{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:30:36Z","timestamp":1742927436882,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319213828"},{"type":"electronic","value":"9783319213835"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21383-5_21","type":"book-chapter","created":{"date-parts":[[2015,7,19]],"date-time":"2015-07-19T22:42:15Z","timestamp":1437345735000},"page":"123-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Trust Towards Social Media in Emergencies: A Perspective of Professional Emergency Personnel in Europe"],"prefix":"10.1007","author":[{"given":"Hermann","family":"Szymczak","sequence":"first","affiliation":[]},{"given":"Pinar","family":"Kuecuekbalaban","sequence":"additional","affiliation":[]},{"given":"Daniela","family":"Knuth","sequence":"additional","affiliation":[]},{"given":"Silke","family":"Schmidt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"issue":"5","key":"21_CR1","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1016\/j.chb.2010.03.013","volume":"26","author":"A Beldad","year":"2010","unstructured":"Beldad, A., de Jong, M., Steehouder, M.: How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Comput. Hum. Behav. 26(5), 857\u2013869 (2010). doi:\n                    10.1016\/j.chb.2010.03.013","journal-title":"Comput. Hum. Behav."},{"key":"21_CR2","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"J Cohen","year":"1988","unstructured":"Cohen, J.: Statistical Power Analysis for the Behavioral Sciences. Routledge Academic, New York (1988)"},{"key":"21_CR3","unstructured":"Hiltz, R.S., Gonzalez, J.J., Van de Walle, B.: Assessing and improving the trustworthiness of social media for emergency management: a literature review. In: Norwegian Information Security Conference (2012)"},{"key":"21_CR4","unstructured":"Hiltz, S.R., Plotnick, L.: Dealing with information overload when using social media for emergency management\u202f: emerging solutions. In: Proceedings of the 10th International ISCRAM Conference, pp. 823\u2013827 (2013)"},{"issue":"1","key":"21_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.bushor.2009.09.003","volume":"53","author":"AM Kaplan","year":"2010","unstructured":"Kaplan, A.M., Haenlein, M.: Users of the world, unite! The challenges and opportunities of social media. Bus. Horiz. 53(1), 59\u201368 (2010). doi:\n                    10.1016\/j.bushor.2009.09.003","journal-title":"Bus. Horiz."},{"issue":"4","key":"21_CR6","first-page":"287","volume":"2","author":"BR Lindsay","year":"2010","unstructured":"Lindsay, B.R.: Social media and disasters: current uses, future options, and policy considerations. J. Curr. Issues Media Telecommun. 2(4), 287\u2013297 (2010)","journal-title":"J. Curr. Issues Media Telecommun."},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/1964858.1964869","volume":"9","author":"M Mendoza","year":"2010","unstructured":"Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: can we trust what we RT? Workshop Soc. Media Analytics 9, 71\u201379 (2010). doi:\n                    10.1145\/1964858.1964869","journal-title":"Workshop Soc. Media Analytics"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.chb.2014.01.021","volume":"34","author":"G Neubaum","year":"2014","unstructured":"Neubaum, G., R\u00f6sner, L., Rosenthal-von der P\u00fctten, A.M., Kr\u00e4mer, N.C.: Psychosocial functions of social media usage in a disaster situation: a multi-methodological approach. Comput. Hum. Behav. 34, 28\u201338 (2014). doi:\n                    10.1016\/j.chb.2014.01.021","journal-title":"Comput. Hum. Behav."},{"key":"21_CR9","first-page":"229","volume-title":"The SAGEHandbook of Risk Communication","author":"SA Rains","year":"2015","unstructured":"Rains, S.A., Brunner, S.R., Oman, K.: Social media and risk communiction. In: Cho, H., Reimer, T., McComas, K.A. (eds.) The SAGEHandbook of Risk Communication, pp. 229\u2013239. SAGE Publications, London (2015)"},{"issue":"1","key":"21_CR10","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.pubrev.2010.12.001","volume":"37","author":"F Schultz","year":"2011","unstructured":"Schultz, F., Utz, S., G\u00f6ritz, A.: Is the medium the message? Perceptions of and reactions to crisis communication via twitter, blogs and traditional media. Public Relat. Rev. 37(1), 20\u201327 (2011). doi:\n                    10.1016\/j.pubrev.2010.12.001","journal-title":"Public Relat. Rev."},{"key":"21_CR11","unstructured":"Sutton, J., Palen, L., Shklovski, I.: Backchannels on the front lines: emergent uses of social media in the 2007 southern california wildfires. In: Proceedings of the 5th International ISCRAM Conference, pp. 1\u20139 (2008)"},{"issue":"1","key":"21_CR12","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.chb.2003.11.008","volume":"21","author":"YD Wang","year":"2005","unstructured":"Wang, Y.D., Emurian, H.H.: An overview of online trust: concepts, elements, and implications. Comput. Hum. Behav. 21(1), 105\u2013125 (2005). doi:\n                    10.1016\/j.chb.2003.11.008","journal-title":"Comput. Hum. Behav."}],"container-title":["Communications in Computer and Information Science","HCI International 2015 - Posters\u2019 Extended Abstracts"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21383-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:00:41Z","timestamp":1582408841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-21383-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319213828","9783319213835"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21383-5_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}