Skip to main content
Erschienen in: Social Network Analysis and Mining 4/2013

01.12.2013 | Original Article

Robust features of trust in social networks

verfasst von: Zoheb Hassan Borbora, Muhammad Aurangzeb Ahmad, Jehwan Oh, Karen Zita Haigh, Jaideep Srivastava, Zhen Wen

Erschienen in: Social Network Analysis and Mining | Ausgabe 4/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We identify robust features of trust in social networks; these are features which are discriminating yet uncorrelated and can potentially be used to predict trust formation between agents in other social networks. The features we investigate are based on an agent’s individual properties as well as those based on the agent’s location within the network. In addition, we analyze features which take into account the agent’s participation in other social interactions within the same network. Three datasets were used in our study—Sony Online Entertainment’s EverQuest II game dataset, a large email network with sentiments and the publicly available Epinions dataset. The first dataset captures activities from a complex persistent game environment characterized by several types of in-game social interactions, whereas the second dataset has anonymized information about people’s email and instant messaging communication. We formulate the problem as one of the link predictions, intranetwork and internetwork, in social networks. We first build machine learning models and then perform an ablation study to identify robust features of trust. Results indicate that shared skills and interests between two agents, their level of activity and level of expertise are the top three predictors of trust in a social network. Furthermore, if only network topology information were available, then an agent’s propensity to connect or communicate, the cosine similarity between two agents and shortest distance between them are found to be the top three predictors of trust. In our study, we have identified the generic characteristics of the networks used as well as the features investigated so that they can be used as guidelines for studying the problem of predicting trust formation in other social networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
2
In case of the EverQuest II dataset, we use player sums of session lengths (in minutes) to approximate avatar age. A player session is defined as a contiguous period of player activity. Since the activity logs in EverQuest II only record player actions, we used a simple heuristic to define player session. A session consists of sets of activities which are separated by no more than 30 min.
 
Literatur
Zurück zum Zitat Abdul-Rahman A, Hailes S (1997) A distributed trust model. In: Proceedings of the 1997 workshop on New security paradigms, NSPW ’97, New York, NY, USA. ACM, pp 48–60 Abdul-Rahman A, Hailes S (1997) A distributed trust model. In: Proceedings of the 1997 workshop on New security paradigms, NSPW ’97, New York, NY, USA. ACM, pp 48–60
Zurück zum Zitat Adamic LA, Adar E (2003) Friends and neighbors on the web. Soc Netw 25(3):211–230CrossRef Adamic LA, Adar E (2003) Friends and neighbors on the web. Soc Netw 25(3):211–230CrossRef
Zurück zum Zitat Ahmad MA, Huffaker D, Wang J, Treem J, Kumar D, Poole MS, Srivastava J (2010a) The many faces of mentoring in an mmorpg. In: 2010 IEEE Second International Conference on Social Computing (SocialCom), pp 270 –275 Ahmad MA, Huffaker D, Wang J, Treem J, Kumar D, Poole MS, Srivastava J (2010a) The many faces of mentoring in an mmorpg. In: 2010 IEEE Second International Conference on Social Computing (SocialCom), pp 270 –275
Zurück zum Zitat Ahmad M, Borbora ZH, Srivastava J, Contractor N (2010b) Link prediction across multiple social networks. In: ICDM Workshops, pp 911–918 Ahmad M, Borbora ZH, Srivastava J, Contractor N (2010b) Link prediction across multiple social networks. In: ICDM Workshops, pp 911–918
Zurück zum Zitat Ahmad M, Huffaker DA, Wang J, William Treem J, Scott Poole M, Srivastava J (2010c) Gtpa: a generative model for online mentor-apprentice networks. In: AAAI Ahmad M, Huffaker DA, Wang J, William Treem J, Scott Poole M, Srivastava J (2010c) Gtpa: a generative model for online mentor-apprentice networks. In: AAAI
Zurück zum Zitat Ahmad MA, Ahmad I, Srivastava J, Poole M (2011) Trust me, i am an expert: trust, homophily and expertise in mmos. In: IEEE international conference on social computing Ahmad MA, Ahmad I, Srivastava J, Poole M (2011) Trust me, i am an expert: trust, homophily and expertise in mmos. In: IEEE international conference on social computing
Zurück zum Zitat Ahmad MA, Borbora ZH, Shen C, Srivastava J, Williams D (2011) Guilds play in mmos: rethinking common group dynamics models. In: 3rd International conference on social informatics Ahmad MA, Borbora ZH, Shen C, Srivastava J, Williams D (2011) Guilds play in mmos: rethinking common group dynamics models. In: 3rd International conference on social informatics
Zurück zum Zitat Artz D, Gil Y (2007) A survey of trust in computer science and the semantic web. Web Semantics: science, services and agents on the world wide web. Softw Eng Semantic Web 5(2):58–71 Artz D, Gil Y (2007) A survey of trust in computer science and the semantic web. Web Semantics: science, services and agents on the world wide web. Softw Eng Semantic Web 5(2):58–71
Zurück zum Zitat Borbora ZH, Ahmad MA, Haigh KZ, Srivastava J, Wen Z (2011) Exploration of robust features of trust across multiple social networks. In: Workshop on trustworthy self-organizing systems, 2nd edn. Borbora ZH, Ahmad MA, Haigh KZ, Srivastava J, Wen Z (2011) Exploration of robust features of trust across multiple social networks. In: Workshop on trustworthy self-organizing systems, 2nd edn.
Zurück zum Zitat Castelfranchi C, Falcone R (1998) Principles of trust for mas: cognitive anatomy, social importance, and quantification, pp 72–79 Castelfranchi C, Falcone R (1998) Principles of trust for mas: cognitive anatomy, social importance, and quantification, pp 72–79
Zurück zum Zitat Castronova E, Williams D, Shen C, Ratan R, Xiong L, Huang Y, Keegan B (2009) As real as real? macroeconomic behavior in a large-scale virtual world. 11(5):685–707 Castronova E, Williams D, Shen C, Ratan R, Xiong L, Huang Y, Keegan B (2009) As real as real? macroeconomic behavior in a large-scale virtual world. 11(5):685–707
Zurück zum Zitat Douceur JR, Donath JS (2002) The sybil attack, pp 251–260 Douceur JR, Donath JS (2002) The sybil attack, pp 251–260
Zurück zum Zitat Freeman L (1977) A set of measures of centrality based upon betweenness. Sociometry, pp 35–41 Freeman L (1977) A set of measures of centrality based upon betweenness. Sociometry, pp 35–41
Zurück zum Zitat Gambetta D (1988) Can we trust trust? In: Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213–237 Gambetta D (1988) Can we trust trust? In: Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213–237
Zurück zum Zitat Golbeck J (2008) Computing with social trust, 1st edn. Springer, Berlin Golbeck J (2008) Computing with social trust, 1st edn. Springer, Berlin
Zurück zum Zitat Golbeck J (2005) Computing and applying trust in web-based social networks. University of Maryland, College Park Golbeck J (2005) Computing and applying trust in web-based social networks. University of Maryland, College Park
Zurück zum Zitat Gray E, Seigneur J-M, Chen Y, Jensen C (2003) Trust propagation in small worlds, Trust management. In: Nixon P, Terzis S (eds) Lecture notes in computer science, vol 2692. Springer, Berlin, p 1072 Gray E, Seigneur J-M, Chen Y, Jensen C (2003) Trust propagation in small worlds, Trust management. In: Nixon P, Terzis S (eds) Lecture notes in computer science, vol 2692. Springer, Berlin, p 1072
Zurück zum Zitat Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The weka data mining software: an update. SIGKDD Explor 11(1):10–18CrossRef Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The weka data mining software: an update. SIGKDD Explor 11(1):10–18CrossRef
Zurück zum Zitat Hall MA (2000) Correlation-based feature selection for discrete and numeric class machine learning. In: Proceedings of 17th international conference on machine learning, pp 359–366 Hall MA (2000) Correlation-based feature selection for discrete and numeric class machine learning. In: Proceedings of 17th international conference on machine learning, pp 359–366
Zurück zum Zitat Al Hasan M, Chaoji V, Salem S, Zaki M (2006) Link prediction using supervised learning. In: Workshop on Link Analysis, Counter-terrorism and Security, SIAM Al Hasan M, Chaoji V, Salem S, Zaki M (2006) Link prediction using supervised learning. In: Workshop on Link Analysis, Counter-terrorism and Security, SIAM
Zurück zum Zitat Huffaker D, (Annie) Wang J, Treem J, Ahmad MA, Fullerton L, Williams D, Poole MS, Contractor N (2009) The social behaviors of experts in massive multiplayer online role-playing games. In: IEEE international conference on computational science and engineering, vol 4, pp 326–331 Huffaker D, (Annie) Wang J, Treem J, Ahmad MA, Fullerton L, Williams D, Poole MS, Contractor N (2009) The social behaviors of experts in massive multiplayer online role-playing games. In: IEEE international conference on computational science and engineering, vol 4, pp 326–331
Zurück zum Zitat Jaccard P (1901) Distribution de la flore alpine dans le bassin des dranses et dans quelques régions voisines. Bulletin de la Société Vaudoise des Sciences Naturelles 37:241–272 Jaccard P (1901) Distribution de la flore alpine dans le bassin des dranses et dans quelques régions voisines. Bulletin de la Société Vaudoise des Sciences Naturelles 37:241–272
Zurück zum Zitat Levien R (2004) Attack resistant trust metrics. Technical report Levien R (2004) Attack resistant trust metrics. Technical report
Zurück zum Zitat Marsh SP (1994) Formalising trust as a computational concept. Technical report, University of Stirling. Department of Mathematics and Computer Science Marsh SP (1994) Formalising trust as a computational concept. Technical report, University of Stirling. Department of Mathematics and Computer Science
Zurück zum Zitat Massa P, Avesani P (2006) Trust-aware bootstrapping of recommender systems. In: Proceedings of ECAI workshop on recommender systems, pp 29–33 Massa P, Avesani P (2006) Trust-aware bootstrapping of recommender systems. In: Proceedings of ECAI workshop on recommender systems, pp 29–33
Zurück zum Zitat Massa P, Avesani P (2004) Trust-aware collaborative filtering for recommender systems. In: Proceedings of Federated international conference on the move to meaningful internet: CoopIS, DOA, ODBASE, pp 492–508 Massa P, Avesani P (2004) Trust-aware collaborative filtering for recommender systems. In: Proceedings of Federated international conference on the move to meaningful internet: CoopIS, DOA, ODBASE, pp 492–508
Zurück zum Zitat Mitchell TM. (1997) Machine learning. McGraw-Hill, New York Mitchell TM. (1997) Machine learning. McGraw-Hill, New York
Zurück zum Zitat Monge PR, Contractor N (2003) Theories of communication networks. Oxford University Press, Cambridge Monge PR, Contractor N (2003) Theories of communication networks. Oxford University Press, Cambridge
Zurück zum Zitat Mui L, Mohtashemi M (2002) A computational model of trust and reputation. In: Proceedings of the 35th Hawaii international conference on system science (HICSS) Mui L, Mohtashemi M (2002) A computational model of trust and reputation. In: Proceedings of the 35th Hawaii international conference on system science (HICSS)
Zurück zum Zitat Nieminen J (1974) On the centrality in a graph. Scand J Psychol 15:332–336CrossRef Nieminen J (1974) On the centrality in a graph. Scand J Psychol 15:332–336CrossRef
Zurück zum Zitat O’Donovan J, Smyth B (2005) Trust in recommender systems. In: Proceedings of the 10th international conference on Intelligent user interfaces, IUI ’05. ACM, New York, pp 167–174 O’Donovan J, Smyth B (2005) Trust in recommender systems. In: Proceedings of the 10th international conference on Intelligent user interfaces, IUI ’05. ACM, New York, pp 167–174
Zurück zum Zitat Pang B, Lee L (2008) Opinion mining and sentiment analysis. Found Trends Inf Retr 2(1–2):1–135CrossRef Pang B, Lee L (2008) Opinion mining and sentiment analysis. Found Trends Inf Retr 2(1–2):1–135CrossRef
Zurück zum Zitat Ramchurn SD, Huynh D, Jennings NR (2004) Trust in multi-agent systems. Knowl Eng Rev 19:2004CrossRef Ramchurn SD, Huynh D, Jennings NR (2004) Trust in multi-agent systems. Knowl Eng Rev 19:2004CrossRef
Zurück zum Zitat Sabater J, Sierra C (2001) Regret: a reputation model for gregarious societies, pp 61–69 Sabater J, Sierra C (2001) Regret: a reputation model for gregarious societies, pp 61–69
Zurück zum Zitat Salton G, McGill MJ (1983) Introduction to modern information retrieval. McGraw-Hill, New YorkMATH Salton G, McGill MJ (1983) Introduction to modern information retrieval. McGraw-Hill, New YorkMATH
Zurück zum Zitat Sørensen T (1948) A method of establishing groups of equal amplitude in plant sociology based on similarity of species content and its application to analyses of the vegetation on danish commons. Biologiske Skrifter / udg. af det Kgl. Danske Videnskabernes Selskab, pp 1–34 Sørensen T (1948) A method of establishing groups of equal amplitude in plant sociology based on similarity of species content and its application to analyses of the vegetation on danish commons. Biologiske Skrifter / udg. af det Kgl. Danske Videnskabernes Selskab, pp 1–34
Zurück zum Zitat Wang D, Sutcliffe A, Zeng X-J (2011) A trust-based multi-ego social network model to investigate emotion diffusion. Soc Netw Anal Min 1:287–299. doi:10.1007/s13278-011-0019-7 Wang D, Sutcliffe A, Zeng X-J (2011) A trust-based multi-ego social network model to investigate emotion diffusion. Soc Netw Anal Min 1:287–299. doi:10.​1007/​s13278-011-0019-7
Zurück zum Zitat Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, CambridgeCrossRef Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, CambridgeCrossRef
Zurück zum Zitat Wilson T, Wiebe J, Hoffmann P (2005) Recognizing contextual polarity in phrase-level sentiment analysis. In: Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, HLT ’05. Association for Computational Linguistics, Stroudsburg, pp 347–354 Wilson T, Wiebe J, Hoffmann P (2005) Recognizing contextual polarity in phrase-level sentiment analysis. In: Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, HLT ’05. Association for Computational Linguistics, Stroudsburg, pp 347–354
Zurück zum Zitat Witkowski M, Artikis E, Pitt J (2001) Experiments in building experiential trust in a society of objective-trust based agents. In: Trust in cyber-societies, vol LNAI 2246. Springer, Berlin, pp 111–132 Witkowski M, Artikis E, Pitt J (2001) Experiments in building experiential trust in a society of objective-trust based agents. In: Trust in cyber-societies, vol LNAI 2246. Springer, Berlin, pp 111–132
Zurück zum Zitat Wu L, Lin C, Aral S, Brynjolfsson E (2009) Value of social network—a large-scale analysis on network structure impact to financial revenue of information technology consultants. In: The winter conference on business intelligence Wu L, Lin C, Aral S, Brynjolfsson E (2009) Value of social network—a large-scale analysis on network structure impact to financial revenue of information technology consultants. In: The winter conference on business intelligence
Zurück zum Zitat Yang J, Wen Z, Adamic LA, Ackerma MS, Li C-Y (2011) Collaborating globally: culture and organizational computer-mediated communications. In: Proceedings of the international conference on information systems (ICIS), Shanghai, China Yang J, Wen Z, Adamic LA, Ackerma MS, Li C-Y (2011) Collaborating globally: culture and organizational computer-mediated communications. In: Proceedings of the international conference on information systems (ICIS), Shanghai, China
Zurück zum Zitat Yu B, Singh MP (2002) An evidential model of distributed reputation management. In: Proceedings of first international joint conference on autonomous agents and multiagent systems. ACM Press, New York, pp 294–301 Yu B, Singh MP (2002) An evidential model of distributed reputation management. In: Proceedings of first international joint conference on autonomous agents and multiagent systems. ACM Press, New York, pp 294–301
Zurück zum Zitat Zhou T, Lü L, Zhang Y-C (2009) Predicting missing links via local information. Eur Phys J B Condens Matter Complex Syst 71(4):623–630CrossRefMATH Zhou T, Lü L, Zhang Y-C (2009) Predicting missing links via local information. Eur Phys J B Condens Matter Complex Syst 71(4):623–630CrossRefMATH
Zurück zum Zitat Ziegler C-N, Lausen G (2004) Spreading activation models for trust propagation. In: 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE ’04, pp 83–97 Ziegler C-N, Lausen G (2004) Spreading activation models for trust propagation. In: 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE ’04, pp 83–97
Metadaten
Titel
Robust features of trust in social networks
verfasst von
Zoheb Hassan Borbora
Muhammad Aurangzeb Ahmad
Jehwan Oh
Karen Zita Haigh
Jaideep Srivastava
Zhen Wen
Publikationsdatum
01.12.2013
Verlag
Springer Vienna
Erschienen in
Social Network Analysis and Mining / Ausgabe 4/2013
Print ISSN: 1869-5450
Elektronische ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-013-0136-6

Weitere Artikel der Ausgabe 4/2013

Social Network Analysis and Mining 4/2013 Zur Ausgabe

Premium Partner