{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:17Z","timestamp":1725494417518},"publisher-location":"Boston, MA","reference-count":30,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_11","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T18:12:08Z","timestamp":1194631928000},"page":"121-132","source":"Crossref","is-referenced-by-count":5,"title":["Exploratory survey on an Evaluation Model for a Sense of Security"],"prefix":"10.1007","author":[{"given":"Natsuko","family":"Hikage","sequence":"first","affiliation":[]},{"given":"Yuko","family":"Murayama","sequence":"additional","affiliation":[]},{"given":"Carl","family":"Hauser","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"D. Basin, S. M\u00f6dersheim and L. Vigan\u00f2: CDiff: a new reduction technique for constraint-based analysis of security protocols, Proc. of the 10th ACM conference on Computer and Communications Security, pp. 335\u2013344 (2003).","DOI":"10.1145\/948109.948154"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"W. Shi, H.S. Lee, C. Lu and T. Zhang: Attacks and risk analysis for hardware supported software copy protection systems, Proc. of the 4th ACM workshop on Digital rights management, pp. 54\u201362 (2004).","DOI":"10.1145\/1029146.1029156"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"J.J. Yan: A note on proactive password checking, Proc. of the 2001 workshop on New Security Paradigms, pp. 127\u2013135(2001).","DOI":"10.1145\/508171.508194"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1177\/001872676001300202","volume":"13","author":"M. Deutsh","year":"1960","unstructured":"M. Deutsh: The effect of motivational orientation upon trust and suspition, Human Relation, 13, pp. 123\u2013139(1960).","journal-title":"Human Relation"},{"key":"11_CR5","unstructured":"M. Deutsh: The resolution of conflict (Yale University Press, 1973)."},{"key":"11_CR6","unstructured":"D. Gambetta: Can we trust trust?, Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford, chapter 13, pp. 213\u2013237 (originally published from Basil Blackwell, 1988). Available at: http:\/\/www.sociology.ox.ac.uk\/papers\/gambetta213-237.pdf (Last Access: 9 Feb 2007)"},{"key":"11_CR7","unstructured":"S.P. Marsh: Formalising trust as computational concept, PhD Thesis, Department of Mathematics and Computer Science, University of Stirling (1994)."},{"issue":"12","key":"11_CR8","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/355112.355120","volume":"43","author":"B. Friedman","year":"2000","unstructured":"B. Friedman, P.H. Khan and D.C. Howe: Trust online, Communication of ACM, Vol. 43, No. 12, pp. 34\u201340(2000).","journal-title":"Communication of ACM"},{"key":"11_CR9","unstructured":"P. Lamsal: Understanding Trust and Security, Available at: http:\/\/www.es.helsinki.fi\/u\/lamsal\/asgn\/trust\/UnderstandingTrustAndSecurity.pdf (Last Access: 9 Feb 2007)."},{"key":"11_CR10","unstructured":"N. Dimmock, A. Belokosztolszki, D. Eyers, J. Baconand and K. Moody: Access management for distributed systems: Using trust and risk in role-based access control policies, Proc. of the ninth ACM symposium on Access Control Models and Technologies, pp. 156\u2013162(2004)."},{"issue":"7","key":"11_CR11","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1139922.1139924","volume":"49","author":"L.J. Hoffman","year":"2006","unstructured":"L.J. Hoffman, K. Lawson-Jenkins, J. Blum: Trust beyond security: an expanded trust model, Communications of the ACM, Vol. 49, No. 7, pp. 94\u2013101 (2006).","journal-title":"Communications of the ACM"},{"key":"11_CR12","unstructured":"Stephen Flowerday, Rossouw von Solms: Trust: An Element of Information security, Proc. of the IFIP TC-11 21st International Information Security Conference (SEC2006), pp. 87\u201398 (2006)."},{"issue":"4","key":"11_CR13","doi-asserted-by":"publisher","first-page":"967","DOI":"10.2307\/2578601","volume":"63","author":"J.D. Lewis","year":"1985","unstructured":"J.D. Lewis, and A. Weigert: Trust as a Social Reality, Social Forces, Vol. 63, No. 4, pp. 967\u2013985 (1985).","journal-title":"Social Forces"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"S. Xiao, and I. Benbasat: The formation of trust and distrust in recommendation agents in repeated interactions: a process-tracing analysis, Proc. of the 5th international conference on Electronic commerce (ICEC\u201903), pp. 287\u2013293 (2003).","DOI":"10.1145\/948005.948043"},{"issue":"1\u20132","key":"11_CR15","first-page":"181","volume":"4","author":"S. Xiao","year":"2004","unstructured":"S. Xiao and I. Benbasat: Understanding Customer Trust in Agent-Mediated Electronic Commerce, Web-Mediated Electronic Commerce, and Traditional Commerce, Information Technology and Management, Vol. 4, No. 1\u20132, Kluwer Academic Publishers, pp. 181\u2013207 (2004).","journal-title":"Information Technology and Management"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"K. Chopra, W.A. Wallace: Trust in Electronic Environments, Proc. of the 36th Hawaii International Conference on System Science (HICSS\u201903), pp. 331\u2013340 (2003).","DOI":"10.1109\/HICSS.2003.1174902"},{"key":"11_CR17","unstructured":"H.H Kuan, and G.W. Bock: The Collective Reality of Trust: An Investigation of Social Relations and Networks on Trust in Multi-Channel Retailers, Proc. of the 13th European Conference on Information Systems (ECIS 2005), Available at: http:\/\/is2.lse.ac.uk\/asp\/aspecis\/20050018.pdf (Last Access: 9 Feb 2007)"},{"key":"11_CR18","unstructured":"Yamagishi, T.: The structure of trust: The evolutionary games of mind and society (Tokyo University Press, 1998). English version is available at: http:\/\/www.lynx.let.hokudai.ac.jp\/members\/yamagishi\/english.htm (Last Access: 9 Feb 2007)."},{"key":"11_CR19","first-page":"1","volume":"1","author":"T. Kikkawa","year":"2003","unstructured":"T. Kikkawa, S. Shirato, S. Fujiiand and K. Takemura:The pursuit of informed reassurance (\u2018An-Shin\u2019 in Society) and technological safety(\u2018An-Zen\u2019), Journal of SHAKAI-GIJUTSU, Vol. 1, pp. 1\u20138 (2003). in Japanese.","journal-title":"Journal of SHAKAI-GIJUTSU"},{"key":"11_CR20","unstructured":"A. Whitten and D. Tygar: Why Johnny Can\u2019t Encrypt: A Usability Evaluation of PGP 5.0, Proc. of the 9th USENIX Security Symposium, pp. 169\u2013184 (1999)."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"R.T. Stephens: A framework for the identification of electronic commerce design elements that enable trust within the small hotel industry, Proc. of ACMSE\u201904, pp. 309\u2013314 (2004).","DOI":"10.1145\/986537.986613"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"P. Pu, L. Chen: Trust building with explanation interfaces, Proc. of the 11th international conference on Intelligent user interfaces (IUI\u201906), pp. 93\u2013100 (2006).","DOI":"10.1145\/1111449.1111475"},{"issue":"1","key":"11_CR23","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/642611.642634","volume":"5","author":"J. Riegelsberger","year":"2003","unstructured":"J. Riegelsberger, M.A. Sasse and J.D. McCarthy: Privacy and trust: Shiny happy people building trust?: photos on e-commerce websites and consumer trust, Proc. of the SIGCHI conference on Human factors in computing systems (CHI\u201903), Vol. 5, No. 1, pp. 121\u2013128 (2003).","journal-title":"Proc. of the SIGCHI conference on Human factors in computing systems (CHI\u201903)"},{"key":"11_CR24","unstructured":"Sapient & Cheskin: eCommerce Trust, 1999"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Beck, A.T.: Cognitive Therapy of Depression (Guilford Press 1979).","DOI":"10.1007\/978-1-4684-2397-6_13"},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/HICSS.2006.46","volume":"8","author":"Y. Murayama","year":"2006","unstructured":"Y. Murayama, N. Hikage, C. Hauser, B. Chakraborty and N. Segawa: An Anshin Model for the Evaluation of the Sense of Security, Proc. of Hawaii International Conference on System Science (HICSS\u201906), Vol. 8, p. 205a (2006).","journal-title":"Proc. of Hawaii International Conference on System Science (HICSS\u201906)"},{"key":"11_CR27","unstructured":"T. Tomita, K. Suzumura and Y. Murayama: Proposal for Under the Door Communication on the network, Human-Computer Interaction: Theory and Practice(Part II), pp. 1019\u20131023 (2003)."},{"key":"11_CR28","unstructured":"R.H. Alschuler and H.L. Berta: Painting and Personality, University of Chicago Press, Vol. 1 (1947)."},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"D.J. Kim, C. Steinfield and Y. Lai: Revisiting the Role of Web Assurance Seals in Consumer Trust, Proc. of the 6th international conference on Electronic Commerce, pp. 280\u2013287 (2004).","DOI":"10.1145\/1052220.1052256"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"R. Dhamija, J.D Tygar. and M. Hearst: Why phishing works, Proc. of the SIGCHI conference on Human Factors in computing systems (CHF\u201906), pp. 581\u2013590 (2006).","DOI":"10.1145\/1124772.1124861"}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T03:07:07Z","timestamp":1630033627000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_11","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}