JOURNAL BROWSE
Search
Advanced SearchSearch Tips
User Reputation Management Method Based on Analysis of User Activities on Social Media
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
  • Journal title : Journal of KIISE
  • Volume 43, Issue 1,  2016, pp.96-105
  • Publisher : Korean Institute of Information Scientists and Engineers
  • DOI : 10.5626/JOK.2016.43.1.96
 Title & Authors
User Reputation Management Method Based on Analysis of User Activities on Social Media
Yun, Jinkyung; Jeong, Jiwon; Lee, Suji; Lim, Jongtae; Bok, Kyungsoo; Yoo, Jaesoo;
 
 Abstract
Recently, social network services have changed by moving towards an open platform where, as well as simply allowing the building of relationships among users, various types of information can be generated and shared. Since existing user reputation management methods evaluate user reliability based on user profiles, explicit relations, and evaluation, they are not suitable for determining user reliability on social media due to few explicit evaluation. In this paper, we analyze social activities on social media and propose a new user reputation management method that considers implicit evaluation as well as explicit evaluation. The proposed method derives positive and negative implicit evaluation from social activities, and generates user reputation information by field in order to consider user expertise. It also considers the number of users that participate in evaluation in order to measure user influence. As a result, it generates the reputation information of users who have no explicit evaluation and creates user reputation information that is more suitable for social media.
 Keywords
social media;user reputation management;social activities;trust;
 Language
Korean
 Cited by
1.
소셜 네트워크에서 행위 분석을 통한 사용자 영향력 판별 기법,박윤정;이서희;한진수;노연우;임종태;김연우;복경수;유재수;

한국콘텐츠학회논문지, 2016. vol.16. 12, pp.551-561 crossref(new window)
 References
1.
Asur, Sitaram, Bernardo Huberman, "Predicting the future with social media," Proc. of the IEEE/WIC/ACM International Conference, Vol. 1, pp. 492-499, 2010.

2.
Mangold, W. Glynn, David J. Faulds, "Social media: The new hybrid element of the promotion mix," Journal of Business horizons, Vol. 52, No. 4, pp. 357-365, 2009. crossref(new window)

3.
Kaplan, M. Andreas, Michael Haenlein, "Users of the world, unite! The challenges and opportunities of Social Media," Journal of Business horizons, Vol. 53, No. 1, pp. 59-68, 2010. crossref(new window)

4.
Axel. Bruns, "Blogs, Wikipedia, Second Life, and beyond: From production to produsage," Vol. 45, Peter Lang, 2008.

5.
Abu-Nimeh, Saeed, Thomas M. Chen, Omar Alzubi, "Malicious and spam posts in online social networks," Proc. of the Computer 9, pp. 23-28, 2007.

6.
S. Hamdi, A. L. Gancarski, A. Bouzeghoub, S. B. Yahia, "IRIS: A novel method of direct trust computation for generating trusted social networks," Proc. of the TrustCom, pp. 616-623, 2012.

7.
Z. Zhang and K. Wang, "A Trust Model for Multimedia Social Networks," Journal of Social Netw. Analys. Mining, Vol. 3, No. 4, pp. 969-979, 2012.

8.
A. Louati, J. El Haddad, and S. Pinson, "Trust-based service discovery in multi-relation social networks," Proc. of the ICSOC, pp. 664-671, 2012.

9.
Burke, Moira, Cameron Marlow, Thomas Lento. "Social network activity and social well-being," Proc. of the SIGCHI conference, 2010.

10.
Ellison, Nicole B., "Social network sites: Definition, history, and scholarship," Journal of the Computer Mediated Communication, Vol. 13, No. 1, pp. 210-230, 2007. crossref(new window)

11.
Yosub Han, Laehyun Kim, and Jeongwon Cha, "Computing user reputation in a social network of web 2.0," Journal of Computing and Informatics, Vol. 31, No. 2, pp. 447-462, 2012.