Networking Reference
In-Depth Information
tries to identify which social- and information- related signals are especially useful
for understanding the expertise of the posters [ 12 ] and the credibility of the
information [ 13 ]. There is still work to be done to understand the different roles
people play in these sites, the level of risk involved in sharing information, and how
these impact users' online behavior and information credibility.
1. K. Aberer, Z. Despotovic, Managing trust in a peer-2-peer information system, in Proceedings
of 10th International Conference on Information and Knowledge Management(CIKM01) ,
Atlanta, pp. 310-317 (2001)
2. S. Adal─▒, T. Liu, M. Magdon-Ismail, An analysis of optimal link bombs. Theor. Comput. Sci.
437 , 1-20 (2012)
3. S. Adal─▒, M. Magdon-Ismail, F. Sisenda, Actions speak as loud as words: predicting
relationships from social behavior data, in Proceedings of the WWW Conference , Lyon (2012)
4. L.A. Adamic, D. Lauterbach, C.Y. Teng, M.S. Ackermanm, Rating friends without making
enemies, in Proceedings of the AAAI Conference on Social Media and Weblogs (ICWSM
2011) , Barcelona (2011)
5. R. Andersen, C. Borgs, J. Chayes, U. Feige, A. Flaxman, A. Kalai, V. Mirrokni, M. Tennen-
holtz, Trust-based recommendation systems: an axiomatic approach, in Proceedings of WWW ,
Beijing, pp. 199-208 (2008)
6. S. Ba, P.A. Pavlou, Evidence of the effect of trust building technology in electronic markets:
price premiums and buyer behavior. MIS Q. 26 (3), 243-268 (2002)
7. F. Benevenuto, G. Magno, T. Rodrigues, V. Almeida, Detecting spammers on twitter, in
CEAS 2010 - Seventh annual Collaboration, Electronic messaging, Anti- Abuse and Spam
Conference , Redmond (2010)
8. T. Berners-Lee, J. Hendler, O. Lassila, The semantic web. Sci. Am. pp. 29-37 (2001)
9. S. Brin, L. Page, The anatomy of a large-scale hypertextual web search engine, in Proceedings
of the ACM WWW Conference , Brisbane, Australia, pp. 107-117 (1998)
10. B. Butler, E. Joyce, J. Pike, Don't look now, but we've created a bureaucracy: the nature and
roles of policies and rules in wikipedia, in Proceedings of the twenty-sixth Annual SIGCHI
Conference on Human Factors in Computing Systems, CHI '08 , (ACM, New York, 2008)
Florence, Italy, pp. 1101-1110
11. L.J. Camp,
Mental models of privacy and security.
IEEE Technol. Soc. Mag. 28 (3), 1-10
12. K. Canini, B. Suh, P. Pirolli, Finding credible information sources in social networks based on
content and social structure, in 2011 IEEE International Conference on Privacy, Security, Risk,
and Trust, and IEEE International Conference on Social Computing , Boston, USA (2011)
13. C. Castillo, M. Mendoza, B. Poblete, Information credibility on twitter, in Proceedings of the
20th International Conference on World Wide Web , Hyderabad, pp. 675-684 (2011)
14. J.H. Cho, A. Swami, I.R. Chen, A survey on trust management for mobile ad hoc networks.
IEEE Commun. Surv. Tutor. 13 (4), 562-583 (2010)
15. N.A. Christakis, J.H. Fowler, Connected: The Surprising Power of Our Social Networks and
How They Shape Our Lives . (HarperCollins Publishers, New York, 2011)
16. O. Dabeer, P. Mehendale, A. Karnik, A. Saroop, Timing tweets to increase effectiveness of
information campaigns, in Proceedings of the AAAI Conference on Social Media and Weblogs
(ICWSM 2011) , Barcelona, Spain (2011)
17. C. Dellarocas, Reputation mechanism design in online trading environments with pure moral
hazard. Inf. Syst. Res. 16 (2), 209-230 (2005)
Search MirCeyron ::

Custom Search