{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:59:12Z","timestamp":1743112752069,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031723216"},{"type":"electronic","value":"9783031723223"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-72322-3_9","type":"book-chapter","created":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T18:01:54Z","timestamp":1726336914000},"page":"87-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Fuzzy-Based System for Evaluation of User Trust in Social Networks"],"prefix":"10.1007","author":[{"given":"Shunya","family":"Higashi","sequence":"first","affiliation":[]},{"given":"Phudit","family":"Ampririt","sequence":"additional","affiliation":[]},{"given":"Ermioni","family":"Qafzezi","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Ikeda","sequence":"additional","affiliation":[]},{"given":"Keita","family":"Matsuo","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,15]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Ting, H.L.J., Kang, X., Li, T., Wang, H., Chu, C.-K.: On the trust and trust modelling for the future fully-connected digital world: a comprehensive study (2021). arXiv: https:\/\/arxiv.org\/abs\/2106.07528","DOI":"10.1109\/ACCESS.2021.3100767"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1057\/ejis.2015.17","volume":"25","author":"M S\u00f6llner","year":"2016","unstructured":"S\u00f6llner, M., Hoffmann, A., Leimeister, J.: Why different trust relationships matter for information systems users. Eur. J. Inf. Syst. 25, 274\u2013287 (2016)","journal-title":"Eur. J. Inf. Syst."},{"issue":"47","key":"9_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2501654.2501661","volume":"45","author":"W Sherchan","year":"2013","unstructured":"Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. 45(47), 1\u201347 (2013)","journal-title":"ACM Comput. Surv."},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1109\/COMST.2014.2321628","volume":"16","author":"M Fire","year":"2013","unstructured":"Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16, 2019\u20132036 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9_CR5","first-page":"1","volume":"53","author":"J Wang","year":"2020","unstructured":"Wang, J., Jing, X., Yan, Z., Fu, Y., Pedrycz, W., Yang, L.: A survey on trust evaluation based on machine learning. ACM Comput. Surv. (CSUR) 53, 1\u201336 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"144292","DOI":"10.1109\/ACCESS.2020.3009445","volume":"8","author":"S Ghafari","year":"2020","unstructured":"Ghafari, S., Beheshti, A., Joshi, A., Paris, C., Mahmood, A., Yakhchi, S., Orgun, M.: A survey on trust prediction in online social networks. IEEE Access 8, 144292\u2013144309 (2020)","journal-title":"IEEE Access"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Kamvar, S., Schlosser, M., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks, pp. 640\u2013651 (2003)","DOI":"10.1145\/775152.775242"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.tics.2005.07.009","volume":"9","author":"RL Goldstone","year":"2005","unstructured":"Goldstone, R.L., Janssen, M.: Computational models of collective behavior. Trends Cogn. Sci. 9, 424\u2013430 (2005)","journal-title":"Trends Cogn. Sci."},{"issue":"2","key":"9_CR9","doi-asserted-by":"publisher","first-page":"279","DOI":"10.3233\/JHS-230189","volume":"30","author":"S Higashi","year":"2024","unstructured":"Higashi, S., Phudit, A., Qafzezi, E., Ikeda, M., Matsuo, K., Barolli, L.: A comparison study of two implemented fuzzy-based models for decision of logical trust. J. High Speed Netw. 30(2), 279\u2013295 (2024)","journal-title":"J. High Speed Netw."},{"issue":"3","key":"9_CR10","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/5.364485","volume":"83","author":"J Mendel","year":"1995","unstructured":"Mendel, J.: Fuzzy logic systems for engineering: a tutorial. Proc. IEEE 83(3), 345\u2013377 (1995)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Intelligent Networking and Collaborative Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72322-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T18:03:03Z","timestamp":1726336983000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72322-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031723216","9783031723223"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72322-3_9","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"15 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INCoS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Networking and Collaborative Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Soonchunhyang (SCH) University, Asan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incos2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/incos\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}