{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:15:57Z","timestamp":1775229357389,"version":"3.50.1"},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2014,6]]},"abstract":"<jats:p>Modeling trust in very large social networks is a hard problem due to the highly noisy nature of these networks that span trust relationships from many different contexts, based on judgments of reliability, dependability, and competence. Furthermore, relationships in these networks vary in their level of strength. In this article, we introduce a novel extension of structural balance theory as a foundational theory of trust and distrust in networks. Our theory preserves the distinctions between trust and distrust as suggested in the literature, but also incorporates the notion of relationship strength that can be expressed as either discrete categorical values, as pairwise comparisons, or as metric distances. Our model is novel, has sound social and psychological basis, and captures the classical balance theory as a special case. We then propose a convergence model, describing how an imbalanced network evolves towards new balance, and formulate the convergence problem of a social network as a Metric Multidimensional Scaling (MDS) optimization problem. Finally, we show how the convergence model can be used to predict edge signs in social networks and justify our theory through extensive experiments on real datasets.<\/jats:p>","DOI":"10.1145\/2628438","type":"journal-article","created":{"date-parts":[[2014,7,7]],"date-time":"2014-07-07T11:55:18Z","timestamp":1404734118000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Foundations of Trust and Distrust in Networks"],"prefix":"10.1145","volume":"8","author":[{"given":"Yi","family":"Qian","sequence":"first","affiliation":[{"name":"Renssealer Polytechnic Institute, Troy, NY"}]},{"given":"Sibel","family":"Adali","sequence":"additional","affiliation":[{"name":"Renssealer Polytechnic Institute, Troy, NY"}]}],"member":"320","published-online":{"date-parts":[[2014,7,8]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Modeling Trust Context in Networks","author":"Adal\u0131 S.","unstructured":"S. Adal\u0131 . 2013. Modeling Trust Context in Networks . Springer . S. Adal\u0131. 2013. Modeling Trust Context in Networks. Springer."},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"D. Ames S. Fiske and A. Todorov. 2011. Impression formation: A focus on others' intents. In The Oxford Handbook of Social Neuroscience J. Decety and J. Cacioppo Eds. Oxford University Press 419--433.  D. Ames S. Fiske and A. Todorov. 2011. Impression formation: A focus on others' intents. In The Oxford Handbook of Social Neuroscience J. Decety and J. Cacioppo Eds. Oxford University Press 419--433.","DOI":"10.1093\/oxfordhb\/9780195342161.013.0028"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0908800106"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1067036"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963440"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0046049"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872676702000206"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECT.2005.98"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(01)00051-X"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the IEEE International Conference on Social Computing (SocialCom'11)","author":"Dubois T.","unstructured":"T. Dubois , J. Golbeck , and A. Srinavasan . 2011. Predicting trust and distrust in social networks . In Proceedings of the IEEE International Conference on Social Computing (SocialCom'11) . T. Dubois, J. Golbeck, and A. Srinavasan. 2011. Predicting trust and distrust in social networks. In Proceedings of the IEEE International Conference on Social Computing (SocialCom'11)."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2009.109"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"D. Easley and J. Kleinberg. 2010. Networks Crowds and Markets: Reasoning about a Highly Connected World. Cambridge University Press New York.   D. Easley and J. Kleinberg. 2010. Networks Crowds and Markets: Reasoning about a Highly Connected World. Cambridge University Press New York.","DOI":"10.1017\/CBO9780511761942"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2006.11.005"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31843-9_25"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963220"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'08)","volume":"3","author":"Hang C.","unstructured":"C. Hang , Y. Wang , and M. Singh . 2008. An adaptive probabilistic trust model and its evaluation . In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'08) . Vol. 3 . 1485--1488. C. Hang, Y. Wang, and M. Singh. 2008. An adaptive probabilistic trust model and its evaluation. In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'08). Vol. 3. 1485--1488."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2456485.2456517"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11755593_14"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754397"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the 10th International Conference on Information Processing in Sensor Networks (IPSN'11)","author":"Le H.","unstructured":"H. Le , J. Pasternack , H. Ahmadi , M. Gupta , Y. Sun , T. Abdelzaher , J. Han , D. Roth , B. Szymanski , and S. Adal\u0131 . 2011. Apollo: Towards factfinding in participatory sensing . In Proceedings of the 10th International Conference on Information Processing in Sensor Networks (IPSN'11) . 129--130. H. Le, J. Pasternack, H. Ahmadi, M. Gupta, Y. Sun, T. Abdelzaher, J. Han, D. Roth, B. Szymanski, and S. Adal\u0131. 2011. Apollo: Towards factfinding in participatory sensing. In Proceedings of the 10th International Conference on Information Processing in Sensor Networks (IPSN'11). 129--130."},{"key":"e_1_2_1_23_1","volume-title":"Recent Developments in Statistics","author":"Leeuw J. D.","unstructured":"J. D. Leeuw . 1977. Applications of convex analysis to multidimensional scaling . In Recent Developments in Statistics , J. Barra, F. Brodeau, F. Romier, and B. V. Cutsem, Eds., North-Holland Publishing , 133--145. J. D. Leeuw. 1977. Applications of convex analysis to multidimensional scaling. In Recent Developments in Statistics, J. Barra, F. Brodeau, F. Romier, and B. V. Cutsem, Eds., North-Holland Publishing, 133--145."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 7th USENIX Security Symposium (SSYM'98)","volume":"7","author":"Levien R.","unstructured":"R. Levien and A. Aiken . 1998. Attack-resistant trust metrics for public key certification . In Proceedings of the 7th USENIX Security Symposium (SSYM'98) . Vol. 7 , USENIX Association, 18. R. Levien and A. Aiken. 1998. Attack-resistant trust metrics for public key certification. In Proceedings of the 7th USENIX Security Symposium (SSYM'98). Vol. 7, USENIX Association, 18."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956972"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11429760_14"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 11th Annual International Conference on Privacy, Security and Trust (PST'13)","author":"Qian Y.","unstructured":"Y. Qian and S. Adal\u0131 . 2013. Extended structural balance theory for modeling trust in social networks . In Proceedings of the 11th Annual International Conference on Privacy, Security and Trust (PST'13) . 283--290. Y. Qian and S. Adal\u0131. 2013. Extended structural balance theory for modeling trust in social networks. In Proceedings of the 11th Annual International Conference on Privacy, Security and Trust (PST'13). 283--290."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433405"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X05000129"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.2307\/2096399"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2010.10.015"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the 22nd International Conference on World Wide Web (WWW'13)","author":"Yao Y.","unstructured":"Y. Yao , H. Tong , X. Yan , F. Xu , and J. Lu . 2013. Matri: A multi-aspect and transitive trust inference model . In Proceedings of the 22nd International Conference on World Wide Web (WWW'13) . 1467--1476. Y. Yao, H. Tong, X. Yan, F. Xu, and J. Lu. 2013. Matri: A multi-aspect and transitive trust inference model. In Proceedings of the 22nd International Conference on World Wide Web (WWW'13). 1467--1476."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190745"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04)","author":"Ziegler C.-N.","unstructured":"C.-N. Ziegler and G. Lausen . 2004. Spreading activation models for trust propagation . In Proceedings of the IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04) . IEEE Computer Society, 83--97. C.-N. Ziegler and G. Lausen. 2004. Spreading activation models for trust propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04). IEEE Computer Society, 83--97."}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2628438","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2628438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:29Z","timestamp":1750231169000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2628438"}},"subtitle":["Extended Structural Balance Theory"],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["10.1145\/2628438"],"URL":"https:\/\/doi.org\/10.1145\/2628438","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"value":"1559-1131","type":"print"},{"value":"1559-114X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6]]},"assertion":[{"value":"2013-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}