{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:09Z","timestamp":1740149049250,"version":"3.37.3"},"reference-count":46,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736105","NY220044","NY218024","KYCX20_0841"],"award-info":[{"award-number":["U1736105","NY220044","NY218024","KYCX20_0841"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of NJUPT","award":["U1736105","NY220044","NY218024","KYCX20_0841"],"award-info":[{"award-number":["U1736105","NY220044","NY218024","KYCX20_0841"]}]},{"name":"Postgraduate Innovation Project in Jiangsu Province","award":["U1736105","NY220044","NY218024","KYCX20_0841"],"award-info":[{"award-number":["U1736105","NY220044","NY218024","KYCX20_0841"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,11,11]]},"abstract":"<jats:p>The existing approaches to predict trust values in social commerce are based on personal social relationships without considering historical transaction information about products in social commerce, which results in false recommendations, and deceptions cannot be differentiated. Trust values extracted from social links can improve the performance of trust and reputation mechanism, but the rates from these links in social commerce can be false because of the stakeholders\u2019 manipulation for personal interest. And the rates are also dynamic and inconsistent. Therefore, this paper proposes a comprehensive trust model by fully exploiting the effects of the transaction attributes and social relationships on users\u2019 trust. The proposed model refines the granularity of trust evaluation and improves the discrimination of recommended information. Experiments demonstrate that the proposed model performs better and predicts more accurately than the three models compared under the same circumstance.<\/jats:p>","DOI":"10.1155\/2020\/8887596","type":"journal-article","created":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T17:38:51Z","timestamp":1605202731000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["A Comprehensive Trust Model Based on Social Relationship and Transaction Attributes"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2240-2791","authenticated-orcid":true,"given":"Yonghua","family":"Gong","sequence":"first","affiliation":[{"name":"School of Management, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Information Industry Integration Innovation and Emergency Management Research Center, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9888-3507","authenticated-orcid":true,"given":"Lei","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Management, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"}]},{"given":"Tinghuai","family":"Ma","sequence":"additional","affiliation":[{"name":"Nanjing University of Information Science & Technology, Nanjing 210044, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2013.2277696"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.02.009"},{"key":"3","article-title":"Self-service technologies and e-services risks in social commerce","volume":"1-19","author":"M. S. Featherman","year":"2015","journal-title":"Journal of Business Ethics"},{"issue":"12","key":"4","first-page":"364","article-title":"A secure and verifiable access control scheme for big data storage in clouds","volume":"8","author":"C. Q. Hu","year":"2019","journal-title":"IEEE Transactions on Big Data"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2018.2805700"},{"key":"6","first-page":"1","article-title":"Secure and efficient data collection and storage of IoT in smart ocean","volume":"99","author":"C. Q. Hu","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.2753\/jec1086-4415160204"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2013.804587"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2012.11.006"},{"author":"M. Chowdhury","key":"10","article-title":"Trust-based infinitesimals for enhanced collaborative filtering"},{"first-page":"167","article-title":"Trust in recommender systems","author":"J. O. Donovan","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2018.05.001"},{"first-page":"322","article-title":"Building trust for distributed commerce transactions","author":"J. W. Su","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2019.1619907"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-014-0411-z"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2016.10.004"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.06.007"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2019.2893939"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.03.023"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2019.2932061"},{"issue":"1","key":"21","doi-asserted-by":"crossref","first-page":"31","DOI":"10.3233\/AIC-2010-0484","article-title":"Recommendation of reliable users, social networks and high-quality resources in a social internetworking system","volume":"24","author":"P. D. Meo","year":"2011","journal-title":"Ai Communications"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.2753\/jec1086-4415100404"},{"first-page":"188","article-title":"Learning to recommend with trust and distrust relationships","author":"H. Ma","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.09.024"},{"issue":"4","key":"25","doi-asserted-by":"crossref","first-page":"965","DOI":"10.3390\/s19040965","article-title":"Privacy-preserving vehicular rogue node detection scheme for fog computing","volume":"19","author":"B. Al-Otibi","year":"2019","journal-title":"Sensors"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2812166"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.09.005"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2019.2906310"},{"key":"29","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","article-title":"A survey of trust and reputation systems for online service provision","volume":"43","author":"A. Josang","year":"2007","journal-title":"Decision Support Systems"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.09.036"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2012.02.004"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.02.001"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2009.263"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.11.087"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2018.03.005"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2001.11044235"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.087"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20591"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/jas.2020.1003237"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2014.05.012"},{"key":"41","doi-asserted-by":"crossref","first-page":"1285","DOI":"10.1016\/j.ins.2010.12.001","article-title":"Recommendation of similar users, resources and social networks in a social internetworking scenario","volume":"7","author":"P. D. Meo","year":"2011","journal-title":"Information Sciences"},{"first-page":"465","article-title":"On measuring social friend interest similarities in recommender systems","author":"H. Ma","key":"42"},{"key":"43","first-page":"43","article-title":"Empirical analysis of predictive algorithms for collaborative filtering","volume":"18","author":"J. S. Breese","year":"1998","journal-title":"Uncertainty in Artificial Intelligence"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.11.008"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2018.2846646"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/jas.2019.1911348"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8887596.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8887596.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8887596.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T17:39:04Z","timestamp":1605202744000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8887596\/"}},"subtitle":[],"editor":[{"given":"Victor S.","family":"Sheng","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,11,11]]},"references-count":46,"alternative-id":["8887596","8887596"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8887596","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,11,11]]}}}