{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:35:43Z","timestamp":1771702543745,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1007\/s11390-015-1564-8","type":"journal-article","created":{"date-parts":[[2015,7,8]],"date-time":"2015-07-08T08:51:22Z","timestamp":1436345482000},"page":"843-858","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Research on Trust Prediction from a Sociological Perspective"],"prefix":"10.1007","volume":"30","author":[{"given":"Ying","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wan-Li","family":"Zuo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,8]]},"reference":[{"key":"1564_CR1","doi-asserted-by":"crossref","unstructured":"Guo G, Zhang J, Yorke-Smith N. Leveraging multiviews of trust and similarity to enhance clustering-based recommender system. Knowledge-Based System, 2015, 74: 14\u201327.","DOI":"10.1016\/j.knosys.2014.10.016"},{"key":"1564_CR2","doi-asserted-by":"crossref","unstructured":"Zhao T, Li C, Li M, Ding Q, Li L. Social recommendation incorporating topic mining and social trust analysis. In Proc. the 22nd ACM CIKM, Oct. 27\u2013Nov. 1, 2013, pp. 1643\u20131648.","DOI":"10.1145\/2505515.2505592"},{"key":"1564_CR3","doi-asserted-by":"crossref","unstructured":"Lu Y, Tsaparas P, Ntoulas A, Polanyi L. Exploiting social context for review quality prediction. In Proc. the 19th ACM WWW, Apr. 2010, pp. 691\u2013700.","DOI":"10.1145\/1772690.1772761"},{"key":"1564_CR4","doi-asserted-by":"crossref","unstructured":"Oh H J, Yoon Y C, Kim H K. Finding more trustworthy answers: Various trustworthiness factors in question answering. Journal of Information Science, 2013, 39(4): 509\u2013522.","DOI":"10.1177\/0165551513478893"},{"key":"1564_CR5","doi-asserted-by":"crossref","unstructured":"Richardson M, Domingos P. Mining knowledge-sharing sites for viral marketing. In Proc. the 8th ACM SIGKDD, Jul. 2002, pp. 61\u201370.","DOI":"10.1145\/775047.775057"},{"key":"1564_CR6","doi-asserted-by":"crossref","unstructured":"Liu G, Wang Y. Trust-oriented service provider selection in complex online social networks. In Advanced Web Services, Bouguettaya A, Sheng Q Z, Daniel F (eds.), Springer New York, 2014, pp. 363\u2013380.","DOI":"10.1007\/978-1-4614-7535-4_15"},{"key":"1564_CR7","doi-asserted-by":"crossref","unstructured":"Sherchan W, Nepal S, Paris C. A survey of trust in social networks. ACM Computing Surveys (CSUR), 2013, 45(4): Article No. 47.","DOI":"10.1145\/2501654.2501661"},{"key":"1564_CR8","doi-asserted-by":"crossref","unstructured":"Xu T, Gao J, Xiao L, Regan A. Online classification using a voted RDA method. In Proc. the 28th AAAI, Jul. 2014, pp. 2170\u20132176.","DOI":"10.1609\/aaai.v28i1.8957"},{"key":"1564_CR9","doi-asserted-by":"crossref","unstructured":"Tang J, Gao H, Hu X, Liu H. Exploiting homophily effect for trust prediction. In Proc. the 6th ACM WSDM, Feb. 2013, pp. 53\u201362.","DOI":"10.1145\/2433396.2433405"},{"key":"1564_CR10","doi-asserted-by":"crossref","unstructured":"Yang S H, Smola A J, Long B, Zha H, Chang Y. Friend or frenemy? Predicting signed ties in social networks. In Proc. the 35th ACM SIGIR, Aug. 2012, pp. 555\u2013564.","DOI":"10.1145\/2348283.2348359"},{"key":"1564_CR11","doi-asserted-by":"crossref","unstructured":"Tang W, Zhuang H, Tang J. Learning to infer social ties in large networks. In Proc. ECML PKDD, Sept. 2011, pp. 381\u2013397.","DOI":"10.1007\/978-3-642-23808-6_25"},{"key":"1564_CR12","doi-asserted-by":"crossref","unstructured":"Tang J, Lou T, Kleinberg J. Inferring social ties across heterogenous networks. In Proc. the 5th ACM WSDM, Feb. 2012, pp. 743\u2013752.","DOI":"10.1145\/2124295.2124382"},{"key":"1564_CR13","doi-asserted-by":"crossref","unstructured":"Leskovec J, Huttenlocher D, Kleinberg J. Signed networks in social media. In Proc. ACM CHI, Apr. 2010, pp. 1361\u20131370.","DOI":"10.1145\/1753326.1753532"},{"key":"1564_CR14","doi-asserted-by":"crossref","unstructured":"McPherson M, Smith-Lovin L, Cook J M. Birds of a feather: Homophily in social networks. Annual Review of Sociology, 2001, 27: 415\u2013444.","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"1564_CR15","doi-asserted-by":"crossref","unstructured":"Ma H, Zhou D, Liu C, Lyu M, King I. Recommender systems with social regularization. In Proc. the 4th ACM WSDM, Feb. 2011, pp. 287\u2013296.","DOI":"10.1145\/1935826.1935877"},{"key":"1564_CR16","unstructured":"Giddens A, Duneier M, Appelbaum R P, Carr D. Introduction to Sociology (8th edition). W.W. Norton & Company, 2012."},{"key":"1564_CR17","doi-asserted-by":"crossref","unstructured":"Leskovec J. How status and reputation shape human evaluations: Consequences for recommender systems. In Proc. the 22nd ACM WWW, May 2013, pp. 937\u2013938.","DOI":"10.1145\/2487788.2488085"},{"key":"1564_CR18","doi-asserted-by":"crossref","unstructured":"Lee D D, Seung H S. Learning the parts of objects by non-negative matrix factorization. Nature, 1999, 401(6755): 788\u2013791.","DOI":"10.1038\/44565"},{"key":"1564_CR19","unstructured":"Lee D D, Seung H S. Algorithms for nonnegative matrix factorization. In Proc. the NIPS, Nov. 27-Dec. 2, 2000, pp. 556\u2013562."},{"key":"1564_CR20","doi-asserted-by":"crossref","unstructured":"Ding C, Li T, Peng W, Park H. Orthogonal nonnegative matrix t-factorizations for clustering. In Proc. ACM KDD, Aug. 2006, pp. 126\u2013135.","DOI":"10.1145\/1150402.1150420"},{"key":"1564_CR21","unstructured":"Huang J, Nie F, Huang H, Lei Y, Ding C. Social trust prediction using rank-k matrix recovery. In Proc. the 23rd AAAI, Aug. 2013, pp. 2647\u20132653."},{"key":"1564_CR22","doi-asserted-by":"crossref","unstructured":"Huang J, Nie F, Huang H, Tu Y C. Trust prediction via aggregating heterogeneous social networks. In Proc. the 21st ACM CIKM, Oct. 29\u2013Nov. 2, 2012, pp. 1774\u20131778.","DOI":"10.1145\/2396761.2398515"},{"key":"1564_CR23","unstructured":"Salakhutdinov R, Mnih A. Probabilistic matrix factorization. In Proc. the 21st NIPS, Dec. 2007, pp. 1257\u20131264."},{"key":"1564_CR24","doi-asserted-by":"crossref","unstructured":"Oyama S, Hayashi K, Kashima H. Cross-temporal link prediction. In Proc. the 11th IEEE ICDM, Dec. 2011, pp. 1188\u20131193.","DOI":"10.1109\/ICDM.2011.45"},{"key":"1564_CR25","doi-asserted-by":"crossref","unstructured":"Ye J J. Constraint qualifications and KKT conditions for bilevel programming problems. Mathematics of Operations Research, 2006, 31(4): 811\u2013824.","DOI":"10.1287\/moor.1060.0219"},{"key":"1564_CR26","doi-asserted-by":"crossref","unstructured":"Ding C, Li T, Jordan M I. Nonnegative matrix factorization for combinatorial optimization: Spectral clustering, graph matching, and clique finding. In Proc. the 8th IEEE ICDM, Dec. 2008, pp. 183\u2013192.","DOI":"10.1109\/ICDM.2008.130"},{"key":"1564_CR27","doi-asserted-by":"crossref","unstructured":"Liben-Nowell D, Kleinberg J. The link-prediction problem for social networks. Journal of the American Society for Information Science and Technology, 2007, 58(7): 1019\u20131031.","DOI":"10.1002\/asi.20591"},{"key":"1564_CR28","doi-asserted-by":"crossref","unstructured":"Guha R, Kumar R, Raghavan P, Tomkins A. Propagation of trust and distrust. In Proc. the 13th ACM WWW, May 2004, pp. 403\u2013412.","DOI":"10.1145\/988672.988727"},{"key":"1564_CR29","doi-asserted-by":"crossref","unstructured":"Khiabani H, Idris N B, Manan J l. A unified trust model for pervasive environments-simulation and analysis. KSII Transactions on Internet and Information Systems, 2013, 7(7): 1569\u20131584.","DOI":"10.3837\/tiis.2013.07.003"},{"key":"1564_CR30","doi-asserted-by":"crossref","unstructured":"Lee M K, Turban E. A trust model for consumer Internet shopping. International Journal of Electronic Commerce, 2001, 6: 75\u201392.","DOI":"10.1080\/10864415.2001.11044227"},{"key":"1564_CR31","doi-asserted-by":"crossref","unstructured":"Ding S, Yang S, Zhang Y, Liang C, Xia C. Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems. Knowledge-Based Systems, 2014, 56: 216\u2013225.","DOI":"10.1016\/j.knosys.2013.11.014"},{"key":"1564_CR32","doi-asserted-by":"crossref","unstructured":"Nepal S, Paris C, Bista S, Sherchan W. A trust model-based analysis of social networks. International Journal of Trust Management in Computing and Communications, 2013, 1(1): 3\u201322.","DOI":"10.1504\/IJTMCC.2013.052522"},{"key":"1564_CR33","doi-asserted-by":"crossref","unstructured":"Caverlee J, Liu L, Webb S. The social trust framework for trusted social information management: Architecture and algorithms. Information Sciences, 2010, 180(1): 95\u2013112.","DOI":"10.1016\/j.ins.2009.06.027"},{"key":"1564_CR34","doi-asserted-by":"crossref","unstructured":"Kahanda I, Neville J. Using transactional information to predict link strength in online social networks. In Proc. the 3rd ICWSM, May 2009, pp. 74\u201381.","DOI":"10.1609\/icwsm.v3i1.13957"},{"key":"1564_CR35","doi-asserted-by":"crossref","unstructured":"Zolfaghar K, Aghaie A. Evolution of trust networks in social web applications using supervised learning. Procedia Computer Science, 2011, 3: 833\u2013839.","DOI":"10.1016\/j.procs.2010.12.137"},{"key":"1564_CR36","doi-asserted-by":"crossref","unstructured":"Liu H, Lim E, Lauw H, Le M, Sun A, Srivastava J, Kim Y. Predicting trusts among users of online communities: An Epinions case study. In Proc. the 9th ACM Conference on Electronic Commerce, July 2008, pp. 310\u2013319.","DOI":"10.1145\/1386790.1386838"},{"key":"1564_CR37","doi-asserted-by":"crossref","unstructured":"Nielsen M, Krukow K, Sassone V. A Bayesian model for event-based trust. Electronic Notes in Theoretical Computer Science, 2007, 172: 499\u2013521.","DOI":"10.1016\/j.entcs.2007.02.017"},{"key":"1564_CR38","doi-asserted-by":"crossref","unstructured":"Wang Y, Vassileva J. Trust and reputation model in peer-to-peer networks. In Proc. the 3rd Int. Conf. Peer-to-Peer Computing, Sept. 2003, pp. 150\u2013157.","DOI":"10.1109\/PTP.2003.1231515"},{"key":"1564_CR39","doi-asserted-by":"crossref","unstructured":"Wang D, Pedreschi D, Song C, Giannotti F, Barabasi A L. Human mobility, social ties, and link prediction. In Proc. the 17th ACM KDD, Aug. 2011, pp. 1100\u20131108.","DOI":"10.1145\/2020408.2020581"},{"key":"1564_CR40","doi-asserted-by":"crossref","unstructured":"Agarwal M, Zhou B. Using trust model for detecting malicious activities in Twitter. In Proc. the 7th Int. Conf. Social Computing, Behavioral-Cultural Modeling and Prediction, Apr. 2014, pp. 207\u2013214.","DOI":"10.1007\/978-3-319-05579-4_25"},{"key":"1564_CR41","doi-asserted-by":"crossref","unstructured":"Jang M H, Faloutsos C, Kim S W. Trust prediction using positive, implicit, and negative information. In Proc. the 23rd ACM WWW Companion, Apr. 2014, pp. 303\u2013304.","DOI":"10.1145\/2567948.2577288"},{"key":"1564_CR42","doi-asserted-by":"crossref","unstructured":"Au Yeung C, Iwata T. Strength of social influence in trust networks in product review sites. In Proc. the 4th ACM WSDM, Feb. 2011, pp. 495\u2013504.","DOI":"10.1145\/1935826.1935899"},{"key":"1564_CR43","doi-asserted-by":"crossref","unstructured":"Mishra A, Bhattacharya A. Finding the bias and prestige of nodes in networks based on trust scores. In Proc. the 20th ACM WWW, Mar. 28\u2013Apr. 1, 2011, pp. 567\u2013576.","DOI":"10.1145\/1963405.1963485"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-015-1564-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-015-1564-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-015-1564-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T03:25:12Z","timestamp":1691810712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-015-1564-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["1564"],"URL":"https:\/\/doi.org\/10.1007\/s11390-015-1564-8","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7]]}}}