|
|
xiii | |
|
|
xv | |
Preface |
|
xvii | |
About the Editors |
|
xxi | |
Contributors |
|
xxiii | |
|
|
1 | (18) |
|
|
1 | (1) |
|
|
2 | (2) |
|
|
4 | (13) |
|
1.3.1 Computational Trust Modeling: A Review |
|
|
4 | (2) |
|
1.3.1.1 Summation and Average |
|
|
6 | (1) |
|
1.3.1.2 Bayesian Inference |
|
|
7 | (1) |
|
|
8 | (2) |
|
1.3.1.4 Iterative Methods |
|
|
10 | (1) |
|
1.3.2 Machine Learning for Trust Modeling |
|
|
11 | (1) |
|
1.3.2.1 A Little Bit about Machine Learning |
|
|
11 | (1) |
|
1.3.2.2 Machine Learning for Trust |
|
|
12 | (5) |
|
1.4 Structure of the Book |
|
|
17 | (2) |
|
2 Trust in Online Communities |
|
|
19 | (20) |
|
|
19 | (1) |
|
2.2 Trust in E-Commerce Environments |
|
|
20 | (5) |
|
2.3 Trust in Search Engines |
|
|
25 | (2) |
|
2.4 Trust in P2P Information Sharing Networks |
|
|
27 | (4) |
|
2.5 Trust in Service-Oriented Environments |
|
|
31 | (2) |
|
2.6 Trust in Social Networks |
|
|
33 | (3) |
|
|
36 | (3) |
|
3 Judging the Veracity of Claims and Reliability of Sources |
|
|
39 | (34) |
|
|
40 | (3) |
|
|
43 | (3) |
|
3.2.1 Foundations of Trust |
|
|
43 | (1) |
|
3.2.2 Consistency in Information Extraction |
|
|
44 | (1) |
|
3.2.2.1 Local Consistency |
|
|
44 | (1) |
|
3.2.2.2 Global Consistency |
|
|
44 | (1) |
|
|
45 | (1) |
|
3.2.3.1 Comparison to Credibility Analysis |
|
|
45 | (1) |
|
3.2.4 Comparison to Other Trust Mechanisms |
|
|
46 | (1) |
|
|
46 | (4) |
|
|
47 | (1) |
|
3.3.2 Fact-Finding Algorithms |
|
|
48 | (1) |
|
3.3.2.1 Sums (Hubs and Authorities) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
3.4 Generalized Constrained Fact-Finding |
|
|
50 | (1) |
|
3.5 Generalized Fact-Finding |
|
|
50 | (8) |
|
3.5.1 Rewriting Fact-Finders for Assertion Weights |
|
|
51 | (1) |
|
3.5.1.1 Generalized Sums (Hubs and Authorities) |
|
|
51 | (1) |
|
3.5.1.2 Generalized Average-Log |
|
|
51 | (1) |
|
3.5.1.3 Generalized Investment |
|
|
52 | (1) |
|
3.5.1.4 Generalized PooledInvestment |
|
|
52 | (1) |
|
3.5.1.5 Generalized TruthFinder |
|
|
52 | (1) |
|
3.5.1.6 Generalized 3-Estimates |
|
|
52 | (1) |
|
3.5.2 Encoding Information in Weighted Assertions |
|
|
53 | (1) |
|
3.5.2.1 Uncertainty in Information Extraction |
|
|
53 | (1) |
|
3.5.2.2 Uncertainty of the Source |
|
|
53 | (1) |
|
3.5.2.3 Similarity between Claims |
|
|
54 | (1) |
|
3.5.2.4 Group Membership via Weighted Assertions |
|
|
54 | (1) |
|
3.5.3 Encoding Groups and Attributes as Layers of Graph Nodes |
|
|
55 | (1) |
|
3.5.3.1 Source Domain Expertise |
|
|
56 | (2) |
|
3.5.3.2 Additional Layers versus Weighted Edges |
|
|
58 | (1) |
|
3.6 Constrained Fact-Finding |
|
|
58 | (4) |
|
3.6.1 Prepositional Linear Programming |
|
|
58 | (1) |
|
|
59 | (1) |
|
3.6.3 Values → Votes → Belief |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
3.6.6 "Unknown" Augmentation |
|
|
61 | (1) |
|
|
62 | (8) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
3.7.1.4 American vs. British Spelling |
|
|
63 | (1) |
|
|
63 | (1) |
|
3.7.3 Generalized Fact-Finding |
|
|
64 | (1) |
|
3.7.3.1 Tuned Assertion Certainty |
|
|
64 | (1) |
|
3.7.3.2 Uncertainty in Information Extraction |
|
|
65 | (1) |
|
3.7.3.3 Groups as Weighted Assertions |
|
|
65 | (1) |
|
3.7.3.4 Groups as Additional Layers |
|
|
66 | (1) |
|
3.7.4 Constrained Fact-Finding |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
3.7.4.3 Synthetic City Population |
|
|
68 | (1) |
|
3.7.4.4 Basic Biographies |
|
|
69 | (1) |
|
3.7.4.5 American vs. British Spelling |
|
|
69 | (1) |
|
3.7.5 The Joint Generalized Constrained Fact-Finding Frame-work |
|
|
70 | (1) |
|
|
70 | (3) |
|
4 Web Credibility Assessment |
|
|
73 | (50) |
|
|
74 | (1) |
|
4.2 Web Credibility Overview |
|
|
75 | (6) |
|
4.2.1 What Is Web Credibility? |
|
|
75 | (1) |
|
4.2.2 Introduction to Research on Credibility |
|
|
76 | (1) |
|
|
77 | (2) |
|
4.2.4 Definitions Used in This Chapter |
|
|
79 | (1) |
|
4.2.4.1 Information Credibility |
|
|
79 | (1) |
|
4.2.4.2 Information Controversy |
|
|
79 | (1) |
|
4.2.4.3 Credibility Support for Various Types of Information |
|
|
80 | (1) |
|
|
81 | (9) |
|
|
81 | (1) |
|
4.3.1.1 Existing Datasets |
|
|
81 | (1) |
|
4.3.1.2 Data from Tools Supporting Credibility Evaluation |
|
|
82 | (1) |
|
4.3.1.3 Data from Labelers |
|
|
82 | (1) |
|
4.3.2 Supporting Web Credibility Evaluation |
|
|
83 | (1) |
|
4.3.2.1 Support User's Expertise |
|
|
84 | (1) |
|
4.3.2.2 Crowdsourcing Systems |
|
|
84 | (1) |
|
4.3.2.3 Databases, Search Engines, Antiviruses and Lists of Pre-Scanned Sites |
|
|
85 | (1) |
|
4.3.2.4 Certification, Signatures and Seals |
|
|
85 | (1) |
|
4.3.3 Reconcile -- A Case Study |
|
|
86 | (4) |
|
4.4 Analysis of Content Credibility Evaluations |
|
|
90 | (12) |
|
|
90 | (3) |
|
4.4.2 Consensus and Controversy |
|
|
93 | (4) |
|
|
97 | (1) |
|
4.4.3.1 Omnipresent Negative Skew -- Shift Towards Positive |
|
|
97 | (2) |
|
4.4.3.2 Users Characteristics Affecting Credibility Evaluation -- Selected Personality Traits |
|
|
99 | (1) |
|
4.4.3.3 Users Characteristics Affecting Credibility Evaluation -- Cognitive Heuristics |
|
|
100 | (2) |
|
4.5 Aggregation Methods -- What Is The Overall Credibility? |
|
|
102 | (7) |
|
4.5.1 How to Measure Credibility |
|
|
102 | (1) |
|
4.5.2 Standard Aggregates |
|
|
103 | (4) |
|
4.5.3 Combating Bias -- Whose Vote Should Count More? |
|
|
107 | (2) |
|
4.6 Classifying Credibility Evaluations Using External Web Content Features |
|
|
109 | (14) |
|
4.6.1 How We Get Values of Outcome Variable |
|
|
109 | (1) |
|
4.6.2 Motivation for Building a Feature-Based Classifier of Webpages Credibility |
|
|
110 | (1) |
|
4.6.3 Classification of Web Pages Credibility -- Related Work |
|
|
110 | (1) |
|
4.6.4 Dealing with Controversy Problem |
|
|
111 | (1) |
|
4.6.5 Aggregation of Evaluations |
|
|
112 | (1) |
|
|
113 | (2) |
|
4.6.7 Results of Experiments with Building of Classifier Determining whether a Webpage Is Highly Credible (HC), Neutral (N) or Highly Not Credible (HNC) |
|
|
115 | (3) |
|
4.6.8 Results of Experiments with Build of Binary Classifier Determining whether Webpage Is Credible or Not |
|
|
118 | (2) |
|
4.6.9 Results of Experiments with Build of Binary Classifier of Controversy |
|
|
120 | (1) |
|
4.6.10 Summary and Improvement Suggestions |
|
|
120 | (3) |
|
5 Trust-Aware Recommender Systems |
|
|
123 | (34) |
|
|
124 | (11) |
|
5.1.1 Content-Based Recommendation |
|
|
126 | (1) |
|
5.1.2 Collaborative Filtering (CF) |
|
|
127 | (1) |
|
5.1.2.1 Memory-Based Collaborative Filtering |
|
|
128 | (2) |
|
5.1.2.2 Model-Based Collaborative Filtering |
|
|
130 | (1) |
|
5.1.3 Hybrid Recommendation |
|
|
130 | (1) |
|
5.1.4 Evaluating Recommender Systems |
|
|
131 | (2) |
|
5.1.5 Challenges of Recommender Systems |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
5.2 Computational Models of Trust in Recommender Systems |
|
|
135 | (10) |
|
5.2.1 Definition and Properties |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
5.2.1.3 Properties of Trust |
|
|
136 | (2) |
|
5.2.2 Global and Local Trust Metrics |
|
|
138 | (1) |
|
5.2.3 Inferring Trust Values |
|
|
139 | (1) |
|
5.2.3.1 Inferring Trust in Binary Trust Networks |
|
|
140 | (1) |
|
5.2.3.2 Inferring Trust in Continuous Trust Networks |
|
|
141 | (3) |
|
5.2.3.3 Inferring Implicit Trust Values |
|
|
144 | (1) |
|
5.2.3.4 Trust Aggregation |
|
|
145 | (1) |
|
|
145 | (1) |
|
5.3 Incorporating Trust in Recommender Systems |
|
|
145 | (10) |
|
5.3.1 Trust-Aware Memory-Based CF Systems |
|
|
148 | (1) |
|
5.3.1.1 Trust-Aware Filtering |
|
|
148 | (1) |
|
5.3.1.2 Trust-Aware Weighting |
|
|
149 | (2) |
|
5.3.2 Trust-Aware Model-Based CF Systems |
|
|
151 | (2) |
|
5.3.3 Recommendation Using Distrust Information |
|
|
153 | (1) |
|
5.3.4 Advantages of Trust-Aware Recommendation |
|
|
154 | (1) |
|
5.3.5 Research Directions of Trust-Aware Recommendation |
|
|
154 | (1) |
|
|
155 | (2) |
|
6 Biases in Trust-Based Systems |
|
|
157 | (18) |
|
|
157 | (1) |
|
|
158 | (3) |
|
|
158 | (2) |
|
|
160 | (1) |
|
|
161 | (7) |
|
6.3.1 Unsupervised Approaches |
|
|
161 | (4) |
|
6.3.2 Supervised Approaches |
|
|
165 | (3) |
|
6.4 Lessening the Impact of Biases |
|
|
168 | (4) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (3) |
|
|
172 | (1) |
|
|
172 | (3) |
Bibliography |
|
175 | (28) |
Index |
|
203 | |