{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:14:53Z","timestamp":1775283293941,"version":"3.50.1"},"publisher-location":"Boston, MA","reference-count":69,"publisher":"Springer US","isbn-type":[{"value":"9780387858197","type":"print"},{"value":"9780387858203","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T00:00:00Z","timestamp":1286236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T00:00:00Z","timestamp":1286236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-0-387-85820-3_20","type":"book-chapter","created":{"date-parts":[[2010,10,20]],"date-time":"2010-10-20T17:54:07Z","timestamp":1287597247000},"page":"645-675","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":70,"title":["Trust and Recommendations"],"prefix":"10.1007","author":[{"given":"Patricia","family":"Victor","sequence":"first","affiliation":[]},{"given":"Martine","family":"De Cock","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Cornelis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,10,5]]},"reference":[{"key":"20_CR1","unstructured":"Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proc. of the 33rd Hawaii International Conference on System Sciences, pp. 1769-1777 (2000)"},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TKDE.2005.99","volume":"17","author":"G. Adomavicius","year":"2005","unstructured":"Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering 17, 734\u2013749 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"20_CR3","unstructured":"Almen\u00e1rez, F., Mar\u00edn, A., Campo, C., Garc\u00eda, C.: PTM: A pervasive trust management model for dynamic open environments. In: Proc. of the First Workshop on Pervasive Security, Privacy and Trust, in conjuntion with Mobiquitous (2004)"},{"key":"20_CR4","unstructured":"Arazy, O., Elsane, I., Shapira, B., Kumar, N.: Social relationships in recommender systems. In: Proc. of the 17th Workshop on Information Technologies & Systems (2007)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Arazy, O., Kumar, N., Shapira, B.: Improving social recommender systems. IT Professional May\/June, 31\u201337 (2009)","DOI":"10.1109\/MITP.2009.76"},{"key":"20_CR6","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","volume":"5","author":"D. Artz","year":"2007","unstructured":"Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Journal of Web Semantics 5, 58\u201371 (2007)","journal-title":"Journal of Web Semantics"},{"key":"20_CR7","unstructured":"Avesani, P., Massa, P., Tiella, R.: Moleskiing.it: a trust-aware recommender system for ski mountaineering. International Journal for Infonomics (2005) 20 Trust and Recommendations 673"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1037\/0033-2909.115.3.401","volume":"115","author":"J. Cacioppo","year":"1994","unstructured":"Cacioppo, J., Berntson, G.: Relationship between attitudes and evaluative space: a critical review, with emphasis on the separability of positive and negative substrates. Psychological Bulletin 115, 401\u2013423 (1994)","journal-title":"Psychological Bulletin"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1037\/h0027706","volume":"1","author":"A. Constantinople","year":"1969","unstructured":"Constantinople, A.: An eriksonian measure of personality development in college students. Development Psychology 1, 357\u2013372 (1969)","journal-title":"Development Psychology"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Cofta, P.: Distrust. In: Proc. of the International Conference on Electronic Commerce, pp. 250-258 (2006)","DOI":"10.1145\/1151454.1151498"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"De Cock, M., Pinheiro da Silva, P.: A many-valued representation and propagation of trust and distrust. In: Bloch, I., Petrosino, A., Tettamanzi, A. (eds.) Lecture Notes in Computer Science 3849, pp. 108-113 (2006)","DOI":"10.1007\/11676935_14"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Falcone, R., Pezzulo, G., Castelfranchi, C.: A fuzzy approach to a belief-based trust computation. In: Eder, J., Haav, H-M., Kalja, A., Penjam, J. (eds.) Lecture Notes in Artificial Intelligence 2631, pp. 73-86 (2003)","DOI":"10.1007\/3-540-36609-1_7"},{"key":"20_CR13","unstructured":"Gans, G., Jarke, M., Kethers, S., Lakemeyer, G.: Modeling the impact of trust and distrust in agent networks. In: Proc. of the ThirdWorkshop on Agent-oriented Information Systems, pp. 45-58 (2001)"},{"key":"20_CR14","first-page":"265","volume":"4","author":"M. Ginsberg","year":"1988","unstructured":"Ginsberg, M.: Multi-valued logics: A uniform approach to reasoning in artificial intelligence. Computational Intelligence 4, 265\u2013316 (1988)","journal-title":"A uniform approach to reasoning in artificial intelligence. Computational Intelligence"},{"key":"20_CR15","unstructured":"Golbeck, J.: Computing and applying trust in web-based social networks. PhD thesis (2005)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Golbeck, J.: Generating predictive movie ratings from trust in social networks. In: St\u00f8len, K, Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) Lecture Notes in Computer Science 3986, pp. 93-104 (2006)","DOI":"10.1007\/11755593_8"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Golbeck, J.: Computing with Social Trust. Springer, London (2009)","DOI":"10.1007\/978-1-84800-356-9"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Golbeck, J., Mannes, A.: Using trust and provenance for content filtering on the semantic web. In: Proc. of the WWW06 Models of Trust for the Web Workshop (2006)","DOI":"10.21236\/ADA447994"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Golbeck, J., Parsia, B., Hendler, J.: Trust networks on the semantic web. In: Klusch, M., Omicini, A., Ossowski, S., Laamanen, H. (eds.) Lecture Notes in Artificial Intelligence 2782, pp. 238-249 (2003)","DOI":"10.1007\/978-3-540-45217-1_18"},{"key":"20_CR20","unstructured":"Guha, R.: Open rating systems. Technical report, Stanford Knowledge Systems Laboratory (2003)"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proc. of the World Wide Web Conference, pp. 403-412 (2004)","DOI":"10.1145\/988672.988727"},{"key":"20_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/963770.963772","volume":"22","author":"J. Herlocker","year":"2004","unstructured":"Herlocker, J., Konstan, J., Terveen, L., Riedl, J.: Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems 22, 5\u201353 (2004)","journal-title":"ACM Transactions on Information Systems"},{"key":"20_CR23","doi-asserted-by":"crossref","first-page":"145","DOI":"10.3233\/AIC-2008-0432","volume":"21","author":"C. Hess","year":"2008","unstructured":"Hess, C., Schiedler, C.: Trust-based recommendations for documents. AI Communications 21, 145\u2013153 (2008)","journal-title":"AI Communications"},{"key":"20_CR24","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A.: A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9, 279-311 (2001).","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"20_CR25","unstructured":"J\u00f8sang, A., Knapskog, S.: A metric for trusted systems. In: Proc. of the National Computer Security Conference, pp. 16-29 (1998)"},{"key":"20_CR26","first-page":"139","volume":"4","author":"A. J\u00f8sang","year":"2006","unstructured":"J\u00f8sang, A., Gray, E., Kinateder, M.: Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems 4, 139\u2013161 (2006)","journal-title":"Web Intelligence and Agent Systems"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Marsh, S., Pope, S.: Exploring different types of trust propagation. In: St\u00f8len, K, Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) Lecture Notes in Computer Science 3986, pp. 179-192 (2006)","DOI":"10.1007\/11755593_14"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Kamvar, S., Schlosser, M., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proc. of the World Wide Web Conference, pp. 640-651 (2003)","DOI":"10.1145\/775152.775242"},{"key":"20_CR29","unstructured":"Klir, G., Yuan, B.: Fuzzy sets and systems: theory and applications. Prentice Hall PTR, New Jersey (1995)"},{"key":"20_CR30","first-page":"119","volume":"263","author":"N. Lathia","year":"2008","unstructured":"Lathia, N., Hailes, S., Capra, L.: Trust-based collaborative filtering. In: Karabulut, Y., Mitchell, J., Herrmann, P., Damsgaard Jensen, C. (eds.) IFIP International Federation for Information Processing 263, 119\u2013134 (2008)","journal-title":"Karabulut, Y., Mitchell, J., Herrmann, P., Damsgaard Jensen, C. (eds.) IFIP International Federation for Information Processing"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Lesani, M., Bagheri, S.: Applying and inferring fuzzy trust in semantic web social networks. In: Kod\u00e9, M.T., Lemire, D. (eds.) Semantic Web and Beyond 2, pp. 23-43 (2006) 674 Patricia Victor, Martine De Cock, and Chris Cornelis","DOI":"10.1007\/978-0-387-34347-1_3"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Levien, R.: Attack-resistant trust metrics. In: Golbeck, J. (ed.) Computing With Social Trust, pp. 121-132 (2009)","DOI":"10.1007\/978-1-84800-356-9_5"},{"key":"20_CR33","doi-asserted-by":"publisher","first-page":"438","DOI":"10.2307\/259288","volume":"23","author":"R. Lewicki","year":"1998","unstructured":"Lewicki, R., McAllister, D., Bies, R.: Trust and distrust: new relationships and realities. Academy of Management Review 23, 438\u2013458 (1998)","journal-title":"Academy of Management Review"},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"Marsh, S., Briggs, P.: Examining trust, forgiveness and regret as computational concepts. In: Golbeck, J. (ed.) Computing With Social Trust, pp. 9-43 (2009)","DOI":"10.1007\/978-1-84800-356-9_2"},{"key":"20_CR35","doi-asserted-by":"crossref","unstructured":"Massa, P., Avesani, P.: Trust-aware collaborative filtering for recommender systems. In: Proc. of the Federated International Conference On The Move to Meaningful Internet, pp. 492-508 (2004)","DOI":"10.1007\/978-3-540-30468-5_31"},{"key":"20_CR36","doi-asserted-by":"crossref","unstructured":"Massa, P., Avesani, P.: Trust-aware recommender systems. In: Proc. of ACM Recommender Systems, pp. 17-24 (2007)","DOI":"10.1145\/1297231.1297235"},{"key":"20_CR37","doi-asserted-by":"crossref","unstructured":"Massa, P., Avesani, P.: Trust metrics in recommender systems. In: Golbeck, J. (ed.) Computing with Social Trust, pp. 259-285 (2009)","DOI":"10.1007\/978-1-84800-356-9_10"},{"key":"20_CR38","doi-asserted-by":"crossref","first-page":"39","DOI":"10.4018\/jswis.2007010103","volume":"3","author":"P. Massa","year":"2007","unstructured":"Massa, P., Avesani, P.: Trust metrics on controversial users: balancing between tyranny of the majority and echo chambers. International Journal on SemanticWeb and Information Systems 3, 39\u201364 (2007)","journal-title":"International Journal on SemanticWeb and Information Systems"},{"key":"20_CR39","doi-asserted-by":"crossref","unstructured":"Massa, P., Bhattacharjee, B.: Using trust in recommender systems: an experimental analysis. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) Lecture Notes in Computer Science 2995, pp. 221-235 (2004)","DOI":"10.1007\/978-3-540-24747-0_17"},{"key":"20_CR40","doi-asserted-by":"publisher","first-page":"709","DOI":"10.2307\/258792","volume":"20","author":"R. Mayer","year":"1995","unstructured":"Mayer, R., Davis, J., Schoorman, D.: An integrative model of organizational trust. The Academy of Management Review 20, 709\u2013734 (1995)","journal-title":"The Academy of Management Review"},{"key":"20_CR41","doi-asserted-by":"publisher","first-page":"24","DOI":"10.2307\/256727","volume":"38","author":"D. McAllister","year":"1995","unstructured":"McAllister, D.: Affect- and cognition-based trust as foundations for interpersonal cooperation in organizations. The Academy of Management Journal 38, 24\u201359 (1995)","journal-title":"The Academy of Management Journal"},{"issue":"9","key":"20_CR42","doi-asserted-by":"publisher","first-page":"4544","DOI":"10.1016\/j.csda.2008.01.028","volume":"52","author":"R. Moskovitch","year":"2008","unstructured":"Moskovitch, R., Elovici, Y., Rokach, L., Detection of unknown computer worms based on behavioral classification of the host, Computational Statistics and Data Analysis, 52(9): 4544\u2013 4566 (2008)","journal-title":"Computational Statistics and Data Analysis"},{"key":"20_CR43","doi-asserted-by":"crossref","unstructured":"Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. In: Proc. of the 35th Hawaii International Conference on System Sciences, pp. 2431-2439 (2002)","DOI":"10.1109\/HICSS.2002.994181"},{"key":"20_CR44","doi-asserted-by":"crossref","unstructured":"Noh, S.: Calculating trust using aggregation rules in social networks. In: Xiao, B., Yang, L., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) Lecture Notes in Computer Science 4610, pp. 361-371 (2007)","DOI":"10.1007\/978-3-540-73547-2_38"},{"key":"20_CR45","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan, J.: Capturing trust in social web applications. In: Golbeck, J. (ed.) Computing With Social Trust, pp. 213-257 (2009)","DOI":"10.1007\/978-1-84800-356-9_9"},{"key":"20_CR46","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan, J., Smyth, B.: Trust in recommender systems. In: Proc. of the 10th International Conference on Intelligent User Interfaces, pp. 167-174 (2005)","DOI":"10.1145\/1040830.1040870"},{"key":"20_CR47","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1142\/S0218213006003053","volume":"15","author":"J. O\u2019Donovan","year":"2006","unstructured":"O\u2019Donovan, J., Smyth, B.: Mining trust values from recommendation errors. International Journal on Artificial Intelligence Tools 15, 945\u2013962 (2006)","journal-title":"International Journal on Artificial Intelligence Tools"},{"key":"20_CR48","unstructured":"O\u2019Reilly, T.: What is web 2.0. Available at http:\/\/www.oreillynet.com\/pub\/a\/oreilly\/tim\/news\/2005\/09\/30\/what-is-web-20.html (2005)"},{"key":"20_CR49","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/11429760_16","volume":"3477","author":"M. Papagelis","year":"2005","unstructured":"Papagelis, M., Plexousakis, D., Kutsuras, T.: Alleviating the sparsity problem of collaborative filtering using trust inferences. In: Herrmann, P., Issarny, V., Shiu, S. (eds.) Lecture Notes in Computer Science 3477, pp. 224-239 (2005)","journal-title":"Lecture Notes in Computer Science"},{"key":"20_CR50","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1146\/annurev.psych.48.1.609","volume":"48","author":"R. Petty","year":"1997","unstructured":"Petty, R., Wegener, D., Fabrigar, L.: Attitudes and attitude change. Annual Review of Psychology 48, 609\u2013647 (1997)","journal-title":"Annual Review of Psychology"},{"key":"20_CR51","doi-asserted-by":"crossref","unstructured":"Pitsilis, G., Marshall, L.: A trust-enabled P2P recommender system. In: Proc. of the 15th Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, pp. 59- 64 (2006)","DOI":"10.1109\/WETICE.2006.12"},{"key":"20_CR52","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1037\/0022-3514.71.3.431","volume":"71","author":"J. Priester","year":"1996","unstructured":"Priester, J., Petty, R.: The gradual threshold model of ambivalence: relating the positive and negative bases of attitudes to subjective ambivalence. Journal of Personality and Social Psychology 71, 431\u2013449 (1996)","journal-title":"Journal of Personality and Social Psychology"},{"key":"20_CR53","doi-asserted-by":"crossref","unstructured":"Resnick, P., Iacovou, N., Suchak, M., Bergstorm, P., Riedl, J.: Grouplens: An open architecture for collaborative filtering of netnews. In: Proc. of Computer Supported Cooperative Work, pp. 175-186 (1994)","DOI":"10.1145\/192844.192905"},{"key":"20_CR54","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/245108.245121","volume":"40","author":"P. Resnick","year":"1997","unstructured":"Resnick, P., Varian, H.R.: Recommender systems. Communications of the ACM 40, 56\u201358 (1997)","journal-title":"Communications of the ACM"},{"key":"20_CR55","doi-asserted-by":"crossref","unstructured":"Richardson, M., Agrawal, R., Domingos, P.: Trust management for the semantic web. In: Proc. of the Second International Semantic Web Conference, pp. 351-368 (2003)","DOI":"10.1007\/978-3-540-39718-2_23"},{"key":"20_CR56","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1023\/A:1009804230409","volume":"5","author":"J. Schafer","year":"2001","unstructured":"Schafer, J., Konstan, J., Riedl, J.: E-commerce recommendation applications. Data Mining and Knowledge Discovery 5, 115\u2013153 (2001)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"20_CR57","unstructured":"Sinha, R., Swearingen, K.: Comparing recommendations made by online systems and friends. Proc. of the DELOS-NSFWorkshop on Personalisation and Recommender Systems in Digital Libraries (2001)"},{"key":"20_CR58","unstructured":"Swearingen, K., Sinha, R.: Beyond algorithms: an HCI perspective on recommender systems. Proc. of SIGIR Workshop on Recommender Systems (2001)"},{"key":"20_CR59","first-page":"58","volume":"3","author":"W. Tang","year":"2005","unstructured":"Tang, W., Ma, Y., Chen, Z.: Managing trust in peer-to-peer networks. Journal of Digital Information Management 3, 58\u201363 (2005)","journal-title":"Journal of Digital Information Management"},{"key":"20_CR60","unstructured":"Victor, P., De Cock, M., Cornelis, C., Pinheiro da Silva, P.: Towards a provenance-preserving trust model in agent networks. In: Proc. of Models of Trust for theWeb WWW2006Workshop (2006)"},{"key":"20_CR61","doi-asserted-by":"crossref","first-page":"127","DOI":"10.3233\/AIC-2008-0431","volume":"21","author":"P. Victor","year":"2008","unstructured":"Victor, P., Cornelis, C., De Cock, M., Teredesai, A.M.: Key figure impact in trust-enhanced recommender systems. AI Communications 21, 127\u2013143 (2008)","journal-title":"AI Communications"},{"key":"20_CR62","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1016\/j.fss.2008.11.014","volume":"160","author":"P. Victor","year":"2009","unstructured":"Victor, P., Cornelis, C., De Cock, M., Pinheiro da Silva, P.: Gradual trust and distrust in recommender systems. Fuzzy Sets and Systems 160 1367\u20131382 (2009)","journal-title":"Fuzzy Sets and Systems"},{"key":"20_CR63","doi-asserted-by":"crossref","unstructured":"Victor, P., Cornelis, C., De Cock, M., Teredesai, A.M.: A comparative analysis of trustenhanced recommenders for controversial items. In: Proc. of the International AAI Conference on Weblogs and Social Media, pp. 342-345 (2009)","DOI":"10.1609\/icwsm.v3i1.13986"},{"key":"20_CR64","unstructured":"Victor, P., Cornelis, C., De Cock, M., Teredesai, A.M.: Trust- and distrust-based recommendations for controversial reviews. IEEE Intelligent Systems, in press."},{"key":"20_CR65","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L.A. Zadeh","year":"1965","unstructured":"Zadeh, L.A.: Fuzzy sets. Information and Control 8, 338\u2013353 (1965)","journal-title":"Information and Control"},{"key":"20_CR66","doi-asserted-by":"crossref","unstructured":"Zaihrayeu, I., Pinheiro da Silva, P., McGuinness, D.: IWTrust: Improving user trust in answers from the web. In: Proc. of the Third International Conference On Trust Management, pp. 384- 392 (2005)","DOI":"10.1007\/11429760_27"},{"key":"20_CR67","doi-asserted-by":"crossref","unstructured":"Zhang, S., Ouyang, Y., Ford, J., Makedon, F.: Analysis of a low-dimensional linear model under recommendation attacks. In: Proc. of the International ACM SIGIR Conference, pp. 517-524 (2006)","DOI":"10.1145\/1148170.1148259"},{"key":"20_CR68","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s10796-005-4807-3","volume":"7","author":"C. Ziegler","year":"2005","unstructured":"Ziegler, C., Lausen, G.: Propagation models for trust and distrust in social networks. Information System Frontiers 7, 337\u2013358 (2005)","journal-title":"Information System Frontiers"},{"key":"20_CR69","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.dss.2006.11.003","volume":"43","author":"C. Ziegler","year":"2007","unstructured":"Ziegler, C., Golbeck, J.: Investigating correlations of trust and interest similarity - Do birds of a feather really flock together?. Decision Support Systems 43, 460\u2013475 (2007)","journal-title":"Decision Support Systems"}],"container-title":["Recommender Systems Handbook"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-85820-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T22:52:30Z","timestamp":1740610350000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-0-387-85820-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,5]]},"ISBN":["9780387858197","9780387858203"],"references-count":69,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-85820-3_20","relation":{},"subject":[],"published":{"date-parts":[[2010,10,5]]},"assertion":[{"value":"5 October 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}