ering and collaborative directories. In (Atterer
et al.,2006) the authors focused on tasks such as clas-
sifying the user with regard to computer usage profi-
ciency or making a detailed assessment of how long it
took users to fill in fields of a form. They developed
an HTTP proxy that collects data about mouse move-
ments, keyboard input and more. Similarly in the
work of Velayathan and Al. (Velayathan and Yamada,
2007), an unobtrusively framework logs and analyses
users’ behaviour to extract effective rules to evaluate
web-pages using a machine-learning techniques. In
the work reported in (Kelly and Belkin, 2001) the au-
thors focused on the hypothesis that users will spend
more time, scroll more often and interact more with
those documents they find relevant. Similarly, in the
work of Weinreich et Al., (Weinreich et al., 2006) au-
thors found that users spend less than 12 seconds on
nearly 50% of the web-pages shown to them demon-
strating users make nearly 50% of their decision to
navigate to the next page before reading substantial
part of the contents.
Collaboration is a process where people interact
each other toward a common goal, by sharing their
knowledge, learning and building consensus. There
are two main way to provide judgement: explicitly
and implicitly. In the former way, users can pro-
vide feedback using a specific metric, for example as
in eBay and Amazon community. In the latter way,
implicit judgements are inferred from user behaviour
while doing a specific action. Collaboration applied
to the Web 2.0 supports a new kind of shared intelli-
gence, named Collective Intelligence where users are
able to generate their own content building up an in-
frastructure where contributions are not merely quan-
titative but also qualitative.
The relevance of Trust and Reputation in human
societies is indisputably recognised A trust-based de-
cision is a multi-stage process on a specific domain.
This process starts identifying and selecting pieces
of trust evidence, generally domain-specific, conduct-
ing an analysis over the application involved. Subse-
quently, trust values are produced performing a Trust
computation over the pieces of evidences estimating
the trustworthiness of entities in the domain consid-
ered. Both the previous steps are informed by a no-
tion of trust in the Trust model and the final Trust de-
cision is taken by considering the computed valued
along with exogenous factor like disposition or risk
assessments. The proliferation of collaborative envi-
ronments represent good examples in which Compu-
tational Trust paradigms are applied in order to eval-
uate the trustworthiness of virtual identities. Longo et
al. (Longo et al., 2007) conceived a set of rare trust
evidences based on time and applied on Wikipedia,
demonstrating how plausible Trust decisions can be
reached using exclusively temporal factors. Team-
work and co-operation (Montaner et al., 2002) repre-
sent other areas where the game theory is the predom-
inant paradigm considered to design Computational
Trust models.
3 IMPLICIT/EXPLICIT
COLLABORATION:
EXPERIMENT AND TRUST
MODEL
The hypothesis behind this work is to understand
whether, taking into account an entity and applying
Computational Trust paradigms by using reasoning
techniques, explicit human judgements are correlated
with the corresponding implicit derived feedback. We
explore this question in the context of web-page me-
dia. If the answer is positive, i.e., there exists a cor-
relation between them, it is possible to build up a col-
laborative environment achieving good predictions in
a non-invasive way. In particular, we can conclude
that, examining users’ behaviour while surfing the In-
ternet, we can generate a set of ranked results where
the top ones represent the most valuable content con-
sidered by users and thus, by implication valuable to
other similar users. We refer at this kind of collabora-
tion as implicit collaboration to distinguish from the
classic, explicit collaboration, where users expressly
provide feedback, evaluations and judgements. Our
solution was to log all the activity in the browser gath-
ering the main events(E
i
) that may occur during an In-
ternet session. The logger does not perform any kind
of computation, it does not apply any Computational
Trust paradigms nor does it filter out events.
We conducted experiments in order to investigate
the ability of our approach to gather logs of user be-
haviour. 25 unpaid volunteers, with different back-
grounds, were recruited to participate in this study.
We asked each of them to organise a trip to Morocco,
2-weeks long, surfing a pre-defined list of web-sites
from which it is possible to collect information about
popular cities, transports, hotels. We proposed a list
of 12 selected urls, that users can use within 60 min-
utes in which they have to naturally interact with the
browser, collecting useful data, cutting and pasting
relevant information, bookmarking interesting pages,
submitting data, saving picture or documents in order
to recover this information in the future. Finally, we
ask to each of them to explicitly provide a judgement
of the usefulness of each web-site using a common
scale from 1 to 10 (1 means not useful and 10 means
WEBIST 2009 - 5th International Conference on Web Information Systems and Technologies
694