skip to main content
10.1145/2984393.2984400acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesseeda-cecnsmConference Proceedingsconference-collections
research-article

Reputation Mechanisms in on-line Social Networks: The case of an Influence Estimation System in Twitter

Authors Info & Claims
Published:25 September 2016Publication History

ABSTRACT

Online social networks have changed the way people communicate, create content and share it via online social actions. In order for users to engage in a social network application, they need mechanisms that will help them to find other users that they can trust in some context and also qualitative and useful content. Reputation systems offer such mechanisms and are thus essential in Social Networks (SNs). Due to their open and social nature and to their different objectives, reputation systems for SN-based applications comprise of various different mechanisms which fulfill the different objectives in the specific application context. There is thus the need for a systematic study of the specific aspects of these systems, which can provide insights for the design of reputation systems in specific application contexts. In our paper we present a taxonomy of reputation systems for various SN applications based on their specific aspects. We then use this taxonomy to design a reputation system for microblogging systems and present our implementation for a reputation system for Twitter which estimates a specific notion of reputation; the influence of users and of specific subjects of discussion.

References

  1. Marti, S., and Garcia-Molina, H. 2006. Taxonomy of trust: categorizing P2P reputation systems. Comput. Netw. 50, 4 (March 2006), 472--484. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Jøsang, A., Ismail, R., and Boyd, C. 2007. A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 2 (March 2007), 618--644. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Khalid, O., Khan, S. U., Madani, S. A., Hayat, K., Khan, M. I., Min-Allah, N., Kolodziej, J., Wang, L., Zeadally, S. Chen, D. 2013. Comparative Study of Trust and Reputation Systems for Wireless Sensor Networks. Secur. Commun. Netw. 6, 6, 669--688.Google ScholarGoogle ScholarCross RefCross Ref
  4. YouTube, www.youtube.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  5. Flickr, www.flickr.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  6. Techcrunch, www.techcrunch.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  7. Mashable, www.mashable.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  8. Twitter, www.twitter.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  9. Yelp, www.yelp.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  10. Epinions, www.epinions.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  11. Facebook, www.facebook.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  12. Ahmed, S. and Ezeife, C. I. Discovering Influential Nodes from Trust Network. In Proceedings of the 28th Annual ACM Symposium on Applied Computing (Coimbra, Portugal, March 18-22, 2013). SAC '13. ACM, New York, NY, USA, 121--128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Agarwal, N, Liu, H., Tang, L. and Yu, P. S. Identifying the Influential Bloggers in a Community. In Proceedings of the International Conference on Web Search and Web Data Mining (2008). (Palo Alto, California, USA, Feb. 11-12, 2008). WSDM '08. ACM, New York, NY, 207--218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Reddit, www.reddit.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  15. Dellarocas, C. 2010. Online Reputation Systems: How to Design One That Does What You Need. MIT Sloan Management Review, 51, 3 (Issue of Summer 2010), 33--38.Google ScholarGoogle Scholar
  16. Farmer, R. and Glass, B. 2010. Building Web Reputation Systems (1st ed.). Yahoo! Press, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Nickerson, R., Muntermann, J., Varshney, U, and Isaac, H. Taxonomy Development in Information Systems: Developing a Taxonomy of Mobile Applications. In Proceedings of the European Conference on Information Systems (2009). ECIS 2009 Proceedings, Paper 388.Google ScholarGoogle Scholar
  18. Hendrikx, F., Bubendorfer, K., and Chard, R. 2015. Reputation Systems: A survey and taxonomy. J. Parallel Distrib. Comput. 75, C (Jan. 2015) 184--197. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Digg, www.digg.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  20. Delicious, www.delicious.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  21. Han, Y., Kim, L., and Cha, J. Evaluation of User Reputation on YouTube. In Proceedings of the 3d International Conference on Online Communities and Social Computing (Jul. 19-24, 2009). OCSC '09. LNCS, 346--353. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. TrackMaven retweet report, http://trackmaven.com/resources/retweet-report/ {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  23. Wikipedia, www.wikipedia.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  24. Klout, http://klout.com/ {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  25. Amazon, www.amazon.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  26. LinkedIn, www.linkedin.com {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  27. Twitter widgets, https://dev.twitter.com/web/overview {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  28. https://www.javascript.com/ {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  29. https://jquery.com/ {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  30. http://www.css3.info/modules/ {last accessed on 30/6/2016}Google ScholarGoogle Scholar
  31. https://www.w3.org/TR/html5/ {last accessed on 30/6/2016}Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SEEDA-CECNSM '16: Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference
    September 2016
    126 pages
    ISBN:9781450348102
    DOI:10.1145/2984393

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 25 September 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader