<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Does Trust Influence Information Similarity?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Danielle H. Lee</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Peter Brusilovsky</string-name>
          <email>peterb@pitt.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>School of Information Sciences University of Pittsburgh 135 N. Bellefield Ave.</institution>
          <addr-line>Pittsburgh, PA</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In collaborative filtering recommender systems, users cannot get involved in the choice of their peer group. It leaves users defenseless against various spamming or “shilling” attacks. Other social Web-based systems, however, allow users to self-select trustworthy peers and build a network of trust. We argue that users self-defined networks of trust could be valuable to increase the quality of recommendation in CF systems. To prove the feasibility of this idea we examined how similar are interests of users connected by a self-defined relationship in a social Web system, CiteuLike. Interest similarity was measured by similarity of items and meta-data they share. Our study shows that users connected by a network of trust exhibit significantly higher similarity on items and meta-data than non-connected users. This similarity is highest for directly connected users and decreases with the increase of distance between users.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;User Similarity</kwd>
        <kwd>Trust</kwd>
        <kwd>Human Network</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. INTRODUCTION</title>
      <p>
        Recommender systems powered by collaborative filtering (CF)
technologies become a feature of our life. Such popular systems
as Amazon.com, Netflix, Last.fm, and Google News use
Collaborative filtering to recommend us products to buy, movies
to watch, music to listen and news to read. The power of this
technology is based on a relatively simple idea: starting with a
target user’s rating, find a peer cohort (neighborhood) of users
who have similar interests and recommend items favored by this
cohort to the target user. As such, the choice of cohort is an
essential part in CF recommendations and is usually determined
by automatically calculating rating similarities between the target
user and other users. In a typical CF system, this peer cohort (a
group of users selected as the basis for CF) is unknown to target
users. Moreover, the target users cannot add trustworthy users to
their cohort group nor exclude suspicious users from the group.
The success of social linking and bookmaking systems that allow
users to build their networks of trust, stresses a fact forgotten by
modern CF systems: the source of the recommendation is an
important criterion for judging the quality of recommendations [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
A range of Web 2.0 systems such as LlinkedIn, Flickr, Delicious,
CiteuLike etc., provide various kind of social linking, enabling
their user to pick known and trusted users and add them to their
list of connections. These self-defined links between users
establish a rich network of trust, which is, in turn, used to
propagate various kinds of information. Given that, it is natural to
expect some kind of merger between social linking and CF
technology: a new generation of trust-based recommender
systems, which will use self-defined social networks of trust to
improve the quality of CF systems and the satisfaction of their
users. Some pioneer works in this direction already appeared [
        <xref ref-type="bibr" rid="ref13 ref4 ref5 ref6 ref9">4, 5,
6, 9, 13</xref>
        ]
To prove that trust-based recommenders are more than a
speculation, some important assumptions have to be checked. Is it
true that connected users in the networks of trust share not only
trust, but also some common interests? Is it true that information
can flow along these networks, i.e., the choices made by users are
affected by the choices of users they trust? The goal of this paper
is to test these assumptions. Using real life data collected from a
social Web system, CiteuLike, we examined several important
properties of self-defined trust networks. We investigated how
similar are users’ interests in these networks, the extent to which
amount of similar information collected by users depends of the
strength of their connection, and ultimately, how feasible it may
be to use a network of trust for personalized recommendation.
The term ‘trust’ as used in this paper may not be an exact match
with the general use of ‘trust’ as defined in the sociology. The
social relationship used in this paper is defined unilaterally,
simply indicating user trust in the usefulness of information
provided by connected individual. It is not trust through personal
interaction or emotional support (for instance, connected with an
expectation of obligation, morality or responsibility [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]). Since
referred users are deemed “trustworthy” by the target user in
terms of information collection, however, the term ‘trust’ was
selected. Furthermore, the term ‘trust’ as defined in the Webster’s
Third New International Dictionary meets our interpretation of
‘trust.’ Its definitions for the term are “a confident dependence on
the character, ability, strength, or truth of someone or something,”
“confident anticipation,” and “a charge or duty imposed in faith
and confidence or as a condition of some relationship” [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. To
date, a better or more precise term for this relationship has not
been found; hence, trust is used hereafter.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. RELATED WORK</title>
      <p>
        The popularity of CF technology, revealed some problems. CF
appeared to be not well-protected against malicious users who try
to harm the system or to make a profit by gamming the system.
For example, by copying the whole user profile, a malicious user
is perceived by the system to be a perfect peer user and the
products added by him are therefore recommended to the target
user [
        <xref ref-type="bibr" rid="ref3 ref5 ref8">3, 5, 8</xref>
        ]. Even without malicious users the quality of
recommendation can be affected by peculiar users with unusual
interests [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Moreover, since CF systems have to compare all
other users in order to find the peer group, the computation
requires substantial off-line process [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Finally, users who do not
have sufficient ratings are not able to receive reliable
recommendations [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. These CF-related problems occur in part
because the recommender systems make a choice of peer group
purely by similarity computation, and do not allow the target users
to affect this part of the recommendation process.
      </p>
      <p>
        Several research teams attempted to exploit trust between users to
resolve some of the cited problems of CF technology. Massa and
Avesani’s study [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] showed that a user’s trust network can solve
the ad-hoc user problem, improve recommendation prediction and
attenuate the computational complexity. Another study indicated
that a trusted network decreases the recommendation error and
increases the accuracy as well [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. For users with a unique taste,
their own trusted network could increase the satisfaction of
recommendation, since they are able to know where the
information came from [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The recommendations made by
friends were known to be frequently better and more useful than
the recommendation made by systems [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>To prove the feasibility of trust network as a source of
information for reliable recommendation, several research teams
started with checking the main assumption: do users linked by
self-defined networks of trust have similar interests.</p>
      <p>
        Singla and Richardson (2008) found the positive correlation of
frequency and time of instant messaging between users with
search interests [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Another trust-related research suggested that
two users who are friends tend to share similar vocabularies,
inlinks and out-links on their personal homepages [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Ziegler and
Golbeck [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] compared interest similarity between people in a
trusted network. They used information regarding users and the
user’s trust ratings in the book recommendation. Rather than using
each information item, they grouped the items by topics, using an
existing taxonomy. Then, they built topic-based user profiles and
the closeness of the user profiles in the trusted network was
assessed. As the conclusion, they found that topic-based user
profiles became more similar as the trust values between two
users increased and reduced the data sparsity problem existing on
the comparison of individual item [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Our work presented below
was motivated the same goal: to assess interest similarity between
users connected by relationship of trust.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. DATA COLLECTION</title>
    </sec>
    <sec id="sec-4">
      <title>3.1 Data Sets</title>
      <p>As a source of data for our study we selected CiteuLike, a social
Web system for sharing bibliographic references. To pick up
initial set of users, we visited this site randomly in September and
October of 2008. Users who posted new articles at the time of
visit were picked. The information collected for each user
included the bibliography (article title, list of authors, journal
name, publication year, etc.) and the watchlists (connected users).
After collecting a group of initial users, we collected data of their
trusted connections. Table 1 shows the descriptive statistics.
In collaborative tagging systems explicit connections between
users are of special nature. In some sense, they bear more “trust”
than the connections between friends in social networking systems.
In CiteuLike, users can directly connect to other users who have
interesting bibliography by adding them ‘watch list.’ Then the
system displays the whole bibliography of watched users.</p>
    </sec>
    <sec id="sec-5">
      <title>3.2 The Networks of Trust</title>
      <p>In this paper, we interpret user’s act of connecting to other users
(by adding this user to the watch list) as a sign that she likes the
focus and trust the quality of the added user’s references and
wants to have direct access to them continuously in future. Thus,
watching in CiteuLike could be considered as evidence that
connected users are trustworthy to the original user in terms of
information collection.</p>
      <p>We distinguish two kinds of trusted connections – unidirectional
and reciprocal. The act of adding another user to the ‘watch list’ is
unidirectional (which is different from social networking systems).
If user A added user B to her network, it does not imply that user
B will be added to A’s network necessarily. The users in A’s
network decide independently whether to add A to their networks.
For example, user B may not have A in his network and we call
the relationship between A and B as ‘unidirectional’. Another user
C in A’s network may add A to his network as well. We call this
relationship as ‘reciprocal’ (Figure 1).</p>
    </sec>
    <sec id="sec-6">
      <title>4. DATA ANALYSIS</title>
      <p>
        In this study we tested how similar the information shared by
people in trusted network is. Specifically, we counted the number
of shared information items (academic papers) and meta-data. In
CiteuLike context, authors and journals (or conferences) is a good
example of meta-data.. In our study, however, we considered
authors only since it is more reliable and easy to track. Following
Ziegler and Golbeck [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] experience with topics (which is another
kind of metadata), we expected that the users who share the same
interests may not necessarily agree about specific items, but
demonstrate higher agreement on the level of meta-data (authors).
Since sizes of item collections varied dramatically from user to
user, we had to examine both absolute and relative similarity
measures. I.e., in order to measure between-users’ information
similarity, we not only used absolute numbers (i.e., number of
common items), but we also compared relative (normalized)
Jaccard similarity: proportion of shared items in respect to the
whole collections of connected users. We used three meaningful
relative similarity measures as dependent variables. Figure 3 and
the following equations explain the meaning of these measures.
If user A added user B to her trusted network (i.e, A points to B),
the inlink power (impact) of the user B for the user A represents
how much the information of user A is influenced by the
information of user B. The outlink power of User B is how much
the information of user B affects the user A. The overall power
measures the fraction of overlapped information in the joint
information space of both users.
      </p>
      <p>For the information similarity in trusted network, the following
hypotheses were assessed: H1. Users connected by direct or
indirect relationships of trust have more similar information items
and meta-data than a non-connected pairs. H2. Users in reciprocal
relations have more similar information item and meta-data than
users in unidirectional relations.</p>
    </sec>
    <sec id="sec-7">
      <title>5. THE RESULTS</title>
    </sec>
    <sec id="sec-8">
      <title>5.1 Information sharing in trusted network</title>
      <p>To test whether users connected by direct or distant links of trust
share more information than non-connected pairs (H1), we
compared both absolute numbers of shared information items and
their normalized numbers (inlink, outlink, and overall powers)
using one-way ANOVA test.</p>
      <p>First, we explored the number of shared items and meta-data.
Table 2 shows mean numbers of shared items and meta-data for
direct and distant relationship on contrast to a non-related pair of
users (which we can interpret as infinite distance). At average,
direct pairs share the largest number of items and meta-data. The
numbers are decreasing with the increase of distance in the
network of trust achieving its minimum for non-connected pairs.
This is the evidence that users connected in a network of trust do
have significantly more similar interests than non-connected users.
We can also consider it as an evidence of information propagation
along a network of trust, although impressive similarity on the
meta-data level (which are hard to propagate!) hints that interest
similarity may play a more important role than propagation in the
observed phenomenon. As Table 2 shows, reciprocal relationships
exhibit the same pattern, also with significant differences between
columns in the number of shared information items and meta-data.
Second, we explored differences between relative similarity
measures – fractions of shared items and meta-data for
unidirectional relationship (Table 3) and reciprocal relationships
(Table 4). In both cases, same pattern can be observed for relative
similarity measures: directly related users have the largest fraction
of shared items and meta-data and the fractions decrease with the
increase of the distance between users and reach the minimal level
for not connected users (infinite distance).
In addition to demonstrating a clear connection between item and
meta-data level similarity and user closeness in a network of trust,
the data shown above allows to make interesting observations.
First, as we expected, between-user similarity on the level of
meta-data is much larger than similarity on the level of items for
both systems. For example, the inlink power similarity of items in
direct relation is 2.01% while inlink power similarity of meta-data
in the same direct relation was 5.33%. Second, both absolute and
relative similarities are pair-wise larger for reciprocal than for
unidirectional connections for all distance levels. This difference
is most pronounced in relative form reaching its highest level for
direct reciprocal relations (6.79% for items and 13.01% for
metadata). Next section examines the difference between
reciprocal and unidirectional connections in details and checks its
significance.</p>
    </sec>
    <sec id="sec-9">
      <title>5.2 Unidirectional vs. Reciprocal Relations</title>
      <p>To compare the differences of information sharing pattern
between unidirectional and reciprocal relations, we started with
comparing the number of shared information items and meta-data,
doing it now separately for several distances of relations. In all
three distances but meta-data of 2-hop connection, the numbers of
shared information items and meta-data in reciprocal relations
were significantly larger than in unidirectional relations. In case of
meta-data of 2-hop relation, there was no significant difference.
Secondly, we checked the significance of observed differences in
relative information item similarity between reciprocal and
unidirectional relations (Table 6). For direct and 1-hop
relationship, the differences appeared to be significant, i.e., users
connected by a direct or 1-hop distanced reciprocal relation shared
significantly larger fractions of information items than users
connected by unidirectional relation. For 2-hops relations the
observed difference appeared to be non-significant for one out of
three relative similarity measures.
On the final step we compared relative information meta-data
similarity for reciprocal and unidirectional relations (Table 7).
The relative source similarity was significantly higher for users
connected by direct and 1-hop reciprocal relation than for users
connected by unidirectional relations of the same distance. Two
out of three relative similarities were significantly larger for
reciprocal relations.</p>
    </sec>
    <sec id="sec-10">
      <title>6. CONCLUSION AND DISCUSSION</title>
      <p>To prove the feasibility of users’ self-defined relations of trust as
the bases of recommendation, we examined how similar interests
of users connected by a self-defined relation of trust are. Using</p>
      <p>CiteuLike datasets, we found that user connected by a self-defined
relation of trust have more common information items and
metadata than user pairs with no connection. The similarity was largest
for direct connections and decreased with the increase of distance
between users in the network of trust. Users involved in a
reciprocal relationship exhibited significantly larger similarity
than users in a unidirectional relationship on all levels. Moreover,
similarity on the level of meta-data (authors) was larger than
similarity on the level of individual items (references).
While the results of our study support the idea of using networks
of trust in CF systems, they still do not answer the question how
to use this information to improve the quality of recommendation.
In out future studies we plan to address this issue. As the first step,
we will investigate the impact of trusted networks on
recommendation quality using our CiteuLike data set. We will
also explore how information propagates within trusted networks
and investigate the influence of information authorities who play a
leading role in disseminating the information. In later studies, we
plan to expand our target domains by adding different data sets.</p>
    </sec>
    <sec id="sec-11">
      <title>7. REFERENCES</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Adamic</surname>
            ,
            <given-names>L. A.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Adar</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2003</year>
          )
          <article-title>Friends and neighbors on the Web</article-title>
          ,
          <source>Social Networks</source>
          ,
          <volume>25</volume>
          (
          <issue>3</issue>
          ), pp.
          <volume>211</volume>
          ~
          <fpage>230</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Bonhard</surname>
            <given-names>P.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Sasse</surname>
            <given-names>M. A.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Knowing me, Knowing you - Using Profiles and Social Networking to Improve Recommender Systems</article-title>
          ,
          <source>BT Technology Journal</source>
          , Vol.
          <volume>25</volume>
          (
          <issue>3</issue>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Lam</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Riejl</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>Shilling Recommender Systems for Fun and Profit</article-title>
          ,
          <source>In: Proceedings of World Wide Web</source>
          <year>2004</year>
          , New York, NY, USA, pp.
          <volume>393</volume>
          ~
          <fpage>402</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Massa</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Avesani</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>Trust-aware Collaborative Filtering for Recommender Systems</article-title>
          , In: Proceedings of Federated International Conference On The Move to Meaningful Internet, Agia Napa, Cyprus, pp.
          <volume>492</volume>
          ~
          <fpage>508</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Massa</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Avesani</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Trust-aware Recommender System</article-title>
          ,
          <source>In: Proceedings of Recommender System</source>
          <year>2007</year>
          , Minneapolis, MN, USA, pp.
          <volume>17</volume>
          ~
          <fpage>24</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Maltz</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Ehrlich</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>1995</year>
          )
          <article-title>Pointing the Way: Active Collaborative Filtering</article-title>
          , In, Proceeding of CHI' 95, Denver, CO, USA, pp.
          <volume>1</volume>
          ~
          <fpage>8</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>McKnight</surname>
            ,
            <given-names>D. H.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Chervany</surname>
            ,
            <given-names>N. L.</given-names>
          </string-name>
          (
          <year>1996</year>
          ).
          <source>The Meanings of Trust</source>
          . University of Minnesota, http://misrc.umn.edu/wpaper/WorkingPapers/9604.pdf (accessed
          <source>on July</source>
          ,
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Mehta</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hofmann</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nejdl</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Robust collaborative filtering</article-title>
          ,
          <source>In: Proceedings of Recommender System</source>
          <year>2007</year>
          , Minneapolis, MN, USA, pp.
          <volume>49</volume>
          ~
          <fpage>56</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>O</given-names>
            <surname>'Donovan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            &amp;
            <surname>Barry</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          (
          <year>2005</year>
          )
          <article-title>Trust in Recommender Systems</article-title>
          ,
          <source>In: Proceedings of the 10th International Conference on Intelligent User Interfaces</source>
          , San Diego, California, USA, pp.
          <volume>167</volume>
          ~
          <fpage>174</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Schafer</surname>
            ,
            <given-names>J. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frankowski</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herlocker</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Sen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Collaborative Filtering Recommender System</article-title>
          , In: Brusilovsky,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Kobsa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            &amp;
            <surname>Nejdl</surname>
          </string-name>
          , W. (Eds.)
          <source>The Adaptive Web: Methods and Strategies of Web Personalization</source>
          , pp.
          <volume>291</volume>
          ~
          <fpage>324</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Singla</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Richardson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Yes, There is a Correlation - From Social Networks to Personal Behavior on the Web</article-title>
          ,
          <source>In: Proceeding of the 17th International World Wide Web Conference</source>
          , Beijing, China.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Sinha</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Swearingen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2001</year>
          )
          <article-title>Comparing Recommendations Made by Online Systems and Friends</article-title>
          ,
          <source>In: Proceedings of DELOS Workshop on Personalisation and Recommender Systems</source>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Tintarev</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Masthoff</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Effective explanations of recommendations: user-centered design</article-title>
          .
          <source>In: Proceedings of Recommender System</source>
          <year>2007</year>
          , Minneapolis, MN, USA, pp.
          <fpage>153</fpage>
          -
          <lpage>156</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Ziegler</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Golbeck</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Investigating interactions of trust and interest similarity</article-title>
          ,
          <source>Decision Support Systems</source>
          ,
          <volume>43</volume>
          , pp.
          <volume>460</volume>
          ~
          <fpage>475</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>