Exploring Trust Dynamics in Online Social Networks: A Social Network Analysis Perspective
Abstract
:1. Introduction
1.1. Trust Dynamics in Social Networks
- Definitions of Trust: We clarify different academic and practical definitions of trust, providing a broad understanding that caters to diverse social networking contexts.
- Mechanisms of Trust Formation: We analyze how trust is built, maintained, and broken within social networks, highlighting the role of communication patterns, shared experiences, and mutual friends in influencing trust levels.
1.2. Key Contributions and Implications
- Innovative Methodologies: We present novel machine-learning techniques specifically developed to address the challenges of modeling trust in the complex environment of social networks.
- Empirical Insights: Our study provides empirical data and analyses that deepen the understanding of trust dynamics and their implications for online communities.
- Practical Implications: The findings have significant practical implications, offering guidelines for designing digital platforms that foster trust and community engagement.
2. Related Work
- Adapting Psychological Constructs for Online Contexts: We refine psychological theories of trust to better suit digital interactions, applying machine-learning techniques to detect subtleties in online communication that influence trust.
- Enhancing Sociological Models with Real-time Data: We integrate real-time interaction data into sociological models, improving their applicability to dynamic online social networks where trust relationships evolve rapidly.
- Incorporating Ethical Data Practices: In response to concerns about privacy and data ethics in machine-learning models, our methodology emphasizes transparent and responsible data usage, ensuring that trust predictions are both accurate and ethically sound.
3. Methodologies for Trust Prediction in Social Networks
3.1. Graph-Based Prediction Models
3.2. Prediction Models Based on Interactions
- Dissemination of Trust: This strategy posits that trust, much like information, proliferates through social connections. It is based on the observation that users are likely to develop trust following positive interactions. Techniques such as random walks, matrix factorization, and graph-based methods are utilized to disseminate trust scores across the network. This diffusion process relies on user interactions as a primary source for mapping the trust landscape, suggesting that trust can be quantitatively spread and measured throughout the social fabric.
- Collaborative Filtering: Traditionally pivotal in recommender systems, collaborative filtering finds a parallel application in trust prediction by scrutinizing patterns of user interactions. It pinpoints trust relationships by matching users with analogous interaction patterns, effectively using the aggregated experiences of similar users as a proxy to infer trust connections. This method capitalizes on the premise that shared behaviors and preferences can serve as a basis for establishing trust.
- Patterns of Interaction: This approach zeroes in on the qualitative aspects of interactions, such as frequency, recency, sentiment, and consistency, to unearth potential indicators of trust. Advanced machine-learning models, including decision trees, support vector machines, and neural networks, are deployed to analyze these interaction attributes and predict trust relationships. By focusing on the depth and nature of user engagements, this method aims to extract trust signals from nuanced behavioral patterns.
- Temporal Dynamics: Acknowledging the fluidity of trust, this model incorporates both the current and historical context of interactions to understand trust evolution. It examines the stability and variations in trust levels over time, offering insights into how trust relationships develop, wane, or persist. This dynamic approach to trust prediction recognizes that the significance of interactions can change, providing a comprehensive view that encompasses the temporal dimension of user relationships.
3.3. Hybrid Prediction Models
- TDTrust Model: The TDTrust model, unveiled by Ghafari in 2018, stands as a quintessential example of this hybrid methodology. It is designed to meticulously capture the multifaceted nature of trust relationships by amalgamating interaction data with insights into the network’s structural aspects. This dual-focused approach aims at delivering predictions of trust relationships with a significantly enhanced level of precision, highlighting the model’s ability to navigate the complexities inherent in trust dynamics [39].
- Tensor Decomposition Approach: Pushing the boundaries further, the tensor decomposition approach offers an innovative lens through which the trust framework is analyzed. Employing a three-dimensional tensor decomposition technique, this method paves the way for direct and structured exploration of trust relationships. It adeptly integrates various dimensions of user data and network structure into the analysis, providing a multifaceted approach to trust prediction that acknowledges the layered complexity of social interactions and network configurations.
- SETTrust: This model takes an unsupervised approach to trust prediction, weaving social exchange theory into the fabric of its methodology [40]. It operates on the foundational belief that trust relationships are essentially transactions where relationships burgeon when the perceived benefits surpass the costs involved. By embedding this cost-benefit analysis into its core, SETTrust offers profound insights into the mechanics of trust formation and sustainability within social networks.
- Trust Link Detection System: This system is specifically designed to navigate the nuanced terrain of subjective trust and reputation among users [41]. By calculating subjective trust based on historical interactions and gauging reputation through the aggregation of community-based trust evaluations, the system adopts a comprehensive approach to understanding trust relationships. This methodology acknowledges the importance of both individual user experiences and collective community perceptions in crafting a multi-layered picture of trust within social networks.
3.4. Types of Prediction Algorithms
3.4.1. Supervised Methods
- Attribute-Based Models: Utilizing user attributes and interactions, these models apply classifiers to infer trust relationships. By analyzing demographics, profile characteristics, and textual content, they offer nuanced predictions of trust levels, emphasizing the importance of personal and behavioral data in trust assessment [35].
- Cluster-Based Approaches: By grouping users with similar attributes or interaction patterns, these personalized models enhance the specificity of trust predictions. Classifiers trained within these clusters provide tailored trust assessments, showcasing the value of segmentation in understanding trust dynamics [42].
- Reputation-Focused Models: Prioritizing user reputation, these models employ binary classification to evaluate and predict trust. By analyzing user ratings and interactions, they assess the impact of reputation on trust, highlighting the significance of community feedback in trust inference [43].
- Hybrid Techniques: Combining Dempster–Shafer theory with neural networks, these models improve trust inference through a blend of evidential reasoning and deep learning. This approach underlines the synergy between traditional belief theories and modern machine learning in enhancing trust prediction accuracy [44].
- Feature-Rich Classifiers: Employing classifiers with a broad spectrum of features, including demographics, profile details, and content analysis, these models aim to capture the complex dynamics of trust in social networks. They illustrate the importance of a multifaceted approach in accurately modeling trust relationships [45].
- User-Rating Based Algorithms: Focusing on user ratings on review platforms, these models infer trust relationships by highlighting the role of rating similarity. This approach underscores the predictive value of shared opinions and experiences in trust formation [46].
- Graph-Based Feature Analysis: Integrating graph-based features with user ratings, these studies employ decision tree algorithms for trust prediction. They demonstrate how combining structural network analysis with user feedback can enrich trust prediction models [47].
- Multi-Class Classifier Framework: Utilizing multi-class classifiers and integrating RESTful architecture and SVM techniques, this framework exemplifies the application of complex machine-learning strategies in social network trust prediction, highlighting the role of advanced classification methods [48].
- Demographic-Focused Classifier: The DCAT classifier, by incorporating demographic data and textual content analysis, focuses on enhancing trust prediction accuracy. This model reveals the predictive power of demographic information in trust assessment [40].
- Time-Based Prediction Models: Addressing trust prediction as a time-link problem, these approaches examine temporal interaction patterns to predict trust dynamics over time. They spotlight the importance of historical interaction data in forecasting trust evolution [49].
- Trust Management Frameworks: In pervasive computing environments, these models enable devices to evaluate the trustworthiness of others based on historical interactions, showcasing the application of trust prediction beyond social networks into device interactions [50].
- Reputation Features Model: Focusing on reputation features for supervised trust prediction, this probabilistic model addresses the initial trust establishment challenge, emphasizing the critical role of reputation in trust prediction [51].
- Topic-Centric Trust Estimator: Evaluating trustworthiness based on topic similarity measures on Twitter, this model highlights the role of content relevance in trust assessment, showcasing the importance of topical alignment in trust dynamics [52].
- Multi-Dimensional Trust Prediction: The CommTrust approach, evaluating trust based on user comments, addresses overly positive reputation issues. It underscores the complexity of trust inference and the need for multi-dimensional analysis in trust prediction [53].
3.4.2. Unsupervised Methods
- hTrust: This model exploits homophily in trust prediction by identifying users with similar rating behaviors. It considers the similarity in items rated, rating values for similar items, and overall rating patterns to predict trust [54].
- sTrust: Leverages social state theory alongside the PageRank algorithm to prioritize users of higher social status as more trustworthy within the network. This model infers that social influence and status can be significant indicators of trustworthiness, providing a unique angle to trust prediction by incorporating the hierarchical structure of social interactions [55].
- Trust Transfer Model: Introduces the innovative concept of trust transference across different contexts, allowing trust established in one domain to inform trust predictions in another. This approach acknowledges the multifaceted nature of trust and its applicability across various scenarios, making it a versatile tool for trust prediction in diverse environments [56].
- Trust-aware Recommendation Systems: Addresses the challenge of enhancing the accuracy of rating predictions by constructing dynamic trust networks between users. By analyzing similarity values and trust declarations, this system adapts to the evolving nature of trust within social networks, therefore refining the quality of recommendations based on updated trust dynamics [57].
- Trust-ACO: Applies Ant Colony Optimization to delineate trusted paths and cycles within the network, focusing on identifying the most reliable routes for service discovery. This method combines probabilistic trust rules with an understanding of social familiarity, showcasing how optimization algorithms can be tailored to navigate the complexities of trust in social networks [58].
- Social Trust-based Prediction: Utilizes matrix factorization to explore the influence of established trust metrics on the prediction of pairwise trust relationships. This method systematically identifies which trust metrics are most indicative of accurate trust predictions, enhancing the precision of trust inference in social networks [59].
- eTrust: Concentrates on dynamic trust prediction for users on product review websites, employing matrix factorization techniques to model trust as it evolves through user interactions. This model is particularly adept at capturing changing trust dynamics, reflecting the transient nature of user preferences and trust over time [60].
- Joint Multiple Factorization Method: Investigates trust prediction as a link prediction challenge, using joint multiple factorization to assess similarities at the user group level across correlated graphs. This approach leverages the shared behaviors and tastes within social circles to predict trust, emphasizing the collective aspect of trust dynamics [61].
- Feature Recognition-based Approach: An unsupervised method that identifies key features associated with trust, aiding in the comprehension of how trust is formed and maintained within social networks. This approach highlights the importance of feature selection in understanding and predicting trust dynamics accurately [62].
- Ranking System for User Reputation: Evaluates trust through the lens of user reputation and social connections, offering a novel perspective on trustworthiness based on the aggregation of community-based reputation insights. This system provides a framework for assessing trust relationships by leveraging collective reputation data [63].
- Trust-awareness for Personalized QoS: Implements trust-awareness to optimize personalized Quality of Service (QoS) delivery. By measuring user reputation and identifying groups of similar trusted users, this approach tailors service delivery to align with the trust-based preferences of the user community, ensuring reliable and personalized service experiences [64].
- Method for Correlation between Social Media and Financial Data: Enhances the understanding of the correlation between social media activity and financial data, particularly in the stock market context. By analyzing Twitter data related to stocks, this method identifies significant correlations that can inform investment and financial decisions, illustrating the broader applicability of trust and sentiment analysis [65].
- Study on Trust Dynamics: Delves into the computational modeling of distrust within social networks, offering insights into not just trust but also its counterpart, distrust. This research contributes to a more comprehensive understanding of trust dynamics, recognizing the importance of both trust and distrust in shaping social interactions [66].
- Influence of Social Status on Trust: Investigates how the perceived social status of users within a network affects trust relationships. This study provides valuable insights into the sociological aspects of trust, underscoring the impact of social hierarchy on trust formation and sustainability within social networks [67].
4. Implementation
4.1. Data Preprocessing
- Exploratory Analysis and Cleaning: Initial exploratory analysis is vital for understanding the dataset’s characteristics, including identifying key variables that may influence trust, detecting anomalies, and discerning underlying patterns. Cleaning is a meticulous process that rectifies common data issues such as missing values, outliers, and inaccuracies, which, if left unaddressed, could skew the model’s outcomes. Techniques like imputation for missing values or outlier detection and removal can significantly enhance data quality and reliability.
- Feature Engineering and Selection: This process involves the creation of new features that better encapsulate the nuances of trust within social networks, alongside the selection of the most impactful features. Effective feature engineering might include deriving new variables from existing data that highlight the frequency, recency, and type of interactions indicative of trust. Feature selection, possibly through methods like principal component analysis (PCA) or models with embedded feature importance evaluation, helps reduce the dimensionality of the data. This step is pivotal in concentrating the model’s attention on the most informative aspects of the data, which can lead to improved prediction accuracy and model interpretability. We developed specialized features to better capture the dynamic nature of trust in social networks. These features include time decay functions for interaction metrics and sentiment aggregation over dynamic time windows tailored to the evolving context of social media data. These methods address the complexities of trust dynamics more effectively than conventional feature engineering practices.
- Normalization and Encoding: Normalizing numerical features ensures that all variables contribute equally to the model’s decision process, preventing features with larger scales from dominating the prediction. Encoding categorical variables into a numerical format through techniques such as one-hot encoding or target encoding is crucial for incorporating these variables into machine-learning algorithms effectively. These steps are instrumental in preparing the data for analysis, ensuring compatibility with various machine-learning algorithms that require numerical input.
- Dataset Division: Properly dividing the dataset into training and testing sets or utilizing cross-validation techniques is essential for evaluating the model’s performance accurately. This division guarantees that the model is both trained and assessed on different subsets of the data, offering an unbiased estimation of its predictive power. Techniques like k-fold cross-validation further enhance model evaluation by ensuring that every data point is used for both training and validation across different iterations, thereby providing a more comprehensive assessment of the model’s generalization capabilities.
4.1.1. Data Identification
- Feature Analysis: Involves examining feature types (e.g., numeric, categorical) and their distributions to determine their potential impact on model performance.
- Handling Anomalies: Focuses on identifying and addressing missing values, outliers, and other anomalies that could compromise the accuracy and reliability of the predictive models.
4.1.2. Label Encoding
- Integer Mapping: Categorical values are transformed into integers, facilitating algorithmic processing by assigning a unique integer to each category.
- Alternative Encodings: One-hot encoding is considered to mitigate ordinal implications, creating binary columns for each category and ensuring that machine-learning models do not infer an unintended order among categories.
4.1.3. Data Formatting
- Scaling Techniques: The application of Min-Max scaling or Z-score normalization adjusts feature scales to a common range, crucial for models sensitive to feature magnitude.
- Normalization: Transforming skewed data distributions into more uniform or normal distributions enhances model performance by addressing data bias and variance issues.
4.1.4. Dataset Splitting
- Training Set Utilization: The training set plays a key role in model development, offering a diverse array of examples from which the model learns. The breadth of the training data directly impacts the model’s ability to understand and predict complex trust relationships, with larger datasets typically leading to better generalization.
- Testing Set Evaluation: The testing set is essential for objectively assessing the model’s effectiveness on unseen data. This independent evaluation ensures that the performance metrics accurately represent the model’s predictive capabilities in real-world scenarios.
4.2. Machine-Learning Algorithms
- Logistic Regression: This model excels in situations where the relationship between the trust level and the features is approximately linear. Its transparency and simplicity make it ideal for initial analyses, providing clear insights into how each feature influences the likelihood of trust.
- K-Nearest Neighbors (KNN): KNN’s instance-based learning is particularly effective for trust prediction in densely connected social networks. It can adaptively infer trust levels based on the similarity and proximity of users, capturing local patterns within the network’s structure.
- Random Forest: By aggregating decisions from multiple trees, Random Forest mitigates the risk of overfitting, making it robust across diverse data distributions. Its ensemble nature allows it to handle the complexity and non-linearity of trust relationships, offering detailed insights into feature importance.
- Extra Trees: Similar to Random Forest but with added randomness in feature selection, Extra Trees can uncover more subtle trust signals within the data. This approach is particularly beneficial when traditional feature selection methods might overlook intricate patterns indicative of trust.
- Support Vector Machine (SVM): SVM’s capacity to find the optimal hyperplane for class separation makes it adept at distinguishing between varying levels of trust. Its kernel trick allows for modeling complex, non-linear trust relationships that might be present in social networks.
- Naive Bayes: This probabilistic model, with its assumption of feature independence, is especially suited for text-based user interaction analysis. It can efficiently process large volumes of text data, such as user comments or messages, to predict trust based on communication patterns.
- AdaBoost: By focusing iteratively on challenging instances, AdaBoost refines the model’s ability to predict trust in ambiguous or borderline cases. This adaptive boosting of weak learners is valuable for enhancing model performance in predicting nuanced trust levels.
- Decision Tree: Decision Trees offer a straightforward visualization of how different features contribute to trust predictions. The model’s hierarchical structure mirrors decision-making processes, making it intuitive for understanding trust determinants.
- Gradient Boosting: This technique sequentially corrects errors from previous models, making it highly effective for complex datasets with intricate trust dynamics. Gradient Boosting’s iterative refinement is key for achieving high accuracy in trust-level predictions.
- Neural Networks: With their deep learning capabilities, Neural Networks are unparalleled in modeling the intricate and abstract patterns of trust within social networks. Their layered architecture enables the capture and analysis of complex relationships and interactions that define trust levels.
4.3. Performance Evaluation and Experimental Procedure
4.3.1. Performance Evaluation
4.3.2. Experimental Procedure
4.3.3. Implementation Tools
5. Experimental Evaluation
- Accuracy: Offers a general measure of the models’ overall performance by calculating the proportion of correctly predicted instances.
- Precision: Assesses the models’ ability to correctly identify positive instances, crucial for minimizing false positives in trust prediction.
- Recall (Sensitivity): Measures the models’ capability to capture all relevant instances, emphasizing the importance of minimizing false negatives.
- F1-Score: Provides a balanced metric that harmonizes precision and recall, serving as a critical measure for evaluating the models’ efficiency in predicting trust levels accurately.
- User Behaviors: Quantitative data from user interactions (likes, comments, shares) that imply trust are used to label data points as ‘trusted’ or ‘not trusted’.
- Expert Annotations: Subject matter experts provide labels for a subset of data, which helps in calibrating the trust inference model, particularly in ambiguous cases.
- 1.
- Feature Engineering:
- Contextual Relevance: We adapted feature selection to emphasize contextually relevant information extracted from user interactions, which are critical for assessing trust. This includes linguistic cues and patterns of communication that standard models might not prioritize without domain-specific adjustments.
- Temporal Dynamics: Understanding that trust dynamics evolve over time, we incorporated temporal features that capture changes in user behavior and interaction frequency, which standard applications of these models might overlook.
- 2.
- Model Customization:
- Hyperparameter Tuning: We specifically tuned the model parameters to handle the sparse and high-dimensional nature of social media data, which differs significantly from the structured datasets these models typically handle.
- Bias-Variance Tradeoff Adjustments: Given the noisy nature of social media data, adjustments were made to the complexity of the models to optimize for the bias-variance tradeoff, enhancing their predictive performance on this particular type of data.
- 3.
- Validation Techniques:
- Stratified Sampling: To address the non-uniform distribution of trust indicators across the dataset, we used stratified sampling techniques in our cross-validation process to ensure that each fold is representative of the overall dataset.
- Performance Metrics Adjustment: We selected and adjusted performance metrics that are particularly suited to the uneven class distributions and the specific nuances of trust prediction in social media contexts.
To ensure the robustness and applicability of our models, we employed advanced cross-validation techniques tailored to the specifics of social network data. We implemented stratified and time-series cross-validation to handle the non-i.i.d nature of our data, enhancing the reliability of our findings and ensuring that our models are validated against realistic scenarios of social media interactions.
5.1. Exploring Mental Well-Being through Facebook Interaction Analysis
5.1.1. Dataset
5.1.2. Potential Applicability to Other Datasets
5.1.3. Ground Truth Justification
- User-Generated Data: Trust labels are assigned based on user interactions such as likes, comments, and shares, which are indicative of positive trust indicators in social dynamics.
- Expert Annotations: For a subset of data, trust labels are corroborated by expert reviewers familiar with the context and dynamics of the social network, ensuring that the trust definitions align with practical user experiences.
- Consistency Checks: We apply consistency checks across different data points to validate the reliability of the trust definitions, enhancing the integrity of our ground truth.
5.1.4. Data Points Utilized
- Exchange frequency of messages and comments
- Posting activity on each other’s walls
- Emotional positivity in received messages
- Use of words expressing familiarity
- Time elapsed since the last interaction
5.1.5. Attachment Strength Calculation
- −0.76 for days since last communication emphasizes the decline in relationship strength over time without interaction, highlighting the importance of recent engagements.
- 0.111 and 0.135 for words expressing intimacy and positive emotions, respectively, underscore the significant impact of emotional depth and positivity in maintaining strong social bonds.
- 0.299 for active interaction metrics (wall posts, messages, comments) reflects their role in sustaining and enhancing visible and frequent engagement, essential for robust social ties.
5.1.6. Model and Results
5.2. Performance Evaluation of Predictive Models
5.3. Case Studies of Trust Relationships Identified by Machine-Learning Models
- 1.
- Case Study 1: Detection of Influential Trust Hubs
- Background: Utilizing the graph-based analysis, our models identified central nodes within the network, which were verified as influential trust hubs based on their high engagement and frequent interactions.
- Model Insights: The model leveraged user engagement metrics such as frequency of interactions and the breadth of user connections to pinpoint these hubs.
- Outcome: This identification helps in understanding how trust propagates through the network and the roles these hubs play in disseminating information and influencing community trust levels.
- 2.
- Case Study 2: Recovery of Trust Post-Misinformation
- Background: After an incident of misinformation, our models were able to track the recovery of trust levels among users by analyzing changes in interaction patterns over time.
- Model Insights: By applying time-series analysis, the models observed gradual increases in positive interactions, signaling a restoration of trust.
- Outcome: This case study demonstrates the model’s ability to not only detect disruptions in trust but also to monitor the recovery phase, offering valuable insights for managing trust in digital communities.
5.4. Discussion
5.5. Methodological Reflections and Limitations
6. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Drakopoulos, G.; Kanavos, A.; Paximadis, K.; Ilias, A.; Makris, C.; Mylonas, P. Computing Massive Trust Analytics for Twitter using Apache Spark with Account Self-assessment. In Proceedings of the 16th International Conference on Web Information Systems and Technologies (WEBIST), Budapest, Hungary, 3–5 November 2020; pp. 403–414. [Google Scholar]
- Sherchan, W.; Nepal, S.; Paris, C. A survey of trust in social networks. ACM Comput. Surv. 2013, 45, 1–33. [Google Scholar] [CrossRef]
- Bishop, C.M. Neural networks and their applications. Rev. Sci. Instrum. 1994, 65, 1803–1832. [Google Scholar] [CrossRef]
- Ghafari, S.M.; Beheshti, A.; Joshi, A.; Paris, C.; Mahmood, A.; Yakhchi, S.; Orgun, M.A. A Survey on Trust Prediction in Online Social Networks. IEEE Access 2020, 8, 144292–144309. [Google Scholar] [CrossRef]
- Kim, Y.A.; Le, M.; Lauw, H.W.; Lim, E.; Liu, H.; Srivastava, J. Building a Web of Trust without Explicit Trust Ratings. In Proceedings of the 2008 IEEE 24th International Conference on Data Engineering Workshop, Cancun, Mexico, 7–12 April 2008; pp. 531–536. [Google Scholar]
- He, C.; Zeng, J.; Zhang, G.; Liu, S. Generalized opinion dynamics model for social trust networks. J. Comb. Optim. 2022, 44, 3641–3662. [Google Scholar] [CrossRef]
- Nepal, S.; Sherchan, W.; Bouguettaya, A. A Behaviour-Based Trust Model for Service Web. In Proceedings of the 2010 IEEE International Conference on Service-Oriented Computing and Applications (SOCA), Perth, WA, Australia, 13–15 December 2010; pp. 1–4. [Google Scholar]
- Kanavos, A.; Kafeza, E.; Makris, C. Can We Rank Emotions? A Brand Love Ranking System for Emotional Terms. In Proceedings of the IEEE International Congress on Big Data, New York, NY, USA, 27 June–2 July 2015; IEEE Computer Society: Los Alamitos, CA, USA, 2015; pp. 71–78. [Google Scholar]
- Kanavos, A.; Perikos, I.; Hatzilygeroudis, I.; Tsakalidis, A.K. Emotional community detection in social networks. Comput. Electr. Eng. 2018, 65, 449–460. [Google Scholar] [CrossRef]
- Arrow, K.J. Economic Welfare and the Allocation of Resources for Invention; Springer: Berlin/Heidelberg, Germany, 1972. [Google Scholar]
- Rotter, J.B. Interpersonal trust, trustworthiness, and gullibility. Am. Psychol. 1980, 35, 1. [Google Scholar] [CrossRef]
- Coleman, J.S. Social capital in the creation of human capital. Am. J. Sociol. 1988, 94, S95–S120. [Google Scholar] [CrossRef]
- Granovetter, M.S. The strength of weak ties. Am. J. Sociol. 1973, 78, 1360–1380. [Google Scholar] [CrossRef]
- Burt, R.S.; Celotto, N. The network structure of management roles in a large matrix firm. Eval. Program Plan. 1992, 15, 303–326. [Google Scholar] [CrossRef]
- Donath, J.; Boyd, D. Public displays of connection. Technol. J. 2004, 22, 71–82. [Google Scholar] [CrossRef]
- DuBois, T.; Golbeck, J.; Srinivasan, A. Predicting Trust and Distrust in Social Networks. In Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, Boston, MA, USA, 9–11 October 2011; pp. 418–424. [Google Scholar]
- Breiman, L. Random Forests; Chapman & Hall: London, UK, 2001. [Google Scholar]
- Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; MIT Press: Cambridge, MA, USA, 2016. [Google Scholar]
- Liu, Y.; Ying, X. A Review of Social Network Sites: Definition, Experience, and Applications. Available online: https://file.scirp.org/pdf/18-2.1.31.pdf (accessed on 24 March 2024).
- Golbeck, J.; Parsia, B.; Hendler, J.A. Trust Networks on the Semantic Web. In Proceedings of the International Workshop on Cooperative Information Agents, Helsinki, Finland, 27–29 August 2003; pp. 238–249. [Google Scholar]
- Zhang, Y.; Yu, T. Mining Trust Relationships from Online Social Networks. J. Comput. Sci. Technol. 2012, 27, 492–505. [Google Scholar] [CrossRef]
- Hang, C.W.; Singh, M.P. Trust-Based Recommendation Based on Graph Similarity. Available online: https://www.csc2.ncsu.edu/faculty/mpsingh/papers/mas/aamas-trust-10-graph.pdf (accessed on 24 March 2024).
- Ziegler, C.; Lausen, G. Spreading Activation Models for Trust Propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce and e-Service, Taipei, Taiwan, 28–31 March 2004; pp. 83–97. [Google Scholar]
- Zuo, Y.; Hu, W.; O’Keefe, T. Trust Computing for Social Networking. In Proceedings of the 2009 Sixth International Conference on Information Technology, New Generations, Las Vegas, NV, USA, 27–29 April 2009; pp. 1534–1539. [Google Scholar]
- Caverlee, J.; Liu, L.; Webb, S. Socialtrust: Tamper-Resilient Trust Establishment in Online Communities. In Proceedings of the ACM/IEEE Joint Conference on Digital Libraries (JCDL 2008), Pittsburgh, PA, USA, 16–20 June 2008; pp. 104–114. [Google Scholar]
- Liu, G.; Wang, Y.; Orgun, M.A.; Liu, H. Discovering Trust Networks for the Selection of Trustworthy Service Providers in Complex Contextual Social Networks. In Proceedings of the 2012 IEEE 19th International Conference on Web Services, Honolulu, HI, USA, 24–29 June 2012; pp. 384–391. [Google Scholar]
- Guo, G.; Zhang, J.; Zhu, F.; Wang, X. Factored similarity models with social trust for top-N item recommendation. Knowl. Based Syst. 2017, 122, 17–25. [Google Scholar] [CrossRef]
- Cai, M.; Wang, Y.; Gong, Z. An Extension of Social Network Group Decision-Making Based on TrustRank and Personas. Int. J. Comput. Intell. Syst. 2020, 13, 332–340. [Google Scholar] [CrossRef]
- Kim, Y.A.; Song, H.S. Strategies for predicting local trust based on trust propagation in social networks. Knowl. Based Syst. 2011, 24, 1360–1371. [Google Scholar] [CrossRef]
- Tang, J.; Sun, J.; Wang, C.; Yang, Z. Social Influence Analysis in Large-Scale Networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 28 June–1 July 2009; pp. 807–816. [Google Scholar]
- Fogel, J.; Nehmad, E. Internet social network communities: Risk taking, trust, and privacy concerns. Comput. Hum. Behav. 2009, 25, 153–160. [Google Scholar] [CrossRef]
- Kumar, S.; Mallik, A.; Khetarpal, A.; Panda, B.S. Influence maximization in social networks using graph embedding and graph neural network. Inf. Sci. 2022, 607, 1617–1636. [Google Scholar] [CrossRef]
- Graph Neural Network and Some of GNN Applications. Available online: https://neptune.ai/blog/graph-neural-network-and-some-of-gnn-applications (accessed on 17 April 2024).
- Jamali, M.; Ester, M. TrustWalker: A Random Walk Model for Combining Trust-Based and Item-Based Recommendation. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 28 June–1 July 2009; pp. 397–406. [Google Scholar]
- Liu, H.; Lim, E.P.; Lauw, H.W.; Le, M.T.; Sun, A.; Srivastava, J.; Kim, Y.A. Predicting Trusts Among Users of Online Communities: An Epinions Case Study. In Proceedings of the 9th ACM Conference on Electronic Commerce, Chicago, IL, USA, 8–12 June 2008; pp. 310–319. [Google Scholar]
- Ghavipour, M.; Meybodi, M.R. Trust propagation algorithm based on learning automata for inferring local trust in online social networks. Knowl. Based Syst. 2018, 143, 307–316. [Google Scholar] [CrossRef]
- Adali, S.; Escriva, R.; Goldberg, M.K.; Hayvanovych, M.; Magdon-Ismail, M.; Szymanski, B.K.; Wallace, W.A.; Williams, G.T. Measuring behavioral trust in social networks. In Proceedings of the 2010 IEEE International Conference on Intelligence and Security Informatics, Vancouver, BC, Canada, 23–26 May 2010; pp. 150–152. [Google Scholar]
- Sacco, O.; Breslin, J.G. In users we trust: Towards social user interactions based Trust Assertions for the Social Semantic Web. Soc. Netw. Anal. Min. 2014, 4, 229. [Google Scholar] [CrossRef]
- Ghafari, S.M.; Yakhchi, S.; Beheshti, A.; Orgun, M.A. SETTRUST: Social Exchange Theory Based Context-Aware Trust Prediction in Online Social Networks. In Proceedings of the 5th International Workshop on Data Quality and Trust in Big Data (QUAT), Dubai, United Arab Emirates, 12–15 November 2018; Springer: Berlin/Heidelberg, Germany, 2018; Volume 11235, pp. 46–61. [Google Scholar]
- Ghafari, S.M.; Joshi, A.; Beheshti, A.; Paris, C.; Yakhchi, S.; Orgun, M.A. DCAT: A Deep Context-Aware Trust Prediction Approach for Online Social Networks. In Proceedings of the 17th International Conference on Advances in Mobile Computing & Multimedia, Munich, Germany, 2–4 December 2019; pp. 20–27. [Google Scholar]
- Bo, Z.; Huan, Z.; Meizi, L.; Qin, Z.; Jifeng, H. Trust traversal: A trust link detection scheme in social network. Comput. Netw. 2017, 120, 105–125. [Google Scholar] [CrossRef]
- Ma, N.; Lim, E.; Nguyen, V.; Sun, A.; Liu, H. Trust relationship prediction using online product review data. In Proceedings of the 1st ACM International Workshop on Complex Networks Meet Information & Knowledge Management, Hong Kong, China, 6 November 2009; pp. 47–54. [Google Scholar]
- Graña, M.; Nuñez-Gonzalez, J.D.; Ozaeta, L.; Kaminska-Chuchmala, A. Experiments of Trust Prediction in Social Networks by Artificial Neural Networks. Cybern. Syst. 2015, 46, 19–34. [Google Scholar] [CrossRef]
- Wang, X.; Wang, Y.; Sun, H. Exploring the Combination of Dempster-Shafer Theory and Neural Network for Predicting Trust and Distrust. Comput. Intell. Neurosci. 2016, 2016, 5403105. [Google Scholar] [CrossRef]
- Zhao, K.; Pan, L. A Machine Learning Based Trust Evaluation Framework for Online Social Networks. In Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24–26 September 2014; IEEE Computer Society: Los Alamitos, CA, USA, 2014; pp. 69–74. [Google Scholar]
- Korovaiko, N.; Thomo, A. Trust prediction from user-item ratings. Soc. Netw. Anal. Min. 2013, 3, 749–759. [Google Scholar] [CrossRef]
- Borzymek, P.; Sydow, M. Trust and Distrust Prediction in Social Network with Combined Graphical and Review-Based Attributes. In KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications; Springer: Berlin/Heidelberg, Germany, 2010; Volume 6070, pp. 122–131. [Google Scholar]
- López, J.; Maag, S. Towards a Generic Trust Management Framework Using a Machine-Learning-Based Trust Model. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20–22 August 2015; pp. 1343–1348. [Google Scholar]
- Zolfaghar, K.; Aghaie, A. Evolution of trust networks in social web applications using supervised learning. Proc. Comput. Sci. 2011, 3, 833–839. [Google Scholar] [CrossRef]
- Denko, M.K.; Sun, T.; Woungang, I. Trust management in ubiquitous computing: A Bayesian approach. Comput. Commun. 2011, 34, 398–406. [Google Scholar] [CrossRef]
- Raj, E.D.; Babu, L.D.D. An enhanced trust prediction strategy for online social networks using probabilistic reputation features. Neurocomputing 2017, 219, 412–421. [Google Scholar] [CrossRef]
- Zhao, L.; Hua, T.; Lu, C.; Chen, I. A topic-focused trust model for Twitter. Comput. Commun. 2016, 76, 1–11. [Google Scholar] [CrossRef]
- Zhang, X.; Cui, L.; Wang, Y. Commtrust: Computing Multi-dimensional Trust by Mining E-commerce Feedback Comments. IEEE Trans. Knowl. Data Eng. 2013, 26, 1631–1643. [Google Scholar] [CrossRef]
- Tang, J.; Gao, H.; Hu, X.; Liu, H. Exploiting Homophily Effect for Trust Prediction. In Proceedings of the 6th International Conference on Web Search and Data Mining (WSDM), Rome, Italy, 4–8 February 2013; ACM: New York, NY, USA, 2013; pp. 53–62. [Google Scholar]
- Wang, Y.; Wang, X.; Tang, J.; Zuo, W.; Cai, G. Modeling Status Theory in Trust Prediction. In Proceedings of the 29th AAAI Conference on Artificial Intelligence, Austin, TX, USA, 25–30 January 2015; AAAI Press: Washington, DC, USA, 2015; pp. 1875–1881. [Google Scholar]
- Zheng, X.; Wang, Y.; Orgun, M.A.; Liu, G.; Zhang, H. Social Context-Aware Trust Prediction in Social Networks. In Proceedings of the Service-Oriented Computing: 12th International Conference, ICSOC 2014, Paris, France, 3–6 November 2014; Springer: Berlin/Heidelberg, Germany, 2014; Volume 8831, pp. 527–534. [Google Scholar]
- Moradi, P.; Ahmadian, S. A reliability-based recommendation method to improve trust-aware recommender systems. Expert Syst. Appl. 2015, 42, 7386–7398. [Google Scholar] [CrossRef]
- Sanadhya, S.; Singh, S. Trust calculation with ant colony optimization in online social networks. Procedia Comput. Sci. 2015, 54, 186–195. [Google Scholar] [CrossRef]
- Fazeli, S.; Loni, B.; Bellogín, A.; Drachsler, H.; Sloep, P.B. Implicit vs. explicit trust in social matrix factorization. In Proceedings of the 8th ACM Conference on Recommender Systems (RecSys 2014), Foster City, CA, USA, 6–10 October 2014; pp. 317–320. [Google Scholar]
- Tang, J.; Gao, H.; Liu, H.; Sarma, A.D. eTrust: Understanding Trust Evolution in an Online World. In Proceedings of the 18th SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), Beijing, China, 12–16 August 2012; ACM: New York, NY, USA, 2012; pp. 253–261. [Google Scholar]
- Zhang, H.; Wang, Y.; Zhang, X. Transaction Similarity-Based Contextual Trust Evaluation in E-Commerce and E-Service Environments. In Proceedings of the IEEE International Conference on Web Services (ICWS), Washington, DC, USA, 4–9 July 2011; IEEE Computer Society: Los Alamitos, CA, USA, 2011; pp. 500–507. [Google Scholar]
- Moturu, S.T.; Liu, H. Quantifying the trustworthiness of social media content. Distrib. Parallel Databases 2011, 29, 239–260. [Google Scholar] [CrossRef]
- Liao, H.; Cimini, G.; Medo, M. Measuring Quality, Reputation and Trust in Online Communities. In Proceedings of the Foundations of Intelligent Systems: 20th International Symposium, ISMIS 2012, Macau, China, 4–7 December 2012; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7661, pp. 405–414. [Google Scholar]
- Su, K.; Xiao, B.; Liu, B.; Zhang, H.; Zhang, Z. TAP: A personalized trust-aware QoS prediction approach for web service recommendation. Knowl. Based Syst. 2017, 115, 55–65. [Google Scholar] [CrossRef]
- Ruan, Y.; Durresi, A.; Alfantoukh, L. Using Twitter trust network for stock market analysis. Knowl. Based Syst. 2018, 145, 207–218. [Google Scholar] [CrossRef]
- Tang, J.; Hu, X.; Liu, H. Is Distrust the Negation of Trust?: The Value of Distrust in Social Media. In Proceedings of the 25th Conference on Hypertext and Social Media (HT), Santiago, Chile, 1–4 September 2014; ACM: New York, NY, USA, 2014; pp. 148–157. [Google Scholar]
- Guha, R.V.; Kumar, R.; Raghavan, P.; Tomkins, A. Propagation of trust and distrust. In Proceedings of the 13th International Conference on World Wide Web (WWW), New York, NY, USA, 17–22 May 2004; ACM: New York, NY, USA, 2004; pp. 403–412. [Google Scholar]
- team2-ethi-mental-state. Available online: https://github.com/asrobang1/team2-ethi-mental-state/ (accessed on 17 April 2024).
- Burke, M.; Kraut, R.E. Growing closer on Facebook: Changes in tie strength through social network site use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Toronto, ON, Canada, 26 April–1 May 2014; pp. 4187–4196. [Google Scholar]
- Burke, M.; Kraut, R.E. The Relationship Between Facebook Use and Well-Being Depends on Communication Type and Tie Strength. J. Comput.-Mediat. Commun. 2016, 21, 265–281. [Google Scholar] [CrossRef]
- Gilbert, E.; Karahalios, K. Predicting tie strength with social media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Boston, MA, USA, 6 April 2009; pp. 211–220. [Google Scholar]
- Drakopoulos, G.; Kanavos, A.; Tsakalidis, K. Fuzzy Random Walkers with Second Order Bounds: An Asymmetric Analysis. Algorithms 2017, 10, 40. [Google Scholar] [CrossRef]
- Savvopoulos, A.; Kanavos, A.; Mylonas, P.; Sioutas, S. LSTM Accelerator for Convolutional Object Identification. Algorithms 2018, 11, 157. [Google Scholar] [CrossRef]
- Piri, J.; Mohapatra, P.; Acharya, B.; Gharehchopogh, F.S.; Gerogiannis, V.C.; Kanavos, A.; Manika, S. Feature Selection Using Artificial Gorilla Troop Optimization for Biomedical Data: A Case Analysis with COVID-19 Data. Mathematics 2022, 10, 2742. [Google Scholar] [CrossRef]
- Kanavos, A.; Karamitsos, I.; Mohasseb, A.; Gerogiannis, V.C. Comparative Study of Machine Learning Algorithms and Text Vectorization Methods for Fake News Detection. In Proceedings of the 14th International Conference on Information, Intelligence, Systems & Applications (IISA), Volos, Greece, 10–12 July 2023; IEEE: New York, NY, USA, 2023; pp. 1–8. [Google Scholar]
- Kanavos, A.; Antonopoulos, N.; Karamitsos, I.; Mylonas, P. A Comparative Analysis of Tweet Analysis Algorithms Using Natural Language Processing and Machine Learning Models. In Proceedings of the 18th International Workshop on Semantic and Social Media Adaptation and Personalization (SMAP), Limassol, Cyprus, 25–26 September 2023; IEEE: New York, NY, USA, 2023; pp. 1–6. [Google Scholar]
- Kanavos, A.; Nodarakis, N.; Sioutas, S.; Tsakalidis, A.K.; Tsolis, D.; Tzimas, G. Large Scale Implementations for Twitter Sentiment Classification. Algorithms 2017, 10, 33. [Google Scholar] [CrossRef]
- Vonitsanos, G.; Kanavos, A.; Mylonas, P. Decoding Gender on Social Networks: An In-depth Analysis of Language in Online Discussions Using Natural Language Processing and Machine Learning. In Proceedings of the IEEE International Conference on Big Data, Sorrento, Italy, 15–18 December 2023; pp. 4618–4625. [Google Scholar]
ID | Days Since Being Friends | Comment Frequency | Post Frequency | Number of Messages | Vader Positivity | Days Since Last Communication | Attachment Strength |
---|---|---|---|---|---|---|---|
ID1 | 1900.041667 | 0 | 1 | 0 | 0 | 1900.041667 | 1 |
ID2 | 805.583333 | 1 | 0 | 797 | 0.18654 | 344.541667 | 0.897659 |
ID3 | 1685.541667 | 3 | 0 | 599 | 0.22022 | 483.625000 | 0.770177 |
ID4 | 1561.208333 | 6 | 0 | 575 | 0.23542 | 1017.625000 | 0.751014 |
ID5 | 1902.375000 | 95 | 0 | 0 | 0 | 1902.375000 | 0.666496 |
ID6 | 1913.958333 | 8 | 0 | 0 | 0 | 1913.958333 | 0.179817 |
ID7 | 1558.750000 | 5 | 0 | 0 | 0 | 1558.750000 | 0.179773 |
ID8 | 1323.875000 | 3 | 0 | 0 | 0 | 1323.875000 | 0.179653 |
ID9 | 1561.500000 | 5 | 0 | 0 | 0 | 1561.500000 | 0.179644 |
ID10 | 969.541667 | 0 | 0 | 0 | 0 | 969.541667 | 0.179568 |
Model | Accuracy | Precision | Recall | F1-Score |
---|---|---|---|---|
KNN | 0.93 | 0.92 | 0.96 | 0.94 |
Random Forest | 0.91 | 0.89 | 0.93 | 0.91 |
Gradient Boosting | 0.91 | 0.89 | 0.93 | 0.91 |
ADABoost | 0.90 | 0.86 | 0.96 | 0.91 |
SVM | 0.89 | 0.85 | 0.96 | 0.90 |
Extra Trees | 0.87 | 0.86 | 0.89 | 0.87 |
Decision Tree | 0.86 | 0.83 | 0.89 | 0.86 |
Logistic Regression | 0.80 | 1.00 | 0.60 | 0.75 |
Neural Networks | 0.80 | 1.00 | 0.60 | 0.75 |
Gaussian Naive Bayes | 0.55 | 0.75 | 0.14 | 0.23 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kridera, S.; Kanavos, A. Exploring Trust Dynamics in Online Social Networks: A Social Network Analysis Perspective. Math. Comput. Appl. 2024, 29, 37. https://doi.org/10.3390/mca29030037
Kridera S, Kanavos A. Exploring Trust Dynamics in Online Social Networks: A Social Network Analysis Perspective. Mathematical and Computational Applications. 2024; 29(3):37. https://doi.org/10.3390/mca29030037
Chicago/Turabian StyleKridera, Stavroula, and Andreas Kanavos. 2024. "Exploring Trust Dynamics in Online Social Networks: A Social Network Analysis Perspective" Mathematical and Computational Applications 29, no. 3: 37. https://doi.org/10.3390/mca29030037
APA StyleKridera, S., & Kanavos, A. (2024). Exploring Trust Dynamics in Online Social Networks: A Social Network Analysis Perspective. Mathematical and Computational Applications, 29(3), 37. https://doi.org/10.3390/mca29030037