{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T14:18:43Z","timestamp":1777299523934,"version":"3.51.4"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2015,2,1]],"date-time":"2015-02-01T00:00:00Z","timestamp":1422748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/tcyb.2014.2323892","type":"journal-article","created":{"date-parts":[[2014,7,31]],"date-time":"2014-07-31T20:56:26Z","timestamp":1406840186000},"page":"205-216","source":"Crossref","is-referenced-by-count":70,"title":["Trust and Compactness in Social Network Groups"],"prefix":"10.1109","volume":"45","author":[{"given":"Pasquale","family":"De Meo","sequence":"first","affiliation":[]},{"given":"Emilio","family":"Ferrara","sequence":"additional","affiliation":[]},{"given":"Domenico","family":"Rosaci","sequence":"additional","affiliation":[]},{"given":"Giuseppe M. L.","family":"Sarne","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1080\/0883951049050904509045"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544808"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401909"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081956"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2036264.2036267"},{"key":"ref30","first-page":"40","article-title":"Building emergent social networks and group profiles by semantic user preference clustering","author":"cantador","year":"2006","journal-title":"Proc 2nd Int Workshop Semantic Netw Anal 3rd European Semantic Web Conf"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1183463.1183470"},{"key":"ref35","year":"2013","journal-title":"Advogato trust metric"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526801"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864733"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687713"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1645958"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9_2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2004.03.001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.08.006"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"31","DOI":"10.3233\/AIC-2010-0484","article-title":"Recommendation of reliable users, social networks and high-quality resources in a social internetworking system","volume":"24","author":"de meo","year":"2011","journal-title":"AI Commun"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.11.011"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.08.002"},{"key":"ref23","first-page":"519","article-title":"Dependable recommendations in social internetworking","author":"de meo","year":"2009","journal-title":"Proc WI-IAT"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X13493915"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32524-3_10"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-7177(03)00091-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0626-x"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-008-9019-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.02.050"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2012.0378"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2004-00124-y"},{"key":"ref15","first-page":"1","article-title":"Group extraction from professional social network using a new semi-supervised hierarchical clustering","author":"ahmed","year":"2013","journal-title":"Knowl Inf Syst"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40776-5_27"},{"key":"ref17","article-title":"Getting acquainted with groups and individuals: Information seeking, social uncertainty and social network sites","author":"doodson","year":"2013","journal-title":"Proc Int'l AAAI Conf Weblogs and Social Media"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38577-3_37"},{"key":"ref19","first-page":"339","article-title":"Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace","author":"dwyer","year":"2007","journal-title":"Proc AMCIS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2050879"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1140\/epjds9"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1007\/s00778-010-0209-3","article-title":"Space efficiency in group recommendation","volume":"19","author":"roy","year":"2010","journal-title":"VLDB J"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2256890"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2009.09.006"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1108\/17579881011023025"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.11.003"},{"key":"ref9","author":"brandes","year":"2013","journal-title":"Studying Social Networks A Guide to Empirical Research"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.2307\/1402748"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1386790.1386838"},{"key":"ref48","first-page":"2712","article-title":"Exploiting local and global social context for recommendation","author":"tang","year":"2013","journal-title":"Proc IJCAI"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.18"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/int.20513"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2010.499502"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.56"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2013.07.003"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/7008577\/06869022.pdf?arnumber=6869022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:04:44Z","timestamp":1642003484000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6869022\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":49,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2014.2323892","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2]]}}}