User Reputation computation Method Based on Implicit Ratings on Social Media

被引:9
作者
Bok, Kyoungsoo [1 ]
Yun, Jinkyung [2 ]
Kim, Yeonwoo [1 ]
Lim, Jongtae [1 ]
Yoo, Jaesoo [1 ]
机构
[1] Chungbuk Natl Univ, Sch Informat & Commun Engn, 1 Chungdaero, Cheongju 28644, South Korea
[2] Exem Inc, Bigdata Team, A-1208,583 Yangcheon Ro, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Social media; user reputation computation; social media activity analysis; trust; NETWORK; TRUST;
D O I
10.3837/tiis.2017.03.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social network services have recently changed from environments for simply building connections among users to open platforms for generating and sharing various forms of information. Existing user reputation computation methods are inadequate for determining the trust in users on social media where explicit ratings are rare, because they determine the trust in users based on user profile, explicit relations, and explicit ratings. To solve this limitation of previous research, we propose a user reputation computation method suitable for the social media environment by incorporating implicit as well as explicit ratings. Reliable user reputation is estimated by identifying malicious information raters, modifying explicit ratings, and applying them to user reputation scores. The proposed method incorporates implicit ratings into user reputation estimation by differentiating positive and negative implicit ratings. Moreover, the method generates user reputation scores for individual categories to determine a given user's expertise, and incorporates the number of users who participated in rating to determine a given user's influence. This allows reputation scores to be generated also for users who have received no explicit ratings, and, thereby, is more suitable for social media. In addition, based on the user reputation scores, malicious information providers can be identified.
引用
收藏
页码:1570 / 1594
页数:25
相关论文
共 26 条
[1]   Malicious and Spam Posts in Online Social Networks [J].
Abu-Nimeh, Saeed ;
Chen, Thomas M. ;
Alzubi, Omar .
COMPUTER, 2011, 44 (09) :23-28
[2]  
[Anonymous], REGIONAL STUDIES
[3]  
Asur S., 2010, Proceedings 2010 IEEE/ACM International Conference on Web Intelligence-Intelligent Agent Technology (WI-IAT), P492, DOI 10.1109/WI-IAT.2010.63
[4]   A Social Search Scheme Considering User Preferences and Popularities in Mobile Environments [J].
Bok, Kyoungsoo ;
Lim, Jongtae ;
Ahn, Minje ;
Yoo, Jaesoo .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (02) :744-768
[5]   Social Network Sites: Definition, History, and Scholarship [J].
Boyd, Danah M. ;
Ellison, Nicole B. .
JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2007, 13 (01) :210-230
[6]  
Burke M, 2010, CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P1909
[7]   Social network, social trust and shared goals in organizational knowledge sharing [J].
Chow, Wing S. ;
Chan, Lai Sheung .
INFORMATION & MANAGEMENT, 2008, 45 (07) :458-465
[8]   A Trust-Aware System for Personalized User Recommendations in Social Networks [J].
Eirinaki, Magdalini ;
Louta, Malamati D. ;
Varlamis, Iraklis .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2014, 44 (04) :409-421
[9]   Cultivating Social Resources on Social Network Sites: Facebook Relationship Maintenance Behaviors and Their Role in Social Capital Processes [J].
Ellison, Nicole B. ;
Vitak, Jessica ;
Gray, Rebecca ;
Lampe, Cliff .
JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2014, 19 (04) :855-870
[10]   Co-evolution of behaviour and social network structure promotes human cooperation [J].
Fehl, Katrin ;
van der Post, Daniel J. ;
Semmann, Dirk .
ECOLOGY LETTERS, 2011, 14 (06) :546-551