{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:13:25Z","timestamp":1759940005902,"version":"3.37.3"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71672163","71402157"],"award-info":[{"award-number":["71672163","71402157"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1010904","OCI-0904356","IIS-0841583"],"award-info":[{"award-number":["CNS-1010904","OCI-0904356","IIS-0841583"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-09-02-0053"],"award-info":[{"award-number":["W911NF-09-02-0053"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Army Research Laboratory\u2019s Network Science Collaborative Technology Alliance"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tcss.2018.2862897","type":"journal-article","created":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T23:08:54Z","timestamp":1535411334000},"page":"807-815","source":"Crossref","is-referenced-by-count":6,"title":["Analyzing the Flow of Trust in the Virtual World With Semantic Web Technologies"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6819-0686","authenticated-orcid":false,"given":"Qingpeng","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6039-1806","authenticated-orcid":false,"given":"Dominic","family":"DiFranzo","sequence":"additional","affiliation":[]},{"given":"Marie Joan Kristine","family":"Gloria","sequence":"additional","affiliation":[]},{"given":"Bassem","family":"Makni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3056-1960","authenticated-orcid":false,"given":"James A.","family":"Hendler","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2738238"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1002\/9781118548387","volume":"398","author":"hosmer","year":"2013","journal-title":"Applied Logistic Regression"},{"key":"ref33","first-page":"2004","article-title":"Owl Web ontology language overview","volume":"10","author":"mcguinness","year":"2004","journal-title":"W3C Recommendation"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.62"},{"journal-title":"A Semantic Web Primer","year":"2004","author":"antoniou","key":"ref31"},{"key":"ref30","first-page":"238","article-title":"Trust networks on the semantic Web","author":"golbeck","year":"2003","journal-title":"Proc Int Workshop Cooper Inf Agents"},{"key":"ref37","first-page":"66","article-title":"Different aspects of social network analysis","author":"jamali","year":"2006","journal-title":"Proc IEEE\/WIC\/ACM Int Conf Web Intell (WI)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1086\/227352"},{"key":"ref35","first-page":"1","article-title":"A state of the art on social network analysis and its applications on a semantic Web","author":"er\u00e9t\u00e9o","year":"2008","journal-title":"Proceedings of SDoW"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/11926078_3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2005.1460347"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2771078"},{"journal-title":"Computing with Social Trust","year":"2008","author":"golbeck","key":"ref11"},{"key":"ref12","first-page":"1138","article-title":"Linking social networks on the Web with FOAF: A semantic Web case study","volume":"8","author":"golbeck","year":"2008","journal-title":"Proc AAAI"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1879","DOI":"10.1007\/978-1-4614-6170-8_104","article-title":"Social networking on the world wide Web","author":"zhang","year":"2014","journal-title":"Encyclopedia of Social Network Analysis and Mining"},{"key":"ref14","first-page":"339","article-title":"Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace","author":"dwyer","year":"2007","journal-title":"Proc AMCIS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0041-5"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195160369.001.0001","author":"monge","year":"2003","journal-title":"Theories of Communication Networks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4135\/9781412986243.n12"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1142\/S0219525912500646"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-psych-113011-143828"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2010.06.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.41"},{"article-title":"Computational trust in multiplayer online games","year":"2012","author":"ahmad","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/19312458.2011.568373"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1640","DOI":"10.1126\/science.1163357","article-title":"Weaving a Web of trust","volume":"321","author":"golbeck","year":"2008","journal-title":"Science"},{"key":"ref8","first-page":"122","article-title":"The formation of task-oriented groups: Exploring combat activities in online games","volume":"4","author":"huang","year":"2009","journal-title":"Proc Int Conf Comput Sci Eng (CSE)"},{"key":"ref7","first-page":"341","article-title":"Network exchange in trust networks","author":"ahmad","year":"2010","journal-title":"Proc Int Conf on Soc Comput (SocialCom) IEEE"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1126\/science.1167742","article-title":"Life in the network: The coming age of computational social science","volume":"323","author":"lazer","year":"2009","journal-title":"Science"},{"key":"ref9","first-page":"10","article-title":"Trust amongst rogues? A hypergraph approach for comparing clandestine trust networks in MMOGs","author":"ahmad","year":"2011","journal-title":"Proc ICWSM"},{"journal-title":"Life on the Screen","year":"2011","author":"turkle","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2010.01534.x"},{"journal-title":"Structural Holes The Social Structure of Competition","year":"2009","author":"burt","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0191-3085(00)22009-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2010.138"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2732685"},{"key":"ref23","first-page":"1","article-title":"PsyOps: Personality assessment through gaming behavior","author":"tekofsky","year":"2013","journal-title":"Proc Int Conf Found Digit Games"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"13636","DOI":"10.1073\/pnas.1004008107","article-title":"Multirelational organization of large-scale social networks in an online world","volume":"107","author":"szell","year":"2010","journal-title":"Proc Nat Acad Sci USA"},{"key":"ref25","first-page":"27","article-title":"Exploration of robust features of trust across multiple social networks","author":"borbora","year":"2011","journal-title":"Proc 5th IEEE Conf Self-Adapt Self-Org Syst Workshops (SASOW)"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/6570650\/8464016\/8447545-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/8464016\/08447545.pdf?arnumber=8447545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:54:20Z","timestamp":1649444060000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8447545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":41,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2018.2862897","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"type":"electronic","value":"2329-924X"},{"type":"electronic","value":"2373-7476"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}