Abstract
Research on social trust analysis has traditionally focused on the trustworthy/untrustworthy behaviors that are exhibited by active users. By contrast, due to their inherent reticence to regularly contribute to the online community life, the silent users in a social network, a.k.a. lurkers, have been taken out of consideration so far. Nevertheless, analysis and mining of lurkers in social networks has been recently recognized as an important problem. Determining trust/distrust relationships that involve lurkers can provide a unique opportunity to understand whether and to what extent such users can be trusted or distrusted from the other users. This is important from both the perspective of protecting the active users from untrustworthy or undesired interactions, and the perspective of encouraging lurkers to more actively participate in the community life through the guidance of active users. In this paper we aim at understanding and quantifying relations between lurkers and trustworthy/untrustworthy users in ranking problems. We evaluate lurker ranking methods against classic approaches to trust/distrust ranking, in scenarios of who-trusts-whom networks and followship networks. Results obtained on Advogato, Epinions, Flickr and FriendFeed networks indicate that lurkers should not be a-priori flagged as untrustworthy users, and that trustworthy users can indeed be found among lurkers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Adali, S.: Modeling Trust Context in Networks. Springer Briefs in Computer Science. Springer, New York (2013)
Adali, S., Escriva, R., Goldberg, M.K., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B.K., Wallace, W.A., Williams, G.T.: Measuring behavioral trust in social networks. In: Proceedings of IEEE International Conference on Intelligence and Security Informatics, pp. 150–152 (2010)
Buckley, C., Voorhees, E.M.: Retrieval evaluation with incomplete information. In: Proceedings of ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pp. 25–32 (2004)
Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: Proceedings of ACM Conference on World Wide Web (WWW), pp. 675–684 (2011)
Celli, F., Di Lascio, F.M.L., Magnani, M., Pacelli, B., Rossi, L.: Social network data and practices: the case of friendfeed. In: Chai, S.-K., Salerno, J.J., Mabry, P.L. (eds.) SBP 2010. LNCS, vol. 6007, pp. 346–353. Springer, Heidelberg (2010)
Edelmann, N.: Reviewing the definitions of “lurkers” and some implications for online research. Cyberpsychology Behav. Soc. Network. 16(9), 645–649 (2013)
Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, P.K.: Understanding and combating link farming in the Twitter social network. In: Proceedings of ACM Conference on World Wide Web (WWW), pp. 61–70 (2012)
Golbeck, J.: Computing and Applying Trust in Web-based Social Networks. Ph.D. thesis, College Park, MD, USA (2005)
Graham, F.C., Tsiatas, A., Xu, W.: Dirichlet pagerank and ranking algorithms based on trust and distrust. Internet Math. 9(1), 113–134 (2013)
Guha, R.V., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of ACM Conference on World Wide Web (WWW), pp. 403–412 (2004)
Gyöngyi, Z., Garcia-Molina, H., Pedersen, J.O.: Combating web spam with trustrank. In: Proceedings of International Conference on Very Large Data Bases (VLDB), pp. 576–587 (2004)
Hamdi, S., Bouzeghoub, A., Gançarski, A.L., Yahia, S.B.: Trust inference computation for online social networks. In: Proceedings of International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 210–217 (2013)
Jiang, W., Wang, G., Wu, J.: Generating trusted graphs for trust evaluation in online social networks. Future Gener. Comp. Syst. 31, 48–58 (2014)
de Kerchove, C., Dooren, P.V.: The pagetrust algorithm: how to rank web pages when negative links are allowed? In: Proceedings of SIAM International Conference on Data Mining (SDM), pp. 346–352 (2008)
Krishnan, V., Raj, R.: Web spam detection with anti-trust rank. In: Proceedings of International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), pp. 37–40 (2006)
Leskovec, J., Huttenlocher, D.P., Kleinberg, J.M.: Predicting positive and negative links in online social networks. In: Proceedings of ACM Conference on World Wide Web (WWW), pp. 641–650 (2010)
Liu, H., Lim, E., Lauw, H.W., Le, M., Sun, A., Srivastava, J., Kim, Y.A.: Predicting trusts among users of online communities: an epinions case study. In: Proceedings of ACM Conference on Electronic Commerce (EC), pp. 310–319 (2008)
Massa, P., Avesani, P.: Controversial users demand local trust metrics: an experimental study on epinions.com community. In: Proceedings of AAAI Conference on Artificial Intelligence (AAAI), pp. 121–126 (2005)
Massa, P., Avesani, P.: Trust-aware bootstrapping of recommender systems. In: Proceedings of ECAI Workshop on Recommender Systems, pp. 29–33 (2006)
Mislove, A., Koppula, H.S., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Growth of the flickr social network. In: Proceedings of the 1st ACM SIGCOMM Workshop on Social Networks (WOSN 2008) (2008)
Nonnecke, B., Preece, J.J.: Lurker demographics: counting the silent. In: Proceedings of ACM Conference on Human Factors in Computing Systems (CHI), pp. 73–80 (2000)
Ortega, F.J., Troyano, J.A., Cruz, F.L., Vallejo, C.G., Enríquez, F.: Propagation of trust and distrust for the detection of trolls in a social network. Comput. Netw. 56(12), 2884–2895 (2012)
Preece, J.J., Nonnecke, B., Andrews, D.: The top five reasons for lurking: improving community experiences for everyone. Comput. Hum. Behav. 20(2), 201–223 (2004)
Sun, N., Rau, P.P.L., Ma, L.: Understanding lurkers in online communities: a literature review. Comput. Hum. Behav. 38, 110–117 (2014)
Tagarelli, A., Interdonato, R.: “Who’s out there?”: identifying and ranking lurkers in social networks. In: Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 215–222 (2013)
Tagarelli, A., Interdonato, R.: Lurking in social networks: topology-based analysis and ranking methods. Soc. Netw. Anal. Min. 4(230), 27 (2014)
Tagarelli, A., Interdonato, R.: Time-aware analysis and ranking of lurkers in social networks. Soc. Netw. Anal. Min. 5(1), 23 (2015)
Walter, F.E., Battiston, S., Schweitzer, F.: Personalised and dynamic trust in social networks. In: Proceedings of ACM Conference on Recommender Systems (RecSys), pp. 197–204 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Interdonato, R., Tagarelli, A. (2016). To Trust or Not to Trust Lurkers?: Evaluation of Lurking and Trustworthiness in Ranking Problems. In: Wierzbicki, A., Brandes, U., Schweitzer, F., Pedreschi, D. (eds) Advances in Network Science. NetSci-X 2016. Lecture Notes in Computer Science(), vol 9564. Springer, Cham. https://doi.org/10.1007/978-3-319-28361-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-28361-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28360-9
Online ISBN: 978-3-319-28361-6
eBook Packages: Computer ScienceComputer Science (R0)