Three Essays on Trust Mining in Online Social Networks Gelareh Towhidi University of Wisconsin-Milwaukee

Total Page:16

File Type:pdf, Size:1020Kb

Three Essays on Trust Mining in Online Social Networks Gelareh Towhidi University of Wisconsin-Milwaukee University of Wisconsin Milwaukee UWM Digital Commons Theses and Dissertations May 2018 Three Essays on Trust Mining in Online Social Networks Gelareh Towhidi University of Wisconsin-Milwaukee Follow this and additional works at: https://dc.uwm.edu/etd Part of the Databases and Information Systems Commons, and the Human Resources Management Commons Recommended Citation Towhidi, Gelareh, "Three Essays on Trust Mining in Online Social Networks" (2018). Theses and Dissertations. 1932. https://dc.uwm.edu/etd/1932 This Dissertation is brought to you for free and open access by UWM Digital Commons. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of UWM Digital Commons. For more information, please contact [email protected]. THREE ESSAYS ON TRUST MINING IN ONLINE SOCIAL NETWORKS by Gelareh Towhidi A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctoral of Philosophy in Management Science at The University of Wisconsin-Milwaukee May 2018 ABSTRACT THREE ESSAYS ON TRUST MINING IN ONLINE SOCIAL NETWORKS by Gelareh Towhidi The University of Wisconsin-Milwaukee, 2018 Under the Supervision of Professor Atish P. Sinha and Professor Huimin Zhao This dissertation research consists of three essays on studying trust in online social networks. Trust plays a critical role in online social relationships, because of the high levels of risk and uncertainty involved. Guided by relevant social science and computational graph theories, I develop conceptual and predictive models to gain insights into trusting behaviors in online social relationships. In the first essay, I propose a conceptual model of trust formation in online social networks. This is the first study that integrates the existing graph-based view of trust formation in social networks with socio-psychological theories of trust to provide a richer understanding of trusting behaviors in online social networks. I introduce new behavioral antecedents of trusting behaviors and redefine and integrate existing graph-based concepts to develop the proposed conceptual model. The empirical findings indicate that both socio-psychological and graph-based trust- related factors should be considered in studying trust formation in online social networks. ii In the second essay, I propose a theory-based predictive model to predict trust and distrust links in online social networks. Previous trust prediction models used limited network structural data to predict future trust/distrust relationships, ignoring the underlying behavioral trust-inducing factors. I identify a comprehensive set of behavioral and structural predictors of trust/distrust links based on related theories, and then build multiple supervised classification models to predict trust/distrust links in online social networks. The empirical results confirm the superior fit and predictive performance of the proposed model over the baselines. In the third essay, I propose a lexicon-based text mining model to mine trust related user- generated content (UGC). This is the first theory-based text mining model to examine important factors in online trusting decisions from UGC. I build domain-specific trustworthiness lexicons for online social networks based on related behavioral foundations and text mining techniques. Next, I propose a lexicon-based text mining model that automatically extracts and classifies trustworthiness characteristics from trust reviews. The empirical evaluations show the superior performance of the proposed text mining system over the baselines. iii © Copyright by Gelareh Towhidi, 2018 All Rights Reserved iv TABLE OF CONTENTS LIST OF FIGURES ...................................................................................................................... vii LIST OF TABLES ....................................................................................................................... viii ACKNOWLEDGEMENTS ........................................................................................................... ix CHAPTER 1 ................................................................................................................................... 1 INTRODUCTION .......................................................................................................................... 1 CHAPTER 2 ................................................................................................................................... 5 Essay 1: Trust Formation in Online Social Networks .................................................................... 5 2.1. Introduction .................................................................................................................. 5 2.2. Related Work ............................................................................................................... 9 2.3. Theoretical Background and Hypothesis Development ............................................ 12 Trusting Behavior in Online Social Networks ...................................................... 12 Online Trusting Beliefs ......................................................................................... 13 Network-Based Dispositional Trust ...................................................................... 15 Network-Based Judgment Bias ............................................................................. 17 Network-Based Structural Assurance ................................................................... 20 Network-Based Status (Prestige) .......................................................................... 22 Network-Based Similarity (Homophily)............................................................... 26 2.4. The Research Model .................................................................................................. 28 2.5. Research Methodology .............................................................................................. 30 2.5.1. Construct Operationalization ...................................................................... 30 2.5.2. Dataset and Data Analysis .......................................................................... 36 2.6. Results and Findings .................................................................................................. 39 2.6.1. Measurement Model Validation ................................................................. 39 2.6.2. Structural Model Analysis (Hypothesis Testing Results) ........................... 43 2.7. Discussion .................................................................................................................. 47 CHAPTER 3 ................................................................................................................................. 52 Essay 2: Trust Prediction in Online Social Networks ................................................................... 52 3.1. Introduction ................................................................................................................ 52 3.2. Related Work ............................................................................................................. 56 3.2.1. Link Prediction............................................................................................ 56 3.2.2. Sign Prediction ............................................................................................ 59 3.3. Research Questions .................................................................................................... 66 v 3.4. Proposed Predictive Model ........................................................................................ 68 3.4.1. Trust/Distrust link Predictors ...................................................................... 69 3.4.2 Model ........................................................................................................... 77 3.5. Experiment ................................................................................................................. 82 3.5.1. Dataset......................................................................................................... 82 3.5.2. Experiment Design and Evaluation ............................................................ 82 3.6. Results ........................................................................................................................ 87 3.7. Discussion .................................................................................................................. 91 CHAPTER 4 ................................................................................................................................. 94 Essay 3: Lexicon-Based Trust Mining in Online Social Networks .............................................. 94 4.1. Introduction ................................................................................................................ 94 4.2. Related Work ............................................................................................................. 97 4.2.1. Trustworthiness in Online Communities .................................................... 99 4.2.2. Feature-Based Opinion Mining................................................................. 101 Topic Modeling ....................................................................................... 104 Supervised Learning Approach............................................................... 105 Unsupervised (Lexicon-Based) Approach .............................................. 106 4.3. Proposed
Recommended publications
  • A Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges
    A Understanding Graph-based Trust Evaluation in Online Social Networks: Methodologies and Challenges Wenjun Jiang, Hunan University Guojun Wang, Central South University Md Zakirul Alam Bhuiyan, Temple University Jie Wu, Temple University Online social networks (OSNs) are becoming a popular method of meeting people and keeping in touch with friends. OSNs resort to trust evaluation models and algorithms, as to improve service qualities and enhance user experiences. Much research has been done to evaluate trust and predict the trustworthiness of a target, usually from the view of a source. Graph-based approaches make up a major portion of the existing works, in which the trust value is calculated through a trusted graph (or trusted network, web of trust, multiple trust chains). In this paper, we focus on graph-based trust evaluation models in OSNs, particularly in computer science literature. We first summarize the features of OSNs and the properties of trust. Then, we comparatively review two categories of graph-simplification based and graph-analogy based approaches, and discuss their individual problems and challenges. We also analyze the common challenges of all graph-based models. To provide an integrated view of trust evaluation, we conduct a brief review of its pre-and-post processes, i.e., the preparation and the validation of trust models, including information collection, performance evaluation, and related applications. Finally, we identify some open challenges that all trust models are facing. Categories and Subject Descriptors: A.1 [Introductory and Survey]; C.2.4 [Computer-Communication Networks]: Distributed Systems General Terms: Design, Reliability, Management Additional Key Words and Phrases: trusted graph, trust evaluation, simplification, analogy, online social networks (OSNs), trust models.
    [Show full text]
  • Decentralized Reputation Model and Trust Framework Blockchain and Smart Contracts
    IT 18 062 Examensarbete 30 hp December 2018 Decentralized Reputation Model and Trust Framework Blockchain and Smart contracts Sujata Tamang Institutionen för informationsteknologi Department of Information Technology Abstract Decentralized Reputation Model and Trust Framework: Blockchain and Smart contracts Sujata Tamang Teknisk- naturvetenskaplig fakultet UTH-enheten Blockchain technology is being researched in diverse domains for its ability to provide distributed, decentralized and time-stamped Besöksadress: transactions. It is attributed to by its fault-tolerant and zero- Ångströmlaboratoriet Lägerhyddsvägen 1 downtime characteristics with methods to ensure records of immutable Hus 4, Plan 0 data such that its modification is computationally infeasible. Trust frameworks and reputation models of an online interaction system are Postadress: responsible for providing enough information (e.g., in the form of Box 536 751 21 Uppsala trust score) to infer the trustworthiness of interacting entities. The risk of failure or probability of success when interacting with an Telefon: entity relies on the information provided by the reputation system. 018 – 471 30 03 Thus, it is crucial to have an accurate, reliable and immutable trust Telefax: score assigned by the reputation system. The centralized nature of 018 – 471 30 00 current trust systems, however, leaves the valuable information as such prone to both external and internal attacks. This master's thesis Hemsida: project, therefore, studies the use of blockchain technology as an http://www.teknat.uu.se/student infrastructure for an online interaction system that can guarantee a reliable and immutable trust score. It proposes a system of smart contracts that specify the logic for interactions and models trust among pseudonymous identities of the system.
    [Show full text]
  • Structural Balance and Partitioning Signed Graphs
    Structural Balance and Partitioning Signed Graphs Patrick Doreian Andrej Mrvar Department of Sociology Faculty of Social Sciences University of Pittsburgh University of Ljubljana Abstract Signed graphs have been used frequently to model affect ties for social actors. In this context, structural balance theory has been used as a theory for the organization and form of these relations. Based on a graph theoretical formalization of this theory, for signed graphs, there are theorems stating that balanced structures have clear parti- tioned forms. We discuss the use of local optimization procedures as a method of obtaining these partitioned structures – or partitioned structures that are as close to a balanced partition as possible for structures that are not balanced. In addition, this method provides a measure of the extent to which a signed graph is imbalanced. For a time series of signed graphs, this permits a test of the balance hypoth- esis that human groups tend towards balance over time. Examples are provided of interpersonal ties in networks and institutionalized rela- tions among collective units. Since the pioneering work of Heider (1946) there has been an enduring concern with theories of structural balance. See, for example, Taylor (1970) and Forsythe (1990). Central to this formulation is the idea of triads made up of two actors, p and q, and some object, x. There is a direct social relation between the two actors and there are unit formation links between the actors and the object. The set of such triads is displayed in Figure 1. The relation between the actors can be positive (for example, liking) or negative (disliking) and the unit formation relations can be positive (for example, approve) or negative (disapprove).
    [Show full text]
  • Balance and Fragmentation in Societies with Homophily and Social Balance Tuan M
    www.nature.com/scientificreports OPEN Balance and fragmentation in societies with homophily and social balance Tuan M. Pham1,2, Andrew C. Alexander3, Jan Korbel1,2, Rudolf Hanel1,2 & Stefan Thurner1,2,4* Recent attempts to understand the origin of social fragmentation on the basis of spin models include terms accounting for two social phenomena: homophily—the tendency for people with similar opinions to establish positive relations—and social balance—the tendency for people to establish balanced triadic relations. Spins represent attribute vectors that encode G diferent opinions of individuals whose social interactions can be positive or negative. Here we present a co-evolutionary Hamiltonian model of societies where people minimise their individual social stresses. We show that societies always reach stationary, balanced, and fragmented states, if—in addition to homophily— individuals take into account a signifcant fraction, q, of their triadic relations. Above a critical value, qc , balanced and fragmented states exist for any number of opinions. Te concept of so-called flter bubbles captures the fragmentation of society into isolated groups of people who trust each other, but clearly distinguish themselves from “other”. Opinions tend to align within groups and diverge between them. Interest in this process of social disintegration, started by Durkheim 1, has experienced a recent boost, fuelled by the availability of modern communication technologies. Te extent to which societies fragment depends largely on the interplay of two basic mechanisms that drive social interactions: homophily and structural balance. Homophily is the “principle” that “similarity breeds connection”2. In particular, for those individuals who can be characterised by some social traits, such as opinions on a range of issues, homophily appears as the tendency of like-minded individuals to become friends 3.
    [Show full text]
  • Chapter 5 Positive and Negative Relationships
    From the book Networks, Crowds, and Markets: Reasoning about a Highly Connected World. By David Easley and Jon Kleinberg. Cambridge University Press, 2010. Complete preprint on-line at http://www.cs.cornell.edu/home/kleinber/networks-book/ Chapter 5 Positive and Negative Relationships In our discussion of networks thus far, we have generally viewed the relationships con- tained in these networks as having positive connotations — links have typically indicated such things as friendship, collaboration, sharing of information, or membership in a group. The terminology of on-line social networks reflects a largely similar view, through its em- phasis on the connections one forms with friends, fans, followers, and so forth. But in most network settings, there are also negative effects at work. Some relations are friendly, but others are antagonistic or hostile; interactions between people or groups are regularly beset by controversy, disagreement, and sometimes outright conflict. How should we reason about the mix of positive and negative relationships that take place within a network? Here we describe a rich part of social network theory that involves taking a network and annotating its links (i.e., its edges) with positive and negative signs. Positive links represent friendship while negative links represent antagonism, and an important problem in the study of social networks is to understand the tension between these two forces. The notion of structural balance that we discuss in this chapter is one of the basic frameworks for doing this. In addition to introducing some of the basics of structural balance, our discussion here serves a second, methodological purpose: it illustrates a nice connection between local and global network properties.
    [Show full text]
  • Chapter 5 Positive and Negative Relationships
    Chapter 5 Positive and Negative Relationships Often, knowing just the nodes and edges of a network is not enough to understand the full picture — in many settings, we need to annotate these nodes and edges with additional information to capture what’s going on. This is a theme that has come up several times in our discussions already: for example, Granovetter’s work on the strength of weak ties is based on designating links in a social network as strong or weak, and empirical analyses of social networks that evolve over time is based on annotating edges with the periods during which they were “alive.” Here we describe a rich part of social network theory that involves annotating edges with positive and negative signs — to convey the idea that certain edges represent friendship, while other edges represent antagonism. Indeed, an important problem in social networks is to understand the tension between these two forces, and the notion of structural balance that we discuss is one of the basic frameworks for doing this. In addition to introducing some of the basics of structural balance, our discussion here serves a second, methodological purpose: it illustrates a nice connection between local and global network properties. A recurring issue in the analysis of networked systems is the way in which local effects — phenomena involving only a few nodes at a time — can have global consequences that are observable at the level of the network as a whole. Structural balance offers a way to capture one such relationship in a very clean way, and by purely mathematical analysis: we will consider a simple definition abstractly, and find that it inevitably leads to certain macroscopic properties of the network.
    [Show full text]
  • Structural Balance in Signed Networks: Separating the Probability to Interact from the Tendency to Fight∗
    Structural Balance in Signed Networks: Separating the Probability to Interact from the Tendency to Fight∗ J¨urgenLernery Abstract Structural balance theory implies hypothetical network effects such as \the enemy of an enemy is a friend" or \the friend of an enemy is an enemy." To statistically test such hypotheses researchers often estimate whether, for instance, actors have an increased probability to collaborate with the enemies of their enemies and/or a decreased probability to fight the enemies of their enemies. Empirically it turns out that the support for balance theory from these tests is mixed at best. We argue that such results are not necessarily a contradiction to balance theory but that they could also be explained by other network effects that influence the probability to interact at all. We propose new and better interpretable models to assess structural balance in signed networks and illustrate their usefulness with networks of international alliances and conflicts. With the new operationalization the support for balance theory in international relations networks is much stronger than suggested by previous work. Keywords: signed networks, structural balance theory, international re- lations, conditional sign of interaction 1 Introduction Generalizing Heider's theory of cognitive balance (Heider 1946), Cartwright and Harary (1956) called a signed network structurally balanced if every cycle has an even number of negative ties. They proved that a network is balanced if and only if its actors can be divided into two groups with only positive ties within the groups and only negative ties between groups. The fundamental claim of structural balance theory is that actors have a preference for balanced states and if a network is unbalanced then actors have a tendency to increase balance by adapting their ties.
    [Show full text]
  • Structural Balance in Signed Digraphs: Considering Transitivity to Measure Balance in Graphs Constructed by Using Different Link Signing Methods
    Structural balance in signed digraphs: considering transitivity to measure balance in graphs constructed by using different link signing methods Ly Dinh*, Rezvaneh Rezapour*, Lan Jiang, Jana Diesner University of Illinois at Urbana{Champaign * These authors contributed equally to this work Abstract Structural balance theory assumes triads in networks to gravitate towards stable configurations. The theory has been verified for undirected graphs. Since real-world networks are often directed, we introduce a novel method for considering both transitivity and sign consistency for calculating balance in signed digraphs. We test our approach on graphs that we constructed by using different methods for identifying edge signs: natural language process- ing to infer signs from underlying text data, and self-reported survey data. Our results show that for various social contexts and edge sign detection methods, balance is moderately high, ranging from 67.5% to 92.4%. Keywords: Structural balance, Transitivity, Signed digraphs, Natural language processing, Communication networks, Organizational networks 1. Introduction Real-world social and communication networks are composed of complex arXiv:2006.02565v1 [cs.SI] 3 Jun 2020 and continually evolving interactions among social agents. Network scholars have examined core principles that explains patterns of social interactions at various levels of analysis, i.e., at the node level [4], dyadic level [3], triadic level [5, 30], subgroup level [44], and the graph level [31]. Each level of analysis enables different types of hypotheses to be tested, e.g., with respect Email address: {dinh4,rezapou2,lanj3,jdiesner}@illinois.edu (Ly Dinh*, Rezvaneh Rezapour*, Lan Jiang, Jana Diesner) to structural properties, such as reciprocity at the dyad level, transitivity at the triad level, clusterability at the subgroup level, and centralization at the network level [54, 35].
    [Show full text]
  • A Simple Approach for Quantifying Node Centrality in Signed and Directed Social Networks Wei-Chung Liu1 , Liang-Cheng Huang1, Chester Wai-Jen Liu2 and Ferenc Jordán3*
    Liu et al. Applied Network Science (2020) 5:46 Applied Network Science https://doi.org/10.1007/s41109-020-00288-w RESEARCH Open Access A simple approach for quantifying node centrality in signed and directed social networks Wei-Chung Liu1 , Liang-Cheng Huang1, Chester Wai-Jen Liu2 and Ferenc Jordán3* * Correspondence: jordan.ferenc@ gmail.com Abstract 3Balaton Limnological Institute, MTA Centre for Ecological Research, The position of a node in a social network, or node centrality, can be quantified in Klebelsberg Kuno, Tihany 3, 8237, several ways. Traditionally, it can be defined by considering the local connectivity of Hungary a node (degree) and some non-local characteristics (distance). Here, we present an Full list of author information is available at the end of the article approach that can quantify the interaction structure of signed digraphs and we define a node centrality measure for these networks. The basic principle behind our approach is to determine the sign and strength of direct and indirect effects of one node on another along pathways. Such an approach allows us to elucidate how a node is structurally connected to other nodes in the social network, and partition its interaction structure into positive and negative components. Centrality here is quantified in two ways providing complementary information: total effect is the overall effect a node has on all nodes in the same social network; while net effect describes, whether predominately positive or negative, the manner in which a node can exert on the social network. We use Sampson’s like-dislike relation network to demonstrate our approach and compare our result to those derived from existing centrality indices.
    [Show full text]
  • Maintaining Security and Trust in Large Scale Public Key Infrastructures
    Maintaining Security and Trust in Large Scale Public Key Infrastructures Vom Fachbereich Informatik der Technischen Universit¨atDarmstadt genehmigte Dissertation zur Erlangung des Grades Doktor-Ingenieur (Dr.-Ing.) von Dipl. Wirtsch.-Inform. Johannes Braun geboren in Herrenberg. Referenten: Prof. Dr. Johannes Buchmann Prof. Dr. Max M¨uhlh¨auser Tag der Einreichung: 16.03.2015 Tag der m¨undlichen Pr¨ufung: 30.04.2015 Hochschulkennziffer: D 17 Darmstadt 2015 List of Publications [B1] Johannes Braun. Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication. IEEE Conference on Com- munications and Network Security (CNS 2014) - Poster Session, pages 510{ 511, IEEE Computer Society, 2014. Cited on pages 52 and 173. [B2] Johannes Braun, Florian Volk, Jiska Classen, Johannes Buchmann, and Max M¨uhlh¨auser.CA trust management for the Web PKI. Journal of Computer Security, 22: 913{959, IOS Press, 2014. Cited on pages 9, 66, 89, and 104. [B3] Johannes Braun, Johannes Buchmann, Ciaran Mullan, and Alex Wiesmaier. Long term confidentiality: a survey. Designs, Codes and Cryptography, 71(3): 459{478, Springer, 2014. Cited on page 161. [B4] Johannes Braun and Gregor Rynkowski. The potential of an individ- ualized set of trusted CAs: Defending against CA failures in the Web PKI. International Conference on Social Computing (SocialCom) - PAS- SAT 2013, pages 600{605, IEEE Computer Society, 2013. Extended version: http://eprint.iacr.org/2013/275. Cited on pages 9, 32, and 57. [B5] Johannes Braun, Florian Volk, Johannes Buchmann, and Max M¨uhlh¨auser. Trust views for the Web PKI. Public Key Infrastructures, Services and Appli- cations - EuroPKI 2013, vol.
    [Show full text]
  • Scalable Blockchains for Computational Trust
    A Scalable Blockchain Approach for Trusted Computation and Verifiable Simulation in Multi-Party Collaborations Ravi Kiran Raman,∗y Roman Vaculin,y Michael Hind,y Sekou L. Remy,y Eleftheria K. Pissadaki,y Nelson Kibichii Bore,y Roozbeh Daneshvar,y Biplav Srivastava,y and Kush R. Varshneyy ∗University of Illinois at Urbana-Champaign yIBM Research Abstract—In high-stakes multi-party policy making based on ology in this paper. machine learning and simulation models involving independent In AI, increasingly complex machine learning models with computing agents, a notion of trust in results is critical in facilitat- ever increasing complexity are being learned on vast datasets. ing transparency, accountability, and collaboration. Using a novel combination of distributed validation of atomic computation Lack of access to the training process and the hyperparameters blocks and a blockchain-based immutable audit mechanism, this used therein do not only hinder scientific reproducibility, work proposes a framework for distributed trust in computations. but also remove any basis to trust the reported results. In In particular we address the scalability problem by reducing particular, applications interested in the trained model might the storage and communication costs using a lossy compression not trust the agent performing the training. Other than sanity scheme. This framework guarantees not only verifiability of final results, but also the validity of local computations, and its cost- checks such as validation datasets, there exists no simpler benefit tradeoffs are studied using a synthetic example of training way to guarantee correctness than complete retraining. This a neural network. is impractical considering the extensive amounts of time and hardware required.
    [Show full text]
  • Structural Balance in the Social Networks of a Wild Mammal
    Animal Behaviour 85 (2013) 1397e1405 Contents lists available at SciVerse ScienceDirect Animal Behaviour journal homepage: www.elsevier.com/locate/anbehav Structural balance in the social networks of a wild mammal Amiyaal Ilany a,b,*, Adi Barocas a,c, Lee Koren d, Michael Kam e, Eli Geffen a a Department of Zoology, Tel Aviv University, Israel b National Institute for Mathematical and Biological Synthesis, Knoxville, TN, U.S.A. c Department of Zoology and Physiology and Program in Ecology, University of Wyoming, Laramie, WY, U.S.A. d The Mina and Everard Goodman Faculty of Life Sciences, Bar-Ilan University, Ramat-Gan, Israel e Desert Animal Adaptations and Husbandry, Wyler Department of Dryland Agriculture, The Jacob Blaustein Institutes for Desert Research, Ben Gurion University of the Negev, Beer Sheva, Israel article info The social structure of a population is based on individual social associations, which can be described fi Article history: using network patterns (motifs). Our understanding of the forces stabilizing speci c social structures in Received 6 December 2012 animals is limited. Structural balance theory was proposed for exploring social alliances and suggested Initial acceptance 2 January 2013 that some network motifs are more stable than others in a society. The theory models the presence of Final acceptance 6 March 2013 specific triads in the network and their effect on the global population structure, based on the differential Available online 21 April 2013 stability of specific triad configurations. While structural balance was shown in human social networks, MS. number: A12-00922R2 the theory has never been tested in animal societies.
    [Show full text]