<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Bayesian Computational Model for Trust on Information Sources</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alessandro Sapienza</string-name>
          <email>alessandro.sapienza@istc.cnr.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rino Falcone</string-name>
          <email>rino.falcone@istc.cnr.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Cognitive Sciences and Technologies, ISTC - CNR</institution>
          ,
          <addr-line>Rome</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <fpage>50</fpage>
      <lpage>55</lpage>
      <abstract>
        <p>- In this work we want to provide a tool for handling information coming from different information sources. In fact the real world we often have to deal with different sources asserting different things and, in order to decide, it is necessary to consider properly each of them trying to put this information together. According to us, a good way to do it is exploiting the concept of trust. In fact using it as a valve, it is possible to give a different weight to what the source is reporting. Plus we decide to implement this trust model as generic as possible. In this way, the model can be used in different context and within different practical applications.</p>
      </abstract>
      <kwd-group>
        <kwd>trust</kwd>
        <kwd>cognitive model</kwd>
        <kwd>bayesian theory</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>After presenting the theoretical and the computational model,
we also show a practical example of how to use it, to let the
reader better understand the overall workflow.</p>
    </sec>
    <sec id="sec-2">
      <title>I. INTRODUCTION</title>
      <p>In the world we often have to deal with different information
coming from different information sources. Though having a
lot of sources can be very useful, on the other hand, trying to
put together information coming from different information
sources can be an uneasy task. It is necessary to have
strategies to do it, especially in presence of critical situation,
when there are temporal limits to make decision and a wrong
choice can lead to an economical loss or even to risk life.
As said, the possibility of integrating sources on different
scopes can be very useful in order to make a well-informed
decision.</p>
      <p>Integrating these sources becomes essential, but at the same
time it is necessary to identify and take into account their
trustworthiness.</p>
      <p>In our perspective [3][4] trust in information sources is just a
kind of social trust, preserving all its prototypical properties
and dimensions; just adding new important features and
dynamics. In particular, also the trust in information sources
[6] can just be an evaluation, judgment and feeling, or be a
decision to rely on, and act of believing in and to the trustee
(Y) and rely on it. Also this trust and has two main
dimensions: the ascribed competence versus the ascribed
•
•
willingness (intentions, persistence, reliability, honesty,
sincerity, etc.).</p>
      <p>Moreover this form of trust is not empty, but it possesses a
more or less specified argument: the trustor X can not just
trust Y, as trust is for/about something, it has a specific object:
what X expects from Y; Y’s service, action, provided well.
And it is also context-dependent: in a given situation; with
internal or external causal attribution in case
Then, according to our view [3] trusting an information source
(S) means to use a cognitive model based on the dimensions of
competence and motivation of the source. These competence
and motivation evaluations can derive from different reasons,
basically:
•</p>
      <p>Our previous direct experience with S on that
specific kind of information content.</p>
      <p>
        Recommendations (other individuals Z reporting their
direct experience and evaluation about S) or
Reputation (the shared general opinion of others
about S) on that specific information content
[5][
        <xref ref-type="bibr" rid="ref11">11</xref>
        ][
        <xref ref-type="bibr" rid="ref15">15</xref>
        ][
        <xref ref-type="bibr" rid="ref16">16</xref>
        ][
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>
        Categorization of S (it is assumed that a source can
be categorized and that it is known this category),
exploiting inference and reasoning (analogy,
inheritance, etc.): on this basis it is possible to
establish the competence/reliability of S on that
specific information content [1][2][7][8]. In past
works, we showed that exploiting categories for trust
evaluations can represent a significant advantage
[9][
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>Considering information’s output, it can be a true/false one
(the source can just assert or deny the belief P) or there can be
multiple outcomes. As this is a general model, we suppose that
there can be different outcomes. For instance, the weather is
not just good or bad, but can assume multiple values (critical,
sunny, cloudy etc.).</p>
      <p>
        II. THE BAYESIAN CHOICE
There are many ways to computationally realize a decision
making process and quite all of them provide good results.
Dealing with uncertain situations, one can use the uncertainty
theory [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], a mathematical approach specifically created to
evaluate belief degree in cases in which there is no data.
Another possible way is to use fuzzy logic [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. This
technique has several vantages like:
1. It is flexible and easy to use;
2. It don’t need precise data;
3. It can deal with non linear functions;
4. It is able to shape human way of think and express, as
it can model concept that are more complex than a
Boolean but not so precise like a real number.
      </p>
      <p>Maybe the most used approach is the probabilistic one, which
exploits the Bayesian theory, in particular probability
distribution.</p>
      <p>One of the advantages of using Bayesian theory is that it
implies a sequential process: every time that new evidence
occurs it can be processed individually and then aggregated to
global evidence. This property is really useful as it allows a
trustor to elaborate its information in a moment and update it
whenever it gets other evidence.</p>
      <p>
        Given the context of information sources, we believe that this
last option is the choice that best suits with the problem. In
fact there is a fixed number of known possibilities to model
and the trustor can collect information from its sources
individually and then aggregate them in different moment.
Plus, the scientific literature confirms its utility in the context
of trust evaluation[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ][
        <xref ref-type="bibr" rid="ref14">14</xref>
        ][
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>III. THE COMPUTATIONAL MODEL</title>
      <p>In the proposed model each information source S is
represented by a trust degree called , with 0≤
 ≤1, plus a bayesian probability distribution PDF
that represents the information reported by S.</p>
      <p>To the aim of granting a better flexibility, the PDF is modeled
as a continuous distribution (actually it is divided into several
intervals and it is continuous in each interval). In fact if the
event domain is continuous it is better to use a continuous
PDF; if it happens to be discrete it is still possible to use a
continuous PDF. It is also possible to specify what and how
much outcomes the model has to use, depending on the
specific context. In the end of the paper we will show a
working example in which we take into account five different
outcomes, then the PDF will be divided accordingly.
The model we created starts from a preliminary evaluation of
the source trustworthiness: how much reliable is a source S
concerning a specific information’s category?
Then after evaluating it, we consider what the source is
reporting - the PDF. We use the trust evaluation to understand
how much the specific information should be considered, with
respect to the global information.</p>
      <p>This process can be done in presence of a single or multiple
sources, as each time we perform an aggregation of each
contribute to the global evidence.</p>
      <p>A strong point of this model is that it is sequential, so it can be
updated when new information comes.</p>
      <sec id="sec-3-1">
        <title>A. Source’s Evaluation</title>
        <p>The first part of the model concerns the source’s evaluation.
According to us, there are two level of evaluation. Initially, we
produce an a priori trust, which represent how much I believe
that S is good with this specific kind of information.
After that, we compute a more sophisticated analysis taking
into account other parameters.</p>
        <p>Let’s first start from the a priori source’s evaluation –
           . This is the trustor’s trust about P just
depending on the its judgment of the S’s competence and
willingness as derived from the composition of the three
factors (direct experience, recommendation/reputation, and
categorization), in practice the S’s credibility about P on view
of the trustor.</p>
        <p>Recalling that a trust evaluation for a cognitive agent is based
on the two aspects of competence and willingness, we state
that these values can be obtained using three different
dimensions:
1.
2.
3.</p>
        <p>Direct experience with S (how S performed in the
past interactions) on that specific information
content;
Recommendations (other individuals Z reporting
their direct experience and evaluation about S) or
Reputation (the shared general opinion of others
about S) on that specific information content;</p>
        <p>Categorization of S.</p>
        <p>The two faces of S’s trustworthiness (competence and
willingness) are relatively independent; however, for sake of
simplicity, we will unify them into a unique quantitative
parameter, by combining competence and reliability.
Computationally, the past experience (PE),
reputation/recommendation (REP) and categories (CAT)
parameters are defined here as real values in the interval [0,1].
To compute S’s evaluation we make a weighted mean of
them:</p>
        <p>= 1 ∗  + 2 ∗  + 3 ∗ 
The trustor, considering both its personality and the context in
which it is, determines the weight w1, w2 and w3 empirically.</p>
      </sec>
      <sec id="sec-3-2">
        <title>B. Certainty and Identity</title>
        <p>Computing the general trust on the Source concerning P is a
good starting point. However it is not enough. In fact, while
this value represents an a priori evaluation of how much a
source S is trustworthy, there are other two factors that can
influence a trust evaluation.</p>
        <p>The first one is the S’s degree of certainty about P
(). The information sources not only give the
information but also their certainty about this information. The
same information can be reported with different degree of
confidence (“I am sure about it”, “I suppose that”, “it is
possible that” and so on).</p>
        <p>Of course we are interested in modeling this certainty, but we
have to consider that through the trustor’s point of view (it
subjectively estimates this parameter). It is defined as a real
value in range [0,1].</p>
        <p>The second dimension represents the trustor’s degree of
trust that P derives from S (): the trust we have that
the information under analysis derives from that specific
source; it is defined as a real value in range [0,1]. This
parameter has a twofold meaning:
1. For instance, considering the human communication I
can be more or less sure that the specific information
under analysis has been reported by the source S. It is
a problem of memory, do I recall properly?
2. In the web context the communication’s dynamics
changes. I will probably receive the information by
someone hiding beyond a computer. How may I be
sure about it’s identity? Can I trust that S is really
who is saying to be? This is a very complex issue and
its solution has not been completely provided by
computer scientist.</p>
        <p>The source Evaluation is softened by the Certainty and the
Identity parameters, since we considered them as two
multiplicative parameters. The output of this operation is the
actual trust that the trustor has on S:</p>
        <p>=  ∗  ∗</p>
      </sec>
      <sec id="sec-3-3">
        <title>C. PDF: the reported information</title>
        <p>With the PDF (Probability Distribution Function) we represent
the probability distribution that the source reports concerning
the belief P.</p>
        <p>Given a fixed number of outcomes, which depends on the
nature of the information and on the accuracy of the source in
reporting the information, with the PDF a source S reports
how much it subjectively believes possible each single
outcome.</p>
        <p>Of course the source can assert that just one of them is
possible (100%) or it can divide the probability among them.
The picture 1 shows an example of what we mean with the
term PDF. It is divided in slots, each one representing a
possible outcome.
It is not possible to consider the PDF as it is. The idea is that if
I think I am exploiting a reliable source, than it is good to take
into account what it is saying. But if I suppose that the source
is unreliable, even if it is not competent or because there is a
possibility it wants to deceive me, then I need to be cautious.
Here we propose an algorithm to deal with this problem,
combining the trust evaluation with what the source is
reporting. In other words, we exploit the  value to
smooth the PDF. The output of this process is what we call the
Smoothed PDF (SPDF).</p>
        <p>Recalling that the PDF is divided into segments, this is the
formula used for transforming each segments:</p>
        <p>! = 1 + ! − 1 ∗ 
If ! &gt; 1 it will be lowered until 1. On the contrary, if
! &lt; 1it will tend to increase to the value 1.
We will have that:
• The greater  is, the more similar the SPDF will
be to the PDF; in particular if  =1 =&gt; SPDF
=PDF;
• The lesser it is, the more the SPDF will be flatten; in
particular if  =0 =&gt; SPDF is an uniform
distribution with value 1.</p>
        <p>The idea is that we trust on what S says proportionally to how
much we trust S. In words, the more we trust S, the more we
tend to take into consideration what it says; the less we trust S,
the more we tend to ignore its informative contribution.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>The picture 2 resumes the model until this point. Figure 2: A scheme of the computational model until the SPDF</title>
      <p>We define GPDF (Global PDF) the evidence that an agent
owns concerning a belief P. At the beginning, if the trustor
does not possess any evidence about the belief P, the GPDF is
flat, as it is a uniform distribution. Otherwise it has a specific
shape the models the specific internal belief of the trustor.
Each information source provides evidence about P,
modifying then the GPDF owned by the trustor. Once
estimated the SPDFs for each information source, there will be
a process of aggregation between the GPDF and the SPDFs.
Each source actually represents a new evidence E about a
belief P. Then to the purpose of the aggregation process it is
possible to use the classical Bayesian logic, recursively on
each source:
   =
   ∗  
 
where:
f(P|E) = GPDF (the new one)
f(E|P) = SPDF;
f(P) = GPDF (the old one)
In this case f(E) is a normalization factor, given by the
formula:
() =</p>
      <p>∗   
In words the new GPDF, that is the global evidence that an
agent has about P, is computed as the product of the old GPDF
and the SPDF, that is the new contribute reported by S.
As we need to ensure that GPDF is still a probability
distribution function, it is necessary to scale down it1. This is
ensured by the normalization factor f(E).</p>
      <p>The picture 3 represents the whole model for managing trust
on information sources
Exploiting the GPDF, the trust is able to understand what is
the outcome Oi that is more likely to happen.</p>
      <sec id="sec-4-1">
        <title>E. Handling uncertainty</title>
        <p>Dealing with information, a critical point is how to handle
uncertainty.
1 To be a PDF, it is necessary that the area subtended by it is equal to
1.</p>
        <p>The point is that considering uncertainty on information is
correct, but it is a too limitative approach. In fact uncertainty
comes up at different levels and has to be taken into account
when deciding.</p>
        <p>Actually, in this model we handle it in three different ways.
The first one is the uncertainty on the source. This is given
by the source evaluation .</p>
        <p>The second level is represented by uncertainty on
communication. This is handled by the two parameters
Certainty and Identity: how much I’m sure about the identity
of the source? How much certainty does the source express in
reporting the information (according to the trustor)?
The last level is the uncertainty on the reported information
(PDF). This is managed just by the intrinsic nature of the PDF.
In fact what happens here is that the source express its
certainty/uncertainty through the outcomes’ distributions.
In practice, we take into account uncertainty in all the process,
until the end, in order to produce a proper prediction.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>IV. A WORKFLOW’S EXAMPLE</title>
      <p>In this section we want to provide a working example of how
to use the model. As the trust computation is quite simple and
intuitive, below we will directly use the TrustOnS parameter,
together with the corresponding PDF.</p>
      <p>Moreover, we will represent PDFs as a list of five values, with
the following formalism:</p>
      <p>!" = [!! !! !! !! !!]
in which !! !! !! !! !!2 are the values of the PDF for the
source Si in the corresponding segment.</p>
      <p>Suppose that an agent has to understand what kind of weather
there will be the following day. It starts collecting forecast
from its information sources. The possible outcomes are five:
{sunny day, cloudy day, light rain, heavy rain, critical rain}.
Let’s suppose that Source S1 has a TrustOnSS1=1 (the
maximal value) and that it is asserting PDFS1 = [0.5 0.5 0.5 3
0.5], so it mainly suppose that there will be heavy rain.
The visual representation of PDFS1 is provided by figure 4.
2 Note that, from how the PDF has been defined, these parameters are
non-negative real numbers, with the peculiarity that their sum is
equal to 5.
As the trustor has the maximal trust on S1, PDFS1 and SPDFS1
will be the same. Plus, as this the first evidence on P, even the
GPDF is equal to PDFS1.</p>
      <p>Let then see what happens to S2, asserting the same of S1, but
with a TrustOnSourceS2 of 0.7. The PDFS2 is the same of
PDFS1, but the SPDFS2 is different, as showed by figure 5:
The PDFS2 has been smoothed, so that values grater than 1 has
been decreased and values smaller than one has been
increased.</p>
    </sec>
    <sec id="sec-6">
      <title>Let’s then see what happens to the GPDF:</title>
      <p>As showed by figure 6, Thanks to the fact that the sources,
even if with two different trust degrees, are asserting the same
things, there is a reinforcement of evidence in segment 4 of
the GPDF.</p>
      <p>This is a peculiarity that we shaped in our previous models
and that persist in this one as a consequence of the Bayes
theorem.</p>
      <p>Let’s than see what happen in presence of a third source S3,
with TrustOsSourceS3 = 0.3 and PDFS3 = [0.3 3.8 0.3 0.3 0.3].
This source is reporting a cloudy day forecast. Its SPDF will
be:</p>
    </sec>
    <sec id="sec-7">
      <title>The final result is showed by figure 7:</title>
      <p>The new GPDF is quite the same of the previous one. This is
due to the fact that, although S3 is strongly disagreeing with
S1 and S2, it has a low level of trust. Then it will lightly affect
what the trustor thinks.</p>
      <p>In the end the trustor can assert that there will be heavy rain
the next day.</p>
      <p>V. CONCLUSION
The aim of this work was that of realizing a theoretical and
computational model for dealing with information sources.
This is in fact an uneasy task and there can be critical
situations in which agents have to face sources asserting
different things.</p>
      <p>We decided to realize a model as generic as possible. Doing
so, the model does not depend on a specific context and it can
be applied on different practical context.</p>
      <p>The basic idea is that using trust on information sources is a
promising way to face the problem. Then, from a theoretical
point of view, we analyzed all the possible cognitive variables
that can affect trust on an information source.</p>
      <p>After analyzing the various ways to represent information, we
decided to exploit Bayesian theory. Then we showed how to
apply the trust evaluation on the information layers in order to
properly take into account information.</p>
      <p>Finally, we proposed a practical problem – the one of weather
forecast – and we showed how to apply the model in order to
get a solution.</p>
    </sec>
    <sec id="sec-8">
      <title>ACKNOWLEDGMENT</title>
      <p>This work is partially supported by the project CLARA—
CLoud plAtform and smart underground imaging for natural
Risk Assessment, funded by the Italian Ministry of Education,
University and Research (MIUR-PON).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Burnett</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Sycara</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <year>2010</year>
          .
          <article-title>Bootstrapping trust evaluations through stereotypes</article-title>
          .
          <source>In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'10)</source>
          .
          <fpage>241</fpage>
          -
          <lpage>248</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Burnett</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Sycara</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2013</year>
          )
          <article-title>Stereotypical trust and bias in dynamic multiagent systems</article-title>
          .
          <source>ACM Transactions on Intelligent Systems and Technology (TIST)</source>
          ,
          <volume>4</volume>
          (
          <issue>2</issue>
          ):
          <fpage>26</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Castelfranchi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Falcone</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <source>Pezzulo</source>
          , (
          <year>2003</year>
          )
          <article-title>Trust in Information Sources as a Source for Trust: A Fuzzy Approach</article-title>
          ,
          <source>Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-03) Melburne (Australia)</source>
          ,
          <fpage>14</fpage>
          -
          <issue>18</issue>
          <year>July</year>
          , ACM Press, pp.
          <fpage>89</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>Castelfranchi C.</given-names>
            ,
            <surname>Falcone</surname>
          </string-name>
          <string-name>
            <surname>R.</surname>
          </string-name>
          ,
          <source>Trust Theory: A Socio-Cognitive and Computational Model</source>
          , John Wiley and Sons,
          <year>April 2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>Conte R.</given-names>
            , and
            <surname>Paolucci</surname>
          </string-name>
          <string-name>
            <surname>M.</surname>
          </string-name>
          ,
          <year>2002</year>
          , Reputation in artificial societies.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>Social beliefs for social order</article-title>
          . Boston: Kluwer Academic Publishers Demolombe R., (
          <year>1999</year>
          ),
          <article-title>To trust information sources: A proposal for a modal logic frame- work</article-title>
          . In Castelfranchi C.,
          <string-name>
            <surname>Tan</surname>
            <given-names>Y.H</given-names>
          </string-name>
          . (Eds),
          <source>Trust and Deception in Virtual Societies</source>
          . Kluwer, Dordrecht.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Falcone</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Castelfranchi</surname>
            <given-names>C</given-names>
          </string-name>
          , (
          <year>2008</year>
          )
          <article-title>Generalizing Trust: Inferencing Trustworthiness from Categories</article-title>
          .
          <source>In Proceedings</source>
          , pp.
          <fpage>65</fpage>
          -
          <lpage>80</lpage>
          . R.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Falcone</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          <string-name>
            <surname>Barber</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Sabater-Mir</surname>
            ,
            <given-names>M. P.</given-names>
          </string-name>
          Singh (eds.).
          <source>Lecture Notes in Artificial Intelligence</source>
          , vol.
          <volume>5396</volume>
          . Springer, 2008 Falcone R.,
          <string-name>
            <surname>Piunti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Venanzi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Castelfranchi</surname>
            <given-names>C.</given-names>
          </string-name>
          , (
          <year>2013</year>
          ),
          <article-title>From Manifesta to Krypta: The Relevance of Categories for Trusting Others</article-title>
          , in R. Falcone and M.
          <source>Singh (Eds.) Trust in Multiagent Systems, ACM Transaction on Intelligent Systems and Technology</source>
          , Volume
          <volume>4</volume>
          Issue 2, March 2013 Falcone,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Sapienza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            , &amp;
            <surname>Castelfranchi</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          (
          <year>2015</year>
          , July).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>Recommendation of categories in an agents world: The role of (not) local communicative environments</article-title>
          .
          <source>In Privacy, Security and Trust (PST)</source>
          ,
          <year>2015</year>
          13th Annual Conference on (pp.
          <fpage>7</fpage>
          -
          <lpage>13</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Falcone</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sapienza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Castelfranchi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>The relevance of categories for trusting information sources</article-title>
          .
          <source>ACM Transactions on Internet Technology (TOIT)</source>
          ,
          <volume>15</volume>
          (
          <issue>4</issue>
          ),
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.S.</given-names>
            <surname>Ong</surname>
          </string-name>
          .
          <article-title>An evolutionary model for constructing robust trust networks</article-title>
          .
          <source>In Proceedings of the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>B.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <source>Uncertainty theory 5th Edition</source>
          , Springer
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Melaye</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Demazeau</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2005</year>
          ).
          <article-title>Bayesian dynamic trust model</article-title>
          .
          <source>In Multi-agent systems and applications IV</source>
          (pp.
          <fpage>480</fpage>
          -
          <lpage>489</lpage>
          ). Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Quercia</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hailes</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Capra</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>B-trust: Bayesian trust framework for pervasive computing</article-title>
          . In Trust management (pp.
          <fpage>298</fpage>
          -
          <lpage>312</lpage>
          ). Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Sabater-Mir</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <year>2003</year>
          .
          <article-title>Trust and reputation for agent societies</article-title>
          .
          <source>Ph.D. thesis</source>
          , Universitat Autonoma de Barcelona
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Sabater-Mir</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sierra</surname>
            <given-names>C.</given-names>
          </string-name>
          , (
          <year>2001</year>
          ),
          <article-title>Regret: a reputation model for gregarious societies</article-title>
          .
          <source>In 4th Workshop on Deception and Fraud in Agent Societies</source>
          (pp.
          <fpage>61</fpage>
          -
          <lpage>70</lpage>
          ). Montreal, Canada.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Sapienza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Falcone</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Castelfranchi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <article-title>Trust on Information Sources: A theoretical and computation approach</article-title>
          ,
          <source>in proceedings of WOA</source>
          <year>2014</year>
          ,
          <article-title>ceur-ws</article-title>
          , vol
          <volume>1260</volume>
          , paper 12.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Vassileva</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2003</year>
          ,
          <article-title>October)</article-title>
          .
          <article-title>Bayesian network-based trust model</article-title>
          .
          <source>In Web Intelligence</source>
          ,
          <year>2003</year>
          .
          <article-title>WI 2003</article-title>
          .
          <article-title>Proceedings</article-title>
          . IEEE/WIC International Conference on (pp.
          <fpage>372</fpage>
          -
          <lpage>378</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Yolum</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>M. P.</given-names>
          </string-name>
          <year>2003</year>
          .
          <article-title>Emergent properties of referral systems</article-title>
          .
          <source>In Proceedings of the 2nd International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS'03).</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>