Abstract
We identify robust features of trust in social networks; these are features which are discriminating yet uncorrelated and can potentially be used to predict trust formation between agents in other social networks. The features we investigate are based on an agent’s individual properties as well as those based on the agent’s location within the network. In addition, we analyze features which take into account the agent’s participation in other social interactions within the same network. Three datasets were used in our study—Sony Online Entertainment’s EverQuest II game dataset, a large email network with sentiments and the publicly available Epinions dataset. The first dataset captures activities from a complex persistent game environment characterized by several types of in-game social interactions, whereas the second dataset has anonymized information about people’s email and instant messaging communication. We formulate the problem as one of the link predictions, intranetwork and internetwork, in social networks. We first build machine learning models and then perform an ablation study to identify robust features of trust. Results indicate that shared skills and interests between two agents, their level of activity and level of expertise are the top three predictors of trust in a social network. Furthermore, if only network topology information were available, then an agent’s propensity to connect or communicate, the cosine similarity between two agents and shortest distance between them are found to be the top three predictors of trust. In our study, we have identified the generic characteristics of the networks used as well as the features investigated so that they can be used as guidelines for studying the problem of predicting trust formation in other social networks.























Similar content being viewed by others
Notes
In case of the EverQuest II dataset, we use player sums of session lengths (in minutes) to approximate avatar age. A player session is defined as a contiguous period of player activity. Since the activity logs in EverQuest II only record player actions, we used a simple heuristic to define player session. A session consists of sets of activities which are separated by no more than 30 min.
References
Abdul-Rahman A, Hailes S (1997) A distributed trust model. In: Proceedings of the 1997 workshop on New security paradigms, NSPW ’97, New York, NY, USA. ACM, pp 48–60
Adamic LA, Adar E (2003) Friends and neighbors on the web. Soc Netw 25(3):211–230
Ahmad MA, Huffaker D, Wang J, Treem J, Kumar D, Poole MS, Srivastava J (2010a) The many faces of mentoring in an mmorpg. In: 2010 IEEE Second International Conference on Social Computing (SocialCom), pp 270 –275
Ahmad M, Borbora ZH, Srivastava J, Contractor N (2010b) Link prediction across multiple social networks. In: ICDM Workshops, pp 911–918
Ahmad M, Huffaker DA, Wang J, William Treem J, Scott Poole M, Srivastava J (2010c) Gtpa: a generative model for online mentor-apprentice networks. In: AAAI
Ahmad MA, Ahmad I, Srivastava J, Poole M (2011) Trust me, i am an expert: trust, homophily and expertise in mmos. In: IEEE international conference on social computing
Ahmad MA, Borbora ZH, Shen C, Srivastava J, Williams D (2011) Guilds play in mmos: rethinking common group dynamics models. In: 3rd International conference on social informatics
Artz D, Gil Y (2007) A survey of trust in computer science and the semantic web. Web Semantics: science, services and agents on the world wide web. Softw Eng Semantic Web 5(2):58–71
Borbora ZH, Ahmad MA, Haigh KZ, Srivastava J, Wen Z (2011) Exploration of robust features of trust across multiple social networks. In: Workshop on trustworthy self-organizing systems, 2nd edn.
Castelfranchi C, Falcone R (1998) Principles of trust for mas: cognitive anatomy, social importance, and quantification, pp 72–79
Castronova E, Williams D, Shen C, Ratan R, Xiong L, Huang Y, Keegan B (2009) As real as real? macroeconomic behavior in a large-scale virtual world. 11(5):685–707
Davis D, Lichtenwalter R, Chawla N (2013) Supervised methods for multi-relational link prediction. Soc Netw Anal Min, pp 1–15. doi:10.1007/s13278-012-0068-6
Douceur JR, Donath JS (2002) The sybil attack, pp 251–260
Freeman L (1977) A set of measures of centrality based upon betweenness. Sociometry, pp 35–41
Gambetta D (1988) Can we trust trust? In: Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213–237
Golbeck J (2008) Computing with social trust, 1st edn. Springer, Berlin
Golbeck J (2005) Computing and applying trust in web-based social networks. University of Maryland, College Park
Gray E, Seigneur J-M, Chen Y, Jensen C (2003) Trust propagation in small worlds, Trust management. In: Nixon P, Terzis S (eds) Lecture notes in computer science, vol 2692. Springer, Berlin, p 1072
Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The weka data mining software: an update. SIGKDD Explor 11(1):10–18
Hall MA (2000) Correlation-based feature selection for discrete and numeric class machine learning. In: Proceedings of 17th international conference on machine learning, pp 359–366
Al Hasan M, Chaoji V, Salem S, Zaki M (2006) Link prediction using supervised learning. In: Workshop on Link Analysis, Counter-terrorism and Security, SIAM
Huffaker D, (Annie) Wang J, Treem J, Ahmad MA, Fullerton L, Williams D, Poole MS, Contractor N (2009) The social behaviors of experts in massive multiplayer online role-playing games. In: IEEE international conference on computational science and engineering, vol 4, pp 326–331
Jaccard P (1901) Distribution de la flore alpine dans le bassin des dranses et dans quelques régions voisines. Bulletin de la Société Vaudoise des Sciences Naturelles 37:241–272
Levien R (2004) Attack resistant trust metrics. Technical report
Marsh SP (1994) Formalising trust as a computational concept. Technical report, University of Stirling. Department of Mathematics and Computer Science
Massa P, Avesani P (2006) Trust-aware bootstrapping of recommender systems. In: Proceedings of ECAI workshop on recommender systems, pp 29–33
Massa P, Avesani P (2004) Trust-aware collaborative filtering for recommender systems. In: Proceedings of Federated international conference on the move to meaningful internet: CoopIS, DOA, ODBASE, pp 492–508
Mitchell TM. (1997) Machine learning. McGraw-Hill, New York
Monge PR, Contractor N (2003) Theories of communication networks. Oxford University Press, Cambridge
Mui L, Mohtashemi M (2002) A computational model of trust and reputation. In: Proceedings of the 35th Hawaii international conference on system science (HICSS)
Newman MEJ (2001) The structure of scientific collaboration networks. Proc Natl Acad Sci 98(2):404–409
Nieminen J (1974) On the centrality in a graph. Scand J Psychol 15:332–336
O’Donovan J, Smyth B (2005) Trust in recommender systems. In: Proceedings of the 10th international conference on Intelligent user interfaces, IUI ’05. ACM, New York, pp 167–174
Pang B, Lee L (2008) Opinion mining and sentiment analysis. Found Trends Inf Retr 2(1–2):1–135
Ramchurn SD, Huynh D, Jennings NR (2004) Trust in multi-agent systems. Knowl Eng Rev 19:2004
Sabater J, Sierra C (2001) Regret: a reputation model for gregarious societies, pp 61–69
Salton G, McGill MJ (1983) Introduction to modern information retrieval. McGraw-Hill, New York
Sørensen T (1948) A method of establishing groups of equal amplitude in plant sociology based on similarity of species content and its application to analyses of the vegetation on danish commons. Biologiske Skrifter / udg. af det Kgl. Danske Videnskabernes Selskab, pp 1–34
Wang D, Sutcliffe A, Zeng X-J (2011) A trust-based multi-ego social network model to investigate emotion diffusion. Soc Netw Anal Min 1:287–299. doi:10.1007/s13278-011-0019-7
Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge
Wilson T, Wiebe J, Hoffmann P (2005) Recognizing contextual polarity in phrase-level sentiment analysis. In: Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, HLT ’05. Association for Computational Linguistics, Stroudsburg, pp 347–354
Witkowski M, Artikis E, Pitt J (2001) Experiments in building experiential trust in a society of objective-trust based agents. In: Trust in cyber-societies, vol LNAI 2246. Springer, Berlin, pp 111–132
Wu L, Lin C, Aral S, Brynjolfsson E (2009) Value of social network—a large-scale analysis on network structure impact to financial revenue of information technology consultants. In: The winter conference on business intelligence
Yang J, Wen Z, Adamic LA, Ackerma MS, Li C-Y (2011) Collaborating globally: culture and organizational computer-mediated communications. In: Proceedings of the international conference on information systems (ICIS), Shanghai, China
Yu B, Singh MP (2002) An evidential model of distributed reputation management. In: Proceedings of first international joint conference on autonomous agents and multiagent systems. ACM Press, New York, pp 294–301
Zhang Z, Wang K (2013) A trust model for multimedia social networks. Soc Netw Anal Min, pp 1–11. doi:10.1007/s13278-012-0078-4
Zhou T, Lü L, Zhang Y-C (2009) Predicting missing links via local information. Eur Phys J B Condens Matter Complex Syst 71(4):623–630
Ziegler C-N, Lausen G (2004) Spreading activation models for trust propagation. In: 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE ’04, pp 83–97
Acknowledgments
The research reported herein was supported by the AFRL via Contract No. FA8650-10-C-7010, the ARL Network Science CTA via BBN TECH/W911NF-09-2-0053 and by DARPA via Grant Number W911NF-12-C-0028. The data used for this research were provided by the Sony Online Entertainment. We gratefully acknowledge all our sponsors. We would also like to thank Nishith Pathak for his valuable critique and feedback while writing the paper. The findings presented do not in any way represent, either directly or through implication, the policies of these organizations.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Borbora, Z.H., Ahmad, M.A., Oh, J. et al. Robust features of trust in social networks. Soc. Netw. Anal. Min. 3, 981–999 (2013). https://doi.org/10.1007/s13278-013-0136-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13278-013-0136-6