False-Name-Proof Recommendations in Social Networks
نویسندگان
چکیده
We study the problem of finding a recommendation for an uninformed user in a social network by weighting and aggregating the opinions offered by the informed users in the network. In social networks, an informed user may try to manipulate the recommendation by performing a false-name manipulation, wherein the user submits multiple opinions through fake accounts. To that end, we impose a no harm axiom: false-name manipulations by a user should not reduce the weight of other users in the network. We show that this axiom has deep connections to false-nameproofness. While it is impossible to design a mechanism that is best for every network subject to this axiom, we propose an intuitive mechanism LEGIT, and show that it is uniquely optimized for small networks. Using real-world datasets, we show that our mechanism performs very well compared to two baseline mechanisms in a number of metrics, even on large networks.
منابع مشابه
Optimal false-name-proof single-item redistribution mechanisms
Although the celebrated Vickrey auction is strategy-proof and guaranteed to achieve an efficient allocation in a singleobject auction, if there exists no outside party (i.e., a seller or an auctioneer) with the right to collect the payment, the collected payment will be wasted. Redistribution mechanisms try to redistribute the payment to participating agents as much as possible without violatin...
متن کاملFalse-Name-Proof Mechanisms for Hiring a Team
We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents’ best interest to reveal ownership of all elements (which may no...
متن کاملCharacterization of false-name-proof social choice mechanisms
Mechanism Design has been developed as a significant tool to model and analyze markets, economies, and societies in the real-world. On the Internet, however, we face some unexpected problems such as false-name manipulations, and traditional mechanism design does not work sufficiently. In this thesis, we will developmechanism design into amore applicable theory for computer sciences and economic...
متن کاملA Review of Spatial Factor Modeling Techniques in Recommending Point of Interest Using Location-based Social Network Information
The rapid growth of mobile phone technology and its combination with various technologies like GPS has added location context to social networks and has led to the formation of location-based social networks. In social networking sites, recommender systems are used to recommend points of interest (POIs) to users. Traditional recommender systems, such as film and book recommendations, have a lon...
متن کاملThe effect of false-name bids in combinatorial auctions: new fraud in internet auctions
We examine the effect of false-name bids on combinatorial auction protocols. Falsename bids are bids submitted by a single bidder using multiple identifiers such as multiple e-mail addresses. The obtained results are summarized as follows: 1) The Vickrey-Clarke-Groves (VCG) mechanism, which is strategy-proof and Pareto efficient when there exists no false-name bids, is not false-name-proof, 2) ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016