Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1290067.1290079acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
Article

Semantic similarity based trust computation in websites

Published: 28 September 2007 Publication History

Abstract

The World Wide Web has evolved at an extreme rate due to its capacity to provide an endless amount of information to the public users. Hence, the user finds himself lost in a pool of information, without knowing what to trust in order to retain. One could rely on the first website links displayed when renowned web search engines such as Google or Yahoo are invoked. However, are those initial displayed links really trustworthy because they came on top of the list? Can one trust specific information by the simple fact that it has been ranked high by virtue of being accessed frequently by other users? In this paper, we propose a method that overcomes the dependency of user.s feedback and allows one to dynamically compute the trust level of a website of a particular domain based on how semantically similar its content is with a trusted website of the same domain. The experimental results have been provided to demonstrate the utility of the proposed method.

References

[1]
Brin, S. and Page, L. The anatomy of a large-scale hyper textual web search engine. Computer Networks and ISDN Systems, 30(1-7), 1998, pp 107--117.
[2]
Atrey, P. K., Kankanhalli, M. S. and El-Saddik, A. Confidence building among correlated streams in multimedia surveillance systems. In Proceedings of the 13th International Conference on Multimedia Modeling, Singapore, 2007, pp 155--164.
[3]
Schneider G. K. Beyond Algorithms: A librarian's guide to finding web sites you can trust. Notes from Google Librarian Center. URL: http://www.google.com/librariancenter/articles/0601_02.html
[4]
Lee, D. L., Pincombe, B. and Welsh, M. An empirical evaluation of models of text document similarity.
[5]
Emurian, H. H. and Wang, D. Y. An overview of online trust. In Computers in Human Behavior, volume 21 (2005), pp 105--125.
[6]
Ang, L., Dubelaar, C., and Lee, B.-C. To trust or not to trust? A model of internet trust from the customer's point of view. In Proceedings of the 14th Bled Electronic Commerce Conference, Bled, Slovenia, 2001, pp. 40--52.
[7]
Belanger, F., Hiller, J. S., and Smith, W. J. Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. Journal of Strategic Information Systems, 2002, volume 11, 245--270.
[8]
Friedman, B., Howe, D. and Kahn, P. Trust online. Communications of the ACM, 2000, 43(12), 34--40.
[9]
Fox, S. Trust and privacy online: Why Americans want to rewrite the rules, The Pew Internet & American Life Project, 2000, Washington, DC. URL: http://www.pewinternet.org/reports/pdfs/PIP_Trust_Privacy_Report.pdf.
[10]
Neilsen, J. Trust or bust: Communicating trustworthiness in web design. Jacob Nielsen's Alertbox, 1999. URL: http://www.useit.com/alertbox/990307.html.
[11]
Liu, Y., Ngu, A. H. H., and Zeng, L. QoS computation and policing in dynamic web service selection. In Proceedings of the ACM Conference on World Wide Web, New York, USA 2004, pp 66--73,
[12]
Rezgui, A., Bouguettaya, A., and Malik, Z. A reputation-based approach to preserving privacy in web services. In Proceedings of the International Workshop on Technologies for e-Services, Hawaii, USA, 2003, volume LNCS 2819, pp 91--103.
[13]
G. Zacharia, A. M. and Maes, P. (1999). Collaborative reputation mechanisms in electronic marketplaces. In International Conference on System Sciences, Hawaii, USA.
[14]
Sreenath, R. M. and Singh, M. P. (2004). Agent-based service selection. Journal on Web Semantics. To appear.
[15]
Mui, L., Mohtashemi, M., and Halberstadt, A. (2002). A computational model of trust and reputation. In International Conference on System Sciences, pages 280--287, Hawaii, USA.
[16]
Tatbul, N., Buller, M., Hoyt, R., Mullen, S.m Zdonik, S. Confidence-based data management for personal area sensor networks. In The Workshop on Data Management for Sensor Networks. (2004) 24--31.
[17]
Ioannou, S., Wallace, M., Karpouzis, K., Raouzaiou, A., Kollias, S.: Confidence based fusion of multiple feature cues for facial expresssion recognition. In The 14th IEEE International Conference on Fuzzy Systems, Reno, Nevada, USA (2005) 207--212.
[18]
Oxford English Dictionary: The Compact Edition. (1971). New York: Oxford University Press.
[19]
Husted, B. (1998). The ethical limits of trust in business relations. Business Ethics Quarterly, 8(2), 233--2.

Cited By

View all
  • (2023)Trust evaluation of health websites by eliminating phishing websites and using similarity techniquesConcurrency and Computation: Practice and Experience10.1002/cpe.769535:21Online publication date: 16-Mar-2023
  • (2013)Trusting Semi-structured Web DataThe Semantic Web: Semantics and Big Data10.1007/978-3-642-38288-8_50(676-681)Online publication date: 2013
  • (2012)Determining trust in media-rich websites using semantic similarityMultimedia Tools and Applications10.1007/s11042-011-0798-x60:1(69-96)Online publication date: 1-Sep-2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MS '07: Workshop on multimedia information retrieval on The many faces of multimedia semantics
September 2007
100 pages
ISBN:9781595937827
DOI:10.1145/1290067
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 September 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. semantic similarity
  2. trust computation

Qualifiers

  • Article

Conference

MM07
MM07: The 15th ACM International Conference on Multimedia 2007
September 28, 2007
Bavaria, Augsburg, Germany

Upcoming Conference

MM '24
The 32nd ACM International Conference on Multimedia
October 28 - November 1, 2024
Melbourne , VIC , Australia

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Trust evaluation of health websites by eliminating phishing websites and using similarity techniquesConcurrency and Computation: Practice and Experience10.1002/cpe.769535:21Online publication date: 16-Mar-2023
  • (2013)Trusting Semi-structured Web DataThe Semantic Web: Semantics and Big Data10.1007/978-3-642-38288-8_50(676-681)Online publication date: 2013
  • (2012)Determining trust in media-rich websites using semantic similarityMultimedia Tools and Applications10.1007/s11042-011-0798-x60:1(69-96)Online publication date: 1-Sep-2012
  • (2009)A Reputation-Based Multi-Agent Model for Network Resource SelectionInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2009.2808902:08(764-774)Online publication date: 2009

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media