{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:52:29Z","timestamp":1726037549058},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_55","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:19:24Z","timestamp":1563391164000},"page":"618-631","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey"],"prefix":"10.1007","author":[{"given":"Jie","family":"Jian","sequence":"first","affiliation":[]},{"given":"Xiaoming","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yufei","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"2","key":"55_CR1","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIC.2013.20","volume":"17","author":"M Allahbakhsh","year":"2013","unstructured":"Allahbakhsh, M., Benatallah, B., Ignjatovic, A., et al.: Quality control in crowdsourcing systems: issues and directions. IEEE Internet Comput. 17(2), 76\u201381 (2013)","journal-title":"IEEE Internet Comput."},{"issue":"8","key":"55_CR2","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1080\/13691181003624090","volume":"13","author":"DC Brabham","year":"2010","unstructured":"Brabham, D.C.: Moving the crowd at threadless: motivations for participation in a crowdsourcing application. Inf. Commun. Soc. 13(8), 1122\u20131145 (2010)","journal-title":"Inf. Commun. Soc."},{"issue":"2","key":"55_CR3","doi-asserted-by":"publisher","first-page":"207","DOI":"10.14257\/ijunesst.2016.9.2.21","volume":"9","author":"YS Chi","year":"2016","unstructured":"Chi, Y.S., Kang, M.Y., Han, K.S., et al.: A study on the discontinuance intention on O2O commerce: with a focus on the mediating effects of perceived risk and user resistance. Int. J. u- and e-Service 9(2), 207\u2013218 (2016)","journal-title":"Int. J. u- and e-Service"},{"issue":"5","key":"55_CR4","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1016\/j.indmarman.2013.05.006","volume":"42","author":"S Djelassi","year":"2013","unstructured":"Djelassi, S., Decoopman, I.: Customers\u2019 participation in product development through crowdsourcing: issues and implications. Ind. Mark. Manag. 42(5), 683\u2013692 (2013)","journal-title":"Ind. Mark. Manag."},{"key":"55_CR5","volume-title":"Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research","author":"M Fishbein","year":"1975","unstructured":"Fishbein, M., Ajzen, I.: Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading (1975)"},{"issue":"3","key":"55_CR6","first-page":"17","volume":"154","author":"FG Hendrix","year":"2015","unstructured":"Hendrix, F.G.: The total cost of manufacturing \u2026 money, time and risk. Manuf. Eng. 154(3), 17\u201318 (2015)","journal-title":"Manuf. Eng."},{"key":"55_CR7","volume-title":"Crowdsourcing","author":"J Howe","year":"2008","unstructured":"Howe, J.: Crowdsourcing. Crown Publishing Group, New York (2008)"},{"key":"55_CR8","volume-title":"Psychometric Theory","author":"JC Nunnally","year":"1978","unstructured":"Nunnally, J.C.: Psychometric Theory. McGraw-Hill, New York (1978)"},{"key":"55_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10696679.1999.11501836","volume":"3","author":"DN Lascu","year":"1999","unstructured":"Lascu, D.N., Zinkhan, G.: Consumer conformity: review and application for marketing theory and practice. J. Mark. Theory Pract. 3, 1\u201312 (1999)","journal-title":"J. Mark. Theory Pract."},{"issue":"1","key":"55_CR10","first-page":"137","volume":"55","author":"D Li","year":"2018","unstructured":"Li, D., et al.: Modelling the roles of cewebrity trust and platform trust in consumers propensity of live-streaming an extended TAM method. Comput. Mater. Continua 55(1), 137 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"2","key":"55_CR11","first-page":"164","volume":"16","author":"M Jing","year":"2007","unstructured":"Jing, M., Zhou, Y., Wang, F.: Empirical study on shopping perceived risk. J. Syst. Manag. 16(2), 164\u2013169 (2007)","journal-title":"J. Syst. Manag."},{"issue":"1","key":"55_CR12","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1086\/208613","volume":"2","author":"JP Peter","year":"1975","unstructured":"Peter, J.P., Tarpey, L.X.: A comparative analysis of three-consumer decision strategies. J. Consum. Res. 2(1), 29\u201337 (1975)","journal-title":"J. Consum. Res."},{"key":"55_CR13","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1086\/209386","volume":"21","author":"R Staelin","year":"1994","unstructured":"Staelin, R.: A model of perceived risk and intended risk-handling activity. J. Consum. Res. 21, 119\u2013134 (1994)","journal-title":"J. Consum. Res."},{"issue":"1","key":"55_CR14","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.ausmj.2011.10.014","volume":"20","author":"Y Sheau-Fen","year":"2012","unstructured":"Sheau-Fen, Y., Sun-May, L., Yu-Ghee, W.: Store brand proneness: effects of perceived risks, quality and familiarity. Australas. Mark. J. 20(1), 48\u201358 (2012)","journal-title":"Australas. Mark. J."},{"issue":"1","key":"55_CR15","doi-asserted-by":"crossref","first-page":"81","DOI":"10.32604\/cmc.2018.03259","volume":"57","author":"T Wang","year":"2018","unstructured":"Wang, T., Wu, T., Ashrafzadeh, A.H., He, J.: Crowdsourcing-based framework for teaching quality evaluation and feedback using linguistic 2-tuple. CMC: Comput. Mater. Continua 57(1), 81\u201396 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"55_CR16","doi-asserted-by":"crossref","unstructured":"Wiggins, A., Crowston, K.: From conservation to crowdsourcing: a typology of citizen science. In: Proceedings of the Forty-fourth Hawaii International Conference on System Science (HICSS-44) (2011)","DOI":"10.1109\/HICSS.2011.207"},{"issue":"4","key":"55_CR17","doi-asserted-by":"publisher","first-page":"57","DOI":"10.2753\/JEC1086-4415150402","volume":"15","author":"HC Zheng","year":"2011","unstructured":"Zheng, H.C., Li, D.H., Hou, W.H.: Task design, motivation, and participation in crowdsourcing contests. Int. J. Electron. Commer. 15(4), 57\u201388 (2011)","journal-title":"Int. J. Electron. Commer."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T06:26:45Z","timestamp":1695018405000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}