{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T22:40:07Z","timestamp":1747867207728,"version":"3.41.0"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031917356","type":"print"},{"value":"9783031917363","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-91736-3_1","type":"book-chapter","created":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T22:02:48Z","timestamp":1747864968000},"page":"3-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Support + Belief = Decision Trust"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7250-5011","authenticated-orcid":false,"given":"Alessandro","family":"Aldini","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6947-8772","authenticated-orcid":false,"given":"Agata","family":"Ciabattoni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1790-2983","authenticated-orcid":false,"given":"Dominik","family":"Pichler","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3875-0512","authenticated-orcid":false,"given":"Mirko","family":"Tagliaferri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,22]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-03829-7_5","volume-title":"Foundations of Security Analysis and Design V","author":"M Abadi","year":"2009","unstructured":"Abadi, M.: Logic in access control (tutorial notes). In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007-2009. LNCS, vol. 5705, pp. 145\u2013165. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03829-7_5"},{"key":"1_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2024.109167","volume":"169","author":"A Aldini","year":"2024","unstructured":"Aldini, A., Curzi, G., Graziani, P., Tagliaferri, M.: A probabilistic modal logic for context-aware trust based on evidence. Int. J. Approx. Reason. 169, 109167 (2024)","journal-title":"Int. J. Approx. Reason."},{"key":"1_CR3","unstructured":"Aldini, A.,\u00a0Tagliaferri, M.: A taxonomy of computational models for trust computing in decision-making procedures. In:\u00a0J\u00f8sang, A. (ed.) European Conference on Information Warfare and Security, pp. 571\u2013578 (2018)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-39749-4_1","volume-title":"Emerging Technologies for Authorization and Authentication","author":"A Aldini","year":"2020","unstructured":"Aldini, A., Tagliaferri, M.: Logics to reason formally about trust computation and manipulation. In: Saracino, A., Mori, P. (eds.) ETAA 2019. LNCS, vol. 11967, pp. 1\u201315. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-39749-4_1"},{"issue":"2\u20133","key":"1_CR5","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1080\/19462166.2014.881417","volume":"5","author":"L Amgoud","year":"2014","unstructured":"Amgoud, L., Demolombe, R.: An argumentation-based approach for reasoning about trust in information sources. Argum. Comput. 5(2\u20133), 191\u2013215 (2014)","journal-title":"Argum. Comput."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Amoozadeh, M., et al.: Trust in generative AI among students: an exploratory study. In: 55th ACM Technical\u00a0Symposium\u00a0on Computer Science Education, vol. 1, SIGCSE 2024, pp. 67\u201373. ACM (2024)","DOI":"10.1145\/3626252.3630842"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"\u00c5qvist, L.: Deontic logic. In:\u00a0Gabbay, D.,\u00a0Guenthner, F. (eds.) Handbook of Philosophical Logic, vol. II, pp. 605\u2013714. Springer, Heidelberg (1984)","DOI":"10.1007\/978-94-009-6259-0_11"},{"issue":"2","key":"1_CR8","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","volume":"5","author":"D Artz","year":"2007","unstructured":"Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. J. Web Semant. 5(2), 58\u201371 (2007)","journal-title":"J. Web Semant."},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Benlahbib, A., Nfaoui, E.H.: AmazonRep: a reputation system to support Amazon\u2019s customers purchase decision making process based on mining product reviews. In: 4th International Conference on Intelligent Computing in Data Sciences (ICDS), pp. 1\u20138 (2020)","DOI":"10.1109\/ICDS50568.2020.9268769"},{"issue":"1","key":"1_CR10","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1017\/S1930297500007609","volume":"11","author":"MH Birnbaum","year":"2016","unstructured":"Birnbaum, M.H., Navarro-Martinez, D., Ungemach, C., Stewart, N., Quispe-Torreblanca, E.G.: Risky decision making: testing for violations of transitivity predicted by an editing mechanism. Judgm. Decis. Mak. 11(1), 75\u201391 (2016)","journal-title":"Judgm. Decis. Mak."},{"key":"1_CR11","unstructured":"Bochman, A.: A logic for causal reasoning. In:\u00a0Gottlob, G.,\u00a0Walsh, T. (eds.) Proceedings of IJCAI-03, pp. 141\u2013146. Morgan Kaufmann (2003)"},{"issue":"5","key":"1_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3236008","volume":"51","author":"D Braga","year":"2018","unstructured":"Braga, D., Niemann, M., Hellingrath, B., Neto, F.: Survey on computational trust and reputation models. ACM Comput. Surv. 51(5), 1\u201340 (2018)","journal-title":"ACM Comput. Surv."},{"key":"1_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/9780470519851","volume-title":"Trust Theory: A Socio-Cognitive and Computational Model","author":"C Castelfranchi","year":"2010","unstructured":"Castelfranchi, C., Falcone, R.: Trust Theory: A Socio-Cognitive and Computational Model. John Wiley and Sons, Hoboken (2010)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Ciabattoni, A.,\u00a0Rozplokhas,: Streamlining input\/output logics with sequent calculi. In: Principles of Knowledge Representation and Reasoning, pp. 146\u2013155 (2023)","DOI":"10.24963\/kr.2023\/15"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11225-021-09949-y","volume":"110","author":"V Crupi","year":"2022","unstructured":"Crupi, V., Iacona, A.: Three ways of being non-material. Stud. Logica. 110, 47\u201393 (2022)","journal-title":"Stud. Logica."},{"key":"1_CR16","volume-title":"Reasoning about Knowledge","author":"R Fagin","year":"2003","unstructured":"Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.: Reasoning about Knowledge. The MIT Press, Cambridge (2003)"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-319-69131-2_5","volume-title":"PRIMA 2017: Principles and Practice of Multi-Agent Systems","author":"F Liu","year":"2017","unstructured":"Liu, F., Lorini, E.: Reasoning about belief, evidence and trust in a multi-agent setting. In: An, B., Bazzan, A., Leite, J., Villata, S., van der Torre, L. (eds.) PRIMA 2017. LNCS (LNAI), vol. 10621, pp. 71\u201389. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69131-2_5"},{"issue":"2","key":"1_CR18","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/BF00056121","volume":"4","author":"PC Fishburn","year":"1991","unstructured":"Fishburn, P.C.: Nontransitive preferences in decision theory. J. Risk Uncertain. 4(2), 113\u2013134 (1991)","journal-title":"J. Risk Uncertain."},{"issue":"9","key":"1_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3558779","volume":"55","author":"L Fotia","year":"2023","unstructured":"Fotia, L., Delicato, F., Fortino, G.: Trust in edge-based Internet of Things architectures: state of the art and research challenges. ACM Comput. Surv. 55(9), 1\u201334 (2023)","journal-title":"ACM Comput. Surv."},{"issue":"9","key":"1_CR20","doi-asserted-by":"publisher","first-page":"1957","DOI":"10.1007\/s11229-012-0151-6","volume":"191","author":"K Frost-Arnold","year":"2014","unstructured":"Frost-Arnold, K.: The cognitive attitude of rational trust. Synthese 191(9), 1957\u20131974 (2014)","journal-title":"Synthese"},{"key":"1_CR21","unstructured":"Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations. Blackwell (1988)"},{"key":"1_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2022.103793","volume":"313","author":"D Grossi","year":"2022","unstructured":"Grossi, D., van der Hoek, W., Kuijer, L.B.: Reasoning about general preference relations. Artif. Intell. 313, 103793 (2022)","journal-title":"Artif. Intell."},{"issue":"3","key":"1_CR23","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/0004-3702(92)90049-4","volume":"54","author":"JY Halpern","year":"1992","unstructured":"Halpern, J.Y., Moses, Y.: A guide to completeness and complexity for modal logics of knowledge and belief. Artif. Intell. 54(3), 319\u2013379 (1992)","journal-title":"Artif. Intell."},{"issue":"1","key":"1_CR24","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1093\/jigpal\/jzp077","volume":"18","author":"A Herzig","year":"2009","unstructured":"Herzig, A., Lorini, E., H\u00fcbner, J.F., Vercouter, L.: A logic of trust and reputation. Logic J. IGPL 18(1), 214\u2013244 (2009)","journal-title":"Logic J. IGPL"},{"key":"1_CR25","unstructured":"Humberstone, L.: Philosophical Applications of Modal Logic. College Publications (2016)"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Jacovi, A.,\u00a0Marasovi\u0107, A.,\u00a0Miller, T.,\u00a0Goldberg, Y.: Formalizing trust in artificial intelligence: prerequisites, causes and goals of human trust in AI. In: Fairness, Accountability, and Transparency, pp. 624-635. ACM (2021)","DOI":"10.1145\/3442188.3445923"},{"key":"1_CR27","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-662-43813-8_1","volume-title":"Trust Management VIII","author":"CD Jensen","year":"2014","unstructured":"Jensen, C.D.: The importance of trust in computer security. In: Zhou, J., Gal-Oz, N., Zhang, J., Gudes, E. (eds.) IFIPTM 2014. IAICT, vol. 430, pp. 1\u201312. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43813-8_1"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T.,\u00a0Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: 12th International Conference on World Wide Web, pp. 640\u2013651 (2003)","DOI":"10.1145\/775152.775242"},{"issue":"1","key":"1_CR29","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/0004-3702(90)90101-5","volume":"44","author":"S Kraus","year":"1990","unstructured":"Kraus, S., Lehmann, D., Magidor, M.: Nonmonotonic reasoning, preferential models and cumulative logics. Artif. Intell. 44(1), 167\u2013207 (1990)","journal-title":"Artif. Intell."},{"key":"1_CR30","unstructured":"Kyburg, H.E.: Probability and the logic of rational belief. Wesleyan University Press (1961)"},{"key":"1_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2024.108344","volume":"159","author":"A Leschanowsky","year":"2024","unstructured":"Leschanowsky, A., Rech, S., Popp, B., B\u00e4ckstr\u00f6m, T.: Evaluating privacy, security, and trust perceptions in conversational AI: a systematic review. Comput. Hum. Beh. 159, 108344 (2024)","journal-title":"Comput. Hum. Beh."},{"key":"1_CR32","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1023\/A:1004748624537","volume":"29","author":"D Makinson","year":"2000","unstructured":"Makinson, D., van der Torre, L.: Input\/output logics. J. Phil. Logic 29, 383\u2013408 (2000)","journal-title":"J. Phil. Logic"},{"key":"1_CR33","unstructured":"Marsh, S.: Formalising Trust as a Computational Concept. University of Stirling (1994)"},{"issue":"1","key":"1_CR34","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1017\/S1755020314000367","volume":"8","author":"X Parent","year":"2015","unstructured":"Parent, X.: Completeness of \u00c5qvist\u2019s systems E and F. Rev. Symb. Logic 8(1), 164\u2013177 (2015)","journal-title":"Rev. Symb. Logic"},{"key":"1_CR35","unstructured":"Poole, D.: What the lottery paradox tells us about default reasoning. In: Principles of Knowledge Representation and Reasoning, pp. 333\u2013340. Morgan Kaufmann (1989)"},{"key":"1_CR36","unstructured":"Rozplokhas, D.: LEGO-like small-model constructions for \u00c5qvist\u2019s logics. In: Proceedings of AIML 2024 (2024)"},{"issue":"3","key":"1_CR37","first-page":"435","volume":"52","author":"GF Schumm","year":"1987","unstructured":"Schumm, G.F.: Transitivity, preference and indifference. Phil. Stud. Int. J. Phil. Anal. Tradit. 52(3), 435\u2013437 (1987)","journal-title":"Phil. Stud. Int. J. Phil. Anal. Tradit."},{"key":"1_CR38","doi-asserted-by":"publisher","DOI":"10.1017\/9781316848371","volume-title":"Cycles and Social Choice: The True and Unabridged Story of a Most Protean Paradox","author":"T Schwartz","year":"2018","unstructured":"Schwartz, T.: Cycles and Social Choice: The True and Unabridged Story of a Most Protean Paradox. Cambridge University Press, Cambridge (2018)"},{"issue":"06","key":"1_CR39","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","volume":"6","author":"KE Seamons","year":"2002","unstructured":"Seamons, K.E., et al.: Negotiating trust on the web. IEEE Internet Comput. 6(06), 30\u201337 (2002)","journal-title":"IEEE Internet Comput."},{"key":"1_CR40","unstructured":"Shoham, Y.: A semantical approach to non-monotonic logics. In: Symposium on Logic in Computer Science (LICS 1987), pp. 275\u2013279. IEEE CS Press (1987)"},{"key":"1_CR41","unstructured":"Smith, A.: What Amazon key teaches us about trust in customer relationships. Forbes (2017)"},{"issue":"1","key":"1_CR42","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10257-021-00545-0","volume":"20","author":"M Soleimani","year":"2022","unstructured":"Soleimani, M.: Buyers\u2019 trust and mistrust in e-commerce platforms: a synthesizing literature review. Inf. Syst. E-bus. Manag. 20(1), 57\u201378 (2022)","journal-title":"Inf. Syst. E-bus. Manag."},{"issue":"6","key":"1_CR43","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1093\/logcom\/exac016","volume":"32","author":"M Tagliaferri","year":"2022","unstructured":"Tagliaferri, M., Aldini, A.: From belief to trust: a quantitative framework based on modal logic. J. Log. Comput. 32(6), 1017\u20131047 (2022)","journal-title":"J. Log. Comput."}],"container-title":["Lecture Notes in Computer Science","Structural Information and Communication Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-91736-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T22:03:01Z","timestamp":1747864981000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-91736-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031917356","9783031917363"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-91736-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"22 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIROCCO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Colloquium on Structural Information and Communication Complexity","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Delphi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sirocco2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.torontomu.ca\/sirocco-2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}