Skip to main content

Social Network Derived Credibility

  • Chapter
  • First Online:
Recommendation and Search in Social Networks

Abstract

The increasing use of social media results in users that must ascertain the truthfulness of information that they encounter from unknown sources using a variety of indicators (e.g., explicit ratings, profile information, etc.). Through human-subject experimentation with an online social network-style platform, we focus on the determination of credibility in ego-centric networks, where participants are able to observe salient social network properties, such as degree centrality and geodesic distance. Using manipulated social network graphs, we find that corroboration and degree centrality are most utilized by subjects as indicators of credibility. utilized by subjects as indicators of credibility. We discuss the implications of the use of social network structural properties, use principal components analysis to visualize the reduced dimensional feature space, and analyze how credibility changes per property according to the “Big 5” theory of personality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Granovetter M (1983) The strength of weak ties: a network theory revisited. Sociol Theory 1:201–233

    Article  Google Scholar 

  2. Easley D, Kleinberg J (2010) Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press, Cambridge

    Book  Google Scholar 

  3. Gilbert E, Karahalios K (2009) Predicting tie strength with social media. In: Proceedings of the SIGCHI conference on human factors in computing systems, ACM

    Google Scholar 

  4. Antin J, Churchill EF (2011) Badges in social media: a social psychological perspective. In: CHI 2011, Vancouver, 7–12 May 2011

    Google Scholar 

  5. Rubin VL, Liddy ED (2006) Assessing credibility of weblogs. In: AAAI symposium on computational approaches to analysing weblogs (AAAI-CAAW), ACM, 2006

    Google Scholar 

  6. Berger-Wolf TY, Saia J (2006) A framework for analysis of dynamic social networks. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining, ACM

    Google Scholar 

  7. Armstrong CL, McAdams MJ (2009) Blogs of information: how gender cues and individual motivations influence perceptions of credibility. J Comput Mediat Commun 14(3):435–456

    Article  Google Scholar 

  8. Lesani M, Montazeri N (2009) Fuzzy trust aggregation and personalized trust inference in virtual social networks. Comput Intell 25(2):5183

    MathSciNet  Google Scholar 

  9. Kim Y, Song H (2011) Strategies for predicting local trust based on trust propagation in social networks. Knowl-Based Syst 2:1360–1371

    Article  Google Scholar 

  10. Guha R, Kumar R, Raghavan R, Tomkins A (2004) Propagation of trust and distrust. In: Proceedings of the 13th international conference on world wide web, New York

    Google Scholar 

  11. Brashears ME (2013) Humans use compression heuristics to improve the recall of social networks. Scientific reports, vol 3. doi:10.1038/srep01513

  12. Dunbar R (2010) How many friends does one person need?: Dunbar’s number and other evolutionary quirks. Faber and Faber, London

    Google Scholar 

  13. Page L, Brin S, Motwani R, Winograd T (1998) The PageRank citation ranking: bringing order to the web, Stanford Digital Library Technologies Project, Technical report, CA

    Google Scholar 

  14. Golbeck JA (2005) Computing and applying trust in web-based social networks. Ph.D. Dissertation, Department of Computer Science, University of Maryland, College Park

    Google Scholar 

  15. Golbeck JA, Hendler J (2006) FilmTrust: movie recommendations using trust in web-based social networks. In: Proceedings of the IEEE consumer communications and networking conference. Las Vegas

    Google Scholar 

  16. Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th international conference on world wide web, ACM

    Google Scholar 

  17. Hutto CJ, Gilbert E, Yardi S (2013) A longitudinal study of follow predictors on twitter. In: Proceedings of the 2013 ACM annual conference on human factors in computing systems (CHI), Paris

    Google Scholar 

  18. Romero DM, Galuba W, Asur S, Huberman BA (2011) Influence and passivity in social media. In: Machine learning and knowledge discovery in databases, Springer, Berlin, pp 18–33

    Google Scholar 

  19. Janicik GA, Larrick RP (2005) Social network schemas and the learning of incomplete networks. J Personal Soc Psychol 88:348–364

    Article  Google Scholar 

  20. Luhmann N (2000) Familiarity, confidence, trust: problems and alternatives. In: Gambetta D (ed) Trust: making and breaking cooperative relations, electronic edition. Department of Sociology, University of Oxford, vol 6. pp 94–107 (Chapter 6, Trust: making and breaking cooperative relations)

    Google Scholar 

  21. Costa PT, McCrae RR (1985) The NEO personality inventory: manual, form S and form R. Psychological Assessment Resources, 1985

    Google Scholar 

  22. Goldberg L (1981) Language and individual differences: the search for universals in personality lexicons. In: Wheeler L (ed) Review of personality and social psychology. Sage, Beverly Hills

    Google Scholar 

  23. McCrae R, Costa P (1997) Personality trait structure as a human universal. Am Psychol 52:509–516

    Article  Google Scholar 

  24. McCrae R, Costa P (1991) The NEO personality inventory: using the five-factor model in counseling. J Couns Dev 69(4):367–372

    Article  Google Scholar 

  25. McCrae RR, John OP (1992) An introduction to the fivefactor model and its applications. J Personal 60(2):175–215

    Article  Google Scholar 

  26. Guadagno RE, Okdie BM, Eno C (2008) Who blogs? Personality predictors of blogging. Comput Hum Behav 24(5):1993–2004

    Article  Google Scholar 

  27. Barrick MR, Mount MK (1991) The big five personality dimensions and job performance: a metaanalysis. Person Psychol 44(1):1–26

    Article  Google Scholar 

  28. Correa T, Hinsley A, De Zuniga H (2010) Who interacts on the Web?: the intersection of users personality and social media use. Comput Hum Behav 26(2):247–253

    Article  Google Scholar 

  29. McKenna KY, Bargh JA (2000) Plan 9 from cyberspace: the implications of the internet for personality and social psychology. Personal Soc Psychol Rev 4(1):57–75

    Article  Google Scholar 

  30. Bachrach Y, Kosinski M, Graepel T, Kohli P, Stillwell D (2012) Personality and patterns of facebook usage. In: Proceedings of the 3rd annual ACM web science conference

    Google Scholar 

  31. Janicik G, Larrick T (2005) Social network schemas and the learning of incomplete networks. J Personal Soc Psychol 88:348–364

    Article  Google Scholar 

  32. Yin X, Han J, Yu PS (2008) Truth discovery with multiple conflicting information providers on the web. IEEE Trans Knowl Data Eng 20:796–808

    Article  Google Scholar 

  33. Kim Y, Song H (2011) Strategies for predicting local trust based on trust propagation in social networks. Knowl-Based Syst 2:1360–1371

    Article  Google Scholar 

  34. Appling DS, Briscoe EJ, Hayes H, Mappus RL (2013) Towards automated personality identification using speech Acts. In: Workshop on computational personality recognition. International AAAI conference on weblogs and social media (ICWSM)

    Google Scholar 

  35. DePaulo BM, Lindsay JJ, Malone BE, Muhlenbruck L, Charlton K, Cooper H (2003) Cues to deception. Psychol bull 129(1):74

    Article  Google Scholar 

  36. Zhou L, Burgoon JK, Nunamaker JF, Twitchell D (2004) Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decis Negot 13(1):81–106

    Article  Google Scholar 

  37. Weiss L, Briscoe E, Hayes H, Kemenova O, Harbert S, Li L, Lebanon G, Stewart C, Miller D, Foy D (2013) A comparative study of social media and traditional polling in the Egyptian uprising of 2011. In: Social computing. Behavioral-cultural modeling and prediction lecture notes in computer science, Springer, Berlin, pp 303–310

    Google Scholar 

Download references

Acknowledgments

This material is based on work supported in part by the Defense Advanced Research Projects Agency (DARPA) under Contract No. W911NF-12-1-0043. Any opinions, findings, and conclusions, or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of DARPA or the U.S. Government.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Erica J. Briscoe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland (outside the USA)

About this chapter

Cite this chapter

Briscoe, E.J., Appling, D.S., Hayes, H. (2015). Social Network Derived Credibility. In: Ulusoy, Ö., Tansel, A., Arkun, E. (eds) Recommendation and Search in Social Networks. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-14379-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14379-8_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14378-1

  • Online ISBN: 978-3-319-14379-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics