{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:00:59Z","timestamp":1725487259359},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540440871"},{"type":"electronic","value":"9783540461029"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46102-7_7","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T16:22:53Z","timestamp":1184602973000},"page":"31-39","source":"Crossref","is-referenced-by-count":0,"title":["Trust Objects in Electronic Commerce Transactions"],"prefix":"10.1007","author":[{"given":"Costas","family":"Calcanis","sequence":"first","affiliation":[]},{"given":"Dilip","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Shushma","family":"Patel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,2]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Ackerman, M. Cranor, L. & Reagle, J. (1999) Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences, Proceeding of the ACM Conference on Electronic Commerce, pp. 1\u20138, ACM Press.","DOI":"10.1145\/336992.336995"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Ahuja, V. (2000) Building Trust in Electronic Commerce, IT Pro.","DOI":"10.1109\/6294.846215"},{"key":"7_CR3","unstructured":"Booch, G. Rumbaugh, J. & Jacobson, I. (1999) The Unified Modelling Language: User Guide, Addison-Wesley."},{"key":"7_CR4","unstructured":"Calcanis, C. (2000) Lecture notes in Website Management & Security, South Bank University."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Checkland, P. (1999) Systems Thinking, Systems Practice, John Wiley & Sons.","DOI":"10.1093\/oso\/9780198775331.003.0004"},{"key":"7_CR6","unstructured":"Egger, F. N. (2001) Affective Design of E-Commerce User Interfaces: How to Maximise Perceived Trustworthiness, Proceedings of the International Conference on Affective Human Factors Design, Asean Academic Press."},{"key":"7_CR7","unstructured":"Eriksson, H. & Penker, M. (1998) UML Toolkit, John Wiley & Sons."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Ferraro, A. (1998) Electronic Commerce: The Issues and Challenges to Creating Trust and a Positive Image in Consumer Sales on the World Wide Web, [Online], Available: http:\/\/www.firstmonday.dk\/issues\/issue3_6\/ferraro\/index.html [2002, March 27].","DOI":"10.5210\/fm.v3i6.601"},{"key":"7_CR9","unstructured":"Gollmann, D. (1999) Computer Security, John Wiley & Sons."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Govier, T. (1997) Social Trust and Human Communities, McGill-Queen\u2019s University Press.","DOI":"10.1515\/9780773566828"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Hawkins, S. Yen, D. C. & Chou, D. C. (2000) Awareness and Challenges of Internet Security, Information Management & Computer Security, Vol. 8, No. 3, MCB University Press.","DOI":"10.1108\/09685220010372564"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Jones, S. Wilikens, M. Morris, P. & Masera M. (2000) Trust Requirements in E-Business: A Conceptual Framework for Understanding the Needs and Concepts of Different Stakeholders, Communications of the ACM, Vol. 43, No. 12, ACM Press.","DOI":"10.1145\/355112.355128"},{"key":"7_CR13","unstructured":"Keen, P. Balance, C. Chan, S. & Schrump, S. (2000), Electronic Commerce Relationships: Trust by Design, Prentice Hall."},{"key":"7_CR14","unstructured":"Kim, K. & Prabhakar, B. (2000) Initial Trust, Perceived Risk, and the Adoption of Internet Banking, [Online], Available: http:\/\/research.is.uc.edu\/bipin\/Research\/TrustIB.htm [2002,March 27]."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"McNight, D. H. & Chervany, N. L. (2000) What is Trust? A Conceptual Analysis and an Interdisciplinary Model, Proceedings of the 6th Americas Conference on Information Systems.","DOI":"10.1080\/10864415.2001.11044235"},{"key":"7_CR16","unstructured":"Misztal, B. A. (1996) Trust in Modern Societies, Polity Press."},{"key":"7_CR17","unstructured":"Novak, T.P. Hoffman, D.L. & Peralta, M. (1998) Building Consumer Trust in Online Environments: The Case for Information Privacy, [Online], Available: http:\/\/elab.vanderbilt.edu\/research\/papers\/html\/manuscripts\/cacm.privacy98\/cacm.privacy98.htm [2002, March 27]."},{"key":"7_CR18","unstructured":"Papadopoulou, P. Kanellis, P. & Martakos, D. (2001) Investigating Trust in E-Commerce: A Literature Review and a Model for its Formation in Customer Relationships, Proceedings of the 7th Americas Conference on Information Systems."},{"key":"7_CR19","unstructured":"Ratnasingham, P. & Kumar, K. (2000) Trading Partner Trust in Electronic Commerce Participation, Proceedings of the 21st International Conference in Information Systems."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Ratnasingham, P. (1998) The Importance of Trust in Electronic Commerce, Internet Research: Electronic Networking Applications and Policy, Vol. 8, No. 4, MCB University Press.","DOI":"10.1108\/10662249810231050"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Schoder D. & Yin, P. L. (2000) Building Firm Trust Online, Communications of the ACM, Vol. 43, No. 12, ACM Press.","DOI":"10.1145\/355112.355127"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Seinauer, D. D. Wakid, S. A. & Rasberry, S. (1997) Trust and Traceability in Electronic Commerce, Standard View, Vol. 5, No. 3.","DOI":"10.1145\/266231.266239"},{"key":"7_CR23","unstructured":"Slovic, P. et al (2000) The Perception of Risk, Earthscan Publications."}],"container-title":["Lecture Notes in Computer Science","Object-Oriented Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46102-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T18:46:25Z","timestamp":1708109185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46102-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440871","9783540461029"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-46102-7_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}