of humans in order to evaluate knowledge and
knowledge sources. These factors are: Reputation,
expertise and of course, previous experience.
This approach implies several advantages for
organizations as it permits them to identify the
expertise of their employees and to measure the
quality of their contributions. Therefore, it is
expected that a greater flow of communication will
exist between them which will consequently produce
an increase in their knowledge.
In addition, this work has illustrated how the
architecture can be used to implement a prototype.
The main functionalities of the prototype are:
Controlling whether employees try to
introduce valueless knowledge with the
goal of obtaining some profit such as
points, incentives, rewards,, etc
Providing the most suitable knowledge for
the employee’s queries, by using the
reputation and relevance values that the
agents have obtained from previous
experiences.
Detecting the expertise of the employees
within an organization.
All these advantages provide organizations with
a better control of their knowledge base which will
have more trustworthy knowledge and it is
consequently expected that employees will feel more
willing to use it.
ACKNOWLEDGEMENTS
This work is partially supported by the ENIGMAS
(PIB-05-058), and MECENAS (PBI06-0024)
project, Junta de Comunidades de Castilla-La
Mancha, Consejería de Educación y Ciencia, both in
Spain. It is also supported by the ESFINGE project
(TIN2006-15175-C05-05) Ministerio de Educación
y Ciencia (Dirección General de Investigación)/
Fondos Europeos de Desarrollo Regional (FEDER)
in Spain.
REFERENCES
Ackoff, R., 1989, From Data to Wisdom. Journal of
Applied Systems Analysis, Vol. 16, pp: 3-9.
Barber, K., Kim, J., 2004, Belief Revision Process Based
on Trust: Simulation Experiments. In 4th Workshop on
Deception, Fraud and Trust in Agent Societies,
Montreal Canada.
Crowder, R., Hughes, G., Hall, W., 2002, Approaches to
Locating Expertise Using Corporate Knowledge.
International Journal of Intelligent Systems in
Accounting Finance & Management, Vol. 11, pp: 185-
200.
Desouza, K., Awazu, Y., Baloh, P., 2006, Managing
Knowledge in Global Software Development Efforts:
Issues and Practices. IEEE Software, pp: 30-37.
Dillenbourg, P., 1999, Introduction: What Do You Mean
By "Collaborative Learning"?. Collaborative Learning
Cognitive and Computational Approaches.
Dillenbourg (Ed.). Elsevier Science.
Griffiths, N., 2005, Task Delegation Using Experience-
Based Multi-Dimensional Trust, AAMAS'05, pp: 489-
496.
Huysman, M., Wit, D., 2000, Knowledge Sharing in
Practice. Kluwer Academic Publishers, Dordrecht.
Kan, G., 1999, Gnutella. Peer-to-Peer: Harnessing the
Power of Disruptive Technologies. O'Reilly, pp: 94-
122.
Nonaka, I., Takeuchi, H., 1995, The Knowledge Creation
Company: How Japanese Companies Create the
Dynamics of Innovation. Oxford University Press.
Rodríguez-Elias, O., Martínez-García, A., Favela, J.,
Vizcaíno, A., Piattini, M., 2004, Understanding and
Supporting Knowledge Flows in a Community of
Software Developers. LNCS 3198, Springer, pp: 52-
66.
Schaeffer, J., Lake, R., Lu, P., Bryant, M., 1996,
CHINOOK: The World Man-Machine Checkers
Champion. AI Magazine, Vol. 17, pp: 21-29.
Schulz, S., Herrmann, K., Kalcklosch, R., Schowotzer, T.,
2003, Trust-Based Agent -Mediated Knowledge
Exchange for Ubiquitous Peer Networks. AMKM,
LNAI 2926, pp: 89-106.
Wang, Y., Vassileva, J., 2003, Trust and Reputation
Model in Peer-to-Peer Networks. Proceedings of IEEE
Conference on P2P Computing.
Wasserman, S., Glaskiewics, J., 1994, Advances in Social
Networks Analysis. Sage Publications.
Wenger, E., 1998, Communities of Practice: Learning
Meaning, and Identity, Cambridge U.K.: Cambridge
University Press.
Yu, B., Singh, M., 2000, A Social Mechanism of
Reputation Management in Electronic Communities.
Cooperative Information Agents, CIA-2000, pp: 154-
165.
Zachaira, G., Moukas, A., Maes, P., 1999, Collaborative
Reputation Mechanisms in Electronic Marketplaces.
32nd Annual Hawaii International Conference on
System Science (HICSS-32).
ICINCO 2007 - International Conference on Informatics in Control, Automation and Robotics
178