Uncovering the Mystery of Trust in An Online Social Network

被引:0
作者
Liu, Guangchi [1 ]
Yang, Qing [1 ]
Wang, Honggang [2 ]
Wu, Shaoen [3 ]
Wittie, Mike P. [1 ]
机构
[1] Montana State Univ, Dept Comp Sci, Bozeman, MT 59717 USA
[2] Univ Massachusetts Dartmouth, Dept Elect & Comp Engn, N Dartmouth, MA USA
[3] Ball State Univ, Dept Comp Sci, Muncie, IN 47306 USA
来源
2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2015年
关键词
Online Social Networks; Computational Trust; Three Valued Subjective Logic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trust is a hidden fabric of online social networks (OSNs) that enables online interactions, e.g., online transactions on Ebay. The fundamental properties of trust in OSNs, however, have not been adequately studied yet. In this work, we advance the understanding of trust in OSNs by analyzing the Advogato dataset [1]. We study the properties of direct trust, indirect trust, and trust community detection in Advogato. We found that 1) the trust between users are asymmetric, 2) high degree users are usually associated with high trust, 3) diversity in people's opinions on the same person will affect indirect trust inference, 4) users live in many separate "small small worlds" from the perspective of trust and it is difficult to identify these "small small worlds" with existing random walk-based community detection algorithms, e.g., ACL [2]. It in fact motivates the need for a new community detection algorithm to identify clusters of user connected by trustful relations. Although our findings are from a specific OSN, they can significantly impact how OSNs are designed and configured in the future, e.g., a better user crowdsourcing setting based on trust information.
引用
收藏
页码:488 / 496
页数:9
相关论文
共 30 条
[21]  
Powers D., 2008, STAT METHODS CATEGOR
[22]  
Ramsey F.Schafer., 2012, STAT SLEUTH COURSE M, V3
[23]   Not so different after all: A cross-discipline view of trust [J].
Rousseau, DM ;
Sitkin, SB ;
Burt, RS ;
Camerer, C .
ACADEMY OF MANAGEMENT REVIEW, 1998, 23 (03) :393-404
[24]   UNIK: Unsupervised Social Network Spam Detection [J].
Tan, Enhua ;
Guo, Lei ;
Chen, Songqing ;
Zhang, Xiaodong ;
Zhao, Yihong .
PROCEEDINGS OF THE 22ND ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM'13), 2013, :479-488
[25]  
Wang YH, 2007, 20TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P1551
[26]  
Wei W, 2012, IEEE INFOCOM SER, P1951, DOI 10.1109/INFCOM.2012.6195572
[27]   Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers [J].
Yang, Chao ;
Harkreader, Robert ;
Gu, Guofei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) :1280-1293
[28]  
Yao Y., P 22 INT C WORLD WID, P1467, DOI [10.1145/2488388.2488516, DOI 10.1145/2488388.2488516]
[29]  
Zhang JX, 2013, IEEE CONF COMM NETW, P46, DOI 10.1109/CNS.2013.6682691
[30]   A Belief Propagation Approach for Detecting Shilling Attacks in Collaborative Filtering [J].
Zou, Jun ;
Fekri, Faramarz .
PROCEEDINGS OF THE 22ND ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM'13), 2013, :1837-1840