skip to main content
research-article
Public Access

Formation and Reciprocation of Dyadic Trust

Authors Info & Claims
Published:24 March 2017Publication History
Skip Abstract Section

Abstract

This paper reports a detailed empirical study of interpersonal trust in a multi-relational online social network. This study addresses two main aspects of interpersonal trust: formation and reciprocation. Computational models developed, using multi-relational networks, for these processes provide interesting insights about online social interactions. Our findings for trust formation (initiation) indicate a strong role of lower familiarity interactions before trust(high familiarity relationship) is formed. Similarly, trust reciprocation is not automatic, but strongly depends on enough lower familiarity interactions. This study is the first quantification of the “scaffolding role” played by lower familiarity interactions, in formation of high familiarity relationships.

Skip Supplemental Material Section

Supplemental Material

References

  1. Muhammad Ahmad, Marshall Poole, and Jaideep Srivastava. 2010c. Network exchange in trust networks. In Proceedings of the 2010 IEEE 2nd International Conference on Social Computing (SocialCom’10). IEEE, 341--346. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Muhammad Aurangzeb Ahmad. 2012. Computational Trust in Multiplayer Online Games. Ph.D. Dissertation. Department of Computer Science, University of Minnesota, Twin Cities.Google ScholarGoogle Scholar
  3. Muhammad A. Ahmad, I Ahmed, Jaideep Srivastava, and Marshall S. Poole. 2011. MMOs. In Proceedings of the 2011 IEEE 3rd International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing (Socialcom). IEEE, 882--887.Google ScholarGoogle Scholar
  4. Muhammad A. Ahmad, Zoheb Borbora, Jaideep Srivastava, and Noshir Contractor. 2010a. Link prediction across multiple social networks. In Proceedings of the 2010 IEEE International Conference on Data Mining Workshops (ICDMW’10). IEEE, 911--918. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Muhammad Aurangzeb Ahmad, David A. Huffaker, Jing Wang, Jeffrey William Treem, Marshall Scott Poole, and Jaideep Srivastava. 2010b. GTPA: A generative model for online mentor-apprentice networks. In AAAI.Google ScholarGoogle Scholar
  6. Zainab M. Aljazzaf, Mark Perry, and Miriam A. M. Capretz. 2010. Online trust: Definition and principles. In Proceedings of the 2010 5th International Multi-Conference on Computing in the Global Information Technology (ICCGI). IEEE, 163--168. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kurt Baier. 1990. Egoism in a Companion to Ethics. Blackwell: Oxford.Google ScholarGoogle Scholar
  8. Albert-László Barabási and Réka Albert. 1999. Emergence of scaling in random networks. Science 286, 5439 (1999), 509--512.Google ScholarGoogle Scholar
  9. Catherine A. Bliss, Isabel M. Kloumann, Kameron Decker Harris, Christopher M. Danforth, and Peter Sheridan Dodds. 2012. Twitter reciprocal reply networks exhibit assortativity with respect to happiness. Journal of Computational Science 3, 5 (2012), 388--397.Google ScholarGoogle ScholarCross RefCross Ref
  10. Zoheb Borbora, Muhammad A. Ahmad, Karen Zita Haigh, Jaideep Srivastava, and Zhen Wen. 2011. Exploration of robust features of trust across multiple social networks. In Proceedings of the SASO Workshops. 27--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Zoheb Borbora and Jaideep Srivastava. 2012. User behavior modelling approach for churn prediction in online games. In SocialCom/PASSAT. 51--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Patricia M. Doney and Joseph P. Cannon. 1997. An examination of the nature of trust in buyer-seller relationships. Journal of Marketing (April 1997), 35--51.Google ScholarGoogle Scholar
  13. Nurcan Durak, Tamara G. Kolda, Ali Pinar, and C. Seshadhri. 2013. A scalable null model for directed graphs matching all degree distributions: In, out, and reciprocal. In Proceedings of the IEEE 2nd Workshop on Network Science.Google ScholarGoogle Scholar
  14. EverQuest2. 2016. EverQuest II. Retrieved from https://www.everquest2.com/home.Google ScholarGoogle Scholar
  15. Tom Fawcett. 2006. An introduction to ROC analysis. Pattern Recognition Letters 27, 8 (2006), 861--874. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jennifer Golbeck. 2008. Computing with Social Trust (1st ed.). Springer Publishing Company, Incorporated. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. W. Gouldner. 1960. The norms of reciprocity: A preliminary statement. American Sociological Review 25, 2 (1960), 161--178.Google ScholarGoogle ScholarCross RefCross Ref
  18. Karen V. Hansen. 2004. The asking rules of reciprocity in networks of care for children. Qualitative Sociology 27, 4 (2004), 421--437.Google ScholarGoogle ScholarCross RefCross Ref
  19. Mohammad Al Hasan, Vineet Chaoji, Saeed Salem, and Mohammed J. Zaki. 2006. Link prediction using supervised learning. In Proceedings of the Workshop on Link Analysis, Counter-terrorism and Security (SDM’06).Google ScholarGoogle Scholar
  20. George Hripcsak and Adam S. Rothschild. 2005. Agreement, the f-measure, and reliability in information retrieval. Journal of the American Medical Informatics Association 12, 3 (2005), 296--298.Google ScholarGoogle ScholarCross RefCross Ref
  21. Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. 2003. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International Conference on World Wide Web. ACM, 640--651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Leo Katz. 1953. A new status index derived from sociometric analysis. Psychometrika 18, 1 (1953), 39--43.Google ScholarGoogle ScholarCross RefCross Ref
  23. David Lazer, Alex Sandy Pentland, Lada Adamic, Sinan Aral, Albert Laszlo Barabasi, Devon Brewer, Nicholas Christakis et al. 2009. Life in the network: The coming age of computational social science. Science (New York, NY) 323, 5915 (2009), 721.Google ScholarGoogle Scholar
  24. Stephen Leider, Markus M. Mbius, Tanya Rosenblat, and Quoc-Anh Do. 2009. Directed altruism and enforced reciprocity in social networks. The Quarterly Journal of Economics 124, 4 (2009), 1815--1851.Google ScholarGoogle ScholarCross RefCross Ref
  25. Raph Levien. 2004. Attack Resistant Trust Metrics. Technical Report.Google ScholarGoogle Scholar
  26. Stephen Paul Marsh. 1994. Formalising trust as a computational concept. Ph.D. Thesis, University of Stirling.Google ScholarGoogle Scholar
  27. Paolo Massa and Paolo Avesani. 2006. Trust-aware bootstrapping of recommender systems. In ECAI Workshop on Recommender Systems. Citeseer, 29--33.Google ScholarGoogle Scholar
  28. Roger C. Mayer, James H. Davis, and F. David Schoorman. 1995. An integrative model of organizational trust. Academy of Management Review 20, 3 (1995), 709--734.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Tan Pang-Ning, Michael Steinbach, and Vipin Kumar. 2006. Introduction to Data Mining. Pearson Education India.Google ScholarGoogle Scholar
  30. Atanu Roy. 2015. Computational Trust at Various Granularities in Social Networks. Ph.D. Dissertation. University of Minnesota.Google ScholarGoogle Scholar
  31. Atanu Roy, Muhammad Aurangzeb Ahmad, Chandrima Sarkar, Brian Keegan, and Jaideep Srivastava. 2012. The ones that got away: False negative estimation based approaches for gold farmer detection. In SocialCom/PASSAT. 328--337. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Atanu Roy, Zoheb H. Borbora, and Jaideep Srivastava. 2013. Socialization and trust formation: A mutual reinforcement? An exploratory analysis in an online virtual setting. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 653--660. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Atanu Roy, Jaideep Srivastava, and Jisu Huh. 2016. Trustingness and trustworthiness: A pair of complementary trust measures in a social network. In Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  34. Jordi Sabater and Carles Sierra. 2001. REGRET: A reputation model for gregarious societies. 61--69.Google ScholarGoogle Scholar
  35. Chandrima Sarkar, Sarah Cooley, and Jaideep Srivastava. 2014. Robust feature selection technique using rank aggregation. Applied Artificial Intelligence 28, 3 (2014), 243--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Ayush Singhal, Karthik Subbian, Jaideep Srivastava, Tamara G. Kolda, and Ali Pinar. 2013. Dynamics of trust reciprocation in multi-relational networks. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM, 661--665. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Ayush Singhal, Atanu Roy, and Jaideep Srivastava. 2014. Understanding co-evolution in large multi-relational social networks. In 2014 IEEE 15th International Conference on Information Reuse and Integration (IRI). IEEE, 733--740.Google ScholarGoogle ScholarCross RefCross Ref
  38. EQ2 Wiki. 2006. EverQuest II Housing Wiki. Retrieved from http://eq2.wikia.com/wiki/Housing.Google ScholarGoogle Scholar
  39. C.-N. Ziegler and Georg Lausen. 2004. Spreading activation models for trust propagation. In Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04). IEEE, 83--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Vinko Zlatić and Hrvoje Štefančić. 2011. Model of Wikipedia growth based on information exchange via reciprocal arcs. EPL (Europhysics Letters) 93, 5 (2011), 58005.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Formation and Reciprocation of Dyadic Trust

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!