DOI QR코드

DOI QR Code

User Reputation computation Method Based on Implicit Ratings on Social Media

  • Bok, Kyoungsoo (School of Information and Communication Engineering, Chungbuk National University) ;
  • Yun, Jinkyung (Bigdata Team, Exem, Inc.) ;
  • Kim, Yeonwoo (School of Information and Communication Engineering, Chungbuk National University) ;
  • Lim, Jongtae (School of Information and Communication Engineering, Chungbuk National University) ;
  • Yoo, Jaesoo (School of Information and Communication Engineering, Chungbuk National University)
  • 투고 : 2016.07.28
  • 심사 : 2017.01.13
  • 발행 : 2017.03.31

초록

Social network services have recently changed from environments for simply building connections among users to open platforms for generating and sharing various forms of information. Existing user reputation computation methods are inadequate for determining the trust in users on social media where explicit ratings are rare, because they determine the trust in users based on user profile, explicit relations, and explicit ratings. To solve this limitation of previous research, we propose a user reputation computation method suitable for the social media environment by incorporating implicit as well as explicit ratings. Reliable user reputation is estimated by identifying malicious information raters, modifying explicit ratings, and applying them to user reputation scores. The proposed method incorporates implicit ratings into user reputation estimation by differentiating positive and negative implicit ratings. Moreover, the method generates user reputation scores for individual categories to determine a given user's expertise, and incorporates the number of users who participated in rating to determine a given user's influence. This allows reputation scores to be generated also for users who have received no explicit ratings, and, thereby, is more suitable for social media. In addition, based on the user reputation scores, malicious information providers can be identified.

키워드

참고문헌

  1. S. Asur and B. A. Huberman, "Predicting the future with social media," in Proc. of IEEE/WIC/ACM International Conference on Web Intelligence, pp. 492-499, 2010.
  2. W. G. Mangold and D. J.Faulds, "Social media: The new hybrid element of the promotion mix," Business horizons, vol. 52, no. 4, pp. 357-365, 2009. https://doi.org/10.1016/j.bushor.2009.03.002
  3. A. M. Kaplan and M. Haenlein, "Users of the world, unite! The challenges and opportunities of Social Media," Business horizons, vol. 53, no. 1, pp. 59-68, 2010. https://doi.org/10.1016/j.bushor.2009.09.003
  4. W. S. Chow andL. S. Chan, "Social network, social trust and shared goals in organizational knowledge sharing," Information & Management, vol. 45, no. 7, pp. 458-465, 2008. https://doi.org/10.1016/j.im.2008.06.007
  5. K. Lewis, M. Gonzalez and J. Kaufman, "Social selection and peer influence in an online social network," in Proc. of the National Academy of Sciences, vol. 109, no. 1, pp. 68-72, 2012. https://doi.org/10.1073/pnas.1109739109
  6. K. Fehl, D. J. Post and D. Semmann, "Co‐evolution of behaviour and social network structure promotes human cooperation," Ecology letters, vol. 14, no. 6, pp. 546-551, 2011. https://doi.org/10.1111/j.1461-0248.2011.01615.x
  7. A. T. Wal, "Cluster emergence and network evolution: a longitudinal analysis of the inventor network in Sophia-Antipoli," Regional Studies, vol. 47, no. 5, pp. 651-668, 2013. https://doi.org/10.1080/00343401003614258
  8. J. H. Kietzmann, K. Hermkens and I. P. McCarthy, "Social media? Get serious! Understanding the functional building blocks of social media," Business horizons, vol. 54, no. 3, pp. 241-251, 2011. https://doi.org/10.1016/j.bushor.2011.01.005
  9. A. L. Kavanaugha, E. A. Foxa, S. D. Sheetzb, S. Yanga, L. T. Lid, D. J. Shoemakerc, A. Natsevf and L. Xieg, "Social media use by government: From the routine to the critical," Government Information Quarterly, vol. 29, no. 4, pp. 480-491, 2012. https://doi.org/10.1016/j.giq.2012.06.002
  10. Z. Wang, P. Cui, L. Xie, H. Chen, W. Zhu and S. Yang, "Analyzing social media via event facets," in Proc. of ACM Multimedia Conference, pp.1359-1360, 2012.
  11. K. Bok, J. Lim, M. Ahn and J. Yoo, "A Social Search Scheme Considering User Preferences and Popularities in Mobile Environments," KSII Transactions on Internet and Information Systems, vol.10. no.2, pp.744-768, 2016. https://doi.org/10.3837/tiis.2016.02.017
  12. H. Kwak, C. Lee, H. Park and S. B. Moon, "What is Twitter, a social network or a news media?," in Proc. of International Conference on World Wide Web, pp.591-600, 2010.
  13. N. B. Ellison, J. Vitak, R. Gray and C. Lampe, "Cultivating social resources on social network sites: Facebook relationship maintenance behaviors and their role in social capital processes," Journal of Computer‐Mediated Communication, vol. 19, no. 4, pp. 855-870, 2014.
  14. E. W. T. Ngai, K. K. Moon, S. S. Lam, E. S. K. Chin and S. S. C. Tao, "Social media models, technologies, and applications: An academic review and case study," Industrial Management and Data Systems, vol. 115, no. 5, pp. 769-802, 2015. https://doi.org/10.1108/IMDS-03-2015-0075
  15. S. Abu-Nimeh, T. M. Chen and O. Alzubi, "Malicious and spam posts in online social networks," IEEE Computer, vol. 44, no. 9, pp. 23-28, 2011. https://doi.org/10.1109/MC.2011.222
  16. J. Fogeland E. Nehmad, "Internet social network communities: Risk taking, trust, and privacy concerns," Computers in human behavior, vol. 25, no. 1, pp. 153-160, 2009. https://doi.org/10.1016/j.chb.2008.08.006
  17. S. Hamdi, A. L. Gancarski, A. Bouzeghoub and S. B. Yahia, "IRIS: A novel method of direct trust computation for generating trusted social networks," in Proc. of International Conference on Trust, Security and Privacy in Computing and Communications, pp. 616-623, 2012.
  18. Z. Zhang and K. Wang, "A Trust Model for Multimedia Social Networks," Social Network Analysis and Mining, vol. 3, no. 4, pp. 969-979, 2013. https://doi.org/10.1007/s13278-012-0078-4
  19. A. Louati, J. E. Haddad and S. Pinson, "Trust-based service discovery in multi-relation social networks," in Proc. of International Conference on Service-Oriented Computing, pp. 664-671, 2012.
  20. M. Burke, C. Marlow and T. M. Lento, "Social network activity and social well-being," in Proc. of International Conference on Human Factors in Computing Systems, pp.1909-1912, 2010.
  21. D. Boyd and N. B. Ellison, "Social network sites: Definition, history, and scholarship," Journal of Computer‐Mediated Communication, vol. 13, no. 1, pp. 210-230, 2007.
  22. Y. Han, L. Kim and J. Cha, "Computing user reputation in a social network of web 2.0," Computing and Informatics, vol. 31, no. 2, pp. 447-462, 2012.
  23. M. Eirinaki, M. D. Louta and I. Varlamis, "A Trust-Aware System for Personalized User Recommendations in Social Networks," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 44, no. 4, pp. 409-421, 2014. https://doi.org/10.1109/TSMC.2013.2263128
  24. H. Hosseinmardi, R. Han, Q. Lv, S. Mishra and A. Ghasemianlangroodi, "Towards understanding cyberbullying behavior in a semi-anonymous social network," in Proc. of International Conference on Advances in Social Networks Analysis and Mining, pp. 244-252, 2014.
  25. Z. Yan, R. Kantola, G. Shi and P. Zhang, "Unwanted content control via trust management in pervasive social networking," in Proc. of International Conference on Trust, Security and Privacy in Computing and Communications, pp. 202-290, 2013.
  26. X. Liu, L. Shi, Y. Wang, Z. Xin and W. Fu, "A Dynamic Trust Conference Algorithm for Social Network," in Proc. of International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp.340-346, 2013.

피인용 문헌

  1. 소셜 네트워크에서 연결 관계와 영향력을 고려한 사용자 간접 신뢰도 판별 vol.18, pp.5, 2017, https://doi.org/10.5392/jkca.2018.18.05.280
  2. 자금 세탁 방지를 위한 블록체인 기반 스마트 컨트랙트 메커니즘 설계 vol.19, pp.5, 2018, https://doi.org/10.7472/jksii.2018.19.5.1
  3. Trust evaluation of multimedia documents based on extended provenance model in social semantic web vol.78, pp.20, 2019, https://doi.org/10.1007/s11042-018-6243-7
  4. IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet vol.2021, pp.None, 2017, https://doi.org/10.1155/2021/8937448
  5. Defending against Internal Attacks in Healthcare-Based WSNs vol.2021, pp.None, 2017, https://doi.org/10.1155/2021/2081246