A TRUSTWORTHY eWOM IN SOCIAL NETWORKS

被引:0
|
作者
Brinda, Josephine, V [1 ]
Shabu, Jany [1 ]
机构
[1] Sathyabama Univ, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While making a decision reviews are very important. Being it may be purchase of new product or waiting for a service or to start a new business, reviews are being used. One of the most important factors which we are using in recent world is the online reviews. Be it may be an organization or individual online reviews play a vital role. They are considered as one of most important marketing tool. It can be also referred as Reference guide for the consumers which help in identifying the quality product or a service. These evaluations will generate the electronic word of mouth. In this competitive world even fake reviews are used to promote or discredit a product and its service. Preventing this fake review system has become a new challenge for the organization to identify a quality product. In general these fake reviews we refer to as attacks in review system. For which we use three rescue methods, as generation of token, cryptographic methods and signature method to overcome this attacks.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Generation Y: Social Norm, eWoM and Use of Social Networks
    Reyes Moreno, Cesareo
    Parra Lopez, Eduardo
    Acosta Rubio, Zamira del Rosario
    [J]. MARKETING AND SMART TECHNOLOGIES, ICMARKTECH 2021, VOL 2, 2022, 280 : 479 - 494
  • [2] Toward Trustworthy Vehicular Social Networks
    Yang, Qing
    Wang, Honggang
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (08) : 42 - 47
  • [3] Trustworthy Distributed Computing on Social Networks
    Mohaisen, Aziz
    Tran, Huy
    Chandra, Abhishek
    Kim, Yongdae
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2014, 7 (03) : 333 - 345
  • [4] Trustworthy Crowdsourcing via Mobile Social Networks
    Kantarci, Burak
    Mouftah, Hussein T.
    [J]. 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 2905 - 2910
  • [5] Trustworthy adaptive adversarial perturbations in social networks
    Zhang, Jiawei
    Wang, Jinwei
    Wang, Hao
    Luo, Xiangyang
    Ma, Bin
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 80
  • [6] Blockchain solutions for trustworthy decentralization in social networks
    Mlika, Fatma
    Karoui, Wafa
    Ben Romdhane, Lotfi
    [J]. COMPUTER NETWORKS, 2024, 244
  • [7] Towards Trustworthy Participants in Social Participatory Networks
    Xu, Guangquan
    Liu, Bin
    Ren, Yuanyuan
    Huang, Runhe
    Zhang, Gaoxu
    Feng, Zhiyong
    Li, Xiaohong
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 194 - 199
  • [8] The Most Trustworthy Path Selection in Online Social Networks
    Liu, Lianggui
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [9] Trustworthy Caching for Mobile Big Data in Social Networks
    Xu, Qichao
    Su, Zhou
    Dai, Minghui
    [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 808 - 812
  • [10] Predicting the influence of users' posted information for eWOM advertising in social networks
    Chen, Yen-Liang
    Tang, Kwei
    Wu, Chia-Chi
    Jheng, Ru-Yun
    [J]. ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2014, 13 (06) : 431 - 439