Sold Out
Book Categories |
Table of Contents
Introduction to Computing with Social Trust Jennifer Golbeck
The Need for Social Trust
Challenges to Computing with Social Trust
Future Questions
Conclusions
References
Part I Models of Social Trust
Examining Trust, Forgiveness and Regret as Computational Concepts Stephen Marsh and Pamela Briggs
Introduction
Why is Trust Important? Why a Formalization?
A Parable of The Modern Age
A Brief Sojourn to ‘Human Factors’: Why Not Call it
Trust After All
Trust as Was
What Can’t Trust Give Us?
Trust As Is, Part Zero: The Dark Side
Distrust
Mistrust
Untrust
Ignorance is
The Continuum, Revisited
Continuing a Difficult Relationship
Regret
What Regret Is
The Many Faces of Regret
Modeling Regret
Trust as Is, Part One: Building Regret into Trust
Forgiveness and The Blind and Toothless
What Forgiveness Is
A Model of Forgiveness
Trust As Is, Part Two: The Incorporation of Forgiveness
The Trust Continuum, Revised: The Limits of
Forgiveness
Applications: Revisiting the Parable and Imagining the Future
The Parable at Work
Regret Management
Related Work
Trust as Will Be: Future Work and Conclusions
References
A non-reductionist approach to trust Cristiano Castelfranchi, Rino Falcone, and Emiliano Lorini
Introduction
Desiderata for a logical model of social trust
A logic for trust reasoning
Syntax and semantics
Axiomatization
Possibility orders over formulas
Execution preconditions for action execution
A formal ontology of Trust
Core trust
Distrust, lack of trust and mistrust
Delegation and decision to trust
Comparative trust
Conclusion
References
Social Trust of Virtual Identities Jean-Marc Seigneur
Introduction
Identity Terminology
Computational Trust Terminology
Flawed Trust Computation due to Simplistic Identity Approach
Computational Trust under Identity Usurpation and Multiplicity Attacks
Remaining ASUP Issues due to Identity Shortcomings
Entification: Bridging Trust and Virtual Identities
Recognition rather than Authentication
End-to-End Trust
Means for Recognition Adaptation
Encouraging Privacy and Still Supporting Trust
Accuracy and Attack-Resistance of the Trust Values
Entification Framework Evaluation
Trust Transfer Applied to the Email Domain
ASUP Evaluation
Conclusion
References
Part II Propagation of Trust
Attack resistant trust metrics Raph Levien
Introduction
Attack resistance
Redundant certification paths
3 Group trust metric
Proof of attack resistance
Implementation in Advogato
Eigenvector trust metrics
Shastic model of PageRank
Attack resistance of PageRank
Advogato’s eigenvector metric
References
On Propagating Interpersonal Trust in Social Networks Cai-Nicolas Ziegler
Introduction
Trust in Social Networks
Classification of Trust Metrics
Semantic Web Trust
Local Group Trust Metrics
Outline of Advogato Maxflow
Appleseed Trust Metric
Comparison of Advogato and Appleseed
Parameterization and Experiments
Implementation and Extensions
Testbed for Local Group Trust Metrics
Distrust
Semantics of Distrust
Incorporating Distrust into Appleseed
Discussion
Acknowledgements
References
The Ripple Effect: Change in Trust and Its Impact over a Social Network Jennifer Golbeck and Ugur Kuter
Introduction
Trust Inference Algorithms
Local vs Global
Central Authority vs. Group vs. Individual
Computation Methods
Algorithms Studied
Inference Algorithms Based on Matrix Arithmetic
Network-Path Inference Algorithms
Experimental Setup
Results
Number and Distance of Changes
The Magnitude of Change
Influence of the Network Structure
Other Changes in Trust Inference
Discussion and Conclusions
References
Part III Applications of Trust
Eliciting Informative Feedback: The Peer-Prediction Method Nolan Miller and Paul Resnick and Richard Zeckhauser
Introduction
A Mechanism for Eliciting Honest Feedback
The Base Case
Eliciting Effort and Deterring Bribes
Voluntary Participation and Budget Balance
Extensions
Sequential Interaction
Continuous Signals
Issues in Practical Application
Risk Aversion
Choosing a Scoring Rule
Estimating Types, Priors, and Signal Distributions
Taste Differences Among Raters
Non-Common Priors and Other Private Information
Other Potential Limitations
Conclusion
References
Proofs
Eliciting Effort
References
Capturing Trust in Social Web Applications John O’Donovan
Introduction
Research on Trust in the Social Web
Trust Sources on the Social Web
Source 1: Modeling Trust from Ratings in ACF Recommender Systems
Combining Trust in ACF
Capturing Profile-Level & Item-Level Trust
Trust-Based Recommendation
Evaluation
Building Trust
Recommendation Error
Discussion
Source 2: Extracting Trust From Online Auction Feedback Comments
The AuctionRules Algorithm
Evaluation
Setup
Comparing AuctionRules With Machine Learning Techniques
Coverage and Distribution Experiments
Discussion
Source 3: Extracting Trust through an Interactive Interface
Fair Representation of Genre Information
Visualising Trust Relations in PeerChooser
Implementation
Evaluation
Experimental Data
Rating Distributions
Procedure
Recommendation Accuracy
Comparison of different Trust Sources
Conclusions
References
Trust Metrics in Recommender Systems Paolo Massa and Paolo Avesani
Introduction
Motivations
Our proposal: Trust-aware Recommender Systems
Trust networks and trust metrics
An Architecture of Trust-aware Recommender Systems
How trust alleviates RS weaknesses
Related work
Empirical validation
Dataset used in experiments: Epinions
New evaluation measures
Results of the experiments
Discussion of results
Conclusions
References
Trust and Online Reputation Systems Ming Kwan and Deepak Ramachandran
Introduction
What is trust?
The Complex World of Online Trust
Learning to gauge intention
Evaluating and Validating Competence
Web 1.0 vs. Web 2.0
How can it help me?
The New Model of Online Trust
Reputation
Trouble in Paradise—the SAP Developer Network
When to use reputation as the basis for trust
Relationship
Social Networking
Opening up APIs
Exploiting the value of social networks
iLike...to share...and lend
Sponsored Groups
When to use relationship as the basis for trust
Process
Caught in the act - reinforcing process
So What?
When to use process as the basis for trust
A recipe for online trust based on three ingredients
References
Internet Based Community Networks: Finding the Social in Social Networks K. Faith Lawrence
Introduction
Defining Community in the Age of Social Networks
Visualising Community
Communities, Groups and Networks
Community Trust
Conclusion
References
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionComputing with Social Trust
X
This Item is in Your InventoryComputing with Social Trust
X
You must be logged in to review the productsX
X
X
Add Computing with Social Trust, As open, distributed systems like the Web continue to grow, and more and more content created by users becomes available, the question of whom and what can be trusted becomes increasingly important. This book looks at one solution—social trust relationshi, Computing with Social Trust to the inventory that you are selling on WonderClubX
X
Add Computing with Social Trust, As open, distributed systems like the Web continue to grow, and more and more content created by users becomes available, the question of whom and what can be trusted becomes increasingly important. This book looks at one solution—social trust relationshi, Computing with Social Trust to your collection on WonderClub |