attempts relies on the level of trust that members have with each other as well as with the service provider. Therefore, trust becomes an essential and important element of a successful social network. In this article, we present the first comprehensive review of social and computer science literature on trust in social networks. We first review the existing definitions of trust and define social trust in the context of social networks. We then discuss recent works addressing three aspects of social trust: trust information collection, trust evaluation, and trust dissemination. Finally, we compare and contrast the literature and identify areas for further research in social trust.

References

  1. Abdul-Rahman, A. and Hailes, S. 2000. Supporting trust in virtual communities. In Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS'00). IEEE Computer Society, 1--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Adali, S., Escriva, R., Goldberg, M. K., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B. K., Wallace, W. A., and Williams, G. 2010. Measuring behavioral trust in social networks. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI'10). 150--152.Google ScholarGoogle Scholar
  3. Alesina, A. and La Ferrara, E. 2002. Who trusts others? J. Public Econ. 85, 1, 207--234.Google ScholarGoogle ScholarCross RefCross Ref
  4. Andersen, R., Borgs, C., Chayes, J., Feige, U., Flaxman, A., Kalai, A., Mirrokni, V., and Tennenholtz, M. 2008. Trust-based recommendation systems: An axiomatic approach. In Proceeding of the 17th International Conference on World Wide Web (WWW'08). ACM Press, New York, 199--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Artz, D. and Gil, Y. 2007. A survey of trust in computer science and the semantic web. Web Semantics 5, 2, 58--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Azer, M. A., El-Kassas, S. M., Hassan, A. W. F., and El-Soudani, M. S. 2008. A survey on trust and reputation schemes in ad hoc networks. In Proceedings of the 3rd International Conference on Availability, Reliability and Security. IEEE Computer Society, Los Alamitos, CA, 881--886. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Barnes, J. A. 1954. Class and committees in a norwegian island parish. Hum. Relat. 7, 1, 39--54.Google ScholarGoogle ScholarCross RefCross Ref
  8. Beatty, P., Reay, I., Dick, S., and Miller, J. 2011. Consumer trust in e-commerce web sites: A metastudy. ACM Comput. Surv. 43, 3, 1--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bimrah, K. K., Mouratidis, H., and Preston, D. 2008. Modelling trust requirements by means of a visualization language. In Proceedings of the Conference on Requirements Engineering Visualization (REV'08). IEEE Computer Society, Los Alamitos, CA, 26--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Boltzmann, L. 1964. Lectures on Gas Theory. Translated by Stephen G. Brush. University of California Press, Berkeley.Google ScholarGoogle Scholar
  11. Brunie, A. 2009. Meaningful distinctions within a concept: Relational, collective, and generalized social capital. Social Sci. Res. 38, 2, 251--265.Google ScholarGoogle Scholar
  12. Buskens, V. 1998. The social structure of trust. Social Netw. 20, 3, 265--289.Google ScholarGoogle ScholarCross RefCross Ref
  13. Castelfranchi, C., Conte, R., and Paolucci, M. 1998. Normative reputation and the costs of compliance. J. Artif. Soc. Social Simul. 1, 3.Google ScholarGoogle Scholar
  14. Caverlee, J., Liu, L., and Webb, S. 2008. Socialtrust: Tamper-resilient trust establishment in online communities. In Proceedings of the 8th ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL'08). ACM Press, New York, 104--114. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Challener, D., Yoder, K., Catherman, R., Safford, D., and Van Doorn, L. 2007. A Practical Guide to Trusted Computing. 1st Ed. IBM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Chang, E., Dillon, T. S., and Hussain, F. 2006. Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence. Wiley Periodicals. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Chen, H.-C. and Chen, A. L. P. 2001. A music recommendation system based on music data grouping and user interests. In Proceedings of the 10th International Conference on Information and Knowledge Management (CIKM'01). ACM Press, New York, 231--238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Chen, L. and Li, J. 2010. Revocation of direct anonymous attestation. In Proceedings of the 2nd International Conference on Trusted Systems (INTRUST'10). 128--147. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Christianson, B. and Harbison, W. 1996. Why isn't trust transitive? In Proceedings of the Security Protocols Workshop. 171--176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Claridge, T. 2004. Social capital and natural resource management. M.S. thesis, Australia. http://www. socialcapitalresearch.com/literature/nrm.html.Google ScholarGoogle Scholar
  21. Coleman, J. S. 1988. Social capital in the creation of human capital. Amer. J. Sociology 94, 1, 95--120.Google ScholarGoogle ScholarCross RefCross Ref
  22. Coleman, J. S. 1990. Foundations of Social Theory. Belknap Press, Cambridge, MA.Google ScholarGoogle Scholar
  23. Cook, K. S., Yamagishi, T., Cheshire, C., Cooper, R., Matsuda, M., and Mashima, R. 2005. Trust building via risk taking: A cross-societal experiment. Social Psychol. Quart. 2, 68, 121--142.Google ScholarGoogle ScholarCross RefCross Ref
  24. Coulter, K. S. and Coulter, R. A. 2002. Determinants of trust in a service provider: The moderating role of length of relationship. J. Service. Market. 16, 1, 35--50.Google ScholarGoogle ScholarCross RefCross Ref
  25. Dohmen, T., Falk, A., Huffman, D., and Sunde, U. 2006. The intergenerational transmission of risk and trust attitudes. IZA working paper. http://www.cens.uni-bonn.de/team/board/armin-falk/the-intergenerational-transmission-of-risk-and-trust-attitudes-review-of-economic-studies-2012-792-645-677-with-thomas-dohmen-david-huffman-and-uwe-sunde‥pdf.Google ScholarGoogle Scholar
  26. Dumouchel, P. 2005. Trust as an action. Euro. J. Sociol. 46, 417--428.Google ScholarGoogle Scholar
  27. Dwyer, C., Hiltz, S. R., and Passerini, K. 2007. Trust and privacy concern within social networking sites: A comparison of facebook and myspace. In Proceedings of the 13th Americas Conference on Information Systems.Google ScholarGoogle Scholar
  28. Elsalamouny, E., Sassone, V., and Nielsen, M. 2010. HMM-based trust model. In Proceedings of the 6th International Workshop on Formal Aspects on Security and Trust (FAST'09). Lecture Notes in Computer Science, vol. 5983, Springer, 21--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Fukuyama, F. 1995. Trust: The Social Virtues and the Creation of Prosperity. Free Press, New York.Google ScholarGoogle Scholar
  30. Gilbert, E. and Karahalios, K. 2009. Predicting tie strength with social media. In Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI'09). ACM Press, New York, NY, 211--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Golbeck, J. 2005a. Personalizing applications through integration of inferred trust values in semantic web-based social networks. In Proceedings of the Semantic Network Analysis Workshop at the 4th International Semantic Web Conference.Google ScholarGoogle Scholar
  32. Golbeck, J. 2006a. Combining provenance with trust in social networks for semantic web content filtering. In Proceedings of the International Conference on Provenance and Annotation of Data (IPAW'06). L. Moreau and I. Foster, Eds., Lecture Notes in Computer Science Series, vol. 4145, Springer, 101--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Golbeck, J. 2006b. Trust on the world wide web: A survey. Found. Trends Web Sci. 1, 2, 131--197. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Golbeck, J. 2007. The dynamics of web-based social networks: Membership, relationships, and change. First Monday 12, 11.Google ScholarGoogle ScholarCross RefCross Ref
  35. Golbeck, J., Parsia, B., and Hendler, J. 2003. Trust networks on the semantic web. In Proceedings of the 7th International Workshop on Cooperative Intelligent Agents. 238--249.Google ScholarGoogle Scholar
  36. Golbeck, J. A. 2005b. Computing and applying trust in web-based social networks. Ph.D. thesis, University of Maryland at College Park, MD. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Grandison, T. and Sloman, M. 2000. A survey of trust in internet applications. IEEE Comm. Surv. Tutorials 3, 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Granovetter, M. 1973. The strength of weak ties. Amer. J. Sociology 78, 1360--1380.Google ScholarGoogle ScholarCross RefCross Ref
  39. Granovetter, M. 1985. Economic action and social structure: The problem of embeddedness. Amer. J. Sociol. 91, 481--510.Google ScholarGoogle ScholarCross RefCross Ref
  40. Gross, R. and Acquisti, A. 2005. Information revelation and privacy in online social networks. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES'05). ACM Press, New York, 71--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Guerriero, A., Kubicki, S., and Halin, G. 2009. Trust-oriented multi-visualization of cooperation context. In Proceedings of the 2nd International Conference in Visualisation (VIZ'09). IEEE Computer Society, Los Alamitos, CA 96--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Hanchard, S. 2008. Measuring trust and social networks - Where do we put our trust online? Hitwise. http://weblogs.hitwise.com/sandra-hanchard/2008/09/measuring_trust_and_social_net.html.Google ScholarGoogle Scholar
  43. Hang, W. C. and Singh, M. P. 2010. Trust based recommendation based on graph similarities. http://www.csc. ncsu.edu/faculty/mpsingh/papers/mas/aamas-trust-10-graph.pdf.Google ScholarGoogle Scholar
  44. Haythornthwaite, C. 2005. Social networks and internet connectivity effects. Inf. Comm. Soc. 8, 2, 125--147.Google ScholarGoogle ScholarCross RefCross Ref
  45. Helbing, D. 1994. A mathematical model for the behavior of individuals in a social field. J. Math. Sociol. 19, 3, 189--219.Google ScholarGoogle ScholarCross RefCross Ref
  46. Helbing, D. 1992. A mathematical model for attitude formation by pair interactions. Behav. Sci. 37, 3, 190--214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Herlocker, J. L., Konstan, J. A., and Riedl, J. 2000. Explaining collaborative filtering recommendations. In Proceedings of ACM Conference on Computer Supported Cooperative Work (CSCW'00). 241--250. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Hess, C. 2006. Trust-based recommendations for publications: A multi-layer network approach. IEEE Tech. Commit. Digital Librar. Bull. 2, 2.Google ScholarGoogle Scholar
  49. Hess, C. 2008. Trust-based recommendations in multi-layer networks. Ph.D. thesis, Otto-Friedrich University Bamberg/University Paris-Sud.Google ScholarGoogle Scholar
  50. Hoffman, K., Zage, D., and Nita-Rotaru, C. 2009. A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42, 1--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Holmes, J. 1991. Trust and the appraisal process in close relationships. In Advances in Personal Relationships, W. Jones and D. Perlman, Eds., Jessica Kingsley, London, 57--104.Google ScholarGoogle Scholar
  52. Huang, F. 2007. Building social trust: A human-capital approach. J. Institut. Theor. Econ. 163, 4, 552--573.Google ScholarGoogle ScholarCross RefCross Ref
  53. Hughes, D., Coulson, G., and Walkerdine, J. 2005. Free riding on gnutella revisited: The bell tolls? IEEE Distrib. Syst. Online 6, 6, 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Humphreys, L. 2007. Mobile social networks and social practice: A case study of dodgeball. J. Comput.-Mediated Comm. 13, 1, 341--360.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Huynh, T. D., Jennings, N. R., and Shadbolt, N. R. 2006. Certified reputation: How an agent can trust a stranger. In Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'06). New York, NY, 1217--1224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Jackson, P. J. 1999. Virtual Working: Social and Organisational Dynamics. Routledge, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Jaeger, P. T., Shneiderman, B., Fleischmann, K. R., Preece, J., Qu, Y., and Wu, P. F. 2007. Community response grids: E-government, social networks, and effective emergency management. Telecomm. Policy 31, 10--11, 592--604. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Jamieson, K. and Cappella, J. 2009. Echo Chamber: Rush Limbaugh and the Conservative Media Establishment. Oxford University Press.Google ScholarGoogle Scholar
  59. Johnson, D. and Grayson, K. 2005. Cognitive and affective trust in service relationships. J. Bus. Res. 58, 4, 500--507.Google ScholarGoogle ScholarCross RefCross Ref
  60. Jones, K. 1996. Trust as an affective attitude. Ethics 107, 1, 4--25.Google ScholarGoogle ScholarCross RefCross Ref
  61. Josang, A. 2001. A logic for uncertain probabilities. Int. J. Uncert., Fuzzin. Knowl.-Based Syst. 9, 3, 279--311. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Josang, A. and Golbeck, J. 2009. Challenges for robust trust and reputation systems. In Proceedings of the 5th International Workshop on Security and Trust Management (STM'09).Google ScholarGoogle Scholar
  63. Josang, A., Gray, E., and Kinateder, M. 2003. Analysing topologies of transitive trust. In Proceedings of the 1st Workshop on Formal Aspects in Security and Trust (FAST'03). 9--22.Google ScholarGoogle Scholar
  64. Josang, A., Hayward, R., and Pope, S. 2006. Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference (ACSC'06). Australian Computer Society, Hobart, Australia, 85--94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Josang, A. and Ismail, R. 2002. The beta reputation system. In Proceedings of the 15th Bled Conference on Electronic Commerce. 891--900.Google ScholarGoogle Scholar
  66. Josang, A., Ismail, R., and Boyd, C. 2007. A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 2, 618--644. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Jurca, R. and Faltings, B. 2003. An incentive compatible reputation mechanism. In Proceedings of the IEEE Conference on E-Commerce (CEC'03). 396--409.Google ScholarGoogle Scholar
  68. Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. 2003. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International Conference on World Wide Web (WWW'03). ACM Press, New York, 640--651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Kautz, H., Selman, B., and Shah, M. 1997. Referral web: Combining social networks and collaborative filtering. Comm. ACM 40, 63--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Keith, S. and Coulter, R. A. C. 2002. Determinants of trust in a service provider: The moderating role of length of relationship. J. Services Market. 16, 1, 35--50.Google ScholarGoogle ScholarCross RefCross Ref
  71. Kerr, R. and Cohen, R. 2009. Smart cheaters do prosper: Defeating trust and reputation systems. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'09). Vol. 2, 993--1000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Kim, Y. A. 2008. Building a web of trust without explicit trust ratings. In Proceedings of the 24th IEEE International Conference on Data Engineering Workshop. 531--536.Google ScholarGoogle Scholar
  73. Kleinfeld, J. 2002. The small world problem. Soc. Social Sci. Public Policy 39, 61--66.Google ScholarGoogle Scholar
  74. Klos, T. B. and La Poutre, H. 2005. Decentralized reputation-based trust for assessing agent reliability under aggregate feedback. In Trusting Agents for Trusting Electronic Societies, Springer, 10--128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Kollock, P. 1994. The emergence of exchange structures: An experimental study of uncertainty, commitment, and trust. Amer. J. Sociol. 100, 2, 313--345.Google ScholarGoogle ScholarCross RefCross Ref
  76. Komiak, S. X. and Benbasat, I. 2004. Understanding customer trust in agent-mediated electronic commerce, web-mediated electronic commerce, and traditional commerce. Inf. Technol. Manag. 5, 181--207. Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Kuan, H. and Bock, G. 2005. The collective reality of trust: An investigation of social relations and networks on trust in multi-channel retailers. In Proceedings of the 13th European Conference on Information Systems (ECIS'05).Google ScholarGoogle Scholar
  78. Kuter, U. and Golbeck, J. 2007. Sunny: A new algorithm for trust inference in social networks using probabilistic confidence models. In Proceedings of the 22nd National Conference on Artificial Intelligence. AAAI Press, 1377--1382. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Lawler, E. J. and Yoon, J. 1996. Commitment in exchange relations: Test of a theory of relational cohesion. Amer. Sociol. Rev. 61, 89--108.Google ScholarGoogle ScholarCross RefCross Ref
  80. Lazarsfeld, P. and Merton, R. 1954. Friendship as a social process: A substantive and methodological analysis. In Freedom and Control in Modern Society, M. Berger, T. Abel, and C. H. Page, Eds., Van Nostrand, New York, 18--66.Google ScholarGoogle Scholar
  81. Levin, D. Z., Cross, R., and Abrams, L. C. 2004. The strength of weak ties you can trust: The mediating role of trust in effective knowledge transfer. Manag. Sci. 50, 1477--1490. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Lewis, J. D. and Weigert, A. 1985. Trust as a social reality. Social Forces 63, 4, 967--985.Google ScholarGoogle ScholarCross RefCross Ref
  83. Likert, R. 1932. A technique for the measurement of attitudes. Archiv. Psychol. 140, 1, 1--55.Google ScholarGoogle Scholar
  84. Liu, H., Lim, E.-P., Lauw, H. W., Le, M.-T., Sun, A., Srivastava, J., and Kim, Y. A. 2008. Predicting trusts among users of online communities: An epinions case study. In Proceedings of the 9th ACM Conference on Electronic Commerce (EC'08). ACM Press, New York, 310--319. Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Maheswaran, M., Tang, H. C., and Ghunaim, A. 2007. Towards a gravity-based trust model for social networking systems. In Proceedings of the International Conference on Distributed Computing Systems Workshops. IEEE Computer Society, Los Alamitos, CA, 24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Malik, Z., Akbar, I., and Bouguettaya, A. 2009. Web services reputation assessment using a hidden markov model. In Proceedings of the 7th International Joint Conference on Service-Oriented Computing (ICSOC-ServiceWave'09). 576--591. Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Malik, Z. and Bouguettaya, A. 2009. Reputation bootstrapping for trust establishment among web services. IEEE Internet Comput. 13, 40--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Manikrao, U. S. and Prabhakar, T. V. 2005. Dynamic selection of web services with recommendation system. In Proceedings of the International Conference on Next Generation Web Services Practices (NWESP'05). IEEE Computer Society, Los Alamitos, CA, 117--121. Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Marmol, F. G. and Perez, G. M. 2011. Trust and reputation models comparison. Internet Res. 21, 138--153.Google ScholarGoogle ScholarCross RefCross Ref
  90. Marsh, S. P. 1994. Formalising trust as a computational concept. Ph.D. thesis, University of Stirling.Google ScholarGoogle Scholar
  91. Massa, P. and Avesani, P. 2007. Trust-aware recommender systems. In Proceedings of the 1st ACM Conference on Recommender Systems (RecSys'07). ACM Press, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. Mcleod, A. and Pippin, S. 2009. Security and privacy trust in e-government: Understanding system and relationship trust antecedents. In Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS'09). 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Mcpherson, M., Lovin, L. S., and Cook, J. M. 2001. Birds of a feather: Homophily in social networks. Ann. Rev. Sociol. 27, 1, 415--444.Google ScholarGoogle ScholarCross RefCross Ref
  94. Mika, P. 2007. Social Networks and the Semantic Web. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Miles, R. E. and Creed, W. E. D. 1995. Organizational forms and managerial philosophies: A descriptive and analytical review. Res. Organizat. Behav. 17, 333--372.Google ScholarGoogle Scholar
  96. Milgram, S. 1967. The small world problem. Psychol. Today 1, 1, 60--67.Google ScholarGoogle Scholar
  97. Moibus, M. and Quoc-Anh, D. 2004. Social capital in social networks. http://www.earthinstitute. columbia.edu/cgsd/documents/rosenblat.pdf.Google ScholarGoogle Scholar
  98. Mollering, G. 2002. The nature of trust: From geog simmel to a theory of expectation, interpretation and suspension. Sociol. 35, 403--420.Google ScholarGoogle ScholarCross RefCross Ref
  99. Molm, L. D., Takahashi, N., and Peterson, G. 2000. Risk and trust in social exchange: An experimental test of a classical proposition. Amer. J. Sociol. 5, 105, 1396--1427.Google ScholarGoogle Scholar
  100. Momani, M. and Challa, S. 2010. Survey of trust models in different network domains. Int. J. Ad Hoc Sensor Ubiq. Comput. 1, 3, 1--19.Google ScholarGoogle ScholarCross RefCross Ref
  101. Moreland, D., Nepal, S., Hwang, H., and Zic, J. 2010. A snapshot of trusted personal devices applicable to transaction processing. Personal Ubiq. Comput. 14, 4, 347--361. Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. Mui, L. 2003. Computational models of trust and reputation: Agents, evolutionary games, and social networks. Ph.D. thesis. http://groups.csail.mit.edu/medg/people/lmui/docs/phddissertation.pdf.Google ScholarGoogle Scholar
  103. Mui, L., Mohtashemi, M., and Halberstadt, A. 2002. A computational model of trust and reputation. In Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS'02). IEEE Computer Society, Los Alamitos, CA, 188--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Nahapiet, J. and Ghoshal, S. 1998. Social capital, intellectual capital, and the organizational advantage. Academy Manag. Rev. 23, 2, 242--266.Google ScholarGoogle ScholarCross RefCross Ref
  105. Nepal, S., Sherchan, W., and Bouguettaya, A. 2010a. A behavior based trust model for service web. In Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications (SOCA'10). IEEE Computer Society, 1--4.Google ScholarGoogle Scholar
  106. Nepal, S., Sherchan, W., and Paris, C. 2011. STrust: A trust model for social networks. In Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'11). 841--846. Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Nepal, S., Zic, J., Liu, D., and Jang, J. 2010b. Trusted computing platform in your pocket. In Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC'10). IEEE Computer Society, Los Alamitos, CA, 812--817. Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. O'Donovan, J., Smyth, B., Evrim, V., and Mcleod, D. 2007. Extracting and visualizing trust relationships from online auction feedback comments. In Proceedings of the 20th International Joint Conference on Artificial Intelligence. Morgan Kaufmann Publishers, San Francisco, 2826--2831. Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Paldam, M. 2000. Social capital: One or many? Definition and measurement. J. Econ. Surv. 5, 1, 629--653.Google ScholarGoogle ScholarCross RefCross Ref
  110. Paradesi, S., Doshi, P., and Swaika, S. 2009. Integrating behavioral trust in web service compositions. In Proceedings of the IEEE International Conference on Web Services (ICWS'09). 453--460. Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Putnam, R. 2000. Bowling Alone: The Collapse and Revival of American Community. Simon and Schuster, New York.Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Putnam, R. D. 1995. Bowling alone: America's declining social capital. J. Democracy 6, 1, 65--78.Google ScholarGoogle ScholarCross RefCross Ref
  113. Resnick, P., Zeckhauser, R., Friedman, E., and Kuwabara, K. 2000. Reputation systems. Comm. ACM 43, 12, 45--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Richardson, M., Agrawal, R., and Domingos, P. 2003. Trust management for the semantic web. In Proceedings of the 2nd International Semantic Web Conference. 351--368.Google ScholarGoogle Scholar
  115. Romer, P. M. 2000. Thinking and feeling. Amer. Econ. Rev. 90, 2, 439--443.Google ScholarGoogle ScholarCross RefCross Ref
  116. Rotter, J. B. 1967. A new scale for the measurement of interpersonal trust. J. Personality 35, 4, 651--665.Google ScholarGoogle ScholarCross RefCross Ref
  117. Rotter, J. B. 1971. Generalized expectancies for interpersonal trust. Amer. Psychol. 26, 1, 443--452.Google ScholarGoogle ScholarCross RefCross Ref
  118. Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C. 1998. Not so different after all: A cross-discipline view of trust. Academy Manag. Rev. 23, 3, 393--404.Google ScholarGoogle ScholarCross RefCross Ref
  119. Ruohomaa, S. and Kutvonen, L. 2005. Trust management survey. In Proceedings of the 3rd International Conference on Trust Management (iTrust'05). Springer, 77--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. Ruohomaa, S., Kutvonen, L., and Koutrouli, E. 2007. Reputation management survey. In Proceedings of the 2nd International Conference on Availability, Reliability and Security (ARES'07). IEEE Computer Society, 103--111. Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. Sabater, J. 2002. Trust and reputation for agent societies. Ph.D. thesis, Autonomous University Of Barcelona, Spain. http://www.tesisenxarxa.net/TESIS_UAB/AVAILABLE/TDX-0123104172828//jsm1de1.pdf.Google ScholarGoogle Scholar
  122. Sabater, J. and Sierra, C. 2002. Reputation and social network analysis in multi-agent systems. In Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'02). ACM Press, New York, 475--482. Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. Sabater, J. and Sierra, C. 2005. Review on computational trust and reputation models. Artif. Intell. Rev. 24, 33--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. Schillo, M., Funk, P., and Rovatsos, M. 2000. Using trust for detecting deceitful agents in artificial societies. Appl. Artif. Intell. 14, 8, 825--848.Google ScholarGoogle ScholarCross RefCross Ref
  125. Schneider, O. 2009. Trust-aware social networking: A distributed storage system based on social trust and geographic proximity. M.S. thesis. http://www.peerson.net/papers/oliver_da.pdf.Google ScholarGoogle Scholar
  126. Scully, M. and Preuss, G. 1996. Two faces of trust: The roles of calculative and relational trust in work transformation. Tech. rep. working paper no. 3923--96, Massachusetts Institute of Technology.Google ScholarGoogle Scholar
  127. Seshadri, A., Perrig, A., van Doorn, L., and Khosla, P. K. 2004. SWATT: Software-based attestation for embedded devices. In Proceedings of the IEEE Symposium on Security and Privacy. 272--282.Google ScholarGoogle Scholar
  128. Singh, M. P., Yu, B., and Venkatraman, M. 2001. Community-based service location. Comm. ACM 44, 49--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  129. Singh, S. and Bawa, S. 2007. Privacy, trust and policy based authorization framework for services in distributed environments. Int. J. Comput. Sci. 2, 2, 85--92.Google ScholarGoogle Scholar
  130. Song, S., Hwang, K., Zhou, R., and Kwok, Y.-K. 2005. Trusted p2p transactions with fuzzy reputation aggregation. IEEE Internet Comput. 9, 6, 24--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  131. Song, W., Phoha, V. V., and Xu, X. 2004. The hmm-based model for evaluating recommender's reputation. In Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business. IEEE, 209--215. Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. Staab, S., Bhargava, B., Lilien, L., Rosenthal, A., Winslett, M., Sloman, M., Dillon, T. S., Chang, E., Hussain, F. K., Nejdl, W., Olmedilla, D., and Kashyap, V. 2004. The pudding of trust: Managing the dynamic nature of trust. IEEE Intell. Syst. 19, 5, 74--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. Sturgis, P., Read, S., Hatemi, P., Zhu, G., Trull, T., Wright, M., and Martin, N. 2010. A genetic basis for social trust? Polit. Behav. 32, 2, 205--230.Google ScholarGoogle ScholarCross RefCross Ref
  134. Suh, B. and Han, I. 2002. Effect of trust on customer acceptance of Internet banking. Electron. Commerce Res. Appl. 1, 3--4, 247--263.Google ScholarGoogle ScholarCross RefCross Ref
  135. Suryanarayana, G., T. R. 2004. A survey of trust management and resource discovery technologies in peer-to-peer applications. Tech. rep. UCI-ISR-04-6, Institute for Software Research, University of California, Irvine.Google ScholarGoogle Scholar
  136. Sztompka, P. 1999. Trust: A Sociological Theory. Cambridge University Press.Google ScholarGoogle Scholar
  137. Taylor, R. 2000. Marketing strategies: Gaining a competitive advantage through the use of emotion. Competitiv. Rev. 10, 146--152.Google ScholarGoogle ScholarCross RefCross Ref
  138. Toivonen, S., Lenzini, G., and Uusitalo, I. 2006. Context-aware trust evaluation functions for dynamic reconfigurable systems. In Proceedings of the Workshop on Models of Trust for the Web (MTW'06), held in Conjunction with the 15th International World Wide Web Conference, T. Finin, L. Kagal, and D. Olmedilla, Eds., CEUR Workshop Proceedings Series, vol. 190.Google ScholarGoogle Scholar
  139. Trifunovic, S., Legendre, F., and Anastasiades, C. 2010. Social trust in opportunistic networks. In Proceedings of the INFOCOM IEEE Conference on Computer Communications Workshops. IEEE, 1--6.Google ScholarGoogle Scholar
  140. Tyler, T. R. 1990. Why People Obey the Law. Yale University Press, New Haven, CT.Google ScholarGoogle Scholar
  141. Tyler, T. R. and Degoey, P. 1996. Trust in organizational authorities: The influence of motive attributions on willingness to accept decisions. In Trust in Organizations: Frontiers of Theory and Research, R. M. Kramer and T. R. Tyler, Eds., Sage Publications, Thousand Oaks, CA.Google ScholarGoogle Scholar
  142. Vigas, F. B. and Donath, J. 2004. Social network visualization: Can we go beyond the graph? In Proceedings of the Workshop on Social Networks for Design and Analysis: Using Network Information in CSCW. 6--10.Google ScholarGoogle Scholar
  143. von Laszewski, G., Alunkal, B., and Veljkovic, I. 2005. Towards reputable grids: Scalable computing. Pract. Exper. 6, 3, 95--106.Google ScholarGoogle Scholar
  144. Waldman, M., Rubin, A. D., and Cranor, L. F. 2000. Publius: A robust, tamper-evident, censorship resistent web publishing system. In Proceedings of the 9th USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. Walter, F. E., Battiston, S., and Schweitzer, F. 2009. Personalised and dynamic trust in social networks. In Proceedings of the 3rd ACM Conference on Recommender Systems (RecSys'09). ACM Press, New York, 197--204. Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. Wang, T. and Lu, Y. 2010. Determinants of trust in e-government. In Proceedings of the International Conference on Computational Intelligence and Software Engineering (CiSE'10). 1--4.Google ScholarGoogle Scholar
  147. Wang, Y., Hori, Y., and Sakurai, K. 2007. Economic-inspired truthful reputation feedback mechanism in p2p networks. In Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. 80--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. Wang, Y. and Vassileva, J. 2007. A review on trust and reputation for web service selection. In Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07). IEEE Computer Society, 25--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  149. Watts, D. J. 2003. Six Degrees: The Science of a Connected Age. W.W. Norton and Company, New York.Google ScholarGoogle Scholar
  150. Wei-Hang, C. and Singh, M. P. 2010. Trust-based recommendation based on graph similarity. In Proceedings of the 13th AAMAS Workshop on Trust in Agent Societies. http://www.csc.ncsu.edu/faculty/mpsingh/papers/mas/aamas-trust-10-graph.pdf.Google ScholarGoogle Scholar
  151. Wellman, B. 1996. For a social network analysis of computer networks: A sociological perspective on collaborative work and virtual community. In Proceedings of the ACM SIGCPR/SIGMIS Conference on Computer Personnel Research (SIGCPR'96). ACM Press, New York, 1--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  152. Wellman, B. 2004. The global village: Internet and community. Arts Sci. Rev. 1, 1, 26--30.Google ScholarGoogle Scholar
  153. Williamson, O. E. 1993. Calculativeness, trust and economic organization. J. Law Econ. 30, 1, 131--145.Google ScholarGoogle Scholar
  154. Wishart, R., Robinson, R., Indulska, J., and Josang, A. 2005. Superstringrep: Reputation-enhanced service discovery. In Proceedings of the 28th Australasian Conference on Computer Science (ACSC'05). Australian Computer Society, Darlinghurst, Australia, 49--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  155. Xiang, R., Neville, J., and Rogati, M. 2010. Modeling relationship strength in online social networks. In Proceedings of the 19th International Conference on World Wide Web (WWW'10). ACM Press, New York, 981--990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  156. Xiong, L. and Liu, L. 2003. A reputation-based trust model for peer-to-peer ecommerce communities. In Proceedings of the 4th ACM Conference on Electronic Commerce (EC'03). ACM Press, New York, 228--229. Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. Xiong, L. and Liu, L. 2004. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Engin. 16, 7, 843--857. Google ScholarGoogle ScholarDigital LibraryDigital Library
  158. Yan, Z., Niemi, V., Dong, Y., and Yu, G. 2008. A user behavior based trust model for mobile applications. In Proceedings of the 5th International Conference on Autonomic and Trusted Computing. 455--469. Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. Yan, Z. and Yan, R. 2009. Formalizing trust based on usage behaviours for mobile applications. In Proceedings of the 6th International Conference on Autonomic and Trusted Computing. 194--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  160. Yang, J., Hu, X., and Zhang, H. 2007. Effects of a reputation feedback system on an online consumer-to-consumer auction market. Decis. Support Syst. 44, 1, 93--105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  161. Yaniv, I. and Kleinberger, E. 2000. Advice taking in decision making: Egocentric discounting and reputation formation. Organiz. Behav. Hum. Decision Process. 83, 2, 260--281.Google ScholarGoogle ScholarCross RefCross Ref
  162. Yao, J., Chen, S., Nepal, S., Levy, D., and Zic, J. 2010. Truststore: Making amazon s3 trustworthy with services composition. In Proceedings of the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGRID'10). IEEE Computer Society, Los Alamitos, CA, 600--605. Google ScholarGoogle ScholarDigital LibraryDigital Library
  163. Young, A. L. and Quan-Haase, A. 2009. Information revelation and internet privacy concerns on social network sites: A case study of facebook. In Proceedings of the International Conference on Communities and Technologies. 265--274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  164. Yu, B. and Singh, M. P. 2000. A social mechanism for reputation management in electronic communities. In Proceedings of the 4th International Workshop on Cooperative Information Agents (CIA'00). Springer, 154--165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  165. Yu, B. and Singh, M. P. 2002. An evidential model of distributed reputation management. In Proceedings of the 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS'02). ACM Press, New York, 294--301. Google ScholarGoogle ScholarDigital LibraryDigital Library
  166. Yu, B., Singh, M. P., and Sycara, K. 2004. Developing trust in large-scale peer-to-peer systems. In Proceedings of the 1st IEEE Symposium on Multi-Agent Security and Survivability. IEEE Computer Society, 1--10.Google ScholarGoogle Scholar
  167. Zacharia, G. and Maes, P. 2000. Trust management through reputation mechanisms. Appl. Artif. Intell. 14, 9, 881--907.Google ScholarGoogle ScholarCross RefCross Ref
  168. Zajonc, R. 1980. Feeling and thinking: Preferences need no inferences. Amer. Psychol. 35, 2, 151--175.Google ScholarGoogle ScholarCross RefCross Ref
  169. Zappen, J. P., Harrison, T. M., and Watson, D. 2008. A new paradigm for designing e-government: Web 2.0 and experience design. In Proceedings of the International Conference on Digital Government Research. Digital Government Society of North America, 17--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  170. Zarghami, A., Fazeli, S., Dokoohaki, N., and Matskin, M. 2009. Social trust-aware recommendation system: A t-index approach. In Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT'09). IEEE Computer Society, Los Alamitos, CA, 85--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  171. Zhang, Y., Chen, H., and Wu, Z. 2006. A social network-based trust model for the semantic web. In Proceedings of the 6th International Conference on Autonomic and Trusted Computing. 183--192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  172. Zhang, Y. and Fang, Y. 2007. A fine-grained reputation system for reliable service selection in peer-to-peer networks. IEEE Trans. Parallel Distrib. Syst. 18, 8, 1134--1145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  173. Zhou, R. and Hwang, K. 2007. PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst. 18, 4, 460--473. Google ScholarGoogle ScholarDigital LibraryDigital Library
  174. Ziegler, C.-N. and Lausen, G. 2004. Spreading activation models for trust propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04). IEEE Computer Society, Los Alamitos, CA, 83--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  175. Zuo, Y., Hu, W.-C., and O'Keefe, T. 2009. Trust computing for social networking. In Proceedings of the 6th International Conference on Information Technology: New Generations. IEEE Computer Society, Los Alamitos, CA, 1534--1539. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A survey of trust in social networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 45, Issue 4
        August 2013
        490 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/2501654
        Issue’s Table of Contents

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 August 2013
        • Accepted: 1 August 2012
        • Revised: 1 March 2012
        • Received: 1 September 2011
        Published in csur Volume 45, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader