Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A survey of trust in social networks

Published: 30 August 2013 Publication History

Abstract

Web-based social networks have become popular as a medium for disseminating information and connecting like-minded people. The public accessibility of such networks with the ability to share opinions, thoughts, information, and experience offers great promise to enterprises and governments. In addition to individuals using such networks to connect to their friends and families, governments and enterprises have started exploiting these platforms for delivering their services to citizens and customers. However, the success of such attempts relies on the level of trust that members have with each other as well as with the service provider. Therefore, trust becomes an essential and important element of a successful social network. In this article, we present the first comprehensive review of social and computer science literature on trust in social networks. We first review the existing definitions of trust and define social trust in the context of social networks. We then discuss recent works addressing three aspects of social trust: trust information collection, trust evaluation, and trust dissemination. Finally, we compare and contrast the literature and identify areas for further research in social trust.

References

[1]
Abdul-Rahman, A. and Hailes, S. 2000. Supporting trust in virtual communities. In Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS'00). IEEE Computer Society, 1--9.
[2]
Adali, S., Escriva, R., Goldberg, M. K., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B. K., Wallace, W. A., and Williams, G. 2010. Measuring behavioral trust in social networks. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI'10). 150--152.
[3]
Alesina, A. and La Ferrara, E. 2002. Who trusts others? J. Public Econ. 85, 1, 207--234.
[4]
Andersen, R., Borgs, C., Chayes, J., Feige, U., Flaxman, A., Kalai, A., Mirrokni, V., and Tennenholtz, M. 2008. Trust-based recommendation systems: An axiomatic approach. In Proceeding of the 17th International Conference on World Wide Web (WWW'08). ACM Press, New York, 199--208.
[5]
Artz, D. and Gil, Y. 2007. A survey of trust in computer science and the semantic web. Web Semantics 5, 2, 58--71.
[6]
Azer, M. A., El-Kassas, S. M., Hassan, A. W. F., and El-Soudani, M. S. 2008. A survey on trust and reputation schemes in ad hoc networks. In Proceedings of the 3rd International Conference on Availability, Reliability and Security. IEEE Computer Society, Los Alamitos, CA, 881--886.
[7]
Barnes, J. A. 1954. Class and committees in a norwegian island parish. Hum. Relat. 7, 1, 39--54.
[8]
Beatty, P., Reay, I., Dick, S., and Miller, J. 2011. Consumer trust in e-commerce web sites: A metastudy. ACM Comput. Surv. 43, 3, 1--46.
[9]
Bimrah, K. K., Mouratidis, H., and Preston, D. 2008. Modelling trust requirements by means of a visualization language. In Proceedings of the Conference on Requirements Engineering Visualization (REV'08). IEEE Computer Society, Los Alamitos, CA, 26--30.
[10]
Boltzmann, L. 1964. Lectures on Gas Theory. Translated by Stephen G. Brush. University of California Press, Berkeley.
[11]
Brunie, A. 2009. Meaningful distinctions within a concept: Relational, collective, and generalized social capital. Social Sci. Res. 38, 2, 251--265.
[12]
Buskens, V. 1998. The social structure of trust. Social Netw. 20, 3, 265--289.
[13]
Castelfranchi, C., Conte, R., and Paolucci, M. 1998. Normative reputation and the costs of compliance. J. Artif. Soc. Social Simul. 1, 3.
[14]
Caverlee, J., Liu, L., and Webb, S. 2008. Socialtrust: Tamper-resilient trust establishment in online communities. In Proceedings of the 8th ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL'08). ACM Press, New York, 104--114.
[15]
Challener, D., Yoder, K., Catherman, R., Safford, D., and Van Doorn, L. 2007. A Practical Guide to Trusted Computing. 1st Ed. IBM Press.
[16]
Chang, E., Dillon, T. S., and Hussain, F. 2006. Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence. Wiley Periodicals.
[17]
Chen, H.-C. and Chen, A. L. P. 2001. A music recommendation system based on music data grouping and user interests. In Proceedings of the 10th International Conference on Information and Knowledge Management (CIKM'01). ACM Press, New York, 231--238.
[18]
Chen, L. and Li, J. 2010. Revocation of direct anonymous attestation. In Proceedings of the 2nd International Conference on Trusted Systems (INTRUST'10). 128--147.
[19]
Christianson, B. and Harbison, W. 1996. Why isn't trust transitive? In Proceedings of the Security Protocols Workshop. 171--176.
[20]
Claridge, T. 2004. Social capital and natural resource management. M.S. thesis, Australia. http://www. socialcapitalresearch.com/literature/nrm.html.
[21]
Coleman, J. S. 1988. Social capital in the creation of human capital. Amer. J. Sociology 94, 1, 95--120.
[22]
Coleman, J. S. 1990. Foundations of Social Theory. Belknap Press, Cambridge, MA.
[23]
Cook, K. S., Yamagishi, T., Cheshire, C., Cooper, R., Matsuda, M., and Mashima, R. 2005. Trust building via risk taking: A cross-societal experiment. Social Psychol. Quart. 2, 68, 121--142.
[24]
Coulter, K. S. and Coulter, R. A. 2002. Determinants of trust in a service provider: The moderating role of length of relationship. J. Service. Market. 16, 1, 35--50.
[25]
Dohmen, T., Falk, A., Huffman, D., and Sunde, U. 2006. The intergenerational transmission of risk and trust attitudes. IZA working paper. http://www.cens.uni-bonn.de/team/board/armin-falk/the-intergenerational-transmission-of-risk-and-trust-attitudes-review-of-economic-studies-2012-792-645-677-with-thomas-dohmen-david-huffman-and-uwe-sunde‥pdf.
[26]
Dumouchel, P. 2005. Trust as an action. Euro. J. Sociol. 46, 417--428.
[27]
Dwyer, C., Hiltz, S. R., and Passerini, K. 2007. Trust and privacy concern within social networking sites: A comparison of facebook and myspace. In Proceedings of the 13th Americas Conference on Information Systems.
[28]
Elsalamouny, E., Sassone, V., and Nielsen, M. 2010. HMM-based trust model. In Proceedings of the 6th International Workshop on Formal Aspects on Security and Trust (FAST'09). Lecture Notes in Computer Science, vol. 5983, Springer, 21--35.
[29]
Fukuyama, F. 1995. Trust: The Social Virtues and the Creation of Prosperity. Free Press, New York.
[30]
Gilbert, E. and Karahalios, K. 2009. Predicting tie strength with social media. In Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI'09). ACM Press, New York, NY, 211--220.
[31]
Golbeck, J. 2005a. Personalizing applications through integration of inferred trust values in semantic web-based social networks. In Proceedings of the Semantic Network Analysis Workshop at the 4th International Semantic Web Conference.
[32]
Golbeck, J. 2006a. Combining provenance with trust in social networks for semantic web content filtering. In Proceedings of the International Conference on Provenance and Annotation of Data (IPAW'06). L. Moreau and I. Foster, Eds., Lecture Notes in Computer Science Series, vol. 4145, Springer, 101--108.
[33]
Golbeck, J. 2006b. Trust on the world wide web: A survey. Found. Trends Web Sci. 1, 2, 131--197.
[34]
Golbeck, J. 2007. The dynamics of web-based social networks: Membership, relationships, and change. First Monday 12, 11.
[35]
Golbeck, J., Parsia, B., and Hendler, J. 2003. Trust networks on the semantic web. In Proceedings of the 7th International Workshop on Cooperative Intelligent Agents. 238--249.
[36]
Golbeck, J. A. 2005b. Computing and applying trust in web-based social networks. Ph.D. thesis, University of Maryland at College Park, MD.
[37]
Grandison, T. and Sloman, M. 2000. A survey of trust in internet applications. IEEE Comm. Surv. Tutorials 3, 4.
[38]
Granovetter, M. 1973. The strength of weak ties. Amer. J. Sociology 78, 1360--1380.
[39]
Granovetter, M. 1985. Economic action and social structure: The problem of embeddedness. Amer. J. Sociol. 91, 481--510.
[40]
Gross, R. and Acquisti, A. 2005. Information revelation and privacy in online social networks. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES'05). ACM Press, New York, 71--80.
[41]
Guerriero, A., Kubicki, S., and Halin, G. 2009. Trust-oriented multi-visualization of cooperation context. In Proceedings of the 2nd International Conference in Visualisation (VIZ'09). IEEE Computer Society, Los Alamitos, CA 96--101.
[42]
Hanchard, S. 2008. Measuring trust and social networks - Where do we put our trust online? Hitwise. http://weblogs.hitwise.com/sandra-hanchard/2008/09/measuring_trust_and_social_net.html.
[43]
Hang, W. C. and Singh, M. P. 2010. Trust based recommendation based on graph similarities. http://www.csc. ncsu.edu/faculty/mpsingh/papers/mas/aamas-trust-10-graph.pdf.
[44]
Haythornthwaite, C. 2005. Social networks and internet connectivity effects. Inf. Comm. Soc. 8, 2, 125--147.
[45]
Helbing, D. 1994. A mathematical model for the behavior of individuals in a social field. J. Math. Sociol. 19, 3, 189--219.
[46]
Helbing, D. 1992. A mathematical model for attitude formation by pair interactions. Behav. Sci. 37, 3, 190--214.
[47]
Herlocker, J. L., Konstan, J. A., and Riedl, J. 2000. Explaining collaborative filtering recommendations. In Proceedings of ACM Conference on Computer Supported Cooperative Work (CSCW'00). 241--250.
[48]
Hess, C. 2006. Trust-based recommendations for publications: A multi-layer network approach. IEEE Tech. Commit. Digital Librar. Bull. 2, 2.
[49]
Hess, C. 2008. Trust-based recommendations in multi-layer networks. Ph.D. thesis, Otto-Friedrich University Bamberg/University Paris-Sud.
[50]
Hoffman, K., Zage, D., and Nita-Rotaru, C. 2009. A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42, 1--31.
[51]
Holmes, J. 1991. Trust and the appraisal process in close relationships. In Advances in Personal Relationships, W. Jones and D. Perlman, Eds., Jessica Kingsley, London, 57--104.
[52]
Huang, F. 2007. Building social trust: A human-capital approach. J. Institut. Theor. Econ. 163, 4, 552--573.
[53]
Hughes, D., Coulson, G., and Walkerdine, J. 2005. Free riding on gnutella revisited: The bell tolls? IEEE Distrib. Syst. Online 6, 6, 1.
[54]
Humphreys, L. 2007. Mobile social networks and social practice: A case study of dodgeball. J. Comput.-Mediated Comm. 13, 1, 341--360.
[55]
Huynh, T. D., Jennings, N. R., and Shadbolt, N. R. 2006. Certified reputation: How an agent can trust a stranger. In Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'06). New York, NY, 1217--1224.
[56]
Jackson, P. J. 1999. Virtual Working: Social and Organisational Dynamics. Routledge, New York.
[57]
Jaeger, P. T., Shneiderman, B., Fleischmann, K. R., Preece, J., Qu, Y., and Wu, P. F. 2007. Community response grids: E-government, social networks, and effective emergency management. Telecomm. Policy 31, 10--11, 592--604.
[58]
Jamieson, K. and Cappella, J. 2009. Echo Chamber: Rush Limbaugh and the Conservative Media Establishment. Oxford University Press.
[59]
Johnson, D. and Grayson, K. 2005. Cognitive and affective trust in service relationships. J. Bus. Res. 58, 4, 500--507.
[60]
Jones, K. 1996. Trust as an affective attitude. Ethics 107, 1, 4--25.
[61]
Josang, A. 2001. A logic for uncertain probabilities. Int. J. Uncert., Fuzzin. Knowl.-Based Syst. 9, 3, 279--311.
[62]
Josang, A. and Golbeck, J. 2009. Challenges for robust trust and reputation systems. In Proceedings of the 5th International Workshop on Security and Trust Management (STM'09).
[63]
Josang, A., Gray, E., and Kinateder, M. 2003. Analysing topologies of transitive trust. In Proceedings of the 1st Workshop on Formal Aspects in Security and Trust (FAST'03). 9--22.
[64]
Josang, A., Hayward, R., and Pope, S. 2006. Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference (ACSC'06). Australian Computer Society, Hobart, Australia, 85--94.
[65]
Josang, A. and Ismail, R. 2002. The beta reputation system. In Proceedings of the 15th Bled Conference on Electronic Commerce. 891--900.
[66]
Josang, A., Ismail, R., and Boyd, C. 2007. A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 2, 618--644.
[67]
Jurca, R. and Faltings, B. 2003. An incentive compatible reputation mechanism. In Proceedings of the IEEE Conference on E-Commerce (CEC'03). 396--409.
[68]
Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. 2003. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International Conference on World Wide Web (WWW'03). ACM Press, New York, 640--651.
[69]
Kautz, H., Selman, B., and Shah, M. 1997. Referral web: Combining social networks and collaborative filtering. Comm. ACM 40, 63--65.
[70]
Keith, S. and Coulter, R. A. C. 2002. Determinants of trust in a service provider: The moderating role of length of relationship. J. Services Market. 16, 1, 35--50.
[71]
Kerr, R. and Cohen, R. 2009. Smart cheaters do prosper: Defeating trust and reputation systems. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'09). Vol. 2, 993--1000.
[72]
Kim, Y. A. 2008. Building a web of trust without explicit trust ratings. In Proceedings of the 24th IEEE International Conference on Data Engineering Workshop. 531--536.
[73]
Kleinfeld, J. 2002. The small world problem. Soc. Social Sci. Public Policy 39, 61--66.
[74]
Klos, T. B. and La Poutre, H. 2005. Decentralized reputation-based trust for assessing agent reliability under aggregate feedback. In Trusting Agents for Trusting Electronic Societies, Springer, 10--128.
[75]
Kollock, P. 1994. The emergence of exchange structures: An experimental study of uncertainty, commitment, and trust. Amer. J. Sociol. 100, 2, 313--345.
[76]
Komiak, S. X. and Benbasat, I. 2004. Understanding customer trust in agent-mediated electronic commerce, web-mediated electronic commerce, and traditional commerce. Inf. Technol. Manag. 5, 181--207.
[77]
Kuan, H. and Bock, G. 2005. The collective reality of trust: An investigation of social relations and networks on trust in multi-channel retailers. In Proceedings of the 13th European Conference on Information Systems (ECIS'05).
[78]
Kuter, U. and Golbeck, J. 2007. Sunny: A new algorithm for trust inference in social networks using probabilistic confidence models. In Proceedings of the 22nd National Conference on Artificial Intelligence. AAAI Press, 1377--1382.
[79]
Lawler, E. J. and Yoon, J. 1996. Commitment in exchange relations: Test of a theory of relational cohesion. Amer. Sociol. Rev. 61, 89--108.
[80]
Lazarsfeld, P. and Merton, R. 1954. Friendship as a social process: A substantive and methodological analysis. In Freedom and Control in Modern Society, M. Berger, T. Abel, and C. H. Page, Eds., Van Nostrand, New York, 18--66.
[81]
Levin, D. Z., Cross, R., and Abrams, L. C. 2004. The strength of weak ties you can trust: The mediating role of trust in effective knowledge transfer. Manag. Sci. 50, 1477--1490.
[82]
Lewis, J. D. and Weigert, A. 1985. Trust as a social reality. Social Forces 63, 4, 967--985.
[83]
Likert, R. 1932. A technique for the measurement of attitudes. Archiv. Psychol. 140, 1, 1--55.
[84]
Liu, H., Lim, E.-P., Lauw, H. W., Le, M.-T., Sun, A., Srivastava, J., and Kim, Y. A. 2008. Predicting trusts among users of online communities: An epinions case study. In Proceedings of the 9th ACM Conference on Electronic Commerce (EC'08). ACM Press, New York, 310--319.
[85]
Maheswaran, M., Tang, H. C., and Ghunaim, A. 2007. Towards a gravity-based trust model for social networking systems. In Proceedings of the International Conference on Distributed Computing Systems Workshops. IEEE Computer Society, Los Alamitos, CA, 24.
[86]
Malik, Z., Akbar, I., and Bouguettaya, A. 2009. Web services reputation assessment using a hidden markov model. In Proceedings of the 7th International Joint Conference on Service-Oriented Computing (ICSOC-ServiceWave'09). 576--591.
[87]
Malik, Z. and Bouguettaya, A. 2009. Reputation bootstrapping for trust establishment among web services. IEEE Internet Comput. 13, 40--47.
[88]
Manikrao, U. S. and Prabhakar, T. V. 2005. Dynamic selection of web services with recommendation system. In Proceedings of the International Conference on Next Generation Web Services Practices (NWESP'05). IEEE Computer Society, Los Alamitos, CA, 117--121.
[89]
Marmol, F. G. and Perez, G. M. 2011. Trust and reputation models comparison. Internet Res. 21, 138--153.
[90]
Marsh, S. P. 1994. Formalising trust as a computational concept. Ph.D. thesis, University of Stirling.
[91]
Massa, P. and Avesani, P. 2007. Trust-aware recommender systems. In Proceedings of the 1st ACM Conference on Recommender Systems (RecSys'07). ACM Press, New York.
[92]
Mcleod, A. and Pippin, S. 2009. Security and privacy trust in e-government: Understanding system and relationship trust antecedents. In Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS'09). 1--10.
[93]
Mcpherson, M., Lovin, L. S., and Cook, J. M. 2001. Birds of a feather: Homophily in social networks. Ann. Rev. Sociol. 27, 1, 415--444.
[94]
Mika, P. 2007. Social Networks and the Semantic Web. Springer.
[95]
Miles, R. E. and Creed, W. E. D. 1995. Organizational forms and managerial philosophies: A descriptive and analytical review. Res. Organizat. Behav. 17, 333--372.
[96]
Milgram, S. 1967. The small world problem. Psychol. Today 1, 1, 60--67.
[97]
Moibus, M. and Quoc-Anh, D. 2004. Social capital in social networks. http://www.earthinstitute. columbia.edu/cgsd/documents/rosenblat.pdf.
[98]
Mollering, G. 2002. The nature of trust: From geog simmel to a theory of expectation, interpretation and suspension. Sociol. 35, 403--420.
[99]
Molm, L. D., Takahashi, N., and Peterson, G. 2000. Risk and trust in social exchange: An experimental test of a classical proposition. Amer. J. Sociol. 5, 105, 1396--1427.
[100]
Momani, M. and Challa, S. 2010. Survey of trust models in different network domains. Int. J. Ad Hoc Sensor Ubiq. Comput. 1, 3, 1--19.
[101]
Moreland, D., Nepal, S., Hwang, H., and Zic, J. 2010. A snapshot of trusted personal devices applicable to transaction processing. Personal Ubiq. Comput. 14, 4, 347--361.
[102]
Mui, L. 2003. Computational models of trust and reputation: Agents, evolutionary games, and social networks. Ph.D. thesis. http://groups.csail.mit.edu/medg/people/lmui/docs/phddissertation.pdf.
[103]
Mui, L., Mohtashemi, M., and Halberstadt, A. 2002. A computational model of trust and reputation. In Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS'02). IEEE Computer Society, Los Alamitos, CA, 188--196.
[104]
Nahapiet, J. and Ghoshal, S. 1998. Social capital, intellectual capital, and the organizational advantage. Academy Manag. Rev. 23, 2, 242--266.
[105]
Nepal, S., Sherchan, W., and Bouguettaya, A. 2010a. A behavior based trust model for service web. In Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications (SOCA'10). IEEE Computer Society, 1--4.
[106]
Nepal, S., Sherchan, W., and Paris, C. 2011. STrust: A trust model for social networks. In Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'11). 841--846.
[107]
Nepal, S., Zic, J., Liu, D., and Jang, J. 2010b. Trusted computing platform in your pocket. In Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC'10). IEEE Computer Society, Los Alamitos, CA, 812--817.
[108]
O'Donovan, J., Smyth, B., Evrim, V., and Mcleod, D. 2007. Extracting and visualizing trust relationships from online auction feedback comments. In Proceedings of the 20th International Joint Conference on Artificial Intelligence. Morgan Kaufmann Publishers, San Francisco, 2826--2831.
[109]
Paldam, M. 2000. Social capital: One or many? Definition and measurement. J. Econ. Surv. 5, 1, 629--653.
[110]
Paradesi, S., Doshi, P., and Swaika, S. 2009. Integrating behavioral trust in web service compositions. In Proceedings of the IEEE International Conference on Web Services (ICWS'09). 453--460.
[111]
Putnam, R. 2000. Bowling Alone: The Collapse and Revival of American Community. Simon and Schuster, New York.
[112]
Putnam, R. D. 1995. Bowling alone: America's declining social capital. J. Democracy 6, 1, 65--78.
[113]
Resnick, P., Zeckhauser, R., Friedman, E., and Kuwabara, K. 2000. Reputation systems. Comm. ACM 43, 12, 45--48.
[114]
Richardson, M., Agrawal, R., and Domingos, P. 2003. Trust management for the semantic web. In Proceedings of the 2nd International Semantic Web Conference. 351--368.
[115]
Romer, P. M. 2000. Thinking and feeling. Amer. Econ. Rev. 90, 2, 439--443.
[116]
Rotter, J. B. 1967. A new scale for the measurement of interpersonal trust. J. Personality 35, 4, 651--665.
[117]
Rotter, J. B. 1971. Generalized expectancies for interpersonal trust. Amer. Psychol. 26, 1, 443--452.
[118]
Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C. 1998. Not so different after all: A cross-discipline view of trust. Academy Manag. Rev. 23, 3, 393--404.
[119]
Ruohomaa, S. and Kutvonen, L. 2005. Trust management survey. In Proceedings of the 3rd International Conference on Trust Management (iTrust'05). Springer, 77--92.
[120]
Ruohomaa, S., Kutvonen, L., and Koutrouli, E. 2007. Reputation management survey. In Proceedings of the 2nd International Conference on Availability, Reliability and Security (ARES'07). IEEE Computer Society, 103--111.
[121]
Sabater, J. 2002. Trust and reputation for agent societies. Ph.D. thesis, Autonomous University Of Barcelona, Spain. http://www.tesisenxarxa.net/TESIS_UAB/AVAILABLE/TDX-0123104172828//jsm1de1.pdf.
[122]
Sabater, J. and Sierra, C. 2002. Reputation and social network analysis in multi-agent systems. In Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'02). ACM Press, New York, 475--482.
[123]
Sabater, J. and Sierra, C. 2005. Review on computational trust and reputation models. Artif. Intell. Rev. 24, 33--60.
[124]
Schillo, M., Funk, P., and Rovatsos, M. 2000. Using trust for detecting deceitful agents in artificial societies. Appl. Artif. Intell. 14, 8, 825--848.
[125]
Schneider, O. 2009. Trust-aware social networking: A distributed storage system based on social trust and geographic proximity. M.S. thesis. http://www.peerson.net/papers/oliver_da.pdf.
[126]
Scully, M. and Preuss, G. 1996. Two faces of trust: The roles of calculative and relational trust in work transformation. Tech. rep. working paper no. 3923--96, Massachusetts Institute of Technology.
[127]
Seshadri, A., Perrig, A., van Doorn, L., and Khosla, P. K. 2004. SWATT: Software-based attestation for embedded devices. In Proceedings of the IEEE Symposium on Security and Privacy. 272--282.
[128]
Singh, M. P., Yu, B., and Venkatraman, M. 2001. Community-based service location. Comm. ACM 44, 49--54.
[129]
Singh, S. and Bawa, S. 2007. Privacy, trust and policy based authorization framework for services in distributed environments. Int. J. Comput. Sci. 2, 2, 85--92.
[130]
Song, S., Hwang, K., Zhou, R., and Kwok, Y.-K. 2005. Trusted p2p transactions with fuzzy reputation aggregation. IEEE Internet Comput. 9, 6, 24--34.
[131]
Song, W., Phoha, V. V., and Xu, X. 2004. The hmm-based model for evaluating recommender's reputation. In Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business. IEEE, 209--215.
[132]
Staab, S., Bhargava, B., Lilien, L., Rosenthal, A., Winslett, M., Sloman, M., Dillon, T. S., Chang, E., Hussain, F. K., Nejdl, W., Olmedilla, D., and Kashyap, V. 2004. The pudding of trust: Managing the dynamic nature of trust. IEEE Intell. Syst. 19, 5, 74--88.
[133]
Sturgis, P., Read, S., Hatemi, P., Zhu, G., Trull, T., Wright, M., and Martin, N. 2010. A genetic basis for social trust? Polit. Behav. 32, 2, 205--230.
[134]
Suh, B. and Han, I. 2002. Effect of trust on customer acceptance of Internet banking. Electron. Commerce Res. Appl. 1, 3--4, 247--263.
[135]
Suryanarayana, G., T. R. 2004. A survey of trust management and resource discovery technologies in peer-to-peer applications. Tech. rep. UCI-ISR-04-6, Institute for Software Research, University of California, Irvine.
[136]
Sztompka, P. 1999. Trust: A Sociological Theory. Cambridge University Press.
[137]
Taylor, R. 2000. Marketing strategies: Gaining a competitive advantage through the use of emotion. Competitiv. Rev. 10, 146--152.
[138]
Toivonen, S., Lenzini, G., and Uusitalo, I. 2006. Context-aware trust evaluation functions for dynamic reconfigurable systems. In Proceedings of the Workshop on Models of Trust for the Web (MTW'06), held in Conjunction with the 15th International World Wide Web Conference, T. Finin, L. Kagal, and D. Olmedilla, Eds., CEUR Workshop Proceedings Series, vol. 190.
[139]
Trifunovic, S., Legendre, F., and Anastasiades, C. 2010. Social trust in opportunistic networks. In Proceedings of the INFOCOM IEEE Conference on Computer Communications Workshops. IEEE, 1--6.
[140]
Tyler, T. R. 1990. Why People Obey the Law. Yale University Press, New Haven, CT.
[141]
Tyler, T. R. and Degoey, P. 1996. Trust in organizational authorities: The influence of motive attributions on willingness to accept decisions. In Trust in Organizations: Frontiers of Theory and Research, R. M. Kramer and T. R. Tyler, Eds., Sage Publications, Thousand Oaks, CA.
[142]
Vigas, F. B. and Donath, J. 2004. Social network visualization: Can we go beyond the graph? In Proceedings of the Workshop on Social Networks for Design and Analysis: Using Network Information in CSCW. 6--10.
[143]
von Laszewski, G., Alunkal, B., and Veljkovic, I. 2005. Towards reputable grids: Scalable computing. Pract. Exper. 6, 3, 95--106.
[144]
Waldman, M., Rubin, A. D., and Cranor, L. F. 2000. Publius: A robust, tamper-evident, censorship resistent web publishing system. In Proceedings of the 9th USENIX Security Symposium.
[145]
Walter, F. E., Battiston, S., and Schweitzer, F. 2009. Personalised and dynamic trust in social networks. In Proceedings of the 3rd ACM Conference on Recommender Systems (RecSys'09). ACM Press, New York, 197--204.
[146]
Wang, T. and Lu, Y. 2010. Determinants of trust in e-government. In Proceedings of the International Conference on Computational Intelligence and Software Engineering (CiSE'10). 1--4.
[147]
Wang, Y., Hori, Y., and Sakurai, K. 2007. Economic-inspired truthful reputation feedback mechanism in p2p networks. In Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. 80--88.
[148]
Wang, Y. and Vassileva, J. 2007. A review on trust and reputation for web service selection. In Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07). IEEE Computer Society, 25--32.
[149]
Watts, D. J. 2003. Six Degrees: The Science of a Connected Age. W.W. Norton and Company, New York.
[150]
Wei-Hang, C. and Singh, M. P. 2010. Trust-based recommendation based on graph similarity. In Proceedings of the 13th AAMAS Workshop on Trust in Agent Societies. http://www.csc.ncsu.edu/faculty/mpsingh/papers/mas/aamas-trust-10-graph.pdf.
[151]
Wellman, B. 1996. For a social network analysis of computer networks: A sociological perspective on collaborative work and virtual community. In Proceedings of the ACM SIGCPR/SIGMIS Conference on Computer Personnel Research (SIGCPR'96). ACM Press, New York, 1--11.
[152]
Wellman, B. 2004. The global village: Internet and community. Arts Sci. Rev. 1, 1, 26--30.
[153]
Williamson, O. E. 1993. Calculativeness, trust and economic organization. J. Law Econ. 30, 1, 131--145.
[154]
Wishart, R., Robinson, R., Indulska, J., and Josang, A. 2005. Superstringrep: Reputation-enhanced service discovery. In Proceedings of the 28th Australasian Conference on Computer Science (ACSC'05). Australian Computer Society, Darlinghurst, Australia, 49--57.
[155]
Xiang, R., Neville, J., and Rogati, M. 2010. Modeling relationship strength in online social networks. In Proceedings of the 19th International Conference on World Wide Web (WWW'10). ACM Press, New York, 981--990.
[156]
Xiong, L. and Liu, L. 2003. A reputation-based trust model for peer-to-peer ecommerce communities. In Proceedings of the 4th ACM Conference on Electronic Commerce (EC'03). ACM Press, New York, 228--229.
[157]
Xiong, L. and Liu, L. 2004. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Engin. 16, 7, 843--857.
[158]
Yan, Z., Niemi, V., Dong, Y., and Yu, G. 2008. A user behavior based trust model for mobile applications. In Proceedings of the 5th International Conference on Autonomic and Trusted Computing. 455--469.
[159]
Yan, Z. and Yan, R. 2009. Formalizing trust based on usage behaviours for mobile applications. In Proceedings of the 6th International Conference on Autonomic and Trusted Computing. 194--208.
[160]
Yang, J., Hu, X., and Zhang, H. 2007. Effects of a reputation feedback system on an online consumer-to-consumer auction market. Decis. Support Syst. 44, 1, 93--105.
[161]
Yaniv, I. and Kleinberger, E. 2000. Advice taking in decision making: Egocentric discounting and reputation formation. Organiz. Behav. Hum. Decision Process. 83, 2, 260--281.
[162]
Yao, J., Chen, S., Nepal, S., Levy, D., and Zic, J. 2010. Truststore: Making amazon s3 trustworthy with services composition. In Proceedings of the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGRID'10). IEEE Computer Society, Los Alamitos, CA, 600--605.
[163]
Young, A. L. and Quan-Haase, A. 2009. Information revelation and internet privacy concerns on social network sites: A case study of facebook. In Proceedings of the International Conference on Communities and Technologies. 265--274.
[164]
Yu, B. and Singh, M. P. 2000. A social mechanism for reputation management in electronic communities. In Proceedings of the 4th International Workshop on Cooperative Information Agents (CIA'00). Springer, 154--165.
[165]
Yu, B. and Singh, M. P. 2002. An evidential model of distributed reputation management. In Proceedings of the 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS'02). ACM Press, New York, 294--301.
[166]
Yu, B., Singh, M. P., and Sycara, K. 2004. Developing trust in large-scale peer-to-peer systems. In Proceedings of the 1st IEEE Symposium on Multi-Agent Security and Survivability. IEEE Computer Society, 1--10.
[167]
Zacharia, G. and Maes, P. 2000. Trust management through reputation mechanisms. Appl. Artif. Intell. 14, 9, 881--907.
[168]
Zajonc, R. 1980. Feeling and thinking: Preferences need no inferences. Amer. Psychol. 35, 2, 151--175.
[169]
Zappen, J. P., Harrison, T. M., and Watson, D. 2008. A new paradigm for designing e-government: Web 2.0 and experience design. In Proceedings of the International Conference on Digital Government Research. Digital Government Society of North America, 17--26.
[170]
Zarghami, A., Fazeli, S., Dokoohaki, N., and Matskin, M. 2009. Social trust-aware recommendation system: A t-index approach. In Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT'09). IEEE Computer Society, Los Alamitos, CA, 85--90.
[171]
Zhang, Y., Chen, H., and Wu, Z. 2006. A social network-based trust model for the semantic web. In Proceedings of the 6th International Conference on Autonomic and Trusted Computing. 183--192.
[172]
Zhang, Y. and Fang, Y. 2007. A fine-grained reputation system for reliable service selection in peer-to-peer networks. IEEE Trans. Parallel Distrib. Syst. 18, 8, 1134--1145.
[173]
Zhou, R. and Hwang, K. 2007. PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst. 18, 4, 460--473.
[174]
Ziegler, C.-N. and Lausen, G. 2004. Spreading activation models for trust propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04). IEEE Computer Society, Los Alamitos, CA, 83--97.
[175]
Zuo, Y., Hu, W.-C., and O'Keefe, T. 2009. Trust computing for social networking. In Proceedings of the 6th International Conference on Information Technology: New Generations. IEEE Computer Society, Los Alamitos, CA, 1534--1539.

Cited By

View all
  • (2024)Sosyal Medyaya Güven Düzeyinin Dijital Ortamlarda Sağlık Bilgisi Edinme ve Teyit Davranışı Üzerindeki Etkisinde Kullanım Süresinin Aracılık RolüYeni Medya Dergisi10.55609/yenimedya.1456726Online publication date: 30-May-2024
  • (2024)TPoison: Data-Poisoning Attack against GNN-Based Social Trust ModelMathematics10.3390/math1212181312:12(1813)Online publication date: 11-Jun-2024
  • (2024)Privacy-Preserving and Diversity-Aware Trust-based Team Formation in Online Social NetworksACM Transactions on Intelligent Systems and Technology10.1145/3670411Online publication date: 5-Jun-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 45, Issue 4
August 2013
490 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/2501654
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 August 2013
Accepted: 01 August 2012
Revised: 01 March 2012
Received: 01 September 2011
Published in CSUR Volume 45, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Trust management
  2. social networks
  3. social trust
  4. trust models

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)486
  • Downloads (Last 6 weeks)27
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Sosyal Medyaya Güven Düzeyinin Dijital Ortamlarda Sağlık Bilgisi Edinme ve Teyit Davranışı Üzerindeki Etkisinde Kullanım Süresinin Aracılık RolüYeni Medya Dergisi10.55609/yenimedya.1456726Online publication date: 30-May-2024
  • (2024)TPoison: Data-Poisoning Attack against GNN-Based Social Trust ModelMathematics10.3390/math1212181312:12(1813)Online publication date: 11-Jun-2024
  • (2024)Privacy-Preserving and Diversity-Aware Trust-based Team Formation in Online Social NetworksACM Transactions on Intelligent Systems and Technology10.1145/3670411Online publication date: 5-Jun-2024
  • (2024)Building Confidence in a World of Eroding TrustDigital Government: Research and Practice10.1145/36530755:2(1-17)Online publication date: 19-Mar-2024
  • (2024)On Trust Recommendations in the Social Internet of Things – A SurveyACM Computing Surveys10.1145/364510056:6(1-35)Online publication date: 8-Feb-2024
  • (2024)Digital peacebuilding in post‐conflict Colombia – A conceptual frameworkGlobal Policy10.1111/1758-5899.1333015:S3(47-57)Online publication date: 18-Jun-2024
  • (2024)Enhancing Worker Recruitment in Collaborative Mobile Crowdsourcing: A Graph Neural Network Trust Evaluation ApproachIEEE Transactions on Mobile Computing10.1109/TMC.2024.337346923:10(10093-10110)Online publication date: 1-Oct-2024
  • (2024)Towards a Trusted and Cryptocurrency-Enabled Decentralized Wireless Community Network2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)10.1109/ICBC59979.2024.10634396(1-7)Online publication date: 27-May-2024
  • (2024)Uncovering Strong Ties: A Study of Indirect Sybil Attack on Signed Social NetworkICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP48485.2024.10447587(4535-4539)Online publication date: 14-Apr-2024
  • (2024)Securing Blockchain-Based IoT Systems: A ReviewIEEE Access10.1109/ACCESS.2024.342849012(98856-98881)Online publication date: 2024
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media