Information Technology Reference
In-Depth Information
Table 6.5
Pseudo-Transitivity: Combining the Degrees of Trust
DoT ZYτ > σ 2
DoT Z Yτ
σ 2
DoT X Z (ev)τ > σ 1
X trusts Y as for
τ
X does not trust
Y as for τ
X trusts Y OR
X does not trust
Y as for τ
DoT X Z (ev)τ
σ 1
X trusts Y OR
X does not trust
Y as for τ
mainly due both to the utility and diffusion of the practice itself: it can be a simple conformity
feeling and imitation; or it can be an explicit cognitive evaluation such as: 'since everybody
does it, it should be quite safe (apparently they do not incur systematic damages)'. If everybody
violates traffic rules, I feel encouraged to violate them too.
More formally, we have:
given S
we are considering the set of agents belonging to the commu-
nity as reference for trust diffusion.
= {
s 1 ,. ., s n }
( DoT Z n Y τ n )) then
if Bel ( X ( DoT ZY τ 2 )
( DoT Z'Y τ 3 )
...
.
DoT XY τ 1 .
Z
Z
τ
τ
Trust on
Trust on
τ
τ
Trust on
Trust on
X
X
Y
Y
τ
τ
Trust on
Trust on
τ
Trust on
W
W
J
J
t 1
t 2
t
Figure 6.12
Trust Conformism
 
Search WWH ::




Custom Search