{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:58:33Z","timestamp":1743091113582,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031147845"},{"type":"electronic","value":"9783031147852"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-14785-2_1","type":"book-chapter","created":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T15:09:08Z","timestamp":1661180948000},"page":"3-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Meeting Strangers Online: Feature Models for\u00a0Trustworthiness Assessment"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9319-5024","authenticated-orcid":false,"given":"Angela","family":"Borchert","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6304-771X","authenticated-orcid":false,"given":"Nicol\u00e1s E. D\u00edaz","family":"Ferreyra","sequence":"additional","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,16]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Obada-Obieh, B., Somayaji, A.: Can I believe you? Establishing trust in computer mediated introductions. In: Proceedings of the 2017 New Security Paradigms Workshop, pp. 94\u2013106 (2017)","key":"1_CR1","DOI":"10.1145\/3171533.3171544"},{"issue":"7","key":"1_CR2","doi-asserted-by":"publisher","first-page":"2965","DOI":"10.1007\/s10508-021-01962-5","volume":"50","author":"K Jozsa","year":"2021","unstructured":"Jozsa, K., Kraus, A., Korpak, A.K., Birnholtz, J., Moskowitz, D.A., Macapagal, K.: \u201cSafe behind my screen\u2019\u2019: adolescent sexual minority males\u2019 perceptions of safety and trustworthiness on geosocial and social networking apps. Arch. Sex. Behav. 50(7), 2965\u20132980 (2021). https:\/\/doi.org\/10.1007\/s10508-021-01962-5","journal-title":"Arch. Sex. Behav."},{"issue":"1","key":"1_CR3","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ipm.2019.102108","volume":"57","author":"J Yi","year":"2020","unstructured":"Yi, J., Yuan, G., Yoo, C.: The effect of the perceived risk on the adoption of the sharing economy in the tourism industry: the case of Airbnb. Inf. Process. Manage. 57(1), 102\u2013108 (2020)","journal-title":"Inf. Process. Manage."},{"issue":"3","key":"1_CR4","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1080\/13698570701488936","volume":"9","author":"D Couch","year":"2007","unstructured":"Couch, D., Liamputtong, P.: Online dating and mating: perceptions of risk and health among online users. Health Risk Soc. 9(3), 275\u2013294 (2007)","journal-title":"Health Risk Soc."},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"503","DOI":"10.2307\/25148854","volume":"32","author":"JY Son","year":"2008","unstructured":"Son, J.Y., Kim, S.S.: Internet users\u2019 information privacy-protective responses: a taxonomy and a nomological model. MIS Q. 32, 503\u2013529 (2008)","journal-title":"MIS Q."},{"issue":"17","key":"1_CR6","doi-asserted-by":"publisher","first-page":"3602","DOI":"10.3390\/app9173602","volume":"9","author":"L Hang","year":"2019","unstructured":"Hang, L., Kim, D.H.: SLA-based sharing economy service with smart contract for resource integrity in the internet of things. Appl. Sci. 9(17), 3602 (2019)","journal-title":"Appl. Sci."},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1111\/j.1467-6486.2008.00766.x","volume":"45","author":"M Becerra","year":"2008","unstructured":"Becerra, M., Lunnan, R., Huemer, L.: Trustworthiness, risk, and the transfer of tacit and explicit knowledge between alliance partners. J. Manage. Stud. 45(4), 691\u2013713 (2008)","journal-title":"J. Manage. Stud."},{"unstructured":"Lewicki, R.J., Wiethoff, C.: Trust, Trust Development, and Trust Repair. The Handbook of Conflict Resolution: Theory and Practice 1(1), 86\u2013107 (2000)","key":"1_CR8"},{"doi-asserted-by":"crossref","unstructured":"Bialski, P., Batorski, D.: From online familiarity to offline trust: how a virtual community creates familiarity and trust between strangers. Social Computing and Virtual Communities, pp. 179\u2013204 (2010)","key":"1_CR9","DOI":"10.1201\/9781420090437-c8"},{"issue":"1","key":"1_CR10","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1037\/a0028930","volume":"142","author":"JF Bonnefon","year":"2013","unstructured":"Bonnefon, J.F., Hopfensitz, A., De Neys, W.: The modular nature of trustworthiness detection. J. Exp. Psychol. Gen. 142(1), 143 (2013)","journal-title":"J. Exp. Psychol. Gen."},{"issue":"3","key":"1_CR11","doi-asserted-by":"publisher","first-page":"2700","DOI":"10.1016\/j.eswa.2011.08.127","volume":"39","author":"S Ding","year":"2012","unstructured":"Ding, S., Yang, S.L., Fu, C.: A novel evidential reasoning based method for software trustworthiness evaluation under the uncertain and unreliable environment. Expert Syst. Appl. 39(3), 2700\u20132709 (2012)","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Borchert, A., D\u00edaz Ferreyra, N.E., Heisel, M.: Building trustworthiness in computer-mediated introduction: a facet-oriented framework. In: International Conference on Social Media and Society, pp. 39\u201346 (2020)","key":"1_CR12","DOI":"10.1145\/3400806.3400812"},{"issue":"12","key":"1_CR13","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/355112.355123","volume":"43","author":"J Cassell","year":"2000","unstructured":"Cassell, J., Bickmore, T.: External manifestations of trustworthiness in the interface. Commun. ACM 43(12), 50\u201356 (2000)","journal-title":"Commun. ACM"},{"issue":"5","key":"1_CR14","first-page":"261","volume":"3","author":"AK Mishra","year":"1996","unstructured":"Mishra, A.K.: Organizational responses to crisis. Trust in organizations. Front. Theor. Res. 3(5), 261\u2013287 (1996)","journal-title":"Front. Theor. Res."},{"issue":"2","key":"1_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1985347.1985353","volume":"2","author":"DH Mcknight","year":"2011","unstructured":"Mcknight, D.H., Carter, M., Thatcher, J.B., Clay, P.F.: Trust in a specific technology: an investigation of its components and measures. ACM Trans. Manage. Inf. Syst. 2(2), 1\u201325 (2011)","journal-title":"ACM Trans. Manage. Inf. Syst."},{"issue":"3","key":"1_CR16","doi-asserted-by":"publisher","first-page":"709","DOI":"10.2307\/258792","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709\u2013734 (1995)","journal-title":"Acad. Manag. Rev."},{"issue":"1","key":"1_CR17","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1002\/cb.235","volume":"7","author":"OB B\u00fcttner","year":"2008","unstructured":"B\u00fcttner, O.B., G\u00f6ritz, A.S.: Perceived trustworthiness of online shops. J. Consum. Behav. 7(1), 35\u201350 (2008)","journal-title":"J. Consum. Behav."},{"issue":"2","key":"1_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1080\/10864415.2001.11044235","volume":"6","author":"DH McKnight","year":"2001","unstructured":"McKnight, D.H., Chervany, N.L.: What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. Int. J. Electron. Commer. 6(2), 35\u201359 (2001)","journal-title":"Int. J. Electron. Commer."},{"issue":"1","key":"1_CR19","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/info13010034","volume":"13","author":"A Borchert","year":"2022","unstructured":"Borchert, A., Heisel, M.: The role of trustworthiness facets for developing social media applications: a structured literature review. Information 13(1), 34 (2022)","journal-title":"Information"},{"doi-asserted-by":"crossref","unstructured":"Hsi, I., Potts, C.: Studying the evolution and enhancement of software features. In: icsm, p. 143 (2000)","key":"1_CR20","DOI":"10.1109\/ICSM.2000.883033"},{"unstructured":"Anton, A.I.: Goal identification and refinement in the specification of software-based information systems. Georgia Institute of Technology (1997)","key":"1_CR21"},{"doi-asserted-by":"crossref","unstructured":"Glinz, M.: On non-functional requirements. In: 15th IEEE International Requirements Engineering Conference, pp. 21\u201326. IEEE (2007)","key":"1_CR22","DOI":"10.1109\/RE.2007.45"},{"unstructured":"User Interface Design Patterns. www.cs.helsinki.fi\/u\/salaakso\/patterns\/. Accessed 11 Apr 2022","key":"1_CR23"},{"unstructured":"Welie.com - Patterns in Interaction Design. www.welie.com\/patterns\/index.php. Accessed 11 Apr 2022","key":"1_CR24"},{"doi-asserted-by":"crossref","unstructured":"Zetterholm, M., Elm, P., Salavati, S.: Designing for pandemics: a design concept based on technology mediated nudging for health behavior change. In: 54th Hawaii International Conference on System Sciences, pp. 3474\u20133483 (2021)","key":"1_CR25","DOI":"10.24251\/HICSS.2021.422"},{"unstructured":"Meske, C., Potthoff, T.: The DINU-model-a process model for the design of nudges (2017)","key":"1_CR26"},{"issue":"3","key":"1_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3054926","volume":"50","author":"A Acquisti","year":"2017","unstructured":"Acquisti, A., et al.: Nudges for privacy and security: understanding and assisting users\u2019 choices online. ACM Comput. Surv. 50(3), 1\u201341 (2017)","journal-title":"ACM Comput. Surv."},{"doi-asserted-by":"crossref","unstructured":"Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1\u20137 (2009)","key":"1_CR28","DOI":"10.1145\/1541948.1541999"},{"unstructured":"Thaler, R.H., Sunstein, C.R.: Nudge: Wie man kluge Entscheidungen anst\u00f6\u00dft. Ullstein eBooks (2009)","key":"1_CR29"},{"issue":"4","key":"1_CR30","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1007\/s10603-014-9273-1","volume":"37","author":"CR Sunstein","year":"2014","unstructured":"Sunstein, C.R.: Nudging: a very short guide. J. Consum. Policy 37(4), 583\u2013588 (2014)","journal-title":"J. Consum. Policy"},{"doi-asserted-by":"crossref","unstructured":"Kang, K.C., Cohen, S.G., Hess, J.A., Novak, W.E., Peterson, A.S.: Feature-oriented domain analysis (FODA) feasibility study. Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst. (1990)","key":"1_CR31","DOI":"10.21236\/ADA235785"},{"unstructured":"Czarnecki, K., Eisenecker, U.W.: Generative programming (2000)","key":"1_CR32"},{"doi-asserted-by":"crossref","unstructured":"Pohl, K., B\u00f6ckle, G., Van Der Linden, F.: Software product line engineering: foundations, principles, and techniques, vol. 1. Springer, Heidelberg (2005)","key":"1_CR33","DOI":"10.1007\/3-540-28901-1"},{"unstructured":"Riebisch, M.: Towards a more precise definition of feature models. Model. Variability Object-Oriented Prod. Lines 64\u201376 (2003)","key":"1_CR34"},{"key":"1_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/11431855_34","volume-title":"Advanced Information Systems Engineering","author":"D Benavides","year":"2005","unstructured":"Benavides, D., Trinidad, P., Ruiz-Cort\u00e9s, A.: Automated reasoning on feature models. In: Pastor, O., Falc\u00e3o e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 491\u2013503. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11431855_34"},{"doi-asserted-by":"publisher","unstructured":"Xiong, J.: New Software Engineering Paradigm Based on Complexity Science: An Introduction to NSE. Springer, NY (2011). https:\/\/doi.org\/10.1007\/978-1-4419-7326-9","key":"1_CR36","DOI":"10.1007\/978-1-4419-7326-9"},{"unstructured":"Arnowitz, J., Arent, M., Berger, N.: Effective Prototyping for Software Makers. Elsevier (2010)","key":"1_CR37"},{"key":"1_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-030-49570-1_24","volume-title":"Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis","author":"M Simmons","year":"2020","unstructured":"Simmons, M., Lee, J.S.: Catfishing: a look into online dating and impersonation. In: Meiselwitz, G. (ed.) HCII 2020. LNCS, vol. 12194, pp. 349\u2013358. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49570-1_24"},{"unstructured":"Kaskazi, A.: Social network identity: Facebook, Twitter and identity negotiation theory. In: iConference 2014 Proceedings (2014)","key":"1_CR39"},{"issue":"3","key":"1_CR40","doi-asserted-by":"publisher","first-page":"487","DOI":"10.3758\/BF03200730","volume":"31","author":"SJ Mcdougall","year":"1999","unstructured":"Mcdougall, S.J., Curry, M.B., De Bruijn, O.: Measuring symbol and icon characteristics: norms for concreteness, complexity, meaningfulness, familiarity, and semantic distance for 239 symbols. Behav. Res. Meth. Instrum. Comput. 31(3), 487\u2013519 (1999). https:\/\/doi.org\/10.3758\/BF03200730","journal-title":"Behav. Res. Meth. Instrum. Comput."},{"key":"1_CR41","first-page":"233","volume":"88","author":"CM Koch","year":"2017","unstructured":"Koch, C.M.: To catch a catfish: a statutory solution for victims of online impersonation. U. Colo. L. Rev. 88, 233 (2017)","journal-title":"U. Colo. L. Rev."},{"key":"1_CR42","first-page":"35","volume":"13","author":"C Martinez","year":"2014","unstructured":"Martinez, C., D\u00edaz, N., Gonnet, S., Leone, H.: A Petri net variability model for software product lines. Electron. J. SADIO (EJS) 13, 35\u201353 (2014)","journal-title":"Electron. J. SADIO (EJS)"},{"unstructured":"Benavides, D., Segura, S., Trinidad, P., Cort\u00e9s, A.R.: FAMA: tooling a framework for the automated analysis of feature models. VaMoS (2007)","key":"1_CR43"},{"key":"1_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-540-24667-1_13","volume-title":"Software Product-Family Engineering","author":"T von der Ma\u00dfen","year":"2004","unstructured":"von der Ma\u00dfen, T., Lichter, H.: RequiLine: a requirements engineering tool for software product lines. In: van der Linden, F.J. (ed.) PFE 2003. LNCS, vol. 3014, pp. 168\u2013180. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24667-1_13"},{"issue":"1","key":"1_CR45","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1037\/h0071663","volume":"4","author":"EL Thorndike","year":"1920","unstructured":"Thorndike, E.L.: A constant error in psychological ratings. J. Appl. Psychol. 4(1), 25 (1920)","journal-title":"J. Appl. Psychol."},{"key":"1_CR46","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.jss.2015.08.035","volume":"110","author":"AS Campanelli","year":"2015","unstructured":"Campanelli, A.S., Parreiras, F.S.: Agile methods tailoring-a systematic literature review. J. Syst. Softw. 110, 85\u2013100 (2015)","journal-title":"J. Syst. Softw."},{"issue":"5","key":"1_CR47","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1093\/iwc\/iwt048","volume":"26","author":"T Yang","year":"2014","unstructured":"Yang, T., Bolchini, D.: Branded interactions: predicting perceived product traits and user image from interface consistency and visual guidance. Interact. Comput. 26(5), 465\u2013487 (2014)","journal-title":"Interact. Comput."},{"doi-asserted-by":"crossref","unstructured":"Metzger, A., Pohl, K.: Software product line engineering and variability management: achievements and challenges. In: Future of Software Engineering Proceedings, pp. 70\u201384 (2014)","key":"1_CR48","DOI":"10.1145\/2593882.2593888"}],"container-title":["Lecture Notes in Computer Science","Human-Centered Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-14785-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T15:12:28Z","timestamp":1669993948000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-14785-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031147845","9783031147852"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-14785-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Centred Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Eindhoven","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcse2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hcse-conference.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Additionally, 2 demo\/poster papers underwent single-blind review and were accepted.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}