{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:29:00Z","timestamp":1760171340352,"version":"3.41.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319458557"},{"type":"electronic","value":"9783319458564"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45856-4_10","type":"book-chapter","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T15:21:28Z","timestamp":1472484088000},"page":"140-154","source":"Crossref","is-referenced-by-count":0,"title":["A Belief-Based Approach to Measuring Message Acceptability"],"prefix":"10.1007","author":[{"given":"C\u00e9lia","family":"da Costa Pereira","sequence":"first","affiliation":[]},{"given":"Andrea G. B.","family":"Tettamanzi","sequence":"additional","affiliation":[]},{"given":"Serena","family":"Villata","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,30]]},"reference":[{"key":"10_CR1","series-title":"Springer Briefs","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-7031-1","volume-title":"Modeling Trust Context in Networks","author":"S Adali","year":"2013","unstructured":"Adali, S.: Modeling Trust Context in Networks. Springer Briefs. Springer, Heidelberg (2013)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-3-540-87993-0_5","volume-title":"Scalable Uncertainty Management","author":"J Ben-Naim","year":"2008","unstructured":"Ben-Naim, J., Prade, H.: Evaluating trustworthiness from past performances: interval-based approaches. In: Greco, S., Lukasiewicz, T. (eds.) SUM 2008. LNCS (LNAI), vol. 5291, pp. 33\u201346. Springer, Heidelberg (2008)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Benferhat, S., da Costa Pereira, C., Tettamanzi, A.: Syntactic computation of hybrid possibilistic conditioning under uncertain inputs. In: IJCAI (2013)","DOI":"10.3233\/978-1-61499-098-7-151"},{"issue":"1","key":"10_CR4","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1023\/A:1014658309853","volume":"70","author":"S Benferhat","year":"2002","unstructured":"Benferhat, S., Dubois, D., Prade, H., Williams, M.-A.: A practical approach to revising prioritized knowledge bases. Stud. Logica 70(1), 105\u2013130 (2002)","journal-title":"Stud. Logica"},{"key":"10_CR5","unstructured":"Booth, R., Ferm\u00e9, E., Konieczny, S., Pino P\u00e9rez, R.: Credibility-limited revision operators in propositional logic. In: KR 2012 (2012)"},{"key":"10_CR6","unstructured":"Booth, R., Ferm\u00e9, E., Konieczny, S., Pino P\u00e9rez, R.: Credibility-limited improvement operators. In: ECAI 2014, pp. 123\u2013128 (2014)"},{"key":"10_CR7","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/978-94-017-3614-5","volume-title":"Trust and Deception in Virtual Societies","author":"C Castelfranchi","year":"2001","unstructured":"Castelfranchi, C., Falcone, R.: Social trust: a cognitive approach. In: Castelfranchi, C., Tan, Y.-H. (eds.) Trust and Deception in Virtual Societies, pp. 55\u201390. Springer, Heidelberg (2001)"},{"key":"10_CR8","volume-title":"The Basic Laws of Human Stupidity","author":"CM Cipolla","year":"2011","unstructured":"Cipolla, C.M.: The Basic Laws of Human Stupidity. il Mulino, Bologna (2011)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"da Costa Pereira, C., Tettamanzi, A.: Belief-goal relationships in possibilistic goal generation. In: ECAI 2010, pp. 641\u2013646 (2010)","DOI":"10.3233\/978-1-60750-606-5-641"},{"key":"10_CR10","unstructured":"Delgrande, J., Dubois, D., Lang, J.: Iterated revision as prioritized merging. In: KR, pp. 210\u2013220 (2006)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Dragoni, A., Giorgini, P.: Belief revision through the belief-function formalism in a multi-agent environment. In: ATAL, pp. 103\u2013115 (1996)","DOI":"10.1007\/BFb0013580"},{"issue":"2","key":"10_CR12","first-page":"27:1","volume":"4","author":"R Falcone","year":"2013","unstructured":"Falcone, R., Piunti, M., Venanzi, M., Castelfranchi, C.: From manifesta to krypta: the relevance of categories for trusting others. ACM Trans. Intell. Syst. Technol. 4(2), 27:1\u201327:24 (2013)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"issue":"1","key":"10_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1093\/logcom\/13.1.3","volume":"13","author":"D Gabbay","year":"2003","unstructured":"Gabbay, D., Pigozzi, G., Woods, J.: Controlled revision\u2013an algorithmic approach for belief revision. J. Log. Comput. 13(1), 3\u201322 (2003)","journal-title":"J. Log. Comput."},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/978-3-642-10488-6_8","volume-title":"Knowledge Science, Engineering and Management","author":"P Kr\u00fcmpelmann","year":"2009","unstructured":"Kr\u00fcmpelmann, P., Tamargo, L.H., Garc\u00eda, A.J., Falappa, M.A.: Forwarding credible information in multi-agent systems. In: Karagiannis, D., Jin, Z. (eds.) KSEM 2009. LNCS, vol. 5914, pp. 41\u201353. Springer, Heidelberg (2009)"},{"issue":"1","key":"10_CR15","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/S0306-4573(97)00041-1","volume":"34","author":"M Lalmas","year":"1998","unstructured":"Lalmas, M.: Logical models in information retrieval: introduction and overview. Inf. Process. Manage. 34(1), 19\u201333 (1998)","journal-title":"Inf. Process. Manage."},{"issue":"6","key":"10_CR16","doi-asserted-by":"crossref","first-page":"1107","DOI":"10.1109\/TFUZZ.2007.896304","volume":"15","author":"M Mas","year":"2007","unstructured":"Mas, M., Monserrat, M., Torrens, J., Trillas, E.: A survey on fuzzy implication functions. Trans. Fuzzy Syst. 15(6), 1107\u20131121 (2007)","journal-title":"Trans. Fuzzy Syst."},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/3-540-45547-7_3","volume-title":"Trust in Cyber-societies","author":"DH McKnight","year":"2001","unstructured":"McKnight, D.H., Chervany, N.L.: Trust and distrust definitions: one bite at a time. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol. 2246, pp. 27\u201354. Springer, Heidelberg (2001)"},{"issue":"2","key":"10_CR18","first-page":"176","volume":"20","author":"F Paglieri","year":"2014","unstructured":"Paglieri, F., Castelfranchi, C., da Costa Pereira, C., Falcone, R., Tettamanzi, A., Villata, S.: Trusting the messenger because of the message: feedback dynamics from information quality to source evaluation. Comput. Math. Organ. Theor. 20(2), 176\u2013194 (2014)","journal-title":"Comput. Math. Organ. Theor."},{"issue":"1","key":"10_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10462-011-9277-z","volume":"40","author":"I Pinyol","year":"2013","unstructured":"Pinyol, I., Sabater-Mir, J.: Computational trust and reputation models for open multi-agent systems: a review. Artif. Intell. Rev. 40(1), 1\u201325 (2013)","journal-title":"Artif. Intell. Rev."},{"issue":"3","key":"10_CR20","doi-asserted-by":"crossref","first-page":"438","DOI":"10.5465\/amr.1998.926620","volume":"23","author":"RJ Bies","year":"1998","unstructured":"Bies, R.J., Lewicki, R.J., Mcallister, D.J.: Trust and distrust: new relationships and realities. Acad. Manage. Rev. 23(3), 438\u2013458 (1998)","journal-title":"Acad. Manage. Rev."},{"issue":"1","key":"10_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S0269888904000116","volume":"19","author":"SD Ramchurn","year":"2004","unstructured":"Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. Knowl. Eng. Rev. 19(1), 1\u201325 (2004)","journal-title":"Knowl. Eng. Rev."},{"key":"10_CR22","series-title":"Measures of Social Psychological Attitudes","volume-title":"Measures of Personality and Social Psychological Attitudes","author":"JP Robinson","year":"1991","unstructured":"Robinson, J.P., Shaver, P.R., Wrightsman, L.S.: Measures of Personality and Social Psychological Attitudes. Measures of Social Psychological Attitudes. Academic Press, Cambridge (1991)"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Sabater, J., Sierra, C.: Regret: reputation in gregarious societies. In: Proceedings of the Fifth International Conference on Autonomous Agents, AGENTS 2001, pp. 194\u2013195 (2001)","DOI":"10.1145\/375735.376110"},{"key":"10_CR24","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Sierra, C., Debenham, J.: An information-based model for trust. In: AAMAS, pp. 497\u2013504. ACM (2005)","DOI":"10.1145\/1082473.1082549"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Sparks, J.R., Rapp, D.N.: Unreliable and anomalous: how the credibility of data affects belief revision. In: Annual Conference of the Cognitive Science Society, pp. 741\u2013746 (2011)","DOI":"10.1037\/e566842012-505"},{"issue":"1","key":"10_CR27","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1017\/S0269888912000021","volume":"27","author":"L Tamargo","year":"2012","unstructured":"Tamargo, L., Garc\u00eda, A., Falappa, M., Simari, G.: Modeling knowledge dynamics in multi-agent systems based on informants. Knowl. Eng. Rev. 27(1), 87\u2013114 (2012)","journal-title":"Knowl. Eng. Rev."},{"key":"10_CR28","first-page":"183","volume":"12","author":"L Teacy","year":"2006","unstructured":"Teacy, L., Patel, J., Jennings, N., Luck, M.: TRAVOS: trust and reputation in the context of inaccurate information sources. JAAMAS 12, 183\u2013198 (2006)","journal-title":"JAAMAS"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Ughetto, L., Claveau, V.: Different interpretations of fuzzy gradual-inclusion-based IR models. In: EUSFLAT, pp. 431\u2013438 (2011)","DOI":"10.2991\/eusflat.2011.109"},{"key":"10_CR30","unstructured":"Ughetto, L., Pasi, G., Claveau, V., Pivert, O., Bosc, P.: Implication in information retrieval systems. In: RIAO, pp. 61\u201364 (2010)"},{"issue":"10","key":"10_CR31","doi-asserted-by":"crossref","first-page":"532","DOI":"10.2307\/3655564","volume":"99","author":"E Ullmann-Margalit","year":"2002","unstructured":"Ullmann-Margalit, E.: Trust out of distrust. J. Philos. 99(10), 532\u2013548 (2002)","journal-title":"J. Philos."},{"key":"10_CR32","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338\u2013353 (1965)","journal-title":"Inf. Control"}],"container-title":["Lecture Notes in Computer Science","Scalable Uncertainty Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45856-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T15:13:33Z","timestamp":1749568413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45856-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319458557","9783319458564"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45856-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}