{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:01:58Z","timestamp":1742954518940,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642378034"},{"type":"electronic","value":"9783642378041"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37804-1_20","type":"book-chapter","created":{"date-parts":[[2013,4,11]],"date-time":"2013-04-11T01:00:40Z","timestamp":1365642040000},"page":"191-202","source":"Crossref","is-referenced-by-count":1,"title":["TrustVis: A Trust Visualisation Service for Online Communities"],"prefix":"10.1007","author":[{"given":"Sanat Kumar","family":"Bista","sequence":"first","affiliation":[]},{"given":"Payam Aghaei","family":"Pour","sequence":"additional","affiliation":[]},{"given":"Nathalie","family":"Colineau","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Cecile","family":"Paris","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7105.001.0001","volume-title":"The Virtual Community: Homesteading on the Electronic Frontier (Revised Edition)","author":"H. Rheingold","year":"2000","unstructured":"Rheingold, H.: The Virtual Community: Homesteading on the Electronic Frontier (Revised Edition). MIT Press, USA (2000)"},{"issue":"4","key":"20_CR2","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1111\/j.1083-6101.2007.00367.x","volume":"12","author":"N.B. Ellison","year":"2007","unstructured":"Ellison, N.B., Steinfield, C., Lampe, C.: The Benefits of Facebook \u201cFriends:\u201d Social Capital and College Students\u2019 Use of Online Social Network Sites. Journal of Computer-Mediated Communication\u00a012(4), 1143\u20131168 (2007), doi:10.1111\/j.1083-6101.2007.00367.x","journal-title":"Journal of Computer-Mediated Communication"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Colineau, N., Paris, C., Dennett, A.: Exploring the Use of an Online Community in Welfare Transition Programs. In: 25th BCS Conference on Human-Computer Interaction, Newcastle-upon-Tyne, United Kingdom, pp. 455\u2013460. British Computer Society (2011)","DOI":"10.14236\/ewic\/HCI2011.76"},{"key":"20_CR4","first-page":"59","volume":"2","author":"N. Colineau","year":"2011","unstructured":"Colineau, N., Paris, C., Dennett, A.: Capitalising on the Potential of Online Communities to Help Welfare Recipients. International Reports on Socio-Informatics (IRSI)\u00a02, 59\u201365 (2011)","journal-title":"International Reports on Socio-Informatics (IRSI)"},{"key":"20_CR5","unstructured":"Dekker, A.: Visualisation of social networks using CAVALIER. In: Proceedings of the 2001 Asia-Pacific Symposium on Information Visualisation, Sydney, Australia, vol.\u00a09, pp. 49\u201355. Australian Computer Society, Inc. (2001)"},{"key":"20_CR6","unstructured":"Freeman, L.C.: Visualizing Social Networks. Journal of Social Structure\u00a01(1) (2000)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Heer, J., Boyd, D.: Vizster: visualizing online social networks. In: IEEE Symposium on Information Visualization, INFOVIS 2005, USA, October 23-25, pp. 32\u201339 (2005), doi:10.1109\/infvis.2005.1532126","DOI":"10.1109\/INFVIS.2005.1532126"},{"issue":"1","key":"20_CR8","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.compedu.2011.08.026","volume":"58","author":"S. Jyothi","year":"2012","unstructured":"Jyothi, S., McAvinia, C., Keating, J.: A visualisation tool to aid exploration of students\u2019 interactions in asynchronous online communication. Computers & Education\u00a058(1), 30\u201342 (2012), doi:10.1016\/j.compedu.2011.08.026","journal-title":"Computers & Education"},{"key":"20_CR9","unstructured":"Girardin, L.: An eye on network intruder-administrator shootouts. In: Proceedings of the 1st Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, vol.\u00a01. USENIX Association (1999)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Ball, R., Fink, G.A., North, C.: Home-centric visualization of network traffic for security administration. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington DC, USA, pp. 55\u201364. ACM (2004), doi:10.1145\/1029208.1029217","DOI":"10.1145\/1029208.1029217"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Erbacher, R.F.: Intrusion behavior detection through visualization. In: IEEE Systems, Man and Cybernetics Conference, Cristal City, Virginia, USA, October 5-8, pp. 2507\u20132513. IEEE (2003), doi:10.1109\/icsmc.2003.1244260","DOI":"10.1109\/ICSMC.2003.1244260"},{"key":"20_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511996368","volume-title":"Exploratory Social Network Analysis with Pajek","author":"W. Nooy de","year":"2011","unstructured":"de Nooy, W., Mrvar, A., Batagelj, V.: Exploratory Social Network Analysis with Pajek. Cambridge University Press, USA (2011)"},{"key":"20_CR13","volume-title":"Ucinet for Windows: Software for Social Network Analysis","author":"S.P. Borgatti","year":"2002","unstructured":"Borgatti, S.P.: Ucinet for Windows: Software for Social Network Analysis. Analytic Technologies, Harvard (2002)"},{"key":"20_CR14","volume-title":"Structure and Evolution of Weighted Networks","author":"T. Opsahl","year":"2009","unstructured":"Opsahl, T.: Structure and Evolution of Weighted Networks. University of London (Queen Mary College), London (2009)"},{"issue":"4","key":"20_CR15","doi-asserted-by":"publisher","first-page":"6441","DOI":"10.1016\/j.sbspro.2010.04.054","volume":"2","author":"T. Iba","year":"2010","unstructured":"Iba, T., Nemoto, K., Peters, B., Gloor, P.A.: Analyzing the Creative Editing Behavior of Wikipedia Editors: Through Dynamic Social Network Analysis. Procedings of Social and Behavioral Sciences\u00a02(4), 6441\u20136456 (2010), doi:10.1016\/j.sbspro.2010.04.054","journal-title":"Procedings of Social and Behavioral Sciences"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-28509-7_23","volume-title":"Advances in User Modeling","author":"S. Nepal","year":"2012","unstructured":"Nepal, S., Sherchan, W., Paris, C.: Building Trust Communities Using Social Trust. In: Ardissono, L., Kuflik, T. (eds.) UMAP 2011 Workshops. LNCS, vol.\u00a07138, pp. 243\u2013255. Springer, Heidelberg (2012)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Nepal, S., Paris, C., Bista, S.K., Sherchan, W.: A Trust Model Based Analysis of Social Networks. International Journal of Trust Management in Computing and Communications (2012) (forthcoming)","DOI":"10.1504\/IJTMCC.2013.052522"},{"issue":"6","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1109\/TVCG.2007.70582","volume":"13","author":"N. Henry","year":"2007","unstructured":"Henry, N., Fekete, J.D., McGuffin, M.J.: NodeTrix: a Hybrid Visualization of Social Networks. IEEE Transactions on Visualization and Computer Graphics\u00a013(6), 1302\u20131309 (2007), doi:10.1109\/tvcg.2007.70582","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"issue":"5","key":"20_CR19","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TVCG.2006.160","volume":"12","author":"N. Henry","year":"2006","unstructured":"Henry, N., Fekete, J.D.: MatrixExplorer: a Dual-Representation System to Explore Social Networks. IEEE Transactions on Visualization and Computer Graphics\u00a012(5), 677\u2013684 (2006), doi:10.1109\/tvcg.2006.160","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"20_CR20","volume-title":"Social Network Analysis: A Handbook","author":"J. Scott","year":"1987","unstructured":"Scott, J.: Social Network Analysis: A Handbook. Sage Publications, London (1987)"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Xiong, R., Donath, J.: PeopleGarden: creating data portraits for users. In: Proceedings of the 12th Annual ACM Symposium on User Interface Software and Technology, Asheville, North Carolina, USA, pp. 37\u201344. ACM (1999), doi:10.1145\/320719.322581","DOI":"10.1145\/320719.322581"},{"key":"20_CR22","unstructured":"Vi\u00e9gas, F.B., Donath, J.: Social network visualization: can we go beyond the graph. In: Workshop on Social Networks for Design and Analysis: Using Network Information, Chicago, USA (2004)"},{"key":"20_CR23","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-1-84800-356-9\\_9","volume-title":"Human\u2013Computer Interaction Series","author":"J. O\u2019Donovan","year":"2009","unstructured":"O\u2019Donovan, J.: Capturing Trust in Social Web Applications Computing with Social Trust. In: Golbeck, J. (ed.) Human\u2013Computer Interaction Series, pp. 213\u2013257. Springer, London (2009), doi:10.1007\/978-1-84800-356-9_9"},{"key":"20_CR24","unstructured":"O\u2019Donovan, J., Smyth, B., Evrim, V., McLeod, D.: Extracting and visualizing trust relationships from online auction feedback comments. In: Proceedings of the 20th International Joint Conference on Artifical Intelligence, Hyderabad, India, pp. 2826\u20132831. Morgan Kaufmann Publishers Inc. (2007)"},{"key":"20_CR25","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/viz.2009.48","volume-title":"Proceedings of the Second International Conference in Visualisation","author":"A. Guerriero","year":"2009","unstructured":"Guerriero, A., Kubicki, S., Halin, G.: Trust-Oriented Multi-visualization of Cooperation Context. In: Proceedings of the Second International Conference in Visualisation, pp. 96\u2013101. IEEE Computer Society, Washington, DC (2009), doi:10.1109\/viz.2009.48"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Bimrah, K.K., Mouratidis, H., Preston, D.: Modelling Trust Requirements by Means of a Visualization Language. In: Proceedings of the 2008 Requirements Engineering Visualization, Barcelona, Spain, pp. 26\u201330. IEEE Computer Society (2008), doi:10.1109\/rev.2008.3","DOI":"10.1109\/REV.2008.3"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing - ICSOC 2012 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37804-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T06:51:21Z","timestamp":1595659881000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37804-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642378034","9783642378041"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37804-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}