Social and Trust-Centric Recommender Systems

  • Charu C. Aggarwal
Chapter

Abstract

With increasing access to social information about users, merchants can directly incorporate social context in collaborative filtering algorithms. Although some of these methods are discussed in Chapter 10, the focus of this chapter is primarily on recommending nodes and links in network settings. Social context is a much broader concept, not only including social (network) links, but also various types of side information, such as tags or folksonomies. Furthermore, the social context can also be understood in a network-agnostic way, as a special case of context-sensitive recommender systems (cf. Chapter 8). The social setting results in a number of human-centric factors, such as trust. When users are aware of the identity of the actors who participate in the feedback process, the trust factor plays an important role. Therefore, the material in this chapter is closely related to that in Chapter 10, but nevertheless it is distinct enough a merit a separate chapter in its own right. In particular, we will study the following aspects of social context in recommender systems:

Bibliography

  1. [1]
    A. Abdul-Rahman and S. Hailes. Supporting trust in virtual communities. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, pp. 1769–1777, 2000.Google Scholar
  2. [6]
    G. Adomavicius, R. Sankaranarayanan, S. Sen, and A. Tuzhilin. Incorporating contextual information in recommender systems using a multidimensional approach. ACM Transactions on Information Systems, 23(1), pp. 103–145, 2005.CrossRefGoogle Scholar
  3. [48]
    R. Andersen, C. Borgs, J. Chayes, U. Feige, A. Flaxman, A. Kalai, V. Mirrokni, and M. Tennenholtz. Trust-based recommendation systems: An axiomatic approach. World Wide Web Conference, pp. 199–208, 2008.Google Scholar
  4. [70]
    G. Begelman, P. Keller, and F. Smadja. Automated tag clustering: Improving search and exploration in the tag space. Collaborative Web Tagging Workshop (colocated with WWW Conference), pp. 15–23, 2006.Google Scholar
  5. [135]
    I. Cantador, A. Bellogin, and D. Vallet. Content-based recommendation in social tagging systems. ACM Conference on Recommender Systems, pp. 237–240, 2010.Google Scholar
  6. [157]
    K. Y. Chiang, C. J. Hsieh, N. Natarajan, I. S., Dhillon, and A. Tewari. Prediction and clustering in signed networks: a local to global perspective. The Journal of Machine Learning Research, 15(1), pp. 1177–1213, 2014.Google Scholar
  7. [172]
    D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg, and S. Suri. Feedback effects between similarity and social influence in online communities. ACM KDD Conference, pp. 160–168, 2008.Google Scholar
  8. [178]
    M. De Gemmis, P. Lops, and G. Semeraro. A content-collaborative recommender that exploits WordNet-based user profiles for neighborhood formation. User Modeling and User-Adapted Interaction, 17(3), pp. 217–255, 2007.CrossRefGoogle Scholar
  9. [179]
    M. De Gemmis, P. Lops, G. Semeraro and P. Basile. Integrating tags in a semantic content-based recommender. Proceedings of the ACM Conference on Recommender Systems, pp. 163–170, 2008.Google Scholar
  10. [187]
    J. O’Donovan and B. Smyth. Trust in recommender systems. International Conference on Intelligent User Interfaces, pp. 167–174, 2005.Google Scholar
  11. [191]
    D. Eck, P. Lamere, T. Bertin-Mahieux, and S. Green. Automatic generation of social tags for music recommendation. Advances in Neural Information Processing Systems, pp. 385–392, 2008.Google Scholar
  12. [215]
    J. Gemmell, A. Shepitsen, B. Mobasher, and R. Burke. Personalization in folksonomies based on tag clustering. Workshop on Intelligent Techniques for Web Personalization and Recommender Systems, 2008. http://www.aaai.org/Papers/Workshops/2008/WS-08-06/WS08-06-005.pdf
  13. [216]
    J. Gemmell, T. Schimoler, B. Mobasher, and R. Burke. Resource recommendation in social annotation systems: A linear-weighted hybrid approach. Journal of Computer and System Sciences, 78(4), pp. 1160–1174, 2012.MathSciNetCrossRefGoogle Scholar
  14. [221]
    J. Golbeck. Computing with social trust. Springer, 2008.Google Scholar
  15. [222]
    J. Golbeck. Computing and applying trust in Web-based social networks, Ph.D. Thesis, 2005.Google Scholar
  16. [223]
    J. Golbeck. Generating predictive movie recommendations from trust in social networks, Lecture Notes in Computer Science, Vol. 3986, pp. 93–104, 2006.CrossRefGoogle Scholar
  17. [224]
    J. Golbeck. Trust and nuanced profile similarity in online social networks. ACM Transactions on the Web (TWEB), 3(4), 12, 2009.Google Scholar
  18. [225]
    J. Golbeck and J. Hendler. Filmtrust: Movie recommendations using trust in Web-based social networks. IEEE Consumer Communications and Networking Conference, 96, pp. 282–286, 2006.Google Scholar
  19. [226]
    J. Golbeck and J. Hendler. Inferring binary trust relationships in Web-based social networks. ACM Transactions on Internet Technology (TOIT), 6(4), pp. 497–529, 2006.CrossRefGoogle Scholar
  20. [227]
    J. Golbeck and A. Mannes. Using Trust and Provenance for Content Filtering on the Semantic Web. Models of Trust on the Web (WWW’06 Workshop), 2006.Google Scholar
  21. [237]
    M. Gupta, R. Li, Z. Yin, and J. Han. A survey of social tagging techniques, ACM SIGKDD Explorations, 12(1), pp. 58–72, 2010.CrossRefGoogle Scholar
  22. [240]
    R. Guha. Open rating systems. Techical Report, Stanford University, 2003. http://www.w3.org/2001/sw/Europe/events/foaf-galway/papers/fp/open_rating_systems/wot.pdf
  23. [241]
    R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. World Wide Web Conference, pp. 403–412, 2004.Google Scholar
  24. [250]
    P. Heymann, D. Ramage, and H. Garcia-Molina. Social tag prediction. ACM SIGIR Conference, pp. 531–538, 2008.Google Scholar
  25. [256]
    A. Hotho, R. Jaschke, C. Schmitz, and G. Stumme. BibSonomy: A social bookmark and publication sharing system. Conceptual Structures Tool Interoperability Workshop, pp. 87–102, 2006.Google Scholar
  26. [264]
    J. Illig, A. Hotho, R. Jaschke, and G. Stumme. A comparison of content-based tag recommendations in folksonomy systems. Knowledge Processing and Data Analysis, Springer, pp. 136–149, 2011.Google Scholar
  27. [269]
    M. Jamali and M. Ester. TrustWalker: A random-walk model for combining trust-based and item-based recommendation. ACM KDD Conference, pp. 397–406, 2009.Google Scholar
  28. [270]
    M. Jamali and M. Ester. A matrix factorization technique with trust propagation for recommendation in social networks. ACM Internatonal Conference on Recommender Systems, pp 135–142, 2010.Google Scholar
  29. [277]
    R. Jaschke, L. Marinho, A. Hotho, L. Schmidt-Thieme, and G. Stumme. Tag recommendations in folksonomies. Knowledge Discovery in Databases (PKDD), pp. 506–514, 2007.Google Scholar
  30. [287]
    A. Josang, S. Marsh, and S. Pope. Exploring different types of trust propagation. In Trust management, Lecture Notes in Computer Science, Springer, 3986, pp. 179–192, 2006.Google Scholar
  31. [292]
    S. Kamvar, M. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. World Wide Web Conference, pp. 640–651, 2003.Google Scholar
  32. [315]
    R. Krestel and P. Fankhauser. Personalized topic-based tag recommendation. Neurocomputing, 76(1), pp. 61–70, 2012.CrossRefGoogle Scholar
  33. [316]
    R. Krestel, P. Fankhauser, and W. Nejdl. Latent dirichlet allocation for tag recommendation. ACM Conference on Recommender Systems, pp. 61–68, 2009.Google Scholar
  34. [324]
    J. Kunegis, S. Schmidt, A. Lommatzsch, J. Lerner, E. De Luca, and S. Albayrak. Spectral analysis of signed graphs for clustering, prediction and visualization. SIAM Conference on Data Mining, pp. 559–559, 2010.Google Scholar
  35. [325]
    J. Kunegis, E. De Luca, and S. Albayrak. The link prediction problem in bipartite networks. Computational Intelligence for Knowledge-based Systems Design, Springer, pp. 380–389, 2010.Google Scholar
  36. [344]
    R. Levien. Attack-resistant trust metrics. Computing with Social Trust, Springer, pp. 121–132, 2009.Google Scholar
  37. [345]
    M. Lesani and S. Bagheri. Applying and inferring fuzzy trust in semantic web social networks. Canadian Semantic Web, Semantic Web and Beyond, Springer, Vol 2, pp. 23–43, 2006.Google Scholar
  38. [346]
    J. Leskovec, D. Huttenlocher, and J. Kleinberg. Predicting positive and negative links in online social networks. World Wide Web Conference, pp. 641–650, 2010.Google Scholar
  39. [355]
    R. Lichtenwalter, J. Lussier, and N. Chawla. New perspectives and methods in link prediction. ACM KDD Conference, pp. 243–252, 2010.Google Scholar
  40. [381]
    H. Ma, H. Yang, M. Lyu, and I. King. SoRec: Social recommendation using probabilistic matrix factorization. ACM Conference on Information and knowledge Management, pp. 931–940, 2008.Google Scholar
  41. [382]
    H. Ma, D. Zhou, C. Liu, M. Lyu, and I. King. Recommender systems with social regularization. ACM International Conference on Web search and Data Mining, pp. 287–296, 2011.Google Scholar
  42. [383]
    H. Ma, M. Lyu, and I. King. Learning to recommend with trust and distrust relationships. ACM International Conference on Recommender Systems, pp. 189–196, 2009.Google Scholar
  43. [384]
    H. Ma, M. Lyu, and I. King. Learning to recommend with social trust ensemble. ACM SIGIR Conference, pp. 203–210, 2009.Google Scholar
  44. [401]
    L. Marinho, A. Nanopoulos, L. Schmidt-Thieme, R. Jaschke, A. Hotho, G, Stumme, and P. Symeonidis. Social tagging recommender systems. Recommender Systems Handbook, Springer, pp. 615–644, 2011.Google Scholar
  45. [403]
    P. Massa and P. Avesani. Trust-aware collaborative filtering for recommender systems. On the Move to Meaningful Internet Systems, pp. 492–508, 2004.Google Scholar
  46. [404]
    P. Massa and P. Avesani. Trust-aware recommender systems. ACM Conference on Recommender Systems, pp. 17–24, 2007.Google Scholar
  47. [405]
    P. Massa and B. Bhattacharjee. Using trust in recommender systems: An experimental analysis. Trust Management, pp. 221–235, Springer, 2004.Google Scholar
  48. [406]
    P. Massa and P. Avesani. Trust metrics on controversial users: balancing between tyranny of the majority. International Journal on Semantic Web and Information Systems, 3(1), pp. 39–64, 2007.CrossRefGoogle Scholar
  49. [432]
    A. K. Menon, and C. Elkan. Link prediction via matrix factorization. Machine Learning and Knowledge Discovery in Databases, pp. 437–452, 2011.Google Scholar
  50. [449]
    L. Mui, M. Mohtashemi, and A. Halberstadt. A computational model of trust and reputation. IEEE International Conference on System Sciences, pp. 2413–2439, 2002.Google Scholar
  51. [461]
    A. Paolo, P. Massa, and R. Tiella. A trust-enhanced recommender system application: Moleskiing. ACM Symposium on Applied Computing, pp. 1589–1593, 2005.Google Scholar
  52. [487]
    G. Qi, C. Aggarwal, Q. Tian, H. Ji, and T. S. Huang. Exploring context and content links in social media: A latent space method. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(5), pp. 850–862, 2012.CrossRefGoogle Scholar
  53. [493]
    S. Rendle. Factorization machines. IEEE International Conference on Data Mining, pp. 995–100, 2010.Google Scholar
  54. [495]
    S. Rendle. Context-aware ranking with factorization models. Studies in Computational Intelligence, Chapter 9, Springer, 2011.Google Scholar
  55. [496]
    S. Rendle, Z. Gantner, C. Freudenthaler, and L. Schmidt-Thieme. Fast context-aware recommendations with factorization machines. ACM SIGIR Conference, pp. 635–644, 2011.Google Scholar
  56. [497]
    S. Rendle, L. Balby Marinho, A. Nanopoulos, and A. Schmidt-Thieme. Learning optimal ranking with tensor factorization for tag recommendation. ACM KDD Conference, pp. 727–736, 2009.Google Scholar
  57. [498]
    S. Rendle and L. Schmidt-Thieme. Pairwise interaction tensor factorization for personalized tag recommendation. ACM International Conference on Web Search and Data Mining, pp. 81–90, 2010.Google Scholar
  58. [509]
    M. Richardson, R. Agrawal, and P. Domingos. Trust management for the semantic Web. The Semantic Web, Springer, pp. 351–368, 2003.Google Scholar
  59. [535]
    S. Sen, J. Vig, and J. Riedl. Tagommenders: connecting users to items through tags. World Wide Web Conference, pp. 671–680, 2009.Google Scholar
  60. [536]
    S. Sen, J. Vig, and J. Riedl. Learning to recognize valuable tags. International Conference on Intelligent User Interfaces, pp. 87–96, 2009.Google Scholar
  61. [542]
    A. Shepitsen, J. Gemmell, B. Mobasher, and R. Burke. Personalized recommendation in social tagging systems using hierarchical clustering. ACM Conference on Recommender Systems, pp. 259–266. 2008.Google Scholar
  62. [553]
    B. Sigurbjornsson and R. Van Zwol. Flickr tag recommendation based on collective knowledge. World Wide Web Conference, pp. 327–336, 2008.Google Scholar
  63. [555]
    Y. Song, L. Zhang and C. L. Giles. Automatic tag recommendation algorithms for social recommender systems. ACM Transactions on the Web (TWEB), 5(1), 4, 2011.Google Scholar
  64. [556]
    Y. Song, Z. Zhuang, H. Li, Q. Zhao, J. Li, W. Lee, and C. L. Giles. Real-time automatic tag recommendation. ACM SIGIR Conference, pp. 515–522, 2008.Google Scholar
  65. [580]
    P. Symeonidis, E. Tiakas, and Y. Manolopoulos. Transitive node similarity for link prediction in social networks with positive and negative links. ACM Conference on Recommender Systems, pp. 183–190, 2010.Google Scholar
  66. [581]
    P. Symeonidis, E. Tiakas, and Y. Manolopoulos. Product recommendation and rating prediction based on multi-modal social networks. ACM Conference on Recommender Systems, pp. 61–68, 2011.Google Scholar
  67. [582]
    P. Symeonidis, A. Nanopoulos, and Y. Manolopoulos. A unified framework for providing recommendations in social tagging systems based on ternary semantic analysis. IEEE Transactions on Knowledge and Data Engineering, 22(2), pp. 179–192, 2010.CrossRefGoogle Scholar
  68. [583]
    P. Symeonidis, A. Nanopoulos, and Y Manolopoulos. Tag recommendations based on tensor dimensionality reduction. ACM Conference on Recommender Systems, pp. 43–50, 2008.Google Scholar
  69. [584]
    M. Szomszor, C. Cattuto, H. Alani, K. O’Hara, A. Baldassarri, V. Loreto, and V. Servedio. Folksonomies, the semantic web, and movie recommendation. Bridging the Gap between the Semantic Web and Web 2.0, pp. 71–84, 2007.Google Scholar
  70. [588]
    J. Tang, X. Hu, and H. Liu. Social recommendation: a review. Social Network Analysis and Mining, 3(4), pp. 1113–1133, 2013.CrossRefGoogle Scholar
  71. [590]
    J. Tang, C. Aggarwal, and H. Liu. Recommendations in signed social networks. World Wide Web Conference, 2016.Google Scholar
  72. [591]
    J. Tang, S. Chang, C. Aggarwal, and H. Liu. Negative link prediction in social media. Web Search and Data Mining Conference, 2015.Google Scholar
  73. [592]
    J. Tang, X. Hu, Y. Chang, and H. Liu. Predictability of distrust with interaction data. ACM International Conference on Information and Knowledge Management (CIKM), pp. 181–190, 2014.Google Scholar
  74. [593]
    J. Tang, X. Hu and H. Liu. Is distrust the negation of trust? The value of distrust in social media. ACM Hypertext Conference (HT), pp. 148–157, 2014.Google Scholar
  75. [594]
    J. Tang, H. Gao, X. Hu, and H. Liu. Exploiting homophily effect for trust prediction. ACM International Conference on Web Search and Data Mining, pp. 53–62, 2013.Google Scholar
  76. [597]
    W. Tang, Y. Ma, and Z. Chen. Managing trust in peer-to-peer networks. Journal of Digital Information Management, 3(2), pp. 58–63, 2005.Google Scholar
  77. [602]
    M.-H. Tsai, C. Aggarwal, and T. Huang. Ranking in heterogeneous social media. Web Search and Data Mining Conference, 2014.Google Scholar
  78. [603]
    K. Tso-Sutter, L. Marinho, L. Schmidt-Thieme. Tag-aware recommender systems by fusion of collaborative filtering algorithms. ACM Symposium on Applied Computing, pp. 1995–1999, 2008.Google Scholar
  79. [614]
    P. Victor, C. Cornelis, M. De Cock, and P. Da Silva. Gradual trust and distrust in recommender systems. Fuzzy Sets and Systems, 160(10), pp. 1367–1382, 2009.MathSciNetCrossRefMATHGoogle Scholar
  80. [615]
    P. Victor, C. Cornelis, M. De Cock, and E. Herrera-Viedma. Practical aggregation operators for gradual trust and distrust. Fuzzy Sets and Systems, 184(1), pp. 126–147, 2011.MathSciNetCrossRefMATHGoogle Scholar
  81. [616]
    P. Victor, M. De Cock, and C. Cornelis. Trust and Recommendations. Recommender Systems Handbook, Springer, pp. 645–675, 2011.Google Scholar
  82. [617]
    P. Victor, C. Cornelis, M. De Cock, and A. Teredesai. Trust-and distrust-based recommendations for controversial reviews. Proceedings of the WebSci, 2009. http://journal.webscience.org/161/2/websci09_submission_65.pdf
  83. [646]
    X. Yang, Y. Guo, Y. Liu, and H. Steck. A survey of collaborative filtering based social recommender systems. Computer Communications, 41, pp. 1–10, 2014.CrossRefGoogle Scholar
  84. [671]
    Z. Zhang, T. Zhou, and Y. Zhang. Tag-aware recommender systems: A state-of-the-art survey. Journal of Computer Science and Technology, 26(5), pp. 767–777, 2011.MathSciNetCrossRefGoogle Scholar
  85. [672]
    Z. Zhang, C. Liu, and Y, Zhang. Solving the cold-start problem in recommender systems with social tags. EPL (Europhysics Letters), 92(1), 2800, 2010.Google Scholar
  86. [673]
    Y. Zhen, W. Li, and D. Yeung. TagiCoFi: tag informed collaborative filtering. ACM Conference on Recommender Systems, pp. 69–76, 2009.Google Scholar
  87. [680]
    C. Ziegler, S. McNee, J. Konstan, and G. Lausen. Improving recommendation lists through topic diversification. World Wide Web Conference, pp. 22–32, 2005.Google Scholar
  88. [681]
    C. Ziegler and J. Golbeck. Investigating interactions of trust and interest similarity. Decision Support Systems, 43(2), pp. 460–475, 2007.CrossRefGoogle Scholar
  89. [682]
    C. Ziegler and G. Lausen. Propagation models for trust and distrust in social networks. Information Systems Frontiers, 7(4–5), pp. 337–358, 2005.CrossRefGoogle Scholar
  90. [683]
    C. Ziegler and G. Lausen. Spreading activation models for trust propagation. IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 83–97, 2004.Google Scholar
  91. [692]
  92. [700]
  93. [702]
  94. [705]
  95. [706]
  96. [707]
  97. [708]
  98. [709]

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Charu C. Aggarwal
    • 1
  1. 1.IBM T.J. Watson Research CenterYorktown HeightsUSA

Personalised recommendations