{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T02:54:12Z","timestamp":1771037652749,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T00:00:00Z","timestamp":1377648000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"DOI":"10.1007\/s10588-013-9166-x","type":"journal-article","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T11:50:00Z","timestamp":1377604200000},"source":"Crossref","is-referenced-by-count":6,"title":["Trusting the messenger because of the message: feedback dynamics from information quality to source evaluation"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Paglieri","sequence":"first","affiliation":[]},{"given":"Cristiano","family":"Castelfranchi","sequence":"additional","affiliation":[]},{"given":"C\u00e9lia","family":"da Costa\u00a0Pereira","sequence":"additional","affiliation":[]},{"given":"Rino","family":"Falcone","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Tettamanzi","sequence":"additional","affiliation":[]},{"given":"Serena","family":"Villata","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,28]]},"reference":[{"key":"9166_CR1","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/283699.283739","volume-title":"Proceedings of the 1997 workshop on new security paradigms (NSPW 1997)","author":"A Abdul-Rahman","year":"1997","unstructured":"Abdul-Rahman A, Hailes S (1997) A distributed trust model. In: Proceedings of the 1997 workshop on new security paradigms (NSPW 1997). ACM, New York, pp 48\u201360"},{"key":"9166_CR2","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-1-4615-5965-8_17","volume-title":"Human & machine perception: information fusion","author":"C Castelfranchi","year":"1997","unstructured":"Castelfranchi C (1997) Representation and integration of multiple knowledge sources: issues and questions. In: Cantoni V, Di\u00a0Ges\u00f9 V, Setti A, Tegolo D (eds) Human & machine perception: information fusion. Plenum, New York, pp 235\u2013254"},{"key":"9166_CR3","doi-asserted-by":"crossref","DOI":"10.1002\/9780470519851","volume-title":"Trust theory: a socio-cognitive and computational model","author":"C Castelfranchi","year":"2010","unstructured":"Castelfranchi C, Falcone R (2010) Trust theory: a socio-cognitive and computational model. Wiley, New York"},{"key":"9166_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-1159-5","volume-title":"Reputation in artificial societies: social beliefs for social order","author":"R Conte","year":"2002","unstructured":"Conte R, Paolucci M (2002) Reputation in artificial societies: social beliefs for social order. Kluwer Academic, Dordrecht"},{"key":"9166_CR5","first-page":"164","volume-title":"IJCAI","author":"C Costa Pereira da","year":"2011","unstructured":"da Costa Pereira C, Tettamanzi A, Villata S (2011) Changing ones mind: erase or rewind? In: Walsh T (ed) IJCAI. IJCAI\/AAAI Press, Menlo Park, pp 164\u2013171"},{"key":"9166_CR6","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-94-017-3614-5_5","volume-title":"Trust and deception in virtual societies","author":"R Demolombe","year":"2001","unstructured":"Demolombe R (2001) To trust information sources: a proposal for a modal logical framework. In: Castelfranchi Y-HTC (ed) Trust and deception in virtual societies. Kluwer Academic, Dordrecht, pp 111\u2013124"},{"issue":"1","key":"9166_CR7","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s00450-009-0051-2","volume":"23","author":"J Dix","year":"2009","unstructured":"Dix J, Parsons S, Prakken H, Simari GR (2009) Research challenges for argumentation. Comput Sci Res Dev 23(1):27\u201334","journal-title":"Comput Sci Res Dev"},{"key":"9166_CR8","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1002\/int.20297","volume":"23","author":"D Dubois","year":"2008","unstructured":"Dubois D, Prade H (2008) An introduction to bipolar representations of information and preference. Int J Intell Syst 23:866\u2013877","journal-title":"Int J Intell Syst"},{"issue":"2","key":"9166_CR9","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/0004-3702(94)00041-X","volume":"77","author":"PM Dung","year":"1995","unstructured":"Dung PM (1995) On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artif Intell 77(2):321\u2013358","journal-title":"Artif Intell"},{"key":"9166_CR10","first-page":"13","volume-title":"Proceedings of the 15th international workshop on trust in agent societies","author":"A Etuk","year":"2012","unstructured":"Etuk A, Norman T, Sensoy M (2012) Reputation-based trust evaluations through diversity. In: Proceedings of the 15th international workshop on trust in agent societies, pp 13\u201324"},{"key":"9166_CR11","first-page":"404","volume-title":"AAMAS","author":"K Fullam","year":"2004","unstructured":"Fullam K, Barber KS (2004) Using policies for information valuation to justify beliefs. In: AAMAS. IEEE Comput Soc, Los Alamitos, pp 404\u2013411"},{"key":"9166_CR12","first-page":"164","volume-title":"AAMAS","author":"K Fullam","year":"2007","unstructured":"Fullam K, Barber KS (2007) Dynamically learning sources of trust information: experience vs. reputation. In: AAMAS, p 164"},{"key":"9166_CR13","first-page":"213","volume-title":"Trust: making and breaking cooperative relations","author":"D Gambetta","year":"1988","unstructured":"Gambetta D (1988) Can we trust them? In: Trust: making and breaking cooperative relations, pp 213\u2013238"},{"key":"9166_CR14","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/978-94-007-5583-3_25","volume-title":"Agreement technologies","author":"A Koster","year":"2013","unstructured":"Koster A, Mir JS, Schorlemmer M (2013) Argumentation and trust. In: Ossowski S (ed) Agreement technologies. Springer, Berlin, pp 441\u2013451"},{"issue":"1","key":"9166_CR15","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/S0004-3702(03)00063-8","volume":"149","author":"C-J Liau","year":"2003","unstructured":"Liau C-J (2003) Belief, information acquisition, and trust in multi-agent systems\u2014a modal logic formulation. Artif Intell 149(1):31\u201360","journal-title":"Artif Intell"},{"key":"9166_CR16","first-page":"205","volume-title":"AAMAS-TRUST","author":"E Lorini","year":"2008","unstructured":"Lorini E, Demolombe R (2008) From binary trust to graded trust in information sources: a logical perspective. In: AAMAS-TRUST, pp 205\u2013225"},{"key":"9166_CR17","first-page":"209","volume-title":"AAMAS","author":"P-A Matt","year":"2010","unstructured":"Matt P-A, Morge M, Toni F (2010) Combining statistics and arguments to compute trust. In: AAMAS, pp\u00a0209\u2013216"},{"key":"9166_CR18","unstructured":"Mir JS (2003) Trust and reputation for agent societies. PhD thesis, CSIC"},{"key":"9166_CR19","unstructured":"Mui L (2002) Computational models of trust and reputation: agents, evolutionary games, and social networks. PhD thesis, Massachusetts Institute of Technology, Boston, USA"},{"key":"9166_CR20","series-title":"CEUR workshop proceedings","first-page":"332","volume-title":"AT","author":"F Paglieri","year":"2012","unstructured":"Paglieri F, Castelfranchi C (2012) Trust in relevance. In: Ossowski S, Toni F, Vouros GA (eds) AT. CEUR workshop proceedings, vol 918, pp 332\u2013346. CEUR-WS.org"},{"key":"9166_CR21","volume-title":"ArgMAS","author":"S Parsons","year":"2010","unstructured":"Parsons S, McBurney P, Sklar E (2010) Reasoning about trust using argumentation: a position paper. In: ArgMAS"},{"key":"9166_CR22","first-page":"879","volume-title":"AAMAS","author":"S Parsons","year":"2011","unstructured":"Parsons S, Tang Y, Sklar E, McBurney P, Cai K (2011) Argumentation-based reasoning in agents with varying degrees of trust. In: AAMAS, pp 879\u2013886"},{"key":"9166_CR23","first-page":"268","volume-title":"SUM","author":"H Prade","year":"2007","unstructured":"Prade H (2007) A qualitative bipolar argumentative view of trust. In: SUM, pp 268\u2013276"},{"key":"9166_CR24","volume-title":"Argumentation in artificial intelligence","year":"2009","unstructured":"Rahwan I, Simari G (eds) (2009) Argumentation in artificial intelligence. Springer, Berlin"},{"key":"9166_CR25","first-page":"214","volume-title":"CLIMA","author":"R Stranders","year":"2007","unstructured":"Stranders R, de Weerdt M, Witteveen C (2007) Fuzzy argumentation for trust. In: CLIMA, pp 214\u2013230"},{"key":"9166_CR26","volume-title":"EUMAS","author":"Y Tang","year":"2010","unstructured":"Tang Y, Cai K, Sklar E, McBurney P, Parsons S (2010) A system of argumentation for reasoning about trust. In: EUMAS"},{"issue":"2","key":"9166_CR27","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10458-006-5952-x","volume":"12","author":"WTL Teacy","year":"2006","unstructured":"Teacy WTL, Patel J, Jennings NR, Luck M (2006) TRAVOS: trust and reputation in the context of inaccurate information sources. Auton Agents Multi-Agent Syst 12(2):183\u2013198","journal-title":"Auton Agents Multi-Agent Syst"},{"key":"9166_CR28","volume-title":"The uses of argument","author":"S Toulmin","year":"1958","unstructured":"Toulmin S (1958) The uses of argument. Cambridge University Press, Cambridge"},{"key":"9166_CR29","first-page":"74","volume-title":"ECSQARU","author":"S Villata","year":"2011","unstructured":"Villata S, Boella G, Gabbay DM, van der Torre L (2011) Arguing about the trustworthiness of the information sources. In: ECSQARU, pp 74\u201385"},{"key":"9166_CR30","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511802034","volume-title":"Argumentation schemes","author":"D Walton","year":"2008","unstructured":"Walton D, Reed C, Macagno F (2008) Argumentation schemes. Cambridge University Press, Cambridge"},{"key":"9166_CR31","first-page":"1551","volume-title":"IJCAI","author":"Y Wang","year":"2007","unstructured":"Wang Y, Singh MP (2007) Formal trust model for multiagent systems. In: Veloso MM (ed) IJCAI, pp\u00a01551\u20131556"},{"key":"9166_CR32","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/0165-0114(78)90029-5","volume":"1","author":"LA Zadeh","year":"1978","unstructured":"Zadeh LA (1978) Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets Syst 1:3\u201328","journal-title":"Fuzzy Sets Syst"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-013-9166-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-013-9166-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-013-9166-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T07:36:25Z","timestamp":1559288185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-013-9166-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,28]]},"references-count":32,"alternative-id":["9166"],"URL":"https:\/\/doi.org\/10.1007\/s10588-013-9166-x","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"value":"1381-298X","type":"print"},{"value":"1572-9346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,28]]}}}