Information Systems Frontiers

, Volume 17, Issue 4, pp 725–742 | Cite as

Reasoning about the impacts of information sharing

  • Yuqing TangEmail author
  • Federico Cerutti
  • Nir Oren
  • Chatschik Bisdikian


Shared information can benefit an agent, allowing others to aid it in its goals. However, such information can also harm, for example when malicious agents are aware of these goals, and can then thereby subvert the goal-maker’s plans. In this paper we describe a decision process framework allowing an agent to decide what information it should reveal to its neighbours within a communication network in order to maximise its utility. We assume that these neighbours can pass information onto others within the network. The inferences made by agents receiving the messages can have a positive or negative impact on the information providing agent, and our decision process seeks to assess how a message should be modified in order to be most beneficial to the information producer. Our decision process is based on the provider’s subjective beliefs about others in the system, and therefore makes extensive use of the notion of trust with regards to the likelihood that a message will be passed on by the receiver, and the likelihood that an agent will use the information against the provider. Our core contributions are therefore the construction of a model of information propagation; the description of the agent’s decision procedure; and an analysis of some of its properties.


Information sharing Impacts Trust Risk 



We would like to thank Leon van der Torre for his insightful comments on an early draft of this work. This research was sponsored by US Army Research laboratory and the UK Ministry of Defence and was accomplished under Agreement Number W911NF-06-3-0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the US Army Research Laboratory, the U.S. Government, the UK Ministry of Defence, or the UK Government. The US and UK Governments are authorised to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation hereon.


  1. Bisdikian, C., Tang Y., Cerutti F., Oren N. (2013) A framework for using trust to assess risk in information sharing Chesśevar, C. Onaindia, E. Ossowski, S. Vouros, G. (eds), Agreement Technologies, Lecture Notes in Computer Science, vol 8068 Springer Berlin Heidelberg, pp 135–149, doi: 10.1007/978-3-642-39860-5-11.
  2. Burnett, C., Norman T.J., Sycara K. (2011). Trust decision-making in multi-agent systems. Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume One, AAAI Press, IJCAI’11 , 115–120.Google Scholar
  3. Caminada, M.W. (2009). Truth, Lies and Bullshit; distinguishing classes of dishonesty. In: Social Simulation workshop (SS@IJCAI), 39–50.Google Scholar
  4. Castelfranchi, C., & Falcone, R. (2010). In Trust theory A socio-cognitive and computational model. Wiley Series in Agent Technology.Google Scholar
  5. Chakraborty, S., Raghavan K.R., Srivastava M.B., Bisdikian C., Kaplan L.M. (2012). Balancing value and risk in information sharing through obfuscation. In: Proceedings of the 15th Int’l Conf. on Information Fusion (FUSION ’12).Google Scholar
  6. Das, T.K., Teng B.S. (2004). The Risk-Based View of Trust: A Conceptual Framework. Journal of Business and Psychology, 19(1), 85–116. doi: 10.1023/B:JOBU.0000040274.23551.1b.CrossRefGoogle Scholar
  7. Goffman, E. (1970). Strategic Interaction. Basil Blackwell Oxford.Google Scholar
  8. Jøsang, A., (2001). A logic for uncertain probabilities. International Journal of Uncertainty. Fuzziness and Knowledge-Based Systems, 9(3), 279–311.CrossRefGoogle Scholar
  9. Jøsang, A., & Ismail, R. (2002). The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference.Google Scholar
  10. Kaplan, S., & Garrick, B.J. (1981). On the quantitative definition of risk. Risk Analysis, 1(1), 11–27.CrossRefGoogle Scholar
  11. Mardziel, P., Magill, S., Hicks, M., Srivatsa, M. (2011). Dynamic enforcement of knowledge-based security policies. In Proceedings of the 24th IEEE Computer Security Foundations Symposium, (pp. 114–128).Google Scholar
  12. Stentz, K., & Ferson, S. (2002). Combination of evidence in Dempster-Shafer theory. Tech. Rep. SAND 2002-0835, Sandia National Laboratories.Google Scholar
  13. Tan, Y.H., & Thoen, W. (2002). Formal aspects of a generic model of trust for electronic commerce. Decision Support Systems, 33(3), 233–246. doi: 10.1016/S0167-9236(02)00014-3.CrossRefGoogle Scholar
  14. Tang, Y., Cai, K., McBurney, P., Sklar, E., Parsons, S. (2011). Using argumentation to reason about trust and belief. Journal of Logic and Computation. doi: 10.1093/logcom/exr038.
  15. Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M. (2006). Travos: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems, 12(2), 183–198.CrossRefGoogle Scholar
  16. Urbano, J., Rocha, A., Oliveira, E. (2013). A socio-cognitive perspective of trust. Ossowski, S., Agreement Technologies, Law, Governance and Technology Series, vol 8, Springer Netherlands, 419–429, doi: 10.1007/978-94-007-5583-3-23.
  17. Wang, X., Williams, M.A. (2011). Risk, uncertainty and possible worlds. In: Privacy, security, risk and trust (passat), IEEE Third International Conference on Social Computing (SOCIALCOM) 1278–1283 doi: 10.1109/PASSAT/SocialCom.2011.130.

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Yuqing Tang
    • 1
    Email author
  • Federico Cerutti
    • 2
  • Nir Oren
    • 2
  • Chatschik Bisdikian
    • 3
  1. 1.Robotics InstituteCarnegie Mellon UniversityPittsburghUSA
  2. 2.School of Natural and Computing Science, King’s CollegeUniversity of AberdeenAberdeenUK
  3. 3.Thomas J. Watson Research CenterIBM Research DivisionYorktown HeightsUSA

Personalised recommendations