{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T19:59:52Z","timestamp":1775851192742,"version":"3.50.1"},"reference-count":45,"publisher":"Computers, Materials and Continua (Tech Science Press)","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1080\/10798587.2016.1152778","type":"journal-article","created":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T14:28:29Z","timestamp":1474900109000},"page":"639-649","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["Multi agent system-based dynamic trust calculation model and credit management mechanism of online trading"],"prefix":"10.32604","volume":"22","author":[{"given":"W. J.","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Y. S.","family":"Xu","sequence":"additional","affiliation":[]},{"given":"H.","family":"Guo","sequence":"additional","affiliation":[]},{"given":"C. C.","family":"Wang","sequence":"additional","affiliation":[]},{"given":"L. M.","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2016,9,26]]},"reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(02)00074-X"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1002\/9780470940105"},{"key":"CIT0004","first-page":"617","volume":"42","author":"Chen H.","year":"2012","journal-title":"Chinese Science: Information Science"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1111\/ecta.2004.72.issue-2"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36378-5"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.11.1457.20584"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2011.10643132"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2013.786968"},{"key":"CIT0011","first-page":"204","volume":"29","author":"He J.","year":"2010","journal-title":"Intelligence Magazine"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2011.10643211"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-009-0151-4"},{"key":"CIT0014","first-page":"977","volume":"39","author":"Jiang W.","year":"2009","journal-title":"Scientific China"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.282-283"},{"key":"CIT0016","first-page":"115","volume":"36","author":"Jiang W.J.","year":"2013","journal-title":"Chinese Journal of Computers"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2007.12.002"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.091"},{"key":"CIT0020","volume-title":"Online auction Decision","author":"Li X.","year":"2009"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.10.042"},{"key":"CIT0022","first-page":"1079","volume":"43","author":"Li L.","year":"2013","journal-title":"Chinese Science: Information Science"},{"key":"CIT0023","unstructured":"Marsh S. (1994).Formalising trust as a computational concept. Ph.D. Thesis of University of Stirling."},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2009.02.025"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.012"},{"key":"CIT0027","first-page":"33","volume":"23","author":"Peng G.","year":"2004","journal-title":"Forecast"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"CIT0030","first-page":"139","volume":"40","author":"Shen C.","year":"2010","journal-title":"Chinese Science: Information Science"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.5539\/ibr.v3n4p17"},{"key":"CIT0032","first-page":"9","volume":"7","author":"Tian H.","year":"2004","journal-title":"Management Science"},{"key":"CIT0033","first-page":"44","volume":"8","author":"Tian J.","year":"2008","journal-title":"Jiangsu University of Science and Technology (Social Science Edition)"},{"key":"CIT0034","first-page":"1930","volume":"30","author":"Tian L. Q.","year":"2007","journal-title":"Chinese Journal of Computers"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1007\/s11430-006-1156-0"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2010.00139"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1007\/s11425-013-4750-6"},{"key":"CIT0038","first-page":"406","volume":"9","author":"Wu F.","year":"2010","journal-title":"Electronic Commerce Research and Applications"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2008.10.018"},{"key":"CIT0040","first-page":"108","volume":"43","author":"Xu J.","year":"2013","journal-title":"Chinese Science: Information Science"},{"key":"CIT0041","first-page":"398","volume":"2","author":"Yaghoubi N.","year":"2011","journal-title":"Interdisciplinary Journal of Contemporary Research in Business"},{"key":"CIT0042","first-page":"563","volume":"28","author":"Yang Y.","year":"2010","journal-title":"Information Science"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(00)00084-1"},{"key":"CIT0045","first-page":"194","volume":"27","author":"Zhang X.","year":"2010","journal-title":"Microelectronics & Computer"},{"key":"CIT0046","first-page":"83","volume":"19","author":"Zhang J.","year":"2010","journal-title":"Computer Systems & Applications"},{"key":"CIT0047","first-page":"64","volume":"10","author":"Zhang E.","year":"2007","journal-title":"Management Science"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7355-9"},{"key":"CIT0049","unstructured":"Zhu X. 2011.C2C online feedback mechanism to study the characteristics and roles, Ph.D. Thesis of Fudan University, Shanghai,"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2009.12.003"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1152778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T13:09:01Z","timestamp":1591189741000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1152778"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,26]]},"references-count":45,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,4,20]]},"published-print":{"date-parts":[[2016,10]]}},"alternative-id":["10.1080\/10798587.2016.1152778"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2016.1152778","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"value":"1079-8587","type":"print"},{"value":"2326-005X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,26]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}