A reputation system is a program or
algorithm
In mathematics and computer science, an algorithm () is a finite sequence of Rigour#Mathematics, mathematically rigorous instructions, typically used to solve a class of specific Computational problem, problems or to perform a computation. Algo ...
that allow users of an
online community
An online community, also called an internet community or web community, is a community whose members engage in computer-mediated communication primarily via the Internet. Members of the community usually share common interests. For many, on ...
to rate each other in order to build
trust through
reputation
The reputation or prestige of a social entity (a person, a social group, an organization, or a place) is an opinion about that entity – typically developed as a result of social evaluation on a set of criteria, such as behavior or performance.
...
. Some common uses of these systems can be found on
E-commerce
E-commerce (electronic commerce) refers to commercial activities including the electronic buying or selling products and services which are conducted on online platforms or over the Internet. E-commerce draws on technologies such as mobile co ...
websites such as
eBay
eBay Inc. ( , often stylized as ebay) is an American multinational e-commerce company based in San Jose, California, that allows users to buy or view items via retail sales through online marketplaces and websites in 190 markets worldwide. ...
,
Amazon.com
Amazon.com, Inc., doing business as Amazon, is an American multinational technology company engaged in e-commerce, cloud computing, online advertising, digital streaming, and artificial intelligence. Founded in 1994 by Jeff Bezos in Bellevu ...
, and
Etsy
Etsy, Inc. is an American e-commerce company with an emphasis on the selling of handmade or vintage items and craft supplies. These items fall under a wide range of categories, including jewelry, bags, clothing, home decor, religious items, furni ...
as well as online advice communities such as
Stack Exchange. These reputation systems represent a significant trend in "decision support for Internet mediated service provisions".
With the popularity of online communities for shopping, advice, and exchange of other important information, reputation systems are becoming vitally important to the online experience. The idea of reputation systems is that even if the consumer can't physically try a product or service, or see the person providing information, that they can be confident in the outcome of the exchange through trust built by
recommender system
A recommender system (RecSys), or a recommendation system (sometimes replacing ''system'' with terms such as ''platform'', ''engine'', or ''algorithm'') and sometimes only called "the algorithm" or "algorithm", is a subclass of information fi ...
s.
Collaborative filtering
Collaborative filtering (CF) is, besides content-based filtering, one of two major techniques used by recommender systems.Francesco Ricci and Lior Rokach and Bracha ShapiraIntroduction to Recommender Systems Handbook, Recommender Systems Handbo ...
, used most commonly in recommender systems, are related to reputation systems in that they both collect ratings from members of a community.
The core difference between reputation systems and collaborative filtering is the ways in which they use user
feedback
Feedback occurs when outputs of a system are routed back as inputs as part of a chain of cause and effect that forms a circuit or loop. The system can then be said to ''feed back'' into itself. The notion of cause-and-effect has to be handle ...
. In collaborative filtering, the goal is to find similarities between users in order to recommend products to customers. The role of reputation systems, in contrast, is to gather a collective opinion in order to build trust between users of an online community.
Types
Online
Howard Rheingold
Howard Rheingold (born 1947) is an American critic, writer, and teacher, known for his specialties on the cultural, social and political implications of modern communication media such as the Internet, mobile telephony and virtual communities.
B ...
states that online reputation systems are "computer-based technologies that make it possible to manipulate in new and powerful ways an old and essential human trait". Rheingold says that these systems arose as a result of the need for Internet users to gain trust in the individuals they transact with online. The trait he notes in human groups is that social functions such as gossip "keeps us up to date on who to trust, who other people trust, who is important, and who decides who is important". Internet sites such as
eBay
eBay Inc. ( , often stylized as ebay) is an American multinational e-commerce company based in San Jose, California, that allows users to buy or view items via retail sales through online marketplaces and websites in 190 markets worldwide. ...
and
Amazon
Amazon most often refers to:
* Amazon River, in South America
* Amazon rainforest, a rainforest covering most of the Amazon basin
* Amazon (company), an American multinational technology company
* Amazons, a tribe of female warriors in Greek myth ...
, he argues, seek to make use of this social trait and are "built around the contributions of millions of customers, enhanced by reputation systems that police the quality of the content and transactions exchanged through the site".
Reputation banks
The emerging
sharing economy
The sharing economy is a socio-economic system whereby consumers share in the creation, production, distribution, trade and consumption of goods, and services. These systems take a variety of forms, often leveraging information technology and the ...
increases the importance of trust in
peer-to-peer
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network, forming a peer-to-peer network of Node ...
marketplace
A marketplace, market place, or just market, is a location where people regularly gather for the purchase and sale of provisions, livestock, and other goods. In different parts of the world, a marketplace may be described as a ''souk'' (from ...
s and services.
Users can build up reputation and trust in individual systems but usually don't have the ability to carry those reputations to other systems. Rachel Botsman and Roo Rogers argue in their book ''What's Mine is Yours'' (2010),
that "it is only a matter of time before there is some form of network that aggregates
reputation capital across multiple forms of Collaborative Consumption". These systems, often referred to as reputation banks, try to give users a platform to manage their reputation capital across multiple systems.
Maintaining effective reputation systems
The main function of reputation systems is to build a sense of trust among users of online communities. As with
brick and mortar stores, trust and reputation can be built through
customer feedback. Paul Resnick from the Association for Computing Machinery describes three properties that are necessary for reputation systems to operate effectively.
# Entities must have a long lifetime and create accurate expectations of future interactions.
# They must capture and distribute feedback about prior interactions.
# They must use feedback to guide trust.
These three properties are critically important in building reliable reputations, and all revolve around one important element: user feedback. User feedback in reputation systems, whether it be in the form of comments, ratings, or recommendations, is a valuable piece of information. Without user feedback, reputation systems cannot sustain an environment of trust.
Eliciting user feedback can have three related problems.
# The first of these problems is the willingness of users to provide feedback when the option to do so is not required. If an online community has a large stream of interactions happening, but no feedback is gathered, the environment of trust and reputation cannot be formed.
# The second of these problems is gaining negative feedback from users. Many factors contribute to users not wanting to give negative feedback, the most prominent being a fear of retaliation. When feedback is not anonymous, many users fear retaliation if negative feedback is given.
# The final problem related to user feedback is eliciting honest feedback from users. Although there is no concrete method for ensuring the truthfulness of feedback, if a community of honest feedback is established, new users will be more likely to give honest feedback as well.
Other pitfalls to effective reputation systems described by A. Josang et al. include change of identities and discrimination. Again these ideas tie back to the idea of regulating user actions in order to gain accurate and consistent user feedback. When analyzing different types of reputation systems it is important to look at these specific features in order to determine the effectiveness of each system.
Standardization attempt
The
IETF
The Internet Engineering Task Force (IETF) is a standards organization for the Internet standard, Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster ...
proposed a protocol to exchange reputation data. It was originally aimed at email applications, but it was subsequently developed as a general architecture for a reputation-based service, followed by an email-specific part. However, the workhorse of email reputation remains with DNSxL's, which do not follow that protocol. Those specification don't say how to collect feedback —in fact, the ''granularity'' of email sending entities makes it impractical to collect feedback directly from recipients— but are only concerned with reputation query/response methods.
Notable examples of practical applications
* Search: web (see
PageRank
PageRank (PR) is an algorithm used by Google Search to rank web pages in their search engine results. It is named after both the term "web page" and co-founder Larry Page. PageRank is a way of measuring the importance of website pages. Accordin ...
)
* eCommerce:
eBay
eBay Inc. ( , often stylized as ebay) is an American multinational e-commerce company based in San Jose, California, that allows users to buy or view items via retail sales through online marketplaces and websites in 190 markets worldwide. ...
,
Epinions
Epinions.com was a general consumer review site established in 1999. Epinions was acquired in 2003 by DealTime, later Shopping.com, which was acquired by eBay in 2005. Epinions users could access paid product reviews; the company sold advertisi ...
,
Bizrate
Connexity Inc. is a privately held Los Angeles operator of shopping web sites, including Shopzilla.com. Originally started as comparison shopping website Bizrate.com, the company changed its name to Shopzilla in 2004, and changed again to Con ...
,
Trustpilot
Trustpilot Group plc, is a Danish consumer business operating a review website founded in Denmark in 2007 that hosts reviews of businesses worldwide. Nearly one-million new reviews are posted each month. The site offers freemium services to bu ...
* Social news:
Reddit
Reddit ( ) is an American Proprietary software, proprietary social news news aggregator, aggregation and Internet forum, forum Social media, social media platform. Registered users (commonly referred to as "redditors") submit content to the ...
,
Digg
Digg (stylized in lowercase as digg) is an American news aggregator with a curated front page, aiming to select articles specifically for the Internet audience such as science, trending political issues, and viral phenomenon, viral Internet iss ...
,
Imgur
Imgur ( , stylized as imgur) is an American online image sharing and image hosting service with a focus on social gossip that was founded by Alan Schaaf in 2009. The service has hosted viral images and memes, particularly those posted on ...
* Programming communities:
Advogato
Advogato was an online community and social networking site dedicated to free software development and created by Raph Levien. In 2007, Steve Rainwater took over maintenance and new development from Raph. In 2016, Rainwater's running instance w ...
,
freelance marketplace
''Freelance'' (sometimes spelled ''free-lance'' or ''free lance''), ''freelancer'', or ''freelance worker'', are terms commonly used for a person who is self-employment, self-employed and not necessarily committed to a particular employer long- ...
s,
Stack Overflow
In software, a stack overflow occurs if the call stack pointer exceeds the stack bound. The call stack may consist of a limited amount of address space, often determined at the start of the program. The size of the call stack depends on many fa ...
* Wikis: Increase contribution quantity and quality
* Internet Security:
TrustedSource
* Question-and-Answer sites:
Quora
Quora is an American social question-and-answer website and online knowledge market headquartered in Mountain View, California. It was founded on June 25, 2009, and made available to the public on June 21, 2010. Users can post questions, answ ...
,
Yahoo! Answers,
Gutefrage.net,
Stack Exchange
* Email:
DNSBL
A Domain Name System blocklist, Domain Name System-based blackhole list, Domain Name System blacklist (DNSBL) or real-time blackhole list (RBL) is a service for operation of mail servers to perform a check via a Domain Name System (DNS) query w ...
and
DNSWL
An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Such restrictions can be appl ...
provide global reputation about email senders
* Personal Reputation:
CouchSurfing
CouchSurfing is a hospitality exchange service by which users can request free short-term homestays or interact with other people who are interested in travel. It is accessible via a website and mobile app. It uses a subscription business model ...
(for travelers),
* Non Governmental organizations (NGOs): GreatNonProfits.org,
GlobalGiving
GlobalGiving is a 501(c)(3) non-profit organization based in the United States that provides a global crowdfunding platform for grassroots charitable projects. Since 2002, more than 1.6 million donors on GlobalGiving have donated more than $750 ...
* Professional reputation of translators and translation outsourcers: BlueBoard at
ProZ.com
* All purpose reputation system:
Yelp, Inc.
* Academia: general
bibliometric measures, e.g. the
h-index
The ''h''-index is an author-level metric that measures both the productivity and citation impact of the publications, initially used for an individual scientist or scholar. The ''h''-index correlates with success indicators such as winning t ...
of a researcher.
Reputation as a resource
High
reputation capital often confers benefits upon the holder. For example, a wide range of studies have found a positive correlation between seller rating and selling price on
eBay
eBay Inc. ( , often stylized as ebay) is an American multinational e-commerce company based in San Jose, California, that allows users to buy or view items via retail sales through online marketplaces and websites in 190 markets worldwide. ...
, indicating that high reputation can help users obtain more money for their items. High
product reviews on online marketplaces can also help drive higher sales volumes.
Abstract reputation can be used as a kind of resource, to be traded away for short-term gains or built up by investing effort. For example, a company with a good reputation may sell lower-quality products for higher profit until their reputation falls, or they may sell higher-quality products to increase their reputation. Some reputation systems go further, making it explicitly possible to spend reputation within the system to derive a benefit. For example, on the
Stack Overflow
In software, a stack overflow occurs if the call stack pointer exceeds the stack bound. The call stack may consist of a limited amount of address space, often determined at the start of the program. The size of the call stack depends on many fa ...
community, reputation points can be spent on question "bounties" to incentivize other users to answer the question.
Even without an explicit spending mechanism in place, reputation systems often make it easier for users to spend their reputation without harming it excessively. For example, a
ridesharing company
A ridesharing company (or ridehailing service) is a company (or service offered by a company) that, via websites and mobile apps, matches passengers with drivers of vehicles for hire that, unlike taxis, cannot legally be hailed from the street. ...
driver with a high ride acceptance score (a metric often used for driver reputation) may opt to be more selective about his or her clientele, decreasing the driver's acceptance score but improving his or her driving experience. With the explicit feedback provided by the service, drivers can carefully manage their selectivity to avoid being penalized too heavily.
Attacks and defense
Reputation systems are in general vulnerable to attacks, and many types of attacks are possible. As the reputation system tries to generate an accurate assessment based on various factors including but not limited to unpredictable user size and potential adversarial environments, the attacks and defense mechanisms play an important role in the reputation systems.
Attack classification of reputation system is based on identifying which system components and design choices are the targets of attacks. While the defense mechanisms are concluded based on existing reputation systems.
Attacker model
The capability of the attacker is determined by several characteristics, e.g., the location of the attacker related to the system (insider attacker vs. outsider attacker). An insider is an entity who has legitimate access to the system and can participate according to the system specifications, while an outsider is any unauthorized entity in the system who may or may not be identifiable.
As the outsider attack is much more similar to other attacks in a computer system environment, the insider attack gets more focus in the reputation system. Usually, there are some common assumptions: the attackers are motivated either by selfish or malicious intent and the attackers can either work alone or in coalitions.
Attack classification
Attacks against reputation systems are classified based on the goals and methods of the attacker.
* Self-promoting Attack. The attacker falsely increases their own reputation. A typical example is the so-called
Sybil attack
A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is ...
where an attacker subverts the reputation system by creating a large number of
pseudonymous
A pseudonym (; ) or alias () is a fictitious name that a person assumes for a particular purpose, which differs from their original or true meaning (orthonym). This also differs from a new name that entirely or legally replaces an individual's ow ...
entities, and using them to gain a disproportionately large influence. A reputation system's vulnerability to a Sybil attack depends on how cheaply Sybils can be generated, the degree to which the reputation system accepts input from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically.
* Whitewashing Attack. The attacker uses some system vulnerability to update their reputation. This attack usually targets the reputation system's formulation that is used to calculate the reputation result. The whitewashing attack can be combined with other types of attacks to make each one more effective.
* Slandering Attack. The attacker reports false data to lower the reputation of the victim nodes. It can be achieved by a single attacker or a coalition of attackers.
* Orchestrated Attack. The attacker orchestrates their efforts and employs several of the above strategies. One famous example of an orchestrated attack is known as an oscillation attack.
* Denial of Service Attack. The attacker prevents the calculation and dissemination of reputation values in reputation systems by using
Denial of Service method.
Defense strategies
Here are some strategies to prevent the above attacks.
* Preventing Multiple Identities
* Mitigating Generation of False Rumors
* Mitigating Spreading of False Rumors
* Preventing Short-Term Abuse of the System
* Mitigating Denial of Service Attacks
See also
*
Collaborative filtering
Collaborative filtering (CF) is, besides content-based filtering, one of two major techniques used by recommender systems.Francesco Ricci and Lior Rokach and Bracha ShapiraIntroduction to Recommender Systems Handbook, Recommender Systems Handbo ...
*
Collective influence algorithm
*
Commons-based peer production
*
Defaulted executee
*
Government by algorithm
Government by algorithm (also known as algorithmic regulation, regulation by algorithms, algorithmic governance, algocratic governance, algorithmic legal order or algocracy) is an alternative form of government or social ordering where the usag ...
*
Honor system
An honor system, trust system or honesty system is a way of running a variety of endeavors based on trust, honor, and honesty.
The honor system is also a system granting freedom from customary surveillance (as to students or prisoners) with ...
*
Influence-for-hire
Influence-for-hire or collective influence, refers to the economy that has emerged around buying and selling influence on social media platforms.
Overview
Companies that engage in the influence-for-hire industry range from content farms to h ...
*
Karma
Karma (, from , ; ) is an ancient Indian concept that refers to an action, work, or deed, and its effect or consequences. In Indian religions, the term more specifically refers to a principle of cause and effect, often descriptively called ...
*
Online participation
*
Online presence management
*
Reputation capital
*
Reputation management
Reputation management, refers to the Social influence, influencing, controlling, enhancing, or concealing of an individual's or group's reputation. It is a marketing technique used to modify a person's or a company's reputation in a positive way. ...
*
Sesame Credit
Zhima Credit (; also known as Sesame Credit) is a private company-run credit scoring and loyalty program system developed by Ant Group, an affiliate of Alibaba Group. It uses data from Alibaba's services to compile its score. Customers receive a ...
*
Sharing economy
The sharing economy is a socio-economic system whereby consumers share in the creation, production, distribution, trade and consumption of goods, and services. These systems take a variety of forms, often leveraging information technology and the ...
*
Social Credit System
The Social Credit System ( zh , c = 社会信用体系 , p = shèhuì xìnyòng tǐxì ) is a national credit rating and Blacklisting, blacklist implemented by the government of China, government of the People's Republic of China. The social cred ...
*
Social currency
Social currency refers to the actual and potential resources from presence in social networks and communities, including both digital and offline. It is, in essence, an action made by a company or stance of being, to which consumers feel a sen ...
*
Social media optimization
Social media optimization (SMO) is the use of online platforms to generate income or publicity to increase the awareness of a brand, event, product or service. Types of social media involved include RSS feeds, blogging sites, social bookmarkin ...
*
Social profiling
*
Social translucence
*
Subjective logic
Subjective logic is a type of probabilistic logic that explicitly takes epistemic uncertainty and source trust into account. In general, subjective logic is suitable for modeling and analysing situations involving uncertainty and relatively unreli ...
*
Trust metric
In psychology and sociology, a trust metric is a measurement or metric of the degree to which one social actor (an individual or a group) trusts another social actor. Trust metrics may be abstracted in a manner that can be implemented on comput ...
*
Web of trust
In cryptography, a web of trust is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between a public key and its owner. Its decentralized trust model is an alternative to the ...
*
Whuffie
''Down and Out in the Magic Kingdom'' is a 2003 science fiction book, the first novel by Canadian author and digital-rights activist Cory Doctorow. It depicts people competing over how new technology is being used at Walt Disney World, in a pos ...
References
*
*
* D. Quercia, S. Hailes, L. Capra
Lightweight Distributed Trust Propagation ICDM 2007.
* R. Guha, R. Kumar, P. Raghavan, A. Tomkins
Propagation of Trust and Distrust WWW2004.
* A. Cheng, E. Friedman
Sybilproof reputation mechanisms SIGCOMM workshop on Economics of peer-to-peer systems, 2005.
* Hamed Alhoori, Omar Alvarez, Richard Furuta, Miguel Muñiz, Eduardo Urbina
Supporting the Creation of Scholarly Bibliographies by Communities through Online Reputation Based Social Collaboration.ECDL 2009: 180-191
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescueby Daniele Quercia and Stephen Hailes. IEEE INFOCOM 2010.
* J.R. Douceur
The Sybil Attack. IPTPS02 2002.
*
*
*
* {{cite conference
, last1=Zhang , first1=Jie
, last2=Cohen , first2=Robin
, title=Trusting Advice from Other Buyers in E-Marketplaces: The Problem of Unfair Ratings
, conference=Proceedings of the Eighth International Conference on Electronic Commerce (ICEC)
, location=New Brunswick, Canada
, year=2006
, url=http://www.ntu.edu.sg/home/zhangj/paper/icec06.pdf
External links
Reputation Systems- 2008 tutorial by Yury Lifshits
- 2008 essay (book chapter) by David D. Friedman.
Social systems
*
Technology in society
Mass media monitoring
Information systems
Social information processing
Social influence
Social networks
Social status