2. Related works

Constant engagement on social networking sites significantly raises the chance of exposing one's identity either voluntarily or not voluntarily [13]. Excessive disclosure of one's personal information raises privacy-related issue and threat. In order to minimize the risk of overexposure one's identity, most if not all users on social networking sites [14] masked themselves using an Internet Identity (IID). They use IID to disguise themselves while communicating with others on these social networking sites. The process of uncovering the true identity of an online user one interacts with may not be easy as people constantly adopting new strategies to restrict the amount of information being disclosed on these social networking sites. Social networking sites play an important role at spreading information, news or ideas to all the connected nodes. Social networking sites create an endless source of information that is readily available for its users, but it is also undeniably that not all information obtained from social networking sites is always accurate and reliable. The fact that many social networking site readers and consumers rely extensively on the information obtained from these social networking sites to make their decision worried many business operators. Information spreading around social networking sites can change the public's viewpoint toward a product or service. Most of the user-generated contents on social networking sites are text, it is always important for business operators to extract and analyze these usergenerated contents to identify key promoters and detractors and, at the same time, to identify genuine and trustable contents. Figure 1 illustrates how an opinion flows from different sources and how information is perceived at the recipients.

Given the innumerable amount of information easily obtainable online, trusting a piece of information has always been a concern. In order to trust any content, it is important to understand what trust is. Trust is the most fundamental motivation behind different people cooperating together toward a common goal. There is no absolute definition of how trust can be initiated because the definition of trust varies for different applications, and it is always situational specific. Different researchers and research areas may also have their own definition of trust such as,

	- Challenged: Falcone & Castelfranchi—having high reliability in a person in general does not necessarily sufficient to decide such person is very dependable [21].

Figure 1. Opinion propagation model.

supported that trust played a key role in affecting one's decision. Without doubt, the use of social networking sites for large-scale information sharing and message spreading is effective [10–12], but there are still some shortcomings that need to be addressed where it includes online user-generated contents and the assessment on their credibility. This research suggests two approaches to investigate trust as a factor on influential maximization and trust with domain specified social nodes as a factor on influential maximization. The objective of this research is to uncover trust value of each social node by evaluating social node opinion consistency and then to evaluate the rate of successful influenced social nodes with and without the presence of trust and domain specified trust. This research formulates two hypothesizes. They are as follows: (1) trust is able to positively increase the rate of successfully influenced social nodes within a social networking site, and (2) trust is able to positively increase the rate of successfully influenced social nodes from trusted social networking site users that are in the same domain. This research also reviewed extensively on trust and trust-related implementation issues on social networking sites. This article will report the results gathered from the findings and presents a discussion of the two hypothesizes with a

Constant engagement on social networking sites significantly raises the chance of exposing one's identity either voluntarily or not voluntarily [13]. Excessive disclosure of one's personal information raises privacy-related issue and threat. In order to minimize the risk of overexposure one's identity, most if not all users on social networking sites [14] masked themselves using an Internet Identity (IID). They use IID to disguise themselves while communicating with others on these social networking sites. The process of uncovering the true identity of an online user one interacts with may not be easy as people constantly adopting new strategies to restrict the amount of information being disclosed on these social networking sites. Social networking sites play an important role at spreading information, news or ideas to all the connected nodes. Social networking sites create an endless source of information that is readily available for its users, but it is also undeniably that not all information obtained from social networking sites is always accurate and reliable. The fact that many social networking site readers and consumers rely extensively on the information obtained from these social networking sites to make their decision worried many business operators. Information spreading around social networking sites can change the public's viewpoint toward a product or service. Most of the user-generated contents on social networking sites are text, it is always important for business operators to extract and analyze these usergenerated contents to identify key promoters and detractors and, at the same time, to identify genuine and trustable contents. Figure 1 illustrates how an opinion flows from

Given the innumerable amount of information easily obtainable online, trusting a piece of information has always been a concern. In order to trust any content, it is important to understand what trust is. Trust is the most fundamental motivation behind different people cooperating together toward a common goal. There is no absolute definition of how trust can

different sources and how information is perceived at the recipients.

conclusion.

2. Related works

4 Recent Progress in Parallel and Distributed Computing

It is also said that the value of trust changes when it is being applied differently. The Trust Referent Characteristic table developed by Mcknight [22] best describes the trust-related characteristics that a node may display in an online environment. In this research, the Trust Referent Characteristics table has been improved with additional identified values by analyzing datasets obtained from [23–25]. Table 1 shows the updated Trust Referent Characteristic table.

This research examines the integrity of user-generated contents (highlighted in grey) as a form of trust on the social networking sites. Since social networking sites contain large amount of unstructured texts, content integrity can be analyzed by adopting text analysis algorithms from many researchers [26–29]. Algorithmic details and latest research application updates can be found in Ref. [30, 31]; therefore, it will not be covered in this article. Diffusion equations used in this research are formulated using Kempe's [32, 33] activation function. Eq. (1) illustrates Kempe's function:

$$P\_v(\mu, \mathcal{S}) = \frac{f\_v(\mathcal{S} \cup \{\mu\}) - f\_v(\mathcal{S})}{1 - f\_v(\mathcal{S})} \tag{1}$$

Table 1. Trust referent characteristic table.
