Abstract
Modeling trust in very large social networks is a hard problem due to the highly noisy nature of these networks that span trust relationships from many different contexts, based on judgments of reliability, dependability, and competence. Furthermore, relationships in these networks vary in their level of strength. In this article, we introduce a novel extension of structural balance theory as a foundational theory of trust and distrust in networks. Our theory preserves the distinctions between trust and distrust as suggested in the literature, but also incorporates the notion of relationship strength that can be expressed as either discrete categorical values, as pairwise comparisons, or as metric distances. Our model is novel, has sound social and psychological basis, and captures the classical balance theory as a special case. We then propose a convergence model, describing how an imbalanced network evolves towards new balance, and formulate the convergence problem of a social network as a Metric Multidimensional Scaling (MDS) optimization problem. Finally, we show how the convergence model can be used to predict edge signs in social networks and justify our theory through extensive experiments on real datasets.
- S. Adalı. 2013. Modeling Trust Context in Networks. Springer. Google Scholar
Digital Library
- D. Ames, S. Fiske, and A. Todorov. 2011. Impression formation: A focus on others' intents. In The Oxford Handbook of Social Neuroscience, J. Decety and J. Cacioppo, Eds., Oxford University Press, 419--433.Google Scholar
- S. Aral, L. Muchnik, and A. Sundararajan. 2009. Distinguishing influence based contagion from homophily driven diffusion in dynamic networks. Proc. Nat. Acad. Sci. 106, 51, 21544--21549.Google Scholar
Cross Ref
- P. Avesani, P. Massa, and R. Tiella. 2005. A trust-enhanced recommender system application: Moleskiing. In Proceedings of the ACM Symposium on Applied Computing (SAC'05). ACM Press, New York, 1589--1593. Google Scholar
Digital Library
- R. Balakrishnan and S. Kambhampati. 2011. Sourcerank: Relevance and trust assessment for deep web sources based on inter-source agreement. In Proceedings of the 20th International Conference on World Wide Web (WWW'11). 227--236. Google Scholar
Digital Library
- D. Cartwright and F. Harary. 1956. Structural balance: A generalization of heider's theory. Psychol. Rev. 63, 5, 277--293.Google Scholar
Cross Ref
- J. Davis. 1967. Clustering and structural balance in graphs. Hum. Relat. 20, 2, 181--187.Google Scholar
Cross Ref
- D. Do B. Defigueiredo and E. T. Barr. 2005. Trustdavis: A non-exploitable online reputation system. In Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC'05). IEEE Computer Society, 274--283. Google Scholar
Digital Library
- P. Doreian. 2002. Event sequences as generators of social network evolution. Social Netw. 24, 93--119.Google Scholar
Cross Ref
- T. Dubois, J. Golbeck, and A. Srinavasan. 2011. Predicting trust and distrust in social networks. In Proceedings of the IEEE International Conference on Social Computing (SocialCom'11).Google Scholar
- T. Dubois, J. Golbeck, and A. Srinivasan. 2009. Rigorous probabilistic trust-inference with applications to clustering. In Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT'09). IEEE Computer Society, 655--658. Google Scholar
Digital Library
- D. Easley and J. Kleinberg. 2010. Networks, Crowds, and Markets: Reasoning about a Highly Connected World. Cambridge University Press, New York. Google Scholar
Digital Library
- S. T. Fiske, A. J. Cuddy, and P. Glick. 2007. Universal dimensions of social cognition: Warmth and competence. Trends Cogn. Sci. 11, 2, 77--83.Google Scholar
Cross Ref
- E. R. Gansner, Y. Koren, and S. North. 2005. Graph drawing by stress majorization. In Proceedings of the 12th International Conference on Graph Drawing (GD'05), J. Pach, Ed., Lecture Notes in Computer Science, vol. 3383, Springer, 239--250. Google Scholar
Digital Library
- M. Granovetter. 1973. The strength of weak ties. Amer. J. Sociol. 78, 1--22.Google Scholar
Cross Ref
- R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. 2004. Propagation of trust and distrust. In Proceedings of the 13th International Conference on World Wide Web (WWW'04). ACM Press, New York, 403--412. Google Scholar
Digital Library
- M. Gupta, Y. Sun, and J. Han. 2011. Trust analysis with clustering. In Proceedings of the 20th International Conference on World Wide Web (WWW'11). 53--54. Google Scholar
Digital Library
- C. Hang, Y. Wang, and M. Singh. 2008. An adaptive probabilistic trust model and its evaluation. In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'08). Vol. 3. 1485--1488. Google Scholar
Digital Library
- B. Huang, A. Kimmig, L. Getoor, and J. Golbeck. 2013. A flexible framework for probabilistic models of social trust. In Proceedings of the International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction (SBP'13). 265--273. Google Scholar
Digital Library
- A. Josang, S. Marsh, and S. Pope. 2006. Exploring different types of trust propagation. In Proceedings of the 4th International Conference on Trust Management (iTrust'06). Vol. 3986, Springer, 179--192. Google Scholar
Digital Library
- U. Kuter and J. Golbeck. 2010. Using probabilistic confidence models for trust inference in web-based social networks. ACM Trans. Internet Technol. 10, 2, 1--23. Google Scholar
Digital Library
- H. Le, J. Pasternack, H. Ahmadi, M. Gupta, Y. Sun, T. Abdelzaher, J. Han, D. Roth, B. Szymanski, and S. Adalı. 2011. Apollo: Towards factfinding in participatory sensing. In Proceedings of the 10th International Conference on Information Processing in Sensor Networks (IPSN'11). 129--130.Google Scholar
- J. D. Leeuw. 1977. Applications of convex analysis to multidimensional scaling. In Recent Developments in Statistics, J. Barra, F. Brodeau, F. Romier, and B. V. Cutsem, Eds., North-Holland Publishing, 133--145.Google Scholar
- J. Leskovec, D. Huttenlocher, and J. Kleinberg. 2010. Predicting positive and negative links in online social networks. In Proceedings of the 19th International Conference on World Wide Web (WWW'10). ACM Press, New York, 641--650. Google Scholar
Digital Library
- R. Levien and A. Aiken. 1998. Attack-resistant trust metrics for public key certification. In Proceedings of the 7th USENIX Security Symposium (SSYM'98). Vol. 7, USENIX Association, 18. Google Scholar
Digital Library
- D. Liben-Nowell and J. Kleinberg. 2003. The link prediction problem for social networks. In Proceedings of the 12th International Conference on Information and Knowledge Management (CIKM'03). ACM Press, New York, 556--559. Google Scholar
Digital Library
- J. Patel, W. Teacy, N. Jennings, and M. Luck. 2005. A probabilistic trust model for handling inaccurate reputation sources. In Proceedings of the 3rd International Conference on Trust Management (ITrust'05). 193--209. Google Scholar
Digital Library
- Y. Qian and S. Adalı. 2013. Extended structural balance theory for modeling trust in social networks. In Proceedings of the 11th Annual International Conference on Privacy, Security and Trust (PST'13). 283--290.Google Scholar
- J. Tang, H. Gao, X. Hu, and H. Liu. 2013. Exploiting homophily effect for trust prediction. In Proceedings of the Conference on Web Search and Data Mining (WSDM'13). ACM Press, New York, 53--62. Google Scholar
Digital Library
- M. Tomasello, M. Carpenter, J. Call, T. Behne, and H. Moll. 2005. Understanding and sharing intentions: The origins of cultural cognition. Behav. Brain Sci. 28, 5, 675--91.Google Scholar
Cross Ref
- B. Uzzi. 1996. The sources and consequences of embeddedness for the economic performance of organizations: The network effect. Amer. Sociol. Rev. 61, 674--698.Google Scholar
Cross Ref
- P. Victor, C. Cornelis, M. D. Cock, and E. Herrera-Viedma. 2011. Practical aggregation operators for gradual trust and distrust. Fuzzy Sets Syst. 184, 1, 126--147. Google Scholar
Digital Library
- Y. Yao, H. Tong, X. Yan, F. Xu, and J. Lu. 2013. Matri: A multi-aspect and transitive trust inference model. In Proceedings of the 22nd International Conference on World Wide Web (WWW'13). 1467--1476. Google Scholar
Digital Library
- X. Yin, J. Han, and P. Yu. 2008. Truth discovery with multiple conficting information providers on the web. IEEE Trans. Knowl. Data Engin. 20, 6, 796--808. Google Scholar
Digital Library
- C.-N. Ziegler and G. Lausen. 2004. Spreading activation models for trust propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04). IEEE Computer Society, 83--97. Google Scholar
Digital Library
Index Terms
Foundations of Trust and Distrust in Networks: Extended Structural Balance Theory
Recommendations
Is distrust the negation of trust?: the value of distrust in social media
HT '14: Proceedings of the 25th ACM conference on Hypertext and social mediaTrust plays an important role in helping online users collect reliable information, and has attracted increasing attention in recent years. We learn from social sciences that, as the conceptual counterpart of trust, distrust could be as important as ...
Distrust and trust in B2C e-commerce: do they differ?
ICEC '06: Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internetResearchers have not studied e-commerce <u>distrust</u> as much as e-commerce <u>trust</u>. This study examines whether trust and distrust are distinct concepts. If trust and distrust are the same, lack of distrust research matters little. But if they ...
Trust and distrust on the web
We examine the content of trustful and distrustful user experience reports on the web.Distrust is mostly an effect of graphical and structural design issues of a website.Trust is based on social factors such as reviews or recommendations by friends. The ...






Comments