Abstract
Trust is a very frequently used term in Computer Science. In this chapter, we will review some of the different contexts in which it is used and draw parallels when applicable with social cognitive trust constructs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
K. Aberer, Z. Despotovic, Managing trust in a peer-2-peer information system, in Proceedings of 10th International Conference on Information and Knowledge Management(CIKM01), Atlanta, pp. 310–317 (2001)
S. Adalı, T. Liu, M. Magdon-Ismail, An analysis of optimal link bombs. Theor. Comput. Sci. 437, 1–20 (2012)
S. Adalı, M. Magdon-Ismail, F. Sisenda, Actions speak as loud as words: predicting relationships from social behavior data, in Proceedings of the WWW Conference, Lyon (2012)
L.A. Adamic, D. Lauterbach, C.Y. Teng, M.S. Ackermanm, Rating friends without making enemies, in Proceedings of the AAAI Conference on Social Media and Weblogs (ICWSM 2011), Barcelona (2011)
R. Andersen, C. Borgs, J. Chayes, U. Feige, A. Flaxman, A. Kalai, V. Mirrokni, M. Tennenholtz, Trust-based recommendation systems: an axiomatic approach, in Proceedings of WWW, Beijing, pp. 199–208 (2008)
S. Ba, P.A. Pavlou, Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior. MIS Q. 26(3), 243–268 (2002)
F. Benevenuto, G. Magno, T. Rodrigues, V. Almeida, Detecting spammers on twitter, in CEAS 2010 – Seventh annual Collaboration, Electronic messaging, Anti- Abuse and Spam Conference, Redmond (2010)
T. Berners-Lee, J. Hendler, O. Lassila, The semantic web. Sci. Am. pp. 29–37 (2001)
S. Brin, L. Page, The anatomy of a large-scale hypertextual web search engine, in Proceedings of the ACM WWW Conference, Brisbane, Australia, pp. 107–117 (1998)
B. Butler, E. Joyce, J. Pike, Don’t look now, but we’ve created a bureaucracy: the nature and roles of policies and rules in wikipedia, in Proceedings of the twenty-sixth Annual SIGCHI Conference on Human Factors in Computing Systems, CHI ’08, (ACM, New York, 2008) Florence, Italy, pp. 1101–1110
L.J. Camp, Mental models of privacy and security. IEEE Technol. Soc. Mag. 28(3), 1–10 (2009)
K. Canini, B. Suh, P. Pirolli, Finding credible information sources in social networks based on content and social structure, in 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, Boston, USA (2011)
C. Castillo, M. Mendoza, B. Poblete, Information credibility on twitter, in Proceedings of the 20th International Conference on World Wide Web, Hyderabad, pp. 675–684 (2011)
J.H. Cho, A. Swami, I.R. Chen, A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13(4), 562–583 (2010)
N.A. Christakis, J.H. Fowler, Connected: The Surprising Power of Our Social Networks and How They Shape Our Lives. (HarperCollins Publishers, New York, 2011)
O. Dabeer, P. Mehendale, A. Karnik, A. Saroop, Timing tweets to increase effectiveness of information campaigns, in Proceedings of the AAAI Conference on Social Media and Weblogs (ICWSM 2011), Barcelona, Spain (2011)
C. Dellarocas, Reputation mechanism design in online trading environments with pure moral hazard. Inf. Syst. Res. 16(2), 209–230 (2005)
C. Dellarocas, Strategic manipulation of internet opinion forums: implications for consumers and firms. Manage. Sci., 52(10), 1577–1593 (2006)
C. Dellarocas, X.M. Zhang, N.F. Awad, Exploring the value of online product reviews in forecasting sales: the case of motion pictures. J. Interac. Mark. 21(4), 23–45 (2007)
P. DiMaggio, E. Hargittai, W.R. Neuman, J.P. Robinson, Social implications of the internet. Annu. Rev. Sociol. 27, 307–336 (2001)
A. Doan, R. Ramakrishnan, A.Y. Halevy, Crowdsourcing systems on the world-wide web. Commun. ACM 54(4), 86–96 (2011)
T. DuBois, J. Golbeck, A. Srinavasan, Predicting trust and distrust in social networks, in IEEE International Conference on Social Computing, Boston, USA (2011)
R. Falcone, C. Castelfranchi, Trust dynamics: how trust is influenced by direct experiences and by trust itself, in Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, New York, USA, pp. 740–747 (2004)
D. Fetterly, M. Manasse, N. Najork, Spam, damn spam, and statistics: using statistical analysis to locate spam web pages, in Proceedings of the International Workshop on the Web and Databases, Paris, France, pp. 1–6 (2004)
K. Fullam, K. Barber, Dynamically learning sources of trust information: experience vs. reputation, in Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, Honolulu, pp. 1–8 (2007)
M. Gallivan, Striking a balance between trust and control in a virtual organization: a content analysis of open source software case studies. Inf. Syst. J. 11(4), 277–304 (2001)
Y. Gil, D. Artz, Towards content trust of web resources. Web Semant. 5(4), 227–239 (2007)
J. Giles, Internet encyclopedias go head to head. Nature 438(7070), 900–901 (2005)
J. Golbeck, Trust on the world wide web: a survey. Found. Trends Web Sci. 1(2), 131–197 (2006)
K. Govindan, P. Mohapatra, Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Commun. Surv. Tutor. 14(2), 279–298 (2011)
T. Grandison, M. Sloman, A survey of trust in internet applications. IEEE Commun. Surv. Tutor. 3(4), 2–16 (2000)
Z. Gyongyi, H. Garcia-Molina, Link spam alliances, in Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim (2005)
Z. Gyongyi, H. Garcia-Molina, J. Pedersen, Combating web spam with trustrank, in Proceedings of the 30th International Conference on Very Large Data Bases, Toronto (2004)
P.A. Hancock, D.R. Billings, K.E. Schaefer, Can you trust your robot? Ergon. Des. 19(3), 24–29 (2011)
C.J. Hazard, M.P. Singh, Intertemporal discount factors as a measure of trustworthiness in electronic commerce. IEEE Trans. Knowl. Data Eng 23(5), 699-712 (2011)
B. Hilligoss, S.Y. Rieh, Developing a unifying framework of credibility assessment: construct, heuristics and interaction in context. Inf. Process. Manage. 44, 1467–1484 (2008)
S. Hissam, D. Plakosh, C. Weinstock, Trust and vulnerability in open source software. IEEE Proc. Soft. 149(1), 47–51 (2002)
T. Holloway, M. Bozicevic, K. Börner. Analyzing and visualizing the semantic coverage of wikipedia and its authors. Complexity 12(3), 30–40 (2007)
A. Josang, J. Golbeck, Challenges for robust trust and reputation systems, in Proceedings of the 5th International Workshop on Security and Trust Management (STM 2009), Saint Malo, France (2009)
A. Josang, R. Ismail, The beta reputation system, in Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia (2002)
A. Josang, R. Ismail, C. Boyd, A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)
S. Kamvar, M. Schlosser, The eigentrust algorithm for reputation management in p2p networks. in Proceedings of the 12th International Conference on World Wide Web, Budapest, pp. 640–651 (2003)
A. Kittur, E.H. Chi, B. Suh, Crowdsourcing user studies with mechanical turk. in CHI ’08 Proceedings of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, Florence (2008)
A. Kittur, B. Suh, B.A. Pendleton, E.H. Chi, He says, she says: conflict and coordination in wikipedia, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’07, San Jose (ACM, New York, 2007), pp. 453–462
R. Kleinberg, Authoritative sources in a hyperlinked environment. J. ACM 46(5), 604–632 (1999)
P. Kollock, The production of trust in online markets, in Advances in Group Processes (Vol. 16), ed. by E.J. Lawler, S.T.M. Macy, H. A. Walker (JAI, Greenwich, 1999)
U. Kuter, J. Golbeck, Sunny: a new algorithm for trust inference in social networks using probabilistic confidence models, in AAAI, Vancouver, pp. 1377–1382 (2007)
J.D. Lee, K.A. See, Trust in automation: designing for appropriate reliance. Hum. Factors 46(1), 50–80 (2004)
J. Leskovec, D. Huttenlocher, J. Kleinberg, Predicting positive and negative links in online social networks, in Proceedings of the 19th International Conference on World Wide Web, Raleigh, pp. 641–650 (2010)
A. Marcus, E. Wu, D. Karger, S. Madden, R. Miller, Human-powered sorts and joins, in Proceedings of Very Large Databases Conference (VLDB), Istanbul (2012)
S. Marsh, P. Briggs, Examining trust, regret and forgiveness as computational concepts, in Computing with Social Trust, ed. by J. Golbeck (Springer, London, 2009)
D.H. McKnight, N.L. Chervany, Trust and distrust definitions: one bite at a time, in Trust in Cyber-Societies, ed. by R. Falcone, M. Singh, Y.H. Tan. Lecture Notes in Artificial Intelligence, vol. 2246 (Springer, Berlin/New York, 2001), pp. 27–54
D.H. McKnight, C.J. Kacmar, Factors and effects of information credibility. In ICEC, University of Minnesota, Minneapolis, pp. 423–432 (2007)
M. McPherson, L. Smith-Lovin, J.M. Cook, Birds of a feather: homophily in social networks. Annu. Rev. Sociol. 27(1), 415 (2001)
P.T. Metaxas, E. Mustafaraj, From obscurity to prominence in minutes: political speech and real-time search, in Proceedings of Web Science Conference, Raleigh (2010)
B. Muir, N. Moray, Trust in automation. part ii. experimental studies of trust and human intervention in a process control simulation. Ergonomics 39(3), 429–460 (1996)
E. Mustafaraj, P. Metaxas, S. Finn, A. Monroy-Hernández, Hiding in plain sight: a tale of trust and mistrust inside a community of citizen reporters, in Proceedings of the ICWSM Conference, Dublin (2012)
C. Nass, Y. Moon, Machines and mindlessness: social responses to computers. J. Soc. Issues 56(1), 81–103 (2000)
H. Nissenbaum, Will security enhance trust online, or supplant it? in Trust and Distrust in Organizations, ed. by R.M. Kramer, K.S. Cook. Russell Sage Foundation Series on Trust (Russell Sage Foundation, New York, 2004), pp. 155–188
S. O’Mahony, F. Ferraro, The emergence of governance in an open source community. Acad. Manage. J. 50(5), 1079–1106 (2007)
B. Paulhamus, A. Ebaugh, C. Boylls, N. Bos, S. Hider, S. Gigure, Crowdsourced cyber defense: lessons from a large-scale, game-based approach to threat identification on a live network, in Social Computing, Behavioral – Cultural Modeling and Prediction, ed. by S. J. Yang, A.M. Greenberg, M. R. Endsley. Lecture Notes in Computer Science, vol. 7227 (Springer, Berlin/New York, 2012), pp. 35–42,
G. Pickard, I. Rahwan, W. Pan, M. Cebrian, R. Crane, A.S. Pentland Time critical social mobilization: the darpa network challenge winning strategy (2011), arXive.org 1008.3172v1
P. Pirolli, W.T. Fu, Snif-act: a model of information foraging on the world wide web, in User Modeling 2003, Johnstown, pp. 146 (2003)
J. Ratkiewicz, M.D. Conover, M. Meiss, B. Goncalves, A. Flammini, F.M. Menczer, Detecting and tracking political abuse in social media, in Proceedings of the AAAI Conference on Social Media and Weblogs (ICWSM 2011), Barcelona (2011)
R. Rosenzweig, Can history be open source? wikipedia and the future of the past. J. Am. Hist. 93(1), 117–146 (2006)
S. Saavedraa, K. Hagerty, B. Uzzi, Synchronicity, instant messaging, and performance among financial traders. Proceedings of the National Academy of Sciences (PNAS), pp. 1018462108v1–201018462 (2011)
E. Sillence, P. Briggs, P.R. Harris, L. Fishwick, How do patients evaluate and make use of online health information? Soc. Sci. Med. 64, 1853–1862 (2007)
O. Siobhán, F. Ferraro, Managing the boundary of an ‘open’ project, in IESE Research Papers (2004)
M. Srivastava, T. Abdelzaher, B.K. Szymanski, Human-centric sensing. Phil. Trans. R. Soc. 370 ser. A 1958, 176–197 (2012)
K. Starbird, L. Palen, (how) will the revolution be retweeted?: information diffusion and the 2011 egyptian uprising, in Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, Seattle, pp. 7–16 (2012)
K.J. Stewart, Trust transfer on the world wide web. Organiz. Sci. 14(1), 5–17 (2003)
F.Y. Wang, D. Zeng, J.A. Hendler, Q. Zhang, Z. Feng, Y. Gao, H. Wang, G. Lai, A study of the human flesh search engine: crowd-powered expansion of online knowledge. IEEE Comput. 43(8), 45–53 (2010)
Y. Wang, C.W. Hang, M.P. Singh A probabilistic approach for maintaining trust based on evidence. J. Artif. Intell. Res 40, 221–267 (2011)
J. Waxman, The Old 80/20 Rule Take One on the Jaw. Internet Trends Report 1999 REview (Alexa Research, San Francisco, 2000)
R. West, The psychology of security. Commun. ACM 51(4), 34–40 (2008)
L. Xiong, L. Liu, Building trust in decentralized peer-to-peer electronic communities, in Fifth International Conference on Electronic Commerce Research (ICECR-5) Montreal, Canada (2002)
N. Yee, J.N. Bailenson, M. Urbanek, F. Chang, D. Merget, The unbearable likeness of being digital: the persistence of nonverbal social norms in online virtual environments. CyberPsychol. Behav. 10(1), 115–121 (2007)
B. Yu, M. Singh, K. Sycara, Developing trust in large-scale peer-to-peer systems, in IEEE First Symposium on Multi-Agent Security and Survivability, Drexel, pp. 1–10 (2004)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 The Author(s)
About this chapter
Cite this chapter
Adali, S. (2013). Trust in Computing. In: Modeling Trust Context in Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7031-1_4
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7031-1_4
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7030-4
Online ISBN: 978-1-4614-7031-1
eBook Packages: Computer ScienceComputer Science (R0)