{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:25:23Z","timestamp":1743002723112,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319072265"},{"type":"electronic","value":"9783319072272"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07227-2_7","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:44:08Z","timestamp":1402404248000},"page":"57-68","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of Demographical Factors\u2019 Influence on Websites\u2019 Credibility Evaluation"],"prefix":"10.1007","author":[{"given":"Maria","family":"Rafalak","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Bilski","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Wierzbicki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"7_CR1","doi-asserted-by":"publisher","first-page":"1387","DOI":"10.1016\/j.chb.2013.01.036","volume":"29","author":"T. Lucassen","year":"2013","unstructured":"Lucassen, T., Schraagen, M.: The inuence of source cues and topic familiarity on credibility evaluation. Computers in Human Behavior\u00a029(4), 1387\u20131392 (2013)","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1177\/107769908706400104","volume":"64","author":"T. Rimmer","year":"1987","unstructured":"Rimmer, T., Weaver, F.: Different questions, different answers? media use and media credibility. Journalism & Mass Communication Quarterly\u00a064(1), 28\u201344 (1987)","journal-title":"Journalism & Mass Communication Quarterly"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Morris, M., Counts, S., Roseway, A., Ho, A., Schwarz, J.: Tweeting is believing?: understanding microblog credibility perceptions. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, pp. 441\u2013450. ACM (2012)","DOI":"10.1145\/2145204.2145274"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Fogg, B.J.: Prominence-interpretation theory: explaining how people assess credibility online. In: CHI 2003 Extended Abstracts on Human Factors in Computing Systems, pp. 722\u2013723 (2003)","DOI":"10.1145\/765891.765951"},{"issue":"3","key":"7_CR5","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1111\/j.1460-2466.2010.01488.x","volume":"60","author":"M. Metzger","year":"2010","unstructured":"Metzger, M., Flanagin, A., Medders, R.: Social and heuristic approaches to credibility evaluation online. Journal of Communication\u00a060(3), 413\u2013439 (2010)","journal-title":"Journal of Communication"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Kostakos, V.: Is the crowd\u2019s wisdom biased? a quantitative analysis of three online communities. In: Computational Science and Engineering International Conference, vol.\u00a04, pp. 251\u2013255. IEEE (2009)","DOI":"10.1109\/CSE.2009.491"},{"key":"7_CR7","first-page":"42","volume":"13","author":"D. Weijia","year":"2012","unstructured":"Weijia, D., Jin, G., Lee, J., Luca, M.: Optimal Aggregation of Consumer Ratings: An Application to Yelp.com. Harvard Business School Working Paper\u00a013, 42 (2012)","journal-title":"Harvard Business School Working Paper"},{"issue":"5762","key":"7_CR8","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1126\/science.1121066","volume":"311","author":"M.J. Salganik","year":"2006","unstructured":"Salganik, M.J., Dodds, P.S., Watts, D.J.: Experimental Study of Inequality and Unpredictability in an Artificial Cultural Market. Science\u00a0311(5762), 854\u2013856 (2006)","journal-title":"Science"},{"issue":"2","key":"7_CR9","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1287\/mnsc.1120.1609","volume":"59","author":"G. Bolton","year":"2013","unstructured":"Bolton, G., Greiner, B., Ockenfels, A.: Engineering trust: reciprocity in the production of reputation information. Management Science\u00a059(2), 265\u2013285 (2013)","journal-title":"Management Science"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-540-71663-1_14","volume-title":"Transactions on Rough Sets VII","author":"T.R. Hvidsten","year":"2007","unstructured":"Hvidsten, T.R., Komorowski, J.: Rough Sets in Bioinformatics. In: Peters, J.F., Skowron, A., Marek, V.W., Or\u0142owska, E., S\u0142owi\u0144ski, R., Ziarko, W.P. (eds.) Transactions on Rough Sets VII. LNCS, vol.\u00a04400, pp. 225\u2013243. Springer, Heidelberg (2007)"},{"issue":"3","key":"7_CR11","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/S0377-2217(01)00259-4","volume":"141","author":"E.H. Tay","year":"2002","unstructured":"Tay, E.H., Shen, L.: Economic and Financial Prediction Using Rough Sets Model. European Journal of Operational Research\u00a0141(3), 641\u2013659 (2002)","journal-title":"European Journal of Operational Research"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Sikora, M., Sikora, B.: Rough Natural Hazards Monitoring, Rough Sets: Selected Methods and Applications in Management and Engineering. In: Advanced Information and Knowledge Processing, pp. 163\u2013179 (2012)","DOI":"10.1007\/978-1-4471-2760-4_10"},{"issue":"3","key":"7_CR13","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/TIM.2010.2060225","volume":"60","author":"P. Bilski","year":"2011","unstructured":"Bilski, P., Wojciechowski, J.: Rough-Sets-Based Reduction for Analog Systems Diagnostics. IEEE Transactions on Instrumentation and Measurement\u00a060(3), 880\u2013890 (2011)","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"issue":"3","key":"7_CR14","first-page":"725","volume":"3","author":"S. Tan","year":"2007","unstructured":"Tan, S., Cheng, X., Xu, H.: An Efficient Global Optimization Approach for Rough Set Based Dimensionalty Reduction. International Journal of Innovative Computing, Information and Control\u00a03(3), 725\u2013736 (2007)","journal-title":"International Journal of Innovative Computing, Information and Control"},{"issue":"5","key":"7_CR15","first-page":"341","volume":"11","author":"Z. Pawlak","year":"1982","unstructured":"Pawlak, Z.: Rough sets. International Journal of Parallel Programming\u00a011(5), 341\u2013356 (1982)","journal-title":"International Journal of Parallel Programming"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Pawlak, Z., Grzymala-Busse, J., Slowinski, R., Ziarko, W.: Rough Sets. Communications of the ACM\u00a038\u201311, 88\u201395 (1995)","DOI":"10.1145\/219717.219791"},{"key":"7_CR17","unstructured":"\u00d6hrn, A., Komorowski, J.: ROSETTA: a rough set toolkit for analysis of data. In: Proceedings of the Third Joint Annual Conference on Information Sciences, Durham, NC, pp. 403\u2013407 (1997)"},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.pragma.2013.07.012","volume":"59","author":"M. Metzger","year":"2013","unstructured":"Metzger, M., Flanagin, A.: Credibility and trust of information in online environments: The use of cognitive heuristics. Journal of Pragmatics\u00a059, 210\u2013220 (2013)","journal-title":"Journal of Pragmatics"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1111\/j.1465-7295.1998.tb01740.x","volume":"36","author":"N. Jianakoplos","year":"1998","unstructured":"Jianakoplos, N., Bernasek, A.: Are women more risk averse? Economic Inquiry\u00a036, 620\u2013630 (1998)","journal-title":"Economic Inquiry"},{"issue":"2","key":"7_CR20","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S0165-1765(02)00045-9","volume":"76","author":"P. Dwyera","year":"2002","unstructured":"Dwyera, P., Gilkesonb, J., List, J.: Gender differences in revealed risk taking: evidence from mutual fund investors. Economics Letters\u00a076(2), 151\u2013158 (2002)","journal-title":"Economics Letters"},{"issue":"3-4","key":"7_CR21","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1016\/j.jebo.2007.10.006","volume":"68","author":"N. Buchana","year":"2008","unstructured":"Buchana, N., Crosonb, R., Solnickc, S.: Trust and gender: An examination of behavior and beliefs in the Investment Game. Journal of Economic Behavior & Organization\u00a068(3-4), 466\u2013476 (2008)","journal-title":"Journal of Economic Behavior & Organization"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Kosinski, M., Stillwell, D.J., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences (PNAS) (2013)","DOI":"10.1073\/pnas.1218772110"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction. Applications and Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07227-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:55:23Z","timestamp":1582412123000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07227-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319072265","9783319072272"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07227-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}