{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T19:06:53Z","timestamp":1762542413289,"version":"3.41.0"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2015,6,24]],"date-time":"2015-06-24T00:00:00Z","timestamp":1435104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2015,6,24]]},"abstract":"<jats:p>A key challenge in online communities is that of keeping a community active and alive. All online communities work hard to keep their members through various initiatives, such as personalisation and recommendation technologies. In online communities aimed at supporting behavioural change, that is, in domains such as diet, lifestyle, or the environment, the main reason for participation is not to connect with real-world friends for sharing and communicating, but to meet and gain support from like-minded people in an online environment. Introducing personalisation and recommendation features in these networks is challenging, as traditional approaches leverage the densely populated friendship relations found in typical social networks, and these are not present in these new community types. We address this challenge by looking beyond the articulated friendships of a community for evidence of relationships. In particular, we look at the interactions of members of an online community with other members and resources. In this article, we present a social behaviour model and apply it to two types of recommendation systems, a people recommender and a content recommender system. We evaluate our systems using the interaction logs of an online diet and lifestyle community in which 5,000 Australians participated in a 12-week programme. Our results show that our social behaviour-based recommendation algorithms outperform baselines, friendship-based, and link-prediction algorithms.<\/jats:p>","DOI":"10.1145\/2774974","type":"journal-article","created":{"date-parts":[[2015,6,25]],"date-time":"2015-06-25T14:36:19Z","timestamp":1435242979000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Interaction-Based Recommendations for Online Communities"],"prefix":"10.1145","volume":"15","author":[{"given":"Surya","family":"Nepal","sequence":"first","affiliation":[{"name":"CSIRO"}]},{"given":"Cecile","family":"Paris","sequence":"additional","affiliation":[{"name":"CSIRO"}]},{"given":"Payam Aghaei","family":"Pour","sequence":"additional","affiliation":[{"name":"CSIRO"}]},{"given":"Jill","family":"Freyne","sequence":"additional","affiliation":[{"name":"CSIRO"}]},{"given":"Sanat Kumar","family":"Bista","sequence":"additional","affiliation":[{"name":"CSIRO"}]}],"member":"320","published-online":{"date-parts":[[2015,6,24]]},"reference":[{"volume-title":"Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 150--152","author":"Adali S.","key":"e_1_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.1016\/S0378-8733(03)00009-1"},{"doi-asserted-by":"crossref","unstructured":"Al Hasan M. and Zaki M. J. 2011. A survey of link prediction in social networks. In Social Network Data Analytics. Springer 243--275.  Al Hasan M. and Zaki M. J. 2011. A survey of link prediction in social networks. In Social Network Data Analytics . Springer 243--275.","key":"e_1_2_1_3_1","DOI":"10.1007\/978-1-4419-8462-3_9"},{"doi-asserted-by":"publisher","key":"e_1_2_1_4_1","DOI":"10.1145\/1367497.1367525"},{"doi-asserted-by":"crossref","unstructured":"Armstrong A. and Hagel J. 2000. The real value of online communities. In Knowledge and Communities. Routledge 85--95.  Armstrong A. and Hagel J. 2000. The real value of online communities. In Knowledge and Communities . Routledge 85--95.","key":"e_1_2_1_5_1","DOI":"10.1016\/B978-0-7506-7293-1.50009-3"},{"doi-asserted-by":"publisher","key":"e_1_2_1_6_1","DOI":"10.1145\/1066677.1067036"},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1145\/245108.245124"},{"doi-asserted-by":"crossref","unstructured":"Bambini R. Cremonesi P. and Turrin R. 2011. A recommender system for an IPTV service provider: A real large-scale production environment. In Recommender Systems Handbook. Springer 299--331.  Bambini R. Cremonesi P. and Turrin R. 2011. A recommender system for an IPTV service provider: A real large-scale production environment. In Recommender Systems Handbook . Springer 299--331.","key":"e_1_2_1_8_1","DOI":"10.1007\/978-0-387-85820-3_9"},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.1007\/978-3-642-31454-4_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_10_1","DOI":"10.1145\/2441955.2441958"},{"volume-title":"Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann Publishers Inc., 43--52","author":"Breese J. S.","key":"e_1_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_12_1","DOI":"10.1007\/11926078_67"},{"volume-title":"Proceedings of the 6th International Conference on Music Information Retrieval (ISMIR). 464--467","author":"Celma O.","key":"e_1_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_14_1","DOI":"10.1145\/1518701.1518735"},{"doi-asserted-by":"publisher","key":"e_1_2_1_15_1","DOI":"10.2105\/AJPH.2009.165449"},{"doi-asserted-by":"publisher","key":"e_1_2_1_16_1","DOI":"10.1145\/1864708.1864766"},{"doi-asserted-by":"publisher","key":"e_1_2_1_17_1","DOI":"10.1145\/2212776.2223805"},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1145\/1518701.1518736"},{"doi-asserted-by":"publisher","key":"e_1_2_1_19_1","DOI":"10.1561\/1800000006"},{"doi-asserted-by":"publisher","key":"e_1_2_1_20_1","DOI":"10.1145\/1594173.1594174"},{"volume":"2782","volume-title":"Proceedings of the 7th International Workshop on Cooperative Information Agents VII. Lecture Notes in Computer Science","author":"Golbeck J.","key":"e_1_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_22_1","DOI":"10.1145\/2043932.2043966"},{"doi-asserted-by":"publisher","key":"e_1_2_1_23_1","DOI":"10.1145\/1958824.1958867"},{"volume-title":"Proceedings of the AAMAS Workshop on Trust in Agent Societies.","author":"Hang C.-W.","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","first-page":"190","article-title":"Trust-based recommendations for publications: A multi-layer network approach","volume":"2","author":"Hess C.","year":"2006","journal-title":"TCDL Bullet."},{"doi-asserted-by":"publisher","key":"e_1_2_1_26_1","DOI":"10.1145\/1065385.1065415"},{"doi-asserted-by":"publisher","key":"e_1_2_1_27_1","DOI":"10.1016\/j.ijmedinf.2009.10.003"},{"doi-asserted-by":"publisher","key":"e_1_2_1_28_1","DOI":"10.1016\/j.dss.2005.05.019"},{"volume-title":"Proceedings of the IEEE 24th International Conference on Data Engineering Workshop (ICDEW\u201908)","author":"Kim Y. A.","key":"e_1_2_1_29_1"},{"unstructured":"Kincaid J. 2010. EdgeRank: The secret sauce that makes Facebook\u2019s news feed tick. TechCrunch April.  Kincaid J. 2010. EdgeRank: The secret sauce that makes Facebook\u2019s news feed tick. TechCrunch April.","key":"e_1_2_1_30_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_31_1","DOI":"10.1007\/s11042-006-0082-7"},{"doi-asserted-by":"publisher","key":"e_1_2_1_32_1","DOI":"10.1002\/asi.v58:7"},{"doi-asserted-by":"publisher","key":"e_1_2_1_33_1","DOI":"10.1145\/1386790.1386838"},{"volume-title":"Proceedings of the Beyond Personalization Workshop.","author":"Liu H.","key":"e_1_2_1_34_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_35_1","DOI":"10.1016\/j.physa.2010.11.027"},{"doi-asserted-by":"publisher","key":"e_1_2_1_36_1","DOI":"10.1109\/ICDCSW.2007.82"},{"doi-asserted-by":"publisher","key":"e_1_2_1_37_1","DOI":"10.1145\/1297231.1297235"},{"doi-asserted-by":"publisher","key":"e_1_2_1_38_1","DOI":"10.1504\/IJTMCC.2013.052522"},{"doi-asserted-by":"publisher","key":"e_1_2_1_39_1","DOI":"10.1109\/TrustCom.2011.112"},{"unstructured":"Noakes M. and Clifton P. 2005. The CSIRO Total Wellbeing Diet. Penguin.  Noakes M. and Clifton P. 2005. The CSIRO Total Wellbeing Diet . Penguin.","key":"e_1_2_1_40_1"},{"volume-title":"Proccedings of the Annual Conference of the American Association for Artificial Intelligence (AAAI). 1419--1424","author":"Paek T.","key":"e_1_2_1_41_1"},{"doi-asserted-by":"crossref","unstructured":"Pazzani M. J.\n     and \n      \n      \n      Billsus D\n      \n  \n  . \n  2007\n  . Content-based recommendation systems. In The Adaptive Web Lecture Notes in Computer Science Vol. \n  4321 Springer Berlin 325--341.   Pazzani M. J. and Billsus D. 2007. Content-based recommendation systems. In The Adaptive Web Lecture Notes in Computer Science Vol. 4321 Springer Berlin 325--341.","key":"e_1_2_1_42_1","DOI":"10.1007\/978-3-540-72079-9_10"},{"doi-asserted-by":"publisher","key":"e_1_2_1_43_1","DOI":"10.1145\/1864708.1864747"},{"doi-asserted-by":"publisher","key":"e_1_2_1_44_1","DOI":"10.1145\/1639714.1639766"},{"doi-asserted-by":"publisher","key":"e_1_2_1_45_1","DOI":"10.1089\/cpb.2007.0056"},{"volume-title":"Artificial Intelligence: A Modern Approach","year":"2010","author":"Russell S. J.","key":"e_1_2_1_46_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_47_1","DOI":"10.1145\/564376.564421"},{"doi-asserted-by":"publisher","key":"e_1_2_1_48_1","DOI":"10.1145\/2501654.2501661"},{"key":"e_1_2_1_49_1","first-page":"1","article-title":"Intelligent content discovery on the mobile Internet: Experiences and lessons learned","volume":"29","author":"Smyth B.","year":"2008","journal-title":"AI Mag."},{"volume-title":"Proceedings of the INFOCOM IEEE Conference on Computer Communications Workshops. 1--6.","author":"Trifunovic S.","key":"e_1_2_1_50_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_51_1","DOI":"10.1007\/s10458-007-9021-x"},{"doi-asserted-by":"publisher","key":"e_1_2_1_52_1","DOI":"10.1145\/1753326.1753622"},{"doi-asserted-by":"publisher","key":"e_1_2_1_53_1","DOI":"10.1016\/j.dss.2006.11.003"},{"doi-asserted-by":"publisher","key":"e_1_2_1_54_1","DOI":"10.1109\/ITNG.2009.278"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2774974","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2774974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:56:05Z","timestamp":1750272965000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2774974"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,24]]},"references-count":54,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,6,24]]}},"alternative-id":["10.1145\/2774974"],"URL":"https:\/\/doi.org\/10.1145\/2774974","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2015,6,24]]},"assertion":[{"value":"2014-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}