{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:10:47Z","timestamp":1743023447759,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031579158"},{"type":"electronic","value":"9783031579165"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57916-5_4","type":"book-chapter","created":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T03:10:10Z","timestamp":1712545810000},"page":"38-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and Implementation of a Fuzzy-Based System for Assessment of Relational Trust"],"prefix":"10.1007","author":[{"given":"Shunya","family":"Higashi","sequence":"first","affiliation":[]},{"given":"Phudit","family":"Ampririt","sequence":"additional","affiliation":[]},{"given":"Ermioni","family":"Qafzezi","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Ikeda","sequence":"additional","affiliation":[]},{"given":"Keita","family":"Matsuo","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,9]]},"reference":[{"key":"4_CR1","unstructured":"Edelman: Edelman trust barometer 2023, January 2023. https:\/\/www.edelman.com\/trust\/2023\/trust-barometer. accessed Jan 2024"},{"issue":"1","key":"4_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1177\/0162243915608948","volume":"41","author":"M Ziewitz","year":"2016","unstructured":"Ziewitz, M.: Governing algorithms. Sci. Technol. Hum. Values 41(1), 16\u201330 (2016)","journal-title":"Sci. Technol. Hum. Values"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Heponiemi, T., Jormanainen, V., Leemann, L., Manderbacka, K., Aalto, A., Hyppnen, H.: Digital divide in perceived benefits of online health care and social welfare services: national cross-sectional survey study. J. Med. Internet Res. 22(7), e17616, 1\u201312 (2020)","DOI":"10.2196\/17616"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Chen, N., Cho, D.S.-Y.: A blockchain based autonomous decentralized online social network, pp. 186\u2013190 (2021)","DOI":"10.1109\/ICCECE51280.2021.9342564"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Adadi, A., Berrada, M.: Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE Access 6, 52:138\u201352:160 (2018)","DOI":"10.1109\/ACCESS.2018.2870052"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Zhu, L., Xu, X., Lu, Q., Governatori, G., Whittle, J.: AI and ethics - operationalising responsible AI. arXiv, abs\/2105.08867 (2021)","DOI":"10.1007\/978-3-030-72188-6_2"},{"issue":"1","key":"4_CR7","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1002\/pra2.2017.14505401012","volume":"54","author":"RD Frank","year":"2017","unstructured":"Frank, R.D., Chen, Z., Crawford, E., Suzuka, K., Yakel, E.: Trust in qualitative data repositories. Proc. Assoc. Inf. Sci. Technol. 54(1), 102\u2013111 (2017)","journal-title":"Proc. Assoc. Inf. Sci. Technol."},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TSUSC.2018.2839623","volume":"4","author":"U Jayasinghe","year":"2019","unstructured":"Jayasinghe, U., Lee, G., Um, T.-W., Shi, Q.: Machine learning based trust computational model for IoT services. IEEE Trans. Sustain. Comput. 4(1), 39\u201352 (2019)","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Schultz, C.D.: A trust framework model for situational contexts. pp. 1\u20137 (2006)","DOI":"10.1145\/1501434.1501494"},{"issue":"2","key":"4_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2815595","volume":"48","author":"J-H Cho","year":"2015","unstructured":"Cho, J.-H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. (CSUR) 48(2), 1\u201340 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"4_CR11","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/21.52551","volume":"20","author":"C-C Lee","year":"1990","unstructured":"Lee, C.-C.: Fuzzy logic control systems: fuzzy logic controller - part i. IEEE Trans. Syst. Man Cybern. 20(2), 404\u2013418 (1990)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"3","key":"4_CR12","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/5.364485","volume":"83","author":"J Mendel","year":"1995","unstructured":"Mendel, J.: Fuzzy logic systems for engineering: a tutorial. Proc. IEEE 83(3), 345\u2013377 (1995)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57916-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T03:20:41Z","timestamp":1712546441000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57916-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031579158","9783031579165"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57916-5_4","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"9 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}