{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:39:38Z","timestamp":1725799178412},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319097695"},{"type":"electronic","value":"9783319097701"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09770-1_8","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T07:25:20Z","timestamp":1408433120000},"page":"83-93","source":"Crossref","is-referenced-by-count":1,"title":["Towards an Understanding of the Formation and Retention of Trust in Cloud Computing: A Research Agenda, Proposed Research Methods and Preliminary Results"],"prefix":"10.1007","author":[{"given":"Marc","family":"Walterbusch","sequence":"first","affiliation":[]},{"given":"Frank","family":"Teuteberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Walterbusch, M., Martens, B., Teuteberg, F.: Exploring Trust in Cloud Computing: A Multi-Method Approach. In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013). Utrecht (2013)"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.2753\/JEC1086-4415150401","volume":"15","author":"A. Benlian","year":"2011","unstructured":"Benlian, A., Hess, T.: The Signaling Role of IT Features in Influencing Trust and Participation in Online Communities. International Journal of Electronic Commerce\u00a015, 7\u201356 (2011)","journal-title":"International Journal of Electronic Commerce"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. Josang","year":"2007","unstructured":"Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043, 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"key":"8_CR4","first-page":"7","volume":"2","author":"D. Gefen","year":"2003","unstructured":"Gefen, D., Straub, D.W.: Managing User Trust in B2C e-Services. Florida Libraries\u00a02, 7\u201324 (2003)","journal-title":"Florida Libraries"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing - Recommendations of the National Institute of Standards and Technology (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Pearson, S., Benameur, A.: Privacy, Security and Trust Issues Arising from Cloud Computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science, pp. 693\u2013702 (2010)","DOI":"10.1109\/CloudCom.2010.66"},{"key":"8_CR7","first-page":"13","volume":"26","author":"J. Webster","year":"2002","unstructured":"Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: Writing a Literature Review. MIS Quarterly\u00a026, 13\u201323 (2002)","journal-title":"MIS Quarterly"},{"key":"8_CR8","unstructured":"Vom Brocke, J., Simons, A., Niehaves, B., Riemer, K., Plattfaut, R., Cleven, A.: Reconstructing the Giant: On the Importance of Rigour in Documenting the Literature Search Process. In: Proceedings of the European Conference on Information Systems. Verona, Italy (2009)"},{"key":"8_CR9","unstructured":"Goyal, S., Limayem, M., Davis, F.: Unfulfilled Obligations in Recommendation Agent Use. In: Proceedings of the International Conference on Information Systems 2012, pp. 1\u201315 (2013)"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1111\/j.1365-2702.1996.tb00253.x","volume":"5","author":"D. Gould","year":"1996","unstructured":"Gould, D.: Using vignettes to collect data for nursing research studies: How valid are the findings? Journal of Clinical Nursing\u00a05, 207\u2013212 (1996)","journal-title":"Journal of Clinical Nursing"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1287\/isre.1110.0364","volume":"23","author":"A. Dennis","year":"2012","unstructured":"Dennis, A., Robert, L.: Trust Is in the Eye of the Beholder: A Vignette Study of Postevent Behavioral Controls\u2019 Effects on Individual Trust in Virtual Teams. Information Systems Research\u00a023, 546\u2013558 (2012)","journal-title":"Information Systems Research"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"241","DOI":"10.2753\/MIS0742-1222260210","volume":"26","author":"L.P. Robert","year":"2009","unstructured":"Robert, L.P., Denis, A.R., Hung, Y.-T.C.: Individual Swift Trust and Knowledge-Based Trust in Face-to-Face and Virtual Team Members. Journal of Management Information Systems\u00a026, 241\u2013279 (2009)","journal-title":"Journal of Management Information Systems"},{"key":"8_CR13","volume-title":"Qualitative data analysis: An expanded sourcebook","author":"M.B. Miles","year":"1994","unstructured":"Miles, M.B., Huberman, A.M.: Qualitative data analysis: An expanded sourcebook. Sage Publications, Thousand Oaks (1994)"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1111\/1467-9566.00107","volume":"20","author":"R. Hughes","year":"1998","unstructured":"Hughes, R.: Considering the Vignette Technique and its Application to a Study of Drug Injecting and HIV Risk and Safer Behaviour. Sociology of Health and Illness\u00a020, 381\u2013400 (1998)","journal-title":"Sociology of Health and Illness"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1177\/0038038587021001008","volume":"21","author":"J.H. Finch","year":"1987","unstructured":"Finch, J.H.: The vignette technique in survey research. Sociology\u00a021, 105\u2013114 (1987)","journal-title":"Sociology"},{"key":"8_CR16","unstructured":"Zafar, H., Clark, J., Ko, M.: Security Risk Management Can Be Investigated! Presenting the Relation Between Research Rigor and an Effective Study. In: Proceedings of Americas Conference on Information Systems, Seattle, Washington (2012)"},{"key":"8_CR17","unstructured":"Staples, D., Jarvenpaa, S.: Using electronic media for information sharing activities: A replication and extension. In: Proceedings of the International Conference on Information Systems 2000 (2000)"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/BF00881456","volume":"13","author":"T. Barnett","year":"1994","unstructured":"Barnett, T., Bass, K., Brown, G.: Ethical ideology and ethical judgment regarding ethical issues in business. Journal of Business Ethics\u00a013, 469\u2013480 (1994)","journal-title":"Journal of Business Ethics"},{"key":"8_CR19","unstructured":"Aronson, E., Carlsmith, J.M.: Experimentation in social psychology. In: Handbook of Social Psychology, pp. 1\u201379. Addison Wesley, Reading, MA (1968)"},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"121","DOI":"10.2307\/3857567","volume":"2","author":"L.K. Trevino","year":"1992","unstructured":"Trevino, L.K.: Experimental Approaches to Studying Ethical-Unethical Behavior in Organizations. Business Ethics Quarterly\u00a02, 121\u2013136 (1992)","journal-title":"Business Ethics Quarterly"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.dss.2004.02.002","volume":"40","author":"B. Chae","year":"2005","unstructured":"Chae, B., Paradice, D., Courtney, J.F., Cagle, C.J.: Incorporating an ethical perspective into problem formulation: Implications for decision support systems design. Decision Support Systems\u00a040, 197\u2013212 (2005)","journal-title":"Decision Support Systems"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1177\/014920639301900203","volume":"19","author":"J. Greenberg","year":"1993","unstructured":"Greenberg, J., Eskew, D.E.: The Role of Role Playing in Organizational Research. Journal of Management\u00a019, 221\u2013241 (1993)","journal-title":"Journal of Management"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.im.2012.06.004","volume":"49","author":"M. Siponen","year":"2012","unstructured":"Siponen, M., Vance, A., Willison, R.: New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management\u00a049, 334\u2013341 (2012)","journal-title":"Information & Management"},{"key":"8_CR24","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1086\/209078","volume":"13","author":"W.J. Havlena","year":"1986","unstructured":"Havlena, W.J., Holbrook, B.M.: The Varieties of Consumption Experience: Comparing Two Typologies of Emotion in Consumer Behavior. Journal of Consumer Research\u00a013, 394\u2013404 (1986)","journal-title":"Journal of Consumer Research"},{"key":"8_CR25","unstructured":"Oja, M., Galliers, R.: Affect and Materiality in Enterprise Systems Usage: Setting the Stage for User Experience. In: Proceedings of the European Conference on Information Systems 2011 (2011)"},{"key":"8_CR26","volume-title":"Interpreting Information Systems in Organizations","author":"G. Walsham","year":"1993","unstructured":"Walsham, G.: Interpreting Information Systems in Organizations. John Wiley and Sons, Inc., New York (1993)"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1109\/32.799955","volume":"25","author":"C.B. Seaman","year":"1999","unstructured":"Seaman, C.B.: Qualitative Methods in Empirical Studies of Software Engineering. IEEE Transactions on Software Engineering\u00a025, 557\u2013572 (1999)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/21.47825","volume":"20","author":"R.R. Yager","year":"1990","unstructured":"Yager, R.R.: On a Generalization of Variable Precision Logic. IEEE Transactions on Systems, Man, and Cybernetics\u00a020, 248\u2013252 (1990)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"8_CR29","doi-asserted-by":"crossref","first-page":"679","DOI":"10.2307\/41703475","volume":"36","author":"A. Dimoka","year":"2012","unstructured":"Dimoka, A., Banker, R.D., Benbasat, I., Davis, F.D., Dennis, A.R., Gefen, D., Gupta, A., Ischebeck, A., Kenning, P., Pavlou, P.A., M\u00fcller-P\u00fctz, G., Riedl, R., vom Brocke, J., Weber, B.: On the Use of Neurophysiological Tools in IS Research: Developing a Research Agenda for NeuroIS. Management Information Systems Quarterly\u00a036, 679\u2013702 (2012)","journal-title":"Management Information Systems Quarterly"},{"key":"8_CR30","first-page":"243","volume":"27","author":"R. Riedl","year":"2010","unstructured":"Riedl, R., Banker, R.D., Benbasat, I., Davis, F.D., Dennis, A.R., Dimoka, A., Gefen, D., Gupta, A., Ischebeck, A., Kenning, P., M\u00fcller-Putz, G., Pavlou, P.A., Straub, D.W., Vom Brocke, J., Weber, B.: On the Foundations of NeuroIS: Reflections on the Gmunden Retreat 2009. Communications of the AIS\u00a027, 243\u2013264 (2010)","journal-title":"Communications of the AIS"},{"key":"8_CR31","doi-asserted-by":"crossref","first-page":"373","DOI":"10.2307\/20721433","volume":"34","author":"A. Dimoka","year":"2010","unstructured":"Dimoka, A.: What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Quarterly\u00a034, 373\u2013396 (2010)","journal-title":"MIS Quarterly"},{"key":"8_CR32","unstructured":"Wilde, T.: Experimentelle Forschung in der Wirtschaftsinformatik (english: Research Methods in Information Systems. An empirical Study). Verlag Dr. Kova\u010d, Hamburg (2008)"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Pl\u00f6chl, M., Ossand\u00f3n, J.P., K\u00f6nig, P.: Combining EEG and eye tracking: identification, characterization, and correction of eye movement artifacts in electroencephalographic data. Front. Hum. Neurosci.\u00a06 (2012)","DOI":"10.3389\/fnhum.2012.00278"},{"key":"8_CR34","volume-title":"The Economic Institutions of Capitalism","author":"O.E. Williamson","year":"1985","unstructured":"Williamson, O.E.: The Economic Institutions of Capitalism. Free Press, New York (1985)"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Walterbusch, M., Martens, B., Teuteberg, F.: Evaluating Cloud Computing Services from a Total Cost of Ownership Perspective. Management Research Review\u00a036 (2013)","DOI":"10.1108\/01409171311325769"},{"key":"8_CR36","unstructured":"Davis, F.D.: A technology acceptance model for empirically testing new end-user information systems: Theory and results (Doctoral dissertation, Sloan School of Management, Massachusetts Institute of Technology) (1986)"},{"key":"8_CR37","doi-asserted-by":"publisher","first-page":"20","DOI":"10.2307\/1252308","volume":"58","author":"R.M. Morgan","year":"1994","unstructured":"Morgan, R.M., Hunt, S.D.: The Commitment-Trust Theory of Relationship Marketing. Journal of Marketing\u00a058, 20\u201338 (1994)","journal-title":"Journal of Marketing"},{"key":"8_CR38","doi-asserted-by":"publisher","first-page":"491","DOI":"10.2307\/3151722","volume":"19","author":"G.A.J. Churchill","year":"1982","unstructured":"Churchill, G.A.J., Surprenant, C.: An Investigation Into the Determinants of Customer Satisfaction. Journal of Marketing Research\u00a019, 491\u2013504 (1982)","journal-title":"Journal of Marketing Research"},{"key":"8_CR39","unstructured":"Coleman, J.: Foundations of Social Theory. Harvard Univ. Pr. (1994)"},{"key":"8_CR40","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1111\/j.1540-5915.1998.tb01347.x","volume":"29","author":"A. Bhattacherjee","year":"1998","unstructured":"Bhattacherjee, A.: Managerial Influences on Intraorganizational Information Technology Use: A Principal- Agent Model. Decision Sciences\u00a029, 139\u2013162 (1998)","journal-title":"Decision Sciences"},{"key":"8_CR41","unstructured":"Schneberger, S., Wade, M., Allen, G., Vance, A., Eargle, D.: Theories Used in IS Research Wiki, \n                    \n                      http:\/\/istheory.byu.edu\/"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09770-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T16:42:52Z","timestamp":1558975372000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09770-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319097695","9783319097701"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09770-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}