{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T19:10:05Z","timestamp":1750014605678,"version":"3.41.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319544717"},{"type":"electronic","value":"9783319544724"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-54472-4_15","type":"book-chapter","created":{"date-parts":[[2017,2,25]],"date-time":"2017-02-25T08:23:30Z","timestamp":1488011010000},"page":"150-159","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Runtime Verification and Quality Assessment for Checking Agent Integrity in Social Commerce System"],"prefix":"10.1007","author":[{"given":"Najwa Abu","family":"Bakar","sequence":"first","affiliation":[]},{"given":"Mohd Hafiz","family":"Selamat","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Selamat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,26]]},"reference":[{"key":"15_CR1","unstructured":"Facebook: Facebook (2016). https:\/\/www.facebook.com\/"},{"key":"15_CR2","unstructured":"Instagram: https:\/\/instagram.com\/ (2016). https:\/\/instagram.com\/. Accessed: 17 Sep 2015"},{"key":"15_CR3","unstructured":"Pinterest: Pinterest: Discover and Save Creative Ideas (2016). https:\/\/www.pinterest.com\/. Accessed: 17 Sep 2015"},{"issue":"2","key":"15_CR4","first-page":"137","volume":"77","author":"JY Lee","year":"2015","unstructured":"Lee, J.Y.: Trust and social commerce. Univ. Pittsburgh Law Rev. 77(2), 137\u2013146 (2015)","journal-title":"Univ. Pittsburgh Law Rev."},{"key":"15_CR5","unstructured":"Johnson, L.: What Marketers Need to Know About 5 New Types of Social Commerce. Adweek (2015)"},{"key":"15_CR6","unstructured":"Beisel, D.: (The Beginnings of) Social Commerce (2005). http:\/\/genuinevc.com\/2005\/12\/06\/the-beginnings-of-social-commerce\/"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Guo, S., Wang, M., Leskovec, J.: The role of social networks in online shopping: information passing, price of trust, and consumer choice. In: ACM Conference on Electronic Commerce, pp. 157\u2013166 (2011)","DOI":"10.1145\/1993574.1993598"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/ACCESS.2013.2259892","volume":"1","author":"H Yu","year":"2013","unstructured":"Yu, H., Shen, Z., Leung, C., Miao, C., Lesser, V.R.: A survey of multi-agent trust management systems. IEEE Access 1, 35\u201350 (2013)","journal-title":"IEEE Access"},{"issue":"1","key":"15_CR9","first-page":"39","volume":"14","author":"E Butler","year":"2011","unstructured":"Butler, E.: Privacy setting awareness on facebook and its effect on user-posted content. Hum. Commun. 14(1), 39\u201355 (2011)","journal-title":"Hum. Commun."},{"issue":"1","key":"15_CR10","first-page":"83","volume":"15","author":"B Debatin","year":"2009","unstructured":"Debatin, B., Lovejoy, J.P., Horn, A.K., Hughes, B.N.: Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput. Commun. 15(1), 83\u2013108 (2009)","journal-title":"J. Comput. Commun."},{"key":"15_CR11","unstructured":"Alberti, M., Chesani, F., Guerri, A., Gavanelli, M., Lamma, E., Mello, P., Milano, M., Torroni, P.: Expressing interaction in combinatorial auction through social integrity constraints. In: Proc\u00ebedings of W(C)LP, vol. 2005\u20131, pp. 53\u201364 (2005)"},{"issue":"1","key":"15_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.4067\/S0718-18762012000100002","volume":"7","author":"Y Yao","year":"2012","unstructured":"Yao, Y., Ruohomaa, S., Xu, F.: Addressing common vulnerabilities of reputation systems for electronic commerce. J. Theor. Appl. Electron. Commer. Res. 7(1), 3\u20134 (2012)","journal-title":"J. Theor. Appl. Electron. Commer. Res."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Such, J.M., Garc, A., Bellver, J.: Magentix2: a Privacy-enhancing Agent Platform (2013)","DOI":"10.1016\/j.engappai.2012.06.009"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Korba, L.: Privacy in distributed electronic commerce. In: Proceedings of the Annual Hawaii International Conference on System Sciences, vol. 2002\u2013January, pp. 4017\u20134026 (2002)","DOI":"10.1109\/HICSS.2002.994534"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1023\/B:AGNT.0000038029.82331.c0","volume":"9","author":"C Sierra","year":"2004","unstructured":"Sierra, C.: Agent-mediated electronic commerce. Auton. Agent. Multi. Agent. Syst. 9, 285\u2013301 (2004)","journal-title":"Auton. Agent. Multi. Agent. Syst."},{"issue":"2","key":"15_CR16","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10458-005-6825-4","volume":"13","author":"TD Huynh","year":"2006","unstructured":"Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Auton. Agent. Multi. Agent. Syst. 13(2), 119\u2013154 (2006)","journal-title":"Auton. Agent. Multi. Agent. Syst."},{"key":"15_CR17","unstructured":"Osman, N.Z.: Runtime verification of deontic and trust models in multiagent interactions. University of Edinburgh (2008)"},{"key":"15_CR18","unstructured":"Krupa, Y.: Privacy as Contextual Integrity in Decentralized Multi-Agent Systems (2012)"},{"issue":"2","key":"15_CR19","doi-asserted-by":"publisher","first-page":"183","DOI":"10.7763\/LNSE.2013.V1.41","volume":"1","author":"V Balakrishnan","year":"2013","unstructured":"Balakrishnan, V., Majd, E.: A comparative analysis of trust models for multi-agent systems. Lect. Notes Softw. Eng. 1(2), 183\u2013185 (2013)","journal-title":"Lect. Notes Softw. Eng."},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Majd, E., Balakrishnan, V.: Analysis of trust models to improve E-commerce multi-agent systems. In: First International Conference on Advanced Data and Information Engineering (DaEng), vol. 285, pp. 615\u2013622 (2014)","DOI":"10.1007\/978-981-4585-18-7_69"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.chb.2015.11.057","volume":"56","author":"B Lu","year":"2016","unstructured":"Lu, B., Fan, W., Zhou, M.: Social presence, trust, and social commerce purchase intention: an empirical research. Comput. Hum. Behav. 56, 225\u2013237 (2016)","journal-title":"Comput. Hum. Behav."},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-642-36546-1_45","volume-title":"Intelligent Information and Database Systems","author":"NA Bakar","year":"2013","unstructured":"Bakar, N.A., Selamat, A.: Runtime verification of multi-agent systems interaction quality. In: Selamat, A., Nguyen, N.T., Haron, H. (eds.) ACIIDS 2013. LNCS (LNAI), vol. 7802, pp. 435\u2013444. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-36546-1_45"},{"key":"15_CR23","first-page":"346","volume":"286","author":"NA Bakar","year":"2016","unstructured":"Bakar, N.A., Selamat, A.: Runtime verification and quality assessment for privacy violations detection in social networking system. Front. Artif. Intell. Appl. 286, 346\u2013357 (2016)","journal-title":"Front. Artif. Intell. Appl."}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-54472-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T18:55:48Z","timestamp":1750013748000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-54472-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319544717","9783319544724"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-54472-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"26 February 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kanazawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 April 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 April 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}