Table of Contents Author Guidelines Submit a Manuscript
Scientific Programming
Volume 2018, Article ID 7515860, 15 pages
https://doi.org/10.1155/2018/7515860
Research Article

Psychology-Inspired Trust Restoration Framework in Distributed Multiagent Systems

1School of Software Technology, Dalian University of Technology, Dalian, Liaoning 116621, China
2Department of Business Administration, Faculty of Management Sciences, Prince of Songkla University, Hat Yai, Songkhla 90110, Thailand

Correspondence should be addressed to Ruchdee Binmad; ht.ca.usp@b.eedhcur

Received 21 October 2017; Revised 4 February 2018; Accepted 12 February 2018; Published 1 April 2018

Academic Editor: Danilo Pianini

Copyright © 2018 Ruchdee Binmad and Mingchu Li. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. W. Delton, A Psychological Calculus for Welfare Tradeoffs, University of California Santa Barbara, 2010.
  2. A. Sell, J. Tooby, and L. Cosmides, “Formidability and the logic of human anger,” Proceedings of the National Academy of Sciences of the United States of America, vol. 106, no. 35, pp. 15073–15078, 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Tooby and L. Cosmides, “The Evolutionary Psychology of the Emotions and Their Relationship to Internal Regulatory Variables,” in Handbook of Emotions, M. Lewis, J. M. Haviland-Jones, and L. F. Barrett, Eds., Guilford Press, NY, USA, 2008. View at Google Scholar
  4. M. B. Petersen, A. Sell, J. Tooby, and L. Cosmides, “Evolutionary Psychology and Criminal Justice: A Recalibrational Theory of Punishment and Reconciliation,” Human Morality and Sociality Evolutionary and comparative perspectives, no. 2, pp. 72–131, 2010. View at Google Scholar
  5. W. D. Hamilton, “The genetical evolution of social behaviour,” Journal of Theoretical Biology, vol. 7, no. 1, pp. 17–52, 1964. View at Publisher · View at Google Scholar · View at Scopus
  6. R. Axelrod and W. D. Hamilton, “The evolution of cooperation,” Science, vol. 211, no. 4489, pp. 1390–1396, 1981. View at Publisher · View at Google Scholar · View at MathSciNet
  7. R. L. Trivers, “The evolution of reciprocal altruism,” The Quarterly Review of Biology, vol. 46, no. 1, pp. 35–57, 1971. View at Publisher · View at Google Scholar
  8. P. Hammerstein and G. A. Parker, “The asymmetric war of attrition,” Journal of Theoretical Biology, vol. 96, no. 4, pp. 647–682, 1982. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. A. W. Delton and T. E. Robertson, “How the mind makes welfare tradeoffs: Evolution, computation, and emotion,” Current Opinion in Psychology, vol. 7, pp. 12–16, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. M. B. Petersen, A. Sell, J. Tooby, and L. Cosmides, “To punish or repair? Evolutionary psychology and lay intuitions about modern criminal justice,” Evolution and Human Behavior, vol. 33, no. 6, pp. 682–695, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Lim, Welfare Tradeoff Ratios and Emotions: Psychological Foundations of Human Reciprocity, University of California Santa Barbara, 2012.
  12. M. E. McCullough, R. Kurzban, and B. A. Tabak, “Cognitive systems for revenge and forgiveness,” Behavioral and Brain Sciences, vol. 36, no. 1, pp. 1–15, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. K. Nakayachi and M. Watabe, “Restoring trustworthiness after adverse events: The signaling effects of voluntary "Hostage Posting" on trust,” Organizational Behavior and Human Decision Processes, vol. 97, no. 1, pp. 1–17, 2005. View at Publisher · View at Google Scholar · View at Scopus
  14. E. C. Tomlinson, B. R. Dineen, and R. J. Lewicki, “The road to reconciliation: Antecedents of victim willingness to reconcile following a broken promise,” Journal of Management, vol. 30, no. 2, pp. 165–187, 2004. View at Publisher · View at Google Scholar · View at Scopus
  15. E. C. Tomlinson and R. C. Mayer, “The role of causal attribution dimensions in trust repair,” Academy of Management Review (AMR), vol. 34, no. 1, pp. 85–104, 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Scripps, P.-N. Tan, and A.-H. Esfahanian, “Exploration of link structure and community-based node roles in network analysis,” in Proceedings of the 7th IEEE International Conference on Data Mining, ICDM 2007, pp. 649–654, USA, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. E. Watanabe and Y. Ohtsubo, “Costly apology and self-punishment after an unintentional transgression,” Journal of Evolutionary Psychology, vol. 10, no. 3, pp. 87–105, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Utz, U. Matzat, and C. Snijders, “On-line reputation systems: The effects of feedback comments and reactions on building and rebuilding trust in on-line auctions,” International Journal of Electronic Commerce, vol. 13, no. 3, pp. 95–118, 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. G. Bansal and F. M. Zahedi, “Trust violation and repair: The information privacy perspective,” Decision Support Systems, vol. 71, pp. 62–77, 2015. View at Publisher · View at Google Scholar · View at Scopus
  20. Y. Xie and S. Peng, “How to repair customer trust after negative publicity: The roles of competence, integrity, benevolence, and forgiveness,” Psychology & Marketing, vol. 26, no. 7, pp. 572–589, 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. S. Marsh and P. Briggs, “Examining Trust, Forgiveness and Regret as Computational Concepts,” in Computing with Social Trust, Human–Computer Interaction Series, pp. 9–43, Springer, London, 2009. View at Publisher · View at Google Scholar
  22. R. Binmad and M. Li, “Computational Models Based on Forgiveness Mechanism for Untrustworthy Agents,” in Proceedings of the 19th Asia Pacific Symposium, IES, K. Lavangnananda, S. Phon-Amnuaisuk, W. Engchuan, and J. H. Chan, Eds., vol. 5, pp. 29–42, Springer International Publishing, 2016. View at Publisher · View at Google Scholar
  23. R. Binmad and M. Li, “Improving the efficiency of an online marketplace by incorporating forgiveness mechanism,” ACM Transactions on Internet Technology (TOIT), vol. 17, no. 1, article no. 9, pp. 1–20, 2017. View at Publisher · View at Google Scholar · View at Scopus
  24. R. Burete, A. Badica, C. Badica, and F. Moraru, “Enhanced Reputation Model with Forgiveness for E-Business Agents,” International Journal of Agent Technologies and Systems, vol. 3, no. 1, pp. 11–26, 2011. View at Publisher · View at Google Scholar
  25. J. L. Burnette, M. E. McCullough, D. R. van Tongeren, and D. E. Davis, “Forgiveness Results From Integrating Information About Relationship Value and Exploitation Risk,” Personality and Social Psychology Bulletin, vol. 38, no. 3, pp. 345–356, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. M. Laifa, S. Akrouf, and R. Maamri, “An overview of forgiveness in the digital environment,” in Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication, IPAC, November 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. A. Vasalou, A. Hopfensitz, and J. V. Pitt, “In praise of forgiveness: Ways for repairing trust breakdowns in one-off online interactions,” International Journal of Human-Computer Studies, vol. 66, no. 6, pp. 466–480, 2008. View at Publisher · View at Google Scholar · View at Scopus
  28. J. Choi and D. L. Nazareth, “Repairing trust in an e-commerce and security context: An agent-based modeling approach,” Information Management & Computer Security, vol. 22, no. 5, pp. 490–512, 2014. View at Publisher · View at Google Scholar · View at Scopus
  29. M. E. Schweitzer, J. C. Hershey, and E. T. Bradlow, “Promises and lies: Restoring violated trust,” Organizational Behavior and Human Decision Processes, vol. 101, no. 1, pp. 1–19, 2006. View at Publisher · View at Google Scholar · View at Scopus
  30. Y.-H. Chen, J.-J. Wu, and H.-T. Chang, “Examining the mediating effect of positive moods on trust repair in e-commerce,” Internet Research, vol. 23, no. 3, pp. 355–371, 2013. View at Publisher · View at Google Scholar · View at Scopus
  31. O. Matarazzo, I. Baldassarre, G. Nigro, M. Cosenza, and L. Abbamonte, “Helpful Contextual Information Before or After Negative Events: Effects on Appraisal and Emotional Reaction,” Cognitive Computation, vol. 6, no. 4, pp. 640–651, 2014. View at Publisher · View at Google Scholar · View at Scopus
  32. R. J. Boyle and R. R. Panko, Corporate Computer Security, Prentice Hall Press, 2014.
  33. P. H. Kim, K. T. Dirks, and C. D. Cooper, “The repair of trust: A dynamic bilateral perspective and multilevel conceptualization,” Academy of Management Review (AMR), vol. 34, no. 3, pp. 401–422, 2009. View at Publisher · View at Google Scholar · View at Scopus
  34. D. Lieberman, J. Tooby, and L. Cosmides, “The architecture of human kin detection,” Nature, vol. 445, no. 7129, pp. 727–731, 2007. View at Publisher · View at Google Scholar · View at Scopus
  35. Y. Wang and J. Vassileva, “Toward Trust and Reputation Based Web Service Selection: A Survey,” International Transactions on Systems Science and Applications, vol. 3, no. 2, pp. 118–132, 2007. View at Google Scholar
  36. G. Guo, J. Zhang, and D. Thalmann, “A Simple But Effective Method to Incorporate Trusted Neighbors in Recommender Systems,” in Proceedings of the 20th International Conference on User Modeling, Adaptation and Personalization (UMAP), vol. 2012, 2012. View at Publisher · View at Google Scholar
  37. M. Montaner, B. López, and J. L. de la Rosa, “Developing trust in recommender agents,” in Proceedings of the first international joint conference, p. 304, Bologna, Italy, July 2002. View at Publisher · View at Google Scholar
  38. Y. Wang and J. Vassileva, “Trust and reputation model in peer-to-peer networks,” Proceedings of the 3rd International Conference on Peer-to-Peer Computing (P2P’03), pp. 150–157, 2003. View at Publisher · View at Google Scholar
  39. C. N. Ziegler and G. Lausen, “Analyzing Correlation between Trust and User Similarity in Online Communities,” C. D. Jensen, Ed., pp. 251–265, Springer International Publishing, 2004, iTrust, LNCS 2995. View at Google Scholar
  40. W. Chen, C. Wang, and Y. Wang, “Scalable influence maximization for prevalent viral marketing in large-scale social networks,” in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD, pp. 1029–1038, USA, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  41. P. Domingos, “Mining social networks for viral marketing,” IEEE Intelligent Systems, vol. 20, no. 1, pp. 80–82, 2005. View at Google Scholar
  42. N. Memon, H. L. Larsen, D. L. Hicks, and N. Harkiolakis, “Detecting hidden hierarchy in terrorist networks: Some case studies,” in Proceedings of the International Conference on Intelligence and Security Informatics, pp. 477–489, Springer, 2008. View at Publisher · View at Google Scholar · View at Scopus
  43. W. Jianwei, R. Lili, and G. Tianzhu, “A new measure of node importance in complex networks with tunable parameters,” in Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM, pp. 1–4, China, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  44. S. Wen, Q. Li, L. Yue, A. Liu, C. Tang, and F. Zhong, “CRP: Context-based reputation propagation in services composition,” Service Oriented Computing and Applications, vol. 6, no. 3, pp. 231–248, 2012. View at Publisher · View at Google Scholar · View at Scopus
  45. T. G. Okimoto, “Outcomes as affirmation of membership value: Material compensation as an administrative response to procedural injustice,” Journal of Experimental Social Psychology, vol. 44, no. 5, pp. 1270–1282, 2008. View at Publisher · View at Google Scholar · View at Scopus
  46. A. K. Smith, R. N. Bolton, and J. Wagner, “A model of customer satisfaction with service encounters involving failure and recovery,” Journal of Marketing Research, vol. 36, no. 3, pp. 356–372, 1999. View at Publisher · View at Google Scholar · View at Scopus
  47. T. D. Huynh, N. R. Jennings, and N. R. Shadbolt, “An integrated trust and reputation model for open multi-agent systems,” Autonomous Agents and Multi-Agent Systems, vol. 13, no. 2, pp. 119–154, 2006. View at Publisher · View at Google Scholar · View at Scopus
  48. A. Jøsang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision,” Decision Support Systems, vol. 43, no. 2, pp. 618–644, 2007. View at Publisher · View at Google Scholar · View at Scopus
  49. S. D. Ramchurn, D. Huynh, and N. R. Jennings, “Trust in multi-agent systems,” The Knowledge Engineering Review, vol. 19, no. 1, pp. 1–25, 2004. View at Publisher · View at Google Scholar · View at Scopus
  50. P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, “Reputation systems,” Communications of the ACM, vol. 43, no. 12, pp. 45–48, 2000. View at Google Scholar · View at Scopus
  51. L. Mui, M. Mohtashemi, and A. Halberstadt, “A computational model of trust and reputation,” in Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 2431–2439, USA, 2002. View at Publisher · View at Google Scholar
  52. H. Yu, Z. Shen, C. Leung, C. Miao, and V. R. Lesser, “A survey of multi-agent trust management systems,” IEEE Access, vol. 1, no. 1, pp. 35–50, 2013. View at Publisher · View at Google Scholar · View at Scopus
  53. J. Zhang and R. Cohen, “Evaluating the trustworthiness of advice about seller agents in e-marketplaces: A personalized approach,” Electronic Commerce Research and Applications, vol. 7, no. 3, pp. 330–340, 2008. View at Publisher · View at Google Scholar · View at Scopus
  54. R. A. Hanneman and M. Riddle, Introduction to social network methods, University of California Riverside, 2005.
  55. S. P. Borgatti, C. Jones, and M. G. Everett, “Network measures of social capital,” Connections, vol. 21, no. 2, pp. 27–36, 1998. View at Google Scholar
  56. L. C. Freeman, “Centrality in social networks conceptual clarification,” Social Networks, vol. 1, no. 3, pp. 215–239, 1978-1979. View at Publisher · View at Google Scholar · View at Scopus
  57. G. Bounova and O. De Weck, “Overview of metrics and their correlation patterns for multiple-metric topology analysis on heterogeneous graph ensembles,” Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, vol. 85, no. 1, Article ID 016117, 2012. View at Publisher · View at Google Scholar · View at Scopus
  58. M. Li and C. O'Riordan, “The effect of clustering coefficient and node degree on the robustness of cooperation,” IEEE Congress on Evolutionary Computation, CEC, pp. 2833–2839, 2013. View at Publisher · View at Google Scholar · View at Scopus
  59. M. C. V. Nascimento and A. C. P. L. F. Carvalho, “A graph clustering algorithm based on a clustering coefficient for weighted graphs,” Journal of the Brazilian Computer Society, vol. 17, no. 1, pp. 19–29, 2011. View at Publisher · View at Google Scholar · View at Scopus
  60. A. Barrat, M. Barthélemy, R. Pastor-Satorras, and A. Vespignani, “The Architecture of Complex Weighted Networks,” Proceedings of the National Academy of Sciences of the United States of America, vol. 101, no. 11, pp. 3747–3752, 2004. View at Publisher · View at Google Scholar · View at Scopus