Skip to main content

Incorporating Mitigating Circumstances into Reputation Assessment

  • Conference paper
  • First Online:
Advances in Social Computing and Multiagent Systems (MFSC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 541))

Included in the following conference series:

  • 460 Accesses

Abstract

Reputation enables customers to select between providers, and balance risk against other aspects of service provision. For new providers that have yet to establish a track record, negative ratings can significantly impact on their chances of being selected. Existing work has shown that malicious or inaccurate reviews, and subjective differences, can be accounted for. However, an honest balanced review of service provision may still be an unreliable predictor of future performance if the circumstances differ. Specifically, mitigating circumstances may have affected previous provision. For example, while a delivery service may generally be reliable, a particular delivery may be delayed by unexpected flooding. A common way to ameliorate such effects is by weighting the influence of past events on reputation by their recency. In this paper, we argue that it is more effective to query detailed records of service provision, using patterns that describe the circumstances to determine the significance of previous interactions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Such a situation may indicate poor judgement and so have a degree of relevance, but this is not considered in this paper.

  2. 2.

    http://bit.ly/1uqLAZO.

References

  1. Burnett, C., Norman, T.J., Sycara, K.: Bootstrapping trust evaluations through stereotypes. In: Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems, pp. 241–248 (2010)

    Google Scholar 

  2. Burnett, C., Norman, T.J., Sycara, K.: Trust decision-making in multi-agent systems. In: Proceedings of the 22nd International Joint Conference on Artificial Intelligence, pp. 115–120 (2011)

    Google Scholar 

  3. Burnett, C., Norman, T.J., Sycara, K., Oren, N.: Supporting trust assessment and decision-making in coalitions. IEEE Intell. Syst. 29(4), 18–24 (2014)

    Article  Google Scholar 

  4. Burnett, C., Oren, N.: Sub-delegation and trust. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, pp. 1359–1360 (2012)

    Google Scholar 

  5. Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An approach to evaluate data trustworthiness based on data provenance. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 82–98. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Griffiths, N., Miles, S.: An architecture for justified assessments of service provider reputation. In: Proceedings of the 10th IEEE International Conference on e-Business Engineering, pp. 345–352 (2013)

    Google Scholar 

  7. Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. J. Auton. Agent. Multi Agent Syst. 13(2), 119–154 (2006)

    Article  Google Scholar 

  8. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618–644 (2007)

    Article  Google Scholar 

  9. Kaelbling, L.P., Littman, M.L., Moore, A.W.: Reinforcement learning: a survey. J. Artif. Intell. Res. 4, 237–285 (1996)

    Google Scholar 

  10. Miles, S., Griffiths, N.: Accounting for circumstances in reputation assessment. In: Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (2015)

    Google Scholar 

  11. Pinyol, I., Sabater-Mir, J.: Computational trust and reputation models for open multi-agent systems: a review. Artif. Intell. Rev. 40, 1–25 (2013)

    Article  Google Scholar 

  12. Rajbhandari, S., Contes, A., Rana, O.F., et al.: Trust assessment using provenance in service oriented applications. In: Proceedings of the 10th IEEE International Enterprise Distributed Object Computing Conference Workshops, p. 65 (2006)

    Google Scholar 

  13. Sabater, J.: Evaluating the ReGreT system. Appl. Artif. Intell. 18(9–10), 797–813 (2004)

    Article  Google Scholar 

  14. Sensoy, M., Yilmaz, B., Norman, T.J.: STAGE: stereotypical trust assessment through graph extraction. Comput. Intell. (2014)

    Google Scholar 

  15. Teacy, W.T.L., Luck, M., Rogers, A., Jennings, N.R.: An efficient and versatile approach to trust and reputation using hierarchical bayesian modelling. Artif. Intell. 193, 149–185 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  16. Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model. In: Proceedings of the 4th International Conference on Autonomous Agents and Multiagent Systems, pp. 997–1004 (2005)

    Google Scholar 

  17. Townend, P., Webster, C., Venters, C., et al.: Personalised provenance reasoning models and risk assessment in business systems: a case study. In: Proceedings of the 7th IEEE International Symposium on Service Oriented System Engineering, pp. 329–334 (2013)

    Google Scholar 

  18. Urbano, J., Roacha, A.P., Oliveira, E.: Refining the trustworthiness assessment of suppliers through extraction of stereotypes. In: Proceedings of the 12th International Conference on Enterprise Information Systems, pp. 85–92 (2010)

    Google Scholar 

  19. W3C. PROV model primer (2013). http://www.w3.org/TR/prov-primer/

  20. W3C. Sparql 1.1 overview (2013). http://www.w3.org/TR/sparql11-overview/

  21. Wang, X., Govindan, K., Mohapatra, P.: Provenance-based information trustworthiness evaluation in multi-hop networks. In: Proceedings of the IEEE Global Telecommunications Conference, pp. 1–5 (2010)

    Google Scholar 

  22. Yu, B., Singh, M.P.: Searching social networks. In: Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multi Agent Systems, pp. 65–72 (2003)

    Google Scholar 

Download references

Acknowledgements

This work was part funded by the UK Engineering and Physical Sciences Research Council as part of the Justified Assessments of Service Provider Reputation project, ref. EP/M012654/1 and EP/M012662/1.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Simon Miles .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Miles, S., Griffiths, N. (2015). Incorporating Mitigating Circumstances into Reputation Assessment. In: Koch, F., Guttmann, C., Busquets, D. (eds) Advances in Social Computing and Multiagent Systems. MFSC 2015. Communications in Computer and Information Science, vol 541. Springer, Cham. https://doi.org/10.1007/978-3-319-24804-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24804-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24803-5

  • Online ISBN: 978-3-319-24804-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy