Abstract
Social network interactions and web/IoT-based applications have led to data getting generated at a very rapid rate. Amongst these, social networking sites continue to have a comparatively greater influence on the day-to-day life of an individual. Social networking sites are the main vehicles for disseminating information due to their inherent global outreach. Due to popularity of social network sites, every smart phone user, government, corporate and political parties are able to keep up to date with the latest information. However, this information may also contain some misinformation and/or disinformation, which could manipulate and influence the opinion of an individual or a group of individuals. In order to minimize misinformation and disinformation in such networks, a veracity assessment in the form of trust, needs to be computed for each and every data included in it, in order to ensure secure and trustworthy data availability for the users. Many researchers have developed models for assessing veracity in the form of trust for different social networking sites. This paper focuses on a detailed review of trust-based models in social networks. The paper also delineates how machine learning models have been used for trust assessment in social networks.
Similar content being viewed by others
References
Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: 33rd annual hawaii international conference on system sciences, Maui. https://doi.org/10.1109/HICSS.2000.926814
Adomavicius G, Zhang J (2010) On the stability of recommendation algorithms. In: 4th ACM conference on recommender systems, Barcelona. https://doi.org/10.1145/1864708.1864722
Allen J (2017) The history of social-media. Future Marketing. https://www.future-marketing.co.uk/the-history-of-social-media/
Alrubaian M, Al-Qurishi M, Alamri A, Al-Rakhami M, Hassan MM, Fortino G (2019) Credibility in online social networks: a survey. IEEE Access 7:2828–2855. https://doi.org/10.1109/ACCESS.2018.2886314
Ballou DP, Pazer HL (2003) Modeling completeness versus consistency tradeoffs in information decision contexts. IEEE Trans Knowl Data Eng 15(1):240–243. https://doi.org/10.1109/TKDE.2003.1161595
Bank J, Cole B (2008) Calculating the jaccard similarity coefficient with map reduce for entity pairs in wikipedia. Wikipedia Similarity Team
Barnes JA (1954) Class and committees in a Norwegian Island Parish. Hum Relat 7(1):39–58. https://doi.org/10.1177/001872675400700102
Blasch E, Laskey KB, Jousselme A-L, Dragos V, Costa PCG, Dezert J (2013) URREF reliability versus credibility in information fusion (STANAG 2511). In: 16th international conference on information fusion, Istanbul
Boase J, Horrigan J, Wellman B (2006) The strength of internet ties. Pew Internet & American Life Project. https://www.pewresearch.org/internet/wp-content/uploads/sites/9/media/Files/Reports/2006/PIP_Internet_ties.pdf.pdf
Breese JS, Heckerman D, Kadie C (1998) Empirical analysis of predictive algorithms for collaborative filtering. In: 14th conference on uncertainty in artificial intelligence. Presented at the madison, Wisconsin. San Francisco
Cahill V, Gray E, Seigneur J-M, Jensen CD, Chen Y, Shand B, Dimmock N, Twigg A, Bacon J, English C, Wagealla W, Terzis S, Nixon P, Serugendo GDM, Bryce C, Carbone M, Krukow K, Nielsen M (2003) Using trust for secure collaboration in uncertain environments. IEEE Pervasive Comput 2(3):52–61. https://doi.org/10.1109/MPRV.2003.1228527
Carbone M, Nielsen M, Sassone V (2003) A formal model for trust in dynamic networks. In: 1st international conference on software engineering and formal methods (SEFM), Brisbane. https://doi.org/10.1109/SEFM.2003.1236207
Castelfranchi C, Falcone R (2010) Trust theory a socio-cognitive and computational model. In: Wooldridge M (ed) Michael wooldridge, 1st edn. Wiley
Castillo C, Mendoza M, Poblete B (2011) Information credibility on Twitter. In: 20th international conference companion on World Wide Web, Hyderabad. https://doi.org/10.1145/1963405.1963500
Chen S, Wang G, Jia W (2016) Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph. Futur Gener Comput Syst 55:391–400. https://doi.org/10.1016/J.FUTURE.2014.06.005
Chen X, Yuan Y, Lu L, Yang J (2019) A multidimensional trust evaluation framework for online social networks based on machine learning. IEEE Access 7:175499–175513. https://doi.org/10.1109/ACCESS.2019.2957779
Chen X, Yuan Y, Orgun MA (2020) Using Bayesian networks with hidden variables for identifying trustworthy users in social networks. J Inf Sci 46(5):600–615. https://doi.org/10.1177/0165551519857590
Chen I-R, Bao F, Chang M, Cho J-H (2010) Trust management for encounter-based routing in delay tolerant networks. In: IEEE global telecommunications conference (GLOBECOM), Miami. https://doi.org/10.1109/GLOCOM.2010.5683235
Cho J-H, Chan K, Adali S (2015) A survey on trust modeling. ACM Comput Surv. https://doi.org/10.1145/2815595
Daly E, Haahr M (2009) Social network analysis for information flow in disconnected delay-tolerant MANETs. IEEE Trans Mob Comput 8(5):606–621. https://doi.org/10.1109/TMC.2008.161
Doyle J (1998) Rational decision making. In: Wilson R, Kiel F (eds) The MIT encyclopedia of the cognitive sciences. MIT Press, Cambridge
Dutta-Bergman MJ (2004) The impact of completeness and web use motivation on the credibility of e-health information. J Commun 54(2):253–269. https://doi.org/10.1111/J.1460-2466.2004.TB02627.X
Fienberg SE (2006) When did Bayesian inference become ‘Bayesian’? Bayesian Anal 1(1):1–40. https://doi.org/10.1214/06-BA101
Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40(1):35–41. https://doi.org/10.2307/3033543
Gambetta D (2000) Can we trust trust? In: Diego G (ed) Trust: making and breaking cooperative relations. Department of Sociology, University of Oxford, pp 213–237
Golbeck JA (2005). Computing and applying trust in web-based social networks [doctor of philosophy, Faculty of the Graduate School of the University of Maryland]. UMD. http://hdl.handle.net/1903/2384
Gottfried J, Shearer E (2016) News use across social media platforms 2016. Pew research center. https://www.pewresearch.org/journalism/wp-content/uploads/sites/8/2016/05/PJ_2016.05.26_social-media-and-news_FINAL-1.pdf
Griffiths N (2006) A fuzzy approach to reasoning with trust, distrust and insufficient trust. In: Klusch M, Rovatsos M, Payne TR (eds) Cooperative information agents X. Springer, Berlin Heidelberg, pp 360–374. https://doi.org/10.1007/11839354_26
Guiot JM (1976) A modification of Milgram’s small world method. Eur J Soc Psychol 6(4):503–507. https://doi.org/10.1002/EJSP.2420060409
Heddaya A, Helal A (1997) Reliability, availability, dependability and performability: a user-centered view. OpenBU. https://open.bu.edu/handle/2144/1612
Jiang W, Wang G, Bhuiyan MZA, Wu J (2016) Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Comput Surv. https://doi.org/10.1145/2906151
Jøsang A (2001) A Logic for uncertain probabilities. Int J Uncertain Fuzzines Knowl-Based Syst 9(3):279–311. https://doi.org/10.1142/S0218488501000831
Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644. https://doi.org/10.1016/j.dss.2005.05.019
Keung SNLC, Griffiths N (2008) Using recency and relevance to assess trust and reputation. In: AISB 2008 symposium on behaviour regulation
Khadangi E, Bagheri A (2013) Comparing MLP, SVM and KNN for predicting trust between users in Facebook. In: International econference on computer and knowledge engineering, Mashhad. https://doi.org/10.1109/ICCKE.2013.6682864
Kleinfeld JS (2002) The small world problem. Society 39(2):61–66. https://doi.org/10.1007/BF02717530
Lazarsfeld PF, Merton RK (1954) Friendship as a social process: a substantive and methodological analysis. In: Berger M, Abel T, Page CH (eds) Freedom and control in modern society. Van Nostrand, New York, pp 18–67
Liben-Nowell D, Kleinberg J (2003) The link prediction problem for social networks. In: 12th international conference on information and knowledge management, New Orleans. https://doi.org/10.1145/956863.956972
Liu H, Lim E-P, Lauw HW, Le MT, Sun A, Srivastava J, Kim YA (2008) Predicting trusts among users of online communities: an epinions case study. In: 9th ACM conference on electronic commerce. Chicago. https://doi.org/10.1145/1386790.1386838
Marsh S, Briggs P (2009) Examining trust, forgiveness and regret as computational concepts. In: Golbeck J (ed) Computing with social trust. Springer, London, pp 9–43. https://doi.org/10.1007/978-1-84800-356-9_2
Marsh SP (1994) Formalising trust as a computational concept [doctor of phylosophy, Dept. of Computer Science and Mathematics, University of Stirling]. https://www.cs.stir.ac.uk/~kjt/techreps/pdf/TR133.pdf
McPherson M, Smith-Lovin L, Cook JM (2001) Birds of a feather: homophily in social networks. Ann Rev Sociol 27:415–444. https://doi.org/10.1146/ANNUREV.SOC.27.1.415
Milgram S (1967) The Small-world problem psychology. Today 1(1):61–67
Minhas UF, Zhang J, Tran T, Cohen R (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty. In: International conference on web intelligence and intelligent agent technology, Toronto. https://doi.org/10.1109/WI-IAT.2010.66
Newman MEJ (2005) A measure of betweenness centrality based on random walks. Soc Netw 27(1):39–54. https://doi.org/10.1016/J.SOCNET.2004.11.009
Osman M (2022) Social media marketing. Wild and Interesting Facebook Statistics and Facts. KINSTA. https://kinsta.com/blog/facebook-statistics/
Papaoikonomou A, Kardara M, Varvarigou T (2015) Trust inference in online social networks. In: International conference on advances in social networks analysis and mining, Paris. https://doi.org/10.1145/2808797.2809418
Peng S, Jia W, Wang G (2008) Voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks. In: international conference on embedded and ubiquitous computing, Shanghai. https://doi.org/10.1109/EUC.2008.93
Ries S, Kangasharju J, Mühlhäuser M (2006) A classification of trust systems. In: Meersman R, Tari Z, Herrero P (eds) On the move to meaningful internet systems 2006: OTM 2006 Workshops. Lecture Notes in Computer Science, 4277, Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_114
Sabater J, Sierra C (2005) review on computational trust and reputation models. Artif Intell Rev 24:33–60. https://doi.org/10.1007/s10462-004-0041-5
Shafer G (1976) Dempster’s rule of combination. In: Shafer G (ed) A mathematical theory of evidence. Princeton University Press, pp 55–73. https://doi.org/10.2307/j.ctv10vm1qb.7
Shapley LS (1953) A value for n-person games. In: Kuhn H, Tucker A (eds) Contributions to the theory of games II. Princeton University Press, pp 307–317. https://doi.org/10.1515/9781400881970-018
Sherchan W, Nepal S, Paris C (2013) A survey of trust in social networks. ACM Comput Surv. https://doi.org/10.1145/2501654.2501661
Smarandache F, Dezert J (2004) Advances and applications of DSmT for information fusion. In: Smarandache J Dezert (eds) American Research Press. http://fs.unm.edu/DSmT-book1.pdf
Sun YL, Yu W, Han Z, Liu KJR (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J Sel Areas Commun 24(2):305–315. https://doi.org/10.1109/JSAC.2005.861389
Tam D (2009) Facebook processes more than 500 TB of data daily. Cnet. http://www.cnet.com/news/facebook-processes-more-than-500-tb-of-data-daily/
Ting HLJ, Kang X, Li T, Wang H, Chu C-K (2021) On the trust and trust modeling for the future fully-connected digital world: a comprehensive study. IEEE Access 9:106743–106783. https://doi.org/10.1109/ACCESS.2021.3100767
Travers J, Milgram S (1969) An experimental study of the small world problem. Sociometry 32(4):425–443. https://doi.org/10.2307/2786545
Velloso PB, Laufer RP, de Cunha DO, Duarte OCMB, Pujolle G (2010) Trust management in mobile ad hoc networks using a scalable maturity-based model. IEEE Trans Netw Serv Manag 7(3):172–185. https://doi.org/10.1109/TNSM.2010.1009.I9P0339
Wang Y, Singh MP (2010) Evidence-based trust: a mathematical model geared for multiagent systems. ACM Transit Auton Adapt Syst. https://doi.org/10.1145/1867713.1867715
Wang X, Wang Y, Sun H (2016) Exploring the combination of dempster-shafer theory and neural network for predicting trust and distrust. Comput Intell Neurosci 2016:5403105. https://doi.org/10.1155/2016/5403105
Wen L, Lingdi P, Chunming W, Ming J (2010) Distributed Bayesian network trust model in virtual network. In: 2nd international conference on networks security, wireless communications and trusted computing, Wuhan. https://doi.org/10.1109/NSWCTC.2010.153
Yan Z, Holtmanns S (2008) Trust modeling and management: from social trust to digital trust. In: Subramanian R (ed) Computer security, privacy and politics: current issues, challenges and solutions. IGI Global, pp 290–323. https://doi.org/10.4018/978-1-59904-804-8.ch013
Yin G, Jiang F, Cheng S, Li X, He X (2012) AUTrust: a practical trust measurement for adjacent users in social networks. In: 2nd International conference on cloud and green computing, Xiangtan. https://doi.org/10.1109/CGC.2012.65
Yuji W (2017) The trust value calculating for social network based on machine learning. In: 9th international conference on intelligent human-machine systems and cybernetics (IHMSC), Hangzhou. https://doi.org/10.1109/IHMSC.2017.145
Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338–353. https://doi.org/10.1016/S0019-9958(65)90241-X
Zhang J, Ghorbani AA, Cohen R (2006) An improved familiarity measurement for formalization of trust in E-commerce based multiagent systems. In: International conference on privacy, security and trust: bridge the gap between PST technologies and business services, Markham. https://doi.org/10.1145/1501434.1501458
Zhao K, Pan L (2014) A machine learning based trust evaluation framework for online social networks. In: 13th international conference on trust, security and privacy in computing and communications, Beijing. https://doi.org/10.1109/TRUSTCOM.2014.13
Zhao S, Yan Z (2016) Trust evaluation in social networking: a review. In: 9th EAI international conference on mobile multimedia communications, Xi’an. https://doi.org/10.5555/3021385.3021397
Zouridaki C, Mark BL, Hejmo M, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: 3rd ACM workshop on security of ad hoc and sensor networks, Alexandria,. https://doi.org/10.1145/1102219.1102222
Funding
None of the authors of the paper have received any funding for the work reported in this paper.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interests.
Human and animal rights
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Vikash, Vijay Kumar, T.V. Trust assessment in social networks. Int J Syst Assur Eng Manag 15, 1650–1666 (2024). https://doi.org/10.1007/s13198-023-02118-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-023-02118-5