| 研究生: |
鄭仲翔 Cheng, Chung-Hsiang |
|---|---|
| 論文名稱: |
基於社群參與者協同合作進行社群元素可信度之驗證 A Collaborative Trustworthiness Validation Model for Social Elements in Domain-Specific Community |
| 指導教授: |
焦惠津
Jiau, Hewi-Jin Christine 斯國峰 Ssu, Kuo-Feng |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2016 |
| 畢業學年度: | 104 |
| 語文別: | 英文 |
| 論文頁數: | 66 |
| 中文關鍵詞: | 社群元素可信度 、協同合作模型 、聲譽演算法 、使用者分類 、社群運算 |
| 外文關鍵詞: | Social Element Trustworthiness, Collaborative Model, Reputation Algorithm, User Classification, Social Computing |
| 相關次數: | 點閱:104 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
社群參與者間的協同合作近期成為社群相關研究的重點之一,而參與者的協同合作可以促進社群的正向循環,此循環即吸引參與者加入社群、驅動參與者的互動、建立互信、最後參與者能互惠並互利。協同合作基礎為互信,而現今的社群系統皆須仰賴系統管理者對社群元素進行驗證以維持社群中的互信。管理者的手動驗證在處理使用者對於錯誤訊息的回報上的低效率效率,使其難以維持社群內參與者的互信。
因此,此篇論文提出了一個協同合作可信任度驗證模型(CTVM)以計算社群參與者與其創作 (Creations) 之可信度,並藉此建立社群的互信。 CTVM 將社群參與者分為四個階層。 擁有較高可信度的參與者會被分到較高的階層,而相較於低階層參與者,高階層參與者會被賦予較多社群活動的權限。 高階層參與者可因此對社群做出更大貢獻。 此外,為了檢驗 CTVM 的有效性,此篇論文進行了兩項模擬,分別基於社群觀點以及參與者個人觀點。在基於社群觀點的模擬中,優質評論、評分的比例皆隨著時間演進持續增長。和一個基準模型比較,CTVM 仍然在優質評論、評分的比例上高於基準模型。 而在基於個人參與者觀點的模擬中,優質參與者和不良參與者分別都被歸類為高階層與低階層。在此模擬中亦發現,當優質參與者變成不良參與者,其階層會下降。而比起階層下降,階層上升會需要參與者進行更多正向的貢獻。 CTVM 可以促進對於物聯網以及社群網路中社群信任的成型,並協助社群演進並使社群能自我館利並永續經營。
Collaboration among participants becomes a focus of researches in IoT and social network. Based on collaboration, a positive cycle that attracts participants, motivates interaction, builds trust, benefits participants and create profits continuously is formed. Social participants can be benefited from collaboratopn. Since collaboration among participants depends on trust, participants should be able to trust one another and other's creations. Existing systems rely on administrators to validate social elements to maintain trust. Manual validation cannot efficiently deal with reports and maintain trust among participants. Thus, a collaborative trustworthiness validation model (CTVM) is proposed to compute trustworthiness of participants along with their creations (i.e. comments and ratings) and build trust. CTVM classifies participants into four levels. Participants with higher trustworthiness are classified to higher levels. High-level participants are entrusted with more activity quota than low-level participants. Thus, higher level participants can contribute more to community. Two simulation tasks in the viewpoint of community and individual participant are adopted to verify effectiveness of CTVM. In community viewpoint, percentage of good comments and ratings continuously increase. By comparison with a baseline model, CTVM also outperforms it in percentage of comments and ratings. In participant viewpoint, good participants and bad participants can both maintain themselves at high level and low level, respectively. As good participants turn into bad participants, her level drop dramatically. It takes her more positive behavior to turn back to high level. CTVM is expected to foster trust inside social media and IoT and facilitate their evolution. Therefore, community self-governance and sustainability can be achieved.
[1] N. Zhong, J. H. Ma, R. H. Huang, J. M. Liu, Y. Y. Yao, Y. X. Zhang, and J. H. Chen, “Research
Challenges and Perspectives on Wisdom Web of Things (W2T),” The Journal of Supercomputing,
vol. 64, no. 3, pp. 862–882, 2013.
[2] A. M. Ortiz, D. Hussein, S. Park, S. N. Han, and N. Crespi, “The Cluster Between Internet of
Things and Social Networks: Review and Research Challenges,” IEEE Internet of Things Journal,
vol. 1, no. 3, pp. 206–215, June 2014.
[3] G. Kortuem and F. Kawsar, “Market-based User Innovation in the Internet of Things,” Internet of
Things (IOT), pp. 1–8, 2010.
[4] P. J. Denning and P. Yaholkovsky, “Getting to We,” Communications of the ACM, vol. 51, no. 4,
pp. 19–24, 2008.
[5] N. Cook, Enterprise 2.0: How Social Software Will Change the Future of Work. Gower Publishing,
Ltd., 2008.
[6] B. Schauer, M. Zeiller, and D. Riedl, “Reviewing the E-Collaboration Marketplace: A Survey of
Electronic Collaboration Systems,” Proceedings of the 2010 International Conference on E-Business
(ICE-B), pp. 1–7, 2010.
[7] J. Preece and B. Shneiderman, “The Reader-to-Leader Framework: Motivating Technology-
Mediated Social Participation,” AIS Transactions on Human-Computer Interaction, vol. 1, no. 1,
pp. 13–32, 2009.
[8] J. Porter, Designing for the Social Web, eBook. Pearson Education, 2010.
[9] J.-J. Wu and A. S. Tsang, “Factors Affecting Members’ Trust Belief and Behaviour Intention in
Virtual Communities,” Behaviour & Information Technology, vol. 27, no. 2, pp. 115–125, 2008.
[10] W. S. Chow and L. S. Chan, “Social Network, Social Trust and Shared Goals in Organizational
Knowledge Sharing,” Information & Management, vol. 45, no. 7, pp. 458–465, 2008.
[11] C. Dwyer, S. Hiltz, and K. Passerini, “Trust and Privacy Concern within Social Networking Sites:
A Comparison of Facebook and MySpace,” AMCIS 2007 proceedings, p. 339, 2007.
[12] S. Chai and M. Kim, “What Makes Bloggers Share Knowledge? An Investigation on the Role of
Trust,” International Journal of Information Management, vol. 30, no. 5, pp. 408–415, 2010.
[13] K. S. Coulter, J. D. Doyle, L. A. Heslop, A. Ramirez, and D. Cray, “Trust Intentions in Readers of
Blogs,” Management Research Review, vol. 35, no. 9, pp. 837–856, 2012.
[14] P. Watson, M. Morgan, and N. Hemmington, “Online Communities and the Sharing of Extraordinary
Restaurant Experiences,” Journal of Foodservice, vol. 19, no. 6, pp. 289–302, 2008.
[15] I. S. Pantelidis, “Electronic Meal Experience: A Content Analysis of Online Restaurant Comments,”
Cornell Hospitality Quarterly, 2010.
[16] H. K. Oh, S. W. Kim, S. Park, and M. Zhou, “Can You Trust Online Ratings? A Mutual Reinforcement
Model for Trustworthy Online Rating Systems,” IEEE Transactions on Systems, Man,
and Cybernetics: Systems, vol. 45, no. 12, pp. 1564–1576, Dec 2015.
[17] M. Eisend, “Source Credibility Dimensions in Marketing Communication - A Generalized Solution,”
Journal of Empirical Generalizations in Marketing, vol. 10, no. 2, pp. 1–33, 2006.
[18] S. Y. Rieh and D. R. Danielson, “Credibility: A Multidisciplinary Framework,” Annual review of
information science and technology, vol. 41, no. 1, pp. 307–364, 2007.
[19] K. Sugiyama, K. Hatano, and M. Yoshikawa, “Adaptive Web Search Based on User Profile Constructed
without Any Effort from Users,” Proceedings of the ACM 13th international conference on
World Wide Web, pp. 675–684, 2004.
[20] C. H¨olscher and G. Strube, “Web Search Behavior of Internet Experts and Newbies,” Computer
networks, vol. 33, no. 1, pp. 337–346, 2000.
[21] H. Berghel, “Cyberspace 2000: Dealing with Information Overload,” Communications of the ACM,
vol. 40, no. 2, pp. 19–24, 1997.
[22] S. Trifunovic, F. Legendre, and C. Anastasiades, “Social Trust in Opportunistic Networks,” INFOCOM
IEEE Conference on Computer Communications Workshops , 2010, pp. 1–6, March 2010.
[23] M. Nitti, R. Girau, and L. Atzori, “Trustworthiness Management in the Social Internet of Things,”
IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 5, pp. 1253–1266, May 2014.
[24] S. Bowles and H. Gintis, “Social Capital and Community Governance,” The Economic Journal,
vol. 112, no. 483, pp. F419–F436, 2002.
[25] S. P. Marsh, “Formalising Trust as a Computational Concept,” 1994.
[26] A. Abdul-Rahman and S. Hailes, “Supporting Trust in Virtual Communities,” Proceedings of the
IEEE 33rd Annual Hawaii International Conference on System Sciences, pp. 9–pp, 2000.
[27] G. Kolaczek, “Trust Modeling in Virtual Communities Using Social Network Metrics,” 3rd International
Conference on Intelligent System and Knowledge Engineering, vol. 1, pp. 1421–1426, Nov
2008.
[28] S. Nepal, W. Sherchan, and C. Paris, “Strust: A Trust Model for Social Nnetworks,” 2011IEEE
10th International Conference on Trust, Security and Privacy in Computing and Communications,
pp. 841–846, 2011, IEEE.
[29] L. Xiong and L. Liu, “A Reputation-based Trust Model for Peer-to-Peer E-Commerce Communities,”
IEEE International Conference on E-Commerce, pp. 275–284, 2003.
[30] B. Dun-an and D. Da-hai, “An Exploratory Study on Consumers’ Perceived Trust of Transaction
Virtual Community,” International Conference on Information Management, Innovation Management
and Industrial Engineering, vol. 4, pp. 565–567, Dec 2009.
[31] J. Li, N. Zanman, and Y. Bai, “Medtrust: Towards Trust-assured Social Networking for Healthcare,”
17th International Conference on E-health Networking, Application & Services (HealthCom),
pp. 385–390, 2015.
[32] C. F. Hsu, E. Khabiri, and J. Caverlee, “Ranking Comments on the Social Web,” International
Conference on Computational Science and Engineering, vol. 4, pp. 90–97, Aug 2009.
[33] F. Skopik, H.-L. Truong, and S. Dustdar, “Trust and Reputation Mining in Professional Virtual
Communities,” International Conference on Web Engineering, pp. 76–90, 2009, Springer.
[34] H. Wang, Y. Lu, and C. Zhai, “Latent Aspect Rating Analysis on Review Text Data: A Rating Regression
Approach,” Proceedings of the 16th ACM SIGKDD international conference on Knowledge
discovery and data mining, pp. 783–792, 2010.
[35] X. Zhang, L. Cui, and Y. Wang, “Commtrust: Computing Multi-dimensional Trust by Mining ECommerce
Feedback Comments,” IEEE Transactions on Knowledge and Data Engineering, vol. 26,
no. 7, pp. 1631–1643, 2014.
[36] J. Caverlee, L. Liu, and S. Webb, “The SocialTrust Framework for Trusted Social Information
Management: Architecture and Algorithms,” Information Sciences, vol. 180, no. 1, pp. 95–112,
2010.
[37] J. Xue, Z. Yang, X. Yang, X. Wang, L. Chen, and Y. Dai, “Votetrust: Leveraging Friend Invitation
Graph to Defend against Social Network Sybils,” Proceedings IEEE INFOCOM, pp. 2400–2408,
April 2013.
[38] K. Lindberg and C. D. Jensen, “Collaborative Trust Evaluation for Wiki Security,” Tenth Annual
International Conference on Privacy, Security and Trust (PST), pp. 176–184, July 2012.
[39] L. Atzori, A. Iera, and G. Morabito, “SIoT: Giving a Social Structure to the Internet of Things,”
IEEE Communications Letters, vol. 15, no. 11, pp. 1193–1195, 2011.
[40] M. Nitti, R. Girau, L. Atzori, A. Iera, and G. Morabito, “A Subjective Model for Trustworthiness
Evaluation in the Social Internet of Things,” IEEE 23rd International Symposium on Personal,
Indoor and Mobile Radio Communications-(PIMRC), pp. 18–23, 2012.
[41] B. Smyth, M. Coyle, P. Briggs, K. McNally, and M. P. O’Mahony, “Collaboration, Reputation and
Recommender Systems in Social Web Search,” in Recommender Systems Handbook, pp. 569–608,
Springer, 2015.
[42] M. Xie and H. Wang, “A Collaboration-based Autonomous Reputation System for Email Services,”
Proceedings IEEE INFOCOM, pp. 1–9, March 2010.
[43] J. Golbeck, J. Hendler, et al., “Filmtrust: Movie Recommendations Using Trust in Web-based
Social Networks,” Proceedings of the IEEE Consumer communications and networking conference,
vol. 96, pp. 282–286, 2006, Citeseer.
校內:2021-09-08公開