10,398 research outputs found

    Three Essays on Trust Mining in Online Social Networks

    Get PDF
    This dissertation research consists of three essays on studying trust in online social networks. Trust plays a critical role in online social relationships, because of the high levels of risk and uncertainty involved. Guided by relevant social science and computational graph theories, I develop conceptual and predictive models to gain insights into trusting behaviors in online social relationships. In the first essay, I propose a conceptual model of trust formation in online social networks. This is the first study that integrates the existing graph-based view of trust formation in social networks with socio-psychological theories of trust to provide a richer understanding of trusting behaviors in online social networks. I introduce new behavioral antecedents of trusting behaviors and redefine and integrate existing graph-based concepts to develop the proposed conceptual model. The empirical findings indicate that both socio-psychological and graph-based trust-related factors should be considered in studying trust formation in online social networks. In the second essay, I propose a theory-based predictive model to predict trust and distrust links in online social networks. Previous trust prediction models used limited network structural data to predict future trust/distrust relationships, ignoring the underlying behavioral trust-inducing factors. I identify a comprehensive set of behavioral and structural predictors of trust/distrust links based on related theories, and then build multiple supervised classification models to predict trust/distrust links in online social networks. The empirical results confirm the superior fit and predictive performance of the proposed model over the baselines. In the third essay, I propose a lexicon-based text mining model to mine trust related user-generated content (UGC). This is the first theory-based text mining model to examine important factors in online trusting decisions from UGC. I build domain-specific trustworthiness lexicons for online social networks based on related behavioral foundations and text mining techniques. Next, I propose a lexicon-based text mining model that automatically extracts and classifies trustworthiness characteristics from trust reviews. The empirical evaluations show the superior performance of the proposed text mining system over the baselines

    On the Troll-Trust Model for Edge Sign Prediction in Social Networks

    Get PDF
    In the problem of edge sign prediction, we are given a directed graph (representing a social network), and our task is to predict the binary labels of the edges (i.e., the positive or negative nature of the social relationships). Many successful heuristics for this problem are based on the troll-trust features, estimating at each node the fraction of outgoing and incoming positive/negative edges. We show that these heuristics can be understood, and rigorously analyzed, as approximators to the Bayes optimal classifier for a simple probabilistic model of the edge labels. We then show that the maximum likelihood estimator for this model approximately corresponds to the predictions of a Label Propagation algorithm run on a transformed version of the original social graph. Extensive experiments on a number of real-world datasets show that this algorithm is competitive against state-of-the-art classifiers in terms of both accuracy and scalability. Finally, we show that troll-trust features can also be used to derive online learning algorithms which have theoretical guarantees even when edges are adversarially labeled.Comment: v5: accepted to AISTATS 201

    Using Noninvasive Brain Measurement to Explore the Psychological Effects of Computer Malfunctions on Users during Human-Computer Interactions

    Full text link
    In today’s technologically driven world, there is a need to better understand the ways that common computer malfunctions affect computer users. These malfunctions may have measurable influences on computer user’s cognitive, emotional, and behavioral responses. An experiment was conducted where participants conducted a series of web search tasks while wearing functional nearinfrared spectroscopy (fNIRS) and galvanic skin response sensors. Two computer malfunctions were introduced during the sessions which had the potential to influence correlates of user trust and suspicion. Surveys were given after each session to measure user’s perceived emotional state, cognitive load, and perceived trust. Results suggest that fNIRS can be used to measure the different cognitive and emotional responses associated with computer malfunctions. These cognitive and emotional changes were correlated with users’ self-report levels of suspicion and trust, and they in turn suggest future work that further explores the capability of fNIRS for the measurement of user experience during human-computer interactions

    Trust, Contracting, and Adaptation in Agri‐Food Hybrid Structures

    Get PDF
    The paper considers the relationship between trust and governance structure from a Transaction Cost Economics perspective. The role of trust in the coordinating decisions is variously conceptualized according to the theoretical view adopted by the scholars. The present study adopt the three‐level schema introduced by Williamson (1996) and suggest that determinants of trust may operate both at institutional and governance structure level. The analytical framework depicted maintains that trust may determine a reduction of ex post transaction cost in the adaptation of hybrid structure. As a consequence trust appears to be able to extend the range of existence of the hybrids. The empirical part of the study is dedicated to a case study which illustrates the emerging of conditional trust (Fritz et al., 2008) and the role of trust in the adaptation process.hybrid, conditional trust, adaptation, contractual relationship., Food Consumption/Nutrition/Food Safety, Food Security and Poverty, Industrial Organization, Research Methods/ Statistical Methods,

    Omnivorousness in sport: The importance of social capital and networks

    Get PDF
    There has been for some time a significant and growing body of research around the relationship between sport and social capital. Similarly, within sociology there has been a corpus of work that has acknowledged the emergence of the omnivore–univore relationship. Surprisingly, relatively few studies examining sport and social capital have taken the omnivore–univore framework as a basis for understanding the relationship between sport and social capital. This gap in the sociology of sport literature and knowledge is rectified by this study that takes not Putnam, Coleman or Bourdieu, but Lin’s social network approach to social capital. The implications of this article are that researchers investigating sport and social capital need to understand more about how social networks and places for sport work to create social capital and, in particular, influence participating in sporting activities. The results indicate that social networks both facilitate and constrain sports participation; whilst family and friendship networks are central in active lifestyles, those who are less active have limited networks

    Directed closure coefficient and its patterns.

    Full text link
    The triangle structure, being a fundamental and significant element, underlies many theories and techniques in studying complex networks. The formation of triangles is typically measured by the clustering coefficient, in which the focal node is the centre-node in an open triad. In contrast, the recently proposed closure coefficient measures triangle formation from an end-node perspective and has been proven to be a useful feature in network analysis. Here, we extend it by proposing the directed closure coefficient that measures the formation of directed triangles. By distinguishing the direction of the closing edge in building triangles, we further introduce the source closure coefficient and the target closure coefficient. Then, by categorising particular types of directed triangles (e.g., head-of-path), we propose four closure patterns. Through multiple experiments on 24 directed networks from six domains, we demonstrate that at network-level, the four closure patterns are distinctive features in classifying network types, while at node-level, adding the source and target closure coefficients leads to significant improvement in link prediction task in most types of directed networks
    • 

    corecore