Computing with Social Trust (Human–Computer Interaction Series)

Computing with Social Trust (Human–Computer Interaction Series)

by JenniferGolbeck (Editor)

Synopsis

This book has evolved out of roughly ve years of working on computing with social trust. In the beginning, getting people to accept that social networks and the relationships in them could be the basis for interesting, relevant, and exciting c- puter science was a struggle. Today, social networking and social computing have become hot topics, and those of us doing research in this space are nally nding a wealth of opportunities to share our work and to collaborate with others. This book is a collection of chapters that cover all the major areas of research in this space. I hope it will serve as a guide to students and researchers who want a strong introduction to work in the eld, and as encouragement and direction for those who are considering bringing their own techniques to bear on some of these problems. It has been an honor and privilege to work with these authors for whom I have so much respect and admiration. Thanks to all of them for their outstanding work, which speaks for itself, and for patiently enduringall my emails. Thanks, as always, to Jim Hendler for his constant support. Cai Ziegler has been particularly helpful, both as a collaborator, and in the early stages of development for this book. My appreciation also goes to Beverley Ford, Rebecca Mowat and everyone at Springer who helped with publication of this work.

$205.19

Quantity

20+ in stock

More Information

Format: Hardcover
Pages: 348
Edition: 2009
Publisher: Springer
Published: 28 Nov 2008

ISBN 10: 1848003552
ISBN 13: 9781848003552

Media Reviews

From the reviews:

Social trust is becoming fundamental in computer science (CS), distributed systems, multiagent systems, e-commerce, and communication. This book provides a survey of the computational trust field. ... This is a commendable effort by the editor to consolidate the growing literature on computational trust in a single volume. ... it is a useful reference for both theorists and practitioners in the field of computational trust. (Haris Aziz, ACM Computing Reviews, May, 2009)