{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:52:42Z","timestamp":1756993962615,"version":"3.37.3"},"reference-count":49,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572095","61272173"],"award-info":[{"award-number":["61572095","61272173"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572095","61272173"],"award-info":[{"award-number":["61572095","61272173"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>Trust violation during cooperation of autonomous agents in multiagent systems is usually unavoidable and can arise due to a wide number of reasons. From a psychological point of view, the violation of an agent\u2019s trust is a result of one agent (which is a transgressor) expressing a very low weight on the welfare of another agent (which is a victim) by inflicting a high cost for a very small benefit. In order for the victim to make an effective decision about whether to cooperate or punish for the next interaction, a psychological variable called<jats:italic> welfare tradeoff ratio <\/jats:italic>(WTR) can be used to upregulate the transgressor\u2019s disposition so that the number of exploitive behaviors that are likely to happen in the future will be decreased. In this paper, we propose computational models of metrics based on the welfare tradeoff ratio along with the way by which multiple metrics can be integrated to provide the final result. Additionally, a number of experiments based on social network analysis are conducted to evaluate the performance of the proposed framework and the results show that by implementing WTR the simulated network is able to deal with different levels of trust violation effectively.<\/jats:p>","DOI":"10.1155\/2018\/7515860","type":"journal-article","created":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T19:32:59Z","timestamp":1522611179000},"page":"1-15","source":"Crossref","is-referenced-by-count":2,"title":["Psychology-Inspired Trust Restoration Framework in Distributed Multiagent Systems"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1002-1070","authenticated-orcid":true,"given":"Ruchdee","family":"Binmad","sequence":"first","affiliation":[{"name":"School of Software Technology, Dalian University of Technology, Dalian, Liaoning 116621, China"},{"name":"Department of Business Administration, Faculty of Management Sciences, Prince of Songkla University, Hat Yai, Songkhla 90110, Thailand"}]},{"given":"Mingchu","family":"Li","sequence":"additional","affiliation":[{"name":"School of Software Technology, Dalian University of Technology, Dalian, Liaoning 116621, China"}]}],"member":"311","reference":[{"doi-asserted-by":"publisher","key":"2","DOI":"10.1073\/pnas.0904312106"},{"volume-title":"The Evolutionary Psychology of the Emotions and Their Relationship to Internal Regulatory Variables","year":"2008","key":"3"},{"issue":"2","key":"4","first-page":"72","year":"2010","journal-title":"Human Morality and Sociality Evolutionary and comparative perspectives"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1016\/0022-5193(64)90039-6"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1126\/science.7466396"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1086\/406755"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1016\/0022-5193(82)90235-1"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1016\/j.copsyc.2015.06.006"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1016\/j.evolhumbehav.2012.05.003"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1017\/S0140525X11002160"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1016\/j.obhdp.2005.02.001"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1016\/j.jm.2003.01.003"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.5465\/AMR.2009.35713291"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1556\/JEP.10.2012.3.1"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.2753\/JEC1086-4415130304"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1016\/j.dss.2015.01.009"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1002\/mar.20289"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1007\/978-1-84800-356-9_2"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1145\/2996189"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.4018\/jats.2011010102"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1177\/0146167211424582"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1016\/j.ijhcs.2008.02.001"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1108\/IMCS-09-2013-0069"},{"doi-asserted-by":"publisher","key":"55","DOI":"10.1016\/j.obhdp.2006.05.005"},{"doi-asserted-by":"publisher","key":"56","DOI":"10.1108\/10662241311331772"},{"doi-asserted-by":"publisher","key":"57","DOI":"10.1007\/s12559-014-9275-y"},{"year":"2014","key":"27"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.5465\/AMR.2009.40631887"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1038\/nature05510"},{"issue":"2","key":"31","first-page":"118","volume":"3","year":"2007","journal-title":"International Transactions on Systems Science and Applications"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1109\/PTP.2003.1231515"},{"volume-title":"Analyzing Correlation between Trust and User Similarity in Online Communities","year":"2004","first-page":"251","key":"35"},{"issue":"1","key":"37","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MIS.2005.16","volume":"20","year":"2005","journal-title":"IEEE Intelligent Systems"},{"doi-asserted-by":"publisher","key":"41","DOI":"10.1007\/s11761-012-0105-3"},{"doi-asserted-by":"publisher","key":"42","DOI":"10.1016\/j.jesp.2008.04.009"},{"doi-asserted-by":"publisher","key":"43","DOI":"10.2307\/3152082"},{"doi-asserted-by":"publisher","key":"44","DOI":"10.1007\/s10458-005-6825-4"},{"doi-asserted-by":"publisher","key":"45","DOI":"10.1016\/j.dss.2005.05.019"},{"doi-asserted-by":"publisher","key":"46","DOI":"10.1017\/s0269888904000116"},{"issue":"12","key":"47","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","year":"2000","journal-title":"Communications of the ACM"},{"doi-asserted-by":"publisher","key":"49","DOI":"10.1109\/access.2013.2259892"},{"doi-asserted-by":"publisher","key":"50","DOI":"10.1016\/j.elerap.2008.03.001"},{"year":"2005","key":"58"},{"issue":"2","key":"59","first-page":"27","volume":"21","year":"1998","journal-title":"Connections"},{"doi-asserted-by":"publisher","key":"60","DOI":"10.1016\/0378-8733(78)90021-7"},{"doi-asserted-by":"publisher","key":"51","DOI":"10.1103\/PhysRevE.85.016117"},{"doi-asserted-by":"publisher","key":"52","DOI":"10.1109\/CEC.2013.6557913"},{"doi-asserted-by":"publisher","key":"53","DOI":"10.1007\/s13173-010-0027-x"},{"doi-asserted-by":"publisher","key":"54","DOI":"10.1073\/pnas.0400087101"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2018\/7515860.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2018\/7515860.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2018\/7515860.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T19:33:07Z","timestamp":1522611187000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2018\/7515860\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":49,"alternative-id":["7515860","7515860"],"URL":"https:\/\/doi.org\/10.1155\/2018\/7515860","relation":{},"ISSN":["1058-9244","1875-919X"],"issn-type":[{"type":"print","value":"1058-9244"},{"type":"electronic","value":"1875-919X"}],"subject":[],"published":{"date-parts":[[2018]]}}}