'Trust' is used in a variety of ways in computing literature, and social trust is emerging as an important computational problem. In open, distributed systems, like the web, people and organizations can be anonymous and trust and reputation become important.
Computing with Social Trust brings together a collection of important work in computing social trust from computer science and related disciplines. It is divided into three major sections. The first addresses theory, behaviour, and trust management, covering social analyses of how people develop trust, the dynamics of trust relationships, and systems for trust management. The second section describes algorithms and methods for computing trust in social contexts. Social networks, profile similarity, and participation in online communities are all potential sources from which trust can be computed. The final section contains applications that use trust, such as recommender systems, website access control, and email filtering.
This book has evolved out of roughly ve years of working on computing with social trust. In the beginning, getting people to accept that social networks and the relationships in them could be the basis for interesting, relevant, and exciting c- puter science was a struggle. Today, social networking and social computing have become hot topics, and those of us doing research in this space are nally nding a wealth of opportunities to share our work and to collaborate with others. This book is a collection of chapters that cover all the major areas of research in this space. I hope it will serve as a guide to students and researchers who want a strong introduction to work in the eld, and as encouragement and direction for those who are considering bringing their own techniques to bear on some of these problems. It has been an honor and privilege to work with these authors for whom I have so much respect and admiration. Thanks to all of them for their outstanding work, which speaks for itself, and for patiently enduringall my emails. Thanks, as always, to Jim Hendler for his constant support. Cai Ziegler has been particularly helpful, both as a collaborator, and in the early stages of development for this book. My appreciation also goes to Beverley Ford, Rebecca Mowat and everyone at Springer who helped with publication of this work.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Computing with Social Trust brings together a collection of important work in computing social trust from computer science and related disciplines. It is divided into three major sections. The first addresses theory, behaviour, and trust management, covering social analyses of how people develop trust, the dynamics of trust relationships, and systems for trust management. The second section describes algorithms and methods for computing trust in social contexts. Social networks, profile similarity, and participation in online communities are all potential sources from which trust can be computed. The final section contains applications that use trust, such as recommender systems, website access control, and email filtering.
This book has evolved out of roughly ve years of working on computing with social trust. In the beginning, getting people to accept that social networks and the relationships in them could be the basis for interesting, relevant, and exciting c- puter science was a struggle. Today, social networking and social computing have become hot topics, and those of us doing research in this space are nally nding a wealth of opportunities to share our work and to collaborate with others. This book is a collection of chapters that cover all the major areas of research in this space. I hope it will serve as a guide to students and researchers who want a strong introduction to work in the eld, and as encouragement and direction for those who are considering bringing their own techniques to bear on some of these problems. It has been an honor and privilege to work with these authors for whom I have so much respect and admiration. Thanks to all of them for their outstanding work, which speaks for itself, and for patiently enduringall my emails. Thanks, as always, to Jim Hendler for his constant support. Cai Ziegler has been particularly helpful, both as a collaborator, and in the early stages of development for this book. My appreciation also goes to Beverley Ford, Rebecca Mowat and everyone at Springer who helped with publication of this work.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
From the reviews:
"Social trust is becoming fundamental in computer science (CS), distributed systems, multiagent systems, e-commerce, and communication. This book provides a survey of the computational trust field. ... This is a commendable effort by the editor to consolidate the growing literature on computational trust in a single volume. ... it is a useful reference for both theorists and practitioners in the field of computational trust." (Haris Aziz, ACM Computing Reviews, May, 2009)
"Social trust is becoming fundamental in computer science (CS), distributed systems, multiagent systems, e-commerce, and communication. This book provides a survey of the computational trust field. ... This is a commendable effort by the editor to consolidate the growing literature on computational trust in a single volume. ... it is a useful reference for both theorists and practitioners in the field of computational trust." (Haris Aziz, ACM Computing Reviews, May, 2009)