{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:49:15Z","timestamp":1759963755530,"version":"3.40.4"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,10,26]],"date-time":"2013-10-26T00:00:00Z","timestamp":1382745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1007\/s13278-013-0136-6","type":"journal-article","created":{"date-parts":[[2013,10,25]],"date-time":"2013-10-25T18:27:32Z","timestamp":1382725652000},"page":"981-999","source":"Crossref","is-referenced-by-count":8,"title":["Robust features of trust in social networks"],"prefix":"10.1007","volume":"3","author":[{"given":"Zoheb Hassan","family":"Borbora","sequence":"first","affiliation":[]},{"given":"Muhammad Aurangzeb","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Jehwan","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Karen Zita","family":"Haigh","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,26]]},"reference":[{"key":"136_CR1","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman A, Hailes S (1997) A distributed trust model. In: Proceedings of the 1997 workshop on New security paradigms, NSPW \u201997, New York, NY, USA. ACM, pp 48\u201360","DOI":"10.1145\/283699.283739"},{"issue":"3","key":"136_CR2","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/S0378-8733(03)00009-1","volume":"25","author":"LA Adamic","year":"2003","unstructured":"Adamic LA, Adar E (2003) Friends and neighbors on the web. Soc Netw 25(3):211\u2013230","journal-title":"Soc Netw"},{"key":"136_CR3","doi-asserted-by":"crossref","unstructured":"Ahmad MA, Huffaker D, Wang J, Treem J, Kumar D, Poole MS, Srivastava J (2010a) The many faces of mentoring in an mmorpg. In: 2010 IEEE Second International Conference on Social Computing (SocialCom), pp 270 \u2013275","DOI":"10.1109\/SocialCom.2010.45"},{"key":"136_CR4","doi-asserted-by":"crossref","unstructured":"Ahmad M, Borbora ZH, Srivastava J, Contractor N (2010b) Link prediction across multiple social networks. In: ICDM Workshops, pp 911\u2013918","DOI":"10.1109\/ICDMW.2010.79"},{"key":"136_CR5","doi-asserted-by":"crossref","unstructured":"Ahmad M, Huffaker DA, Wang J, William Treem J, Scott Poole M, Srivastava J (2010c) Gtpa: a generative model for online mentor-apprentice networks. In: AAAI","DOI":"10.1609\/aaai.v24i1.7506"},{"key":"136_CR6","doi-asserted-by":"crossref","unstructured":"Ahmad MA, Ahmad I, Srivastava J, Poole M (2011) Trust me, i am an expert: trust, homophily and expertise in mmos. In: IEEE international conference on social computing","DOI":"10.1109\/PASSAT\/SocialCom.2011.207"},{"key":"136_CR7","doi-asserted-by":"crossref","unstructured":"Ahmad MA, Borbora ZH, Shen C, Srivastava J, Williams D (2011) Guilds play in mmos: rethinking common group dynamics models. In: 3rd International conference on social informatics","DOI":"10.1007\/978-3-642-24704-0_19"},{"key":"136_CR8","doi-asserted-by":"crossref","unstructured":"Artz D, Gil Y (2007) A survey of trust in computer science and the semantic web. Web Semantics: science, services and agents on the world wide web. Softw Eng Semantic Web 5(2):58\u201371","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"136_CR9","doi-asserted-by":"crossref","unstructured":"Borbora ZH, Ahmad MA, Haigh KZ, Srivastava J, Wen Z (2011) Exploration of robust features of trust across multiple social networks. In: Workshop on trustworthy self-organizing systems, 2nd edn.","DOI":"10.1109\/SASOW.2011.12"},{"key":"136_CR10","doi-asserted-by":"crossref","unstructured":"Castelfranchi C, Falcone R (1998) Principles of trust for mas: cognitive anatomy, social importance, and quantification, pp 72\u201379","DOI":"10.1109\/ICMAS.1998.699034"},{"key":"136_CR11","doi-asserted-by":"crossref","unstructured":"Castronova E, Williams D, Shen C, Ratan R, Xiong L, Huang Y, Keegan B (2009) As real as real? macroeconomic behavior in a large-scale virtual world. 11(5):685\u2013707","DOI":"10.1177\/1461444809105346"},{"key":"136_CR12","doi-asserted-by":"crossref","unstructured":"Davis D, Lichtenwalter R, Chawla N (2013) Supervised methods for multi-relational link prediction. Soc Netw Anal Min, pp 1\u201315. doi: 10.1007\/s13278-012-0068-6","DOI":"10.1007\/s13278-012-0068-6"},{"key":"136_CR13","doi-asserted-by":"crossref","unstructured":"Douceur JR, Donath JS (2002) The sybil attack, pp 251\u2013260","DOI":"10.1007\/3-540-45748-8_24"},{"key":"136_CR14","doi-asserted-by":"crossref","unstructured":"Freeman L (1977) A set of measures of centrality based upon betweenness. Sociometry, pp 35\u201341","DOI":"10.2307\/3033543"},{"key":"136_CR15","unstructured":"Gambetta D (1988) Can we trust trust? In: Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213\u2013237"},{"key":"136_CR16","doi-asserted-by":"crossref","unstructured":"Golbeck J (2008) Computing with social trust, 1st edn. Springer, Berlin","DOI":"10.1007\/978-1-84800-356-9_1"},{"key":"136_CR17","unstructured":"Golbeck J (2005) Computing and applying trust in web-based social networks.\u00a0University of Maryland, College Park"},{"key":"136_CR18","unstructured":"Gray E, Seigneur J-M, Chen Y, Jensen C (2003) Trust propagation in small worlds, Trust management. In: Nixon P, Terzis S (eds) Lecture notes in computer science, vol 2692. Springer, Berlin, p 1072"},{"issue":"1","key":"136_CR19","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The weka data mining software: an update. SIGKDD Explor 11(1):10\u201318","journal-title":"SIGKDD Explor"},{"key":"136_CR20","unstructured":"Hall MA (2000) Correlation-based feature selection for discrete and numeric class machine learning. In: Proceedings of 17th international conference on machine learning, pp 359\u2013366"},{"key":"136_CR21","unstructured":"Al Hasan M, Chaoji V, Salem S, Zaki M (2006) Link prediction using supervised learning. In: Workshop on Link Analysis, Counter-terrorism and Security, SIAM"},{"key":"136_CR22","doi-asserted-by":"crossref","unstructured":"Huffaker D, (Annie) Wang J, Treem J, Ahmad MA, Fullerton L, Williams D, Poole MS, Contractor N (2009) The social behaviors of experts in massive multiplayer online role-playing games. In: IEEE international conference on computational science and engineering, vol 4, pp 326\u2013331","DOI":"10.1109\/CSE.2009.13"},{"key":"136_CR23","first-page":"241","volume":"37","author":"P Jaccard","year":"1901","unstructured":"Jaccard P (1901) Distribution de la flore alpine dans le bassin des dranses et dans quelques r\u00e9gions voisines. Bulletin de la Soci\u00e9t\u00e9 Vaudoise des Sciences Naturelles 37:241\u2013272","journal-title":"Bulletin de la Soci\u00e9t\u00e9 Vaudoise des Sciences Naturelles"},{"key":"136_CR24","unstructured":"Levien R (2004) Attack resistant trust metrics. Technical report"},{"key":"136_CR25","unstructured":"Marsh SP (1994) Formalising trust as a computational concept. Technical report, University of Stirling. Department of Mathematics and Computer Science"},{"key":"136_CR26","unstructured":"Massa P, Avesani P (2006) Trust-aware bootstrapping of recommender systems. In: Proceedings of ECAI workshop on recommender systems, pp 29\u201333"},{"key":"136_CR27","doi-asserted-by":"crossref","unstructured":"Massa P, Avesani P (2004) Trust-aware collaborative filtering for recommender systems. In: Proceedings of Federated international conference on the move to meaningful internet: CoopIS, DOA, ODBASE, pp 492\u2013508","DOI":"10.1007\/978-3-540-30468-5_31"},{"key":"136_CR28","unstructured":"Mitchell TM. (1997) Machine learning. McGraw-Hill, New York"},{"key":"136_CR29","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195160369.001.0001","volume-title":"Theories of communication networks","author":"PR Monge","year":"2003","unstructured":"Monge PR, Contractor N (2003) Theories of communication networks. Oxford University Press, Cambridge"},{"key":"136_CR30","unstructured":"Mui L, Mohtashemi M (2002) A computational model of trust and reputation. In: Proceedings of the 35th Hawaii international conference on system science (HICSS)"},{"issue":"2","key":"136_CR31","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1073\/pnas.98.2.404","volume":"98","author":"MEJ Newman","year":"2001","unstructured":"Newman MEJ (2001) The structure of scientific collaboration networks. Proc Natl Acad Sci 98(2):404\u2013409","journal-title":"Proc Natl Acad Sci"},{"key":"136_CR32","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1111\/j.1467-9450.1974.tb00598.x","volume":"15","author":"J Nieminen","year":"1974","unstructured":"Nieminen J (1974) On the centrality in a graph. Scand J Psychol 15:332\u2013336","journal-title":"Scand J Psychol"},{"key":"136_CR33","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan J, Smyth B (2005) Trust in recommender systems. In: Proceedings of the 10th international conference on Intelligent user interfaces, IUI \u201905. ACM, New York, pp 167\u2013174","DOI":"10.1145\/1040830.1040870"},{"issue":"1-2","key":"136_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/1500000011","volume":"2","author":"B Pang","year":"2008","unstructured":"Pang B, Lee L (2008) Opinion mining and sentiment analysis. Found Trends Inf Retr 2(1\u20132):1\u2013135","journal-title":"Found Trends Inf Retr"},{"key":"136_CR35","doi-asserted-by":"crossref","first-page":"2004","DOI":"10.1017\/S0269888904000116","volume":"19","author":"SD Ramchurn","year":"2004","unstructured":"Ramchurn SD, Huynh D, Jennings NR (2004) Trust in multi-agent systems. Knowl Eng Rev 19:2004","journal-title":"Knowl Eng Rev"},{"key":"136_CR36","doi-asserted-by":"crossref","unstructured":"Sabater J, Sierra C (2001) Regret: a reputation model for gregarious societies, pp 61\u201369","DOI":"10.1145\/375735.376110"},{"key":"136_CR37","volume-title":"Introduction to modern information retrieval","author":"G Salton","year":"1983","unstructured":"Salton G, McGill MJ (1983) Introduction to modern information retrieval. McGraw-Hill, New York"},{"key":"136_CR38","unstructured":"S\u00f8rensen T (1948) A method of establishing groups of equal amplitude in plant sociology based on similarity of species content and its application to analyses of the vegetation on danish commons. Biologiske Skrifter \/ udg. af det Kgl. Danske Videnskabernes Selskab, pp 1\u201334"},{"key":"136_CR39","doi-asserted-by":"crossref","unstructured":"Wang D, Sutcliffe A, Zeng X-J (2011) A trust-based multi-ego social network model to investigate emotion diffusion. Soc Netw Anal Min 1:287\u2013299. doi: 10.1007\/s13278-011-0019-7","DOI":"10.1007\/s13278-011-0019-7"},{"key":"136_CR40","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge"},{"key":"136_CR41","doi-asserted-by":"crossref","unstructured":"Wilson T, Wiebe J, Hoffmann P (2005) Recognizing contextual polarity in phrase-level sentiment analysis. In: Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, HLT \u201905. Association for Computational Linguistics, Stroudsburg, pp 347\u2013354","DOI":"10.3115\/1220575.1220619"},{"key":"136_CR42","doi-asserted-by":"crossref","unstructured":"Witkowski M, Artikis E, Pitt J (2001) Experiments in building experiential trust in a society of objective-trust based agents. In: Trust in cyber-societies, vol LNAI 2246. Springer, Berlin, pp 111\u2013132","DOI":"10.1007\/3-540-45547-7_7"},{"key":"136_CR43","unstructured":"Wu L, Lin C, Aral S, Brynjolfsson E (2009) Value of social network\u2014a large-scale analysis on network structure impact to financial revenue of information technology consultants. In: The winter conference on business intelligence"},{"key":"136_CR44","unstructured":"Yang J, Wen Z, Adamic LA, Ackerma MS, Li C-Y (2011) Collaborating globally: culture and organizational computer-mediated communications. In: Proceedings of the international conference on information systems (ICIS), Shanghai, China"},{"key":"136_CR45","doi-asserted-by":"crossref","unstructured":"Yu B, Singh MP (2002) An evidential model of distributed reputation management. In: Proceedings of first international joint conference on autonomous agents and multiagent systems. ACM Press, New York, pp 294\u2013301","DOI":"10.1145\/544741.544809"},{"key":"136_CR46","doi-asserted-by":"crossref","unstructured":"Zhang Z, Wang K (2013) A trust model for multimedia social networks. Soc Netw Anal Min, pp 1\u201311. doi: 10.1007\/s13278-012-0078-4","DOI":"10.1007\/s13278-012-0078-4"},{"issue":"4","key":"136_CR47","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1140\/epjb\/e2009-00335-8","volume":"71","author":"T Zhou","year":"2009","unstructured":"Zhou T, L\u00fc L, Zhang Y-C (2009) Predicting missing links via local information. Eur Phys J B Condens Matter Complex Syst 71(4):623\u2013630","journal-title":"Eur Phys J B Condens Matter Complex Syst"},{"key":"136_CR48","unstructured":"Ziegler C-N, Lausen G (2004) Spreading activation models for trust propagation. In: 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE \u201904, pp 83\u201397"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-013-0136-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-013-0136-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-013-0136-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T18:23:19Z","timestamp":1746037399000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-013-0136-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,26]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["136"],"URL":"https:\/\/doi.org\/10.1007\/s13278-013-0136-6","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"type":"print","value":"1869-5450"},{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2013,10,26]]}}}