World Scientific
  • Search
  •   
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at [email protected] for any enquiries.

QUALITATIVE ASSESSMENT DYNAMICS — COMPLEMENTING TRUST METHODS FOR DECISION MAKING

    https://doi.org/10.1142/S0219622014500072Cited by:2 (Source: Crossref)

    Trust is not only one key ingredient of prosperous organizations and societies, but also an essential factor in decision-making processes. And when it comes to trust, the latest advances in computing sciences area are increasingly supporting the related processes by deployment of so-called trust management systems. These systems are slowly advancing from their early stages of evolution toward more sophisticated and already operationally deployable solutions. As there seems to be no "Swiss-army knife" like methodology for trust management, it is reasonable to assume that not only one, but a few of them will be deployed in the future, depending on their basic principles of functioning,purposes and contexts of use. Therefore there still exists a gap in this area with unaddressed issues where humans (or humans-like agents) would be in focus. Quality Assessment Dynamics, QAD, which is presented in this paper, is taking these issues into account. It is based on operands and operators that model human ways of reasoning as described in many natural languages. Further, it is a formal system and therefore enabled for deployment in computing environments. This way QAD complements existing trust management methods and provides additional means for decision making through deployment in simulations and in trust management engines, while being understandable to ordinary users without requiring sophisticated expert knowledge.

    References

    • V. G. Cerf, IEEE Internet Computing 5(14), 96. Google Scholar
    • V.   Reding , The need for a new impetus to the European ICT R & I Agenda , Int. High Level Research Seminar on "Trust in the Net" ( IEEE Computer Society , Washington, DC , 2006 ) . Google Scholar
    • L. A. Hoet al., International Journal of Information Technology & Decision Making 4(9), 625 (2010). Google Scholar
    • G. A. Lopez-Herreraet al., International Journal of Information Technology & Decision Making 2(11), 247. Web of ScienceGoogle Scholar
    • J. Riegelsberger, M. A. Sasse and J. D. McCarthy, International Journal of Human-Computer Studies 3(62), 381 (2005). Web of ScienceGoogle Scholar
    • E. Rusmanet al., International Journal of Human-Computer Studies 11(68), 834 (2010). Google Scholar
    • E. Sillenceet al., International Journal of Human-Computer Studies 8(64), (2006). Google Scholar
    • S. Chaiken, Journal of Personality and Social Psychology 39, 752 (1980). Crossref, Web of ScienceGoogle Scholar
    • S.   Chen and S.   Chaiken , Dual-Process Theories in Social Psychology , eds. S.   Chaiken and Y.   Trope ( Guilford Press , New York , 1999 ) . Google Scholar
    • L. Pessoa, Nature 9, 148 (2008). Web of ScienceGoogle Scholar
    • H.   Roediger et al. , Psychologie, Een Inleiding ( Academia Press , Gent , 1999 ) . Google Scholar
    • J. R. Dunn and M. E. Schweitzer, Journal of Personality and Social Psychology 88(5), 736 (2005). Crossref, Web of ScienceGoogle Scholar
    • K. Chopra, A. Wallace and A. William, Trust in electronic environments, Proc. 36th Annual Hawaii Int. Conf. System Sciences (HICSS'03) (IEEE Computer Society, Washington, DC, 2003) p. 331.1. Google Scholar
    • A. Vasalou, J. V. P. Hopfensitz and J. V. Pitt, International Journal of Human-Computer Studies 66(6), 466 (2008). Crossref, Web of ScienceGoogle Scholar
    • C. L. Corritore, B. Kracher and S. Wiedenbeck, International Journal of Human Computer Studies 58(6), 737 (2003). Crossref, Web of ScienceGoogle Scholar
    • B. Shneiderman, Communications of the ACM 43(12), 57. Crossref, Web of ScienceGoogle Scholar
    • M. Hsuet al., International Journal of Human Computer Studies 65, 153 (2006). Crossref, Web of ScienceGoogle Scholar
    • R. C.   Solomon and F.   Flores , Building Trust in business, Politics, Relationships, and Life ( Oxford University Press , New York , 2001 ) . Google Scholar
    • B. J.   Fogg , Persuasive Technology: Using Computers to Change What We Think and Do ( Morgan Kaufmann , San Francisco , 2003 ) . CrossrefGoogle Scholar
    • Department of Defense, Trusted computer system evaluation criteria, DoD, 5200.28-STD, Washington, DC(1985) . Google Scholar
    • J. Miller, P. Resnick and D. Singer, PICS rating services and rating systems, W3C (1996), Available at http://www.w3c.org/TR/REC-PICS-services . Google Scholar
    • M. Blaze, J. Feigenbaum and J. Lacy, Decentralized trust management, Proc. '96 IEEE Symp. Security and Privacy (1996) pp. 164–173. Google Scholar
    • A. Herzberget al., Access control meets public key infrastructure, Proc. IEEE Conf. Security and Privacy (2000) pp. 2–14. Google Scholar
    • T. Grandison and M. Sloman, IEEE Communications Surveys 4(3), 2. CrossrefGoogle Scholar
    • Y. Wang and J. Vassileva, Trust and reputation model in peer-to-peer networks, Proc. 3rd Int. Conf. Peer-to-Peer Computing (P2P'03) (2003) pp. 150–159. Google Scholar
    • G.   Shafer , A Mathematical Theory of Evidence ( Princeton University Press , Princeton , 1976 ) . CrossrefGoogle Scholar
    • A. Jøsang, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 3(9), 279. Google Scholar
    • B.   Yu and M. P.   Singh , Distributed reputation management for e-commerce , Proc. 1st AA-MAS Conf. ( 2002 ) . Google Scholar
    • M. Paul-Amaury, M. Morge and F. Toni, Combining statistics and arguments to compute trust, Proc. 9th Int. Conf. Autonomous Agents and Multiagent Systems (AA-MAS) (2010) pp. 209–216. Google Scholar
    • J. Sabater and C. Sierra, Artificial Intelligence Review 24, 33 (2005). Crossref, Web of ScienceGoogle Scholar
    • M. Tennenholtz, Game-theoretic recommendations: Some progress in an uphill battle, Proc. AAMAS '08 (2008) pp. 10–16. Google Scholar
    • M. Harishet al., Distributed Computing and Internet Technology (Springer, 2007) pp. 110–115. CrossrefGoogle Scholar
    • A. Altman and M. Tennenholtz, An axiomatic approach to personalized ranking systems, Proc. 20th Int. Joint Conf. Artificial intelligence (IJCAI'07) (Morgan & Kaufmann, San Francisco, 2007) pp. 1187–1192. Google Scholar
    • R. Kerr and R. Cohen, Computational Intelligence 26, 160 (2010). Crossref, Web of ScienceGoogle Scholar
    • J. Hwanget al., International Journal of Information Technology & Decision Making 2(10), 287 (2011). Google Scholar
    • H. Zhao and X. Li, Journal of Computer Science and Technology 5(24), 833. Google Scholar
    • J. H. Cho, A. Swami and I. R. Chen, IEEE Communications Surveys & Tutorials 4(13), 562. Google Scholar
    • D.   Kahneman , P.   Slovic and A.   Tversky (eds.) , Judgment Under Uncertainty ( Cambridge University Press , Cambridge , 2006 ) . Google Scholar
    • D. Trček and G. Kandus, Trust management in E-business systems — from taxonomy to trust engine architecture, Proc. WSEAS Int. Conf. Information Security, Hardware and Software Codesign, E-Commerce and Computer Networks (2002) pp. 1891–1895. Google Scholar
    • D. Trček, Mathematical and Computer Modelling 2(49), 226 (2009). Google Scholar
    • D. Kovač and D. Trček, Journal of Systems Architecture 4(55), 255. Google Scholar
    • D. Trček, IEEE Security & Privacy 4(9), 52. Web of ScienceGoogle Scholar
    • D. Trček, Trust management methodologies for the web, Reasoning Web'116848, Lecture notes in computer science (Springer, 2011) pp. 445–459. Google Scholar
    • M. Deutsch, Journal of Conflict Resolution 2(3), 265 (1958). CrossrefGoogle Scholar
    • A.   Giddens , The Consequences of Modernity ( Stanford University Press , Stanford , 1990 ) . Google Scholar
    • D. E. Gefen, E. Karahanna and D. W. Straub, MIS Quarterly 27(1), 51. Crossref, Web of ScienceGoogle Scholar
    • N. Kumar, L. K. Scheer and J. B. E. M. Steenkamp, Journal of Marketing Research 17, 348 (1995). Google Scholar
    • D. Denning, A new paradigm for trusted systems, Proc. ACM SIGSAC New Security Paradigms Workshop (ACM, New York, 1993) pp. 36–41. Google Scholar
    • B. J.   Wadsworth , Piaget's Theory of Cognitive and Affective Development: Foundations of Constructivism , Allyn & Bacon Classics Edition ( Longman , New York , 1996 ) . Google Scholar
    • M. Fuketaet al., International Journal of Information Technology & Decision Making 2(4), 177. Google Scholar
    • D. J. Louis and A. Weigert, Social Forces 63(4), 967 (1985). Web of ScienceGoogle Scholar