{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:51Z","timestamp":1750306971642,"version":"3.41.0"},"reference-count":28,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T00:00:00Z","timestamp":1375315200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2013,8]]},"abstract":"<jats:p>Trust has emerged as a major impediment to the success of electronic markets and communities where interaction with the strangers is the norm. Social Networks and Online Communities enable interaction with complete strangers, and open up new commercial, political, and social possibilities. But those promises are rarely achieved because it is difficult to trust the online contacts. A common approach to remedy this problem is to compute trust values for the new contacts from the existing trust values in the network. There are two main methods: aggregation and transitivity. Yet, neither method provides satisfactory results because trust networks are sparse and transitivity may not hold. This article develops a Bayesian formulation of the problem, where trust is defined as a conditional probability, and a Bayesian Network analysis is employed to compute the unknown trust values in terms of the known trust values. The algorithms used to propagate conditional probabilities through the network are theoretically sound and based on a long-standing literature on probability propagation in Bayesian networks. Moreover, the context information that is typically ignored in trust literature is included here as a major factor in computing new trust values. These changes have led to significant improvements over existing approaches in the accuracy of computed trust, and with some modifications to the algorithm, in its reach. Real data acquired from Advogato network is used to do extensive testing, and the results confirm the practical value of a theoretically sound Bayesian approach.<\/jats:p>","DOI":"10.1145\/2489790","type":"journal-article","created":{"date-parts":[[2014,4,23]],"date-time":"2014-04-23T13:52:04Z","timestamp":1398261124000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Bayesian Inference in Trust Networks"],"prefix":"10.1145","volume":"4","author":[{"given":"Levent V.","family":"Orman","sequence":"first","affiliation":[{"name":"Cornell University"}]}],"member":"320","published-online":{"date-parts":[[2013,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0274"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367525"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.4.432.14428"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.10.1407.17308"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Easley D. and Kleinberg J. 2010. Networks Crowds and Markets. Cambridge Press.  Easley D. and Kleinberg J. 2010. Networks Crowds and Markets . Cambridge Press.","DOI":"10.1017\/CBO9780511761942"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Golbeck J. 2010. Trust and nuanced profile reliance in online social networks. ACM Trans. World Wide Web.  Golbeck J. 2010. Trust and nuanced profile reliance in online social networks. ACM Trans. World Wide Web .","DOI":"10.1145\/1594173.1594174"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183463.1183470"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151454.1151499"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963775"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754397"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1651274.1651284"},{"volume-title":"Trustlet: Open research on trust metrics. Int. J. Parall. Distrib. Comput. 341--351.","year":"2008","author":"Massa P.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1100.1279"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040830.1040870"},{"volume-title":"Proceedings of WITS Conference on Information Technology and Systems.","year":"2010","author":"Orman L.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","first-page":"3","article-title":"Virtual money in electronic markets and communities","volume":"4","author":"Orman L.","year":"2010","journal-title":"ICAST J."},{"key":"e_1_2_1_21_1","unstructured":"Pearl J. 1998. Probabilistic Reasoning in Intelligent Systems. Morgan-Kaufmann.   Pearl J. 1998. Probabilistic Reasoning in Intelligent Systems . Morgan-Kaufmann."},{"volume-title":"Proceedings of AAAI Conference on Artificial Intelligence. 1206--1212","author":"Regan K.","key":"e_1_2_1_22_1"},{"volume-title":"Proceedings of Semantic Web Conference.","author":"Richardson M.","key":"e_1_2_1_23_1"},{"volume-title":"Proceedings of AAMAS Conference on Autonomous Agents and Multi-Agent Systems. 225--232","author":"Vogiatzis G.","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25840-7_3"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2361256.2361260"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"volume-title":"Computing with Social Trust","author":"Ziegler C.","key":"e_1_2_1_28_1"}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2489790","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2489790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:26Z","timestamp":1750235966000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2489790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["10.1145\/2489790"],"URL":"https:\/\/doi.org\/10.1145\/2489790","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"type":"print","value":"2158-656X"},{"type":"electronic","value":"2158-6578"}],"subject":[],"published":{"date-parts":[[2013,8]]},"assertion":[{"value":"2011-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}