{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T05:18:13Z","timestamp":1768972693969,"version":"3.49.0"},"reference-count":93,"publisher":"Informa UK Limited","issue":"2-3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Applied Non-Classical Logics"],"published-print":{"date-parts":[[2022,7,3]]},"DOI":"10.1080\/11663081.2022.2124067","type":"journal-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T17:33:21Z","timestamp":1664559201000},"page":"89-155","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Reasoning about manipulation in multi-agent systems"],"prefix":"10.1080","volume":"32","author":[{"given":"Christopher","family":"Leturc","sequence":"first","affiliation":[{"name":"Inria, Universit\u00e9 C\u00f4te d'Azur, CNRS, I3S","place":["Valbonne, France"]}]},{"given":"Gr\u00e9gory","family":"Bonnet","sequence":"additional","affiliation":[{"name":"Normandie University, UNICAEN, ENSICAEN, CNRS, GREYC","place":["Caen, France"]}]}],"member":"301","published-online":{"date-parts":[[2022,9,30]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/003803857701100101"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/2214225"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1086\/jb.2006.79.issue-4"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/15228835.2019.1610140"},{"issue":"2","key":"e_1_3_3_6_1","first-page":"78","article-title":"Linguistic manipulation: Definition and types","volume":"1","author":"Akopova A. S.","year":"2013","unstructured":"Akopova, A. S. (2013). Linguistic manipulation: Definition and types. International Journal of Cognitive Research in Science, Engineering and Education, 1(2), 78\u201382.","journal-title":"International Journal of Cognitive Research in Science, Engineering and Education"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/585265.585270"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10992-007-9078-7"},{"key":"e_1_3_3_9_1","doi-asserted-by":"crossref","unstructured":"Barnhill A. (2014). What is manipulation. In C. Coons & M. Weber (Eds.) Manipulation: Theory and practice (pp. 51\u201372). Oxford University Press.","DOI":"10.1093\/acprof:oso\/9780199338207.003.0003"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.2307\/3219740"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1755-2567.1988.tb00717.x"},{"key":"e_1_3_3_12_1","volume-title":"Modal logic: Graph. Darst (Vol. 53)","author":"Blackburn P.","year":"2002","unstructured":"Blackburn, P., De Rijke, M., & Venema, Y. (2002). Modal logic: Graph. Darst (Vol. 53). Cambridge University Press."},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91779-1_9"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21732-1_1"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2850.2003.00602.x"},{"key":"e_1_3_3_16_1","doi-asserted-by":"crossref","unstructured":"Broersen J. (2008). A complete STIT logic for knowledge and action and some of its applications. In M. Baldoni T. C. Son M. B. Riemsdijk & M. Winikoff (Eds.) International workshop on declarative agent languages and technologies (pp. 47\u201359). Springer.","DOI":"10.1007\/978-3-540-93920-7_4"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2309703"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470519851"},{"issue":"9","key":"e_1_3_3_19_1","first-page":"72","article-title":"Harnessing the science of persuasion","volume":"79","author":"Cialdini R. B.","year":"2001","unstructured":"Cialdini, R. B. (2001). Harnessing the science of persuasion. Harvard Business Review, 79(9), 72\u201381.","journal-title":"Harvard Business Review"},{"key":"e_1_3_3_20_1","volume-title":"Influence and manipulation","author":"Cialdini R. B.","year":"2012","unstructured":"Cialdini, R. B. (2012). Influence and manipulation. First Editions."},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/00048402.2017.1386692"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1075\/dapsac.17"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1257\/mic.2.1.1"},{"key":"e_1_3_3_24_1","volume-title":"A history and theory of informed consent","author":"Faden R. R.","year":"1986","unstructured":"Faden, R. R., & Beauchamp, T. L. (1986). A history and theory of informed consent. Oxford University Press."},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(87)90003-8"},{"key":"e_1_3_3_26_1","volume-title":"A theory of cognitive dissonance (Vol. 2)","author":"Festinger L.","year":"1962","unstructured":"Festinger, L. (1962). A theory of cognitive dissonance (Vol. 2). Stanford University Press."},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(76)90016-8"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.2307\/1914083"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/10.5.625"},{"key":"e_1_3_3_30_1","volume-title":"Manipulatory politics","author":"Goodin R. E.","year":"1980","unstructured":"Goodin, R. E. (1980), Manipulatory politics. University Press."},{"key":"e_1_3_3_31_1","volume-title":"Borderline personality disorder","author":"Gunderson J. G.","year":"1984","unstructured":"Gunderson, J. G. (1984). Borderline personality disorder. SUNY Press."},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.5040\/9798216025726"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-0456-4_2"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10992-009-9110-1"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592452"},{"key":"e_1_3_3_36_1","unstructured":"Josang A. & Golbeck J. (2009). Challenges for robust trust and reputation systems. In 5th international workshop on security and trust management.\u00a0https:\/\/www.mn.uio.no\/ifi\/english\/people\/aca\/josang\/publications\/jg2009-stm.pdf"},{"key":"e_1_3_3_37_1","volume-title":"Concise handbook of manipulation in honest people's favour (French ed.)","author":"Joule R. V.","year":"2002","unstructured":"Joule, R. V., Beauvois, J. L., & Deschamps, J. C. (2002). Concise handbook of manipulation in honest people's favour (French ed.). Grenoble University Press."},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/spco.2007.1.issue-1"},{"key":"e_1_3_3_39_1","volume-title":"Thinking, fast and slow","author":"Kahneman D.","year":"2011","unstructured":"Kahneman, D. (2011). Thinking, fast and slow. Macmillan."},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1093\/jmp\/17.2.173"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.65109\/DFQR2937"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.65109\/LXBU9508"},{"key":"e_1_3_3_43_1","unstructured":"Levesque H. J. (1984). A logic of implicit and explicit belief. In R. J. Brachman (Eds.) 4th AAAI conference on artificial intelligence (pp. 198\u2013202). AAAI Press."},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11225-015-9636-x"},{"key":"e_1_3_3_45_1","volume-title":"Trust and power","author":"Luhmann N.","year":"1979","unstructured":"Luhmann, N. (1979). Trust and power. Wiley."},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.5840\/ijap200822216"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1163\/187730909X12535267111651"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.2307\/2010552"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91779-1_1"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1111\/sjp.1980.18.issue-3"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315711812"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.5840\/soctheorpract199521120"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.2307\/41165263"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.45"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01079207"},{"issue":"1","key":"e_1_3_3_56_1","first-page":"43","article-title":"Manipulative actions: A conceptual and moral analysis","volume":"33","author":"Noggle R.","year":"1996","unstructured":"Noggle, R. (1996). Manipulative actions: A conceptual and moral analysis. American Philosophical Quarterly, 33(1), 43\u201355.","journal-title":"American Philosophical Quarterly"},{"key":"e_1_3_3_57_1","volume-title":"Persuasion: Theory and research","author":"O'Keefe D. J.","year":"2015","unstructured":"O'Keefe, D. J. (2015). Persuasion: Theory and research (3rd ed.). Sage.","edition":"3"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67149-9"},{"key":"e_1_3_3_59_1","unstructured":"Parkes D. C. & Ungar L. H. (2000). Preventing strategic manipulation in iterative auctions: Proxy agents and price-adjustment. In H. Kautz & B. Porter (Eds.) 17th AAAI conference on artificial intelligence (pp. 82\u201389). AAAI Press."},{"key":"e_1_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-1268-3"},{"key":"e_1_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-3454(10)41005-0"},{"key":"e_1_3_3_62_1","volume-title":"The morality of freedom","author":"Raz J.","year":"1986","unstructured":"Raz, J. (1986). The morality of freedom. Clarendon Press."},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1486877.1486887"},{"key":"e_1_3_3_64_1","doi-asserted-by":"crossref","unstructured":"Rigotti E. (2005). Towards a typology of manipulative processes. In L. de Saussure & P. Schulz (Eds.) Manipulation and ideologies in the twentieth century: Discourse language mind (pp. 61\u201383). John Benjamins.","DOI":"10.1075\/dapsac.17.05rig"},{"key":"e_1_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.2307\/2555595"},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872676201500403"},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.05.042"},{"key":"e_1_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1086\/292086"},{"key":"e_1_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0010-440X(66)80056-1"},{"key":"e_1_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91779-1_8"},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzu043"},{"key":"e_1_3_3_72_1","unstructured":"Sanghvi S. & Parkes D. (2004). Hard-to-manipulate VCG-based auctions (Tech. Rep.). Division of Engineering and Applied Sciences: Harvard University."},{"key":"e_1_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-1488-8_11"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2401352"},{"key":"e_1_3_3_75_1","volume-title":"The logic of action","author":"Segerberg K.","year":"2009","unstructured":"Segerberg, K., Meyer, J. J., & Kracht, M. (2009). The logic of action. Stanford Library of Philosophy."},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"e_1_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pragma.2017.10.002"},{"key":"e_1_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11098-005-4062-y"},{"key":"e_1_3_3_79_1","volume-title":"The game","author":"Strauss N.","year":"2006","unstructured":"Strauss, N. (2006). The game. Canongate Books."},{"key":"e_1_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1561\/107.00000014"},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781444367072.wbiee585"},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-013-9229-x"},{"key":"e_1_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.1994.03510440069036"},{"key":"e_1_3_3_84_1","doi-asserted-by":"crossref","unstructured":"Vall\u00e9e T. & Bonnet G. (2015). Using KL divergence for credibility assessment. In G. Weiss P. Yolum R. H. Bordini & E. Elkind (Eds.) 14th International Conference on Autonomous Agents and Multiagent Systems (pp. 1797\u20131798). International Foundation for Autonomous Agents and Multiagent Systems.","DOI":"10.65109\/UFMU5866"},{"key":"e_1_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.65109\/BRGC6754"},{"key":"e_1_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1177\/0957926506060250"},{"key":"e_1_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2017.11.004"},{"key":"e_1_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-5839-4"},{"key":"e_1_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29326-9_4"},{"key":"e_1_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIRA.2009.5423160"},{"key":"e_1_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0007123400002556"},{"key":"e_1_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X00049682"},{"key":"e_1_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9248.2012.00974.x"},{"key":"e_1_3_3_94_1","doi-asserted-by":"crossref","unstructured":"Wood A. W. (2014). Coercion manipulation exploitation. In C. Coons & M. Weber (Eds.) Manipulation: Theory and practice (pp. 17\u201350). Oxford University Press.","DOI":"10.1093\/acprof:oso\/9780199338207.003.0002"}],"container-title":["Journal of Applied Non-Classical Logics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/11663081.2022.2124067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T16:47:49Z","timestamp":1768927669000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/11663081.2022.2124067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,3]]},"references-count":93,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2022,7,3]]}},"alternative-id":["10.1080\/11663081.2022.2124067"],"URL":"https:\/\/doi.org\/10.1080\/11663081.2022.2124067","relation":{},"ISSN":["1166-3081","1958-5780"],"issn-type":[{"value":"1166-3081","type":"print"},{"value":"1958-5780","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tncl20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tncl20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-01-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-09-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}