ABSTRACT
The increasing proliferation of social media results in users that are forced to ascertain the truthfulness of information that they encounter from unknown sources using a variety of indicators (e.g. explicit ratings, profile information, etc.). Through human-subject experimentation with an online social network-style platform, our study focuses on the determination of credibility in ego-centric networks based on subjects observing social network properties such as degree centrality and geodesic distance. Using manipulated social network graphs, we find that corroboration and degree centrality are most utilized by subjects as indicators of credibility. We discuss the implications of the use of social network graph structural properties and use principal components analysis to visualize the reduced dimensional space.
- M. Granovetter, "The Strength of Weak Ties: A Network Theory Revisited," in Sociological Theory vol. 1, 1983, pp. 201--233.Google ScholarCross Ref
- D. Easley and J. Kleinberg Networks, Crowds, and Markets: Reasoning About a Highly Connected World. Cambridge University Press, 2010. Google ScholarDigital Library
- E. Gilbert & K. Karahalios, "Predicting tie strength with social media." Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 2009. Google ScholarDigital Library
- J. Antin and E. F. Churchill, "Badges in social media: A social psychological perspective." in CHI 2011. Vancouver, BC, Canada. May 7--12, 2011.Google Scholar
- V. L. Rubin and E. D. Liddy, "Assessing credibility of weblogs."AAAI Symposium on Computational Approaches to Analysing Weblogs (AAAI-CAAW). ACM, 2006.Google Scholar
- T. Y. Berger-Wolf and J. Saia, "A framework for analysis of dynamic social networks." Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2006. Google ScholarDigital Library
- C. L. Armstrong and M. J. McAdams, "Blogs of information: How gender cues and individual motivations influence perceptions of credibility."Journal of Computer-Mediated Communication vol. 14 iss. 3, 2009, pp. 435--456.Google ScholarCross Ref
- M. Lesani and N. Montazeri, "Fuzzy Trust Aggregation and Personalized Trust Inference in Virtual Social Networks," Computational Intelligence vol. 25 iss. 2, 2009, pp. 51--83.Google ScholarCross Ref
- Y. Kim and H. Song, "Strategies for predicting local trust based on trust propagation in social networks," In Knowledge-Based Systems vol. 2, 2011, pp. 1360--1371.Google ScholarDigital Library
- R. Guha, R. Kumar, R. Raghavan and A. Tomkins, "Propagation of trust and distrust," Proceedings of the 13th International Conference on World Wide Web. New York, NY. 2004. Google ScholarDigital Library
- M. E. Brashears, "Humans use Compression Heuristics to Improve the Recall of Social Networks," in Scientific reports, vol. 3, 2013. doi: 10.1038/srep01513Google Scholar
- R. Dunbar, "How many friends does one person need?: Dunbar's number and other evolutionary quirks," London: Faber and Faber, 2010.Google Scholar
- P. Resnick, R. Zeckhauser, J. Swanson, and & K. Lockwood, "The Value of Reputation on e-Bay: A Controlled Experiment," Experimental Economics, vol. 2(9), 2006.Google Scholar
- L. Page, S. Brin, R. Motwani, and T. Winograd, "The PageRank Citation Ranking: Bringing Order to the Web, Stanford Digital Library Technologies Project, CA. Technical report, 1998.Google Scholar
- J. A. Golbeck and J. Hendler, "FilmTrust: Movie recommendations using trust in Web-based social networks," In Proceedings of the IEEE Consumer Communications and Networking Conference. Las Vegas, NV, 2006.Google Scholar
- J. A. Golbeck, "Computing and applying trust in web-based social networks," Ph.D. dissertation, Dept. of Computer Science, Univ. of Maryland., College Park, MD, 2005. Google ScholarDigital Library
- C. Castillo, M. Mendoza, and B. Poblete, "Information credibility on twitter." In Proceedings of the 20th International Conference on World Wide Web. ACM, 2011. Google ScholarDigital Library
- C. J. Hutto, E. Gilbert, and S. Yardi, "A Longitudinal Study of Follow Predictors on Twitter," in Proceedings of the 2013 ACM Annual Conference on Human Factors in Computing Systems (CHI). Paris, France, 2013. Google ScholarDigital Library
- D. M. Romero, W. Galuba, S. Asur, and B. A. Huberman, "Influence and passivity in social media," in Machine learning and knowledge discovery in databases, pp. 18--33. Springer Berlin Heidelberg. Google ScholarDigital Library
- G. A. Janicik and R. P. Larrick, "Social Network Schemas and The Learning of Incomplete Networks." In Journal of Personality and Social Psychology vol. 88, 2005, pp. 348--364.Google ScholarCross Ref
- N. Luhmann "Familiarity, confidence, trust: Problems and alternatives." in Gambetta, Diego (ed.) Trust: Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford, chapter 6, pp. Trust: Making and breaking cooperative relations, 6, 2000, pp. 94--107.Google Scholar
- B. M. DePaulo, J. J. Lindsay, B. E. Malone, L. Muhlenbruck, K. Charlton, and H. Cooper, "Cues to deception," Psychological bulletin, vol. 129(1), 2003, p. 74.Google ScholarCross Ref
- L. Zhou, J. K. Burgoon, J. F. Nunamaker, and D. Twitchell, "Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications," in Group decision and negotiation, vol. 13(1), 2004, pp. 81--106.Google Scholar
- L. Weiss, E. Briscoe, H. Hayes, O. Kemenova, S. Harbert, L. Li, G. Lebanon, C. Stewart, D. Miller, and D. Foy. "A Comparative Study of Social Media and Traditional Polling in the Egyptian Uprising of 2011," in Social Computing, Behavioral-Cultural Modeling and Prediction Lecture Notes in Computer Science, vol. 7812, 2013, pp 303--310. Google ScholarDigital Library
Recommendations
The role of smartphone-based social media capabilities in building social capital, trust, and credibility to engage consumers in eWOM: a social presence theory perspective
Smartphone-based social media has established itself a key platform for users to cultivate intimate social connections and exchange brand-related information, regardless of time or location, such as eWOM. However, understanding the essential elements of ...
The driving forces of Facebook social commerce
Trust is viewed as a crucial factor in social commerce due to the prominent role and significant amount of peer-generated contents. The current study aims to investigate the relationship between trust in social commerce and customers' purchase ...
Uses and gratifications of social networking sites for bridging and bonding social capital
Applying uses and gratifications theory (UGT) and social capital theory, our study examined users of four social networking sites (SNSs) (Facebook, Twitter, Instagram, and Snapchat), and their influence on online bridging and bonding social capital. ...
Comments