To read this content please select one of the options below:

Trust evaluation between users of social networks using the quality of service requirements and call log histories

Parina Alamir (Department of Computer Engineering, Shabestar Branch, Islamic Azad University, Shabestar, Iran)
Nima Jafari Navimipour (Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran)

Kybernetes

ISSN: 0368-492X

Article publication date: 7 November 2016

408

Abstract

Purpose

As social networking services are popular, the need for recognizing reliable people has become the main concern. Quantifying the relationships between the users of social networks is also one of the important challenges with the increasing number of users. So, trust plays an important role in social networks in order to recognize trustworthy people. The purpose of this paper is to propose an approach to recognize trustworthy users and protect users from abuse by untrustable users.

Design/methodology/approach

In this paper, the authors suggest a method to measure the trust value between users of social networks based on call log histories such as abundance, novelty, and sincerity and quality of service (QoS) requirements such as accessibility, response ability, tend to respond, and agility. After that, the authors calculate error-hit, precision, and recall to evaluate the trust value.

Findings

The results indicate that the proposed approach has better performance in terms of error-hit, precision, and recall than FIFO, combined, QoS-based, and call log-based method.

Originality/value

In this paper, the trust issue in social networks is pointed out and a new approach to evaluate the trust value is proposed based on call log histories and QoS requirements.

Keywords

Acknowledgements

Corrigendum: It has come to our attention that “Trust evaluation between users of social networks using the quality of service requirements and call log histories” by Parina Alamir and Nima Jafari Navimipour, published in Kybernetes, Vol. 45 No. 10, 2016, did not fully attribute sources drawn upon. This was: “Trust evaluation in the social networks using the quality of service requirements and call log histories”, by Nima Jafari Navimipour and Parina Alamir, published in Persain in the Biannual Journal for Cyberspace Security, Vol. 4 No. 2, 2016, pp. 53-66. The authors sincerely apologise for this.

Citation

Alamir, P. and Navimipour, N.J. (2016), "Trust evaluation between users of social networks using the quality of service requirements and call log histories", Kybernetes, Vol. 45 No. 10, pp. 1505-1523. https://doi.org/10.1108/K-07-2015-0171

Publisher

:

Emerald Group Publishing Limited

Copyright © 2016, Emerald Group Publishing Limited

Related articles