000 04150nam a22004935i 4500
001 978-3-031-02345-3
003 DE-He213
005 20240730163910.0
007 cr nn 008mamaa
008 220601s2015 sz | s |||| 0|eng d
020 _a9783031023453
_9978-3-031-02345-3
024 7 _a10.1007/978-3-031-02345-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aTang, Jiliang.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_981096
245 1 0 _aTrust in Social Media
_h[electronic resource] /
_cby Jiliang Tang, Huan Liu.
250 _a1st ed. 2015.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _aXIII, 115 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSynthesis Lectures on Information Security, Privacy, and Trust,
_x1945-9750
505 0 _aAcknowledgments -- Introduction -- Representing Trust -- Predicting Trust -- Applying Trust -- Incorporating Distrust -- Epilogue -- Bibliography -- Authors' Biographies .
520 _aSocial media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated content poses novel challenges for online users to find relevant information, or, in other words, exacerbates the information overload problem. On the other hand, the quality of user-generated content can vary dramatically from excellence to abuse or spam, resulting in a problem of information credibility. The study and understanding of trust can lead to an effective approach to addressing both information overload and credibility problems. Trust refers to a relationship between a trustor (the subject that trusts a target entity) and a trustee (the entity that is trusted). In the context of social media, trust provides evidence about with whom we can trust to share information and from whom we can accept information without additional verification. With trust, we make the mental shortcut by directly seeking information from trustees or trusted entities, which serves a two-fold purpose: without being overwhelmed by excessive information (i.e., mitigated information overload) and with credible information due to the trust placed on the information provider (i.e., increased information credibility). Therefore, trust is crucial in helping social media users collect relevant and reliable information, and trust in social media is a research topic of increasing importance and of practical significance. This book takes a computational perspective to offer an overview of characteristics and elements of trust and illuminate a wide range of computational tasks of trust. It introduces basic concepts, deliberates challenges and opportunities, reviews state-of-the-art algorithms, and elaborates effective evaluation methods in the trust study. In particular, we illustrate properties and representation models of trust, elucidate trust prediction with representative algorithms, and demonstrate real-world applications where trust is explicitly used. As a new dimension of the trust study, we discuss the concept of distrust and its roles in trust computing.
650 0 _aData protection.
_97245
650 1 4 _aData and Information Security.
_931990
700 1 _aLiu, Huan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_981097
710 2 _aSpringerLink (Online service)
_981098
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031012174
776 0 8 _iPrinted edition:
_z9783031034732
830 0 _aSynthesis Lectures on Information Security, Privacy, and Trust,
_x1945-9750
_981099
856 4 0 _uhttps://doi.org/10.1007/978-3-031-02345-3
912 _aZDB-2-SXSC
942 _cEBK
999 _c85104
_d85104