Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1571941.1572046acmconferencesArticle/Chapter ViewAbstractPublication PagesirConference Proceedingsconference-collections
research-article

Telling experts from spammers: expertise ranking in folksonomies

Published: 19 July 2009 Publication History

Abstract

With a suitable algorithm for ranking the expertise of a user in a collaborative tagging system, we will be able to identify experts and discover useful and relevant resources through them. We propose that the level of expertise of a user with respect to a particular topic is mainly determined by two factors. Firstly, an expert should possess a high quality collection of resources, while the quality of a Web resource depends on the expertise of the users who have assigned tags to it. Secondly, an expert should be one who tends to identify interesting or useful resources before other users do. We propose a graph-based algorithm, SPEAR (SPamming-resistant Expertise Analysis and Ranking), which implements these ideas for ranking users in a folksonomy. We evaluate our method with experiments on data sets collected from Delicious.com comprising over 71,000 Web documents, 0.5 million users and 2 million shared bookmarks. We also show that the algorithm is more resistant to spammers than other methods such as the original HITS algorithm and simple statistical measures.

References

[1]
M.T.H. Chi. Two approaches to the study of experts' characteristics. In The Cambridge Handbook of Expertise and Expert Performance, pages 21--30. Cambridge University Press, USA, 2006.
[2]
B. Dom, I. Eiron, A. Cozzi, and Y. Zhang. Graph-based ranking algorithms for e-mail expertise analysis. In Proc. of ACM SIGMOD Workshop on Research issues in Data Mining and Knowledge Discovery, pages 42--48. USA, 2003.
[3]
P.J. Feltovich, M.J. Prietula, and K.A. Ericsson. Studies of expertise from psychological perspectives. In The Cambridge Handbook of Expertise and Expert Performance, pages 41--68. Cambridge University Press, USA, 2006.
[4]
T. Hammond, T. Hannay, B. Lund, and J. Scott. Social bookmarking tools (i): A general review. D-Lib Magazine, 11(4), April 2005.
[5]
P. Heymann, G. Koutrika, and H. Garcia-Molina. Fighting spam on social web sites: A survey of approaches and future challenges. IEEE Internet Computing, 11(6):36--45, 2007.
[6]
P. Heymann, G. Koutrika, and H. Garcia-Molina. Can social bookmarking improve web search? In Proc. of 1st ACM Int'l Conf. on Web Search and Data Mining, pages 195--206. Palo Alto, USA, 2008.
[7]
A. Hotho, R. Jäschke, C. Schmitz, and G. Stumme. Information retrieval in folksonomies: Search and ranking. In Proc. of 3rd European Semantic Web Conference, pages 411--426. Montenegro, 2006.
[8]
J. Kleinberg. Authoritative sources in a hyperlinked environment. J. ACM, 46(5):604--632, 1999.
[9]
G. Koutrika, F.A. Eendi, Z. Gyöngyi, P. Heymann, and H. Garcia-Molina. Combating spam in tagging systems. In Proc. of Int'l Workshop on Adversarial information retrieval on the web, pages 57--64. 2007.
[10]
R. Krestel and L. Chen. Using co-occurence of tags and resources to identify spammers. In Proc. of ECML PKDD Discovery Challenge Workshop, col located with ECML/PKDD 2008, 2008.
[11]
C. Macdonald, D. Hannah, and I. Ounis. High quality expertise evidence for expert search. In Proc. of 30th European Conference on IR Research, UK, 2008., pages 283--295. Springer, 2008.
[12]
A. Madkour, T. Hefni, A. Hefny, and K.S. Refaat. Using semantic features to detect spamming in social bookmarking systems. In Proc. of ECML PKDD Discovery Challenge Workshop, Belgium, 2008.
[13]
P. Mika. Ontologies are us: A unified model of social networks and semantics. Journal of Web Semantics, 5(1):5--15, 2007.
[14]
M.G. Noll and C. Meinel. Authors vs. readers: A comparative study of document metadata and content in the www. In Proc. of 7th Int'l ACM Symposium on Document Engineering, pages 177--186, Canada, 2007.
[15]
M.G. Noll and C. Meinel. Exploring social annotations for web document classifcation. In Proc. of ACM Symposium on Applied Computing, pages 2315--2320, Fortaleza, Brazil, 2008.
[16]
J. Wang, Z. Chen, L. Tao, W.-Y. Ma, and L. Wenyin. Ranking user's relevance to a topic through link analysis on web logs. In WIDM '02: Proceedings of the 4th Int'l workshop on Web information and data management, pages 49--54, USA, 2002.
[17]
R. Wetzker, C. Zimmermann, and C. Bauckhage. Analyzing social bookmarking systems: A del.icio.us cookbook. In Proc. of Mining Social Data Workshop, collocated with ECAI 2008, pages 26--30, 2008.
[18]
H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman. Sybilguard: defending against sybil attacks via social networks. SIGCOMM Comput. Commun. Rev., 36(4):267--278, 2006.
[19]
J. Zhang, M.S. Ackerman, and L. Adamic. Expertise networks in online communities: structure and algorithms. In Proc. of WWW Conference, pages 221--230. Ban, Canada, 2007.
[20]
D. Zhou, S.A. Orshanskiy, H. Zha, and C.L. Giles. Co-ranking authors and documents in a heterogeneous network. In Proc. of 7th IEEE Int'l Conference on Data Mining, pages 739--744, Washington, USA, 2007.

Cited By

View all
  • (2019)Social Network Polluting Contents Detection through Deep Learning Techniques2019 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN.2019.8852080(1-10)Online publication date: Jul-2019
  • (2017)An improved attributed graph clustering method for discovering expert role in real-world communitiesProceedings of the 10th EAI International Conference on Mobile Multimedia Communications10.4108/eai.13-7-2017.2270341(249-255)Online publication date: 8-Dec-2017
  • (2017)Annotator Expertise and Information Quality in Annotation-based RetrievalProceedings of the 22nd Australasian Document Computing Symposium10.1145/3166072.3166075(1-8)Online publication date: 7-Dec-2017
  • Show More Cited By

Index Terms

  1. Telling experts from spammers: expertise ranking in folksonomies

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGIR '09: Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval
      July 2009
      896 pages
      ISBN:9781605584836
      DOI:10.1145/1571941
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 July 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. collaborative tagging
      2. expertise
      3. folksonomy
      4. ranking
      5. spam

      Qualifiers

      • Research-article

      Conference

      SIGIR '09
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 792 of 3,983 submissions, 20%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 03 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)Social Network Polluting Contents Detection through Deep Learning Techniques2019 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN.2019.8852080(1-10)Online publication date: Jul-2019
      • (2017)An improved attributed graph clustering method for discovering expert role in real-world communitiesProceedings of the 10th EAI International Conference on Mobile Multimedia Communications10.4108/eai.13-7-2017.2270341(249-255)Online publication date: 8-Dec-2017
      • (2017)Annotator Expertise and Information Quality in Annotation-based RetrievalProceedings of the 22nd Australasian Document Computing Symposium10.1145/3166072.3166075(1-8)Online publication date: 7-Dec-2017
      • (2017)GRSATCybernetics and Systems10.1080/01969722.2016.127677048:3(140-161)Online publication date: 1-Apr-2017
      • (2016)Estimating Domain-Specific User Expertise for Answer Retrieval in Community Question-Answering PlatformsProceedings of the 21st Australasian Document Computing Symposium10.1145/3015022.3015032(33-40)Online publication date: 5-Dec-2016
      • (2016)Social Question AnsweringACM Transactions on Information Systems10.1145/294806335:1(1-40)Online publication date: 3-Sep-2016
      • (2016)Detecting Spam and Promoting Campaigns in TwitterACM Transactions on the Web10.1145/284610210:1(1-28)Online publication date: 8-Feb-2016
      • (2016)Characterization of Experts in Crowdsourcing PlatformsBelief Functions: Theory and Applications10.1007/978-3-319-45559-4_10(97-104)Online publication date: 8-Sep-2016
      • (2016)Folksonomy and Tag-Based Recommender Systems in E-Learning EnvironmentsE-Learning Systems10.1007/978-3-319-41163-7_7(77-112)Online publication date: 20-Jul-2016
      • (2015)Credibility in Information RetrievalFoundations and Trends in Information Retrieval10.1561/15000000469:5(355-475)Online publication date: 1-Dec-2015
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media