<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Trust and Reputation in Social Internetworking Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lora Aroyo</string-name>
          <email>l.m.aroyo@cs.vu.nl</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pasquale De Meo</string-name>
          <email>demeo@unirc.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Domenico Ursino</string-name>
          <email>ursino@unirc.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DIMET, Universita \Mediterranea" di Reggio Calabria</institution>
          ,
          <addr-line>Via Graziella, Localita Feo di Vito, 89060 Reggio Calabria</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer Science, VU University Amsterdam</institution>
          ,
          <addr-line>De Boelelaan 1081, 1081 HV Amsterdam</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>A Social Internetworking System (SIS) is the scenario arising when Web users decide to a liate to multiple social networks. Recent studies show an increasing user tendency of creating multiple identities on di erent social systems and exposing, in each of them, di erent traits of their personalities and tastes. This information provides a better picture of user needs and enhances the quality of services they can use. In the next years a large growth of SIS phenomenon is foreseeable. In order to boost the level of user participation in a SIS, suitable mechanisms capable of discerning reliable users must be designed. We propose a model to represent a SIS, a software architecture to gather real data and analyze the structural properties of a SIS. In concrete use cases with di erent contexts and di erent levels of protection of data, we introduce an ontology-based model to compute trust and reputation in a SIS. This research is collaborative e ort between the Vrije Universiteit Amsterdam and the University of Reggio Calabria in the context of a Marie Curie Fellowship.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Social media applications, such as blogs, multimedia and link sharing sites,
question and answering systems, wikis and online forums, are growing at an
unprecedented rate and are estimated to generate a signi cant amount of the contents
currently available on the Web [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Social media applications are a signi cant
part of a more meaningful kind of applications, named Web 2.0 applications,
which aim to provide a platform for information sharing and collaboration among
users on the Web.
      </p>
      <p>In social media applications, users form communities, typically modelled as
social networks. Users are driven to get in touch and become friends of other
users, create and publish their own contents (like videos or photos), share these
contents with others, rate and comment contents posted by others. Examples of
popular Web-based social networks are Facebook, MySpace and LinkedIn.</p>
      <p>The value of social networks expresses in multiple ways. For instance, users
may take an advantage of their interactions with other users to nd information
relevant to them or they can explore connections existing in a social network
to get in touch with user with whom they may pro tably interact: many Web
users, as an example, indicate that they were able to get a job through their
contacts in LinkedIn1.</p>
      <p>
        A further advantage is that social networks allow to disseminate new
knowledge in a widespread fashion, to di use innovations, to spread opinions (e.g.,
social or political messages) among members, to advertise new products [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>The power of social networks has been fully recognized by institutional
actors like museums, TV broadcaster, academic and government institutions. For
instance, the Rijksmuseum Amsterdam is exploring the added-value of providing
artworks online, allowing users to express their opinions on them or contribute to
describing artwork's. Furthermore, major European broadcasters, such as BBC
and RAI are experimenting with Web 2.0 technologies to improve interactivity
and participation of TV consumers.</p>
      <p>
        Users often decide to a liate to multiple social networks: for instance, in a
recent survey, Ofcom found that 39% of UK adults with at least one social
networking pro le has indeed two or more pro les2. We call Social Internetworking
System (hereafter SIS) the scenario arising when many users decide to a liate
with multiple social networks. Companies are discovering the potential of social
internetworking and are promoting systems capable of supporting social
internetworking tasks. For instance, Google has recently proposed Open Social [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], a
set of APIs to access social sites, like LinkedIn or MySpace. Some systems (like
FriendFeed [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]) allow the users to share their activities with other users in
multiple social networks; Gathera [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], also provide the users with a single interface
to handle their accounts on multiple social networks.
      </p>
      <p>The main goal of these systems is to o er a technological platform to
ensure data portability among di erent social networks. The major bottleneck for
the success of a SIS is the absence of mechanism that helps users in nding
other \reliable" users with whom they can pro tably interact and discloses the
presence of malicious users or spammers.</p>
      <p>
        In the past, signi cant research e orts have been done to de ne and handle
trust and reputation, as a large body of literature highlights [
        <xref ref-type="bibr" rid="ref1 ref11 ref12 ref15 ref19 ref22">1,11,12,15,19,22</xref>
        ].
      </p>
      <p>However, in our opinion, several reasons explain a further investigation. A
rst research question is to provide a model capable of representing a SIS, its
components and their relationships. In addition, it is necessary to gather real
data about a SIS in order to understand its structural properties and clarify to
what extent a SIS di ers from traditional social networks.</p>
      <p>A second issue depends on the fact that the concepts of trust and reputation
may assume di erent meanings according to the scenario in which a user operates
in. For instance, in communities like Question &amp; Answering systems (in which
users are allowed to pose questions, to answer questions raised by other users
1
http://www.mainstreet.com/article/career/employment/social-mediajob-seeker-s-best-new-tool
2 http://www.ofcom.org.uk/advice/media literacy/medlitpub/medlitpubrss/
socialnetworking/annex3.pdf
and, nally to rate received answers), the reputation of a user coincides with
his level of expertise on a particular topic; in a Web community like YouTube,
the reputation a user coincides with the quality of contents he generated. This
requires to de ne a procedure to compute, in an abstract and general fashion,
the reputation of a user and to specialize it in concrete domains.</p>
      <p>As a nal research challenge, it would be necessary to de ne a model to
represent trust and reputation in di erent contexts. In addition, it is useful
to observe that, in di erent contexts, di erent policies for accessing, publishing
and re-distributing data may exist. For instance, in the case of a TV broadcaster
which delivers online part of its archive of resources, users are allowed for instance
to use some resources (e.g., for educational purposes) but are forbidden to re-use
those protected by copyright. To address these issues, it would be bene cial to
design an ontology to model the key concepts of trust and reputation in di erent
environments characterized by di erent levels of protection of data.</p>
      <p>
        In this paper we propose a methodology to handle trust and reputation in a
SIS. The paper summarizes the research activities we are planning to carry out
in the context of a Marie Curie Intra-European Fellowships for Career
Development (IEF), a funding opportunity provided by EU Commission. The paper
is structured as follows: in Section 2 we review existing trust and reputation
models and illustrate the challenges arising in a SIS. In Section 3 we illustrate
a model to represent the features of a SIS along with a software architecture
we are currently implementing to gather real data from a SIS and analyze its
structural properties. In Section 4 we provide a general model to compute trust
and reputation in a SIS and illustrate the steps we are planning to specialize it
in real contexts; in particular, we plan to adapt our notion of trust on data
gathered within two research projects, namely NoTube [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and Agora [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In Section
5 we discuss a possible ontology-based model to represent trust and reputation
in environments characterized by di erent levels of protection of data. Finally,
in Section 6 we draw our conclusions.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Background and challenging issues</title>
      <p>In virtual communities the term trust is generally exploited to indicate the
reliance that a community member associates with another one. Trust values are
\local parameters" in the sense that specifying the trust of a user A toward a
user B is equivalent to indicate how much A perceives B as reliable.</p>
      <p>The opinion of the whole community of users toward a member of the
community itself is known as reputation. In the past, the issue of computing and
handling trust and reputation in virtual communities has been deeply
investigated and several models and approaches to facing it have been proposed.</p>
      <p>Here we discuss some of these approaches and outline the challenges we
encounter in the context of a SIS. Existing approaches can be classi ed into
two categories:</p>
      <p>
        Graph-Based Approaches. A rst category of approaches model a user
community as a graph G in which nodes represent users [
        <xref ref-type="bibr" rid="ref1 ref11 ref12 ref22">1,11,12,22</xref>
        ]. An edge
linking two nodes v and u indicates that the user v explicitly trusts the user u.
The graph G is usually sparse because a user typically evaluates a handful of
other users; as a consequence, various techniques have been proposed to infer
implicit trust relationships. In detail, the approach of [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] applies a maximum
network ow algorithm on G to compute trust between any pair of users. In
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] the authors apply a modi ed version of the Breadth First Search algorithm
on G to infer multiple values of reputation for each user; these values are then
aggregated by applying a voting algorithm to produce a nal (and unique) value
of reputation for each user. The approach of [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] considers paths up to a xed
length k in G and propagates the explicit trust values on them to obtain the
implicit ones. In [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] trust values are computed by applying a spreading activation
algorithm.
      </p>
      <p>Graph-based approaches leverage on explicit trust relationships declared
between pairs of users. As a consequence, they neglect to consider a broad range
of activities that, in a SIS (e.g., the activity of rating resources) are a precious
and reliable indicator of trust.</p>
      <p>
        Link-Based approaches. A second category of approaches use ranking
algorithms such as PageRank [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] or HITS [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], which have been successfully applied
in the context of Web Search, to nd trust values. For instance, [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] proposes an
approach based on PageRank to measure peer reputation in a peer-to-peer
network. The approach of [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] de nes a probabilistic model of trust which strongly
resembles that described in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]; however, di erently from this last, the approach
of [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] computes and handles trust values and not reputation values. In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] the
authors present an algorithm which computes global reputation values in a
peerto-peer network; the proposed algorithm uses a personalized version of PageRank
along with information about the past experiences of peers.
      </p>
      <p>Experimental tests indicated that link-based methods can obtain precise
results and are often attack-resistant, i.e., they can resist to attempts conceived to
manipulate reputation scores.</p>
      <p>
        We observe that in some approaches trust is conceived as a measure of
performance. For instance, in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], the trust of a peer depends on the success of
downloading a le from it and, then, trust depends on parameters like the
number of corrupted les stored in the peer or the number of connections with the
peer that have been lost. By contrast, in our case, trust should quantitatively
encode the con dence of a user in the opinions formulated by other ones.
      </p>
      <p>We can observe that both graph-based and link-based approaches try to
model trust and reputation in a \force-mass-acceleration" style. In other words,
these approaches try to capture all factors in uencing trust and reputation and
combine them in a set of equations. The resulting model is too complicated to be
handled and it may not provide signi cant results. In our opinion, the assessment
of trust and reputation critically depends on the concrete domain in which we
are operating in and we believe that an universal model of trust is not possible.</p>
      <p>
        To better clarify this concept, we report some results emerging from the
PrestoPrime project [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], an EU nanced project devoted to study and develop
practical solutions for the long-term preservation of digital media objects,
programmes and collections.
      </p>
      <p>In the context of PrestoPrime, two pilot demonstrators were developed. In
the rst one, in a game-like environment, users were asked to label videos by
applying simple keywords (tags). Experiments with users showed that a
satisfactory measure of trust between a pair of users who do not know each other can
be obtained by considering the tags they apply to label a video and computing
the degree of match of the set of tags they inserted.</p>
      <p>In the second demonstrator, users were provided with a small annotation
environment allowing them to label museum objects with four main entry elds
(i.e., \who", \where", \what", and \when"). This allowed us to create links
between museum objects on the basis of the key dimensions \who", \where",
\what", and \when"; as an example, objects coming from di erent museum
collections can be tied if they refer to the same artistic and historical context
and this produces a more complete description of cultural movements.</p>
      <p>The notion of trust developed in the context of the rst demonstrator is not
applicable for the second one, and other factors in uencing trust and reputation
need to be studied.</p>
      <p>A further challenge we are in charge of studying depends on the fact that, in
some cases, real organizations often decide to make available on the Web their
own resources and often allow end users to enrich their descriptions through
metadata like tags. For instance, think of the case of public TV broadcasters
like BBC which o ers online a large number of contents referring to its TV
programmes. Each organization may use di erent policies for accessing, distributing
and labelling the contents they produce and disseminate. For instance, a digital
content may published online only in some speci c cases (e.g., if the material
must be used in education) while its usage is forbidden for commercial purposes.
This proves that, in the process of de ning trust and reputation, it is necessary
to consider not only the application context but also te level of data protection
about available resources.
3</p>
    </sec>
    <sec id="sec-3">
      <title>De ning a basic model of social internetworking</title>
      <p>The rst goal of our research is to nd a suitable model to represent a Social
Internetworking System (SIS) and interactions between humans that can take
place in it.</p>
      <p>To this purpose, our model must t two requirements:
{ Requirement 1. The model should be rich enough to represent a wide range
of heterogeneous entities (i.e,. users, resources, posts, comments, ratings, and
so on) and their interactions (e.g., users may declare to be friends or they
may rate resources).
{ Requirement 2. The model should be easy to manipulate and intuitive.</p>
      <p>Clearly, Requirements 1 and 2 are con icting each other and a suitable
tradeo is compulsory. Traditional approaches to modelling social networks are usually
based on graphs. Nodes in graphs represent social network actors (e.g., users)
while edges identify relationships between them.</p>
      <p>We believe that graph-based models are not satisfactory in the context of a
SIS for several reasons.</p>
      <p>A rst weakness relies on the role the nodes would have if we would decide
to represent a SIS through a graph. Generally, a social network consists of
homogeneous nodes, i.e., all nodes represent objects sharing the same nature. As
claimed by Requirement 1, in a SIS heterogeneous entities co-exist and these
heterogeneities must be properly modelled.</p>
      <p>A further limitation is that graph-based models are able to represent
onedimensional networks, i.e., edges of a graph specify that only one particular kind
of relationship may exist between nodes. On the contrary, we expect that a SIS
should be represented through a multi-dimensional network because various type
of interactions may involve entities of the same type or of di erent nature: for
instance, an edge should link a user u and a resource r to indicate that u has
posted r or an edge should tie two users to indicate that they declared to be
friends.</p>
      <p>Finally, edges in graphs highlight binary relationships between nodes they
link. In a SIS, it could be useful to consider n-ary relationships (e.g., an edge
may glue together a user u, a resource r and a tag t under the hypothesis that
u applied t to label r).</p>
      <p>We are currently studying a more sophisticated model in which a SIS is
represented through an hypergraph such that: (i) nodes are labelled and the label
of a node re ects the nature of the object represented by the node itself; (ii)
multiple hyperedges may run between two nodes to indicate that multiple
interactions may take place between two arbitrary entities; (iii) hyperedges denote
relationships involving two or more entities.</p>
      <p>In addition to de ning a model to represent a SIS, we are also interested in
gathering data from real social networks in order to understand the properties
showed by a real SIS. For instance, it would be interesting to check whether
properties typical of real social networks (e.g., the small world phenomenon) still
emerge in a SIS.</p>
      <p>Such a task is quite complex because, in di erent networks, a user may have
di erent identities so it would be extremely hard to join information scattered
across multiple networks.</p>
      <p>
        To address this issue, we used the Google Social Graph API [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Social Graph
API allows human users or software applications to access public connections
between people on the Web. In particular, Social Graph API can be queried
through an HTTP request and is able to return two kind of results:
{ A list of public URLs that are associated with a person. For instance, given a
user u, Social Graph API reveals the URLs of the blog of u and his Twitter
page.
{ A list of public declared connections between people. For instance, it returns
the list of persons who, in at least one social network, have a link to the blog
of u or any other page referable to u.
      </p>
    </sec>
    <sec id="sec-4">
      <title>De ning reputation in a Social Internetworking System</title>
      <p>As a further step, we are interested in studying a model of reputation for a SIS.
The notion of trust/reputation in the context of a SIS (and, in general, for Web
2.0 applications) is hard to de ne because, as shown in Section 2, in di erent
contexts, they may assume di erent meanings.</p>
      <p>We propose a methodology to compute reputation in a SIS which operate
in two stages: in the former stage we review and analyze the factors capable of
in uencing the value of reputation in a SIS. In the latter stage we consider some
concrete domains and specialize our methodology to them.</p>
      <p>Intuitively, we assume that the reputation of a user depends on the following
facts:</p>
      <p>The reputation of a user depends on the relationship he created in the SIS.
We suggest to use the hypergraph model introduced in Section 3 to represent
users and their relationships in a SIS. Past user interactions are analyzed to
determine the level of trust a user u confers to a user v and this information
is used to weight edges in the hypergraph representing the SIS. Since a user
generally interact with an handful of other users, the hypergraph we obtain is
sparse and a suitable algorithm to propagate trust values is necessary. Currently,
we are planning to use a link-based algorithm like PageRank. At the end of this
step, we are able to generate a vector r0 such that the i-th component of r0 equals
to the reputation of the i-th user.</p>
      <p>Users with high level of reputation are also those who produce high quality
resources. The quality of a resource could be computed by consider the average
rating it got and, then, resources with a high average rating are also high
quality resources. To avoid biases, we can pose a further requirement: the number
of ratings received by a resource must be statistically signi cant, i.e., we can
consider only resources which received at least Nmin ratings, being Nmin a
suitable threshold. Such a requirement would avoid that resources evaluated by a
small number of users are deemed better than resources rated by a large mass
of human users.</p>
      <p>The procedure described above resembles that applied in many social systems
like YouTube or Digg to evaluate the quality of a resource. We believe that such a
procedure is a ected by several fallacies and it may incur in harsh inaccuracies.
In fact, spam or malicious users may tend to provide generous evaluations to
arti cially in ate the evaluation of a resource. As a consequence, we need a more
complicated framework capable of putting together the reputation of users, the
quality of resources they post and the evaluations associated with resources. At
the current stage of the project we are considering, as a possible solution, the
following criterium:</p>
      <p>A user has a high reputation if he authors high quality resources. A
resource, in its turn, is of high quality if it gets a high average rating and
it has been posted by users with high reputation.</p>
      <p>
        The intuition provided above relies on a mutual reinforcement principle that
is similar, to some extent, the approach underlying HITS [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] algorithm. The
principle outlined above easily turns into a set of linear equations. In fact, let n
be the number of user00s composing a SIS and let m be the number of resources
they authored. Let r be an n-th dimensional array such that the i-th entry
of r equals to the reputation (to compute) of the i-th user and let q be an
m-th dimensional array such that the j-th entry of q equals to the quality (to
compute) of the j-th resource. Finally, let e be an m-th dimensional array such
that the j-th entry of e equals to the average rating of the j-th resource and let
A be an n-by-m matrix such that Aij equals 1 if the i-th user posted the j-th
resource and 0 otherwise.
      </p>
      <p>According to this notation, we can write the following equations:
(1)
(2)
1
r00 _ Aq
q _ AT r00 + e</p>
      <p>In both Equations 1 and 2, the symbol _ means \is proportional to". As for
Equation 1, the i-th row of the the product Aq speci es the sum of the qualities
of the resources authored by the i-th user. This immediately follows from the
de nition of product between a matrix and a vector. Interestingly enough, the
A matrix can be interpreted as the adjacency matrix of a bipartite graph whose
nodes represent users and resources and edges link a user to the resources he
authored. In Equation 2, the symbol AT is the transpose of A. As in the previous
case, AT matrix can be viewed as the adjacency matrix of a bipartite graph
whose nodes represent resources and users and edges link a resource to the user
who authored it. Observe that the same model holds if we assume that a resource
has been posted by one user or it has been posted by multiple users. The product
AT r00 is an m-th dimensional vector whose j-th entry speci es the reputation
(or the sum of the reputations) of the user (users) who posted the j-th resource.</p>
      <p>By plugging Equation 2 into Equation 1 we obtain:
r00 _ A hAT r00 + ei ) r00</p>
      <p>AAT r00 _ Ae )
) r
00</p>
      <p>I</p>
      <p>AAT _ Ae ) r00 _ I</p>
      <p>AAT
1</p>
      <p>Ae</p>
      <p>
        Since AAT is symmetric, its eigenvalues are real [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. In particular, I AAT
can be easily and e ectively approximated by computing the dominant
eigenvector of AAT . Such a result is of great practical impact because there exist
e cient numerical methods to compute dominant eigenvector of a symmetric
matrix (think of Lanczos method [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]) and, then, our methodology is suitable
also if the size of A gets very large; such a case if quite common in real cases
because, in traditional social sites the number of users and resources they generate
(which correspond to the number of rows a00nd columns of A) is huge.
      </p>
      <p>Finally, we merge the arrays r0 and r into a single reputation value r as
follows:
r =
r0 + (1
) r
00
(3)</p>
      <p>The coe cient 2 [0; 1] is instrumental in weighting the contributions
coming from link analysis and the analysis of resources generated by a user. We plan
to tune by applying a linear regression technique.</p>
      <p>Once a theoretical model of reputation in a SIS has been de ned, our
intention is to specialize it in concrete domains. In particular, we are interested in
monitoring and analyzing the behaviour of users in long-term experiments
associated with di erent domains; the notion of reputation, from abstract concept
turns into a concrete tool to aid user in better taking advantage of
potentialities o ered by the SIS. Experiments on real users allow us to get an iterative
assessment of the strengths and weaknesses of our notion of reputation as well
as indications for improvement.</p>
      <p>
        To this purpose, we will use data gathered in the context of two research
projects, namely: (i) NoTube (an EU nanced project on interactive television)
[
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], and (ii) Agora [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] (a Dutch funded project on digital museums and
audiovisual archives). In the context of interactive television, trust/reputation values
represent the level of expertise of a user. This information could be exploited to
select in a personalized fashion contents to propose to the user. As for digital
museums we can study what parameters in the user behaviour are relevant for
producing authoritative annotations and what are the motivations for users to
participate in this labelling process. This information could be instrumental in
better using human mass potential in annotating artworks.
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Building an ontology-based model of trust and reputation in a Social Internetworking System</title>
      <p>Once we have de ned the concept of trust and reputation in concrete domains
it is advantageous to create a model capable of representing them in di erent
domains. To this purpose we plan to design an ontology capable of specifying
how reputation and trust specialize in di erent application contexts.</p>
      <p>
        To the better of our knowledge, there are few approaches to designing
ontologies to model trust. For instance, in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], TrustOntology is presented. This
is an OWL ontology allowing each user to indicate the people he trusts. Trust
information is automatically composed to infer new values of trust for newcomer
users. In [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], the authors suggest a trust protocol in which the decision about
the trustworthiness of a message depends on many factors like the creator (who)
of the message (what), time (when), location (where), and intent (why). An
ontology to capture factors in uencing trust and a set of functions to evaluate trust
is presented.
      </p>
      <p>
        Our goal is di erent from that of [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] we want to model how
reputation specializes in di erent contexts. In addition our ontology can be used to
represent a scenario in which di erent organizations decide to make available on
the Web their own resources. An organization (e.g., a cultural institution) may
let its users to freely use, copy and re-distribute available resources. Another
organization may apply di erent policies to protect data because some resources
can be freely disseminated, other resources are not accessible because protected
by copyright and, nally, some resources can be published online and re-used
for some purposes (e.g., as educational material) but their access is forbidden in
other cases.
      </p>
      <p>The availability of such an ontology would o er us, on the long run, the
possibility of designing complex software applications running across multiple
social networks. For instance, we can think of a content-based recommender
system operating as follows:
1. A user issues a query.
2. The query is forwarded to multiple social system and a list of resources
matching the query is retrieved by each social system.
3. Retrieved resources are ranked on the basis of the reputation of the users
who created, on the application context and on the rights for its distribution.
4. A global list is produced by merging the previous ones.</p>
      <p>Such an application is, in our opinion, capable of introducing relevant
novelties in the research eld of Recommender Systems. In fact, the proposed
application is able to sift through di erent social sites (while traditional Recommender
Systems usually operate on a single resource repository) and is able to rank
resources on the basis of multiple and criteria.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>In this paper we introduce the concept of Social Internetworking System, i.e., the
scenario arising when Web users decide to a liate to multiple social networks.
We propose a model to represent a SIS and describe the main components of a
software architecture we are implementing to gather real data from a SIS and
analyze its structural properties. In concrete use cases with di erent contexts
and di erent levels of protection of data, we introduced an ontology-based model
to compute trust and reputation in a SIS. This research is collaborative e ort
between the Vrije Universiteit Amsterdam and the University of Reggio Calabria
in the context of a Marie Curie Fellowship.</p>
      <p>In the future we plan to gather a large amount of data about a SIS and
carry out an empirical study on them. The goal is to understand whether some
properties of real social networks (like small world phenomenon, power law
distribution of in-degree and out-degree distributions, and so on) if they are still
con rmed in a SIS or if signi cant deviations emerge.</p>
      <p>A further research line is to carry out a detailed review of existing literature
on the meaning of trust and reputation in di erent social site. Finally, we plan to
test the e ectiveness of our ontology-based model with an experiment involving
real users. In particular, the validation phase will be strictly tied to the activity
of designing our ontology; in fact, we shall use feedbacks provided by users to
revise the structure of our ontology.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Advogato</surname>
          </string-name>
          <article-title>'s trust metric</article-title>
          . http://www.advogato.org/trust-metric.html,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. FriendFeed. http://friendfeed.com/,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. Gathera. http://www.gathera.com/,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. Google Open Social. http://code.google.com/intl/it-IT/ apis/opensocial/,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Agora</surname>
          </string-name>
          <article-title>: Creating the historic fabric for and providing web-enabled access to objects in dynamic historical sequences</article-title>
          . http://agora.cs.vu.nl/,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. Google Social Graph API. http://code.google.com/intl/it-IT/apis/socialgraph/,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. Prestoprime:
          <article-title>Keeping audiovisual contents alive</article-title>
          . http://www.prestoprime.org/,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>S.</given-names>
            <surname>Brin</surname>
          </string-name>
          and
          <string-name>
            <surname>L. Page.</surname>
          </string-name>
          <article-title>The anatomy of a large-scale hypertextual web search engine</article-title>
          .
          <source>Computer Networks</source>
          ,
          <volume>30</volume>
          (
          <issue>1-7</issue>
          ):
          <volume>107</volume>
          {
          <fpage>117</fpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>P.</given-names>
            <surname>Chirita</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Nejdl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Schlosser</surname>
          </string-name>
          , and
          <string-name>
            <given-names>O.</given-names>
            <surname>Scurtu</surname>
          </string-name>
          .
          <article-title>Personalized Reputation Management in P2P Networks</article-title>
          .
          <source>In Proc. of the ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, CEUR Workshop Proceedings</source>
          , Hiroshima, Japan,
          <year>2004</year>
          . CEUR-WS.org.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>J.</given-names>
            <surname>Golbeck</surname>
          </string-name>
          .
          <article-title>Trust ontology</article-title>
          . http://www.schemaweb.info/schema/SchemaDetails.aspx ?id=
          <fpage>171</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>J.</given-names>
            <surname>Golbeck</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.A.</given-names>
            <surname>Hendler</surname>
          </string-name>
          .
          <article-title>Inferring binary trust relationships in web-based social networks</article-title>
          .
          <source>ACM Transactions on Internet Technology</source>
          ,
          <volume>6</volume>
          (
          <issue>4</issue>
          ):
          <volume>497</volume>
          {
          <fpage>529</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>R.</given-names>
            <surname>Guha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Raghavan</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Tomkins</surname>
          </string-name>
          .
          <article-title>Propagation of trust and distrust</article-title>
          .
          <source>In Proc. of the International Conference on World Wide Web (WWW '04)</source>
          , pages
          <fpage>403</fpage>
          {
          <fpage>412</fpage>
          , New York, NY, USA,
          <year>2004</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>M. Hay</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Miklau</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Jensen</surname>
            ,
            <given-names>D.F.</given-names>
          </string-name>
          <string-name>
            <surname>Towsley</surname>
            , and
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Weis</surname>
          </string-name>
          .
          <article-title>Resisting structural re-identi cation in anonymized social networks</article-title>
          .
          <source>Proceedings of the VLDB Endowment</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ):
          <volume>102</volume>
          {
          <fpage>114</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. P. Heymann, G. Koutrika, and
          <string-name>
            <given-names>H.</given-names>
            <surname>Garcia-Molina</surname>
          </string-name>
          .
          <source>Can Social Bookmarks Improve Web Search? In Proc. of International Conference on Web Search and Data Mining (WSDM</source>
          <year>2008</year>
          ), pages
          <fpage>195</fpage>
          {
          <fpage>206</fpage>
          ,
          <string-name>
            <surname>Stanford</surname>
          </string-name>
          , California, USA,
          <year>2008</year>
          . ACM Press.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>S.D.</given-names>
            <surname>Kamvar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.T.</given-names>
            <surname>Schlosser</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Garcia-Molina</surname>
          </string-name>
          .
          <article-title>The Eigentrust algorithm for reputation management in P2P networks</article-title>
          .
          <source>In Proc. of the International Conference on World Wide Web (WWW</source>
          <year>2003</year>
          ), pages
          <fpage>640</fpage>
          {
          <fpage>651</fpage>
          , Budapest, Hungary,
          <year>2003</year>
          . ACM Press.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>J.</given-names>
            <surname>Kleinberg</surname>
          </string-name>
          .
          <article-title>The convergence of social and technological networks</article-title>
          .
          <source>Communications of the ACM</source>
          ,
          <volume>51</volume>
          (
          <issue>11</issue>
          ):
          <volume>66</volume>
          {
          <fpage>72</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>J. M. Kleinberg</surname>
          </string-name>
          .
          <article-title>Authoritative sources in a hyperlinked environment</article-title>
          .
          <source>Journal of the ACM</source>
          ,
          <volume>46</volume>
          (
          <issue>5</issue>
          ):
          <volume>604</volume>
          {
          <fpage>632</fpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>L.</given-names>
            <surname>Nixon</surname>
          </string-name>
          and
          <string-name>
            <surname>L. Aroyo.</surname>
          </string-name>
          <article-title>NoTube { Making TV a Medium for Personalized Interaction</article-title>
          .
          <source>In Proc. the European Interactive TV Conference (EuroITV</source>
          <year>2009</year>
          ), pages
          <fpage>22</fpage>
          {
          <fpage>25</fpage>
          ,
          <string-name>
            <surname>Leuven</surname>
          </string-name>
          , Belgium,
          <year>2009</year>
          . University of Leuven.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>M. Richardson</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Agrawal</surname>
            , and
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Domingos</surname>
          </string-name>
          .
          <article-title>Trust Management for the Semantic Web</article-title>
          .
          <source>In Proc. of International Conference on Semantic Web (ISWC</source>
          <year>2003</year>
          ), pages
          <fpage>351</fpage>
          {
          <fpage>368</fpage>
          ,
          <string-name>
            <surname>Sanibel</surname>
            <given-names>Island</given-names>
          </string-name>
          , FL, USA,
          <year>2003</year>
          . Lecture Notes in Computer Science, Springer.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>G.W.</given-names>
            <surname>Stewart</surname>
          </string-name>
          .
          <source>Matrix Algorithms: Basic Decompositions (Volume 1)</source>
          .
          <source>Society for Industrial Mathematics</source>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>S.</given-names>
            <surname>Toivonen</surname>
          </string-name>
          and
          <string-name>
            <surname>G. Denker.</surname>
          </string-name>
          <article-title>The Impact of Context on the Trustworthiness of Communication: An Ontological Approach</article-title>
          .
          <source>In Proc. of the ISWC Workshop on Trust, Security, and Reputation on the Semantic Web</source>
          , volume
          <volume>127</volume>
          <source>of CEUR Workshop Proceedings. CEUR-WS.org</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>C.</given-names>
            <surname>Ziegler</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Lausen</surname>
          </string-name>
          .
          <article-title>Propagation models for trust and distrust in social networks</article-title>
          .
          <source>Information Systems Frontiers</source>
          ,
          <volume>7</volume>
          (
          <issue>4</issue>
          -5):
          <volume>337</volume>
          {
          <fpage>358</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>