Trust in Social Media (Record no. 85104)

000 -LEADER
fixed length control field 04150nam a22004935i 4500
001 - CONTROL NUMBER
control field 978-3-031-02345-3
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730163910.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220601s2015 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031023453
-- 978-3-031-02345-3
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Tang, Jiliang.
245 10 - TITLE STATEMENT
Title Trust in Social Media
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2015.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIII, 115 p.
490 1# - SERIES STATEMENT
Series statement Synthesis Lectures on Information Security, Privacy, and Trust,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Acknowledgments -- Introduction -- Representing Trust -- Predicting Trust -- Applying Trust -- Incorporating Distrust -- Epilogue -- Bibliography -- Authors' Biographies .
520 ## - SUMMARY, ETC.
Summary, etc Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated content poses novel challenges for online users to find relevant information, or, in other words, exacerbates the information overload problem. On the other hand, the quality of user-generated content can vary dramatically from excellence to abuse or spam, resulting in a problem of information credibility. The study and understanding of trust can lead to an effective approach to addressing both information overload and credibility problems. Trust refers to a relationship between a trustor (the subject that trusts a target entity) and a trustee (the entity that is trusted). In the context of social media, trust provides evidence about with whom we can trust to share information and from whom we can accept information without additional verification. With trust, we make the mental shortcut by directly seeking information from trustees or trusted entities, which serves a two-fold purpose: without being overwhelmed by excessive information (i.e., mitigated information overload) and with credible information due to the trust placed on the information provider (i.e., increased information credibility). Therefore, trust is crucial in helping social media users collect relevant and reliable information, and trust in social media is a research topic of increasing importance and of practical significance. This book takes a computational perspective to offer an overview of characteristics and elements of trust and illuminate a wide range of computational tasks of trust. It introduces basic concepts, deliberates challenges and opportunities, reviews state-of-the-art algorithms, and elaborates effective evaluation methods in the trust study. In particular, we illustrate properties and representation models of trust, elucidate trust prediction with representative algorithms, and demonstrate real-world applications where trust is explicitly used. As a new dimension of the trust study, we discuss the concept of distrust and its roles in trust computing.
700 1# - AUTHOR 2
Author 2 Liu, Huan.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-02345-3
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2015.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1945-9750
912 ## -
-- ZDB-2-SXSC

No items available.