{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T14:32:30Z","timestamp":1754145150949,"version":"3.41.2"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,2]]},"DOI":"10.1109\/cogsima64436.2025.11079511","type":"proceedings-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T17:41:16Z","timestamp":1752601276000},"page":"25-31","source":"Crossref","is-referenced-by-count":0,"title":["Trust in Fusion-Driven Human-Machine Environments"],"prefix":"10.1109","author":[{"given":"Galina","family":"Rogova","sequence":"first","affiliation":[{"name":"The State University of New York at Buffalo,Buffalo,NY,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/acrefore\/9780190224851.013.317"},{"key":"ref2","first-page":"127","article-title":"Trust among strangers in Internet transactions: Empirical analysis of eBay\u2019s reputation system","volume-title":"The economics of the Internet and e-commerce","author":"P.","year":"2002"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-28059-2","volume-title":"Fiction Trust and Communication in a Digitized World Models and Concepts of Trust Research","author":"Bl\u00f6baum","year":"2016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/9780470519851"},{"volume-title":"Appeal to expert opinion: Arguments from authority","year":"1997","author":"Walton","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009017"},{"key":"ref7","first-page":"1","article-title":"URREF self-confidence in information fusion trust","volume-title":"17th International Conference on Information Fusion (FUSION)","author":"Blasch"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2815595"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22261-5_2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1998.926617"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926815"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11752912_49"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03643-0_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COGSIMA.2015.7108195"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1515\/9780691214696"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(94)90026-4"},{"key":"ref17","first-page":"1158","volume-title":"Reliability in information fusion: literature survey, in Proceedings of the FUSION\u20192004\u20137th Conference on Multisource-Information Fusion","author":"Rogova","year":"2004"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2003.817056"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22527-2_17"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9508080335"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-1952-5_10"},{"volume-title":"The logic and limits of trust.","year":"1983","author":"Barber","key":"ref22"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-28059-2","volume-title":"Fiction Trust and Communication in a Digitized World Models and Concepts of Trust Research","author":"Bl\u00f6baum","year":"2016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7031-1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03643-0_2"},{"first-page":"225254","volume-title":"Imperfect information: imprecision - uncertainty, in Uncertainty Management in Information Systems: From Needs to Solutions","author":"Smets","key":"ref26"},{"article-title":"Word of estimative probability","volume-title":"Declassified and approve for release 05\/04\/2012","author":"Kent","key":"ref27"},{"key":"ref28","first-page":"12","volume":"2016","author":"Wang","journal-title":"Exploring the Combination of Dempster-Shafer Theory and Neural Network for Predicting Trust and Distrust, Computational Intelligence and Neuroscience"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/int.10074"},{"key":"ref30","first-page":"73","article-title":"A Fuzzy Approach to a BeliefBased Trust Computation","volume-title":"AAMAS LNAI 2631","author":"Falcone","year":"2003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75410-7_20"},{"key":"ref32","article-title":"An Argumentation-based Approach to Handling Trust in Distributed Decision Making","volume-title":"Trust and Autonomous Systems: Papers from the 2013 AAAI Spring Symposium","author":"Parsons","year":"2013"},{"key":"ref33","article-title":"Networks of Trust and Distrust: Towards Logical Reputation Systems","volume-title":"Proc. of the workshop on logic and security","author":"Harwood","year":"2010"},{"key":"ref34","first-page":"3","article-title":"Credential Networks: a General Model for Distributed Trust and Authenticity Management","volume":"57","author":"Jonczy","year":"1997","journal-title":"Journal Of Statistical Computation And Simulation"},{"article-title":"Belief-based Argumentation and Golden Rule for Decision Making with Soft and Hard Information","volume-title":"Proc. of FUSION\u2019 2016\u2013 193th Conference on Multisource Information Fusion","author":"Rogova","key":"ref35"},{"key":"ref36","article-title":"Logical Tools for Modelling Legal Argument. A Study of Defeasible Argumentation in Law and Philosophy Library","author":"Prakken","year":"1997","journal-title":"Dordrecht\/Boston\/London: Kluwer Academic Publishers"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-98197-0"},{"key":"ref38","article-title":"Abductive Argumentation with Stories","volume-title":"ICAIL-2013 Workshop on Formal Aspects of Evidential Inference","author":"Bex","year":"2013"},{"key":"ref39","article-title":"Reliability Assessment","volume-title":"Symbolic and Quantitative Approaches to Reasoning with Uncertainty, ECSQARU 2015.","volume":"9161","author":"Cholvy"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2013.04.011"}],"event":{"name":"2025 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA)","start":{"date-parts":[[2025,6,2]]},"location":"Duisburg, Germany","end":{"date-parts":[[2025,6,5]]}},"container-title":["2025 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11079407\/11079467\/11079511.pdf?arnumber=11079511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T17:37:02Z","timestamp":1752687422000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11079511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,2]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/cogsima64436.2025.11079511","relation":{},"subject":[],"published":{"date-parts":[[2025,6,2]]}}}