Predicting Trust Relations Within a Social Network: A Case Study on Emergency Response

Trust is a fundamental construct underpinning modern society and the social exchanges it contains. The rise of Web 2.0 technologies and the increased use of online social networks, promotes the study of trust among users. Drawing on social and psychological theory, we detect pairwise and global trust relations between users in the context of emergent real-world crisis scenarios. In such situations and scale, seeking explicit pairwise trust assessments between users is impractical. Instead, in an unsupervised manner we integrate the implicit factors of social influence exerted by each user over the network, the underlying network structural topology and the affective valence expressed by the users in the textual content they communicate. A key finding is the importance of modeling influence and affective valence in such exchanges and their role in detecting stable trust relationships. We extensively evaluate these ideas and demonstrate significant gains over competitive baselines across multiple datasets drawn from both crisis and non-crisis scenarios, including those with normative ground truth.

[1]  Paolo Avesani,et al.  Controversial Users Demand Local Trust Metrics: An Experimental Study on Epinions.com Community , 2005, AAAI.

[2]  Huan Liu,et al.  Exploiting homophily effect for trust prediction , 2013, WSDM.

[3]  M. KleinbergJon Authoritative sources in a hyperlinked environment , 1999 .

[4]  C. Castelfranchi,et al.  Social Trust : A Cognitive Approach , 2000 .

[5]  Jure Leskovec,et al.  Predicting positive and negative links in online social networks , 2010, WWW '10.

[6]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[7]  K. Arrow The limits of organization , 1974 .

[8]  Wei Chen,et al.  Efficient Topic-aware Influence Maximization Using Preprocessing , 2014, ArXiv.

[9]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[10]  Qi He,et al.  TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.

[11]  Srinivasan Parthasarathy,et al.  On Understanding the Divergence of Online Social Group Discussion , 2014, ICWSM.

[12]  Piotr Indyk,et al.  Similarity Search in High Dimensions via Hashing , 1999, VLDB.

[13]  Moses Charikar,et al.  Similarity estimation techniques from rounding algorithms , 2002, STOC '02.

[14]  James A. Hendler,et al.  Inferring binary trust relationships in Web-based social networks , 2006, TOIT.

[15]  Huan Liu,et al.  Trust in Social Media , 2015, Synthesis Lectures on Information Security, Privacy, & Trust.

[16]  Brian D. Davison,et al.  Topical TrustRank: using topicality to combat web spam , 2006, WWW '06.

[17]  Leysia Palen,et al.  Microblogging during two natural hazards events: what twitter may contribute to situational awareness , 2010, CHI.

[18]  Carlos Castillo,et al.  Big Crisis Data. , 2015, WebMedia 2015.

[19]  Tomoharu Iwata,et al.  Strength of social influence in trust networks in product review sites , 2011, WSDM '11.

[20]  Jennifer Golbeck,et al.  Investigating interactions of trust and interest similarity , 2007, Decis. Support Syst..

[21]  Srinivasan Parthasarathy,et al.  A viewpoint-based approach for interaction graph analysis , 2009, KDD.

[22]  Sibel Adali,et al.  Actions speak as loud as words: predicting relationships from social behavior data , 2012, WWW.

[23]  Huan Liu,et al.  mTrust: discerning multi-faceted trust in a connected world , 2012, WSDM '12.

[24]  Joyce E. Berg,et al.  Trust, Reciprocity, and Social History , 1995 .

[25]  Jennifer Golbeck,et al.  Trust and nuanced profile similarity in online social networks , 2009, TWEB.

[26]  Paolo Massa,et al.  Trustlet, Open Research on Trust Metrics , 2001, BIS.

[27]  Amit P. Sheth,et al.  Spatio-Temporal-Thematic Analysis of Citizen Sensor Data: Challenges and Experiences , 2009, WISE.

[28]  Gene I. Rochlin,et al.  Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations , 2004, ISI.

[29]  Jaana Kekäläinen,et al.  Cumulated gain-based evaluation of IR techniques , 2002, TOIS.

[30]  A. Lott,et al.  Group cohesiveness as interpersonal attraction: a review of relationships with antecedent and consequent variables. , 1965, Psychological bulletin.

[31]  D. Goldberg,et al.  Assessing experimentally derived interactions in a small world , 2003, Proceedings of the National Academy of Sciences of the United States of America.

[32]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[33]  Santo Fortunato,et al.  Community detection in graphs , 2009, ArXiv.

[34]  Daniel M. Romero,et al.  Influence and passivity in social media , 2010, ECML/PKDD.

[35]  Matthew Richardson,et al.  Mining the network value of customers , 2001, KDD '01.

[36]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[37]  B. J. Fogg,et al.  The elements of computer credibility , 1999, CHI '99.

[38]  Ghazaleh Beigi,et al.  Exploiting Emotional Information for Trust/Distrust Prediction , 2016, SDM.

[39]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[40]  H. Tajfel Social identity and intergroup relations , 1985 .

[41]  Yao-Hua Tan,et al.  Trust and Deception in Virtual Societies , 2001, Springer Netherlands.

[42]  Jing Zhao,et al.  Document Clustering Based on Nonnegative Sparse Matrix Factorization , 2005, ICNC.

[43]  Sibel Adali,et al.  Measuring behavioral trust in social networks , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.

[44]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[45]  Mike Thelwall,et al.  Sentiment strength detection for the social web , 2012, J. Assoc. Inf. Sci. Technol..

[46]  J. Golbeck,et al.  FilmTrust: movie recommendations using trust in web-based social networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[47]  Inderjit S. Dhillon,et al.  Low rank modeling of signed networks , 2012, KDD.

[48]  Erwin Kreyszig,et al.  Advanced Engineering Mathematics, Maple Computer Guide , 2000 .

[49]  C. Larsen The Rise and Fall of Social Cohesion: The Construction and De-construction of Social Trust in the US, UK, Sweden and Denmark , 2013 .

[50]  James W. Pennebaker,et al.  Linguistic Inquiry and Word Count (LIWC2007) , 2007 .

[51]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[52]  Nicola Barbieri,et al.  Online Topic-aware Influence Maximization Queries , 2014, EDBT.

[53]  P. Sztompka Trust: A Sociological Theory , 2000 .

[54]  Yarden Katz,et al.  Social Network-based Trust in Prioritized Default Logic , 2006, AAAI.

[55]  William A. Wallace,et al.  Trust in digital information , 2008, J. Assoc. Inf. Sci. Technol..

[56]  Srinivasan Parthasarathy,et al.  Bayesian Locality Sensitive Hashing for Fast Similarity Search , 2011, Proc. VLDB Endow..

[57]  Daniel Thalmann,et al.  ETAF: An extended trust antecedents framework for trust prediction , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).