{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:36:08Z","timestamp":1742967368035,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_25","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"271-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Usable Trust: Grasping Trust Dynamics for Online Security as a Service"],"prefix":"10.1007","author":[{"given":"Shenja","family":"van der Graaf","sequence":"first","affiliation":[]},{"given":"Wim","family":"Vanobberghen","sequence":"additional","affiliation":[]},{"given":"Michalis","family":"Kanakakis","sequence":"additional","affiliation":[]},{"given":"Costas","family":"Kalogiros","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/3-540-45547-7_3","volume-title":"Trust in Cyber-Societies: Integrating the Human and Artificial Perspectives","author":"H McKnight","year":"2001","unstructured":"McKnight, H., Chervany, N.: Trust and distrust definitions: one bite at a time. In: Falcone, R., Singh, M., Tan, Y.H. (eds.) Trust in Cyber-Societies: Integrating the Human and Artificial Perspectives, pp. 27\u201354. Springer, Berlin (2001)"},{"issue":"3","key":"25_CR2","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.ijhcs.2005.01.001","volume":"62","author":"J Riegelsberger","year":"2005","unstructured":"Riegelsberger, J., Sasse, M.A., McCarthy, J.D.: The mechanics of trust: a framework for research and design. Int. J. Hum. Comput. Stud. 62(3), 381\u2013422 (2005)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"2","key":"25_CR3","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1016\/j.tele.2014.05.004","volume":"32","author":"S Graaf van der","year":"2015","unstructured":"van der Graaf, S.: Imaginaries of ownership; the logic of participation in the moral economy of 3D software design. Telematics Inform. Spec. Issue Ethics Inf. Soc. 32(2), 400\u2013408 (2015). Elsevier","journal-title":"Telematics Inform. Spec. Issue Ethics Inf. Soc."},{"key":"25_CR4","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1208.001.0001","volume-title":"Always Already New: Media, History and the Data of Culture","author":"L Gitelman","year":"2006","unstructured":"Gitelman, L.: Always Already New: Media, History and the Data of Culture. MIT Press, Cambridge (2006)"},{"key":"25_CR5","unstructured":"O\u2019Reilly, T.: What is web 2.0. \n                      http:\/\/www.oreillynet.com\/pub\/a\/oreilly\/tim\/news\/2005\/09\/30\/what-is-web-20.html\n                      \n                     (2005). Accessed 4 Sept 2014"},{"key":"25_CR6","unstructured":"Lacoh\\xC3\\xA9e, H., Cofta, P., Phippen, A., Furnell, S.: Understanding Public Perceptions: Trust and Engagement in ICT-Mediated Services. International Engineering Consortium, Chicago (2008)"},{"issue":"2","key":"25_CR7","first-page":"61","volume":"5","author":"Y-H Tan","year":"2001","unstructured":"Tan, Y.-H., Thoen, W.: Toward a generic model of trust for electronic commerce. Int. J. Electron. Commer. 5(2), 61\u201374 (2001)","journal-title":"Int. J. Electron. Commer."},{"key":"25_CR8","first-page":"49","volume":"4","author":"C Cheshire","year":"2011","unstructured":"Cheshire, C.: Online trust, trustworthiness, or assurance? D\u00e6dalus J. Am. Acad. Arts Sci. 4, 49\u201358 (2011)","journal-title":"D\u00e6dalus J. Am. Acad. Arts Sci."},{"key":"25_CR9","unstructured":"Karvonen, K., Cardholm, L., Karlsson, S.: Cultures of trust: a cross-cultural study on the formation of trust in an electronic environment. In: Proceedings of the Fifth Nordic Workshop on Secure IT Systems, NordSec (2000)"},{"key":"25_CR10","unstructured":"Nielsen, J. (n.d.): Trust or bust: communicating trustworthiness in web design. \n                      http:\/\/www.nngroup.com\/articles\/trust-or-bust-communicating-trustworthiness-in-web-design\/\n                      \n                    . Accessed 15 Feb 2015"},{"volume-title":"Handbook of Research Methods on Trust","year":"2012","key":"25_CR11","unstructured":"Lyon, F., M\u00f6llering, G., Saunders, M.N.K. (eds.): Handbook of Research Methods on Trust. Edward Elgar, Cheltenham (2012)"},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1111\/j.1468-2370.2011.00311.x","volume":"14","author":"F Li","year":"2012","unstructured":"Li, F., Kowski, D.P., van Moorsel, A., Smith, C.: Holistic framework for trust in online transactions. Int. J. Manag. Rev. 14, 85\u2013103 (2012)","journal-title":"Int. J. Manag. Rev."},{"key":"25_CR13","volume-title":"Trust: Reason, Routine, Reflexivity","author":"G M\u00f6llering","year":"2006","unstructured":"M\u00f6llering, G.: Trust: Reason, Routine, Reflexivity. Elsevier Ltd., Oxford (2006)"},{"key":"25_CR14","volume-title":"Trust: A Sociological Theory","author":"P Sztompka","year":"1999","unstructured":"Sztompka, P.: Trust: A Sociological Theory. Cambridge University Press, Cambridge (1999)"},{"issue":"4","key":"25_CR15","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/s11186-009-9087-3","volume":"38","author":"JN Barbalet","year":"2009","unstructured":"Barbalet, J.N.: A characterization of trust, and its consequences. Theor. Soc. 38(4), 367\u2013382 (2009)","journal-title":"Theor. Soc."}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:18:06Z","timestamp":1583507886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}