Abstract
The increasing use of social media results in users that must ascertain the truthfulness of information that they encounter from unknown sources using a variety of indicators (e.g., explicit ratings, profile information, etc.). Through human-subject experimentation with an online social network-style platform, we focus on the determination of credibility in ego-centric networks, where participants are able to observe salient social network properties, such as degree centrality and geodesic distance. Using manipulated social network graphs, we find that corroboration and degree centrality are most utilized by subjects as indicators of credibility. utilized by subjects as indicators of credibility. We discuss the implications of the use of social network structural properties, use principal components analysis to visualize the reduced dimensional feature space, and analyze how credibility changes per property according to the “Big 5” theory of personality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Granovetter M (1983) The strength of weak ties: a network theory revisited. Sociol Theory 1:201–233
Easley D, Kleinberg J (2010) Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press, Cambridge
Gilbert E, Karahalios K (2009) Predicting tie strength with social media. In: Proceedings of the SIGCHI conference on human factors in computing systems, ACM
Antin J, Churchill EF (2011) Badges in social media: a social psychological perspective. In: CHI 2011, Vancouver, 7–12 May 2011
Rubin VL, Liddy ED (2006) Assessing credibility of weblogs. In: AAAI symposium on computational approaches to analysing weblogs (AAAI-CAAW), ACM, 2006
Berger-Wolf TY, Saia J (2006) A framework for analysis of dynamic social networks. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining, ACM
Armstrong CL, McAdams MJ (2009) Blogs of information: how gender cues and individual motivations influence perceptions of credibility. J Comput Mediat Commun 14(3):435–456
Lesani M, Montazeri N (2009) Fuzzy trust aggregation and personalized trust inference in virtual social networks. Comput Intell 25(2):5183
Kim Y, Song H (2011) Strategies for predicting local trust based on trust propagation in social networks. Knowl-Based Syst 2:1360–1371
Guha R, Kumar R, Raghavan R, Tomkins A (2004) Propagation of trust and distrust. In: Proceedings of the 13th international conference on world wide web, New York
Brashears ME (2013) Humans use compression heuristics to improve the recall of social networks. Scientific reports, vol 3. doi:10.1038/srep01513
Dunbar R (2010) How many friends does one person need?: Dunbar’s number and other evolutionary quirks. Faber and Faber, London
Page L, Brin S, Motwani R, Winograd T (1998) The PageRank citation ranking: bringing order to the web, Stanford Digital Library Technologies Project, Technical report, CA
Golbeck JA (2005) Computing and applying trust in web-based social networks. Ph.D. Dissertation, Department of Computer Science, University of Maryland, College Park
Golbeck JA, Hendler J (2006) FilmTrust: movie recommendations using trust in web-based social networks. In: Proceedings of the IEEE consumer communications and networking conference. Las Vegas
Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th international conference on world wide web, ACM
Hutto CJ, Gilbert E, Yardi S (2013) A longitudinal study of follow predictors on twitter. In: Proceedings of the 2013 ACM annual conference on human factors in computing systems (CHI), Paris
Romero DM, Galuba W, Asur S, Huberman BA (2011) Influence and passivity in social media. In: Machine learning and knowledge discovery in databases, Springer, Berlin, pp 18–33
Janicik GA, Larrick RP (2005) Social network schemas and the learning of incomplete networks. J Personal Soc Psychol 88:348–364
Luhmann N (2000) Familiarity, confidence, trust: problems and alternatives. In: Gambetta D (ed) Trust: making and breaking cooperative relations, electronic edition. Department of Sociology, University of Oxford, vol 6. pp 94–107 (Chapter 6, Trust: making and breaking cooperative relations)
Costa PT, McCrae RR (1985) The NEO personality inventory: manual, form S and form R. Psychological Assessment Resources, 1985
Goldberg L (1981) Language and individual differences: the search for universals in personality lexicons. In: Wheeler L (ed) Review of personality and social psychology. Sage, Beverly Hills
McCrae R, Costa P (1997) Personality trait structure as a human universal. Am Psychol 52:509–516
McCrae R, Costa P (1991) The NEO personality inventory: using the five-factor model in counseling. J Couns Dev 69(4):367–372
McCrae RR, John OP (1992) An introduction to the fivefactor model and its applications. J Personal 60(2):175–215
Guadagno RE, Okdie BM, Eno C (2008) Who blogs? Personality predictors of blogging. Comput Hum Behav 24(5):1993–2004
Barrick MR, Mount MK (1991) The big five personality dimensions and job performance: a metaanalysis. Person Psychol 44(1):1–26
Correa T, Hinsley A, De Zuniga H (2010) Who interacts on the Web?: the intersection of users personality and social media use. Comput Hum Behav 26(2):247–253
McKenna KY, Bargh JA (2000) Plan 9 from cyberspace: the implications of the internet for personality and social psychology. Personal Soc Psychol Rev 4(1):57–75
Bachrach Y, Kosinski M, Graepel T, Kohli P, Stillwell D (2012) Personality and patterns of facebook usage. In: Proceedings of the 3rd annual ACM web science conference
Janicik G, Larrick T (2005) Social network schemas and the learning of incomplete networks. J Personal Soc Psychol 88:348–364
Yin X, Han J, Yu PS (2008) Truth discovery with multiple conflicting information providers on the web. IEEE Trans Knowl Data Eng 20:796–808
Kim Y, Song H (2011) Strategies for predicting local trust based on trust propagation in social networks. Knowl-Based Syst 2:1360–1371
Appling DS, Briscoe EJ, Hayes H, Mappus RL (2013) Towards automated personality identification using speech Acts. In: Workshop on computational personality recognition. International AAAI conference on weblogs and social media (ICWSM)
DePaulo BM, Lindsay JJ, Malone BE, Muhlenbruck L, Charlton K, Cooper H (2003) Cues to deception. Psychol bull 129(1):74
Zhou L, Burgoon JK, Nunamaker JF, Twitchell D (2004) Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decis Negot 13(1):81–106
Weiss L, Briscoe E, Hayes H, Kemenova O, Harbert S, Li L, Lebanon G, Stewart C, Miller D, Foy D (2013) A comparative study of social media and traditional polling in the Egyptian uprising of 2011. In: Social computing. Behavioral-cultural modeling and prediction lecture notes in computer science, Springer, Berlin, pp 303–310
Acknowledgments
This material is based on work supported in part by the Defense Advanced Research Projects Agency (DARPA) under Contract No. W911NF-12-1-0043. Any opinions, findings, and conclusions, or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of DARPA or the U.S. Government.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland (outside the USA)
About this chapter
Cite this chapter
Briscoe, E.J., Appling, D.S., Hayes, H. (2015). Social Network Derived Credibility. In: Ulusoy, Ö., Tansel, A., Arkun, E. (eds) Recommendation and Search in Social Networks. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-14379-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-14379-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14378-1
Online ISBN: 978-3-319-14379-8
eBook Packages: Computer ScienceComputer Science (R0)