{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T17:11:43Z","timestamp":1755796303607},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,4,16]],"date-time":"2015-04-16T00:00:00Z","timestamp":1429142400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2015,4,16]],"date-time":"2015-04-16T00:00:00Z","timestamp":1429142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["User Model User-Adap Inter"],"published-print":{"date-parts":[[2015,8]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Smart environments are able to support users during their daily life. For example, smart energy systems can be used to support energy saving by controlling devices, such as lights or displays, depending on context information, such as the brightness in a room or the presence of users. However, proactive decisions should also match the users\u2019 preferences to maintain the users\u2019 trust in the system. Wrong decisions could negatively influence the users\u2019 acceptance of a system and at worst could make them abandon the system. In this paper, a trust-based model, called User Trust Model (UTM), for automatic decision-making is proposed, which is based on Bayesian networks. The UTM\u2019s construction, the initialization with empirical data gathered in an online survey, and its integration in an office setting are described. Furthermore, the results of a live study and a live survey analyzing the users\u2019 experience and acceptance are presented.<\/jats:p>","DOI":"10.1007\/s11257-015-9160-8","type":"journal-article","created":{"date-parts":[[2015,4,15]],"date-time":"2015-04-15T14:51:28Z","timestamp":1429109488000},"page":"267-293","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Trust-based decision-making for smart and adaptive environments"],"prefix":"10.1007","volume":"25","author":[{"given":"Stephan","family":"Hammer","sequence":"first","affiliation":[]},{"given":"Michael","family":"Wi\u00dfner","sequence":"additional","affiliation":[]},{"given":"Elisabeth","family":"Andr\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,16]]},"reference":[{"key":"9160_CR1","doi-asserted-by":"publisher","unstructured":"Adali, S., Escriva, R., Goldberg, M.K., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B.K., Wallace, W.A., Williams, G.T.: Measuring behavioral trust in social networks. In: Yang, C.C., Zeng, D., Wang, K., Sanfilippo, A., Tsang, H.H., Day, M.Y., Gl\u00e4sser, U., Brantingham, P.L., Chen, H. (eds.) Intelligence and Security Informatics (ISI), 2010 IEEE International Conference on, pp. 150\u2013152. IEEE, Vancouver, BC, Canada (2010). doi:10.1109\/ISI.2010.5484757","DOI":"10.1109\/ISI.2010.5484757"},{"key":"9160_CR2","doi-asserted-by":"publisher","unstructured":"Antifakos, S., Kern, N., Schiele, B., Schwaninger, A.: Towards improving trust in context-aware systems by displaying system confidence. In: Proceedings of the 7th International Conference on Human Computer Interaction with Mobile Devices and Services, MobileHCI \u201905, Salzburg, Austria, pp. 9\u201314. ACM (2005). doi:10.1145\/1085777.1085780","DOI":"10.1145\/1085777.1085780"},{"key":"9160_CR3","doi-asserted-by":"publisher","unstructured":"Arimura, S., Fujita, M., Kobayashi, S., Kani, J., Nishigaki, M., Shiba, A.: i\/k-contact: A context-aware user authentication using physical social trust. In: Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, pp. 407\u2013413 (2014). doi:10.1109\/PST.2014.6890968","DOI":"10.1109\/PST.2014.6890968"},{"key":"9160_CR4","doi-asserted-by":"publisher","unstructured":"Bee, K., Hammer, S., Pratsch, C., Andr\u00e9, E.: The automatic trust management of self-adaptive multi-display environments. In: Khalil, I., Mantoro, T. (eds.) Trustworthy Ubiquitous Computing, Atlantis Ambient and Pervasive Intelligence, pp. 3\u201320. Atlantis Press, Amsterdam (2012). doi:10.2991\/978-94-91216-71-8-1","DOI":"10.2991\/978-94-91216-71-8-1"},{"key":"9160_CR5","unstructured":"Bhuiyan, T., Xu, Y., J\u00f8sang, A.: A review of trust in online social networks to explore new research agenda. In: Arabnia, H.R., Clincy, V.A., Lu, J., Marsh, A., Solo, A.M.G. (eds.) Proceedings of the 2010 International Conference on Internet Computing (ICOMP 2010), pp. 123\u2013128. CSREA Press, Las Vegas, NV, USA (2010). http:\/\/www.eprints.qut.edu.au\/41447\/"},{"key":"9160_CR6","doi-asserted-by":"publisher","unstructured":"Burnett, C., Norman, T.J., Sycara, K.: Trust decision-making in multi-agent systems. In: Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence\u2014Volume Volume One, IJCAI\u201911, Barcelona, Catalonia, Spain, pp. 115\u2013120. AAAI Press, Menlo Park (2011). doi:10.5591\/978-1-57735-516-8\/IJCAI11-031","DOI":"10.5591\/978-1-57735-516-8\/IJCAI11-031"},{"key":"9160_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/9780470519851","volume-title":"Trust Theory: A Socio-Cognitive and Computational Model","author":"C Castelfranchi","year":"2010","unstructured":"Castelfranchi, C., Falcone, R.: Trust Theory: A Socio-Cognitive and Computational Model, 1st edn. Wiley Publishing, Chichester (2010)","edition":"1"},{"issue":"3\u20134","key":"9160_CR8","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s11257-005-1269-8","volume":"15","author":"K Cheverst","year":"2005","unstructured":"Cheverst, K., Byun, H., Fitton, D., Sas, C., Kray, C., Villar, N.: Exploring issues of user model transparency and proactive behaviour in an office environment control system. User Model. User Adapt. Interact. 15(3\u20134), 235\u2013273 (2005). doi:10.1007\/s11257-005-1269-8","journal-title":"User Model. User Adapt. Interact."},{"issue":"3","key":"9160_CR9","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.comcom.2010.01.023","volume":"34","author":"MK Denko","year":"2011","unstructured":"Denko, M.K., Sun, T., Woungang, I.: Trust management in ubiquitous computing: a bayesian approach. Comput. Commun. 34(3), 398\u2013406 (2011). doi:10.1016\/j.comcom.2010.01.023","journal-title":"Comput. Commun."},{"key":"9160_CR10","doi-asserted-by":"publisher","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI \u201906, Montr\u00e9al, Qu\u00e9bec, Canada, pp. 581\u2013590. ACM (2006). doi:10.1145\/1124772.1124861","DOI":"10.1145\/1124772.1124861"},{"key":"9160_CR11","doi-asserted-by":"publisher","unstructured":"Dim, E., Kuflik, T., Reinhartz-Berger, I.: When user modeling intersects software engineering: the info-bead user modeling approach. User Model. User Adap. Interact. (2015). doi:10.1007\/s11257-015-9159-1","DOI":"10.1007\/s11257-015-9159-1"},{"key":"9160_CR12","doi-asserted-by":"publisher","unstructured":"DiSalvo, C., Sengers, P., Brynjarsd\u00f3ttir, H.: Mapping the landscape of sustainable HCI. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI \u201910, Atlanta, Georgia, USA, pp. 1975\u20131984. ACM (2010). doi:10.1145\/1753326.1753625","DOI":"10.1145\/1753326.1753625"},{"key":"9160_CR13","unstructured":"Florencio, D., Herley, C., Van Oorschot, P.C.: Password portfolios and the finite-effort user: sustainably managing large numbers of accounts. In: Proceedings of the 23rd USENIX Conference on Security Symposium, SEC\u201914, San Diego, CA, pp. 575\u2013590. USENIX Association, Berkeley, CA, USA (2014). http:\/\/www.dl.acm.org\/citation.cfm?id=2671225.2671262"},{"key":"9160_CR14","doi-asserted-by":"publisher","unstructured":"Gamberini, L., Spagnolli, A., Corradi, N., Jacucci, G., Tusa, G., Mikkola, T., Zamboni, L., Hoggan, E.: Tailoring feedback to users actions in a persuasive game for household electricity conservation. In: Bang, M., Ragnemalm, E. (eds.) Persuasive Technology. Design for Health and Safety. Lecture Notes in Computer Science, pp. 100\u2013111. Springer, Berlin Heidelberg (2012). doi:10.1007\/978-3-642-31037-9-9","DOI":"10.1007\/978-3-642-31037-9-9"},{"key":"9160_CR15","doi-asserted-by":"publisher","unstructured":"Glass, A., McGuinness, D.L., Wolverton, M.: Toward establishing trust in adaptive agents. In: Proceedings of the 13th International Conference on Intelligent User Interfaces, IUI \u201908, Gran Canaria, Spain, pp. 227\u2013236. ACM (2008). doi:10.1145\/1378773.1378804","DOI":"10.1145\/1378773.1378804"},{"issue":"1","key":"9160_CR16","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MPRV.2010.89","volume":"10","author":"M Hazas","year":"2011","unstructured":"Hazas, M., Friday, A., Scott, J.: Look back before leaping forward: four decades of domestic energy inquiry. IEEE Pervasive Comput. 10(1), 13\u201319 (2011). doi:10.1109\/MPRV.2010.89","journal-title":"IEEE Pervasive Comput."},{"issue":"6","key":"9160_CR17","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/TIFS.2013.2242889","volume":"8","author":"I Ivanov","year":"2013","unstructured":"Ivanov, I., Vajda, P., Korshunov, P., Ebrahimi, T.: Comparative study of trust modeling for automatic landmark tagging. Trans. Info. For. Sec. 8(6), 911\u2013923 (2013). doi:10.1109\/TIFS.2013.2242889","journal-title":"Trans. Info. For. Sec."},{"key":"9160_CR18","unstructured":"J\u00f8sang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference\u2014Volume 48, ACSC \u201906, Hobart, Australia, pp. 85\u201394. Australian Computer Society Inc, Darlinghurst, Australia (2006). http:\/\/www.dl.acm.org\/citation.cfm?id=1151699.1151710"},{"issue":"12","key":"9160_CR19","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1016\/j.ijhcs.2013.06.003","volume":"71","author":"BP Knijnenburg","year":"2013","unstructured":"Knijnenburg, B.P., Kobsa, A., Jin, H.: Dimensionality of information disclosure behavior. Int. J. Hum.-Comput. Stud. 71(12), 1144\u20131162 (2013). doi:10.1016\/j.ijhcs.2013.06.003","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"9160_CR20","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy indexes: a survey of westin\u2019s studies. Technical Report CMU-ISRI-5-138, Technical Report, Institute for Software Research Int. (ISRI), Carnegie Mellon University (2005)"},{"key":"9160_CR21","doi-asserted-by":"publisher","unstructured":"Kurdyukova, E., Andr\u00e9, E., Leichtenstern, K.: Trust management of ubiquitous multi-display environments. In: Kr\u00fcger, A., Kuflik, T. (eds.) Ubiquitous Display Environments, Cognitive Technologies, pp. 177\u2013193. Springer, Berlin Heidelberg (2012). doi:10.1007\/978-3-642-27663-7-11","DOI":"10.1007\/978-3-642-27663-7-11"},{"key":"9160_CR22","doi-asserted-by":"publisher","unstructured":"Kurdyukova, E., Hammer, S., Andr\u00e9, E.: Personalization of content on public displays driven by the recognition of group context. In: Patern, F., de Ruyter, B., Markopoulos, P., Santoro, C., van Loenen, E., Luyten, K. (eds.) Ambient Intelligence. Lecture Notes in Computer Science, pp. 272\u2013287. Springer, Berlin Heidelberg (2012). doi:10.1007\/978-3-642-34898-3-18","DOI":"10.1007\/978-3-642-34898-3-18"},{"key":"9160_CR23","doi-asserted-by":"publisher","unstructured":"Lee, J.D., See, K.A.: Trust in automation: designing for appropriate reliance. Hum. Factors 46(1), 50\u201380 (2004). doi:10.1518\/hfes.46.1.50-30392. http:\/\/www.hfs.sagepub.com\/content\/46\/1\/50.abstract","DOI":"10.1518\/hfes.46.1.50-30392"},{"key":"9160_CR24","doi-asserted-by":"publisher","unstructured":"Leichtenstern, K., Andr\u00e9, E., Kurdyukova, E.: Managing user trust for self-adaptive ubiquitous computing systems. In: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, MoMM \u201910, Paris, France, pp. 409\u2013414. ACM (2010). doi:10.1145\/1971519.1971589","DOI":"10.1145\/1971519.1971589"},{"key":"9160_CR25","doi-asserted-by":"publisher","unstructured":"Lim, B.Y., Dey, A.K.: Toolkit to support intelligibility in context-aware applications. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, UbiComp \u201910, Copenhagen, Denmark, pp. 13\u201322. ACM (2010). doi:10.1145\/1864349.1864353","DOI":"10.1145\/1864349.1864353"},{"key":"9160_CR26","doi-asserted-by":"crossref","unstructured":"Lumsden, J.: Triggering trust: to what extent does the question influence the answer when evaluating the perceived importance of trust triggers? In: Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology, BCS-HCI \u201909, Cambridge, UK, pp. 214\u2013223. British Computer Society, Swinton (2009). http:\/\/www.dl.acm.org\/citation.cfm?id=1671011.1671037","DOI":"10.14236\/ewic\/HCI2009.25"},{"key":"9160_CR27","doi-asserted-by":"publisher","unstructured":"Marsh, S.: Trust in distributed artificial intelligence. In: Castelfranchi, C., Werner, E. (eds.) Artificial Social Systems. Lecture Notes in Computer Science, pp. 94\u2013112. Springer, Berlin Heidelberg (1994). doi:10.1007\/3-540-58266-5-6","DOI":"10.1007\/3-540-58266-5-6"},{"key":"9160_CR28","doi-asserted-by":"publisher","unstructured":"M\u00fcller, J., Exeler, J., Buzeck, M., Kr\u00fcger, A.: Reflectivesigns: digital signs that adapt to audience attention. In: Tokuda, H., Beigl, M., Friday, A., Brush, A., Tobe, Y. (eds.) Pervasive Computing. Lecture Notes in Computer Science, pp. 17\u201324. Springer, Berlin Heidelberg (2009). doi:10.1007\/978-3-642-01516-8-3","DOI":"10.1007\/978-3-642-01516-8-3"},{"key":"9160_CR29","doi-asserted-by":"publisher","unstructured":"O\u2019Donovan, J., Smyth, B.: Trust in recommender systems. In: Proceedings of the 10th International Conference on Intelligent User Interfaces, IUI \u201905, San Diego, California, USA, pp. 167\u2013174. ACM (2005). doi:10.1145\/1040830.1040870","DOI":"10.1145\/1040830.1040870"},{"key":"9160_CR30","doi-asserted-by":"publisher","unstructured":"Picard, R.W., Klein, J.: Computers that recognise and respond to user emotion: theoretical and practical implications. Interact. Comput. 14(2), 141\u2013169 (2002). doi:10.1016\/S0953-5438(01)00055-8. http:\/\/www.iwc.oxfordjournals.org\/content\/14\/2\/141.abstract","DOI":"10.1016\/S0953-5438(01)00055-8"},{"key":"9160_CR31","volume-title":"Artificial Intelligence: A Modern Approach","author":"S Russell","year":"2009","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 3rd edn. Prentice Hall Press, Upper Saddle River (2009)","edition":"3"},{"key":"9160_CR32","doi-asserted-by":"publisher","unstructured":"Sankaranarayanan, V., Chandrasekaran, M., Upadhyaya, S.: Towards modeling trust based decisions: a game theoretic approach. In: Biskup, J., Lpez, J. (eds.) Computer Security ESORICS 2007. Lecture Notes in Computer Science, pp. 485\u2013500. Springer, Berlin Heidelberg (2007). doi:10.1007\/978-3-540-74835-9-32","DOI":"10.1007\/978-3-540-74835-9-32"},{"issue":"4","key":"9160_CR33","doi-asserted-by":"publisher","first-page":"47:1","DOI":"10.1145\/2501654.2501661","volume":"45","author":"W Sherchan","year":"2013","unstructured":"Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. 45(4), 47:1\u201347:33 (2013). doi:10.1145\/2501654.2501661","journal-title":"ACM Comput. Surv."},{"key":"9160_CR34","doi-asserted-by":"publisher","unstructured":"Simon, J., Jahn, M., Al-Akkad, A.: Saving energy at work: The design of a pervasive game for office spaces. In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, MUM \u201912, Ulm, Germany, pp. 9:1\u20139:4. ACM (2012). doi:10.1145\/2406367.2406379","DOI":"10.1145\/2406367.2406379"},{"key":"9160_CR35","doi-asserted-by":"publisher","unstructured":"Stegh\u00f6fer, J.P., Kiefhaber, R., Leichtenstern, K., Bernard, Y., Klejnowski, L., Reif, W., Ungerer, T., Andr\u00e9, E., H\u00e4hner, J., M\u00fcller-Schloer, C.: Trustworthy organic computing systems: challenges and perspectives. In: Xie, B., Branke, J., Sadjadi, S., Zhang, D., Zhou, X. (eds.) Autonomic and Trusted Computing. Lecture Notes in Computer Science, pp. 62\u201376. Springer, Berlin Heidelberg (2010). doi:10.1007\/978-3-642-16576-4-5","DOI":"10.1007\/978-3-642-16576-4-5"},{"key":"9160_CR36","unstructured":"Vogiatzis, G., MacGillivray, I., Chli, M.: A probabilistic model for trust and reputation. In: Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, AAMAS \u201910, Toronto, Canada, pp. 225\u2013232. International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC (2010). http:\/\/www.dl.acm.org\/citation.cfm?id=1838206.1838238"},{"key":"9160_CR37","doi-asserted-by":"publisher","unstructured":"Wang, Y., Vassileva, J.: Bayesian network trust model in peer-to-peer networks. In: Moro, G., Sartori, C., Singh, M.P. (eds.) Agents and Peer-to-Peer Computing. Lecture Notes in Computer Science, pp. 23\u201334. Springer, Berlin Heidelberg (2005). doi:10.1007\/978-3-540-25840-7-3","DOI":"10.1007\/978-3-540-25840-7-3"},{"key":"9160_CR38","doi-asserted-by":"publisher","unstructured":"Wi\u00dfner, M., Hammer, S., Kurdyukova, E., Andr\u00e9, E.: Trust-based decision-making for the adaptation of public displays in changing social contexts. J. Trust Manag. 1(1), 6 (2014). doi:10.1186\/2196-064X-1-6. http:\/\/www.journaloftrustmanagement.com\/content\/1\/1\/6","DOI":"10.1186\/2196-064X-1-6"},{"key":"9160_CR39","doi-asserted-by":"crossref","unstructured":"Yan, Z., Holtmanns, S.: Trust Modeling and Management: From Social Trust to Digital Trust. IGI Global, chap. 13, pp. 290\u2013323 (2008)","DOI":"10.4018\/978-1-59904-804-8.ch013"},{"key":"9160_CR40","doi-asserted-by":"publisher","unstructured":"Yan, Z., Liu, C., Niemi, V., Yu, G.: Effects of displaying trust information on mobile application usage. In: Xie, B., Branke, J., Sadjadi, S., Zhang, D., Zhou, X. (eds.) Autonomic and Trusted Computing. Lecture Notes in Computer Science, pp. 107\u2013121. Springer, Berlin Heidelberg (2010). doi:10.1007\/978-3-642-16576-4-8","DOI":"10.1007\/978-3-642-16576-4-8"},{"key":"9160_CR41","doi-asserted-by":"publisher","unstructured":"Yu, B., Singh, M.P.: An evidential model of distributed reputation management. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 1, AAMAS \u201902, Bologna, Italy, pp. 294\u2013301. ACM (2002). doi:10.1145\/544741.544809","DOI":"10.1145\/544741.544809"}],"container-title":["User Modeling and User-Adapted Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11257-015-9160-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11257-015-9160-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11257-015-9160-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11257-015-9160-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T11:05:26Z","timestamp":1630580726000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11257-015-9160-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,16]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["9160"],"URL":"https:\/\/doi.org\/10.1007\/s11257-015-9160-8","relation":{},"ISSN":["0924-1868","1573-1391"],"issn-type":[{"value":"0924-1868","type":"print"},{"value":"1573-1391","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,16]]},"assertion":[{"value":"2 August 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}