{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:43:51Z","timestamp":1753886631116,"version":"3.41.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T00:00:00Z","timestamp":1362096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2013,3]]},"abstract":"<jats:p>\n            Large-scale multiagent systems have the potential to be highly dynamic. Trust and reputation are crucial concepts in these environments, as it may be necessary for agents to rely on their peers to perform as expected, and learn to avoid untrustworthy partners. However, aspects of highly dynamic systems introduce issues which make the formation of trust relationships difficult. For example, they may be short-lived, precluding agents from gaining the necessary experiences to make an accurate trust evaluation. This article describes a new approach, inspired by theories of human organizational behavior, whereby agents generalize their experiences with previously encountered partners as\n            <jats:italic>stereotypes<\/jats:italic>\n            , based on the observable\n            <jats:italic>features<\/jats:italic>\n            of those partners and their behaviors. Subsequently, these stereotypes are applied when evaluating new and unknown partners. Furthermore, these stereotypical opinions can be communicated within the society, resulting in the notion of\n            <jats:italic>stereotypical reputation<\/jats:italic>\n            . We show how this approach can complement existing state-of-the-art trust models, and enhance the confidence in the evaluations that can be made about trustees when direct and reputational information is lacking or limited. Furthermore, we show how a stereotyping approach can help agents detect unwanted biases in the reputational opinions they receive from others in the society.\n          <\/jats:p>","DOI":"10.1145\/2438653.2438661","type":"journal-article","created":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T19:39:32Z","timestamp":1364845172000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Stereotypical trust and bias in dynamic multiagent systems"],"prefix":"10.1145","volume":"4","author":[{"given":"Chris","family":"Burnett","sequence":"first","affiliation":[{"name":"University of Aberdeen, UK"}]},{"given":"Timothy J.","family":"Norman","sequence":"additional","affiliation":[{"name":"University of Aberdeen, UK"}]},{"given":"Katia","family":"Sycara","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2013,4,3]]},"reference":[{"volume-title":"Classification and Regression Trees","author":"Breiman L.","key":"e_1_2_1_1_1","unstructured":"Breiman , L. 1984. Classification and Regression Trees . Chapman & Hall . Breiman, L. 1984. Classification and Regression Trees. Chapman & Hall."},{"volume-title":"Proceedings of 9th International Conference on Autonomous Agents and Multiagent Systems. 241--248","author":"Burnett C.","key":"e_1_2_1_2_1","unstructured":"Burnett , C. , Norman , T. J. , and Sycara , K . 2010. Bootstrapping trust evaluations through stereotypes . In Proceedings of 9th International Conference on Autonomous Agents and Multiagent Systems. 241--248 . Burnett, C., Norman, T. J., and Sycara, K. 2010. Bootstrapping trust evaluations through stereotypes. In Proceedings of 9th International Conference on Autonomous Agents and Multiagent Systems. 241--248."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1226736.1226761"},{"volume-title":"Proceedings of the 3rd International Conference on Multi Agent Systems. 72--79","author":"Castelfranchi C.","key":"e_1_2_1_4_1","unstructured":"Castelfranchi , C. and Falcone , R . 1998. Principles of trust for MAS: Cognitive anatomy, social importance, and quantification . In Proceedings of the 3rd International Conference on Multi Agent Systems. 72--79 . Castelfranchi, C. and Falcone, R. 1998. Principles of trust for MAS: Cognitive anatomy, social importance, and quantification. In Proceedings of the 3rd International Conference on Multi Agent Systems. 72--79."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1006\/jesp.1997.1329"},{"key":"e_1_2_1_6_1","first-page":"47","article-title":"On trust establishment in mobile ad-hoc networks","author":"Eschenauer L.","year":"2003","unstructured":"Eschenauer , L. , Gligor , V. , and Baras , J. 2003 . On trust establishment in mobile ad-hoc networks . In Security Protocols , Spring er, 47 -- 66 . Eschenauer, L., Gligor, V., and Baras, J. 2003. On trust establishment in mobile ad-hoc networks. In Security Protocols, Springer, 47--66.","journal-title":"Security Protocols"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007421302149"},{"key":"e_1_2_1_8_1","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"Gambetta D.","year":"1990","unstructured":"Gambetta , D. 1990 . Trust: Making and Breaking Cooperative Relations . Blackwell . Gambetta, D. 1990. Trust: Making and Breaking Cooperative Relations. Blackwell."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems.","volume":"2","author":"Hang C. W.","unstructured":"Hang , C. W. , Wang , Y. , and Singh , M . 2009. Operators for propagating trust and their evaluation in social networks . In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems. Vol. 2 . 1025--1032. Hang, C. W., Wang, Y., and Singh, M. 2009. Operators for propagating trust and their evaluation in social networks. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems. Vol. 2. 1025--1032."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.47.1.237"},{"key":"e_1_2_1_11_1","unstructured":"Hornik K. 2010. The R FAQ. http:\/\/CRAN.R-project.org\/doc\/FAQ\/R-FAQ.html.  Hornik K. 2010. The R FAQ. http:\/\/CRAN.R-project.org\/doc\/FAQ\/R-FAQ.html."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-005-6825-4"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.6.791"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 29th Australasian Computer Science Conference.","volume":"48","author":"J\u00f8sang A.","unstructured":"J\u00f8sang , A. , Hayward , R. , and Pope , S . 2006. Trust network analysis with subjective logic . In Proceedings of the 29th Australasian Computer Science Conference. Vol. 48 , Australian Computer Society, 85--94. J\u00f8sang, A., Hayward, R., and Pope, S. 2006. Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference. Vol. 48, Australian Computer Society, 85--94."},{"volume-title":"Proceedings of the 15th Bled Electronic Commerce Conference.","author":"J\u00f8sang A.","key":"e_1_2_1_15_1","unstructured":"J\u00f8sang , A. and Ismail , R . 2002. The beta reputation system . In Proceedings of the 15th Bled Electronic Commerce Conference. J\u00f8sang, A. and Ismail, R. 2002. The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling.","volume":"43","author":"J\u00f8sang A.","unstructured":"J\u00f8sang , A. and Pope , S . 2005. Semantic constraints for trust transitivity . In Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling. Vol. 43 . 59--68. J\u00f8sang, A. and Pope, S. 2005. Semantic constraints for trust transitivity. In Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling. Vol. 43. 59--68."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018295910873"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92803-4_11"},{"volume-title":"Information Theory, Inference, and Learning Algorithms","author":"MacKay D.","key":"e_1_2_1_20_1","unstructured":"MacKay , D. 2003. Information Theory, Inference, and Learning Algorithms . Cambridge University Press . MacKay, D. 2003. Information Theory, Inference, and Learning Algorithms. Cambridge University Press."},{"key":"e_1_2_1_21_1","first-page":"1055","article-title":"Stereotypes as base rate predictions: commentary on Koehler on base-rate","volume":"5","author":"McCauley C.","year":"1994","unstructured":"McCauley , C. 1994 . Stereotypes as base rate predictions: commentary on Koehler on base-rate . Psycol. 5 , 1055 -- 1143 . McCauley, C. 1994. Stereotypes as base rate predictions: commentary on Koehler on base-rate. Psycol. 5, 1055--1143.","journal-title":"Psycol."},{"key":"e_1_2_1_22_1","volume-title":"Organizations: Frontiers of Theory and Research","author":"Meyerson D.","year":"1996","unstructured":"Meyerson , D. , Weick , K. , and Kramer , R . 1996 . Swift trust and temporary groups. In Trust in Organizations: Frontiers of Theory and Research , R. Kramer and T. Tyler, Eds., Sage Publications , 415--445. Meyerson, D., Weick, K., and Kramer, R. 1996. Swift trust and temporary groups. In Trust in Organizations: Frontiers of Theory and Research, R. Kramer and T. Tyler, Eds., Sage Publications, 415--445."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10111-006-0059-3"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 5th Australian Joint Conference on Artificial Intelligence. 343--348","author":"Quinlan J.","year":"1992","unstructured":"Quinlan , J. 1992 . Learning with continuous classes . In Proceedings of the 5th Australian Joint Conference on Artificial Intelligence. 343--348 . Quinlan, J. 1992. Learning with continuous classes. In Proceedings of the 5th Australian Joint Conference on Artificial Intelligence. 343--348."},{"volume-title":"Programs for Machine Learning","author":"Quinlan J.","key":"e_1_2_1_26_1","unstructured":"Quinlan , J. 1993. C4.5 : Programs for Machine Learning . Morgan Kaufmann Publishers , San Francisco, CA . Quinlan, J. 1993. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, San Francisco, CA."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.2009.00348.x"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-006-5952-x"},{"volume-title":"Proceedings of the 20th International Joint Conference on Artificial Intelligence. 1551--1556","author":"Wang Y.","key":"e_1_2_1_30_1","unstructured":"Wang , Y. and Singh , M. P . 2007. Formal trust model for multiagent systems . In Proceedings of the 20th International Joint Conference on Artificial Intelligence. 1551--1556 . Wang, Y. and Singh, M. P. 2007. Formal trust model for multiagent systems. In Proceedings of the 20th International Joint Conference on Artificial Intelligence. 1551--1556."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1029\/JC090iC05p08995"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/860575.860588"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2438653.2438661","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2438653.2438661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:29Z","timestamp":1750235729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2438653.2438661"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,3]]}},"alternative-id":["10.1145\/2438653.2438661"],"URL":"https:\/\/doi.org\/10.1145\/2438653.2438661","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"type":"print","value":"2157-6904"},{"type":"electronic","value":"2157-6912"}],"subject":[],"published":{"date-parts":[[2013,3]]},"assertion":[{"value":"2010-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}