دانلود رایگان مقاله مدل اعتماد موضوع متمرکز در توییتر

عنوان فارسی
مدل اعتماد موضوع متمرکز در توییتر
عنوان انگلیسی
A topic-focused trust model for Twitter
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
11
سال انتشار
2015
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E723
رشته های مرتبط با این مقاله
مهندسی کامپیوتر و مهندسی فناوری اطلاعات
گرایش های مرتبط با این مقاله
اینترنت و شبکه های گسترده
مجله
ارتباطات کامپیوتر - Computer Communications
دانشگاه
گروه علوم کامپیوتر، فناوری ویرجینیا، ایالات متحده
کلمات کلیدی
مدیریت اعتماد، شبکه های اجتماعی ،توییتر امانت اعتبار
چکیده

Abstract


Twitter is a crucial platform to get access to breaking news and timely information. However, due to questionable provenance, uncontrollable broadcasting, and unstructured languages in tweets, Twitter is hardly a trustworthy source of breaking news. In this paper, we propose a novel topic-focused trust model to assess trustworthiness of users and tweets in Twitter. Unlike traditional graph-based trust ranking approaches in the literature, our method is scalable and can consider heterogeneous contextual properties to rate topic-focused tweets and users. We demonstrate the effectiveness of our topic-focused trustworthiness estimation method with extensive experiments using real Twitter data in Latin America.

نتیجه گیری

7. Conclusion


In this paper, we proposed a new design notion of topicfocused similarity-based trust evaluation and trust propagation to rate trustworthiness of tweets and users in Twitter. Compared to existing methods, our approach has three advantages: (1) enabling context-based trustworthiness estimation to focus on credibility in a specific topic domain; (2) utilizing credible news reports to infer trustworthiness of tweets exhibiting contextual similarity in textual, spatial and temporal features; and (3) combining semantic and contextual information with social networking information for trustworthiness propagation. Experiments on Twitter event detection demonstrated that our method can effectively extract trustworthy tweets while excluding rumors and noise. In addition, a comparative performance analysis demonstrated that our method outperforms existing supervised learning schemes using tweets manually labeled or tweets generated based on keyword matching as the training set. This paper assumes persistent attack behavior, i.e., a malicious user attacks without disguise whenever it has a chance. In the future, we plan to consider more sophisticated attack behaviors such as random, opportunistic, and insidious attack behaviors [31–34] to further test the robustness of our topic-focused similarity-based trust evaluation scheme.


بدون دیدگاه