Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2631775.2631793acmconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
research-article

Is distrust the negation of trust?: the value of distrust in social media

Published: 01 September 2014 Publication History

Abstract

Trust plays an important role in helping online users collect reliable information, and has attracted increasing attention in recent years. We learn from social sciences that, as the conceptual counterpart of trust, distrust could be as important as trust. However, little work exists in studying distrust in social media. What is the relationship between trust and distrust? Can we directly apply methodologies from social sciences to study distrust in social media? In this paper, we design two computational tasks by leveraging data mining and machine learning techniques to enable the computational understanding of distrust with social media data. The first task is to predict distrust from only trust, and the second task is to predict trust with distrust. We conduct experiments in real-world social media data. The empirical results of the first task provide concrete evidence to answer the question, "is distrust the negation of trust?" while the results of the second task help us figure out how valuable the use of distrust in trust prediction.

References

[1]
B. Barber. The logic and limits of trust. Rutgers University Press New Brunswick, NJ, 1983.
[2]
D. Cartwright and F. Harary. Structural balance: a generalization of heider's theory. Psychological Review, 63(5):277, 1956.
[3]
J. Cho. The mechanism of trust and distrust formation and their relational outcomes. Journal of Retailing, 82(1):25--35, 2006.
[4]
P. Cofta. Distrust. In ICEC. ACM, 2006.
[5]
C. Ding, T. Li, and M. Jordan. Nonnegative matrix factorization for combinatorial optimization: Spectral clustering, graph matching, and clique finding. In Data Mining, 2008. ICDM'08. Eighth IEEE International Conference on, pages 183--192. Ieee, 2008.
[6]
J. Golbeck. Computing and applying trust in web-based social networks. Ph.D. dissertation, 2005.
[7]
J. Golbeck. Computing with social trust. Springer Publishing Company, Incorporated, 2008.
[8]
J. Golbeck. Trust and nuanced profile similarity in online social networks. ACM Transactions on the Web, 3(4):1--33, 2009.
[9]
N. Griffiths. A fuzzy approach to reasoning with trust, distrust and insufficient trust. In Cooperative Information Agents X, pages 360--374. Springer, 2006.
[10]
R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In Proceedings of the 13th international conference on World Wide Web, pages 403--412. ACM, 2004.
[11]
R. Hardin. Distrust: Manifestations and management. Russell Sage Foundation, 2004.
[12]
F. Heider. Attitudes and cognitive organization. The Journal of psychology, 1946.
[13]
A. Josang, E. Gray, and M. Kinateder. Analysing topologies of transitive trust. In Proc. of the 1st workshop on Formal Aspects in Security and Trust (FAST2003), 2003.
[14]
Y. Koren. Factorization meets the neighborhood: a multifaceted collaborative filtering model. In Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 426--434. ACM, 2008.
[15]
R. M. Kramer. Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual review of psychology, 50(1):569--598, 1999.
[16]
D. W. Larson and R. Hardin. Distrust: Prudent, if not always wise. Distrust, pages 34--59, 2004.
[17]
J. Leskovec, D. Huttenlocher, and J. Kleinberg. Predicting positive and negative links in online social networks. In Proceedings of the 19th international conference on World wide web, 2010.
[18]
R. J. Lewicki, D. J. McAllister, and R. J. Bies. Trust and distrust: New relationships and realities. Academy of management Review, 23(3):438--458, 1998.
[19]
D. Liben-Nowell and J. Kleinberg. The link-prediction problem for social networks. Journal of the American society for information science and technology, 58(7):1019--1031, 2007.
[20]
H. Liu, E. Lim, H. Lauw, M. Le, A. Sun, J. Srivastava, and Y. Kim. Predicting trusts among users of online communities: an epinions case study. In Proceedings of the 9th ACM Conference on Electronic Commerce, pages 310--319. ACM, 2008.
[21]
Y. Lu, P. Tsaparas, A. Ntoulas, and L. Polanyi. Exploiting social context for review quality prediction. In Proceedings of the 19th international conference on World wide web, pages 691--700. ACM, 2010.
[22]
H. Ma, H. Yang, M. Lyu, and I. King. Sorec: social recommendation using probabilistic matrix factorization. In Proceeding of the 17th ACM conference on Information and knowledge management, pages 931--940. ACM, 2008.
[23]
H. Ma, D. Zhou, C. Liu, M. Lyu, and I. King. Recommender systems with social regularization. In Proceedings of the fourth ACM international conference on Web search and data mining, pages 287--296. ACM, 2011.
[24]
S. Marsh and M. R. Dibben. Trust, untrust, distrust and mistrust--an exploration of the dark (er) side. In Trust Management, pages 17--33. Springer, 2005.
[25]
P. Massa and P. Avesani. Controversial users demand local trust metrics: An experimental study on epinions. com community. In Proceedings of the National Conference on artificial Intelligence, volume 20, page 121. Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999, 2005.
[26]
Y. Matsuo and H. Yamamoto. Community gravity: measuring bidirectional effects by trust and rating on online social networks. In Proceedings of the 18th international conference on World wide web, pages 751--760. ACM, 2009.
[27]
D. H. McKnight and N. L. Chervany. Trust and distrust definitions: One bite at a time. In Trust in Cyber-societies, pages 27--54. Springer, 2001.
[28]
D. H. McKnight and V. Choudhury. Distrust and trust in b2c e-commerce: Do they differ? In ICEC, pages 482--491. ACM, 2006.
[29]
A. Mishra and A. Bhattacharya. Finding the bias and prestige of nodes in networks based on trust scores. In Proceedings of the 20th international conference on World wide web, pages 567--576. ACM, 2011.
[30]
M. Richardson and P. Domingos. Mining knowledge-sharing sites for viral marketing. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 61--70. ACM, 2002.
[31]
J. B. Rotter. Interpersonal trust, trustworthiness, and gullibility. American psychologist, 35(1):1, 1980.
[32]
J. Singh and D. Sirdeshmukh. Agency and trust mechanisms in consumer satisfaction and loyalty judgments. Journal of the Academy of Marketing Science, 28(1):150--167, 2000.
[33]
J. Tang, Y. Chang, and H. Liu. Mining social media with social theories: A survey. SIGKDD Explorations, 2014.
[34]
J. Tang, H. Gao, X. Hu, and H. Liu. Exploiting homophily effect for trust prediction. In Proceedings of the sixth ACM international conference on Web search and data mining, pages 53--62. ACM, 2013.
[35]
J. Tang, H. Gao, and H. Liu. mtrust: Discerning multi-faceted trust in a connected world. In the 5th ACM International Conference on Web Search and Data Mining, 2012.
[36]
J. Tang and H. Liu. Trust in social computing. In Proceedings of the companion publication of the 23rd international conference on World wide web companion, pages 207--208, 2014.
[37]
S.-H. Yang, A. J. Smola, B. Long, H. Zha, and Y. Chang. Friend or frenemy?: predicting signed ties in social networks. In Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, pages 555--564. ACM, 2012.
[38]
S. Chang, G. Qi, J. Tang, Q. Tian, Y. Rui and T. Huang. Multimedia LEGO: LEarning structured model by probabilistic loGic Ontology tree. In IEEE 13th International Conference on Data Mining, 2013.
[39]
S. Zhu, K. Yu, Y. Chi, and Y. Gong. Combining content and link for classification using matrix factorization. In Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, pages 487--494. ACM, 2007.
[40]
C. Ziegler and J. Golbeck. Investigating interactions of trust and interest similarity. Decision Support Systems, 43(2):460--475, 2007.
[41]
Z. Li, S. Chang, F. Liang, T. Huang, L. Cao and J. Smith. Learning Locally-Adaptive Decision Functions for Person Verification. In IEEE Conference on Computer Vision and Pattern Recognition, 2013.
[42]
C.-N. Ziegler and G. Lausen. Propagation models for trust and distrust in social networks. Information Systems Frontiers, 7(4--5):337--358, 2005.

Cited By

View all
  • (2024)SNCA: Semi-Supervised Node Classification for Evolving Large Attributed GraphsBig Data Mining and Analytics10.26599/BDMA.2024.90200337:3(794-808)Online publication date: Sep-2024
  • (2024)A Systematic Review on Fostering Appropriate Trust in Human-AI Interaction: Trends, Opportunities and ChallengesACM Journal on Responsible Computing10.1145/36964491:4(1-45)Online publication date: 21-Sep-2024
  • (2024)Profiling the Dynamics of Trust & Distrust in Social Media: A Survey StudyProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642927(1-24)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. Is distrust the negation of trust?: the value of distrust in social media

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    HT '14: Proceedings of the 25th ACM conference on Hypertext and social media
    September 2014
    346 pages
    ISBN:9781450329545
    DOI:10.1145/2631775
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 September 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. a new dimension of trust
    2. distrust
    3. the negation of trust
    4. value of distrust

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    HT '14
    Sponsor:

    Acceptance Rates

    HT '14 Paper Acceptance Rate 49 of 86 submissions, 57%;
    Overall Acceptance Rate 378 of 1,158 submissions, 33%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)50
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 12 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)SNCA: Semi-Supervised Node Classification for Evolving Large Attributed GraphsBig Data Mining and Analytics10.26599/BDMA.2024.90200337:3(794-808)Online publication date: Sep-2024
    • (2024)A Systematic Review on Fostering Appropriate Trust in Human-AI Interaction: Trends, Opportunities and ChallengesACM Journal on Responsible Computing10.1145/36964491:4(1-45)Online publication date: 21-Sep-2024
    • (2024)Profiling the Dynamics of Trust & Distrust in Social Media: A Survey StudyProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642927(1-24)Online publication date: 11-May-2024
    • (2024)A Signed Subgraph Encoding Approach via Linear Optimization for Link Sign PredictionIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2023.328092435:10(14659-14670)Online publication date: Oct-2024
    • (2023)What Do We Mean When We Talk about Trust in Social Media? A Systematic ReviewProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581019(1-22)Online publication date: 19-Apr-2023
    • (2022)Learning From Negative LinksIEEE Transactions on Cybernetics10.1109/TCYB.2021.310424652:8(8481-8492)Online publication date: Aug-2022
    • (2021)Relation Representation Learning via Signed Graph Mutual Information Maximization for Trust PredictionSymmetry10.3390/sym1301011513:1(115)Online publication date: 11-Jan-2021
    • (2021)SGCLProceedings of the 30th ACM International Conference on Information & Knowledge Management10.1145/3459637.3482478(1671-1680)Online publication date: 26-Oct-2021
    • (2021)Deep Learning on Graphs10.1017/9781108924184Online publication date: 2-Sep-2021
    • (2020)Social Science–guided Feature EngineeringACM Transactions on Intelligent Systems and Technology10.1145/336422211:1(1-27)Online publication date: 9-Jan-2020
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media