<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Structural Transitivity of Trust in Academic Social Networks Using Agent-Based Simulation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Diana F. Adamatti</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Cristiano Castelfranchi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rino Falcone</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Istituto di Scienze e Tecnologie della Cognizione - Consiglio Nazionale delle Richerce - Roma -</institution>
          <country country="IT">Italia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Research interest in social networks area can be explained mainly because this type of network: (i) promotes the interpersonal relationship; (ii) has a natural tendency for knowledge emergence; (iii) generates large volumes of information. This interest is reinforced due to the fact that since the 90's Web Social Networks, e.g. Facebook or Orkut, have millions of users around the world. Our proposal in this paper is to analyze the physical structure of three computer networks topologies - centralized, decentralized and distributed - in a real academic social network, the Lattes Curriculum. The main question is how the network structure could influence the flow of the trust transitivity between the members of the network. Firstly, we conducted a survey with researchers about their trust in Lattes Curriculum and later we developed an agent-based model and simulated it to analyze the resulting data.</p>
      </abstract>
      <kwd-group>
        <kwd>Agent-Based Simulation</kwd>
        <kwd>Trust</kwd>
        <kwd>Transitivity</kwd>
        <kwd>Academic Networks</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        In the Information and Communication Technologies (ICT) field the study of trust
has become a topic of increasing interest because most of its developments involve
interactions among several autonomous partners for the achievement of the expected
outcomes. Therefore, such outcomes depend on the execution of tasks by several au
tonomous entities that need to perform them in a robust/deterministic (safe) way.
Thus, the entities involved in the development (human or artificial) have to cooperate
and solve conflicts towards the goal achievement, which together with the knowledge
sharing and management, need to increase the importance of trust [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Therefore, in a
scenario in which we do not know exactly with whom (or what) we are interacting, it
is important to define trust metrics in order to help in the decision making process
about cooperation. Several researchers attempted to escalate trust by creating degrees
of mutual trust. However, trust is a subjective function related to the personals’ beliefs
about itself, the environment, and so on, requiring further depth studies about its tran
sitivity in a network [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>Transitivity is especially important as in an open net we have to interact with new
or unknown agents, and it is not possible to count on our personal experience and
evaluation, or on some authority's guarantees, or on the explicit recommendation of
another agent. However, there is a network of trust or distrust relations/links; if we
might know and exploit this information we can derive our trust from the other trust
relations. It is a real collective capital: if I know that Y trusts Z, I might trust Z, and so
on (see later for the conditions). Moreover, recommendations and explicit reputation
presuppose a trust in the source (recommender, evaluator): it is precisely this trust in
Y (source) that creates my trust in Z.</p>
      <p>
        Recently, the large-scale use of social networks has also promoted an increase in
available human interaction data, (a capital to be exploited) which consequently stim
ulated an increased in the number of studies associated to this area despite some stud
ies date back to 1950’s [
        <xref ref-type="bibr" rid="ref16 ref29">16, 29</xref>
        ]. A type of such network is the Academic Social Net
work that keeps records of interactions and collaborations among academic
researchers. We consider its main aspect, the social capital that is kept undiscovered in
the represented relationships and the possible high relevance that it may have on the
academic context. Being aware of this unexplored area, some researchers have
performed some quantitative studies on this type of network, in which concepts of Social
Network Analysis are used to identify the centrality, density or clustering of the net
work and to understand the levels of cooperation and collaboration among researchers
[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. The few studies that deal with the trust aspect consider it from the data integrity
point of view. Hence, the study of trust and its transitivity among researchers is an in
cipient research topic that has not yet been comprehensively examined in this domain
[
        <xref ref-type="bibr" rid="ref1 ref13 ref14 ref17 ref27">1,13, 14, 17, 27</xref>
        ].
      </p>
      <p>
        In the literature there are three topologies for computer networks: centralized,
decentralized and distributed [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. For each type there is a different relationship between
its members. These types of topologies are applied in social networks and the most
common is the decentralized structure. Exchanges in social networks can occur in two
different ways: the positive (where A exchanges information with B, and B exchanges
with A, i.e., zero sum), and the negative (where A exchanges with B, but B does not
necessarily exchange with A). The negative one is the most common in this domain
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Since the 80’s social networks structure is a subject that many authors have studied
analyzing the power and dependency between the members of this type of network.
Cook et al. (1983) [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] present a theoretical and experimental analysis performed with
laboratory experiments and computational simulations. Their conclusion is that cen
tralized models, where one of its members is central, are models where the power is
centralized but are more susceptible to problems if the central member has some
problem. In distributed networks, where all members are connected to all other members,
the power is also distributed. However, these two cases are not the common formation
in reality. Decentralized networks are the most common and they studied where
power is concentrated in this kind of network. In their experiments members known
as "intermediaries" are those who have more power, because they are the link between
agents in the center and in the peripherals places. The authors highlight that for each
“information exchange”, the conditions and values chosen for each member are
different.
      </p>
      <p>
        Whitmeyer (1999) [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] presents a different type of network, called
"interest-network structures". In this model in addition to the physical structure an interest
variable is associated with the agents. This interest variable indicates the interest of the
agent to exchange information with others (using 1-exchange rule1). The author
considers that the interests are more important to define dependence and power than the
physical structure. However, the physical structure restricts the relationships. For
instance, in a scenario where an agent has great interest in other and they are not con
nected the exchange information will not happen.
      </p>
      <p>
        In the work of Mizrucchi (2006) [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], a revision about social network and how the
physical structures may influence the forms of interaction is presented. This author
divides networks in hierarchical (centralized) and non-hierarchical (distributed, where
everybody can exchange information). However, there is the "subgroups", with
subnets (in fact, decentralized networks). He treats about rational choice theory, where
the network members must do the choice that brings the best result (such as an utility
function). However, people do not always do rational choices. Often, friendship,
emotions, loyalty, etc., can influence the exchanges.
      </p>
      <p>The goal of this paper is to analyze how the physical structure of networks (based
in the three topologies - centralized, decentralized and distributed) can influence in
the trust transitivity in an academic social network. We have used in our research the
Lattes curriculum. Lattes curriculum is a public available database from Brazilian
researchers. In fact, in our project, the main goal is to identify how the structure of the
network could help (or not) the academic information exchange between Brazilian
researchers.</p>
      <p>
        Many authors affirm that the structure of the social network cannot define the
power of each member [
        <xref ref-type="bibr" rid="ref14 ref8 ref9">8, 9, 14</xref>
        ]. This is due to the fact that the structure is just a ba
sic condition to the existence of interactions, i.e., if X has something needed by other
members, but not other member can access it or know that, X has not real power over
the others. Connection is a necessary but not sufficient condition for power. There
fore, if X potentially might be able to impose something to the others, to obtain from
them what it wants, but it is not connected, it cannot access them, it cannot send or re
ceive from them, because it is a “missing channel” and it is actually impotent
(isolated). Vice versa X is connected to Y but has nothing good or bad for Y, and has no
power over him for exchange, cooperation, threat, ..
      </p>
      <p>Considering these facts, it is clear that it is impossible to measure the network
power based solely in the number of connections.</p>
      <p>
        1 Markovsky et al. (1988) [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] defined the metric “1-exchange rule”, where each
member chooses just one other member to exchange information per round, indepen
dent of the total number of members. The choice could be a utility function or ran
domly.
      </p>
      <p>For that reason the focus of this paper is not to find/define the network power. The
main idea is to analyze the physical structure and how it could influence the “flow”
of the trust transitivity between the members of the network.</p>
      <p>This paper is structured in 5 sections. In sections 2 and 3, we present the two basis
subjects of this research: network structures and trust transitivity in social networks.
In section 4, we present the proposed model and our preliminary results and section 5
concludes the paper.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Structure of Networks and Metrics to Social</title>
    </sec>
    <sec id="sec-3">
      <title>Networks</title>
      <p>
        According to Baran (1964) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] there are three topologies for computer networks:
centralized, decentralized and distributed (Figure 1). Baran's research originated from
security problems in computer networks during the Cold War. His ideas of topology
for networks are still actual nowadays and can be applied to social networks. The cen
tralized networks, also called Star, are the most vulnerable because they have a central
node which if is destroyed the entire network is lost. Distributed networks, called
Mesh or Grids, are least vulnerable due to their high level of redundancy, where all
nodes are interconnected (a relation n:n). However, the vast majority of computer
networks is decentralized, namely hierarchical networks, forming small centralized
networks (subnets). They are less vulnerable that centralized networks but there are some
nodes that can cripple the communications. The structure complexity of these topolo
gies can be defined as: the simplest level (centralized), intermediate level
(decentralized) and more complex (distributed). In Narayanan et al (2013) [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], a special type
of decentralized network is presented, called Federated Networks. This network has a
decentralized topology, forming small centralized networks, but closed, where only
members can access the subnets. In our project, we will work with the three first
types.
      </p>
      <p>
        There are many metrics to analyze social networks such as degree centrality, den
sity, clustering coefficient, giant coefficient, closeness centrality, betweenness
centrality, diameter, and so on [
        <xref ref-type="bibr" rid="ref15 ref20 ref23">15, 20, 23</xref>
        ]. In our work three metrics are important to
explain the network structure:
      </p>
      <p>a) degree centrality (dc): when a node has many connections it is considered
important. On the contrary, if the node does not have any connection it is considered
irrelevant. This degree represents the relational activity of each node. The equation (1)
presents the calculus of degree centrality to ni node.</p>
      <p>b) density (d): it is based in the degree centrality. The number of connections of
each node is divided by the total number of connections of the network. The equation
(2) presents the calculus of density to the whole network G.</p>
      <p>c) clustering coefficient (cc): represents the number of connections between the
neighbors of a node divided by the total number of connections of the network.</p>
      <p>In this way, considering the network structure, we can define:
if d (P) = 1 → distributed network
∃ dc(ni) = N and ∀ d(nj) = 1, and j ≠ i → centralized network
∃ cc(ni) and ∀ dc(nj) =&gt; 32, and j ≠ i → decentralized network with subnet
Otherwise → generic decentralized network (with any formation).
3</p>
    </sec>
    <sec id="sec-4">
      <title>Trust and Transitivity in Social Networks</title>
      <p>
        In social networks trust has been analyzed as it is an aspect that greatly influences
the process of interaction among their members. There are works that deal with the
transitivity of trust. The main idea is: if X trusts Y and Y trusts Z, then X trusts Z. In
fact, this is not necessarily true. Trust carries not only a degree but it is related to a
content, where the agent has performance and result, and is relative to certain attribute
(qualities or defect) a for that "task/good". This scenario interferes with transitivity
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. For this transition to be true the trust relation T between X and Y and between Y
and Z must have specific subjective attributes in a given domain and this rarely hap
pens [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8 ref9">5, 6, 7, 8, 9</xref>
        ]. In other terms transitivity is "content and context dependent".
      </p>
      <p>Moreover there should be an effect of convergent or divergent attitudes/evaluation
from different agents/sources. Not only my trust in Y (as evaluator) and Y's trust in Z
can determine my trust in Z; but if also W and Q trust Z? Or if Y trusts Z but W and
Q do not trust Z? Doesn't this affect my derived trust in Z? This is an important factor
in a "network" of trust with many possible trust links on Z.</p>
      <p>
        Liu et al. (2011) [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] present how to calculate the transitivity of trust based on four
parameters: trust, social relations, recommendation rules and preferences similarity.
This work presents some formalizations for the four parameters, defining principles
and properties. A very important property is that the transitivity has a "decay", i.e., if
A trusts B and B trusts C, and if A trusts C, the value of the last trust will be smaller
that the trust value of B and C.
      </p>
      <p>
        According to Noble et al. (2004) [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], the network topology can influence
knowledge transmission. They conclude that in symmetrical networks the transitivity is
higher. However, in real social networks this type of distribution is not realistic.
      </p>
      <p>
        In the work of Josang et al. (2006) [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], a quantitative formalization of forms to
interrelation between A and B with C is done. There are three different formalizations:
Dependent Opinions (A and B have the same beliefs about C); Independent Opinions
(A and B have different beliefs about C) and Partially Dependent (A and B have
similar beliefs about C, but not identical).
2
      </p>
      <p>
        According to Barabasi and Albert (1999), 3 links is a typical number of connections to large
networks. In fact, they identified a typical interval [2.1, 4] and they used 3 connections, be
cause it is the average of this interval. They also defined this type of network as “scale-free”
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>In our project we try to identify how the structure of the social networks can influ
ence the trust transitivity. To achieve that we have defined some steps:
• Step 1: Define a survey to capture the trust in the Lattes Curriculum and apply it
to researchers in different knowledge areas;</p>
      <p>• Step 2: Analyze the survey data and define “Trust Types”, i.e., divide the re
searchers according to their trust (they trust more in one or other type of information
in Lattes);</p>
      <p>• Step 3: Verify if co-authors or co-organizers have influence in the trust, to
analyze the “weight” of transitivity in the trust;</p>
      <p>• Step 4: Develop a computational simulation to the trust types using the
parameters obtained from the real data. For example, if 20% of the researchers think that
“formation” influences the interaction, 20% of the agents will be implemented using
this influence.</p>
      <p>• Step 5: Analyze real and simulated data</p>
      <p>Until now we have concluded the steps 1, 2 and 3, and the first proposed model
with preliminary results.</p>
      <sec id="sec-4-1">
        <title>4.1 Lattes Curriculum: the Academic Network in Brazil</title>
        <p>
          The Lattes Platform (lattes.cnpq.br) is an information system developed and
maintained by CNPq (National Council for Scientific and Technological Research). The
main idea is to manage the science, technology and innovation in Brazil [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. The
first version was released on August 1999, with the initial version of the Lattes Cur
riculum. Recently, the Lattes Platform was cited as an example of complete database
with highly qualified information in Nature [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ].
        </p>
        <p>
          This platform is composed by the integration of four separate systems: Lattes
curriculum, which records the academic life of the researchers; research groups directory,
which maintains information about the research groups in the country; institutions
directory, which stores information on research institutes, universities, etc; and finan
cial/promotion management system, which manages the requests of financial/support
to researchers [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. In our work, we have interest is Lattes curriculum. This is struc
tured hierarchically in the following topics [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]:
        </p>
        <p>• General Data and Formation: data identification, addresses, academic formation,
research areas;</p>
        <p>• Bibliographic Production: all publications of the researcher as papers in journals
and/or conferences and books;
• Students Oriented: guidance and supervision (completed or in progress);
• Projects: projects of the researcher, with a abstract and members;
• Technical Production: software, products, technical reports;
• Events: information related to events that the researcher organized or participated;</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2 Lattes Survey</title>
        <p>The goal of this survey was to determine how the information provided by the
researchers can influence the decision-making for new activities and/or to find works by
the researcher, based on Lattes information trust.</p>
        <p>We defined quantitative questions (with the possibility of qualitative information).
For all questions, the parameters are: strongly influence, more than the average
influence, little influence,very little influence and no influence.</p>
        <p>The qualitative information could be written in a field “Justification”, if the re
searchers would like to express better their ideas. This survey was developed to Web
platform. In this way, researchers could access it remotely via the following address:
http://diana.c3.furg.br/index.php?Itemid=1982&amp;option=questionario&amp;id_site_componente=3090.</p>
        <p>This link was sent to several mail lists, nationwide, for researchers from various
fields of knowledge. Table 1 presents the questions' survey which were based in the
main topics of Lattes curriculum.
Q1: Do the formation (university/institute, research area) of the researcher influence your
interaction with he/she?
Q2: Do the places where the researcher work(ed) influence your interaction with he/she?
Q3: Do the research areas of the researcher influence your interaction with he/she?
Q4: Do the researcher projects (in progress or completed) influence your interaction with
he/she?
Q5: Do the researcher H-index, or the citations total in databases (Web of Science or
SCOPUS), or the impact factor of the papers influence your interaction with he/she?
Q6: Do the publishers that the research have papers/chapters influence your interaction with
he/she?
Q7: Do the technical production of researcher, as software, courses, technical reports
influence your interaction with he/she?
Q8: Relating to all types of productions, do the co-authors of them influence your interaction
with he/she??
Q9: Do the quantity of organized events by the researcher influence your interaction with
he/she?
Q10: Do the co-organizers of events influence your interaction with he/she?
Q11: Do the researcher quantity of students oriented influence your interaction with he/she?
Q12: Do the researcher skills to organize events influence his/her skills to:
a) manage projects?
b) write academic or technical papers?
c) student oriented?
Q13: Do the researcher skills to write academic or technical papers influence his/her skills to:
a) manage projects?
b) organize events?
c) student oriented?
Q14: Do the researcher formation and his/her professional performance influence his/her skills
to:
a) manage projects?
b) organize events?
c) student oriented?
d) write academic or technical papers?</p>
        <p>The survey was made available for two weeks and 94 researchers answered it.
These researchers are from all areas of knowledge. The majority of researchers
detailed their answers in justification field (qualitative responses) and presented “the
reasons” for the quantitative choices helping us to better understand all the process.</p>
        <p>Table 2 presents the consolidated data to all answers with the percentage of each
item in each question. We can observe that some questions produce contradictory
answers between the researchers. For example, question 2 has a percentage indicating
little influence and more than the average near each other, related to the places where
the researcher works. In some questions, as question 13-c, the most of researchers
think that write papers influences in the student oriented.</p>
        <p>The evaluation of Brazilian research has a quantitative role as researchers' work.
However, to the same researchers, the questions that cover publications are not as
important for interaction/trust to themselves, as presented by questions 5, 6 and 7.</p>
        <p>Considering the trust of Lattes information, and the claim not of an empty "trust"
but "trust for", with a content, an aboutness, the transitive relation between co-authors
and co-organizers was not confirmed. According to the answers was not possible to
conclude that the researchers believe that papers co-authorship indicates that a
researcher is trustful to interact as well as to events co-organization. For both cases,
several open answers highlights that a very large number of co-authors or
co-organizers indicates that some people do not really participate in the processes, i.e., they just
put their name in these activities. Specifically related to events, most answers were
not positive and show that there are two "profiles" in academic: the
scientific/technological and administrative. Organizition of events is considered an administrative
activity.</p>
        <p>Taking in consideration the main topics we can conclude that the most of
researches have trust for:</p>
        <p>TRUST-FOR formation
TRUST-FOR research areas
TRUST-FOR projects
TRUST-FOR students oriented</p>
        <p>And, taking into account the questions 12, 13 and 14, the researchers have trust
transitivity between the following topics:</p>
        <p>TRUST-FOR events → to manage projects
TRUST-FOR events → to orientate students
TRUST-FOR production → to manage projects
TRUST-FOR production → to orientate students
TRUST-FOR formation → to manage projects
TRUST-FOR formation →to orientate students
TRUST-FOR formation → to increase the production</p>
        <p>The relations described above means, for example, that if the researcher has trust in
other to organize an event, he/she believes that it could manage projects in a good
way (transitivity between different topics/activities).</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3 Computational Model and First Results</title>
        <p>We designed an agent-based model in the platform NetLogo (www.netlogo.com)
in order to test and to analyze the network structures in transitivity trust.</p>
        <p>In the graphical interface of the model, the user can choose the following variables:
1. the topology of the network: centralized, distributed, decentralized nets or
decentralized (as defined in section 2).
2. the number of agents: [1;500]
3. the number of neighbors: [3;100]. It is used just to decentralized nets, where
the user can define the minimum number of neighbors in the subnets (in our
definition in section 2, the minimum number of neighbors is 3)
Each agent has the following internal characteristics (beliefs):
1. TF – formation trust: boolean
2. TR – research trust: boolean
3. TP – project trust: boolean
4. TS – student trust: boolean
5. TE – event trust: boolean
6. TPu – publication trust: boolean
7. Collaboration: integer</p>
        <p>Observing the survey data, the agents received in the beliefs a percentage of TRUE
(strongly or more than the average influence) or FALSE (little, very little or no
influence). In this way, the proportion used was:
1. TF : 75% true and 25% false
2. TR: 80% true and 20% false
3. TP : 70% true and 30% false
4. TS: 65% true and 35% false
5. TE: 20% true and 80% false
6. TPu: 45% true and 55% false</p>
        <p>In each round, each agent chooses a topic to exchange (formation, research,
project, student, events or publication) with other agent. These two choice (topic and
agent) are random and based in the metric “1-exchange rule”. If the value of the belief
is “true” for the chosen topic, we will increment the belief “collaboration”. As “col
laboration” we understand that the transmission of the information, without a depen
dency or a real power metric.</p>
        <p>Before to include the transitivity, we tested the following hypothesis, basing just in
the physical structure of the network:
• in distributed networks, because all nodes are connected, the collaboration
will be high.
• in centralized networks, everything depends of the central node (choosen
randomly), but the collaboration will be between high or intermediate.
• in decentralized networks with subnets (minimum of 3 neighbors), the
collaboration will be intermediate.
• in decentralized networks (with any formation), the collaboration will be
low.</p>
        <p>We used networks with 100 agents each and run it 20 times with 100 rounds each.
The average values to each topic to collaborate are presented in Table 3.</p>
      </sec>
      <sec id="sec-4-4">
        <title>Network</title>
      </sec>
      <sec id="sec-4-5">
        <title>Distributed</title>
      </sec>
      <sec id="sec-4-6">
        <title>Centralized</title>
      </sec>
      <sec id="sec-4-7">
        <title>Decentralized Net</title>
      </sec>
      <sec id="sec-4-8">
        <title>Decentralized</title>
        <p>In Table 3, the topology with higher values was Centralized. However, to TE (trust
in events), the values in centralized networks was very low. It happens because the
proportion of TE with true values is very low (20%), and all communication pass to
central agent (randomly chosen) and each agent will have just 20% of chance to
choose this central node with TE true.</p>
        <p>To Decentralized Nets and Distributed networks, we have values very similar. It
could be shown that if the node have a minimum number of connections, the collabo
ration will be realized (not be necessary to know all network nodes to have collabora
tion).</p>
        <p>In a second step, we included in the model the transitivity. After choosing the topic
to exchange and the first neighbor, the agent will choose a “neighbor of the
neighbor”. If the value of the belief is “true” for the chosen topic in the “second”
neighbor, we will increment the belief “collaboration” (see Figure 23) .</p>
        <p>In this second test, the proportion of trust is static, as presented above. Again, we
used a network with 100 nodes each and run 20 times with 100 round each. The
average values to each topic to collaborate with transitivity are presented in Table 4.</p>
      </sec>
      <sec id="sec-4-9">
        <title>Decentralized Net Decentralized</title>
        <p>The results of Table 4 confirm that with trust transitivity the hypothesis about the
structure of the network. In centralized networks we have the higher values, after
distributed and decentralized net. The lower level of exchange is in decentralized
networks. The values with transitivity are lower than we have just trust (Table 3),
because there is the “decay” with transitivity, according to Liu et al. (2011).</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>In this paper, we proposed a model to analyze the influence of the physical
structure of the network to trust transitivity. Taking the trust percentage for each topic of
Lattes curriculum, we have used the survey data (real data) in a static way (they do
not change during all simulation). The choice for a topic and for other agent are ran
domly, as well as, the formation of the decentralized network (choose the neighbor).</p>
      <p>In this first model, in generic decentralized networks, some agents could not have
connection with any other agent, and this do not change during all simulation. In real
life, people could “create” new connections. Is the transitivity the key to generate
these new exchanges?</p>
      <p>Besides, the perceptual of trust is static. However, these values could be increased
or decreased depending on the old interactions (they have a memory). For example, if
an agent interaction happens many times in a positive way with other node, could they
created a loyalty?</p>
      <p>
        In our first insights, we can conclude that the physical structure of the network
influence in the transitivity trust. It can be obvious that centralized and distributed
networks have the higher values of collaboration but in decentralized networks (specially
with nets), the values are almost similar to distributed one. It is other important re
search question: does a biger degree of centrality is better to the trust transitivity? Our
first results presented that, if a node has a minimum number of neighbors, the
exchange will happen. However, the power of one node on the others is not simply
dependent on the number of connections, and power is directly linked to trust [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], and it
must be better investigated.
      </p>
      <p>
        Another aspect that we must look for is about the comparison between “not
realistic” and real-data models. According to Cointet and Roth (2007) [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], the diffusion of
knowledge is slower in real-data. In this way, we will test the proposed computational
model with the Lattes real-data.
      </p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>Diana F. Adamatti is supported by CNPq (Conselho Nacional de Desenvolvimento
Cientifico e Tecnologico) – Brazil, process number 240181/2012-3.</p>
    </sec>
    <sec id="sec-7">
      <title>References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Abreu</surname>
          </string-name>
          ,
          <string-name>
            <surname>A; L M Camarinha-Matos</surname>
          </string-name>
          .
          <article-title>An Approach to Measure Social Capital in Col - laborative Networks</article-title>
          .
          <source>In: Adaptation and Value Creating Collaborative Networks</source>
          ,
          <fpage>29</fpage>
          -
          <lpage>40</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Alves</surname>
            ,
            <given-names>A. D.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>H H</given-names>
            <surname>Yanasse</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N Y</given-names>
            <surname>Soma. LattesMiner</surname>
          </string-name>
          <article-title>: uma linguagem de domiınio especifico para extração automatica de informações da Plataforma Lattes</article-title>
          . In: XII Workshop de Computação Aplicada,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Baran</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          "On Distributed Communications:
          <article-title>Introduction to Distributed Communications Network"</article-title>
          .
          <year>1976</year>
          ,Rand.
          <source>Archived from the original on June 15</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Barabasi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Albert</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <article-title>Emergence of scaling in random networks</article-title>
          .
          <source>Science 289</source>
          ,
          <year>1999</year>
          ,
          <fpage>509</fpage>
          -
          <lpage>512</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Castelfranchi</surname>
            ,
            <given-names>C.. Trust</given-names>
          </string-name>
          <article-title>Mediation in Knowledge Management and Sharing</article-title>
          .
          <source>Proceedings of iTrust</source>
          .
          <year>2004</year>
          ,
          <fpage>304</fpage>
          -
          <lpage>318</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Rino</given-names>
            <surname>Falcone</surname>
          </string-name>
          , Cristiano Castelfranchi:
          <article-title>Transitivity in Trust. A Discussed Property</article-title>
          .
          <source>WOA 2010 11th Workshop</source>
          , Dagli Oggetti Agli Agenti, Rimini, Italy,
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Castelfranchi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <article-title>Earthquakes in Trust Networks: Basic Dynamic Principles</article-title>
          . Social Science Research Network,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Castelfranchi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ; R Falcone.
          <source>Trust Theory. A Socio-Cognitive and Computational Model</source>
          . Wiley, UK,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Castelfranchi</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Falcone</surname>
            <given-names>R.</given-names>
          </string-name>
          , Marzo F.
          <article-title>Being Trusted in a Social Network: Trust as Relational Capital</article-title>
          .
          <source>Lecture Notes in Computer Science</source>
          ,
          <volume>3986</volume>
          ,
          <fpage>19</fpage>
          -
          <lpage>32</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>CNPQ - Conselho Nacional de Desenvolvimento Cientíco</surname>
          </string-name>
          e Tecnológico. Available in: &lt;http://www.cnpq.br/&gt;. Access in: 10 May
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Cook</surname>
            ,
            <given-names>K. S.</given-names>
          </string-name>
          ; Emerson,
          <string-name>
            <given-names>R. M.</given-names>
            ;
            <surname>Gillmore</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. R.</surname>
          </string-name>
          <article-title>The Distribution of Power in Ex - change Networks: Theory and Experimental Results</article-title>
          .
          <source>The American Journal of Sociology</source>
          . Vol
          <volume>89</volume>
          , n 2,
          <string-name>
            <surname>September</surname>
          </string-name>
          ,
          <year>1983</year>
          , pp
          <fpage>275</fpage>
          -
          <lpage>305</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>de Moraes</surname>
            ,
            <given-names>B. C. S.</given-names>
          </string-name>
          <string-name>
            <surname>Extração de Conhecimento da Plataforma Lattes Utilizando Tecnicas de Mineração de Dados: Estudo de Caso</surname>
            <given-names>POLI</given-names>
          </string-name>
          /UPE. Trabalho
          <string-name>
            <surname>de Conclusao de Curso (Engenharia de Computação) - Universidade de Pernambuco</surname>
          </string-name>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Delgado-Marquez</surname>
            ,
            <given-names>B. L.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>N E</given-names>
            <surname>Hurtado-Torres</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J A</given-names>
            <surname>Aragon-Correa</surname>
          </string-name>
          .
          <article-title>The Dynamic Nature of Trust Transfer: Measurement and the Influence of Reciprocity. Decision Support Systems</article-title>
          , V 54, N
          <volume>1</volume>
          ,
          <fpage>226</fpage>
          -
          <lpage>234</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Delgado-Marquez</surname>
            ,
            <given-names>B. L.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>N E</given-names>
            <surname>Hurtado-Torres</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J A</given-names>
            <surname>Aragon-Correa</surname>
          </string-name>
          .
          <source>On the Measurment of Interpersonal Trust Transfer: Proposal of Indexes. Soc. Indic Res</source>
          , V
          <volume>113</volume>
          ,
          <fpage>433</fpage>
          -
          <lpage>449</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Freedman</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <article-title>Centrality in Social Networks Conceptual Clarification Social Networks</article-title>
          ,
          <volume>1</volume>
          (
          <issue>1978</issue>
          /79)
          <fpage>215</fpage>
          -
          <lpage>239</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Golbeck</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          <article-title>Computing and applying trust in web-based social networks</article-title>
          . Doctor in Philosophy: University of Maryland, pp.
          <fpage>185</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Hang</surname>
            , C. W, Y Wang,
            <given-names>M P</given-names>
          </string-name>
          <string-name>
            <surname>Singh</surname>
          </string-name>
          .
          <article-title>Operators for Propagating Trust and their Evaluation in Social Networks</article-title>
          .
          <source>In Proceedings of the eight international joint conference on autonomous agents and multi-agent systems (AAMAS)</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Josang</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <article-title>Stephen Marsh; Simon Pope. Exploring Different Types of Trust Propagation</article-title>
          .
          <source>In: 4th International Conference on Trust Management (iTrust)</source>
          , p.
          <fpage>179</fpage>
          -
          <lpage>192</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Lane</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>Let's make science metrics more scientific</article-title>
          .
          <source>Nature</source>
          ,
          <volume>464</volume>
          (
          <issue>7288</issue>
          ):
          <fpage>488</fpage>
          -
          <lpage>489</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Lopes</surname>
            ,
            <given-names>Giseli</given-names>
          </string-name>
          <string-name>
            <surname>Rabello</surname>
          </string-name>
          . Avaliaçao e Recomendaçao de Colaboraçoes em Redes Sociais Academicas. Tese de Doutorado em Ciencia da Computaçao.
          <source>Universidade Federal do Rio Grande do Sul</source>
          ,
          <year>129p</year>
          .,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>G.. Yan</given-names>
          </string-name>
          <string-name>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>Mehmet A. Orgun. Trust Transitivity in Complex Social Networks</article-title>
          .
          <source>In: Twenthy-Fifth AAAI Conference on Artificial Intelligence</source>
          , p.
          <fpage>1222</fpage>
          -
          <lpage>1229</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Markovsky</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Willer</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Patton</surname>
          </string-name>
          , T. Power Relations in Exchange Networks.
          <source>American Sociological Review</source>
          , Vol.
          <volume>53</volume>
          , No.
          <volume>2</volume>
          (
          <issue>Apr</issue>
          .,
          <year>1988</year>
          ), pp.
          <fpage>220</fpage>
          -
          <lpage>236</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Marsden</surname>
            <given-names>P.V.</given-names>
          </string-name>
          <article-title>Egocentric and sociocentric measures of network centrality Social Networks</article-title>
          , Volume
          <volume>24</volume>
          ,
          <string-name>
            <surname>Number</surname>
            <given-names>4</given-names>
          </string-name>
          ,
          <year>October 2002</year>
          , pp.
          <fpage>407</fpage>
          -
          <lpage>422</lpage>
          (
          <issue>16</issue>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Mizruchi</surname>
            ,
            <given-names>M. S.</given-names>
          </string-name>
          <string-name>
            <surname>Analise de Redes Sociais: Avanços Recentes e Controversias Atuais. RAE - Revista de Administração de Empresas</surname>
          </string-name>
          (RAE), Vol
          <volume>46</volume>
          ,
          <fpage>n3</fpage>
          .
          <source>Jul/Set</source>
          <year>2006</year>
          , pp
          <fpage>72</fpage>
          -
          <lpage>86</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Narayanan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ; Vincent Toubiana, Solon Barocas, Helen Nissenbaum &amp;
          <article-title>Dan Boneth. “A Critical Look at Decentralized Personal Data Architectures</article-title>
          .”
          <source>Web. 26 Feb</source>
          .
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Noble</surname>
          </string-name>
          , J.; Simon Davy; Daniel W. Franks.
          <article-title>Effects of the topology of social net - works on information transmission</article-title>
          . In: Schaal,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Ijspeert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J.</given-names>
            ,
            <surname>Billard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            and
            <surname>Vijayakumar</surname>
          </string-name>
          , S. (eds.)
          <source>From Animals to Animats 8: Proceedings of the Eighth International Conference on Simulation of Adaptive Behavior</source>
          , MIT Press,
          <fpage>395</fpage>
          -
          <lpage>404</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Ziegler</surname>
            ,
            <given-names>C. N.</given-names>
          </string-name>
          <article-title>On Propagation Interpersonal Trust in Social Network</article-title>
          . In Golbeck, J., (Ed.),
          <article-title>Computing with Social Trust</article-title>
          . Human Computer Interaction Series, Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Whitmeyer</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          <article-title>Interest-Network Structures in Exchange Networks</article-title>
          .
          <source>Sociological Perspectives</source>
          . Vol
          <volume>42</volume>
          , n 1,
          <year>Spring 1999</year>
          , pp
          <fpage>23</fpage>
          -
          <lpage>47</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Valente</surname>
            ,
            <given-names>T. W. Network</given-names>
          </string-name>
          <string-name>
            <surname>Interventions</surname>
          </string-name>
          .
          <source>Science</source>
          ,
          <volume>337</volume>
          (
          <issue>6090</issue>
          ):
          <fpage>49</fpage>
          -
          <lpage>53</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Cointet</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Roth</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <article-title>How Realistic Should Knowledge Diffusion Models Be? Journal of Artificial Societies</article-title>
          and
          <string-name>
            <given-names>Social</given-names>
            <surname>Simulation</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          <year>10</year>
          , N.
          <volume>3</volume>
          (
          <issue>5</issue>
          ),
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>