Skip to main content

Trust in Computing

  • Chapter
  • First Online:
Modeling Trust Context in Networks

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 933 Accesses

Abstract

Trust is a very frequently used term in Computer Science. In this chapter, we will review some of the different contexts in which it is used and draw parallels when applicable with social cognitive trust constructs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 39.95
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K. Aberer, Z. Despotovic, Managing trust in a peer-2-peer information system, in Proceedings of 10th International Conference on Information and Knowledge Management(CIKM01), Atlanta, pp. 310–317 (2001)

    Google Scholar 

  2. S. Adalı, T. Liu, M. Magdon-Ismail, An analysis of optimal link bombs. Theor. Comput. Sci. 437, 1–20 (2012)

    Article  MATH  Google Scholar 

  3. S. Adalı, M. Magdon-Ismail, F. Sisenda, Actions speak as loud as words: predicting relationships from social behavior data, in Proceedings of the WWW Conference, Lyon (2012)

    Google Scholar 

  4. L.A. Adamic, D. Lauterbach, C.Y. Teng, M.S. Ackermanm, Rating friends without making enemies, in Proceedings of the AAAI Conference on Social Media and Weblogs (ICWSM 2011), Barcelona (2011)

    Google Scholar 

  5. R. Andersen, C. Borgs, J. Chayes, U. Feige, A. Flaxman, A. Kalai, V. Mirrokni, M. Tennenholtz, Trust-based recommendation systems: an axiomatic approach, in Proceedings of WWW, Beijing, pp. 199–208 (2008)

    Google Scholar 

  6. S. Ba, P.A. Pavlou, Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior. MIS Q. 26(3), 243–268 (2002)

    Article  Google Scholar 

  7. F. Benevenuto, G. Magno, T. Rodrigues, V. Almeida, Detecting spammers on twitter, in CEAS 2010 – Seventh annual Collaboration, Electronic messaging, Anti- Abuse and Spam Conference, Redmond (2010)

    Google Scholar 

  8. T. Berners-Lee, J. Hendler, O. Lassila, The semantic web. Sci. Am. pp. 29–37 (2001)

    Google Scholar 

  9. S. Brin, L. Page, The anatomy of a large-scale hypertextual web search engine, in Proceedings of the ACM WWW Conference, Brisbane, Australia, pp. 107–117 (1998)

    Google Scholar 

  10. B. Butler, E. Joyce, J. Pike, Don’t look now, but we’ve created a bureaucracy: the nature and roles of policies and rules in wikipedia, in Proceedings of the twenty-sixth Annual SIGCHI Conference on Human Factors in Computing Systems, CHI ’08, (ACM, New York, 2008) Florence, Italy, pp. 1101–1110

    Google Scholar 

  11. L.J. Camp, Mental models of privacy and security. IEEE Technol. Soc. Mag. 28(3), 1–10 (2009)

    Article  Google Scholar 

  12. K. Canini, B. Suh, P. Pirolli, Finding credible information sources in social networks based on content and social structure, in 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, Boston, USA (2011)

    Google Scholar 

  13. C. Castillo, M. Mendoza, B. Poblete, Information credibility on twitter, in Proceedings of the 20th International Conference on World Wide Web, Hyderabad, pp. 675–684 (2011)

    Google Scholar 

  14. J.H. Cho, A. Swami, I.R. Chen, A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13(4), 562–583 (2010)

    Article  Google Scholar 

  15. N.A. Christakis, J.H. Fowler, Connected: The Surprising Power of Our Social Networks and How They Shape Our Lives. (HarperCollins Publishers, New York, 2011)

    Google Scholar 

  16. O. Dabeer, P. Mehendale, A. Karnik, A. Saroop, Timing tweets to increase effectiveness of information campaigns, in Proceedings of the AAAI Conference on Social Media and Weblogs (ICWSM 2011), Barcelona, Spain (2011)

    Google Scholar 

  17. C. Dellarocas, Reputation mechanism design in online trading environments with pure moral hazard. Inf. Syst. Res. 16(2), 209–230 (2005)

    Article  Google Scholar 

  18. C. Dellarocas, Strategic manipulation of internet opinion forums: implications for consumers and firms. Manage. Sci., 52(10), 1577–1593 (2006)

    Article  Google Scholar 

  19. C. Dellarocas, X.M. Zhang, N.F. Awad, Exploring the value of online product reviews in forecasting sales: the case of motion pictures. J. Interac. Mark. 21(4), 23–45 (2007)

    Article  Google Scholar 

  20. P. DiMaggio, E. Hargittai, W.R. Neuman, J.P. Robinson, Social implications of the internet. Annu. Rev. Sociol. 27, 307–336 (2001)

    Article  Google Scholar 

  21. A. Doan, R. Ramakrishnan, A.Y. Halevy, Crowdsourcing systems on the world-wide web. Commun. ACM 54(4), 86–96 (2011)

    Article  Google Scholar 

  22. T. DuBois, J. Golbeck, A. Srinavasan, Predicting trust and distrust in social networks, in IEEE International Conference on Social Computing, Boston, USA (2011)

    Google Scholar 

  23. R. Falcone, C. Castelfranchi, Trust dynamics: how trust is influenced by direct experiences and by trust itself, in Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, New York, USA, pp. 740–747 (2004)

    Google Scholar 

  24. D. Fetterly, M. Manasse, N. Najork, Spam, damn spam, and statistics: using statistical analysis to locate spam web pages, in Proceedings of the International Workshop on the Web and Databases, Paris, France, pp. 1–6 (2004)

    Google Scholar 

  25. K. Fullam, K. Barber, Dynamically learning sources of trust information: experience vs. reputation, in Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, Honolulu, pp. 1–8 (2007)

    Google Scholar 

  26. M. Gallivan, Striking a balance between trust and control in a virtual organization: a content analysis of open source software case studies. Inf. Syst. J. 11(4), 277–304 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  27. Y. Gil, D. Artz, Towards content trust of web resources. Web Semant. 5(4), 227–239 (2007)

    Article  Google Scholar 

  28. J. Giles, Internet encyclopedias go head to head. Nature 438(7070), 900–901 (2005)

    Article  Google Scholar 

  29. J. Golbeck, Trust on the world wide web: a survey. Found. Trends Web Sci. 1(2), 131–197 (2006)

    Article  Google Scholar 

  30. K. Govindan, P. Mohapatra, Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Commun. Surv. Tutor. 14(2), 279–298 (2011)

    Article  Google Scholar 

  31. T. Grandison, M. Sloman, A survey of trust in internet applications. IEEE Commun. Surv. Tutor. 3(4), 2–16 (2000)

    Article  Google Scholar 

  32. Z. Gyongyi, H. Garcia-Molina, Link spam alliances, in Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim (2005)

    Google Scholar 

  33. Z. Gyongyi, H. Garcia-Molina, J. Pedersen, Combating web spam with trustrank, in Proceedings of the 30th International Conference on Very Large Data Bases, Toronto (2004)

    Google Scholar 

  34. P.A. Hancock, D.R. Billings, K.E. Schaefer, Can you trust your robot? Ergon. Des. 19(3), 24–29 (2011)

    Google Scholar 

  35. C.J. Hazard, M.P. Singh, Intertemporal discount factors as a measure of trustworthiness in electronic commerce. IEEE Trans. Knowl. Data Eng 23(5), 699-712 (2011)

    Article  Google Scholar 

  36. B. Hilligoss, S.Y. Rieh, Developing a unifying framework of credibility assessment: construct, heuristics and interaction in context. Inf. Process. Manage. 44, 1467–1484 (2008)

    Article  Google Scholar 

  37. S. Hissam, D. Plakosh, C. Weinstock, Trust and vulnerability in open source software. IEEE Proc. Soft. 149(1), 47–51 (2002)

    Article  Google Scholar 

  38. T. Holloway, M. Bozicevic, K. Börner. Analyzing and visualizing the semantic coverage of wikipedia and its authors. Complexity 12(3), 30–40 (2007)

    Article  Google Scholar 

  39. A. Josang, J. Golbeck, Challenges for robust trust and reputation systems, in Proceedings of the 5th International Workshop on Security and Trust Management (STM 2009), Saint Malo, France (2009)

    Google Scholar 

  40. A. Josang, R. Ismail, The beta reputation system, in Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia (2002)

    Google Scholar 

  41. A. Josang, R. Ismail, C. Boyd, A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)

    Article  Google Scholar 

  42. S. Kamvar, M. Schlosser, The eigentrust algorithm for reputation management in p2p networks. in Proceedings of the 12th International Conference on World Wide Web, Budapest, pp. 640–651 (2003)

    Google Scholar 

  43. A. Kittur, E.H. Chi, B. Suh, Crowdsourcing user studies with mechanical turk. in CHI ’08 Proceedings of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, Florence (2008)

    Google Scholar 

  44. A. Kittur, B. Suh, B.A. Pendleton, E.H. Chi, He says, she says: conflict and coordination in wikipedia, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’07, San Jose (ACM, New York, 2007), pp. 453–462

    Google Scholar 

  45. R. Kleinberg, Authoritative sources in a hyperlinked environment. J. ACM 46(5), 604–632 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  46. P. Kollock, The production of trust in online markets, in Advances in Group Processes (Vol. 16), ed. by E.J. Lawler, S.T.M. Macy, H. A. Walker (JAI, Greenwich, 1999)

    Google Scholar 

  47. U. Kuter, J. Golbeck, Sunny: a new algorithm for trust inference in social networks using probabilistic confidence models, in AAAI, Vancouver, pp. 1377–1382 (2007)

    Google Scholar 

  48. J.D. Lee, K.A. See, Trust in automation: designing for appropriate reliance. Hum. Factors 46(1), 50–80 (2004)

    Google Scholar 

  49. J. Leskovec, D. Huttenlocher, J. Kleinberg, Predicting positive and negative links in online social networks, in Proceedings of the 19th International Conference on World Wide Web, Raleigh, pp. 641–650 (2010)

    Google Scholar 

  50. A. Marcus, E. Wu, D. Karger, S. Madden, R. Miller, Human-powered sorts and joins, in Proceedings of Very Large Databases Conference (VLDB), Istanbul (2012)

    Google Scholar 

  51. S. Marsh, P. Briggs, Examining trust, regret and forgiveness as computational concepts, in Computing with Social Trust, ed. by J. Golbeck (Springer, London, 2009)

    Google Scholar 

  52. D.H. McKnight, N.L. Chervany, Trust and distrust definitions: one bite at a time, in Trust in Cyber-Societies, ed. by R. Falcone, M. Singh, Y.H. Tan. Lecture Notes in Artificial Intelligence, vol. 2246 (Springer, Berlin/New York, 2001), pp. 27–54

    Google Scholar 

  53. D.H. McKnight, C.J. Kacmar, Factors and effects of information credibility. In ICEC, University of Minnesota, Minneapolis, pp. 423–432 (2007)

    Google Scholar 

  54. M. McPherson, L. Smith-Lovin, J.M. Cook, Birds of a feather: homophily in social networks. Annu. Rev. Sociol. 27(1), 415 (2001)

    Article  Google Scholar 

  55. P.T. Metaxas, E. Mustafaraj, From obscurity to prominence in minutes: political speech and real-time search, in Proceedings of Web Science Conference, Raleigh (2010)

    Google Scholar 

  56. B. Muir, N. Moray, Trust in automation. part ii. experimental studies of trust and human intervention in a process control simulation. Ergonomics 39(3), 429–460 (1996)

    Google Scholar 

  57. E. Mustafaraj, P. Metaxas, S. Finn, A. Monroy-Hernández, Hiding in plain sight: a tale of trust and mistrust inside a community of citizen reporters, in Proceedings of the ICWSM Conference, Dublin (2012)

    Google Scholar 

  58. C. Nass, Y. Moon, Machines and mindlessness: social responses to computers. J. Soc. Issues 56(1), 81–103 (2000)

    Article  Google Scholar 

  59. H. Nissenbaum, Will security enhance trust online, or supplant it? in Trust and Distrust in Organizations, ed. by R.M. Kramer, K.S. Cook. Russell Sage Foundation Series on Trust (Russell Sage Foundation, New York, 2004), pp. 155–188

    Google Scholar 

  60. S. O’Mahony, F. Ferraro, The emergence of governance in an open source community. Acad. Manage. J. 50(5), 1079–1106 (2007)

    Article  Google Scholar 

  61. B. Paulhamus, A. Ebaugh, C. Boylls, N. Bos, S. Hider, S. Gigure, Crowdsourced cyber defense: lessons from a large-scale, game-based approach to threat identification on a live network, in Social Computing, Behavioral – Cultural Modeling and Prediction, ed. by S. J. Yang, A.M. Greenberg, M. R. Endsley. Lecture Notes in Computer Science, vol. 7227 (Springer, Berlin/New York, 2012), pp. 35–42,

    Google Scholar 

  62. G. Pickard, I. Rahwan, W. Pan, M. Cebrian, R. Crane, A.S. Pentland Time critical social mobilization: the darpa network challenge winning strategy (2011), arXive.org 1008.3172v1

    Google Scholar 

  63. P. Pirolli, W.T. Fu, Snif-act: a model of information foraging on the world wide web, in User Modeling 2003, Johnstown, pp. 146 (2003)

    Google Scholar 

  64. J. Ratkiewicz, M.D. Conover, M. Meiss, B. Goncalves, A. Flammini, F.M. Menczer, Detecting and tracking political abuse in social media, in Proceedings of the AAAI Conference on Social Media and Weblogs (ICWSM 2011), Barcelona (2011)

    Google Scholar 

  65. R. Rosenzweig, Can history be open source? wikipedia and the future of the past. J. Am. Hist. 93(1), 117–146 (2006)

    Article  Google Scholar 

  66. S. Saavedraa, K. Hagerty, B. Uzzi, Synchronicity, instant messaging, and performance among financial traders. Proceedings of the National Academy of Sciences (PNAS), pp. 1018462108v1–201018462 (2011)

    Google Scholar 

  67. E. Sillence, P. Briggs, P.R. Harris, L. Fishwick, How do patients evaluate and make use of online health information? Soc. Sci. Med. 64, 1853–1862 (2007)

    Article  Google Scholar 

  68. O. Siobhán, F. Ferraro, Managing the boundary of an ‘open’ project, in IESE Research Papers (2004)

    Google Scholar 

  69. M. Srivastava, T. Abdelzaher, B.K. Szymanski, Human-centric sensing. Phil. Trans. R. Soc. 370 ser. A 1958, 176–197 (2012)

    Google Scholar 

  70. K. Starbird, L. Palen, (how) will the revolution be retweeted?: information diffusion and the 2011 egyptian uprising, in Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, Seattle, pp. 7–16 (2012)

    Google Scholar 

  71. K.J. Stewart, Trust transfer on the world wide web. Organiz. Sci. 14(1), 5–17 (2003)

    Article  Google Scholar 

  72. F.Y. Wang, D. Zeng, J.A. Hendler, Q. Zhang, Z. Feng, Y. Gao, H. Wang, G. Lai, A study of the human flesh search engine: crowd-powered expansion of online knowledge. IEEE Comput. 43(8), 45–53 (2010)

    Article  Google Scholar 

  73. Y. Wang, C.W. Hang, M.P. Singh A probabilistic approach for maintaining trust based on evidence. J. Artif. Intell. Res 40, 221–267 (2011)

    Google Scholar 

  74. J. Waxman, The Old 80/20 Rule Take One on the Jaw. Internet Trends Report 1999 REview (Alexa Research, San Francisco, 2000)

    Google Scholar 

  75. R. West, The psychology of security. Commun. ACM 51(4), 34–40 (2008)

    Article  Google Scholar 

  76. L. Xiong, L. Liu, Building trust in decentralized peer-to-peer electronic communities, in Fifth International Conference on Electronic Commerce Research (ICECR-5) Montreal, Canada (2002)

    Google Scholar 

  77. N. Yee, J.N. Bailenson, M. Urbanek, F. Chang, D. Merget, The unbearable likeness of being digital: the persistence of nonverbal social norms in online virtual environments. CyberPsychol. Behav. 10(1), 115–121 (2007)

    Article  Google Scholar 

  78. B. Yu, M. Singh, K. Sycara, Developing trust in large-scale peer-to-peer systems, in IEEE First Symposium on Multi-Agent Security and Survivability, Drexel, pp. 1–10 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Adali, S. (2013). Trust in Computing. In: Modeling Trust Context in Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7031-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7031-1_4

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7030-4

  • Online ISBN: 978-1-4614-7031-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics