<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Trust-Related Effects of Expertise and Similarity Cues in Human-Generated Recommendations</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Johannes Kunkel</string-name>
          <email>johannes.kunkel@uni-due.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tim Donkers</string-name>
          <email>tim.donkers@uni-due.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Catalin-Mihai Barbu</string-name>
          <email>catalin.barbu@uni-due.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jürgen Ziegler</string-name>
          <email>juergen.ziegler@uni-due.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Duisburg-Essen Duisburg</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>A user's trust in recommendations plays a central role in the acceptance or rejection of a recommendation. One factor that influences trust is the source of the recommendations. In this paper we describe an empirical study that investigates the trust-related influence of social presence arising in two scenarios: human-generated recommendations and automated recommending. We further compare visual cues indicating the expertise of a human recommendation source and its similarity with the target user, and evaluate their influence on trust. Our analysis indicates that even subtle visual cues can signal expertise and similarity effectively, thus influencing a user's trust in recommendations. These findings suggest that automated recommender systems could benefit from the inclusion of social components-especially when conveying characteristics of the recommendation source. Thus, more informative and persuasive recommendation interfaces may be designed using such a mixed approach.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        INTRODUCTION
Trust in recommendations is a key aspect in the user’s
intention to follow them [
        <xref ref-type="bibr" rid="ref2 ref32">32, 2</xref>
        ]. One of the factors that
influences the perceived trustworthiness of recommendations is the
source, i.e. the person or system providing them [
        <xref ref-type="bibr" rid="ref31 ref34 ref6">31, 6, 34</xref>
        ].
In online situations, recommendations are typically
generated by automated Recommender Systems (RS), which are a
©2018. Copyright for the individual papers remains with the authors.
Copying permitted for private and academic purposes.
      </p>
      <p>HUMANIZE ’18, March 11, 2018, Tokyo, Japan
commonly-used instrument to tackle the information overload
users encounter on the Internet. However, platforms where
humans provide advice and recommendations to users also exist.
There is an increasing number of systems where both
automated recommendations and human-generated recommendations,
e.g. in the form of online reviews, are available. This raises
interesting research questions, such as which recommendation
sources are considered more trustworthy by users and what
are the factors that influence users’ trust.</p>
      <p>
        It has been shown that the bare social presence, which
emerges in situations where humans provide recommendations, can
already have a positive impact on trust [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Trust further
depends on perceived traits of the recommendation source, such
as expertise and similarity towards the receiver of
recommendations [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. In addition, relying on users with strong social
ties to the active user when generating recommendations has
shown great potential in fostering system-based trust [
        <xref ref-type="bibr" rid="ref30 ref33">30, 33</xref>
        ].
However, human recommendation givers on online platforms
are typically not known to the user. Thus, an important
question in cases where recommendation sources are anonymous
is which information about the recommendation source can
affect—either positively or negatively—the user’s trust.
In this paper, we present our ongoing work regarding trust in
recommendation sources with socially-weak ties. In particular,
we seek to answer the following research questions:
RQ1: Is the depiction of an anonymous user avatar for the
recommendation source sufficient to cause a perception of
social presence?
RQ2: Can the expertise and similarity of a recommendation
source be conveyed successfully through subtle visual cues?
RQ3: Do the perceived expertise and similarity of an
anonymous human recommendation source influence trust in
recommendations?
We present the results of an empirical study in which we
compared the effects of a recommendation interface, which
claimed to show users personalized recommendations
provided either by a human or an automated RS, on the perception
of social presence. Furthermore, we altered visual cues
slightly by showing (1) an iconic face when a human was the
recommendation source, and (2) arrows pointing up/down to
indicate a high/low expertise or similarity. Our results show
that, although the visual elements we used were rather subtle,
they were mostly able to influence users’ perceptions
regarding the recommendation source’s social presence, expertise,
and similarity.
      </p>
      <p>To summarize, in this paper we contribute to the research field
of trust in recommendation sources by:
presenting results of a mid-scale survey (n = 88) that
compares the user’s perception of other users and automated RS
as recommendation source;
introducing a structural equation model incorporating the
user’s perceived similarity and expertise of the
recommendation source and their influences on trust; and
discussing implications for future interface design to foster
trust in RS.</p>
      <p>The following sections are organized as follows: First, a
review of related research is given. Subsequently, we introduce
our method for comparing the nature and properties of
recommendation sources. Our results are presented and discussed
thereafter. Finally, we conclude by summarizing the
implications derived from our results, the limitations, as well as further
research directions.</p>
      <p>
        RECOMMENDATION SOURCES
Besides aspects such as the presentation of
recommendations and their accuracy in meeting the user’s preferences, the
source of a recommendation and how the user perceives it
can also influence the acceptance of recommendations [
        <xref ref-type="bibr" rid="ref29 ref30 ref31 ref33">30,
29, 31, 33</xref>
        ]. A general way to differentiate between
recommendation sources is to describe them as either personal or
impersonal [
        <xref ref-type="bibr" rid="ref29 ref31">29, 31</xref>
        ]. Personal sources are directly bound to
human beings as provider of recommendations. An example
for recommendations by personal sources are word of mouth
recommendations [
        <xref ref-type="bibr" rid="ref14 ref19 ref8">8, 14, 19</xref>
        ]. Impersonal sources, on the other
hand, are automated systems or sources that are not explicitly
communicated to the user.
      </p>
      <p>
        Personal and impersonal sources can provide personalized or
non-personalized recommendations. Thus, four
recommendation categories can be differentiated [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]: a personal source
providing personalized recommendations (e.g.
recommendations by friends), a personal source providing non-personalized
recommendations (e.g. user product reviews), an impersonal
source providing personalized recommendations (e.g. typical
RS), and an impersonal source providing non-personalized
recommendations (e.g. a public product advertisement).
Recommendations from a personal source can be further
subdivided based on their tie strength. The tie strength between
social peers describes the strength of their relation and the
degree to which they know each other [
        <xref ref-type="bibr" rid="ref19 ref20">20, 19</xref>
        ]. Prior research
in personal recommendation sources has focused mostly on
sources with strong social ties towards the active user, e.g.
friends, and often claimed recommendations by personal
sources with a strong tie strength to be superior to personalized
recommendations provided by an impersonal source [
        <xref ref-type="bibr" rid="ref1 ref30 ref31">30, 31,
1</xref>
        ]. However, it remains unclear whether, and under which
circumstances, the same applies to personal sources with
weaker tie strengths. Only few attempts have been undertaken to
compare personal sources to those generated by an impersonal
RS (e.g. [
        <xref ref-type="bibr" rid="ref18 ref25 ref5">18, 25, 5</xref>
        ]).
      </p>
      <p>
        When it comes to the accuracy of preference predictions,
automated RS in general seem to perform better than users [
        <xref ref-type="bibr" rid="ref18 ref25">18, 25</xref>
        ].
However, this might be true only under certain circumstances.
A study conducted by Krishnan et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] showed that
automated RS were more accurate in their recommendations, but only
on average. Humans were found to be superior in
recommending for preference profiles that lay outside the mainstream.
A small number of expert users, who had a high knowledge
of the item domain, was even able to outscore the
automated system overall. While Krishnan et al. mainly focused on
accuracy, they also suggest further dimensions for which it
seems worthwhile to compare performances of humans and
automated systems, namely diversity, novelty, and the trust a
user has in the recommendations and recommendation source,
respectively.
      </p>
      <p>
        Trust is a multidimensional construct and a vast variety of
terminology has been used to describe it. In this paper we
follow the interdisciplinary model of trust in online situations1
of McKnight et al. [
        <xref ref-type="bibr" rid="ref21 ref22">22, 21</xref>
        ]. Based on the well-established
theory of reasoned action [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], this model explains
mechanisms that lead to trust-related behavior, such as making an
online purchase, sharing information with someone, or taking
advice. Before trust-related behavior is performed, trusting
intentions must be present. Trusting intentions directly
describe the willingness and probability of a person to commit to
a trust-related behavior. Three central constructs, which are
interconnected among each other, are central for establishing
trusting intentions: disposition to trust, institution-based trust,
and trusting beliefs. The disposition to trust describes the
general trusting stance and overall trustfulness of a person. A
person’s faith in humanity constitutes an example for
disposition to trust. Institution-based trust, on the other hand, arises
in certain situations and depends highly on the environment
in which the trust-related behavior is going to take place (e.g.
the trust in the Internet security during an online purchase).
Finally, trusting beliefs concern characteristics of the trustee.
According to McKnight et al. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], integrity (the trustee’s
reliability and honesty), benevolence (favorable motives based on
altruism, such as goodwill) and competence (the trustee’s
general ability to fulfill the truster’s needs) constitute the trusting
beliefs.
      </p>
      <p>
        These characteristics align with other literature on trust, even
though the terminology partly differs. In this sense,
competence can be linked to a trustee’s expertise [
        <xref ref-type="bibr" rid="ref24 ref34">24, 34</xref>
        ], which is
often considered a key factor regarding trust towards an
information source [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ]. Integrity, on the other hand, aligns
with trustworthiness [
        <xref ref-type="bibr" rid="ref24 ref34">24, 34</xref>
        ]. Trustworthiness is sometimes
also linked with benevolence, describing the willingness to
share information and general goodwill of the trustee [
        <xref ref-type="bibr" rid="ref12 ref21">21, 12</xref>
        ].
Trusting beliefs can also concern a recommendation provider
as special case of information source. Then, expertise
describes the general ability of providing accurate recommendations,
while trustworthiness focuses more on whether a
recommendation provider is unbiased when creating recommendations
[
        <xref ref-type="bibr" rid="ref34">34</xref>
        ].
1Note that this regards situations of initial trust only, i.e. when no
long-term trust relationship has been established yet.
      </p>
      <p>
        However, other aspects undoubtedly influence a user’s trusting
beliefs with respect to a recommendation source as well. One
is the perceived similarity, also termed homophily [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] or
affinity [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], between provider and receiver of recommendations
[
        <xref ref-type="bibr" rid="ref14 ref34">14, 34</xref>
        ]. The effectiveness of perceived similarity is highly
dependent on context and the situation in which a
recommendation appears. Moreover, a higher similarity may sometimes
lead to a decrease in the perceived trustworthiness [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ]. In
online situations, where the recommendation giver cannot be
met in person, the degree of perceived social presence may
affects a user’s trust and reuse intention as well [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
Several studies have investigated how such traits can
effectively be conveyed by a RS. Herlocker et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] found that
increasing transparency, e.g. by explaining the reasons that
led the system to recommend certain items, also increases the
users’ perceived trustworthiness of recommendations. More
recently, Pu et al. [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] proposed a trust model for RS that
aims to raise the perceived trustworthiness of predictions by
explaining the advantages and trade-offs of each
recommended item. Bonhard et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] evaluated a movie recommender
interface that visualized the recommendation giver’s similarity
to the target user in terms of shared interests and rating overlap.
Their results show that users favored recommendations from
people similar to themselves.
      </p>
      <p>Besides, explicitly depicted traits of a recommendation source
(especially expertise and similarity) seem to have seldom been
subject of research regarding trust in RS.</p>
      <p>METHOD
We conducted a user study consisting of two consecutive
experiments under controlled conditions. Both experiments were
based on a between-subject design. Under different
conditions, distinct visual hints were provided regarding (1) the
indication of the recommendation source itself, i.e. personal
vs. impersonal, and (2) a personal recommendation source’s
degree of expertise and similarity. For all conditions we used
the prototype described at the end of this chapter.</p>
      <p>We recruited 88 participants (45 female) with an average age
of 25:6 (SD = 0:52). Most of them were students (45) or
employees (35). To interact with the RS prototype and to answer
questionnaires, participants used a common web browser on
a desktop PC (24” LCD-screen with a 1920 1200px
resolution). In the following, we describe the experimental setup,
prototype system, procedure as well as the questionnaires used
in the study.</p>
      <p>
        Initial Setup
Before beginning the first experiment, participants were asked
to fill in an online questionnaire. This was used to evaluate
prior knowledge of the domain using items from Knijnenburg
et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. In addition, we assessed the participant’s
disposition to trust and institution-based trust using constructs by
McKnight et al. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. We also asked participants to state
general demographics.
      </p>
      <p>
        Subsequently, participants were asked to complete a
preliminary task that served for eliciting personal preferences. For
this, 10 popular movies had to be rated on a 5-point scale.
Movies were shown in random order and users could skip
movies that were unknown to them. This is a common method
known to yield good results [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and that is frequently used in
comparable user studies. Based on these ratings, user profiles
were calculated according to [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ].
      </p>
      <p>First Experiment
Conditions: In the first controlled experiment, we wanted to
compare the users’ perception of personalized
recommendations generated by personal and impersonal sources with respect
to its influence on the perceived social presence (see RQ1).
In particular, we defined four conditions with the following
indications regarding the recommendation source:
Conventional impersonal RS (RSauto)
Personal source without further information (Userneutral)
Personal source with indication of high expertise (Userexp)
Personal source with indication of high similarity (Usersim)
Procedure: First, participants were randomly assigned to one
of the conditions above. Participants in conditions Userneutral,
Userexp, and Usersimwere told that their initially elicited
preference were being sent to a specifically selected person sitting
in the next room. Said person would then manually select and
transmit back appropriate recommendations, which could be
visualized afterwards. Even though our RS generated
recommendations instantly in the background, the recommendation
process was delayed artificially in order to simulate a manual
selection process and thus introduce some realism. Based
on the results of a pre-study, we limited the delay to 46
seconds, which was shown to be realistic while not appearing
too tiresome. To add further realism, a loading screen was
displayed during this waiting period, which consecutively
depicted four processing steps: (1) ’Searching user.’, (2) ’User
received preferences.’, (3) ’User selects items to recommend.’,
(4) ’Receiving recommendations.’. Participants in condition
RSautowere presented with recommendations instantly.
Independently of the particular condition, 5 of the top-10
recommendations generated by a standard recommendation
algorithm (explained later in this chapter) were shown to the user.
Additionally, specific information about the recommendation
source were depicted. For the three conditions with a personal
recommendation source, one of two2 iconic user avatars was
shown randomly. In conditions Userexpand Usersimthe avatar
was combined with symbols indicating either high expertise
or high similarity, respectively.</p>
      <p>
        After participants had examined the recommendations and
visual cues about the recommendation source closely, they
were asked to rate recommendations and fill in a questionnaire.
We used instruments by Gefen and Straub [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ] to measure
the perceived social presence. The tie strength was assessed
using constructs from Money et al. [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. In addition, general
recommender performance was measured using the ResQue
evaluation framework introduced by Pu et al. [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. In order to
2Even though we used gender-neutral avatars the depicted nicknames
were not necessarily gender-neutral (Maria463 and Alexander721).
We assigned participants randomly to one of these two profiles to
alleviate gender-based biases as much as possible.
measure trust-related effects caused by the variation of
recommendation sources, we used constructs for trusting beliefs and
trusting intentions by McKnight et al. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>Second Experiment
Conditions: In the second experiment, we focused solely on
recommendations generated by a personal source. We
wanted to inspect the influence of a sources’ indicated expertise
and similarity in more detail (see RQ2). Variation of both
constructs yields, again, four conditions:</p>
      <p>
        Indication of high expertise and high similarity (Exp"Sim")
Indication of high expertise and low similarity (Exp"Sim#)
Indication of low expertise and high similarity (Exp#Sim")
Indication of low expertise and low similarity (Exp#Sim#)
Procedure: After each participant was assigned randomly to a
condition, the same waiting process was simulated as in the
first experiment. Participants were again presented with the
aforementioned cover story that their preferences were being
shown to a selected person. Thereafter, the remaining 5 of
the generated top-10 recommendations were displayed. This
time visual hints for both characteristics of the
recommendation source were shown. Similarly to the first experiment,
participants were asked to rate the recommended items after
examining them and the recommendation source thoroughly.
The same questionnaires as in the first experiment were used
here, albeit with minor changes. Specifically, we replaced
constructs measuring the perceived social presence with items
by Feick and Higie [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] evaluating perceived expertise and
similarity.
      </p>
      <p>
        Prototype
The same prototype was used in all experimental conditions.
Its interface was designed to contain as little visual distractions
as possible. Visual hints about recommendation source and
its characteristics changed depending on the condition and
served as independent variables in our setup.
Recommendations for all conditions were generated using a standard Matrix
Factorization (MF) [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] algorithm. We chose movie
recommendations as our target domain. We used the MovieLens
20M dataset3, which consists of 20 000 263 ratings for 27 278
movies provided by 138 493 users on a 5-point scale to
calculate the underlying MF model. See Figure 1 for a screenshot
of the prototype used during condition Exp"Sim#in the second
experiment.
      </p>
      <p>RESULTS
In the following, we present the results of our evaluation on
how to influence user’s initial trust by varying the
aforementioned recommendation source’s traits. First, we provide a
general description of the sample’s properties followed by an
in-depth analysis of the two experiments conducted. In the
last step, we utilize Structural Equation Modeling to reveal
structural relationships between variations in the
recommendation source’s properties and trust-related constructs. We
set the statistical significance level to a = :05. For post hoc
comparisons, we used Tukey-Test.
3http://grouplens.org/datasets/movielens/20m/
Your personal recommendations arrived!
Due to your preferences the following recommendations have been created for you by user Maria463
Information about the user:</p>
      <p>The movieratingsof Maria463 are not very similar toyour movie ratings.</p>
      <p>General
Overall, participants reported that they had an average
knowledge about movies (M = 3:11, SD = 1:1) and a rather high
trust in technology (M = 3:85, SD = 0:54). The general
disposition to trust another person was rated relatively high
(M = 4:64, SD = 1:24) while institution-based trust was rated
moderately (M = 3:45, SD = 0:93).</p>
      <p>First Experiment
Checking for differences between groups, we found a weak
indication of sample selection bias, F(3; 84) = 2:65; p =
:05; hp2 = :09. Post hoc tests revealed that participants in
condition Usersim had a significantly lower dispositional trust
than the ones in Userexp, p = :041. As a result, in order
to maintain internal validity, the follow-up analyses were
carefully controlled for the effect of the confounding
variable disposition to trust. We found no significant differences
for the other trust-related antecedent institution-based trust,
F(3; 84) = 1:13; p = :342; hp2 = :04. We conducted a
oneway MANCOVA, with disposition to trust as a covariate, to
compare the effect of personal vs. impersonal
recommendation (i.e. condition) sources on non-static trust-related
constructs, i.e. trusting beliefs and trusting intentions, as well
as perceived social presence and use intentions. The
estimated marginal means for the four conditions are
presented in Table 1. The multivariate effect with F(12; 246) =
1:26; p = :421; hp2 = :05 for condition was not significant.
However, we concluded that further explorative analyses could
lead to meaningful insights. Analyzing the between-subject
effects, we could observe that condition has a small effect
on social presence, F(3; 83) = 2:59; p = :058; hp2 = :086.
Although the covariate’s overall effect was not significant,
F(4; 80) = 1:5; p = :209; hp2 = :07, inspection of the
betweensubject effects yielded a significant influence on trusting
intentions, F(1; 83) = 4:96; p = :029; hp2 = :06. On average,
participants rated the quality of each of their recommendations
with M = 2:9 (SD = 0:85) on a 5-point scale. No differences
between groups could be identified.</p>
      <p>Second Experiment
For the second experiment, we used one-way MANOVA to test
the effect from condition, i.e. the variation of similarity and
expertise of a personal recommendation source, on perceived
expertise, perceived similarity, trusting belief, trusting intentions
and use intentions. See Table 2 for descriptive statistics. The
multivariate effect for condition was significant, F(15; 246) =
2:22; p = :006; hp2 = :12. Inspecting the univariate ANOVAS,
we could observe significant influences on perceived expertise,
F (3; 84) = 4:44; p = :006; hp2 = :14, and a tendency for
perceived similarity, F (3; 84) = 2:01; p = :12; hp2 = :07. Post-Hoc
tests indicate that perceived expertise was rated significantly
higher for Exp"Sim"than for Exp#Sim#(p = :006) as well as
Exp#Sim"(p = 0:27). Comparable to the results of the first
experiment, the average rating for each recommendation was
assessed with M = 2:9 (SD = 0:93). Again, there were no
differences between groups.
Structural Equation Modeling
Since we were particularly interested in deriving suggestions
about how and which properties of the recommendation source
influences trust into the recommendations (see RQ3), we used
Structural Equation Modeling (SEM) to further investigate
the effect that the degree of similarity and expertise have on
trust-related constructs.</p>
      <p>Our theoretical model is displayed in Figure 2. It
yielded a good fit with the data (c 2(106) = 126:059, p = :089,
CF I = :982, T LI = :977, RMSEA = 0:046). The model
indicates that displaying whether a recommendation source is
an expert or not (condition) significantly influences perceived
expertise. However, with R2 = :10 the amount of explained
variance is rather low. Similarly, perceived similarity towards the
recommendation source is influenced by indicating similarity
in the interface (condition). Disposition to trust additionally
significantly predicts perceived similarity. Together, condition
and disposition to trust account for 20% of the variance in
perceived similarity (R2 = :20).</p>
      <p>Both perceived expertise and perceived similarity are related
to trusting beliefs with R2 = :73. While there is no direct
effect from disposition to trust toward trusting beliefs (b =
0:06, p = :416), there is a significant indirection via perceived
similarity (b = 0:08, p = :05) resulting in a total effect of
b = :13, p = :054.</p>
      <p>Trusting intentions is directly influenced by trusting beliefs
and perceived similarity. Some portion of the predictive power
from perceived similarity, however, gets mediated by trusting
beliefs yielding an indirect effect of b = 0:187, p = :012 and
a total effect of b = 0:445, p &lt; :001. Another mediation is
present for perceived expertise via trusting beliefs (b = 0:501,
p &lt; :001). Combined with the non-significant direct relation
(b = 0:118, p = :292), the model achieves a total effect of
b = 0:384, p = :001. Finally, one can observe a significant
total effect (b = 0:189, p = :01) from disposition to trust
on trusting intentions when combining the non-significant
direct (b = 0:132, p = :052) and indirect (b = 0:06, p =
:055) influence via the route perceived similarity and trusting
beliefs. Put together, all influencing variables yield an amount
of explained variance of R2 = :78.</p>
      <p>DISCUSSION
The SEM (Figure 2) shows that the conditions during the
second experiment had a significant influence on perceived
expertise and perceived similarity of the recommendation source.
This is especially noteworthy given that the conditions only
featured minor visual differences: small arrows next to an icon
for each trait. The implication is that these subtle indications
were indeed persuasive. Following the paths of our SEM
further, one can observe that perceived expertise and perceived
similarity influenced the user’s trusting beliefs and trusting
intentions. Thus, it seems theoretically possible to control
the user’s trust in recommendations by only manipulating the
depicted expertise and similarity of a recommendation source.
This also seems to hold for the perceived social presence
during the first experiment. Here the condition had an influence
on the perceived social presence, even though the measured
effect was rather low.</p>
      <p>With respect to our initial research questions, our findings
seem promising. The depiction of an iconic user avatar
influenced the perceived social presence (RQ1). Moreover,
providing indications of expertise and similarity had an impact on
the perception of these traits (RQ2). Finally, these traits were
shown to influence the users’ trust (RQ3).</p>
      <p>As stated above, the condition comparing indicators of
expertise and similarity had influence on perceived expertise and
perceived similarity. However, condition only accounts for
roughly 10% of variance in both. We ascribe this to the fact
that users in our setting had no real explanation of these traits
other than simple icons with labels. It follows that the main
portion of variance was caused by factors not identified in our
model.</p>
      <p>
        While perceived expertise and perceived similarity, taken
together, have a notable influence on trusting beliefs, perceived
similarity also directly affects trusting intentions. If trusting
intentions is composed of the willingness to share information
[
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], the direct relation can be explained as follows: One is
more likely to share information with a seemingly similar
person than with an expert. Trusting intentions thus appear to be
more reciprocal than trusting beliefs.
      </p>
      <p>
        Since the mean values for perceived similarity are, overall,
lower than for expertise (see Table 2), we assume that it’s
Condition
harder to convey similarity. This is further underlined by the
fact that, even though we found an influence of condition to
perceived similarity in the SEM, there was no significant
correlation in ANOVA. We conclude that the measured perceived
similarity is a borderline case: While users indeed perceived
some degree of similarity depending on the visual indications,
they need more information about a recommendation source
than we presented to really decide if there exists an overlap in
interests with respect to the target domain. Interestingly, our
definition of similarity, which is based on rating behavior (see
tooltip in Figure 1), aligns with often-used phrases used for
providing explanations in automated recommender systems,
e.g. “Similar users also bought...”. Considering our findings,
we question whether phrases like these are effective enough
means to convey similarity in a plausible way. It might thus
be beneficial to explore the influence of richer visual elements
like, for instance, those found by Bonhard and Sasse [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
When examining descriptive values in Table 1, the highest
average perceived social presence can be found in condition
Userneutral. Both other conditions of personal sources are
lower in tendency, with the condition Usersimalso showing
significant differences. This is surprising because similar
visual indicators for the source were used. The trend continues
when examining other mean values of the condition Usersim.
Strangely, all values were lower in their tendency compared
with other conditions. Even though we do not have a final
explanation for this effect, we assume it is the result of some
form of bias that we were unable to measure. (Note that we
identified disposition to trust as a confounding variable, which
we subsequently integrated as a covariate into our analyses.)
CONCLUSIONS AND OUTLOOK
In this paper we have introduced a user study to compare
personal and impersonal recommendation sources and the
influences of traits of personal recommendation sources on a
user’s trust in recommendations. When comparing distinct
personal sources with different traits, we found that the
recommendation provider’s expertise and similarity to the target user
do influence the latter’s trust in the recommended items. We
further investigated how traits of a personal recommendation
source can be conveyed visually. In particular, we showed that
very subtle visual cues are sufficient to trigger perceptions of
social presence, expertise and similarity towards a
recommendation source. In addition, we add evidence that perceptions
of these traits can increase a user’s trust in recommendations.
These findings yield several interesting implications. In
systems that already exploit personal recommendation sources,
subtle indications of expertise and similarity might be
considered for increasing the user’s trust in the generated predictions.
In such systems, these traits may also serve as criteria for
deciding which peers to select as candidates for providing
recommendations. In systems that do not rely on personal
recommendation sources, including elements for conveying
social features could be considered. This is due to our findings
that social presence alone may increase trust in the
recommendations.
      </p>
      <p>Our approach has some limitations. The effects of highlighting
properties regarding the recommendation source on the users’
perceptions have been of minor significance. This might be
due to the very subtle elements we used. Nonetheless, the
perceived expertise and similarity clearly have a significant
influence on building short-term trust. In order to further
increase this influence, additional trust-building traits of the
recommendation source could be depicted visually. Here,
related literature indicates traits such as the source’s benevolence
or its integrity as possible candidates. However, depicting
these traits might not be as straightforward and could require
the development of more sophisticated visual elements. For
the future, we are thus interested in further investigating
means to communicate properties of recommendation sources
effectively. We also plan to integrate them with automated
recommender functions, which may lead to interesting
reciprocal effects.
to Generate Recommendation Data. In Proceedings of the
9th ACM Conference on Recommender Systems (RecSys
’15). ACM, New York, NY, USA, 305–308.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Sam</given-names>
            <surname>Banks</surname>
          </string-name>
          , Rachael Rafter, and
          <string-name>
            <given-names>Barry</given-names>
            <surname>Smyth</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>The Recommendation Game: Using a Game-with-a-Purpose</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Shlomo</given-names>
            <surname>Berkovsky</surname>
          </string-name>
          , Ronnie Taib, and
          <string-name>
            <given-names>Dan</given-names>
            <surname>Conway</surname>
          </string-name>
          .
          <year>2017</year>
          .
          <article-title>How to Recommend?: User Trust Factors in Movie Recommender Systems</article-title>
          .
          <source>In Proceedings of the 22nd International Conference on Intelligent User Interfaces Companion (IUI '17 Companion)</source>
          . ACM, New York, NY, USA,
          <fpage>287</fpage>
          -
          <lpage>300</lpage>
          . DOI: http://dx.doi.org/10.1145/3025171.3025209
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Philip</given-names>
            <surname>Bonhard</surname>
          </string-name>
          , Clare Harries,
          <string-name>
            <surname>John McCarthy</surname>
            , and
            <given-names>M. Angela</given-names>
          </string-name>
          <string-name>
            <surname>Sasse</surname>
          </string-name>
          .
          <year>2006</year>
          .
          <article-title>Accounting for Taste: Using Profile Similarity to Improve Recommender Systems</article-title>
          .
          <source>In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '06)</source>
          . ACM, New York, NY, USA,
          <fpage>1057</fpage>
          -
          <lpage>1066</lpage>
          . DOI: http://dx.doi.org/10.1145/1124772.1124930
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>P.</given-names>
            <surname>Bonhard</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Sasse</surname>
          </string-name>
          .
          <year>2006</year>
          . 'Knowing Me, Knowing You'
          <article-title>- Using Profiles and Social Networking to Improve Recommender Systems</article-title>
          .
          <source>BT Technology Journal</source>
          <volume>24</volume>
          ,
          <issue>3</issue>
          (
          <year>2006</year>
          ),
          <fpage>84</fpage>
          -
          <lpage>98</lpage>
          . DOI: http://dx.doi.org/10.1007/s10550-006-0080-3
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Shuo</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Harper</surname>
          </string-name>
          , Lingfei He, and
          <string-name>
            <given-names>Loren</given-names>
            <surname>Terveen</surname>
          </string-name>
          .
          <year>2016</year>
          .
          <article-title>CrowdLens: Experimenting with Crowd-Powered Recommendation and Explanation</article-title>
          .
          <source>In Proceedings of the Tenth International AAAI Converence on Web and Social Media (ICWSM)</source>
          .
          <volume>52</volume>
          -
          <fpage>61</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Jaewon</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <source>Hong Joo Lee, and Yong Cheol Kim</source>
          .
          <year>2009</year>
          .
          <article-title>The influence of social presence on evaluating personalized recommender systems</article-title>
          .
          <source>In Pacific Asia Conference on Information Systems (PACIS).</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Paolo</given-names>
            <surname>Cremonesi</surname>
          </string-name>
          , Franca Garzottto, and
          <string-name>
            <given-names>Roberto</given-names>
            <surname>Turrin</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>User Effort vs. Accuracy in Rating-based Elicitation</article-title>
          .
          <source>In Proceedings of the Sixth ACM Conference on Recommender Systems (RecSys '12)</source>
          . ACM, New York, NY, USA,
          <fpage>27</fpage>
          -
          <lpage>34</lpage>
          . DOI: http://dx.doi.org/10.1145/2365952.2365963
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Dale</surname>
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Duhan</surname>
            ,
            <given-names>Scott D.</given-names>
          </string-name>
          <string-name>
            <surname>Johnson</surname>
          </string-name>
          , James B.
          <string-name>
            <surname>Wilcox</surname>
            , and
            <given-names>Gilbert D.</given-names>
          </string-name>
          <string-name>
            <surname>Harrell</surname>
          </string-name>
          .
          <year>1997</year>
          .
          <article-title>Influences on consumer use of word-of-mouth recommendation sources</article-title>
          .
          <source>Journal of the Academy of Marketing Science</source>
          <volume>25</volume>
          ,
          <issue>4</issue>
          (
          <year>1997</year>
          ),
          <fpage>283</fpage>
          . DOI: http://dx.doi.org/10.1177/0092070397254001
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Lawrence</given-names>
            <surname>Feick</surname>
          </string-name>
          and
          <string-name>
            <given-names>Robin A.</given-names>
            <surname>Higie</surname>
          </string-name>
          .
          <year>1992</year>
          .
          <article-title>The Effects of Preference Heterogeneity and Source Characteristics on Ad Processing and Judgements about Endorsers</article-title>
          .
          <source>Journal of Advertising 21</source>
          ,
          <issue>2</issue>
          (
          <year>1992</year>
          ),
          <fpage>9</fpage>
          -
          <lpage>24</lpage>
          . DOI: http://dx.doi.org/10.1080/00913367.
          <year>1992</year>
          .10673364
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>Martin</given-names>
            <surname>Fishbein</surname>
          </string-name>
          and
          <string-name>
            <given-names>Icek</given-names>
            <surname>Ajzen</surname>
          </string-name>
          .
          <year>1975</year>
          .
          <article-title>Belief, attitude, intention and behavior: An introduction to theory and research</article-title>
          . Addison-Wesley, Reading, Mass. [u.a.].
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. David Gefen and
          <string-name>
            <given-names>Detmar W.</given-names>
            <surname>Straub</surname>
          </string-name>
          .
          <year>1997</year>
          .
          <article-title>Gender Differences in the Perception</article-title>
          and
          <article-title>Use of E-Mail: An Extension to the Technology Acceptance Model</article-title>
          .
          <source>MIS Quarterly 21</source>
          ,
          <issue>4</issue>
          (
          <year>1997</year>
          ),
          <fpage>389</fpage>
          -
          <lpage>400</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. David Gefen and
          <string-name>
            <given-names>Detmar W.</given-names>
            <surname>Straub</surname>
          </string-name>
          .
          <year>2004</year>
          .
          <article-title>Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-</article-title>
          <source>Services. Omega</source>
          <volume>32</volume>
          ,
          <issue>6</issue>
          (
          <year>2004</year>
          ),
          <fpage>407</fpage>
          -
          <lpage>424</lpage>
          . DOI: http://dx.doi.org/10.1016/j.omega.
          <year>2004</year>
          .
          <volume>01</volume>
          .006
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Mary</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Gilly</surname>
            , John L. Graham, Mary Finley Wolfinbarger, and
            <given-names>Laura J.</given-names>
          </string-name>
          <string-name>
            <surname>Yale</surname>
          </string-name>
          .
          <year>1998</year>
          .
          <article-title>A Dyadic Study of Interpersonal Information Search</article-title>
          .
          <source>Journal of the Academy of Marketing Science</source>
          <volume>26</volume>
          ,
          <issue>2</issue>
          (
          <year>1998</year>
          ),
          <fpage>83</fpage>
          -
          <lpage>100</lpage>
          . DOI:http://dx.doi.org/10.1177/0092070398262001
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Thomas</surname>
            <given-names>Heath</given-names>
          </string-name>
          , Enrico Motta, and
          <string-name>
            <given-names>Marian</given-names>
            <surname>Petre</surname>
          </string-name>
          .
          <year>2006</year>
          .
          <article-title>Person to person trust factors in word of mouth recommendation</article-title>
          .
          <source>In Proceedings of the 2006 Conference on Human Factors in Computing Systems (CHI '06).</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Jonathan L. Herlocker</surname>
          </string-name>
          , Joseph A.
          <string-name>
            <surname>Konstan</surname>
            ,
            <given-names>and John</given-names>
          </string-name>
          <string-name>
            <surname>Riedl</surname>
          </string-name>
          .
          <year>2000</year>
          .
          <article-title>Explaining Collaborative Filtering Recommendations</article-title>
          .
          <source>In Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work (CSCW '00)</source>
          . ACM, New York, NY, USA,
          <fpage>241</fpage>
          -
          <lpage>250</lpage>
          . DOI: http://dx.doi.org/10.1145/358916.358995
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Bart</surname>
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Knijnenburg</surname>
            , Martijn C. Willemsen, Zeno Gantner, Hakan Soncu, and
            <given-names>Chris</given-names>
          </string-name>
          <string-name>
            <surname>Newell</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>Explaining the User Experience of Recommender Systems</article-title>
          .
          <source>User Modeling and User-Adapted Interaction 22</source>
          ,
          <fpage>4</fpage>
          -
          <lpage>5</lpage>
          (
          <year>2012</year>
          ),
          <fpage>441</fpage>
          -
          <lpage>504</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Yehuda</surname>
            <given-names>Koren</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Robert M. Bell</surname>
            , and
            <given-names>Chris</given-names>
          </string-name>
          <string-name>
            <surname>Volinsky</surname>
          </string-name>
          .
          <year>2009</year>
          .
          <article-title>Matrix Factorization Techniques for Recommender Systems</article-title>
          .
          <source>IEEE Computer 42</source>
          ,
          <issue>8</issue>
          (
          <year>2009</year>
          ),
          <fpage>30</fpage>
          -
          <lpage>37</lpage>
          . DOI: http://dx.doi.org/10.1109/
          <string-name>
            <surname>MC</surname>
          </string-name>
          .
          <year>2009</year>
          .263
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Vinod</surname>
            <given-names>Krishnan</given-names>
          </string-name>
          , Pradeep Kumar Narayanashetty, Mukesh Nathan, Richard T. Davies, and
          <string-name>
            <surname>Joseph</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Konstan</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>Who Predicts Better?: Results from an Online Study Comparing Humans and an Online Recommender System</article-title>
          .
          <source>In Proceedings of the 2008 ACM Conference on Recommender Systems (RecSys '08)</source>
          . ACM, New York, NY, USA,
          <fpage>211</fpage>
          -
          <lpage>218</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>Feng</given-names>
            <surname>Li</surname>
          </string-name>
          and
          <string-name>
            <surname>Timon Du C.</surname>
          </string-name>
          <year>2011</year>
          .
          <article-title>Who is talking? An ontology-based opinion leader identification framework for word-of-mouth marketing in online social blogs</article-title>
          .
          <source>Decision Support Systems</source>
          <volume>51</volume>
          ,
          <issue>1</issue>
          (
          <year>2011</year>
          ),
          <fpage>190</fpage>
          -
          <lpage>197</lpage>
          . DOI: http://dx.doi.org/10.1016/j.dss.
          <year>2010</year>
          .
          <volume>12</volume>
          .007
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Roger</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Mayer</surname>
          </string-name>
          ,
          <string-name>
            <surname>James H. Davis</surname>
            , and
            <given-names>F. David</given-names>
          </string-name>
          <string-name>
            <surname>Schoorman</surname>
          </string-name>
          .
          <year>1995</year>
          .
          <article-title>An Integrative Model of Organizational Trust</article-title>
          .
          <source>The Academy of Management Review</source>
          <volume>20</volume>
          ,
          <issue>3</issue>
          (
          <year>1995</year>
          ),
          <fpage>709</fpage>
          -
          <lpage>734</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>D. Harrison</surname>
            <given-names>McKnight</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Vivek</given-names>
            <surname>Choudhury</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Charles</given-names>
            <surname>Kacmar</surname>
          </string-name>
          .
          <year>2002</year>
          .
          <article-title>Developing and Validating Trust Measures for e-Commerce: An Integrative Typology</article-title>
          .
          <source>Information Systems Research</source>
          <volume>13</volume>
          ,
          <issue>3</issue>
          (
          <year>2002</year>
          ),
          <fpage>334</fpage>
          -
          <lpage>359</lpage>
          . DOI:http://dx.doi.
          <source>org/10.1287/isre.13.3.334.81</source>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>D. Harrison</surname>
            <given-names>McKnight</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Larry L. Cummings</surname>
            ,
            <given-names>and Norman L.</given-names>
          </string-name>
          <string-name>
            <surname>Chervany</surname>
          </string-name>
          .
          <year>1998</year>
          .
          <article-title>Initial Trust Formation in New Organizational Relationships</article-title>
          .
          <source>The Academy of Management Review</source>
          <volume>23</volume>
          ,
          <issue>3</issue>
          (
          <year>1998</year>
          ),
          <fpage>473</fpage>
          -
          <lpage>490</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23. R. Bruce Money, Mary C. Gilly,
          <string-name>
            <given-names>and John L.</given-names>
            <surname>Graham</surname>
          </string-name>
          .
          <year>1998</year>
          .
          <article-title>Explorations of National Culture and Word-of-Mouth Referral Behavior in the Purchase of Industrial Services in the United States and Japan</article-title>
          .
          <source>Journal of Marketing 62</source>
          ,
          <issue>4</issue>
          (
          <year>1998</year>
          ),
          <fpage>76</fpage>
          -
          <lpage>87</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Daniel J. O'Keefe</surname>
          </string-name>
          .
          <year>1990</year>
          .
          <article-title>Persuasion: Theory and research</article-title>
          . Sage Publications, Inc, Thousand Oaks, CA, US.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Peter</surname>
            <given-names>Organisciak</given-names>
          </string-name>
          , Jaime Teevan, Susan Dumais, Robert C.
          <string-name>
            <surname>Miller</surname>
          </string-name>
          , and Adam Tauman Kalai.
          <year>2014</year>
          .
          <article-title>A Crowd of Your Own: Crowdsourcing for On-Demand Personalization</article-title>
          .
          <source>In Second AAAI Conference on Human Computation and Crowdsourcing (HCOMP</source>
          <year>2014</year>
          ).
          <source>AAAI - Association for the Advancement of Artificial Intelligence.</source>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Pearl</surname>
            <given-names>Pu</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Li</given-names>
            <surname>Chen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Rong</given-names>
            <surname>Hu</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>A User-centric Evaluation Framework for Recommender Systems</article-title>
          .
          <source>In Proceedings of the Fifth ACM Conference on Recommender Systems (RecSys '11)</source>
          . ACM, New York, NY, USA,
          <fpage>157</fpage>
          -
          <lpage>164</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Pearl</surname>
            <given-names>Pu</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Li</given-names>
            <surname>Chen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Rong</given-names>
            <surname>Hu</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>Evaluating recommender systems from the user's perspective: survey of the state of the art</article-title>
          .
          <source>User Modeling and User-Adapted Interaction 22</source>
          ,
          <issue>4</issue>
          (
          <year>2012</year>
          ),
          <fpage>317</fpage>
          -
          <lpage>355</lpage>
          . DOI: http://dx.doi.org/10.1007/s11257-011-9115-7
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>Steffen</given-names>
            <surname>Rendle</surname>
          </string-name>
          and
          <string-name>
            <given-names>Lars</given-names>
            <surname>Schmidt-Thieme</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>Online-updating regularized kernel matrix factorization models for large-scale recommender systems</article-title>
          .
          <source>In Proceedings of the 2008 ACM conference on Recommender systems. ACM</source>
          ,
          <volume>251</volume>
          -
          <fpage>258</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>Sylvain</given-names>
            <surname>Senecal</surname>
          </string-name>
          and
          <string-name>
            <given-names>Jacques</given-names>
            <surname>Nantel</surname>
          </string-name>
          .
          <year>2004</year>
          .
          <article-title>The influence of online product recommendations on consumers' online choices</article-title>
          .
          <source>Journal of Retailing 80</source>
          ,
          <issue>2</issue>
          (
          <year>2004</year>
          ),
          <fpage>159</fpage>
          -
          <lpage>169</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <given-names>Rashmi</given-names>
            <surname>Sinha</surname>
          </string-name>
          and
          <string-name>
            <given-names>Kirsten</given-names>
            <surname>Swearingen</surname>
          </string-name>
          .
          <year>2001</year>
          .
          <article-title>Comparing Recommendations Made by Online Systems and Friends</article-title>
          . In
          <source>In Proceedings of the DELOS-NSF Workshop on Personalization and Recommender Systems in Digital Libraries.</source>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Donnavieve</surname>
            <given-names>Smith</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Satya</given-names>
            <surname>Menon</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Sivakumar</surname>
          </string-name>
          .
          <year>2005</year>
          .
          <article-title>Online peer and editorial recommendations, trust, and choice in virtual markets</article-title>
          .
          <source>Journal of Interactive Marketing</source>
          <volume>19</volume>
          ,
          <issue>3</issue>
          (
          <year>2005</year>
          ),
          <fpage>15</fpage>
          -
          <lpage>37</lpage>
          . DOI: http://dx.doi.org/10.1002/dir.20041
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Patricia</surname>
            <given-names>Victor</given-names>
          </string-name>
          , Martine de Cock, and
          <string-name>
            <given-names>Chris</given-names>
            <surname>Cornelis</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Trust and Recommendations</article-title>
          . In Recommender Systems Handbook, Francesco Ricci, Lior Rokach, Bracha Shapira, and Paul B.
          <source>Kantor (Eds.)</source>
          .
          <source>Springer US</source>
          ,
          <volume>645</volume>
          -
          <fpage>675</fpage>
          . DOI: http://dx.doi.org/10.1007/978-0-
          <fpage>387</fpage>
          -85820-3_
          <fpage>20</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Kyung-Hyan Yoo</surname>
            and
            <given-names>Ulrike</given-names>
          </string-name>
          <string-name>
            <surname>Gretzel</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>The influence of perceived credibility on preferences for recommender systems as sources of advice</article-title>
          .
          <source>Information Technology &amp; Tourism</source>
          <volume>10</volume>
          ,
          <issue>2</issue>
          (
          <year>2008</year>
          ),
          <fpage>133</fpage>
          -
          <lpage>146</lpage>
          . DOI: http://dx.doi.org/10.3727/109830508784913059
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Kyung-Hyan</surname>
            <given-names>Yoo</given-names>
          </string-name>
          , Ulrike Gretzel, and
          <string-name>
            <given-names>Markus</given-names>
            <surname>Zanker</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>Source Factors in Recommender System Credibility Evaluation: Recommender Systems Handbook</article-title>
          . In Recommender Systems Handbook, Francesco Ricci, Lior Rokach, and Bracha Shapira (Eds.). Springer US, Boston, MA,
          <fpage>689</fpage>
          -
          <lpage>714</lpage>
          . DOI: http://dx.doi.org/10.1007/978-1-
          <fpage>4899</fpage>
          -7637-6_
          <fpage>20</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>