{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:44:09Z","timestamp":1767339849846,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/roman.2011.6005228","type":"proceedings-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T19:33:05Z","timestamp":1315855985000},"page":"7-14","source":"Crossref","is-referenced-by-count":20,"title":["Recognizing situations that demand trust"],"prefix":"10.1109","author":[{"given":"Alan R.","family":"Wagner","sequence":"first","affiliation":[]},{"given":"Ronald C.","family":"Arkin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-3614-5"},{"key":"17","first-page":"3","article-title":"Valuation of Trust in Open Networks","author":"beth","year":"1994","journal-title":"European Symposium on Research in Computer Security Brighton UK"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926815"},{"key":"15","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","article-title":"A Logic for Uncertain Probabilities","volume":"9","author":"josang","year":"2002","journal-title":"International Journal of Uncertainty Fuzziness and Knowledge-Based Systems"},{"key":"16","article-title":"Semantic Constraints for Trust Transitivity","author":"josang","year":"0","journal-title":"Second Asia-Pacific Conference on Conceptual Modeling Newcastle Australia 2005"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1126\/science.1108062"},{"key":"14","article-title":"Analysing the Relationship between Risk and Trust","author":"josang","year":"0","journal-title":"Second International Conference on Trust Management Oxford 2004"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1998.926617"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50.30392"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-3614-5_9"},{"key":"20","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-45547-7_4","article-title":"The socio-cognitive dynamics of trust: Does trust create trust?","author":"falcone","year":"2001","journal-title":"Trust in Cyber-Societies Integrating the Human and Artificial Perspectives"},{"key":"22","article-title":"Learning from and about Other Agents in Terms of Social Metaphors","author":"schillo","year":"0","journal-title":"IJCAI Workshop on Agents Learning About from and with Other Agents Stockholm Sweden 1999"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1080\/08839510050127579"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265156"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265241"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0041-5"},{"journal-title":"Social Psychology","year":"1991","author":"sears","key":"27"},{"journal-title":"A Course in Game Theory","year":"1994","author":"osborne","key":"28"},{"journal-title":"Interpersonal Relations A Theory of Interdependence","year":"1978","author":"kelley","key":"29"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511499845","author":"kelley","year":"2003","journal-title":"An Atlas of Interpersonal Situations"},{"journal-title":"Representing and Analyzing Social Situations for Human-robot Interaction","year":"2006","author":"wagner","key":"2"},{"key":"10","first-page":"213","article-title":"Can We Trust Trust?","author":"gambetta","year":"1990","journal-title":"Trust Making and Breaking Cooperative Relationships"},{"key":"1","first-page":"18","article-title":"Trust me, I'm a robot","volume":"379","year":"2006","journal-title":"The Economist"},{"journal-title":"The Evolution of Cooperation","year":"1984","author":"axelrod","key":"30"},{"journal-title":"The Resolution of Conflict Constructive and Destructive Processes","year":"1973","author":"deutsch","key":"7"},{"key":"6","first-page":"275","article-title":"Cooperation and Trust: Some Theoretical Notes","author":"deutsch","year":"1962","journal-title":"Nebraska Symposium on Motivation"},{"key":"5","first-page":"170","article-title":"Formalising Trust as a Computational Concept","author":"marsh","year":"1994","journal-title":"Computer Science"},{"key":"4","first-page":"254","article-title":"The Role of Trust and Relationships in Human-Robot Social Interaction","author":"wagner","year":"2009","journal-title":"College of Computing"},{"journal-title":"The Logic and Limits of Trust","year":"1983","author":"barber","key":"9"},{"journal-title":"Trust and Power","year":"1979","author":"luhmann","key":"8"}],"event":{"name":"2011 RO-MAN: The 20th IEEE International Symposium on Robot and Human Interactive Communication","start":{"date-parts":[[2011,7,31]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2011,8,3]]}},"container-title":["2011 RO-MAN"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5992813\/6005194\/06005228.pdf?arnumber=6005228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T11:32:19Z","timestamp":1560598339000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6005228\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/roman.2011.6005228","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}