<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>User Trust Graph: A Model to Measure Trustworthiness</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>1School of Information Technology, Carleton University, Ottawa, Canada</string-name>
          <email>amirsam.khataei@carleton.ca</email>
          <email>arya@carleton.ca</email>
          <email>mike.hine@carleton.ca</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>2Sprott School of Business, Carleton University</institution>
          ,
          <addr-line>Ottawa</addr-line>
          ,
          <country country="CA">Canada</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>93</fpage>
      <lpage>101</lpage>
      <abstract>
        <p>In this paper, we address the problem of evaluating the trustworthiness of a user in different types of Twitter graphs. We discuss this within the context of a persuasive recommender system that aims at creating personalized content using social media and other personal information. Twitter has been established as an alternative type of information resource due to its simplicity and its enormous number of users who transmit diverse information in real time. There is evidence that people are becoming increasingly reliant on others' opinion through their social network accounts. Trustable opinion is influential in persuading individuals to purchase products or support policy makers. The domain varies from consumer market to news and politics. Evaluating trust between two people is a delicate subject. In Twitter, neither the social graph nor structured data such as total number of likes or common retweets are sufficient to measure the trustworthiness of a user within a given social group. It is important to consider the actual sentiment associated with the tweets shared between the two parties. Existing approaches only consider relationships among users based on structured data. In this paper, we introduce a new approach to calculate a trust score as a function of time and tweet sentiment.</p>
      </abstract>
      <kwd-group>
        <kwd>Trust</kwd>
        <kwd>Persuasive</kwd>
        <kwd>Twitter</kwd>
        <kwd>Network</kwd>
        <kwd>Personalization</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Twitter offers a venue where people can express their feelings, share their opinion, and
get reviews from other users. These activities result in the generation of a rich source
of information on different aspects of life. Such user-generated information ranges from
health and politics to product and service reviews. Still, “opinionative information” can
be generated by different people in different format (image or text) with various
relations to us. The opinion can be a picture that is shared by an iconic public figure, an
organization who we strongly support or a credible colleague who we personally know.
Alternatively, the opinion might be a tweet that is published by someone who is part of
our social network but not trusted, or with different taste and standards.
There is evidence that people are becoming increasingly reliant on others’ opinion
through their social network accounts like Twitter [1][2]. Their online peers are
influencing their knowledge, opinions, and behaviors through the information stream and
social dynamics within these sites [3][4][5][6]. Such influence can be essential in
persuading people to perform an action, buy a product, or attend an activity. For example,
a restaurant’s promotional material can be more persuasive to an individual if they are
customized to each viewer and incorporate photos from past festive events attended by
the receiver or their friends, or positive quotes from trusted friends about that restaurant.
We are more likely to support a cause or perform any action if our friends show support
for it, but it depends on how much we trust those friends. With the rapid growth of
usergenerated content published on Twitter, a tool for mining said content to assess
sentiments and opinions while evaluating the trustworthiness of the content on a large scale
becomes essential. There have been many studies within the field of trust-based social
recommender systems. Some preliminary literature demonstrates the advantages of
applying factor of trust in recommendation marking [9] [10].</p>
      <p>Previous work by the authors [7] has made initial inroads into this topic. Our initial goal
was to demonstrate the value of aggregating trustable opinionative information with
product reviews to persuade individuals by creating personalized content. Their
objective was to introduce the essential components involved in collecting supporting
opinions from reader’s trustworthy sources to support the personalized content. Pang and
Lee [8] and Ravi [1] published an inclusive survey of methods and approaches in the
field of opinion mining. Though, without identifying the trustable source for the
opinion, the personalized content may not become persuasive.</p>
      <p>Due to the importance of product and service reviews to product vendors and
policymakers, there is extensive interest in this line of research [9][10][1]. The focus of the
work referenced above is to design a system to enable organizations to analyze and
aggregate their customers’ attitudes towards a product or service. They consider
different dimensions such as time, geographical location, and personal/professional
experience. With years of research, we are now able to collect and aggregate opinionative
information but measuring the trustworthiness of the opinion source has yet to be
incorporated.</p>
      <p>However, the above approaches were limited in their reliance on social graphs and it
did not consider user trust. On Twitter, most users follow back their followers in
accordance with mere formal courtesy. Only a few percent of users in follow relationships
communicate with each other [6]. Therefore, an algorithm that is using only a Twitter
social graph consisting of only following relationships is not sufficient.
Based on the above need, we propose the new User Trust Graph which consists of nodes
(corresponding to user accounts and tweets), and edges (corresponding to follow and
retweet relationships). Unlike the Twitter social graph, which is relatively static, the
user trust graph is dynamic and reconstructed when a user mentioned the other user in
a tweet, both users share a common retweet/hashtag, and a user likes the other user’s
tweet.
After discussing the technical issues of creating the user trust graph by using
opinionoriented information, we focus on the central problems of designing the actual model.
In the next section, the related work and the existing gaps in research have been
reviewed. Following that, we present some background information about our proposed
model, a general overview of the trust calculation procedure, and some implementation
notes. This is followed by some conceptual results and examples. Finally, we describe
the primary application that will benefit from the model, how this model can be
improved and what work remains to be done in the future phases of the research.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related work</title>
      <p>As discussed in the previous section, the most natural and intuitive graph to represent
follow-followee relation is the social graph. This graph is extensively studied by Kawak
[10]. He demonstrated social graph flaws as a mean to investigate the role of Twitter as
a social or information network [11]. As previously discussed, this form of graph does
not capture any reliable information on trust.</p>
      <p>The idea of ranking tweets is introduced and explored in TwitterRank [12] and TURank
[13]. These approaches measure the users’ influence considering the link structure of
follow relationships, the similarity between users, and the number of posts. The models
are based on a false assumption that a user only retweets a tweet if it appears to contain
useful information because he/she wants to share it with his/her followers. After all,
people retweet sometimes to show their opposition and disagreement with a news or a
content. In addition, both models do not reflect tweets’ sentiment in their algorithms.
Although this research is close to our research, measuring the influence is inadequate
to be interpreted as measuring trust strength.</p>
      <p>Srijith and colleagues [14] propose to assess the trustworthiness of tweets based on the
analysis of the entire tweet ecosystem spanning across tweets, users, and the web.
Although they are using tweet popularity as a factor to demonstrate the credibility of the
tweet space, in the user space their model is limited to implicit links between the users
based on the follower-followee relationships. On the other hand, as noted previously,
ranking tweets based on popularity should not count as trustworthiness.
The Mention Graph was first designed to improve the identification of authoritative
accounts, to discover active and dynamic communities, or to assign weights to the
follow relationships [14]. It has also become an alternative to Social Graph. In the mention
graph, each node represents a Twitter account. A directed edge between two nodes a
and b exists if the account a mentions the account b in at least one tweet. The Mention
Graph is also suitable to identify the authoritative users who are main original content
publishers within a social group. However, being the content publisher should not be
the sole indicator of trustworthiness.</p>
      <p>Current research has not yet taken into proper consideration that people’s relations are
not just the matter of total number of retweets, likes, or followers. The role of feelings
(sentiments) need to be considered more. The User Trust Graph is a step toward
inclusion of sentiments in the subject of social graphs.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Proposed Model</title>
      <p>We model interactions between two Twitter users by defining the User Trust Graph. In
this graph, each node represents a user. There are two types of edges that exist in this
graph: directed and undirected. A directed edge between two nodes a and b exists if
user a mentions user b in at least one tweet or likes a tweet from user b or retweets at
least one of user b’s tweets. When two users share a common hashtag or retweet, there
is an undirected edge between two nodes. This is illustrated in Fig. 1.
We perform sentiment analysis on the interaction between users and assign a positive,
neutral or negative score. Despite the sentiment of a tweet’s content, when a user
retweets another person’s tweet, the interaction is considered as a positive score. But a
negative quote by the user on the same tweet would take precedence over the positive
score. Intuitively, a greater positive score is interpreted as stronger trust strength
between the two users. Besides, in contrast with the social graph which is static, this graph
is reconstructed whenever a new activity such as a retweet, mentioned a user in a tweet
or adding a like occurs.</p>
      <p>Human relations may change over time and correspondingly the strength of trust varies
between two people over time as well. As discussed by Dai and Davison [15],
information should be ranked based on recency. Further, recent interaction with a positive
sentiment is interpreted as a shared current interest between the users. To apply recency
during weight calculation, edges (user’s interactions) are labeled with the event
timestamps. This allows us to filter edges based on temporal parameters to measure the
trend within a given time frame.</p>
      <p>Having obtained a user trust graph, we then try to calculate the weight of each
interaction. Equation 1 is based on the idea of defining trust as a function of time. Here if the
edge (interaction) from node a to node b exists with sentiment value e, the trust weight
for the interaction is w = e /t where t is the weight coefficient for the given timestamp.
The weight coefficient depends on two factors:
1. TEab: The elapsed time from the interaction time (et) between user a and b,
to the current time.
In Equation 3,   = {  1,   2, … ,   } : a set of all form of sentiment score in
the form of likes, retweets, and mentioned that user a gives user b’s content.
While DT is the direct trust strength, there are also common preferences and content in
the form of retweets and hashtag exist between two users. This data would also be used
as a second source of input to improve the trust strength prediction, though there is no
direct interaction or no trust path from the user a to user b. This value is demonstrated
as CT. As demonstrated in Equation 4, DT and CT become the foundation for Twitter
Trust Weight (Tab).</p>
      <p>TIab: The elapsed time from the first interaction time between user a and b,
to the current time.
This leads us to Equation 2, where DT is the direct trust experience from a to b within
a given domain and W is the sentiment (weight) associated with direct interaction
between the users.</p>
      <p>+ (1 −  ) 
 
= ∑   ⁄
= ( 
|  |
,</p>
      <p>)
0 &lt;</p>
      <p>&lt; 1
The rationale behind introducing parameter  is to establish minimum criteria to have
full confidence on scores calculated based on direct communication. To have full
confidence in direct trust experience value, a certain number of direct interaction between
two users is needed. As the number of direct interaction increases, the amount of
confidence (reliability) increases until it reaches a point which signifies a close relationship
between two users. On the other hand, if user a has a small number of direct interactions
with user b, the value for DTab becomes unreliable to quantify the trust value. Thus, the
combination mechanism (Equation 4) is proposed to reduce the weight a for DT and
increases the importance of the common interaction trust value. CTab helps complement
the uncertainty from the lack of direct feedback. To calculate the reliability of DTab we
rely on Equation 7, which is proposed by Xu et al [16] and Sabater [17].
= {
sin( ⁄ . | 
2
|⁄</p>
      <p>1
| 
| ∈ [0,  
Where   : the minimum number of sentiment score in the form of likes, retweets,
and mentioned that user a gives on user b’s content.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Evaluation</title>
      <p>We performed a pilot study of user trust graph using a Twitter collection that was built
by monitoring the activity of 10 users who may also follow and interact with each other
on Twitter as well. To simplify the sentiment analysis, we decided to only use tweets
in the English language. Due to Twitter API limitation, we were restricted to collect up
to a maximum of 500 tweets per user. For each user, the model returned a list of top ten
trustworthy users. Users were asked to evaluate the generated result by making any
adjustment to the list. We repeated the same experiment using TwitterRank [12] which
correlates trust with tweets popularity. For both models, we applied Bobadilla formula
[18], to calculate the error measurement of the predicted trust strength for each user.
Fig. 2, shows the differences between the two approaches.
(7)
R 2.8
RO 2.6
ER 2.4
TE 2.2
LU 2
S 1.8
O
B
A 1.6
AN 1.4
EM1.2
1
1 0 0 2 0 0 3 0 0 4 0 0 5 0 0 6 0 0 7 0 0 8 0 0 9 0 0 1 0 0 0</p>
      <sec id="sec-4-1">
        <title>K-NEIGHBORS</title>
      </sec>
      <sec id="sec-4-2">
        <title>User-Trust</title>
      </sec>
      <sec id="sec-4-3">
        <title>TwitterRank</title>
        <p>The proposed model has a lower error rate than TwitterRank. In some places, we
noticed that our model’s predicted value is 40% to 45% more accurate than TwitterRank.
Although the results are very promising, the sample that we used to evaluate is
relatively small and only adequate for a pilot study. Further analysis is required to examine
the findings.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Application in Persuasive Content Generation</title>
      <p>This research is the crucial part of a bigger project aimed at automatically creating
persuasive content based on personalization [19]. While the detail description of this
persuasive content generator is beyond the scope of this paper, here we briefly review its
main concepts and the use of the proposed trust network.</p>
      <p>Customization has been widely considered as a means of increasing persuasion and
effectiveness through the process of preparing content for a specific person based on
stated or implied preference [20][21][22], and it has resulted in breaking groups of
people into micro-segments [23]. While a good starting point, such “segmentation” treats
all members of a group similarly, ignoring personal differences. Fig. 3 shows a
highlevel overview of the proposed persuasive system which tries to achieve
“personalization’ through three layers of incorporating personal characteristics.
In the design of this system, we rely on the four persuasive factors defined by the Yale
Attitude Change (YAC) model. According to YAC model [24], in order to maximize
the chance to persuade the audience to take action or change their opinion, we should
first gain their attention, adjust the comprehension level so the user can consume the
message, make sure the argument is accepted, and, finally, ensure that the message is
remembered.</p>
      <p>YAC is our main inspiration for the design of the persuasive content model. As Fig. 3
shows, the proposed persuasive system consists of three layers: Segmentation,
Comprehension and Individualization. First, the content is selected and adjusted in the
segmentation layer based on each user’s interests. The process corresponds to YAC’s
‘gaining user attention’ factor. To avoid introducing an inappropriate level of
complexzitcyzffosr the user, we tailor the selected information to match the reader’s readability
score. This is an attempt to address YAC’s ‘comprehension criteria’ as a part of the
Comprehension layer. Finally, the third component is ‘acceptance through trust.’ It has
been frequently demonstrated that highly trustworthy and credible communicators
inspire a more positive attitude toward the position they advocate than do those with a
lower level of credibility [25]. Thus, as part of the Individualization layer, readers’
trustable sources (such as close friends or respected celebrities) are identified. These
sources are later used to collect and encompass the main content with applicable and
trustable opinions.</p>
      <p>Our propose trust network is used in the Individualization layer, designed based on the
idea of enriching the personalized content with the flavor of trustable personal data such
as opinionative information that support the content.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>In this paper, we measure trust strength between two Twitter users by defining the user
trust graph through applying classification and sentiment analysis. It also elucidates
that the data which would be extracted from Twitter Trust Weight is essential for
persuaders like, recommender systems. For a recommendation to be effective, a consumer
must find the opinion (tweets) trustworthy. Persuasive content generator [19] is the
primary application that would benefit from user trust graph. These applications rely on
opinionative information as trustworthy support to maximize the persuasion
effectiveness. While further research is required to fine-tune all major parts of the model, the
current design and findings are promising and show the potential use in many
educational and otherwise informative applications, such as customer briefing, e-learning,
etc. In addition to further research on technical aspect of the proposed system, more
theoretical work is required to investigate the value of social network-based trust and
who we can trust, the ethical issues associated with such persuasions (abuse of trust,
privacy, etc.). We observed 40% improvement in accuracy of computation in our pilot
study. Though, it is required to do a similar evaluation against other types of models
with a bigger sample to validate our findings. As ideas for future research, it is also
interesting to classify tweets to measure the strength of trust in a given domain. This
will result in identifying experts for a given domain in a user trust graph</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Ravi</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Ravi</surname>
          </string-name>
          , “
          <article-title>A survey on opinion mining and sentiment analysis: Tasks, approaches and applications,” Knowledge-Based Syst</article-title>
          ., vol.
          <volume>89</volume>
          , pp.
          <fpage>14</fpage>
          -
          <lpage>46</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Tsytsarau</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Palpanas</surname>
          </string-name>
          , “
          <article-title>Survey on mining subjective data on the web,” Data Min</article-title>
          . Knowl. Discov., vol.
          <volume>24</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>478</fpage>
          -
          <lpage>514</lpage>
          , May
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            <surname>Bode</surname>
          </string-name>
          , “
          <article-title>Political News in the News Feed: Learning Politics from Social Media</article-title>
          ,” Mass Commun.
          <source>Soc.</source>
          , vol.
          <volume>19</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>24</fpage>
          -
          <lpage>48</lpage>
          , Jan.
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>R. M. Bond</surname>
          </string-name>
          et al.,
          <article-title>“A 61-million-person experiment in social influence and political mobilization</article-title>
          ,
          <source>” Nature</source>
          , vol.
          <volume>489</volume>
          , no.
          <issue>7415</issue>
          , pp.
          <fpage>295</fpage>
          -
          <lpage>298</lpage>
          , Sep.
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Messing</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Westwood</surname>
          </string-name>
          , “
          <article-title>Selective Exposure in the Age of Social Media,”</article-title>
          <string-name>
            <surname>Communic. Res.</surname>
          </string-name>
          , vol.
          <volume>41</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>1042</fpage>
          -
          <lpage>1063</lpage>
          , Dec.
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Turcotte</surname>
          </string-name>
          , C. York, J. Irving,
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Scholl</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Pingree</surname>
          </string-name>
          , “
          <article-title>News Recommendations from Social Media Opinion Leaders: Effects on Media Trust and Information Seeking,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Comput</surname>
          </string-name>
          . Commun., vol.
          <volume>20</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>520</fpage>
          -
          <lpage>535</lpage>
          , Sep.
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Khataei</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Arya</surname>
          </string-name>
          , “
          <article-title>Trust-based Individualization for Persuasive Presentation Builder</article-title>
          ,” in Human-Computer Interaction,
          <year>2015</year>
          , pp.
          <fpage>418</fpage>
          -
          <lpage>428</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Retr.</surname>
          </string-name>
          , vol.
          <volume>2</volume>
          , no.
          <issue>1-2</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>135</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Huang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zhou</surname>
          </string-name>
          , “
          <article-title>Low-Quality Product Review Detection in Opinion Summarization,” in Empirical Methods in Natural Language Processing</article-title>
          and
          <source>Computational Natural Language Learning</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>Data</given-names>
            <surname>Eng</surname>
          </string-name>
          ., vol.
          <volume>23</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>1498</fpage>
          -
          <lpage>1512</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>H.</given-names>
            <surname>Kwak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Park</surname>
          </string-name>
          , and S. Moon, “
          <article-title>What is Twitter, a social network or a news media?,”</article-title>
          <source>in Proceedings of the 19th international conference on World wide web - WWW '10</source>
          ,
          <year>2010</year>
          , p.
          <fpage>591</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Weng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.-P.</given-names>
            <surname>Lim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jiang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>He</surname>
          </string-name>
          , “TwitterRank: Finding Topic-sensitive Influential Twitterers,” in WSDM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yamaguchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Takahashi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Amagasa</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Kitagawa</surname>
          </string-name>
          , “
          <article-title>TURank: twitter user ranking based on user-tweet graph analysis</article-title>
          ,
          <source>” in International conference on Web information systems engineering</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>240</fpage>
          -
          <lpage>253</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>G.</given-names>
            <surname>Amati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Angelini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Bianchi</surname>
          </string-name>
          , “
          <article-title>Moving beyond the Twitter follow graph,” in Knowledge Discovery, Knowledge Engineering</article-title>
          and
          <string-name>
            <given-names>Knowledge</given-names>
            <surname>Management</surname>
          </string-name>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>N.</given-names>
            <surname>Dai</surname>
          </string-name>
          and
          <string-name>
            <given-names>B. D.</given-names>
            <surname>Davison</surname>
          </string-name>
          , “
          <article-title>Freshness matters: in flowers, food, and web authority,” in Proceeding of the 33rd international ACM SIGIR conference on Research and development in information retrieval -</article-title>
          <source>SIGIR '10</source>
          ,
          <year>2010</year>
          , p.
          <fpage>114</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>M.-L. Germain</surname>
            and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>McGuire</surname>
          </string-name>
          , “
          <article-title>The Role of Swift Trust in Virtual Teams and Implications for Human Resource Development,” Adv</article-title>
          . Dev. Hum. Resour., vol.
          <volume>16</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>356</fpage>
          -
          <lpage>370</lpage>
          , Aug.
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Sabater</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Sierra</surname>
          </string-name>
          , “
          <article-title>REGRET: reputation in gregarious societies</article-title>
          ,”
          <source>in Proceedings of the fifth international conference on Autonomous agents - AGENTS '01</source>
          ,
          <year>2001</year>
          , pp.
          <fpage>194</fpage>
          -
          <lpage>195</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Bobadilla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ortega</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hernando</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Gutiérrez</surname>
          </string-name>
          , “
          <article-title>Recommender systems survey,” Knowledge-Based Syst</article-title>
          ., vol.
          <volume>46</volume>
          , pp.
          <fpage>109</fpage>
          -
          <lpage>132</lpage>
          , Jul.
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Khataei</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Arya</surname>
          </string-name>
          , “
          <article-title>Personalized Presentation Builder for Persuasive Communication,”</article-title>
          <string-name>
            <given-names>Commun. Des. Q.</given-names>
            <surname>Rev</surname>
          </string-name>
          ., vol.
          <volume>3</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>32</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Cöner</surname>
          </string-name>
          , “Personalization and Customization in Financial Portals,”
          <source>J. Am. Acad. Bus.</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>498</fpage>
          -
          <lpage>504</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>M. Lou Roberts</surname>
            and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Zahay</surname>
          </string-name>
          , Internet Marketing:
          <article-title>Integrating Online and Offline Strategies: Mary Lou Roberts</article-title>
          , Debra Zahay:
          <volume>9781133625902</volume>
          : Amazon.com: Books, 3rd ed.
          <source>Cengage Learning</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          41, no.
          <issue>5</issue>
          /6, pp.
          <fpage>409</fpage>
          -
          <lpage>418</lpage>
          , Jun.
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>Tianyi</given-names>
            <surname>Jiang</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Tuzhilin</surname>
          </string-name>
          , “
          <article-title>Improving Personalization Solutions through Optimal Segmentation of Customer Bases,”</article-title>
          <source>IEEE Trans. Knowl. Data Eng.</source>
          , vol.
          <volume>21</volume>
          , no.
          <issue>3</issue>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          305-
          <fpage>320</fpage>
          , Mar.
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <given-names>C. I.</given-names>
            <surname>Hovland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. L.</given-names>
            <surname>Janis</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H. H.</given-names>
            <surname>Kelley</surname>
          </string-name>
          , “
          <article-title>Communication and persuasion; psychological studies of opinion change</article-title>
          .” Yale University Press,
          <year>1953</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <given-names>B.</given-names>
            <surname>Sternthal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ruby</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Leavit</surname>
          </string-name>
          , “
          <article-title>The Persuasive Effect of Source Credibility: Tests of Cognitive Response,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Consum</surname>
          </string-name>
          . Res., vol.
          <volume>4</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>252</fpage>
          -
          <lpage>260</lpage>
          ,
          <year>1978</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>