{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T05:48:44Z","timestamp":1777441724469,"version":"3.51.4"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T00:00:00Z","timestamp":1383091200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s10458-013-9239-8","type":"journal-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T09:54:03Z","timestamp":1383040443000},"page":"805-835","source":"Crossref","is-referenced-by-count":4,"title":["Qualitative trust model with a configurable method to aggregate ordinal data"],"prefix":"10.1007","volume":"28","author":[{"given":"David","family":"Jelenc","sequence":"first","affiliation":[]},{"given":"Denis","family":"Tr\u010dek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,30]]},"reference":[{"key":"9239_CR1","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., & Hailes, S. (2000). Supporting trust in virtual communities. In Proceedings of the 33rd annual Hawaii international conference on system sciences.","DOI":"10.1109\/HICSS.2000.926814"},{"key":"9239_CR2","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1142\/S0218843003000681","volume":"12","author":"J Carbo","year":"2003","unstructured":"Carbo, J., Molina, J., & Davila, J. (2003). Trust management through fuzzy reputation. International Journal of Cooperative Information Systems, 12, 135\u2013155.","journal-title":"International Journal of Cooperative Information Systems"},{"key":"9239_CR3","volume-title":"Peer-to-peer systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J. R. (2002). The Sybil attack. In P. Druschel, F. Kaashoek, & A. Rowstron (Eds.), Peer-to-peer systems. Berlin: Springer."},{"key":"9239_CR4","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/0020-0255(86)90035-6","volume":"39","author":"D Dubois","year":"1986","unstructured":"Dubois, D., & Prade, H. (1986). Weighted minimum and maximum operations in fuzzy set theory. Information Sciences, 39, 205\u2013210.","journal-title":"Information Sciences"},{"key":"9239_CR5","volume-title":"Trust: Making and breaking cooperative relations","author":"D Gambetta","year":"1990","unstructured":"Gambetta, D. (1990). Can we trust trust? In D. Gambetta (Ed.), Trust: Making and breaking cooperative relations. Oxford: Basil Blackwell."},{"key":"9239_CR6","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1109\/91.842149","volume":"8","author":"L Godo","year":"2000","unstructured":"Godo, L., & Torra, V. (2000). On aggregation operators for ordinal qualitative information. IEEE Transactions on Fuzzy Systems, 8, 143\u2013154.","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"9239_CR7","doi-asserted-by":"crossref","unstructured":"Griffiths, N., Chao, K. M., & Younas, M. (2006). Fuzzy trust for peer-to-peer systems. In 26th IEEE international conference on distributed computing systems workshops, 2006 (ICDCS workshops 2006).","DOI":"10.1109\/ICDCSW.2006.57"},{"key":"9239_CR8","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/S0165-0114(96)00047-4","volume":"88","author":"F Herrera","year":"1997","unstructured":"Herrera, F., Viedma, E. H., & Verdegay, J. L. (1997). A rational consensus model in group decision making using linguistic assessments. Fuzzy Sets and Systems, 88, 31\u201349.","journal-title":"Fuzzy Sets and Systems"},{"key":"9239_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1592451.1592452","volume":"42","author":"K Hoffman","year":"2009","unstructured":"Hoffman, K., Zage, D., & Nita-Rotaru, C. (2009). A survey of attack and defense techniques for reputation systems. ACM Computing Surveys, 42, 1\u201331.","journal-title":"ACM Computing Surveys"},{"key":"9239_CR10","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1111\/j.1365-2929.2004.02012.x","volume":"38","author":"S Jamieson","year":"2004","unstructured":"Jamieson, S. (2004). Likert scales: How to (ab)use them. Medical Education, 38, 1217\u20131218.","journal-title":"Medical Education"},{"key":"9239_CR11","unstructured":"Jelenc, D., Hermoso, R., Ossowski, S., & Tr\u010dek, D. (2012). Alpha test-bed: A new approach for evaluating trust models. In Proceedings of the third international workshop on infrastructures and tools for multiagent systems."},{"key":"9239_CR12","doi-asserted-by":"crossref","unstructured":"Jelenc, D., Hermoso, R., Sabater-Mir, J., & Tr\u010dek, D. (2013). Decision making matters: A better way to evaluate trust models. Knowledge-Based Systems, 52, 147\u2013164. doi: 10.1016\/j.knosys.2013.07.016 .","DOI":"10.1016\/j.knosys.2013.07.016"},{"key":"9239_CR13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/367211.367250","volume":"44","author":"NR Jennings","year":"2001","unstructured":"Jennings, N. R. (2001). An agent-based approach for building complex software systems. Communications of the ACM, 44, 35\u201341.","journal-title":"Communications of the ACM"},{"key":"9239_CR14","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., & Haller, J. (2007). Dirichlet reputation systems. In The second international conference on availability, reliability and security (ARES).","DOI":"10.1109\/ARES.2007.71"},{"key":"9239_CR15","unstructured":"J\u00f8sang, A., & Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th Bled electronic commerce conference."},{"key":"9239_CR16","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43, 618\u2013644.","journal-title":"Decision Support Systems"},{"key":"9239_CR17","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.jclinepi.2007.05.019","volume":"61","author":"E Kahler","year":"2008","unstructured":"Kahler, E., Rogausch, A., Brunner, E., & Himmel, W. (2008). A parametric analysis of ordinal quality-of-life data can lead to erroneous results. Journal of Clinical Epidemiology, 61, 475\u2013480.","journal-title":"Journal of Clinical Epidemiology"},{"key":"9239_CR18","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809477","volume-title":"Judgment under uncertainty: Heuristics and biases","author":"D Kahneman","year":"1982","unstructured":"Kahneman, D., Slovic, P., & Tversky, A. (1982). Judgment under uncertainty: Heuristics and biases. New York: Cambridge University Press."},{"key":"9239_CR19","doi-asserted-by":"crossref","unstructured":"Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th international conference on World Wide Web.","DOI":"10.1145\/775152.775242"},{"key":"9239_CR20","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1097\/00006199-199003000-00019","volume":"39","author":"TR Knapp","year":"1990","unstructured":"Knapp, T. R. (1990). Treating ordinal scales as interval scales: An attempt to resolve the controversy. Nursing Research, 39, 121\u2013123.","journal-title":"Nursing Research"},{"key":"9239_CR21","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.sysarc.2009.01.002","volume":"55","author":"D Kova\u010d","year":"2009","unstructured":"Kova\u010d, D., & Tr\u010dek, D. (2009). Qualitative trust modeling in SOA. Journal of Systems Architecture, 55, 255\u2013263.","journal-title":"Journal of Systems Architecture"},{"key":"9239_CR22","doi-asserted-by":"crossref","unstructured":"Littlestone, N., & Warmuth, M. K. (1989). The weighted majority algorithm. In 30th Annual symposium on foundations of computer science.","DOI":"10.1109\/SFCS.1989.63487"},{"key":"9239_CR23","unstructured":"Liu, S., Yu, H., Miao, C., & Kot, A. C. (2013). A fuzzy logic based reputation model against unfair ratings. In Proceedings of the 2013 international conference on autonomous agents and multi-agent systems."},{"key":"9239_CR24","unstructured":"Marsh, S. P. (1994). Formalising trust as a computational concept. Ph.D. thesis, University of Stirling."},{"key":"9239_CR25","unstructured":"Marsh, S. P., & Dibben, M. R. (2005). Trust, untrust, distrust and mistrust\u2014An exploration of the dark(er) side. In Trust management. Berlin: Springer."},{"key":"9239_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10462-011-9277-z","volume":"40","author":"I Pinyol","year":"2011","unstructured":"Pinyol, I., & Sabater-Mir, J. (2011). Computational trust and reputation models for open multi-agent systems: A review. Artificial Intelligence Review, 40, 1\u201325.","journal-title":"Artificial Intelligence Review"},{"key":"9239_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S0269888904000116","volume":"19","author":"SD Ramchurn","year":"2004","unstructured":"Ramchurn, S. D., Huynh, D., & Jennings, N. R. (2004). Trust in multi-agent systems. Knowledge Engineering Review, 19, 1\u201325.","journal-title":"Knowledge Engineering Review"},{"key":"9239_CR28","doi-asserted-by":"crossref","unstructured":"Ramchurn, S. D., Sierra, C., Godo, L., & Jennings, N. R. (2004). Devising a trust model for multi-agent interactions using confidence and reputation. Applied Artificial Intelligence, 18, 833\u2013852.","DOI":"10.1080\/0883951049050904509045"},{"key":"9239_CR29","first-page":"3","volume":"9","author":"J Sabater","year":"2006","unstructured":"Sabater, J., Paolucci, M., & Conte, R. (2006). Repage: Reputation and image among limited autonomous partners. Journal of Artificial Societies and Social Simulation, 9, 3.","journal-title":"Journal of Artificial Societies and Social Simulation"},{"key":"9239_CR30","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J Sabater","year":"2005","unstructured":"Sabater, J., & Sierra, C. (2005). Review on computational trust and reputation models. Artificial Intelligence Review, 24, 33\u201360.","journal-title":"Artificial Intelligence Review"},{"key":"9239_CR31","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1016\/j.ijar.2006.12.013","volume":"46","author":"J Sabater-Mir","year":"2007","unstructured":"Sabater-Mir, J., & Paolucci, M. (2007). On representation and aggregation of social evaluations in computational trust and reputation models. International Journal of Approximate Reasoning, 46, 458\u2013483.","journal-title":"International Journal of Approximate Reasoning"},{"key":"9239_CR32","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S Song","year":"2005","unstructured":"Song, S., Hwang, K., Zhou, R., & Kwok, Y. K. (2005). Trusted p2p transactions with fuzzy reputation aggregation. Internet Computing IEEE, 9, 24\u201334.","journal-title":"Internet Computing IEEE"},{"key":"9239_CR33","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1126\/science.103.2684.677","volume":"103","author":"SS Stevens","year":"1946","unstructured":"Stevens, S. S. (1946). On the theory of scales of measurement. Science, 103, 677\u2013680.","journal-title":"Science"},{"key":"9239_CR34","doi-asserted-by":"crossref","first-page":"227","DOI":"10.3233\/AIS-2012-0149","volume":"4","author":"K Taveter","year":"2012","unstructured":"Taveter, K., Du, H., & Huhns, M. N. (2012). Engineering societal information systems by agent-oriented modeling. Journal of Ambient Intelligence and Smart Environments, 4, 227\u2013252.","journal-title":"Journal of Ambient Intelligence and Smart Environments"},{"key":"9239_CR35","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10458-006-5952-x","volume":"12","author":"WTL Teacy","year":"2006","unstructured":"Teacy, W. T. L., Patel, J., Jennings, N. R., & Luck, M. (2006). Travos: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems, 12, 183\u2013198.","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"9239_CR36","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1016\/j.csi.2004.03.007","volume":"26","author":"D Tr\u010dek","year":"2004","unstructured":"Tr\u010dek, D. (2004). Towards trust management standardization. Computer Standards & Interfaces, 26, 543\u2013548.","journal-title":"Computer Standards & Interfaces"},{"key":"9239_CR37","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.mcm.2008.05.005","volume":"49","author":"D Tr\u010dek","year":"2009","unstructured":"Tr\u010dek, D. (2009). A formal apparatus for modeling trust in computing environments. Mathematical and Computer Modelling, 49, 226\u2013233.","journal-title":"Mathematical and Computer Modelling"},{"key":"9239_CR38","doi-asserted-by":"crossref","unstructured":"Tr\u010dek, D. (2010). Ergonomic trust management in pervasive computing environments\u2014Qualitative assessment dynamics. In 5th International conference on pervasive computing and applications (ICPCA).","DOI":"10.1109\/ICPCA.2010.5704067"},{"key":"9239_CR39","unstructured":"Tr\u010dek, D. (2011). Trust management methodologies for the web. In Proceedings of the 7th international conference on reasoning web: Semantic technologies for the web of data."},{"key":"9239_CR40","doi-asserted-by":"crossref","first-page":"10774","DOI":"10.3390\/s120810774","volume":"12","author":"D Tr\u010dek","year":"2012","unstructured":"Tr\u010dek, D. (2012). An integrative architecture for a sensor-supported trust management system. Sensors, 12, 10774\u201310787.","journal-title":"Sensors"},{"key":"9239_CR41","doi-asserted-by":"crossref","unstructured":"Viswanath, B., Mondal, M., Clement, A., Druschel, P., Gummadi, K. P., Mislove, A., et al. (2012). Exploring the design space of social network-based Sybil defenses. In 2012 Fourth international conference on communication systems and networks (COMSNETS).","DOI":"10.1109\/COMSNETS.2012.6151333"},{"key":"9239_CR42","unstructured":"Weisstein, E. W. (2013). Statistical median. From MathWorld\u2014A Wolfram Web resource. Accessed 21 February, 2013, from http:\/\/mathworld.wolfram.com\/StatisticalMedian.html ."},{"key":"9239_CR43","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/0888-613X(94)00035-2","volume":"12","author":"R Yager","year":"1995","unstructured":"Yager, R. (1995). An approach to ordinal decision making. International Journal of Approximate Reasoning, 12, 237\u2013261.","journal-title":"International Journal of Approximate Reasoning"},{"key":"9239_CR44","unstructured":"Yu, B., Singh, M. P., & Sycara, K. (2004). Developing trust in large-scale peer-to-peer systems. In IEEE first symposium on multi-agent security and survivability."}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-013-9239-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10458-013-9239-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-013-9239-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T23:19:59Z","timestamp":1596755999000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10458-013-9239-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,30]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["9239"],"URL":"https:\/\/doi.org\/10.1007\/s10458-013-9239-8","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"value":"1387-2532","type":"print"},{"value":"1573-7454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,30]]}}}