{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:48:40Z","timestamp":1740098920325,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T00:00:00Z","timestamp":1529884800000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-EAR-1520870"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,25]]},"DOI":"10.1145\/3091478.3091494","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T12:17:13Z","timestamp":1499689033000},"page":"53-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Predicting Trust Relations Within a Social Network"],"prefix":"10.1145","author":[{"given":"Nikhita","family":"Vedula","sequence":"first","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Srinivasan","family":"Parthasarathy","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Valerie L.","family":"Shalin","sequence":"additional","affiliation":[{"name":"Wright State University, Dayton, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,25]]},"reference":[{"volume-title":"Measuring behavioral trust in social networks","author":"Adali Sibel","key":"e_1_3_2_1_1_1","unstructured":"Sibel Adali , Robert Escriva , Mark K. Goldberg , Mykola Hayvanovych , Malik Magdon-Ismail , Boleslaw K. Szymanski , William A. Wallace , and Gregory Williams . 2010. Measuring behavioral trust in social networks . In IEEE ISI. Sibel Adali, Robert Escriva, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, Boleslaw K. Szymanski, William A. Wallace, and Gregory Williams. 2010. Measuring behavioral trust in social networks. In IEEE ISI."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187930"},{"key":"e_1_3_2_1_3_1","volume-title":"Baeza-Yates","author":"Aslay Cigdem","year":"2014","unstructured":"Cigdem Aslay , Nicola Barbieri , Francesco Bonchi , and Ricardo A . Baeza-Yates . 2014 . Online Topic-aware Influence Maximization Queries. In EDBT. 295--306. Cigdem Aslay, Nicola Barbieri, Francesco Bonchi, and Ricardo A. Baeza-Yates. 2014. Online Topic-aware Influence Maximization Queries. In EDBT. 295--306."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557035"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935899"},{"key":"e_1_3_2_1_6_1","volume-title":"Topic-aware social influence propagation models. Knowledge and information systems","author":"Barbieri Nicola","year":"2013","unstructured":"Nicola Barbieri , Francesco Bonchi , and Giuseppe Manco . 2013. Topic-aware social influence propagation models. Knowledge and information systems ( 2013 ). Nicola Barbieri, Francesco Bonchi, and Giuseppe Manco. 2013. Topic-aware social influence propagation models. Knowledge and information systems (2013)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Ghazaleh Beigi Jiliang Tang Suhang Wang and Huan Liu. 2016. Exploiting emotional information for trust\/distrust prediction. In SIAM. Ghazaleh Beigi Jiliang Tang Suhang Wang and Huan Liu. 2016. Exploiting emotional information for trust\/distrust prediction. In SIAM.","DOI":"10.1137\/1.9781611974348.10"},{"key":"e_1_3_2_1_8_1","volume-title":"reciprocity, and social history. Games and economic behavior","author":"Berg Joyce","year":"1995","unstructured":"Joyce Berg , John Dickhaut , and Kevin McCabe . 1995. Trust , reciprocity, and social history. Games and economic behavior ( 1995 ). Joyce Berg, John Dickhaut, and Kevin McCabe. 1995. Trust, reciprocity, and social history. Games and economic behavior (1995)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133806.2133826"},{"key":"e_1_3_2_1_10_1","volume":"199","author":"Bradley Margaret M.","unstructured":"Margaret M. Bradley and Peter J. Lang. 199 9. Affective norms for English words. Technical Report. C-1, the center for research in psycho physiology, University of Florida. Margaret M. Bradley and Peter J. Lang. 1999. Affective norms for English words. Technical Report. C-1, the center for research in psycho physiology, University of Florida.","journal-title":"Peter J. Lang."},{"volume-title":"Big Crisis Data","author":"Castillo Carlos","key":"e_1_3_2_1_11_1","unstructured":"Carlos Castillo . 2016. Big Crisis Data . Cambridge University Press . Carlos Castillo. 2016. Big Crisis Data. Cambridge University Press."},{"key":"e_1_3_2_1_12_1","volume-title":"Measuring user influence in twitter: The million follower fallacy. ICWSM","author":"Cha Meeyoung","year":"2010","unstructured":"Meeyoung Cha , Hamed Haddadi , Fabricio Benevenuto , and P. Krishna Gummadi . 2010. Measuring user influence in twitter: The million follower fallacy. ICWSM ( 2010 ). Meeyoung Cha, Hamed Haddadi, Fabricio Benevenuto, and P. Krishna Gummadi. 2010. Measuring user influence in twitter: The million follower fallacy. ICWSM (2010)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_3_2_1_14_1","volume-title":"Efficient topic-aware influence maximization using preprocessing. CoRR, abs\/1403.0057","author":"Chen Wei","year":"2014","unstructured":"Wei Chen , Tian Lin , and Cheng Yang . 2014. Efficient topic-aware influence maximization using preprocessing. CoRR, abs\/1403.0057 ( 2014 ). Wei Chen, Tian Lin, and Cheng Yang. 2014. Efficient topic-aware influence maximization using preprocessing. CoRR, abs\/1403.0057 (2014)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Rino Falcone and Cristiano Castelfranchi. 2001. Social trust: A cognitive approach. In Trust and deception in virtual societies. Rino Falcone and Cristiano Castelfranchi. 2001. Social trust: A cognitive approach. In Trust and deception in virtual societies.","DOI":"10.1007\/978-94-017-3614-5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303001"},{"key":"e_1_3_2_1_18_1","volume-title":"Community detection in graphs. Physics reports","author":"Fortunato Santo","year":"2010","unstructured":"Santo Fortunato . 2010. Community detection in graphs. Physics reports ( 2010 ). Santo Fortunato. 2010. Community detection in graphs. Physics reports (2010)."},{"key":"e_1_3_2_1_19_1","unstructured":"Aristides Gionis Piotr Indyk Rajeev Motwani and others. 1999. Similarity search in high dimensions via hashing. In VLDB. Aristides Gionis Piotr Indyk Rajeev Motwani and others. 1999. Similarity search in high dimensions via hashing. In VLDB."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594173.1594174"},{"key":"e_1_3_2_1_21_1","volume-title":"Filmtrust: Movie recommendations using trust in web-based social networks","author":"Golbeck Jennifer","year":"2006","unstructured":"Jennifer Golbeck and James Hendler . 2006 . Filmtrust: Movie recommendations using trust in web-based social networks . In IEEE CCNC. Jennifer Golbeck and James Hendler. 2006. Filmtrust: Movie recommendations using trust in web-based social networks. In IEEE CCNC."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183463.1183470"},{"key":"e_1_3_2_1_23_1","volume-title":"Roth","author":"Goldberg Debra S","year":"2003","unstructured":"Debra S Goldberg and Frederick P . Roth . 2003 . Assessing experimentally derived interactions in a small world. Proceedings of the National Academy of Sciences ( 2003). Debra S Goldberg and Frederick P. Roth. 2003. Assessing experimentally derived interactions in a small world. Proceedings of the National Academy of Sciences (2003)."},{"key":"e_1_3_2_1_24_1","volume-title":"The strength of weak ties. American journal of sociology","author":"Granovetter Mark S.","year":"1973","unstructured":"Mark S. Granovetter . 1973. The strength of weak ties. American journal of sociology ( 1973 ). Mark S. Granovetter. 1973. The strength of weak ties. American journal of sociology (1973)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_3_2_1_26_1","volume-title":"ETAF: An Extended Trust Antecedents Framework for Trust Prediction. In ASONAM.","author":"Guo G.","year":"2014","unstructured":"G. Guo , J. Zhang , D. Thalmann , and N. Yorke-Smith . 2014 . ETAF: An Extended Trust Antecedents Framework for Trust Prediction. In ASONAM. G. Guo, J. Zhang, D. Thalmann, and N. Yorke-Smith. 2014. ETAF: An Extended Trust Antecedents Framework for Trust Prediction. In ASONAM."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339612"},{"key":"e_1_3_2_1_28_1","volume-title":"Cumulated gain-based evaluation of IR techniques. TOIS","author":"J\u00e4rvelin Kalervo","year":"2002","unstructured":"Kalervo J\u00e4rvelin and Jaana Kek\u00e4l\u00e4inen . 2002. Cumulated gain-based evaluation of IR techniques. TOIS ( 2002 ). Kalervo J\u00e4rvelin and Jaana Kek\u00e4l\u00e4inen. 2002. Cumulated gain-based evaluation of IR techniques. TOIS (2002)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_30_1","unstructured":"Yarden Katz and Jennifer Golbeck. 2006. Social network-based trust in prioritized default logic. In AAAI. Yarden Katz and Jennifer Golbeck. 2006. Social network-based trust in prioritized default logic. In AAAI."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v59:3"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_33_1","volume-title":"The limits of organization. N-Y: Norton","author":"Kenneth Arrow","year":"1974","unstructured":"Arrow Kenneth and others. 1974. The limits of organization. N-Y: Norton ( 1974 ). Arrow Kenneth and others. 1974. The limits of organization. N-Y: Norton (1974)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"volume-title":"Advanced Engineering Mathematics","author":"Kreyszig Erwin","key":"e_1_3_2_1_35_1","unstructured":"Erwin Kreyszig . 1979. Advanced Engineering Mathematics . John Wiley & Sons . Erwin Kreyszig. 1979. Advanced Engineering Mathematics. John Wiley & Sons."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"volume-title":"UK, Sweden and Denmark","author":"Larsen Christian Albrekt","key":"e_1_3_2_1_37_1","unstructured":"Christian Albrekt Larsen . 2013. The rise and fall of social cohesion: The construction and de-construction of social trust in the US , UK, Sweden and Denmark . Oxford University Press . Christian Albrekt Larsen. 2013. The rise and fall of social cohesion: The construction and de-construction of social trust in the US, UK, Sweden and Denmark. Oxford University Press."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"e_1_3_2_1_39_1","volume-title":"Lott","author":"Lott Albert J.","year":"1965","unstructured":"Albert J. Lott and Bernice E . Lott . 1965 . Group cohesiveness as interpersonal attraction: a review of relationships with antecedent and consequent variables. Psychological bulletin (1965). Albert J. Lott and Bernice E. Lott. 1965. Group cohesiveness as interpersonal attraction: a review of relationships with antecedent and consequent variables. Psychological bulletin (1965)."},{"key":"e_1_3_2_1_40_1","volume-title":"Crisis mapping as Collective Problem Solving. ACM Transactions on Applied Perception","author":"Mason Winter","year":"2010","unstructured":"Winter Mason . 2010. Crisis mapping as Collective Problem Solving. ACM Transactions on Applied Perception ( 2010 ). Winter Mason. 2010. Crisis mapping as Collective Problem Solving. ACM Transactions on Applied Perception (2010)."},{"key":"e_1_3_2_1_41_1","volume-title":"National Conference on AI.","author":"Massa Paolo","year":"2005","unstructured":"Paolo Massa and Paolo Avesani . 2005 . Controversial users demand local trust metrics: An experimental study on epinions.com community . In National Conference on AI. Paolo Massa and Paolo Avesani. 2005. Controversial users demand local trust metrics: An experimental study on epinions.com community. In National Conference on AI."},{"key":"e_1_3_2_1_42_1","volume-title":"open research on trust metrics","author":"Massa Paolo","year":"2001","unstructured":"Paolo Massa , Kasper Souren , Martino Salvetti , and Danilo Tomasoni . 2001. Trustlet , open research on trust metrics . Scalable Computing : Practice and Experience ( 2001 ). Paolo Massa, Kasper Souren, Martino Salvetti, and Danilo Tomasoni. 2001. Trustlet, open research on trust metrics. Scalable Computing: Practice and Experience (2001)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Meenakshi Nagarajan Karthik Gomadam Amit P. Sheth Ajith Ranabahu Raghava Mutharaju and Ashutosh Jadhav. 2009. Spatio-temporal-thematic analysis of citizen sensor data: Challenges and experiences. Meenakshi Nagarajan Karthik Gomadam Amit P. Sheth Ajith Ranabahu Raghava Mutharaju and Ashutosh Jadhav. 2009. Spatio-temporal-thematic analysis of citizen sensor data: Challenges and experiences.","DOI":"10.1007\/978-3-642-04409-0_52"},{"key":"e_1_3_2_1_44_1","unstructured":"Lawrence Page Sergey Brin Rajeev Motwani and Terry Winograd. 1999. The PageRank citation ranking: bringing order to the web. (1999). Lawrence Page Sergey Brin Rajeev Motwani and Terry Winograd. 1999. The PageRank citation ranking: bringing order to the web. (1999)."},{"key":"e_1_3_2_1_45_1","volume":"200","author":"Pennebaker James W.","unstructured":"James W. Pennebaker , Martha E. Francis , and Roger J. Booth. 200 1. Linguistic inquiry and word count: LIWC 2001. Mahway: Lawrence Erlbaum Associates (2001). James W. Pennebaker, Martha E. Francis, and Roger J. Booth. 2001. Linguistic inquiry and word count: LIWC 2001. Mahway: Lawrence Erlbaum Associates (2001).","journal-title":"Roger J. Booth."},{"key":"e_1_3_2_1_46_1","volume-title":"Sheth","author":"Purohit Hemant","year":"2014","unstructured":"Hemant Purohit , Yiye Ruan , David Fuhry , Srinivasan Parthasarathy , and Amit P . Sheth . 2014 . On Understanding the Divergence of Online Social Group Discussion . ICWSM (2014). Hemant Purohit, Yiye Ruan, David Fuhry, Srinivasan Parthasarathy, and Amit P. Sheth. 2014. On Understanding the Divergence of Online Social Group Discussion. ICWSM (2014)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Gene I. Rochlin. 2004. Mind the gap: The growing distance between institutional and technical capabilities in organizations performing critical operations. In Intelligence and Security Informatics. Gene I. Rochlin. 2004. Mind the gap: The growing distance between institutional and technical capabilities in organizations performing critical operations. In Intelligence and Security Informatics.","DOI":"10.1007\/978-3-540-25952-7_26"},{"key":"e_1_3_2_1_48_1","volume-title":"Huberman","author":"Romero Daniel M.","year":"2011","unstructured":"Daniel M. Romero , Wojciech Galuba , Sitaram Asur , and Bernardo A . Huberman . 2011 . Influence and passivity in social media. In ECML PKDD. Daniel M. Romero, Wojciech Galuba, Sitaram Asur, and Bernardo A. Huberman. 2011. Influence and passivity in social media. In ECML PKDD."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.14778\/2140436.2140440"},{"key":"e_1_3_2_1_50_1","volume-title":"Trust: A sociological theory","author":"Sztompka Piotr","year":"1999","unstructured":"Piotr Sztompka . 1999 . Trust: A sociological theory . In Cambridge University Press . Piotr Sztompka. 1999. Trust: A sociological theory. In Cambridge University Press."},{"volume-title":"Social identity and intergroup relations","author":"Tajfel Henri","key":"e_1_3_2_1_51_1","unstructured":"Henri Tajfel . 2010. Social identity and intergroup relations . In Cambridge University Press . Henri Tajfel. 2010. Social identity and intergroup relations. In Cambridge University Press."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433405"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124309"},{"volume-title":"Trust in Social Media: Synthesis Lectures on Information Security, Privacy, and Trust","author":"Tang Jiliang","key":"e_1_3_2_1_54_1","unstructured":"Jiliang Tang and Huan Liu . 2015. Trust in Social Media: Synthesis Lectures on Information Security, Privacy, and Trust . Morgan & Claypool Publishers . Jiliang Tang and Huan Liu. 2015. Trust in Social Media: Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool Publishers."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21662"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753486"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718520"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135792"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860485"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.11.003"}],"event":{"name":"WebSci '17: ACM Web Science Conference","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Troy New York USA","acronym":"WebSci '17"},"container-title":["Proceedings of the 2017 ACM on Web Science Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3091478.3091494","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3091478.3091494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T07:56:07Z","timestamp":1673423767000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3091478.3091494"}},"subtitle":["A Case Study on Emergency Response"],"short-title":[],"issued":{"date-parts":[[2017,6,25]]},"references-count":60,"alternative-id":["10.1145\/3091478.3091494","10.1145\/3091478"],"URL":"https:\/\/doi.org\/10.1145\/3091478.3091494","relation":{},"subject":[],"published":{"date-parts":[[2017,6,25]]},"assertion":[{"value":"2017-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}