Skip to main content

2016 | OriginalPaper | Buchkapitel

To Trust or Not to Trust Lurkers?: Evaluation of Lurking and Trustworthiness in Ranking Problems

verfasst von : Roberto Interdonato, Andrea Tagarelli

Erschienen in: Advances in Network Science

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Research on social trust analysis has traditionally focused on the trustworthy/untrustworthy behaviors that are exhibited by active users. By contrast, due to their inherent reticence to regularly contribute to the online community life, the silent users in a social network, a.k.a. lurkers, have been taken out of consideration so far. Nevertheless, analysis and mining of lurkers in social networks has been recently recognized as an important problem. Determining trust/distrust relationships that involve lurkers can provide a unique opportunity to understand whether and to what extent such users can be trusted or distrusted from the other users. This is important from both the perspective of protecting the active users from untrustworthy or undesired interactions, and the perspective of encouraging lurkers to more actively participate in the community life through the guidance of active users. In this paper we aim at understanding and quantifying relations between lurkers and trustworthy/untrustworthy users in ranking problems. We evaluate lurker ranking methods against classic approaches to trust/distrust ranking, in scenarios of who-trusts-whom networks and followship networks. Results obtained on Advogato, Epinions, Flickr and FriendFeed networks indicate that lurkers should not be a-priori flagged as untrustworthy users, and that trustworthy users can indeed be found among lurkers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Adali, S.: Modeling Trust Context in Networks. Springer Briefs in Computer Science. Springer, New York (2013)CrossRef Adali, S.: Modeling Trust Context in Networks. Springer Briefs in Computer Science. Springer, New York (2013)CrossRef
2.
Zurück zum Zitat Adali, S., Escriva, R., Goldberg, M.K., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B.K., Wallace, W.A., Williams, G.T.: Measuring behavioral trust in social networks. In: Proceedings of IEEE International Conference on Intelligence and Security Informatics, pp. 150–152 (2010) Adali, S., Escriva, R., Goldberg, M.K., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B.K., Wallace, W.A., Williams, G.T.: Measuring behavioral trust in social networks. In: Proceedings of IEEE International Conference on Intelligence and Security Informatics, pp. 150–152 (2010)
3.
Zurück zum Zitat Buckley, C., Voorhees, E.M.: Retrieval evaluation with incomplete information. In: Proceedings of ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pp. 25–32 (2004) Buckley, C., Voorhees, E.M.: Retrieval evaluation with incomplete information. In: Proceedings of ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pp. 25–32 (2004)
4.
Zurück zum Zitat Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: Proceedings of ACM Conference on World Wide Web (WWW), pp. 675–684 (2011) Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: Proceedings of ACM Conference on World Wide Web (WWW), pp. 675–684 (2011)
5.
Zurück zum Zitat Celli, F., Di Lascio, F.M.L., Magnani, M., Pacelli, B., Rossi, L.: Social network data and practices: the case of friendfeed. In: Chai, S.-K., Salerno, J.J., Mabry, P.L. (eds.) SBP 2010. LNCS, vol. 6007, pp. 346–353. Springer, Heidelberg (2010) CrossRef Celli, F., Di Lascio, F.M.L., Magnani, M., Pacelli, B., Rossi, L.: Social network data and practices: the case of friendfeed. In: Chai, S.-K., Salerno, J.J., Mabry, P.L. (eds.) SBP 2010. LNCS, vol. 6007, pp. 346–353. Springer, Heidelberg (2010) CrossRef
6.
Zurück zum Zitat Edelmann, N.: Reviewing the definitions of “lurkers” and some implications for online research. Cyberpsychology Behav. Soc. Network. 16(9), 645–649 (2013)CrossRef Edelmann, N.: Reviewing the definitions of “lurkers” and some implications for online research. Cyberpsychology Behav. Soc. Network. 16(9), 645–649 (2013)CrossRef
7.
Zurück zum Zitat Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, P.K.: Understanding and combating link farming in the Twitter social network. In: Proceedings of ACM Conference on World Wide Web (WWW), pp. 61–70 (2012) Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, P.K.: Understanding and combating link farming in the Twitter social network. In: Proceedings of ACM Conference on World Wide Web (WWW), pp. 61–70 (2012)
8.
Zurück zum Zitat Golbeck, J.: Computing and Applying Trust in Web-based Social Networks. Ph.D. thesis, College Park, MD, USA (2005) Golbeck, J.: Computing and Applying Trust in Web-based Social Networks. Ph.D. thesis, College Park, MD, USA (2005)
9.
Zurück zum Zitat Graham, F.C., Tsiatas, A., Xu, W.: Dirichlet pagerank and ranking algorithms based on trust and distrust. Internet Math. 9(1), 113–134 (2013)MathSciNetCrossRef Graham, F.C., Tsiatas, A., Xu, W.: Dirichlet pagerank and ranking algorithms based on trust and distrust. Internet Math. 9(1), 113–134 (2013)MathSciNetCrossRef
10.
Zurück zum Zitat Guha, R.V., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of ACM Conference on World Wide Web (WWW), pp. 403–412 (2004) Guha, R.V., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of ACM Conference on World Wide Web (WWW), pp. 403–412 (2004)
11.
Zurück zum Zitat Gyöngyi, Z., Garcia-Molina, H., Pedersen, J.O.: Combating web spam with trustrank. In: Proceedings of International Conference on Very Large Data Bases (VLDB), pp. 576–587 (2004) Gyöngyi, Z., Garcia-Molina, H., Pedersen, J.O.: Combating web spam with trustrank. In: Proceedings of International Conference on Very Large Data Bases (VLDB), pp. 576–587 (2004)
12.
Zurück zum Zitat Hamdi, S., Bouzeghoub, A., Gançarski, A.L., Yahia, S.B.: Trust inference computation for online social networks. In: Proceedings of International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 210–217 (2013) Hamdi, S., Bouzeghoub, A., Gançarski, A.L., Yahia, S.B.: Trust inference computation for online social networks. In: Proceedings of International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 210–217 (2013)
13.
Zurück zum Zitat Jiang, W., Wang, G., Wu, J.: Generating trusted graphs for trust evaluation in online social networks. Future Gener. Comp. Syst. 31, 48–58 (2014)CrossRef Jiang, W., Wang, G., Wu, J.: Generating trusted graphs for trust evaluation in online social networks. Future Gener. Comp. Syst. 31, 48–58 (2014)CrossRef
14.
Zurück zum Zitat de Kerchove, C., Dooren, P.V.: The pagetrust algorithm: how to rank web pages when negative links are allowed? In: Proceedings of SIAM International Conference on Data Mining (SDM), pp. 346–352 (2008) de Kerchove, C., Dooren, P.V.: The pagetrust algorithm: how to rank web pages when negative links are allowed? In: Proceedings of SIAM International Conference on Data Mining (SDM), pp. 346–352 (2008)
15.
Zurück zum Zitat Krishnan, V., Raj, R.: Web spam detection with anti-trust rank. In: Proceedings of International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), pp. 37–40 (2006) Krishnan, V., Raj, R.: Web spam detection with anti-trust rank. In: Proceedings of International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), pp. 37–40 (2006)
16.
Zurück zum Zitat Leskovec, J., Huttenlocher, D.P., Kleinberg, J.M.: Predicting positive and negative links in online social networks. In: Proceedings of ACM Conference on World Wide Web (WWW), pp. 641–650 (2010) Leskovec, J., Huttenlocher, D.P., Kleinberg, J.M.: Predicting positive and negative links in online social networks. In: Proceedings of ACM Conference on World Wide Web (WWW), pp. 641–650 (2010)
17.
Zurück zum Zitat Liu, H., Lim, E., Lauw, H.W., Le, M., Sun, A., Srivastava, J., Kim, Y.A.: Predicting trusts among users of online communities: an epinions case study. In: Proceedings of ACM Conference on Electronic Commerce (EC), pp. 310–319 (2008) Liu, H., Lim, E., Lauw, H.W., Le, M., Sun, A., Srivastava, J., Kim, Y.A.: Predicting trusts among users of online communities: an epinions case study. In: Proceedings of ACM Conference on Electronic Commerce (EC), pp. 310–319 (2008)
18.
Zurück zum Zitat Massa, P., Avesani, P.: Controversial users demand local trust metrics: an experimental study on epinions.com community. In: Proceedings of AAAI Conference on Artificial Intelligence (AAAI), pp. 121–126 (2005) Massa, P., Avesani, P.: Controversial users demand local trust metrics: an experimental study on epinions.com community. In: Proceedings of AAAI Conference on Artificial Intelligence (AAAI), pp. 121–126 (2005)
19.
Zurück zum Zitat Massa, P., Avesani, P.: Trust-aware bootstrapping of recommender systems. In: Proceedings of ECAI Workshop on Recommender Systems, pp. 29–33 (2006) Massa, P., Avesani, P.: Trust-aware bootstrapping of recommender systems. In: Proceedings of ECAI Workshop on Recommender Systems, pp. 29–33 (2006)
20.
Zurück zum Zitat Mislove, A., Koppula, H.S., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Growth of the flickr social network. In: Proceedings of the 1st ACM SIGCOMM Workshop on Social Networks (WOSN 2008) (2008) Mislove, A., Koppula, H.S., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Growth of the flickr social network. In: Proceedings of the 1st ACM SIGCOMM Workshop on Social Networks (WOSN 2008) (2008)
21.
Zurück zum Zitat Nonnecke, B., Preece, J.J.: Lurker demographics: counting the silent. In: Proceedings of ACM Conference on Human Factors in Computing Systems (CHI), pp. 73–80 (2000) Nonnecke, B., Preece, J.J.: Lurker demographics: counting the silent. In: Proceedings of ACM Conference on Human Factors in Computing Systems (CHI), pp. 73–80 (2000)
22.
Zurück zum Zitat Ortega, F.J., Troyano, J.A., Cruz, F.L., Vallejo, C.G., Enríquez, F.: Propagation of trust and distrust for the detection of trolls in a social network. Comput. Netw. 56(12), 2884–2895 (2012)CrossRef Ortega, F.J., Troyano, J.A., Cruz, F.L., Vallejo, C.G., Enríquez, F.: Propagation of trust and distrust for the detection of trolls in a social network. Comput. Netw. 56(12), 2884–2895 (2012)CrossRef
23.
Zurück zum Zitat Preece, J.J., Nonnecke, B., Andrews, D.: The top five reasons for lurking: improving community experiences for everyone. Comput. Hum. Behav. 20(2), 201–223 (2004)CrossRef Preece, J.J., Nonnecke, B., Andrews, D.: The top five reasons for lurking: improving community experiences for everyone. Comput. Hum. Behav. 20(2), 201–223 (2004)CrossRef
24.
Zurück zum Zitat Sun, N., Rau, P.P.L., Ma, L.: Understanding lurkers in online communities: a literature review. Comput. Hum. Behav. 38, 110–117 (2014)CrossRef Sun, N., Rau, P.P.L., Ma, L.: Understanding lurkers in online communities: a literature review. Comput. Hum. Behav. 38, 110–117 (2014)CrossRef
25.
Zurück zum Zitat Tagarelli, A., Interdonato, R.: “Who’s out there?”: identifying and ranking lurkers in social networks. In: Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 215–222 (2013) Tagarelli, A., Interdonato, R.: “Who’s out there?”: identifying and ranking lurkers in social networks. In: Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 215–222 (2013)
26.
Zurück zum Zitat Tagarelli, A., Interdonato, R.: Lurking in social networks: topology-based analysis and ranking methods. Soc. Netw. Anal. Min. 4(230), 27 (2014) Tagarelli, A., Interdonato, R.: Lurking in social networks: topology-based analysis and ranking methods. Soc. Netw. Anal. Min. 4(230), 27 (2014)
27.
Zurück zum Zitat Tagarelli, A., Interdonato, R.: Time-aware analysis and ranking of lurkers in social networks. Soc. Netw. Anal. Min. 5(1), 23 (2015)CrossRef Tagarelli, A., Interdonato, R.: Time-aware analysis and ranking of lurkers in social networks. Soc. Netw. Anal. Min. 5(1), 23 (2015)CrossRef
28.
Zurück zum Zitat Walter, F.E., Battiston, S., Schweitzer, F.: Personalised and dynamic trust in social networks. In: Proceedings of ACM Conference on Recommender Systems (RecSys), pp. 197–204 (2009) Walter, F.E., Battiston, S., Schweitzer, F.: Personalised and dynamic trust in social networks. In: Proceedings of ACM Conference on Recommender Systems (RecSys), pp. 197–204 (2009)
Metadaten
Titel
To Trust or Not to Trust Lurkers?: Evaluation of Lurking and Trustworthiness in Ranking Problems
verfasst von
Roberto Interdonato
Andrea Tagarelli
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-28361-6_4