{"id":2255,"date":"2015-04-13T15:25:41","date_gmt":"2015-04-13T15:25:41","guid":{"rendered":"http:\/\/blog.soton.ac.uk\/smallworld\/?p=2255"},"modified":"2015-05-01T13:11:13","modified_gmt":"2015-05-01T13:11:13","slug":"ary-you-trustworthy","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/smallworld\/2015\/04\/13\/ary-you-trustworthy\/","title":{"rendered":"Are you trustworthy ?"},"content":{"rendered":"<p style=\"text-align: left\">Trust is involved in human activities in a daily basis. Measuring trust in a digital world can be more complicated than real life. There are various methods that help in calculating trust and evaluating users based on trust value.There are significant number of models in\u00a0trust in social networks. Small.World tends to follow reputation-based trust. This comprises two type of trust:<\/p>\n<ol>\n<li>Global Trust: it is a quantitative approach where each user scored a value. The global trustworthiness then based on these scores.<\/li>\n<li>Local Trust: it is a qualitative approach where the trust based on personal bias (Ziegler &amp; Lausen, 2004).<\/li>\n<\/ol>\n<p>The Local Trust are following uses three properties of trust in social networks:<\/p>\n<ul>\n<li><strong>Transitivity :\u00a0<\/strong>If A trusts B and B trusts J then A will also trust J<\/li>\n<\/ul>\n<ul>\n<li><strong>Asymmetry :\u00a0<\/strong>If A trusts B it does not follow that B trusts A<\/li>\n<\/ul>\n<ul>\n<li><strong>Personalization :<\/strong>Trust is held from the view of a node \u2013 it is therefore\u00a0<strong>local trust <\/strong>(Millard &amp; Imran, 2015).<\/li>\n<\/ul>\n<p>the usage of Online Social Network (OSN) trust methodologies can boost the privacy and security for the user. A user needs to know if they can trust someone to look at there profiles or how much they can trust them. The post discuss two methods: Trust-Online Social Network (T-OSN) and Trust Indexing algorithm (TI).<\/p>\n<div style=\"text-align: left\">The evolution of OSN encouraged people to meet strangers from all over the world and become friends. But this has also, led to some problems such as identity theft and stalking. Methods that calculate trust and help users to make decisions are usually complex or require huge resources. <strong>T-OSN<\/strong> is a trust model that has been created specially for OSN that can also be used on other applications such as mobile message forwarding and peer-to peer file sharing network <span id=\"js-intext-string-0\" class=\"selectable\">(Li and Bont, 2011)<\/span>.<\/div>\n<div style=\"text-align: left\"><\/div>\n<div style=\"text-align: left\">the model is effective, simple and require the least resources possible. the model is based on two things :<\/div>\n<div style=\"text-align: left\">1- Number of friends (Degree)<\/div>\n<div style=\"text-align: left\">2- Contact frequency (Contact interval)<\/div>\n<div style=\"text-align: left\"><\/div>\n<div style=\"text-align: left\"><a href=\"http:\/\/blog.soton.ac.uk\/smallworld\/files\/2015\/04\/Screen-Shot-2015-04-13-at-12.16.47.png\"><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-2257 aligncenter\" src=\"http:\/\/blog.soton.ac.uk\/smallworld\/files\/2015\/04\/Screen-Shot-2015-04-13-at-12.16.47.png\" alt=\"Screen Shot 2015-04-13 at 12.16.47\" width=\"320\" height=\"291\" srcset=\"https:\/\/blog.soton.ac.uk\/smallworld\/files\/2015\/04\/Screen-Shot-2015-04-13-at-12.16.47.png 774w, https:\/\/blog.soton.ac.uk\/smallworld\/files\/2015\/04\/Screen-Shot-2015-04-13-at-12.16.47-300x272.png 300w, https:\/\/blog.soton.ac.uk\/smallworld\/files\/2015\/04\/Screen-Shot-2015-04-13-at-12.16.47-331x300.png 331w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/a><\/div>\n<div style=\"text-align: left\">and then a user trustworthiness can be calculated for each user. The theory suggests that if a user has more friends and more frequent communication with friends, then this user is highly secure to interact with. So the user will get a higher trustworthiness.<\/div>\n<div style=\"text-align: left\"><\/div>\n<div style=\"text-align: left\">Another method is called <strong>\u201cTrust Index\u201d<\/strong> <span id=\"js-intext-string-1\" class=\"selectable\">(Tang et al., 2012)<\/span>. It has the same idea as Page Rank that is being used in Google search engine. The algorithm is based on distance that counts hops. How far the user from his\/her peer.<\/div>\n<div style=\"text-align: left\"><\/div>\n<div style=\"text-align: left\"><a href=\"http:\/\/blog.soton.ac.uk\/smallworld\/files\/2015\/04\/Screen-Shot-2015-04-13-at-12.59.38.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-large wp-image-2256 aligncenter\" src=\"http:\/\/blog.soton.ac.uk\/smallworld\/files\/2015\/04\/Screen-Shot-2015-04-13-at-12.59.38-1024x157.png\" alt=\"Screen Shot 2015-04-13 at 12.59.38\" width=\"584\" height=\"90\" srcset=\"https:\/\/blog.soton.ac.uk\/smallworld\/files\/2015\/04\/Screen-Shot-2015-04-13-at-12.59.38-1024x157.png 1024w, https:\/\/blog.soton.ac.uk\/smallworld\/files\/2015\/04\/Screen-Shot-2015-04-13-at-12.59.38-300x46.png 300w, https:\/\/blog.soton.ac.uk\/smallworld\/files\/2015\/04\/Screen-Shot-2015-04-13-at-12.59.38-500x77.png 500w, https:\/\/blog.soton.ac.uk\/smallworld\/files\/2015\/04\/Screen-Shot-2015-04-13-at-12.59.38.png 1254w\" sizes=\"auto, (max-width: 584px) 100vw, 584px\" \/><\/a><\/div>\n<div style=\"text-align: left\"><\/div>\n<div style=\"text-align: left\">Each user will have a TI and a list of the ranking of other users, those who are more trustworthiness will be on the top of the ranking. The paper claims that TI successfully been able to classify trustworthiness users from those who are not <span id=\"js-intext-string-1\" class=\"selectable\">(Tang et al., 2012)<\/span>.<\/div>\n<div style=\"text-align: left\"><\/div>\n<div style=\"text-align: left\">Google have introduced Google+ circles where recommendations of people where based on common interests or people that the user might be connected to <span id=\"js-intext-string-1\" class=\"selectable\">(Tang et al., 2012)<\/span>. Spam was not an issue. Small.World will follow the same path where trust will come in top of the recommendations that the users will get.<\/div>\n<div style=\"text-align: left\"><\/div>\n<div style=\"text-align: left\">choosing a method to evaluate can be tricky where there is no ultimate solution. It depends on the type of the OSN and what factors will be involved in the algorithm.<\/div>\n<div style=\"text-align: left\">research on this area is highly encouraged to create a more secure environment for OSN.<\/div>\n<div style=\"text-align: left\"><\/div>\n<div style=\"text-align: left\"><b>References<\/b><strong>:\u00a0<\/strong><\/div>\n<div style=\"text-align: left\"><\/div>\n<div style=\"text-align: left\">\n<div>Millard, D. and Imran, M. (2015).\u00a0<em>Trust: Part I<\/em>.<\/div>\n<div><\/div>\n<div>\u00a0Li, M. and Bont, A. (2011). T-OSN : a trust evaluation model in online social networks. In: <i>IFIP Ninth International Conference on Embedded and Ubiquitous Computing<\/i>. [online] Melbourne, Australia: IEEE Computer Society, pp.469-472. Available at: http:\/\/ieeexplore.ieee.org\/xpl [Accessed 12 Apr. 2015].<\/div>\n<div><\/div>\n<div>\u00a0Tang, R., Lu, L., Zhuang, Y. and Fong, S. (2012). Not Every Friend on a Social Network Can be Trusted: An Online Trust Indexing Algorithm. In: <i>IEEE\/WIC\/ACM International Conferences on Web Intelligence and Intelligent Agent Technology<\/i>. [online] Macau SAR, China: IEEE Computer Society, pp.280-285. Available at: http:\/\/ieeexplore.ieee.org [Accessed 12 Apr. 2015].<\/div>\n<div><\/div>\n<\/div>\n<div style=\"text-align: left\">Ziegler, C. and Lausen, G. (2004). Spreading activation models for trust propagation.\u00a0<em>IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE &#8217;04. 2004<\/em>.<\/div>\n<div style=\"text-align: left\"><\/div>\n<div style=\"text-align: left\">This post is written by : Muna &amp; Awezan<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Trust is involved in human activities in a daily basis. Measuring trust in a digital world can be more complicated than real life. There are various methods that help in calculating trust and evaluating users based on trust value.There are &hellip; <a href=\"https:\/\/blog.soton.ac.uk\/smallworld\/2015\/04\/13\/ary-you-trustworthy\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":97421,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8883],"tags":[25287,467433,52773,914924,428213,5344,412,717360],"class_list":["post-2255","post","type-post","status-publish","format-standard","hentry","category-related-academic-work","tag-algorithm","tag-index","tag-online","tag-path","tag-ranking","tag-social-networks","tag-trust","tag-user"],"_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/smallworld\/wp-json\/wp\/v2\/posts\/2255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/smallworld\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/smallworld\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/smallworld\/wp-json\/wp\/v2\/users\/97421"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/smallworld\/wp-json\/wp\/v2\/comments?post=2255"}],"version-history":[{"count":10,"href":"https:\/\/blog.soton.ac.uk\/smallworld\/wp-json\/wp\/v2\/posts\/2255\/revisions"}],"predecessor-version":[{"id":2593,"href":"https:\/\/blog.soton.ac.uk\/smallworld\/wp-json\/wp\/v2\/posts\/2255\/revisions\/2593"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/smallworld\/wp-json\/wp\/v2\/media?parent=2255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/smallworld\/wp-json\/wp\/v2\/categories?post=2255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/smallworld\/wp-json\/wp\/v2\/tags?post=2255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}