SELECTING TRUSTWORTHY CONTENT USING TAGS

Daniele Quercia, Licia Capra, Valentina Zanardi

2008

Abstract

Networked portable devices enable their users to easily create and share digital content (e.g., photos, videos). Hitherto, this serendipitous form of sharing has not happened. That may be because, for sharing content, mobile users have no choice but to go through the Internet. Users are thus in need of decentralised mechanisms for browsing location-based content. To realize such mechanisms, the following two questions must be answered first: how to select “relevant content”, by semantically matching user queries, and how to select “quality content” from the clutter generated by a potentially huge number of producers. We explore ways to answer these questions. We propose a combined approach that infers “relevance” by reasoning about the semantics emerging from the tags that users associate to content, and “quality” by running distributed trust models that recognize trustworthy producers.

References

  1. Anderson, R. (1996). The Eternity Service. In Proc. of Pragocrypt.
  2. Bassoli, A., Brewer, J., Martin, K., Dourish, P., and Mainwaring, S. (2007). Underground Aesthetics: Rethinking Urban Computing. IEEE Pervasive Computing, 6(3):39-45.
  3. Buchegger, S. and Boudec, J.-Y. L. (2004). A robust reputation system for P2P and mobile ad-hoc networks. In Proc. of the 2nd Workshop on the Economics of Peerto-Peer Systems.
  4. Capra, L. (2005). Reasoning about Trust Groups to Coordinate Mobile Ad-Hoc Systems. In Proc. of the 1st IEEE Workshop on the Value of Security Through Collaboration, Athens, Greece.
  5. Foucault, M. (1998). Of other space. The visual culture reader.
  6. Halpin, H., Robu, V., and Shepherd, H. (2007). The complex dynamics of collaborative tagging. In Proc. of the 16th Intl. Conference on World Wide Web, pages 211-220, NY, USA.
  7. Harada, T., Gyota, T., Kuniyoshi, Y., and Sato, T. (2007). Development of Wireless Networked Tiny Orientation Device for Wearable Motion Capture and Measurement of Walking Around, Walking Up and Down, and Jumping Tasks. In Proceedings of the IEEE Conference of Intelligent Robots and Systems, San Diego, US.
  8. Herbster, M., Pontil, M., and Wainer, L. (2005). Online learning over graphs. In Proc. of the 22nd Int. Conference on Machine Learning.
  9. Heymann, P., Koutrika, G., and Garcia-Molina, H. (2007). Can Social Bookmarking Improve Web Search? Resource Shelf.
  10. Hsu, W. H., Lancaster, J., Paradesi, M. S., and Weninger, T. (2007). Structural Link Analysis from User Profiles and Friends Networks: A Feature Construction Approach.
  11. Kelkar, S., John, A., and Seligmann, D. (2007). An Activity-based Perspective of Collaborative Tagging. Intl. Conference on Weblogs and Social Media.
  12. Kinateder, M. and Rothermel, K. (2003). Architecture and Algorithms for a Distributed Reputation System. In Proc. of the 1st Intl. Conference on Trust Management, pages 48-62, Crete.
  13. Kittur, A., Chi, E., and Suh, B. (2008). Crowdsourcing User Studies With Mechanical Turk. In Proceedings of the ACM Conference on Human-factors in Computing Systems, Florence, Italy.
  14. Koutrika, G., Effendi, F. A., Gyöngyi, Z., Heymann, P., and Garcia-Molina, H. (2007). Combating spam in tagging systems. In Proc. of the 3rd Intl. Workshop on Adversarial Information Retrieval on the Web, pages 57-64, NY, USA.
  15. L. McNamara, C. Mascolo and L. Capra (2007). Content Source Selection in Bluetooth Networks. In Proc. of Lathia, N., Hailes, S., and Capra, L. (2008). Evolving communities of recommenders: A temporal evaluation. In Research Note RN/08/01, Dept. of Computer Science, University College London.
  16. Liu, J. and Issarny, V. (2004). Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. In Proc. of the 2nd Intl. Conference on Trust Management, volume 2995, pages 48-62, Oxford.
  17. Mui, L., Mohtsahemi, M., Ang, C., Szolovits, P., and Halberstadt, A. (2001). Ratings in Distributed Systems: A Bayesian Approach. In Proc. of the 11th Workshop on Information Technologies and Systems, New Orleans, USA.
  18. Paulos, E. and Goodman, E. (2004). The familiar stranger: anxiety, comfort, and play in public places. In Proc. of ACM Conference on Human Factors in Computing Systems, pages 223-230.
  19. Quercia, D., Hailes, S., and Capra, L. (2006). B-trust: Bayesian Trust Framework for Pervasive Computing. In Proc. of the 4th International Conference on Trust Management, pages 298-312, Pisa, Italy. LNCS.
  20. Quercia, D., Hailes, S., and Capra, L. (2007a). Lightweight Distributed Trust Propagation. In Proc. of the 7th IEEE International Conference on Data Mining, Omaha, US.
  21. Quercia, D., Hailes, S., and Capra, L. (2007b). TRULLO - local trust bootstrapping for ubiquitous devices. In Proc. of the 4th IEEE Intl. Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.
  22. Rattenbury, T., Good, N., and Naaman, M. (2007). Towards automatic extraction of event and place semantics from flickr tags. In Proc. of the 30th ACM Conference on Research and Development in Information Retrieval, pages 103-110, Amsterdam, The Netherlands.
  23. Ruan, J. and Zhang, W. (2008). Identifying network communities with a high resolution. Physical Review E (Statistical, Nonlinear, and Soft Matter Physics), 77(1).
  24. Sen, S., Lam, S. K., Rashid, A. M., Cosley, D., Frankowski, D., Osterhouse, J., Harper, M. F., and Riedl, J. (2006). Tagging, Communities, Vocabulary, Evolution. In Proc. of the 20th Conference on Computer Supported Cooperative Work, pages 181-190, NY, USA.
  25. Sharon, M. (2006). Mobile Mappa Mundi: using cell phones as associative mapping tools. In Socialight White Paper.
  26. Steen, M. (2007). TomTom and Vodafone crowdsource traffic information. Financial Times, November 12th.
  27. TheEconomist (2006). The trouble with YouTube. August 31st .
  28. TheEconomist (2007). Who's afraid of Google? 30th.
  29. Wu, X., Zhang, L., and Yu, Y. (2006). Exploring social annotations for the semantic web. In Proceedings of the 15th ACM Conference on World Wide Web, Edinburgh, UK.
  30. Zanardi, V., , and Capra, L. (2008). Social Ranking: Finding Relevant Content in Web 2.0. In Proceedings of International Workshop on Recommender Systems, Patras, Greece.
  31. Zhou, D., Manavoglu, E., Li, J., Giles, L. C., and Zha, H. (2006). Probabilistic models for discovering ecommunities. In Proceedings of the 15th International Conference on World Wide Web, pages 173-182, New York, NY, USA. ACM Press.
  32. Zhu, X., Ghahramani, Z., and Lafferty, J. (2003). Semisupervised learning using Gaussian fields and harmonic functions. In Proc. of the 20th International Conference on Machine Learning, Washington, USA.
Download


Paper Citation


in Harvard Style

Quercia D., Capra L. and Zanardi V. (2008). SELECTING TRUSTWORTHY CONTENT USING TAGS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: Special Session on Trust in Pervasive Systems and Networks, (ICETE 2008) ISBN 978-989-8111-59-3, pages 501-508. DOI: 10.5220/0001921205010508


in Bibtex Style

@conference{special session on trust in pervasive systems and networks08,
author={Daniele Quercia and Licia Capra and Valentina Zanardi},
title={SELECTING TRUSTWORTHY CONTENT USING TAGS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: Special Session on Trust in Pervasive Systems and Networks, (ICETE 2008)},
year={2008},
pages={501-508},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001921205010508},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: Special Session on Trust in Pervasive Systems and Networks, (ICETE 2008)
TI - SELECTING TRUSTWORTHY CONTENT USING TAGS
SN - 978-989-8111-59-3
AU - Quercia D.
AU - Capra L.
AU - Zanardi V.
PY - 2008
SP - 501
EP - 508
DO - 10.5220/0001921205010508