{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:56:48Z","timestamp":1725857808478},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319291994"},{"type":"electronic","value":"9783319292014"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29201-4_3","type":"book-chapter","created":{"date-parts":[[2016,6,20]],"date-time":"2016-06-20T07:27:56Z","timestamp":1466407676000},"page":"55-87","source":"Crossref","is-referenced-by-count":1,"title":["A User Trust Model for Automatic Decision-Making in Ubiquitous and Self-Adaptive Environments"],"prefix":"10.1007","author":[{"given":"Stephan","family":"Hammer","sequence":"first","affiliation":[]},{"given":"Michael","family":"Wi\u00dfner","sequence":"additional","affiliation":[]},{"given":"Elisabeth","family":"Andr\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,21]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1080\/14639220110110342","volume":"3","author":"L. Rothrock","year":"2002","unstructured":"Rothrock, L., Koubek, R., Fuchs, F., Haas, M., Salvendy, G.: Review and reappraisal of adaptive interfaces: toward biologically inspired paradigms. Theor. Issues Ergon. Sci. 3, 47\u201384 (2002)","journal-title":"Theor. Issues Ergon. Sci."},{"key":"3_CR2","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z. Yan","year":"2014","unstructured":"Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. J. Netw. Comput. Appl. 42, 120\u2013134 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"3_CR3","first-page":"198","volume-title":"Universal Access in HCI, Part II, HCII 2007, LNCS 4555. Proceedings of the 12th International Conference on Human-Computer Interaction (HCI International), 22\u201327 July 2007, Beijing International Conference Center, Beijing","author":"C. R\u00f6cker","year":"2007","unstructured":"R\u00f6cker, C., Hinske, S., Magerkurth, C.: Intelligent privacy support for large public displays. In: Stephanidis, C. (ed.) Universal Access in HCI, Part II, HCII 2007, LNCS 4555. Proceedings of the 12th International Conference on Human-Computer Interaction (HCI International), 22\u201327 July 2007, Beijing International Conference Center, Beijing, pp. 198\u2013207. Springer, Heidelberg (2007)"},{"key":"3_CR4","doi-asserted-by":"crossref","DOI":"10.1002\/9780470519851","volume-title":"Trust Theory: A Socio-Cognitive and Computational Model","author":"C. Castelfranchi","year":"2010","unstructured":"Castelfranchi, C., Falcone, R.: Trust Theory: A Socio-Cognitive and Computational Model. Wiley, Hoboken (2010)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Yan, Z., Holtmanns, S.: Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions, pp. 290\u2013323. IGI Global, Hershey (2008)","DOI":"10.4018\/978-1-59904-804-8.ch013"},{"key":"3_CR6","unstructured":"Marsh, S.: Trust in distributed artificial intelligence. In: 4th European Workshop on Modelling Autonomous Agents in a Multi-agent World, Artificial Social Systems, pp. 94\u2013112. Springer, Berlin\/Heidelberg (1992)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Wang, Y., Vassileva, J.: Bayesian network trust model in peer-to-peer networks. In: 2nd International Workshop on Agents and Peer-to-Peer Computing, pp. 23\u201334. Springer, Berlin\/Heidelberg (2003)","DOI":"10.1007\/978-3-540-25840-7_3"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Yu, B., Singh, M.P.: An evidential model of distributed reputation management. In: Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 294\u2013301. ACM, New York (2002)","DOI":"10.1145\/544741.544809"},{"key":"3_CR9","unstructured":"Vogiatzis, G., MacGillivray, I., Chli, M.: A probabilistic model for trust and reputation. In: 9th International Conference on Autonomous Agents and Multiagent Systems, pp. 225\u2013232. IFAA-MAS, Richland (2010)"},{"key":"3_CR10","unstructured":"J\u00f8sang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: 29th Australasian Computer Science Conference, vol. 48, pp. 85\u201394. Australian Computer Society, Darlinghurst (2006)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Sankaranarayanan, V., Chandrasekaran, M., Upadhyaya, S.J.: Towards modeling trust based decisions: a game theoretic approach. In: Proceedings of the 12th European Symposium on Research in Computer Security, pp. 485\u2013500. Springer, Berlin\/Heidelberg (2007)","DOI":"10.1007\/978-3-540-74835-9_32"},{"key":"3_CR12","unstructured":"Burnett, C., Norman, T.J., Sycara, K.P.: Trust decision-making in multi-agent systems. In: Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI\/AAAI), Barcelona, pp.115\u2013120 (2011)"},{"key":"3_CR13","first-page":"151","volume-title":"Autonomic Systems","author":"N. Msadek","year":"2016","unstructured":"Msadek, N., Ungerer, T.: Trust as important factor for building robust self-x systems. In: Reif, W., Anders, G., Seebach, H., Stegh\u00f6fer, J.-P., Andr\u00e9, E., H\u00e4hner, J., M\u00fcller-Schloer, C., Ungerer, T. (eds.) Autonomic Systems, vol. 7, pp. 151\u2013181. Springer, Cham (2016)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. 45, 47:1\u201347:33 (2013)","DOI":"10.1145\/2501654.2501661"},{"key":"3_CR15","unstructured":"Bhuiyan, T., Xu, Y., J\u00f8sang, A.: A review of trust in online social networks to explore new research Agenda. In: Proceedings of the 2010 International Conference on Internet Computing, pp. 123\u2013128. CSREA Press, Las Vegas (2010)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Adali, S., Escriva, R., Goldberg, M.K., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B.K., Wallace, W.A., Williams, G.T.: Measuring behavioral trust in social networks. In: IEEE International Conference on Intelligence and Security Informatics, pp. 150\u2013152. IEEE, Piscataway (2010)","DOI":"10.1109\/ISI.2010.5484757"},{"key":"3_CR17","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TIFS.2013.2242889","volume":"8","author":"I. Ivanov","year":"2013","unstructured":"Ivanov, I., Vajda, P., Korshunov, P., Ebrahimi, T.: Comparative study of trust modeling for automatic landmark tagging. IEEE Trans. Inf. Forensics Secur. 8, 911\u2013923 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan, J., Smyth, B.: Trust in recommender systems. In: Proceedings of the 10th International Conference on Intelligent User Interfaces, pp. 167\u2013174. ACM, New York (2005)","DOI":"10.1145\/1040830.1040870"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Bickmore, T., Cassell, J.: Relational agents: a model and implementation of building user trust. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 396\u2013403. ACM, New York (2001)","DOI":"10.1145\/365024.365304"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Glass, A., McGuinness, D.L., Wolverton, M.: Toward establishing trust in adaptive agents. In: Proceedings of the 13th International Conference on Intelligent User Interfaces, pp. 227\u2013236. ACM, New York (2008)","DOI":"10.1145\/1378773.1378804"},{"key":"3_CR21","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1518\/hfes.46.1.50.30392","volume":"46","author":"J.D. Lee","year":"2004","unstructured":"Lee, J.D., See, K.A.: Trust in automation: designing for appropriate reliance. J. Hum. Factors Ergon. Soc. 46, 50\u201380 (2004)","journal-title":"J. Hum. Factors Ergon. Soc."},{"key":"3_CR22","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1016\/j.comcom.2010.01.023","volume":"34","author":"M.K. Denko","year":"2011","unstructured":"Denko, M.K., Sun, T., Woungang, I.: Trust management in ubiquitous computing: a Bayesian approach. Comput. Commun. 34, 398\u2013406 (2011)","journal-title":"Comput. Commun."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Arimura, S., Fujita, M., Kobayashi, S., Kani, J., Nishigaki, M., Shiba, A.: i\/k-Contact: a context-aware user authentication using physical social trust. In: 12th International Conference on Privacy, Security and Trust, Toronto, pp. 407\u2013413 (2014)","DOI":"10.1109\/PST.2014.6890968"},{"key":"3_CR24","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1177\/0894439307307696","volume":"26","author":"H. Cao","year":"2008","unstructured":"Cao, H., Olivier, P., Jackson, D.: Enhancing privacy in public spaces through cross-modal displays. Soc. Sci. Comput. Rev. 26, 87\u2013102 (2008)","journal-title":"Soc. Sci. Comput. Rev."},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Antifakos, S., Kern, N., Schiele, B., Schwaninger, A.: Towards improving trust in context-aware systems by displaying system confidence. In: Proceedings of the 7th International Conference on Human Computer Interaction with Mobile Devices & Services, pp. 9\u201314. ACM, Salzburg (2005)","DOI":"10.1145\/1085777.1085780"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Lim, B.Y., Dey, A.K.: Toolkit to support intelligibility in context-aware applications. In: Proceedings of the 12th International Conference on Ubiquitous Computing, Copenhagen, pp. 13\u201322. ACM (2010)","DOI":"10.1145\/1864349.1864353"},{"key":"3_CR27","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s11257-005-1269-8","volume":"15","author":"K. Cheverst","year":"2005","unstructured":"Cheverst, K., Byun, H., Fitton, D., Sas, C., Kray, C., Villar, N.: Exploring issues of user model transparency and proactive behaviour in an office environment control system. User Model. User-Adapt. Interact. 15, 235\u2013273 (2005)","journal-title":"User Model. User-Adapt. Interact."},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Hochleitner, C., Graf, C., Unger, D., Tscheligi, M.: Making devices trustworthy: security and trust feedback in the Internet of things. In: 4th International Workshop on \u2018Security and Privacy in Spontaneous Interaction and Mobile Phone Use\u2019 at Pervasive\u201912, Newcastle (2012)","DOI":"10.1007\/978-3-642-32287-7_22"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Stegh\u00f6fer, J.-P., Kiefhaber, R., Leichtenstern, K., Bernard, Y., Klejnowski, L., Reif, W., Ungerer, T., Andr\u00e9, E., H\u00e4hner, J., M\u00fcller-Schloer, C.: Trustworthy organic computing systems: challenges and perspectives. In: Autonomic and Trusted Computing, pp. 62\u201376. Springer, Berlin\/Heidelberg (2010)","DOI":"10.1007\/978-3-642-16576-4_5"},{"key":"3_CR30","doi-asserted-by":"crossref","first-page":"3","DOI":"10.2991\/978-94-91216-71-8_1","volume-title":"Trustworthy Ubiquitous Computing","author":"K. Bee","year":"2012","unstructured":"Bee, K., Hammer, S., Pratsch, C., Andr\u00e9, E.: The automatic trust management of self-adaptive multi-display environments. In: Khalil, I., Mantoro, T. (eds.) Trustworthy Ubiquitous Computing, vol. 6, pp. 3\u201320. Atlantis Press, Amsterdam (2012)"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Lumsden, J.: Triggering trust: to what extent does the question influence the answer when evaluating the perceived importance of trust triggers? In: Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, pp. 214\u2013223. British Computer Society, Swinton (2009)","DOI":"10.14236\/ewic\/HCI2009.25"},{"key":"3_CR32","volume-title":"Artificial Intelligence: A Modern Approach 2nd International","author":"S.J. Russell","year":"2003","unstructured":"Russell, S.J., Norvig, P.: Artificial Intelligence: A Modern Approach 2nd International. Prentice Hall, Upper Saddle River (2003)"},{"key":"3_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/2196-064X-1-6","volume":"1","author":"M. Wi\u00dfner","year":"2014","unstructured":"Wi\u00dfner, M., Hammer, S., Kurdyukova, E., Andr\u00e9, E.: Trust-based decision-making for the adaptation of public displays in changing social contexts. Journal of Trust Management. 1, 1\u201323 (2014)","journal-title":"Journal of Trust Management."},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Kurdyukova, E., Bee, K., Andr\u00e9, E.: Friend or Foe? Relationship-based adaptation on public displays. In: Proceedings of the 2nd International Conference on Ambient Intelligence, pp. 228\u2013237. Springer, Berlin\/Heidelberg (2011)","DOI":"10.1007\/978-3-642-25167-2_30"},{"key":"3_CR35","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/1897239.1897250","volume":"18","author":"S. Greenberg","year":"2011","unstructured":"Greenberg, S., Marquardt, N., Ballendat, T., Diaz-Marino, R., Wang, M.: Proxemic interactions: the new Ubicomp? ACM Interact. 18, 42\u201350 (2011)","journal-title":"ACM Interact."},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Leichtenstern, K., Bee, N., Andr\u00e9, E., Berkm\u00fcller, U., Wagner, J.: Physiological measurement of trust-related behavior in trust-neutral and trust-critical situations. In Proceedings of the 5th IFIP International Conference on Trust Management, pp. 165\u2013172. Springer, Berlin\/Heidelberg (2011)","DOI":"10.1007\/978-3-642-22200-9_14"},{"key":"3_CR37","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/978-3-642-27663-7_11","volume-title":"Ubiquitous Display Environments","author":"E. Kurdyukova","year":"2012","unstructured":"Kurdyukova, E., Andr\u00e9, E., Leichtenstern, K.: Trust management of ubiquitous multi-display environments. In: Krueger, A., Kuflik, T. (eds.) Ubiquitous Display Environments, pp. 177\u2013193. Springer, Berlin\/Heidelberg (2012)"},{"key":"3_CR38","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1016\/j.ijhcs.2013.06.003","volume":"71","author":"B.P. Knijnenburg","year":"2013","unstructured":"Knijnenburg, B.P., Kobsa, A., Jin, H.: Dimensionality of information disclosure behavior. Int. J. Hum.-Comput. Stud. 71, 1144\u20131162 (2013)","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"3_CR39","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy indexes: a survey of Westin\u2019s studies. Technical report, CMU-ISRI-5-138. Institute for Software Research International, Carnegie Mellon University (2005)"}],"container-title":["Trustworthy Open Self-Organising Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29201-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T12:55:52Z","timestamp":1600779352000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-29201-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319291994","9783319292014"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29201-4_3","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}