{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T18:54:07Z","timestamp":1766516047869,"version":"3.41.0"},"reference-count":81,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T00:00:00Z","timestamp":1570665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-14-1-0206"],"award-info":[{"award-number":["FA9550-14-1-0206"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Interact. Intell. Syst."],"published-print":{"date-parts":[[2019,12,31]]},"abstract":"<jats:p>A proposal for a unified theory of learned trust implemented in a cognitive architecture is presented. The theory is instantiated as a computational cognitive model of learned trust that integrates several seemingly unrelated categories of findings from the literature on interpersonal and human-machine interactions and makes unintuitive predictions for future studies. The model relies on a combination of learning mechanisms to explain a variety of phenomena such as trust asymmetry, the higher impact of early trust breaches, the black-hat\/white-hat effect, the correlation between trust and cognitive ability, and the higher resilience of interpersonal as compared to human-machine trust. In addition, the model predicts that trust decays in the absence of evidence of trustworthiness or untrustworthiness. The implications of the model for the advancement of the theory on trust are discussed. Specifically, this work suggests two more trust antecedents on the trustor's side: perceived trust necessity and cognitive ability to detect cues of trustworthiness.<\/jats:p>","DOI":"10.1145\/3230735","type":"journal-article","created":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T13:13:05Z","timestamp":1570713185000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Toward a Unified Theory of Learned Trust in Interpersonal and Human-Machine Interactions"],"prefix":"10.1145","volume":"9","author":[{"given":"Ion","family":"Juvina","sequence":"first","affiliation":[{"name":"Wright State University, Dayton, OH, USA"}]},{"given":"Michael G.","family":"Collins","sequence":"additional","affiliation":[{"name":"Wright State University 8 Air Force Research Laboratory, Dayton, OH, USA"}]},{"given":"Othalia","family":"Larue","sequence":"additional","affiliation":[{"name":"Wright State University, Dayton, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9238-1215","authenticated-orcid":false,"given":"William G.","family":"Kennedy","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Ewart De","family":"Visser","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Celso De","family":"Melo","sequence":"additional","affiliation":[{"name":"University of Southern California, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,10,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0028"},{"key":"e_1_2_1_2_1","unstructured":"J. B. Lyons C. K. Stokes and T. R. Schneider. 2011. Predictors and outcomes of trust in teams. In Trust in Military Teams. N. A. Stanton (Ed.) Ashgate Publishing Ltd. J. B. Lyons C. K. Stokes and T. R. Schneider. 2011. Predictors and outcomes of trust in teams. In Trust in Military Teams. N. A. Stanton (Ed.) Ashgate Publishing Ltd."},{"volume-title":"Unified Theories of Cognition","author":"Newell A.","key":"e_1_2_1_3_1","unstructured":"A. Newell . 1990. Unified Theories of Cognition . Harvard University Press , Cambridge, MA . A. Newell. 1990. Unified Theories of Cognition. Harvard University Press, Cambridge, MA."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720814547570"},{"volume-title":"How Can the Human Mind Occur in the Physical Universe? Oxford University Press","author":"Anderson J. R.","key":"e_1_2_1_5_1","unstructured":"J. R. Anderson . 2007. How Can the Human Mind Occur in the Physical Universe? Oxford University Press , New York . J. R. Anderson. 2007. How Can the Human Mind Occur in the Physical Universe? Oxford University Press, New York."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926617"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9508080335"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2007.24348410"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50.30392"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720814547570"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720816634228"},{"key":"e_1_2_1_12_1","volume-title":"Talk at the twenty-third ACT-R postgraduate summer school","author":"Gluck K.","year":"2017","unstructured":"K. Gluck . 2016. Pace, Persistence, and Scale. Talk at the twenty-third ACT-R postgraduate summer school . Lancaster, PA . Retrieved on Aug 2017 from http:\/\/act-r.psy.cmu.edu\/?post_type&equals;workshops8p&equals;20531. K. Gluck. 2016. Pace, Persistence, and Scale. Talk at the twenty-third ACT-R postgraduate summer school. Lancaster, PA. Retrieved on Aug 2017 from http:\/\/act-r.psy.cmu.edu\/?post_type&equals;workshops8p&equals;20531."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jarmac.2014.09.004"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1006\/game.1995.1027"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2016.00049"},{"volume-title":"Behavioral Game Theory: Experiments in Strategic Interaction","author":"Camerer C. F.","key":"e_1_2_1_16_1","unstructured":"C. F. Camerer . 2003. Behavioral Game Theory: Experiments in Strategic Interaction ; Princeton University Press : Princeton, NJ . C. F. Camerer. 2003. Behavioral Game Theory: Experiments in Strategic Interaction; Princeton University Press: Princeton, NJ."},{"key":"e_1_2_1_17_1","unstructured":"A. Rapoport M. J. Guyer and D. G. Gordon. 1976. The 2\u00d72 Game. The University of Michigan Press Ann Arbor MI. A. Rapoport M. J. Guyer and D. G. Gordon. 1976. The 2\u00d72 Game. The University of Michigan Press Ann Arbor MI."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2012.09.004"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1551-6709.2009.01010.x"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.2000.2909"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2010.0321"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog2704_2"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the 33rd International Conference on Machine Learning.","author":"He H.","year":"2016","unstructured":"H. He , J. Boyd-Graber , K. Kwok , and H. Daume 'III. 2016 . Opponent modeling in deep reinforcement learning . In Proceedings of the 33rd International Conference on Machine Learning. H. He, J. Boyd-Graber, K. Kwok, and H. Daume 'III. 2016. Opponent modeling in deep reinforcement learning. In Proceedings of the 33rd International Conference on Machine Learning."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2017.06.002"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"C. Castelfranchi and R. Falcone. 2010. Trust theory: A socio-cognitive and computational model. Wiley Series in Agent Technology. John Wiley 8 Sons Ltd. Chichester UK. C. Castelfranchi and R. Falcone. 2010. Trust theory: A socio-cognitive and computational model. Wiley Series in Agent Technology. John Wiley 8 Sons Ltd. Chichester UK.","DOI":"10.1002\/9780470519851"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720811417254"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/62266.62273"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1523_5"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-005-6825-4"},{"volume-title":"Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom\u201916)","author":"Dang Q. V.","key":"e_1_2_1_30_1","unstructured":"Q. V. Dang and C. L. Ignat . 2016. Computational trust model for repeated trust games . In Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom\u201916) . Q. V. Dang and C. L. Ignat. 2016. Computational trust model for repeated trust games. In Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom\u201916)."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926622"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.12.4.450.10640"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.50.1.569"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1993.tb01329.x"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.105.1.131"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.2000.2909"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167208324512"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0046719"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0801_1"},{"key":"e_1_2_1_40_1","unstructured":"J. B. Lyons C. K. Stokes and T. R. Schneider. 2011. Predictors and outcomes of trust in teams. N.A. Stanton (Ed.) Trust in Military Teams. Ashgate Publishing Ltd. J. B. Lyons C. K. Stokes and T. R. Schneider. 2011. Predictors and outcomes of trust in teams. N.A. Stanton (Ed.) Trust in Military Teams. Ashgate Publishing Ltd."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intell.2009.11.006"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-839X.00030"},{"key":"e_1_2_1_43_1","unstructured":"A. Newell and P. S. Rosenbloom. 1981. Mechanisms of skill acquisition and the law of practice. In Cognitive Skills and Their Acquisition J. R. Anderson (Ed.) (1--55). Erlbaum Hillsdale NJ. A. Newell and P. S. Rosenbloom. 1981. Mechanisms of skill acquisition and the law of practice. In Cognitive Skills and Their Acquisition J. R. Anderson (Ed.) (1--55). Erlbaum Hillsdale NJ."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1162\/PRES_a_00062"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1993.1039"},{"volume-title":"Adaptation-level Theory","author":"Helson H.","key":"e_1_2_1_46_1","unstructured":"H. Helson . 1964. Adaptation-level Theory . Harper 8 Row, New York. H. Helson. 1964. Adaptation-level Theory. Harper 8 Row, New York."},{"volume-title":"Proceedings of the International Conference on Social, Cultural, and Behavioral Modeling (SBP-BRiMS\u201915)","author":"Collins M. G.","key":"e_1_2_1_47_1","unstructured":"M. G. Collins , I. Juvina , G. Douglas , and K. A. Gluck . 2015. Predicting trust dynamics and transfer of learning in games of strategic interaction as a function of a player's strategy and level of trustworthiness . In Proceedings of the International Conference on Social, Cultural, and Behavioral Modeling (SBP-BRiMS\u201915) . M. G. Collins, I. Juvina, G. Douglas, and K. A. Gluck. 2015. Predicting trust dynamics and transfer of learning in games of strategic interaction as a function of a player's strategy and level of trustworthiness. In Proceedings of the International Conference on Social, Cultural, and Behavioral Modeling (SBP-BRiMS\u201915)."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926620"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.4.3.367"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.64.3.431"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1037\/xlm0000270"},{"key":"e_1_2_1_52_1","first-page":"1503","article-title":"The co-evolution of honesty and strategic vigilance","volume":"7","author":"Heintz C.","year":"2016","unstructured":"C. Heintz , M. Karabegovi , and A. Molnar . 2016 . The co-evolution of honesty and strategic vigilance . Front. Psych. 7 : 1503 . C. Heintz, M. Karabegovi, and A. Molnar. 2016. The co-evolution of honesty and strategic vigilance. Front. Psych. 7:1503.","journal-title":"Front. Psych."},{"volume-title":"Proceedings of the 3rd AAAI Conference on Interactive Decision Theory and Game Theory. AAAI Press.","author":"Thompson W.","key":"e_1_2_1_53_1","unstructured":"W. Thompson and S. Kaufmann . 2010. Signaling games with partially observable actions as a model of conversational grounding . In Proceedings of the 3rd AAAI Conference on Interactive Decision Theory and Game Theory. AAAI Press. W. Thompson and S. Kaufmann. 2010. Signaling games with partially observable actions as a model of conversational grounding. In Proceedings of the 3rd AAAI Conference on Interactive Decision Theory and Game Theory. AAAI Press."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1037\/xap0000092"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13423-015-0966-5"},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the 14th International Conference on Cognitive Modeling. D. Reitter and F. E. Ritter (Eds.). (188--193)","author":"Juvina I.","year":"2016","unstructured":"I. Juvina , M. G. Collins , O. Larue , and C. de Melo . 2016 . Toward a unified theory of learned trust . In Proceedings of the 14th International Conference on Cognitive Modeling. D. Reitter and F. E. Ritter (Eds.). (188--193) . I. Juvina, M. G. Collins, O. Larue, and C. de Melo. 2016. Toward a unified theory of learned trust. In Proceedings of the 14th International Conference on Cognitive Modeling. D. Reitter and F. E. Ritter (Eds.). (188--193)."},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of the International Symposium on Information Theory, B. N. Petrov and F. Csaki (Eds.). 267--281","author":"Akaike H.","year":"1973","unstructured":"H. Akaike . 1973 . Information theory as an extension of the maximum likelihood principle . In Proceedings of the International Symposium on Information Theory, B. N. Petrov and F. Csaki (Eds.). 267--281 . H. Akaike. 1973. Information theory as an extension of the maximum likelihood principle. In Proceedings of the International Symposium on Information Theory, B. N. Petrov and F. Csaki (Eds.). 267--281."},{"key":"e_1_2_1_58_1","unstructured":"K. P. Burnham and D. R. Anderson. 2002. Model selection and multimodel inference: A practical information-theoretic approach. Springer-Verlag New York. K. P. Burnham and D. R. Anderson. 2002. Model selection and multimodel inference: A practical information-theoretic approach. Springer-Verlag New York."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1901\/jeab.2007.01-06"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1901\/jeab.2007.01-06"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1521\/soco.2015.33.5.436"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.57"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.92.4.909"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10869-004-2229-8"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2001.11044227"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0031464"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2006.07.006"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joep.2011.05.007"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1177\/0956797614545133"},{"key":"e_1_2_1_70_1","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1017\/S1930297500008822","article-title":"Commitment-enhancing tools in centipede games: Evidencing European-Japanese differences in trust and cooperation","volume":"13","author":"Krockow E. M.","year":"2018","unstructured":"E. M. Krockow , M. Takezawa , B. D. Pulford , A. M. Colman , S. Smithers , T. Kita , and Y. Nakawake . 2018 . Commitment-enhancing tools in centipede games: Evidencing European-Japanese differences in trust and cooperation . Judg. Decis. Making 13 , 1 (2018), 61 . E. M. Krockow, M. Takezawa, B. D. Pulford, A. M. Colman, S. Smithers, T. Kita, and Y. Nakawake. 2018. Commitment-enhancing tools in centipede games: Evidencing European-Japanese differences in trust and cooperation. Judg. Decis. Making 13, 1 (2018), 61.","journal-title":"Judg. Decis. Making"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02249397"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1111\/peps.12265"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-013-9166-x"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.6.791"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/63.4.967"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0041-5"},{"key":"e_1_2_1_77_1","volume-title":"A: Syst. Hum. 36, 5","author":"Gao J.","year":"2006","unstructured":"J. Gao and J. D. Lee . 2006 . Extending the decision field theory to model operators\u2019 reliance on automation in supervisory control situations. IEEE Trans. Syst., Man, Cyber .\u2014Part A: Syst. Hum. 36, 5 (2006), 943--959. J. Gao and J. D. Lee. 2006. Extending the decision field theory to model operators\u2019 reliance on automation in supervisory control situations. IEEE Trans. Syst., Man, Cyber.\u2014Part A: Syst. Hum. 36, 5 (2006), 943--959."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.26.2.395"},{"key":"e_1_2_1_79_1","volume-title":"Human engineering for an effective air navigation and traffic control system","author":"Fitts P. M.","year":"1951","unstructured":"P. M. Fitts . (Ed.) ( 1951 ). Human engineering for an effective air navigation and traffic control system . National Research Council , Washington, DC. P. M. Fitts. (Ed.) (1951). Human engineering for an effective air navigation and traffic control system. National Research Council, Washington, DC."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/s101110200022"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2018.1457725"}],"container-title":["ACM Transactions on Interactive Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230735","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230735","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:30Z","timestamp":1750208250000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230735"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,10]]},"references-count":81,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12,31]]}},"alternative-id":["10.1145\/3230735"],"URL":"https:\/\/doi.org\/10.1145\/3230735","relation":{},"ISSN":["2160-6455","2160-6463"],"issn-type":[{"type":"print","value":"2160-6455"},{"type":"electronic","value":"2160-6463"}],"subject":[],"published":{"date-parts":[[2019,10,10]]},"assertion":[{"value":"2016-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}