{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:33:26Z","timestamp":1758270806617,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030191429"},{"type":"electronic","value":"9783030191436"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19143-6_4","type":"book-chapter","created":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T12:04:48Z","timestamp":1556107488000},"page":"46-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["SETTRUST: Social Exchange Theory Based Context-Aware Trust Prediction in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Seyed Mohssen","family":"Ghafari","sequence":"first","affiliation":[]},{"given":"Shahpar","family":"Yakhchi","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Beheshti","sequence":"additional","affiliation":[]},{"given":"Mehmet","family":"Orgun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,25]]},"reference":[{"key":"4_CR1","unstructured":"Lenhart, A., Purcell, K., Smith, A., Zickuhr, K.: Social Media Mobile Internet Use Among Teens and Young Adults. Millennials. American Life Project, Washington DC (2010)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Abu-Salih, B., Wongthongtham, P., Beheshti, S., Zhu, D.: A preliminary approach to domain-based evaluation of users\u2019 trustworthiness in online social networks. In: 2015 IEEE International Congress on Big Data, New York City, NY, USA, pp. 460\u2013466 (2015)","DOI":"10.1109\/BigDataCongress.2015.74"},{"issue":"4","key":"4_CR3","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1002\/spe.2558","volume":"48","author":"A Beheshti","year":"2018","unstructured":"Beheshti, A., Benatallah, B., Motahari-Nezhad, H.R.: ProcessAtlas: a scalable and extensible platform for business process analytics. Softw. Pract. Exp. 48(4), 842\u2013866 (2018)","journal-title":"Softw. Pract. Exp."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Beheshti, A., Benatallah, B., Nouri, R., Chhieng, V.M., Xiong, H., Zhao, X.: CoreDB: a data lake service. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, CIKM 2017, Singapore, 06\u201310 November 2017, pp. 2451\u20132454 (2017)","DOI":"10.1145\/3132847.3133171"},{"issue":"12","key":"4_CR5","first-page":"1942","volume":"11","author":"A Beheshti","year":"2018","unstructured":"Beheshti, A., Benatallah, B., Nouri, R., Tabebordbar, A.: CoreKG: a knowledge lake service. PVLDB 11(12), 1942\u20131945 (2018)","journal-title":"PVLDB"},{"key":"4_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-319-92901-9_3","volume-title":"Information Systems in the Big Data Era","author":"A Beheshti","year":"2018","unstructured":"Beheshti, A., Vaghani, K., Benatallah, B., Tabebordbar, A.: CrowdCorrect: a curation pipeline for social data cleansing and curation. In: Mendling, J., Mouratidis, H. (eds.) CAiSE 2018. LNBIP, vol. 317, pp. 24\u201338. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92901-9_3"},{"key":"4_CR7","unstructured":"Beheshti, S., Benatallah, B., Motahari-Nezhad, H.R.: Galaxy: a platform for explorative analysis of open data sources. In: Proceedings of the 19th International Conference on Extending Database Technology, EDBT 2016, Bordeaux, France, 15\u201316 March 2016, pp. 640\u2013643 (2016)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-642-23059-2_22","volume-title":"Business Process Management","author":"S-M-R Beheshti","year":"2011","unstructured":"Beheshti, S.-M.-R., Benatallah, B., Motahari-Nezhad, H.R., Sakr, S.: A query language for analyzing business processes execution. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 281\u2013297. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23059-2_22"},{"key":"4_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25037-3","volume-title":"Process Analytics: Concepts and Techniques for Querying and Analyzing Process Data","author":"S-M-R Beheshti","year":"2016","unstructured":"Beheshti, S.-M.-R., et al.: Process Analytics: Concepts and Techniques for Querying and Analyzing Process Data. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-25037-3"},{"issue":"4","key":"4_CR10","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s00607-016-0490-0","volume":"99","author":"S Beheshti","year":"2017","unstructured":"Beheshti, S., Benatallah, B., Venugopal, S., Ryu, S.H., Motahari-Nezhad, H.R., Wang, W.: A systematic review and comparative analysis of cross-document coreference resolution methods and tools. Computing 99(4), 313\u2013349 (2017)","journal-title":"Computing"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Beheshti, S., Tabebordbar, A., Benatallah, B., Nouri, R.: On automating basic data curation tasks. In: Proceedings of the 26th International Conference on World Wide Web Companion, Perth, Australia, 3\u20137 April 2017, pp. 165\u2013169 (2017)","DOI":"10.1145\/3041021.3054726"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Beigi, G., Tang, J., Wang, S., Liu, H.: Exploiting emotional information for trust\/distrust prediction. In: Venkatasubramanian, S.C., Meira Jr., W. (eds.) Proceedings of the 2016 SIAM International Conference on Data Mining, USA, pp. 81\u201389. SIAM (2016)","DOI":"10.1137\/1.9781611974348.10"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Ding, C., Li, T., Jordan, M.I.: Nonnegative matrix factorization for combinatorial optimization. In: International Conference on Data Mining ICDM, Italy, pp. 183\u2013192 (2008)","DOI":"10.1109\/ICDM.2008.130"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Sumner, C., Byers, A., Boovhever, R., Park, G.J.: Predicting dark triad personality traits from Twitter usage and a linguistic analysis of tweets. In: 11th International Conference on Machine Learning and Applications, ICMLA, USA, pp. 386\u2013393 (2012)","DOI":"10.1109\/ICMLA.2012.218"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Chen, S.D., Chen, Y., Han, J., Moulin, P.: A feature-enhanced ranking-based classifier for multimodal data and heterogeneous information networks. In: IEEE 13th International Conference on Data Mining, USA, pp. 997\u20131002 (2013)","DOI":"10.1109\/ICDM.2013.71"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0162-3095(95)00022-D","volume":"16","author":"RIM Dunbar","year":"1995","unstructured":"Dunbar, R.I.M., Clark, A., Hurst, N.L.: Conflict and cooperation among the Vikings: contigent behavioural decisions. Ethol. Sociobiol. 16, 233 (1995)","journal-title":"Ethol. Sociobiol."},{"issue":"1","key":"4_CR17","first-page":"128","volume":"44","author":"PM Blau","year":"1965","unstructured":"Blau, P.M.: Exchange and power in social life. Soc. Forces 44(1), 128 (1965)","journal-title":"Soc. Forces"},{"issue":"3","key":"4_CR18","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s11280-017-0485-6","volume":"21","author":"G Liu","year":"2017","unstructured":"Liu, G., et al.: Context-aware trust network extraction in large-scale trust-oriented social networks. World Wide Web 21(3), 713 (2017)","journal-title":"World Wide Web"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Liu, G., Wang, Y., Orgun, M.A.: Social context-aware trust network discovery in complex contextual social networks. In: Proceedings of the 26 AAAI Conference, Canada (2012)","DOI":"10.1609\/aaai.v26i1.8114"},{"key":"4_CR20","unstructured":"Golbeck, J.: Using trust and provenance for content filtering on the semantic web. In: Proceedings of the Workshop on Models of Trust on the Web, at the 15th WWW Conference (2006)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Liu, H., et al.: Predicting trusts among users of online communities: an epinions case study. In: EC, pp. 310\u2013319 (2008)","DOI":"10.1145\/1386790.1386838"},{"issue":"6","key":"4_CR22","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1086\/222355","volume":"63","author":"GC Homans","year":"1958","unstructured":"Homans, G.C.: Social behavior as exchange. Am. J. Sociol. 63(6), 597 (1958)","journal-title":"Am. J. Sociol."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Tang, J., Gao, H., Liu, H.: mtrust: discerning multi-faceted trust in a connected world. In: Proceedings of the Fifth WSDM, USA, pp. 93\u2013102 (2012)","DOI":"10.1145\/2124295.2124309"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Tang, J., Gao, H., Hu, X., Liu, H.: Exploiting homophily effect for trust prediction. In: International Conference on Web Search and Data Mining, WSDM, Italy, pp. 53\u201362 (2013)","DOI":"10.1145\/2433396.2433405"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Jang, M.H., Faloutsos, C., Kim, S.W.: Trust prediction using positive, implicit, and negative information. In: Proceedings of the 23rd International Conference on World Wide Web, WWW 2014 Companion, USA, pp. 303\u2013304 (2014)","DOI":"10.1145\/2567948.2577288"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Uddin, M.G., Zulkernine, M., Ahamed, S.I.: Cat: a context-aware trust model for open and dynamic systems. In: Proceedings of ACM Symposium on Applied Computing (SAC), pp. 2024\u20132029 (2008)","DOI":"10.1145\/1363686.1364176"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-319-19548-3_25","volume-title":"Databases Theory and Applications","author":"Z Maamar","year":"2015","unstructured":"Maamar, Z., Sakr, S., Barnawi, A., Beheshti, S.-M.-R.: A framework of enriching business processes life-cycle with tagging information. In: Sharaf, M.A., Cheema, M.A., Qi, J. (eds.) ADC 2015. LNCS, vol. 9093, pp. 309\u2013313. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19548-3_25"},{"issue":"3","key":"4_CR28","doi-asserted-by":"publisher","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R.C., et al.: An integrative model of organizational trust. Acad. Manage. Rev. 20(3), 709 (1995)","journal-title":"Acad. Manage. Rev."},{"key":"4_CR29","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1002\/asi.20591","volume":"58","author":"DL Nowell","year":"2007","unstructured":"Nowell, D.L., Kleinberg, J.M.: The link-prediction problem for social networks. JASIST 58, 1019 (2007)","journal-title":"JASIST"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th International Conference on World Wide Web (WWW 2004), pp. 403\u2013412 (2004)","DOI":"10.1145\/988672.988727"},{"key":"4_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-030-02922-7_11","volume-title":"Web Information Systems Engineering \u2013 WISE 2018","author":"SM Ghafari","year":"2018","unstructured":"Ghafari, S.M., Yakhchi, S., Beheshti, A., Orgun, M.: Social context-aware trust prediction: methods for identifying fake news. In: Hacid, H., Cellary, W., Wang, H., Paik, H.-Y., Zhou, R. (eds.) WISE 2018. LNCS, vol. 11233, pp. 161\u2013177. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-02922-7_11"},{"key":"4_CR32","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.procs.2015.06.021","volume":"54","author":"S Sanadhya","year":"2015","unstructured":"Sanadhya, S., Singh, S.: Trust calculation with ant colony optimization in online social networks. Procedia Comput. Sci. 54, 186 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"4_CR33","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.comcom.2015.06.017","volume":"73","author":"J Surma","year":"2016","unstructured":"Surma, J.: Social exchange in online social networks: the reciprocity phenomenon on Facebook. Comput. Commun. 73, 342\u2013346 (2016)","journal-title":"Comput. Commun."},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"T. Althoff, P.J., Leskovec, J.: Online actions with offline impact: how online social networks influence online and offline user behavior. In: Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, WSDM, United Kingdom, pp. 537\u2013546 (2017)","DOI":"10.1145\/3018661.3018672"},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Tabebordbar, A., Beheshti, A.: Adaptive rule monitoring system. In: Proceedings of the 1st International Workshop on Software Engineering for Cognitive Services, SE4COG@ICSE 2018, Gothenburg, Sweden, 28\u201329 May 2018, pp. 45\u201351 (2018)","DOI":"10.1145\/3195555.3195564"},{"key":"4_CR36","first-page":"1","volume":"10","author":"J Tang","year":"2015","unstructured":"Tang, J., Liu, H.: Trust in social media. Synthesis Lectures on Information Security. Priv. Trust 10, 1\u201329 (2015)","journal-title":"Priv. Trust"},{"key":"4_CR37","volume-title":"The Social Psychology of Groups","author":"J Thibaut","year":"1959","unstructured":"Thibaut, J., Kelley, H.: The Social Psychology of Groups. Wiley, New York (1959)"},{"key":"4_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/978-3-662-45391-9_45","volume-title":"Service-Oriented Computing","author":"X Zheng","year":"2014","unstructured":"Zheng, X., Wang, Y., Orgun, M.A., Liu, G., Zhang, H.: Social context-aware trust prediction in social networks. In: Franch, X., Ghose, A.K., Lewis, G.A., Bhiri, S. (eds.) ICSOC 2014. LNCS, vol. 8831, pp. 527\u2013534. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45391-9_45"},{"key":"4_CR39","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, X., Tang, J., Zuo, W., Cai, G.: Modeling status theory in trust prediction. In: Twenty-Ninth AAAI Conference on Artificial Intelligence, USA, pp. 1875\u20131881 (2015)","DOI":"10.1609\/aaai.v29i1.9460"},{"key":"4_CR40","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11280-013-0241-5","volume":"18","author":"Y Wang","year":"2015","unstructured":"Wang, Y., Li, L., Liu, G.: Social context-aware trust inference for trust enhancement in social network based recommendations on service providers. World Wide Web 18, 159 (2015)","journal-title":"World Wide Web"}],"container-title":["Lecture Notes in Computer Science","Data Quality and Trust in Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19143-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T19:32:54Z","timestamp":1663356774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-19143-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030191429","9783030191436"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19143-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"25 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QUAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Data Quality and Trust in Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"quat2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/computing.du.se\/quat\/quat2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}