skip to main content
10.1145/988672.988727acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
Article

Propagation of trust and distrust

Published:17 May 2004Publication History

ABSTRACT

A (directed) network of people connected by ratings or trust scores, and a model for propagating those trust scores, is a fundamental building block in many of today's most successful e-commerce and recommendation systems. We develop a framework of trust propagation schemes, each of which may be appropriate in certain circumstances, and evaluate the schemes on a large trust network consisting of 800K trust scores expressed among 130K people. We show that a small number of expressed trusts/distrust per individual allows us to predict trust between any two people in the system with high accuracy. Our work appears to be the first to incorporate distrust in a computational trust propagation setting.

References

  1. G. Ackerlof. The market for lemons: Quality uncertainty and the market mechanism. Quarterly Journal of Economics, 84:488--500, 1970.Google ScholarGoogle ScholarCross RefCross Ref
  2. A. Armstrong and J. Hagel III. The real value of online communities. Harvard Business Review, pages 134--141, 1996.Google ScholarGoogle Scholar
  3. C. Avery, P. Resnick, and R. Zeckhauser. The market for evaluations. The American Economic Review, 89:564--584, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  4. S. Ba and P. Pavlou. Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quarterly, 26(3):243--268, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Ba, A. B. Whinston, and H. Zhang. Building trust in online auction markets through an economic incentive mechanism. Decision Support Systems, 35(3):273--286, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In 3rd European Symposium on Research in Computer Security, pages 3--19, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Z. Broder, R. Kumar, F. Maghoul, P. Raghavan, S. Rajagopalan, R. Stata, A. Tomkins, and J. Wiener. Graph structure in the web. WWW9/Computer Networks, 33(1--6):309--320, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18--36, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Coleman. Foundations of Social Theory. Harvard University Press, 1990.Google ScholarGoogle Scholar
  10. U. Frendrup, H. Huttel, and J. N. Jensen. Modal logics for cryptographic processes. Electronic Notes in Theoretical Computer Science, 68(1), 2002.Google ScholarGoogle Scholar
  11. M. Gladwell. The Tipping Point, How Little Things Can Make a Big Difference. Little Brown, 2000.Google ScholarGoogle Scholar
  12. D. Houser and J. Wooders. Reputation in auctions: Theory, and evidence from eBay. Technical report, University of Arizona, 2000.Google ScholarGoogle Scholar
  13. D. Kahneman, P. Slovic, and A. Tversky. Judgment Under Uncertainty: Heuristics and Biases. Cambridge University Press, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  14. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International World Wide Web Conference, pages 640--651, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. M. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM, 46(5):604--632, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Kollock. The production of trust in online markets. In E. J. Lawler amd M. Macy, S. Thyne, and H. A. Walker, editors, Advances in Group Processes, volume 16, pages 99--123. JAI Press, 1999.Google ScholarGoogle Scholar
  17. C. G. McDonald and V. C. Slawson Jr. Reputation in an internet auction model. Technical report, University of Missouri-Columbia, 2000.Google ScholarGoogle Scholar
  18. B. Misztal. Trust in Modern Societies: The Search for the Bases of Social Order. Polity Press, 1996.Google ScholarGoogle Scholar
  19. P. Resnick and R. Zeckhauser. Trust among strangers in internet transactions: Empirical analysis of eBay's reputation system. Technical report, University of Michigan, 2001.Google ScholarGoogle Scholar
  20. P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems. Communications of the ACM, 43:45--8, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Richardson, R. Agrawal, and P. Domingos. Trust management for the semantic web. In Proceedings of the Second International Semantic Web Conference, pages 351--368, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. M. Snyder. Online auction fraud: Are the auction houses doing all they should or could to stop online fraud. Federal Communications Law Journal, 52:453--472, 2000.Google ScholarGoogle Scholar
  23. P. Sztompka. Trust: A Sociological Theory. Cambridge University Press, 1999.Google ScholarGoogle Scholar
  24. The MIT PGP Team.Google ScholarGoogle Scholar
  25. B. Yu and M. P. Singh. A social mechanism of reputation management in electronic communities. In Cooperative Information Agents, pages 154--165, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Propagation of trust and distrust

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                WWW '04: Proceedings of the 13th international conference on World Wide Web
                May 2004
                754 pages
                ISBN:158113844X
                DOI:10.1145/988672

                Copyright © 2004 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 17 May 2004

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                Overall Acceptance Rate1,899of8,196submissions,23%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader