Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3342428.3342674acmotherconferencesArticle/Chapter ViewAbstractPublication PagesgoodtechsConference Proceedingsconference-collections
research-article

Towards a model of interpersonal trust in Social Media Applications

Published: 25 September 2019 Publication History

Abstract

Social Media applications have become one of the most pervasive and most used digital technologies in modern societies. Consumer uses it, among others, to share and consume information, stay in contact with other users and to stay up to date about local events and activities. As producer, it serves as a highly targeted advertising platform. However, it can be argued that the main focus of current Social Media platforms is in the promotion of premium content and not, as it is often perceived, the promotion of inter-human relationships. The former concept relies on engagement trackings, such as likes and comments, to assess interest for content targeting. Interhuman relationships, however, are more difficult to assess, measure and therefore promote. This is mostly due to the complexity of trust-based interactions between individuals. Without assessing trustworthiness however it is difficult to promote meaningful relationships in Social Media Applications. To overcome this shortcoming we introduce a model of interpersonal trust as a function of multidimensional features that applies to Social Media specific interactions.

References

[1]
A Abdul-Rahman and S Hailes. 2000. Supporting trust in virtual communities, System Sciences, 2000. In Proceedings of the 33rd Annual Hawaii International Conference. 4--7.
[2]
Patrick Albers, Olivier Camp, Jean-Marc Percher, Bernard Jouga, Ludovic Me, and Ricardo Staciarini Puttini. 2002. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. In Wireless Information Systems. 1--12.
[3]
Amr MT Ali-Eldin. 2018. Trust prediction in online social rating networks. Ain Shams Engineering Journal 9, 4 (2018), 3103--3112.
[4]
Youcef Begriche and Houda Labiod. 2009. A bayesian statistical model for a multipath trust-based reactive ad hoc routing protocol. In 2009 7th International Conference on Information, Communications and Signal Processing (ICICS). IEEE, 1--8.
[5]
Jin-Hee Cho, Kevin Chan, and Sibel Adali. 2015. A survey on trust modeling. ACM Computing Surveys (CSUR) 48, 2 (2015), 28.
[6]
Morton Deutsch. 1962. Cooperation and trust: Some theoretical notes. (1962).
[7]
Li Ding, Pranam Kolari, Shashidhara Ganjugunte, Tim XXXXX, Anupam Joshi, et al. 2004. Modeling and evaluating trust network inference. In Seventh International Workshop on Trust in Agent Societies at AAMAS 2004.
[8]
Donald L Ferrin, Kurt T Dirks, and Pri P Shah. 2006. Direct and indirect effects of third-party relationships on interpersonal trust. Journal of applied psychology 91, 4 (2006), 870.
[9]
Jennifer Golbeck. 2006. Combining provenance with trust in social networks for semantic web content filtering. In International Provenance and Annotation Workshop. Springer, 101--108.
[10]
Jennifer Ann Golbeck. 2005. Computing and applying trust in web-based social networks. Ph.D. Dissertation.
[11]
Sonja Grabner-Kräuter. 2009. Web 2.0 social networks: the role of trust. Journal of business ethics 90, 4 (2009), 505--522.
[12]
Mark Granovetter. 1985. Economic action and social structure: The problem of embeddedness. American journal of sociology 91, 3 (1985), 481--510.
[13]
Ramanthan Guha, Ravi Kumar, Prabhakar Raghavan, and Andrew Tomkins. 2004. Propagation of trust and distrust. In Proceedings of the 13th international conference on World Wide Web. ACM, 403--412.
[14]
Jahan Hassan, Harsha Sirisena, and Björn Landfeldt. 2008. Trust-based fast authentication for multiowner wireless networks. IEEE Transactions on Mobile Computing 7, 2 (2008), 247--261.
[15]
Daniel Hughes, Geoff Coulson, and James Walkerdine. 2005. Free riding on Gnutella revisited: the bell tolls? IEEE distributed systems online 6, 6 (2005).
[16]
Farookh Khadeer Hussain, Elizabeth Chang, and Tharam S Dillon. 2006. Trust Relationships and Reputation Relationships for Service Oriented Environments. In AICCSA. Citeseer, 508--510.
[17]
Razi Iqbal, Talal Ashraf Butt, Muhammad Afzaal, and Khaled Salah. 2019. Trust management in social Internet of vehicles: Factors, challenges, blockchain, and fog solutions. International Journal of Distributed Sensor Networks 15, 1 (2019), 1550147719825820.
[18]
Cuiqing Jiang, Shixi Liu, Zhangxi Lin, Guozhu Zhao, Rui Duan, and Kun Liang. 2016. Domain-aware trust network extraction for trust propagation in large-scale heterogeneous trust networks. Knowledge-Based Systems 111 (2016), 237--247.
[19]
Sepandar D Kamvar, Mario T Schlosser, and Hector Garcia-Molina. 2003. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th international conference on World Wide Web. ACM, 640--651.
[20]
Young Ae Kim. 2015. An enhanced trust propagation approach with expertise and homophily-based trust networks. Knowledge-Based Systems 82 (2015), 20--28.
[21]
Yong Seog Kim and Vinh Loc Tran. 2013. Assessing the ripple effects of online opinion leaders with trust and distrust metrics. Expert Systems with applications 40, 9 (2013), 3500--3511.
[22]
Roderick M Kramer. 1999. Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual review of psychology 50, 1 (1999), 569--598.
[23]
Ming Kwan and Deepak Ramachandran. 2009. Trust and online reputation systems. In Computing with social trust. Springer, 287--311.
[24]
Guanfeng Liu, Yan Wang, Mehmet A Orgun, Xiaoming Zheng, An Liu, Zhixu Li, and Kai Zheng. 2016. Strong Social Component-Aware Trust Sub-network Extraction in Contextual Social Networks. In 2016 IEEE International Conference on Web Services (ICWS). IEEE, 107--114.
[25]
Shixi Liu, Cuiqing Jiang, Zhangxi Lin, Yong Ding, Rui Duan, and Zhicai Xu. 2015. Identifying effective influencers based on trust for electronic word-of-mouth marketing: A domain-aware approach. Information sciences 306 (2015), 34--52.
[26]
Niklas Luhmann. 1996. (1968)Vertrauen-Ein Mechanismus der Reduktion sozialer Komplexitaet.
[27]
Junhai Luo, Xue Liu, and Mingyu Fan. 2009. A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer networks 53, 14 (2009), 2396--2407.
[28]
Paolo Massa and Paolo Avesani. 2005. Controversial users demand local trust metrics: An experimental study on epinions. com community. In AAAI. 121--126.
[29]
Yutaka Matsuo and Hikaru Yamamoto. 2009. Community gravity: measuring bidirectional effects by trust and rating on online social networks. In Proceedings of the 18th international conference on World wide web. ACM, 751--760.
[30]
Roger C Mayer, James H Davis, and F David Schoorman. 1995. An integrative model of organizational trust. Academy of management review 20, 3 (1995), 709--734.
[31]
Lik Mui, Mojdeh Mohtashemi, and Ari Halberstadt. 2002. A computational model of trust and reputation. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE, 2431--2439.
[32]
Bart Nooteboom. 2002. Trust: Forms, foundations, functions, failures and figures. Edward Elgar Publishing.
[33]
Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1999. The PageRank citation ranking: Bringing order to the web. Technical Report. Stanford InfoLab.
[34]
Wanita Sherchan, Surya Nepal, and Cecile Paris. 2013. A survey of trust in social networks. ACM Computing Surveys (CSUR) 45, 4 (2013), 47.
[35]
Rob Sherwood, Seungjoon Lee, and Bobby Bhattacharjee. 2006. Cooperative peer groups in NICE. Computer Networks 50, 4 (2006), 523--544.
[36]
Hanxu Wang, Jiulei Jiang, and Weimin Li. 2018. A Dynamic Trust Model Based on Time Decay Factor. In 2018 IEEE Smart World, Ubiquitous Intelligence &Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (Smart-World/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2048--2051.
[37]
Anuradha Yadav, Shampa Chakraverty, and Ritu Sibal. 2015. A survey of implicit trust on social networks. In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 1511--1515.
[38]
Tong Zhao, Chunping Li, Mengya Li, Qiang Ding, and Li Li. 2013. Social recommendation incorporating topic mining and social trust analysis. In Proceedings of the 22nd ACM international conference on Information & Knowledge Management. ACM, 1643--1648.
[39]
Runfang Zhou and Kai Hwang. 2007. Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on parallel and distributed systems 18, 4(2007), 460--473.

Cited By

View all
  • (2022)The Role of Trustworthiness Facets for Developing Social Media Applications: A Structured Literature ReviewInformation10.3390/info1301003413:1(34)Online publication date: 13-Jan-2022
  • (2020)The Contextual Ego Network P2P Overlay for the Next Generation Social NetworksMobile Networks and Applications10.1007/s11036-020-01525-3Online publication date: 15-Apr-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
GoodTechs '19: Proceedings of the 5th EAI International Conference on Smart Objects and Technologies for Social Good
September 2019
272 pages
ISBN:9781450362610
DOI:10.1145/3342428
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • EAI: The European Alliance for Innovation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 September 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. social media
  2. trust
  3. trust measurement
  4. trust propagation

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

GoodTechs '19

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)1
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)The Role of Trustworthiness Facets for Developing Social Media Applications: A Structured Literature ReviewInformation10.3390/info1301003413:1(34)Online publication date: 13-Jan-2022
  • (2020)The Contextual Ego Network P2P Overlay for the Next Generation Social NetworksMobile Networks and Applications10.1007/s11036-020-01525-3Online publication date: 15-Apr-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media