109
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Improving Agents Trust in Service-Oriented Environment Based on Entropy Structure and Information Ethics Principles

&
Pages 327-342 | Received 16 Dec 2021, Accepted 04 Aug 2022, Published online: 01 Sep 2022

References

  • Ahmed, S., & Tepe, K. (2017). Entropy-based recommendation trust model for machine to machine communications. In Zhou, Y., & Kunz, T. (Eds.), Ad hoc networks (pp. 297–305). Springer.
  • Aparicio, M., Costa, C. J., & Moises, R. (2021). Gamification and reputation. Heliyon, 7(3), e06383. https://doi.org/10.1016/j.heliyon.2021.e06383
  • Arshad, K., & Moessner, K. (2011). Robust collaborative spectrum sensing based on beta reputation system [Paper presentation]. In Proceedings of the 2011 future network & mobile summit (pp. 1–8).
  • Bidgoly, A. J., & Ladani, B. T. (2016). Modeling and quantitative verification of trust systems against malicious attackers. The Computer Journal, 59(7), 1005–1027. https://doi.org/10.1093/comjnl/bxv108
  • Braga, D. D. S., Niemann, M., Hellingrath, B., & Neto, F. B. D. L. (2019). Survey on computational trust and reputation models. ACM Computing Surveys, 51(5), 1–40. https://doi.org/10.1145/3236008
  • Burr, C., Taddeo, M., & Floridi, L. (2020). The ethics of digital well-being: A thematic review. Science and Engineering Ethics, 26(4), 2313–2343. https://doi.org/10.1007/s11948-020-00175-8
  • Cavagnetto, S., & Gahir, B. (2014). Game theory—Its applications to ethical decision making. CRIS-Bulletin of the Centre for Research and Interdisciplinary Study, 2014(1), 73–91.
  • Che, S., Feng, R., Liang, X., & Wang, X. (2015). A lightweight trust management based on Bayesian and entropy for wireless sensor networks. Security and Communication Networks, 8(2), 168–175. https://doi.org/10.1002/sec.969
  • Chen, J., Tian, Z., Cui, X., Yin, L., & Wang, X. (2019). Trust architecture and reputation evaluation for internet of things. Journal of Ambient Intelligence and Humanized Computing, 10(8), 3099–3107. https://doi.org/10.1007/s12652-018-0887-z
  • D’Angelo, G., Rampone, S., & Palmieri, F. (2017). Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification. Soft Computing, 21(21), 6297–6315. https://doi.org/10.1007/s00500-016-2183-1
  • Deng, X., Liu, J., Wang, L., & Zhao, Z. (2020). A trust evaluation system based on reputation data in mobile edge computing network. Peer-to-Peer Networking and Applications, 13(5), 1744–1755. https://doi.org/10.1007/s12083-020-00889-3
  • Dini, F., & Spagnolo, G. (2009). Buying reputation on eBay: Do recent changes help? International Journal of Electronic Business, 7(6), 581–598. https://doi.org/10.1504/IJEB.2009.029048
  • Floridi, L. (1999). Information ethics: On the philosophical foundation of computer ethics. Ethics and Information Technology, 1(1), 33–52. https://doi.org/10.1023/A:1010018611096
  • Floridi, L. (2005). Semantic conceptions of information. https://stanford.library.sydney.edu.au/archives/win2014/entries/information-semantic/
  • Floridi, L. (2006). Information ethics, its nature and scope. ACM SIGCAS Computers and Society, 36(3), 21–36. https://doi.org/10.1145/1195716.1195719
  • Floridi, L. (2013). The ethics of information. Oxford University Press.
  • Floridi, L., & Sanders, J. (1999). Entropy as evil in information ethics. Etica & Politica, Special Issue on Computer Ethics, 1(2). http://www2.units.it/etica/1999_2/floridi/index.html
  • Fritz, A., Brandt, W., Gimpel, H., & Bayer, S. (2020). Moral agency without responsibility? analysis of three ethical models of human-computer interaction in times of artificial intelligence (ai). De Ethica, 6(1), 3–22. https://doi.org/10.3384/de-ethica.2001-8819.20613
  • Ghasempouri, S. A., & Ladani, B. T. (2019). Modeling trust and reputation systems in hostile environments. Future Generation Computer Systems, 99, 571–592. https://doi.org/10.1016/j.future.2019.05.017
  • Gokulnath, K., & Uthariaraj, R. (2015). Game theory based trust model for cloud environment. The Scientific World Journal, 2015, 1–10. Hindawi. https://doi.org/10.1155/2015/709827
  • Gupta, R., Singh, Y. N., & Goswami, A. (2021). Trust estimation in peer-to-peer network using blue. Peer-to-Peer Networking and Applications, 14(2), 888–897. https://doi.org/10.1007/s12083-020-01049-3
  • Hang, C.-W., Wang, Y., & Singh, M. P. (2008). An adaptive probabilistic trust model and its evaluation. In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (Vol. 3, pp. 1485–1488). IFAAMAS.
  • Hu, J., & Guan, C. (2016). Trust model of wireless sensor networks based on Shannon entropy [Paper presentation]. In Cellary, W., Mokbel, M. F., Wang, J., Wang, H., Zhou, R., & Zhang, Y. (Eds.), International Conference on Web Information Systems Engineering (pp. 397–403). Springer.
  • Jensen, T., Khan, M. M. H., Albayram, Y., Fahim, M. A. A., Buck, R., & Coman, E. (2020). Anticipated emotions in initial trust evaluations of a drone system based on performance and process information. International Journal of Human–Computer Interaction, 36(4), 316–325. https://doi.org/10.1080/10447318.2019.1642616
  • Jøsang, A., & Golbeck, J. (2009). Challenges for robust trust and reputation systems. In Proceedings of the 5th International Workshop on Security and Trust Management (SMT 2009) (Vol. 5). Springer.
  • Kerr, R., & Cohen, R. (2009). Smart cheaters do prosper: Defeating trust and reputation systems [Paper presentation]. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent System (Vol. 2, pp. 993–1000). IFAAMAS.
  • Khatoun, R., Begriche, Y., Dromard, J., Khoukhi, L., & Serhrouchni, A. (2016). A statistical trust system in wireless mesh networks. Annals of Telecommunications, 71(5-6), 187–199. https://doi.org/10.1007/s12243-015-0488-1
  • Khoshkbarchi, A., & Shahriari, H. R. (2017). Coping with unfair ratings in reputation systems based on learning approach. Enterprise Information Systems, 11(10), 1481–1499. https://doi.org/10.1080/17517575.2016.1221999
  • Kravari, K., & Bassiliades, N. (2016). Disarm: A social distributed agent reputation model based on defeasible logic. Journal of Systems and Software, 117, 130–152. Elsevie. https://doi.org/10.1016/j.jss.2016.02.016
  • Kumar, P. S., & Ramachandram, S. (2019). Fuzzy-based integration of security and trust in distributed computing. In Bansal, J. C., Das, K. N., Nagar, A., Deep, K., Ojha, A. K. (Eds.), Soft computing for problem solving (pp. 899–912). Springer.
  • Kuter, U., & Golbeck, J. (2007). Sunny: A new algorithm for trust inference in social networks using probabilistic confidence models. British Columbia, Canada: AAAI, 7, 1377–1382.
  • Liu, B. (2020). A survey on trust modeling from a Bayesian perspective. Wireless Personal Communications, 112(2), 1205–1223. https://doi.org/10.1007/s11277-020-07097-5
  • Maskell, S. (2008). A Bayesian approach to fusing uncertain, imprecise and conflicting information. Information Fusion, 9(2), 259–277. https://doi.org/10.1016/j.inffus.2007.02.003
  • Mejia, M., Peña, N., Muñoz, J. L., Esparza, O., & Alzate, M. A. (2011). A game theoretic trust model for on-line distributed evolution of cooperation inMANETs. Journal of Network and Computer Applications, 34(1), 39–51. https://doi.org/10.1016/j.jnca.2010.09.007
  • Messina, F., Pappalardo, G., Rosaci, D., Santoro, C., & Sarné, G. M. (2016). A trust-aware, self-organizing system for large-scale federations of utility computing infrastructures. Future Generation Computer Systems, 56, 77–94. Elsevier. https://doi.org/10.1016/j.future.2015.07.013
  • Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2), 205395171667967. https://doi.org/10.1177/2053951716679679
  • Momani, M., Aboura, K., & Challa, S. (2007). Rbatmwsn: Recursive Bayesian approach to trust management in wireless sensor networks [Paper presentation]. In 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (pp. 347–352). IEEE. https://doi.org/10.1109/ISSNIP.2007.4496868
  • Mykhailov, D. (2021). A moral analysis of intelligent decision-support systems in diagnostics through the lens of Luciano Floridi’s information ethics. Human Affairs, 31(2), 149–164. https://doi.org/10.1515/humaff-2021-0013
  • Nie, S. (2019). A novel trust model of dynamic optimization based on entropy method in wireless sensor networks. Cluster Computing, 22(S5), 11153–11162. https://doi.org/10.1007/s10586-017-1337-y
  • Peng, S., Jia, W., Wang, G. (2008). Voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks. In Proceedings of the 2008 IEEE/IFIP international conference on embedded and ubiquitous computing (Vol. 2, pp. 3–9). IEEE.
  • Rheu, M., Shin, J. Y., Peng, W., & Huh-Yoo, J. (2021). Systematic review: Trust-building factors and implications for conversational agent design. International Journal of Human–Computer Interaction, 37(1), 81–96. https://doi.org/10.1080/10447318.2020.1807710
  • Sengathir, J., & Manoharan, R. (2015). A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in Manets. EURASIP Journal on Wireless Communications and Networking, 2015(1), 158. https://doi.org/10.1186/s13638-015-0384-4
  • Singh, K., & Verma, A. K. (2018). A fuzzy-based trust model for flying ad hoc networks (FANETs). International Journal of Communication Systems, 31(6), e3517. https://doi.org/10.1002/dac.3517
  • Sun, Y. L., Yu, W., Han, Z., & Liu, K. R. (2006). Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 305–317. https://doi.org/10.1109/JSAC.2005.861389
  • Taddeo, M., & Floridi, L. (2016). The debate on the moral responsibilities of online service providers. Science and Engineering Ethics, 22(6), 1575–1603. https://doi.org/10.1007/s11948-015-9734-1
  • Tang, Y., Xiong, J., Becerril-Arreola, R., & Iyer, L. (2019). Blockchain ethics research: A conceptual model [Paper presentation]. In Proceedings of the 2019 on Computers and People Research Conference (pp. 43–49). Association for Computing Machinery.
  • Wang, J., Jing, X., Yan, Z., Fu, Y., Pedrycz, W., & Yang, L. T. (2020). A survey on trust evaluation based on machine learning. ACM Computing Surveys (CSUR), 53(5), 1–36. https://doi.org/10.1145/3408292
  • Wang, J., Zhang, Y., Wang, Y., & Gu, X. (2016). RPRep: A robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs. International Journal of Distributed Sensor Networks, 12(3), 6138251. https://doi.org/10.1155/2016/6138251
  • Wang, Y., Cai, Z., Yin, G., Gao, Y., Pan, Q. (2015). A trust measurement in social networks based on game theory. In Thai, M. T., Nguyen, N. P., & Huawei, S. (Eds.), International conference on computational social networks (pp. 236–247). Springer.
  • Xiao, S., & Dong, M. (2015). Hidden semi-Markov model-based reputation management system for online to offline (o2o) e-commerce markets. Decision Support Systems, 77, 87–99. Elsevier. https://doi.org/10.1016/j.dss.2015.05.013
  • Xiong, L., & Liu, L. (2004). Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7), 843–857. https://doi.org/10.1109/TKDE.2004.1318566
  • Ya, W., Meng-Ran, Z., Lei, N., & Jia, Z. (2020). Trust analysis of WSN nodes based on fuzzy theory. International Journal of Computers and Applications, 42(1), 52–56. https://doi.org/10.1080/1206212X.2017.1396430
  • Yan, S.-R., Zheng, X.-L., Wang, Y., Song, W. W., & Zhang, W.-Y. (2015). A graph-based comprehensive reputation model: Exploiting the social context of opinions to enhance trust in social commerce. Information Sciences, 318, 51–72. Elsevier. https://doi.org/10.1016/j.ins.2014.09.036

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.