MODELING COMPUTATIONAL TRUST BASED ON INTERACTION EXPERIENCE AND REPUTATION WITH USER INTERESTS IN SOCIAL NETWORK
Keywords:Computational trust, Context, Intelligent systems, Interaction, Interests, Social network, Reputation.
Computational trust among peers plays a crucial role in sharing information, decision making, searching or attracting recommendations in intelligent systems and social networks. However, most trust models focus on considering interaction forms rather than analyzing contexts such as comments, posts being dispatched by users on social media. The purpose of this paper is to present a novel model of computational trust among a truster and a trustee in two stages. First, we construct a function, named experience topic-aware trust, whose computation is based on users interaction and their interests on topics. Then we establish a composition function, named topic-aware trust, which is constructed from the estimation of truster’s direct experience trust and some reputation trust on some trustee. Our experimental results show that the interest degrees affect on trust estimation more than interaction ones. In addition, the more interest degree in a topic users obtain, the more trustworthy they are.
How to Cite
License1. We hereby assign copyright of our article (the Work) in all forms of media, whether now known or hereafter developed, to the Journal of Computer Science and Cybernetics. We understand that the Journal of Computer Science and Cybernetics will act on my/our behalf to publish, reproduce, distribute and transmit the Work.
2. This assignment of copyright to the Journal of Computer Science and Cybernetics is done so on the understanding that permission from the Journal of Computer Science and Cybernetics is not required for me/us to reproduce, republish or distribute copies of the Work in whole or in part. We will ensure that all such copies carry a notice of copyright ownership and reference to the original journal publication.
3. We warrant that the Work is our results and has not been published before in its current or a substantially similar form and is not under consideration for another publication, does not contain any unlawful statements and does not infringe any existing copyright.
4. We also warrant that We have obtained the necessary permission from the copyright holder/s to reproduce in the article any materials including tables, diagrams or photographs not owned by me/us.