QUALITATIVE ASSESSMENT DYNAMICS — COMPLEMENTING TRUST METHODS FOR DECISION MAKING
Abstract
Trust is not only one key ingredient of prosperous organizations and societies, but also an essential factor in decision-making processes. And when it comes to trust, the latest advances in computing sciences area are increasingly supporting the related processes by deployment of so-called trust management systems. These systems are slowly advancing from their early stages of evolution toward more sophisticated and already operationally deployable solutions. As there seems to be no "Swiss-army knife" like methodology for trust management, it is reasonable to assume that not only one, but a few of them will be deployed in the future, depending on their basic principles of functioning,purposes and contexts of use. Therefore there still exists a gap in this area with unaddressed issues where humans (or humans-like agents) would be in focus. Quality Assessment Dynamics, QAD, which is presented in this paper, is taking these issues into account. It is based on operands and operators that model human ways of reasoning as described in many natural languages. Further, it is a formal system and therefore enabled for deployment in computing environments. This way QAD complements existing trust management methods and provides additional means for decision making through deployment in simulations and in trust management engines, while being understandable to ordinary users without requiring sophisticated expert knowledge.
References
- IEEE Internet Computing 5(14), 96. Google Scholar
-
V. Reding , The need for a new impetus to the European ICT R & I Agenda , Int. High Level Research Seminar on "Trust in the Net" ( IEEE Computer Society , Washington, DC , 2006 ) . Google Scholar - International Journal of Information Technology & Decision Making 4(9), 625 (2010). Google Scholar
- International Journal of Information Technology & Decision Making 2(11), 247. Web of Science, Google Scholar
- International Journal of Human-Computer Studies 3(62), 381 (2005). Web of Science, Google Scholar
- International Journal of Human-Computer Studies 11(68), 834 (2010). Google Scholar
- International Journal of Human-Computer Studies 8(64), (2006). Google Scholar
- Journal of Personality and Social Psychology 39, 752 (1980). Crossref, Web of Science, Google Scholar
- Dual-Process Theories in Social Psychology , eds.
S. Chaiken and Y. Trope ( Guilford Press , New York , 1999 ) . Google Scholar , - Nature 9, 148 (2008). Web of Science, Google Scholar
-
H. Roediger , Psychologie, Een Inleiding ( Academia Press , Gent , 1999 ) . Google Scholar - Journal of Personality and Social Psychology 88(5), 736 (2005). Crossref, Web of Science, Google Scholar
K. Chopra , A. Wallace and A. William , Trust in electronic environments, Proc. 36th Annual Hawaii Int. Conf. System Sciences (HICSS'03) (IEEE Computer Society, Washington, DC, 2003) p. 331.1. Google Scholar- International Journal of Human-Computer Studies 66(6), 466 (2008). Crossref, Web of Science, Google Scholar
- International Journal of Human Computer Studies 58(6), 737 (2003). Crossref, Web of Science, Google Scholar
- Communications of the ACM 43(12), 57. Crossref, Web of Science, Google Scholar
- International Journal of Human Computer Studies 65, 153 (2006). Crossref, Web of Science, Google Scholar
-
R. C. Solomon and F. Flores , Building Trust in business, Politics, Relationships, and Life ( Oxford University Press , New York , 2001 ) . Google Scholar -
B. J. Fogg , Persuasive Technology: Using Computers to Change What We Think and Do ( Morgan Kaufmann , San Francisco , 2003 ) . Crossref, Google Scholar - Department of Defense, Trusted computer system evaluation criteria, DoD, 5200.28-STD, Washington, DC(1985) . Google Scholar
- J. Miller, P. Resnick and D. Singer, PICS rating services and rating systems, W3C (1996), Available at http://www.w3c.org/TR/REC-PICS-services . Google Scholar
M. Blaze , J. Feigenbaum and J. Lacy , Decentralized trust management, Proc. '96 IEEE Symp. Security and Privacy (1996) pp. 164–173. Google ScholarA. Herzberg , Access control meets public key infrastructure, Proc. IEEE Conf. Security and Privacy (2000) pp. 2–14. Google Scholar- IEEE Communications Surveys 4(3), 2. Crossref, Google Scholar
Y. Wang and J. Vassileva , Trust and reputation model in peer-to-peer networks, Proc. 3rd Int. Conf. Peer-to-Peer Computing (P2P'03) (2003) pp. 150–159. Google Scholar-
G. Shafer , A Mathematical Theory of Evidence ( Princeton University Press , Princeton , 1976 ) . Crossref, Google Scholar - International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 3(9), 279. Google Scholar
-
B. Yu and M. P. Singh , Distributed reputation management for e-commerce , Proc. 1st AA-MAS Conf. ( 2002 ) . Google Scholar M. Paul-Amaury , M. Morge and F. Toni , Combining statistics and arguments to compute trust, Proc. 9th Int. Conf. Autonomous Agents and Multiagent Systems (AA-MAS) (2010) pp. 209–216. Google Scholar- Artificial Intelligence Review 24, 33 (2005). Crossref, Web of Science, Google Scholar
M. Tennenholtz , Game-theoretic recommendations: Some progress in an uphill battle, Proc. AAMAS '08 (2008) pp. 10–16. Google ScholarM. Harish , Distributed Computing and Internet Technology (Springer, 2007) pp. 110–115. Crossref, Google ScholarA. Altman and M. Tennenholtz , An axiomatic approach to personalized ranking systems, Proc. 20th Int. Joint Conf. Artificial intelligence (IJCAI'07) (Morgan & Kaufmann, San Francisco, 2007) pp. 1187–1192. Google Scholar- Computational Intelligence 26, 160 (2010). Crossref, Web of Science, Google Scholar
- International Journal of Information Technology & Decision Making 2(10), 287 (2011). Google Scholar
- Journal of Computer Science and Technology 5(24), 833. Google Scholar
- IEEE Communications Surveys & Tutorials 4(13), 562. Google Scholar
-
D. Kahneman , P. Slovic and A. Tversky (eds.) , Judgment Under Uncertainty ( Cambridge University Press , Cambridge , 2006 ) . Google Scholar D. Trček and G. Kandus , Trust management in E-business systems — from taxonomy to trust engine architecture, Proc. WSEAS Int. Conf. Information Security, Hardware and Software Codesign, E-Commerce and Computer Networks (2002) pp. 1891–1895. Google Scholar- Mathematical and Computer Modelling 2(49), 226 (2009). Google Scholar
- Journal of Systems Architecture 4(55), 255. Google Scholar
- IEEE Security & Privacy 4(9), 52. Web of Science, Google Scholar
D. Trček , Trust management methodologies for the web, Reasoning Web'116848,Lecture notes in computer science (Springer, 2011) pp. 445–459. Google Scholar- Journal of Conflict Resolution 2(3), 265 (1958). Crossref, Google Scholar
-
A. Giddens , The Consequences of Modernity ( Stanford University Press , Stanford , 1990 ) . Google Scholar - MIS Quarterly 27(1), 51. Crossref, Web of Science, Google Scholar
- Journal of Marketing Research 17, 348 (1995). Google Scholar
D. Denning , A new paradigm for trusted systems, Proc. ACM SIGSAC New Security Paradigms Workshop (ACM, New York, 1993) pp. 36–41. Google Scholar-
B. J. Wadsworth , Piaget's Theory of Cognitive and Affective Development: Foundations of Constructivism ,Allyn & Bacon Classics Edition ( Longman , New York , 1996 ) . Google Scholar - International Journal of Information Technology & Decision Making 2(4), 177. Google Scholar
- Social Forces 63(4), 967 (1985). Web of Science, Google Scholar