skip to main content
article

Inferring binary trust relationships in Web-based social networks

Published:01 November 2006Publication History
Skip Abstract Section

Abstract

The growth of Web-based social networking and the properties of those networks have created great potential for producing intelligent software that integrates a user's social network and preferences. Our research looks particularly at assigning trust in Web-based social networks and investigates how trust information can be mined and integrated into applications. This article introduces a definition of trust suitable for use in Web-based social networks with a discussion of the properties that will influence its use in computation. We then present two algorithms for inferring trust relationships between individuals that are not directly connected in the network. Both algorithms are shown theoretically and through simulation to produce calculated trust values that are highly accurate.. We then present TrustMail, a prototype email client that uses variations on these algorithms to score email messages in the user's inbox based on the user's participation and ratings in a trust network.

References

  1. Abdul-Rahman, A. and Hailes, S. 2000. Supporting trust in virtual communities. In Proceedings of the 33rd Hawaii International Conference on System Sciences. Maui, HW.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Avesani, P., Massa, P., and Tiella, R. 2004. Moleskiing: a Trust-aware decentralized recommender system. In Proceedings of the 1st Workshop on Friend of a Friend, Social Networking and the (Semantic) Web. Galway, Ireland.]]Google ScholarGoogle Scholar
  3. Badrul, S., Karypis, G., Konstan, J., and Riedl, J. 2001. Item-based collaborative filtering recommendation algorithms. The Proceedings of WWW Conference (May), Hong Kong.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. looseness-1Barber, K. S. and Kim, J. 2000. Belief revision process based on trust: Agents evaluating reputation of information sources. Lecture Notes In Computer Science; vol. 2246, 73--82.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Beth, T., Borcherding, M., and Klein, B. 1994. Valuation of trust in open networks. In Proceedings of ESORICS 94 (Nov.) Brighton, UK.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bloom, B. 1970. Space/time trade-offs in hash coding with allowable errors. Comm. ACM 13, 7, 422--426.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Boykin, P. O. and Roychowdhury, V. 2004. Personal email networks: an effective anti-spam tool. http://www.arxiv.org/abs/cond-mat/0402143.]]Google ScholarGoogle Scholar
  8. Castelfranchi, C. and Falcone, R. 1998. Principles of trust for MAS: Cognitive anatomy, social importance, and quantification. In Proceedings of the 3rd International Conference on Multi Agent Systems.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Castelfranchi, C. and Falcone, R. 2002. Social trust: A cognitive approach. In Trust and Deception in Virtual Societies. C. Casteleranchi and Y.-H. Tan, Eds. Kluwer Academic Publishers, Dordrecht, Holland.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Cook, K. Ed.. 2001. Trust in Society, Russell Sage Foundation, New York, NY.]]Google ScholarGoogle Scholar
  11. Croucher, T. 2004. A model of trust and anonymity in a content rating system for e-learning systems. In Proceedings of 1st Workshop on Friend of a Friend, Social Networking and the (Semantic) Web. Galway, Ireland.]]Google ScholarGoogle Scholar
  12. Davis, G., Yoo, M., and Baker, W. 2003. The small world of the american corporate elite. Strategic Organization 1, 3, 301--326.]]Google ScholarGoogle ScholarCross RefCross Ref
  13. Deutsch, M. 1962. Cooperation and trust. Some theoretical notes. In Nebraska Symposium on Motivation Jones, M. R. Jones Ed. Nebraska University Press.]]Google ScholarGoogle Scholar
  14. Dudek, C. 2003. Visual appeal and the formation of trust in e-commerce Web sites. Masters Thesis, Carleton University, Ottawa, Canada.]]Google ScholarGoogle Scholar
  15. Foster, C. C., Rapoport, A., and Orwant, C. J. 1963. A study of a large cociogram: Elimination of free parameters. Behav. Science 8, 56--65.]]Google ScholarGoogle ScholarCross RefCross Ref
  16. Gil, Y. and Ratnakar, V. 2002. Trusting information sources one citizen at a time. In Proceedings of the 1st International Semantic Web Conference (ISWC). Sardinia, Italy.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Golbeck, J., Parsia, B., and Hendler, J. 2003. Trust networks on the semantic Web. In Proceedings of Cooperative Information Agents. Helsinki, Finland.]]Google ScholarGoogle Scholar
  18. Golbeck, J. and Hendler, J. 2004. Reputation network analysis for email filtering. In Proceedings of the 1st Conference on Email and Anti-Spam. Mountain View, CA.]]Google ScholarGoogle Scholar
  19. Golbeck, J. and Hendler, J. 2004. Accuracy of metrics for inferring trust and reputation. In Proceedings of 14th International Conference on Knowledge Engineering and Knowledge Management. Northamptonshire, UK.]]Google ScholarGoogle Scholar
  20. Golbeck, J. and Hendler, J. 2006. FilmTrust: Movie recommendations using trust in Web-based social networks. In Proceedings of the IEEE Consumer Communications and Networking Conference. Las Vegas, NV.]]Google ScholarGoogle Scholar
  21. Golembiewski, R. T. and McConkie, M. 1975. The centrality of interpersonal trust in group processes. In Theories of Group Processes, C. Cooper, Ed. Wiley, Hoboken, NJ.]]Google ScholarGoogle Scholar
  22. Hardin, R. 2002. Trust & Trustworthiness. Russell Sage Foundation. New York, NY.]]Google ScholarGoogle Scholar
  23. Herlocker, J. L., Konstan, J. A., Terveen, L. G., and T. Riedl, J. 2004. Evaluating collaborative filtering recommender systems. ACM Trans. Inform. Syst. 22, 1, 5--53.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Jonker, C. and Treur, J. 1999. Formal analysis of models for the dynamics of trust based on experiences. In Multi-Agent System Engineering, Proceedings of the 9th European Workshop on Modeling Autonomous Agents in a Multi-Agent World.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Josang, A. 1996. The right type of trust for distributed systems. In Proceedings of the 1996 New Security Paradigms Workshop.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. 2003. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International World Wide Web Conference. Budapest, Hungary.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Levin, R. and Aiken, A. 1998. Attack resistant trust metrics for public key certification. In 7th USENIX Security Symposium. San Antonio, TX.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Maes, P. and Kozierok, R. 1994. Agents that reduce work and information overload. Comm. ACM. 37, 7, 30-40.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Marsh, S. 1994. Formalising trust as a computational concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling.]]Google ScholarGoogle Scholar
  30. Massa, P. and Avesani, P. 2004. Trust-aware collaborative filtering for recommender systems. In Proceedings of the International Conference on Cooperative Information Systems (CoopIS).]]Google ScholarGoogle Scholar
  31. Maurer, U. 1996. Modeling a public-key infrastructure.Proceedings of Computer Security (ESORICS '96).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Newman, M. E. J. 2001. The structure of scientific collaboration networks. In Proceedings of the National Academy of Sciences, (Jan.) 98, 404--409.]]Google ScholarGoogle ScholarCross RefCross Ref
  33. Page, L., Brin, S., Motwani, R., and Winograd, T. 1998. The PageRank citation ranking: Bringing order to the Web. Tech. Rep. Stanford University, Stanford, CA.]]Google ScholarGoogle Scholar
  34. Richardson, M., Agrawal, R., and Domingos, P. 2003. Trust management for the semantic Web, Proceedings of the 2nd International Semantic Web Conference. Sanibel Island, FL.]]Google ScholarGoogle Scholar
  35. Sinha, R. and Swearingen, K. 2001. Comparing recommendations made by online systems and friends. In Proceedings of the DELOS-NSF Workshop on Personalization and Recommender Systems in Digital Libraries. Dublin, Ireland.]]Google ScholarGoogle Scholar
  36. Swearingen, K. and Sinha, R. 2001. Beyond algorithms: An HCI perspective on recommender systems. In Proceedings of the ACM SIGIR 2001 Workshop on Recommender Systems. New Orleans, LA.]]Google ScholarGoogle Scholar
  37. Sztompka, P. 1999. Trust: A Sociological Theory. Cambridge University Press, Cambridge, UK.]]Google ScholarGoogle Scholar
  38. Watts, D. 1999, Small Worlds: The Dynamics of Networks Between Rrder and Rrandomness. Princeton University Press, Princeton, NJ.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Watts, D. and Strogatz, S. H. 1998. Collective dynamics of small-world networks. Nature, 393, 440--442.]]Google ScholarGoogle ScholarCross RefCross Ref
  40. Yaniv, I., and Kleinberger, E. 2000. Advice taking in decision making: Egocentric discounting and reputation formation. Organizat. Behav. Human Decision Process. 83, 2, 260--281.]]Google ScholarGoogle ScholarCross RefCross Ref
  41. Ziegler, C. N. and Lausen, G. 2004a. Spreading activation models for trust propagation. Proceedings of the IEEE International Conference on E-Technology, E-Commerce, and E-Service, Taipei, Taiwan.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Ziegler, C.-N. and Lausen, G. 2004b. Analyzing correlation between trust and user similarity in online communities. Proceedings of 2nd International Conference on Trust Management.]]Google ScholarGoogle Scholar

Index Terms

  1. Inferring binary trust relationships in Web-based social networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 6, Issue 4
        November 2006
        197 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/1183463
        Issue’s Table of Contents

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 November 2006
        Published in toit Volume 6, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader