{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:53:13Z","timestamp":1743022393589,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_39","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"557-566","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Modelling Trust and Trust-Building Among IT-Security Professionals"],"prefix":"10.1007","author":[{"given":"Laurin B.","family":"Weissinger","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"39_CR1","first-page":"13","volume-title":"The Law and Economics of Cybersecurity. Reissued","author":"BK Kobayashi","year":"2011","unstructured":"Kobayashi, B.K.: Private versus social incentives in cybersecurity: law and economics. In: Grady, M.F., Parisi, F. (eds.) The Law and Economics of Cybersecurity. Reissued, pp. 13\u201328. Cambridge University Press, Cambridge (2011)"},{"key":"39_CR2","first-page":"259","volume-title":"The Law and Economics of Cybersecurity. Reissued","author":"JP Trachtman","year":"2011","unstructured":"Trachtman, J.P.: Global cyberterrorism, jurisdiction, international organization. In: Grady, M.F., Parisi, F. (eds.) The Law and Economics of Cybersecurity. Reissued, pp. 259\u2013296. Cambridge University Press, Cambridge (2011)"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Hedstr\u00f6m, P.: Dissecting the Social: On the Principles of Analytical Sociology, 188 p. Cambridge University Press, Cambridge (2005)","DOI":"10.1017\/CBO9780511488801"},{"key":"39_CR4","unstructured":"Elster, J.: Explaining Social Behavior: More Nuts and Bolts for the Social Sciences, 1st edn., 496 p. Cambridge University Press, Cambridge (2013)"},{"key":"39_CR5","unstructured":"Hedstr\u00f6m, P., Bearman, P.: The Oxford Handbook of Analytical Sociology, 800 p. Oxford University Press, Oxford (2009)"},{"key":"39_CR6","unstructured":"Gambetta, D.: Trust: Making and Breaking Cooperative Relations, 1st edn., 280 p. Wiley-Blackwell, New York (1988)"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Gambetta, D.: Codes of the Underworld: How Criminals Communicate, 368 p. Princeton University Press, Princeton (2009)","DOI":"10.1515\/9781400833610"},{"key":"39_CR8","unstructured":"Goffman, E.: Behavior in Public Places: Notes on the Social Organization of Gatherings. Reissued, 258 p. Free Press, New York (2008)"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Varese, F.: The Russian Mafia: Private Protection in a New Market Economy. New edition, 306 p. Oxford University Press, Oxford (2001)","DOI":"10.1093\/019829736X.001.0001"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Varese, F.: Mafias on the Move: How Organized Crime Conquers New Territories. Reprint, 284 p. Princeton University Press, Princeton (2011)","DOI":"10.23943\/princeton\/9780691128559.001.0001"},{"key":"39_CR11","unstructured":"Gambetta, D.: The Sicilian Mafia: The Business of Private Protection, New edition, 346 p. Harvard University Press, Cambridge (1993)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Durkheim, E.: The Division of Labour in Society, New edition, 412 p. Palgrave Macmillan, Basingstoke (1984)","DOI":"10.1007\/978-1-349-17729-5"},{"key":"39_CR13","unstructured":"Fox, A.: Beyond Contract: Work, Power and Trust Relations, 408 p. Faber & Faber, London (1974)"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Lane, C., Bachmann, R.: Trust within and between Organizations, 334 p. Oxford University Press, Oxford (1998)","DOI":"10.1093\/oso\/9780198293187.001.0001"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Cofta, P.: Trust, Complexity and Control: Confidence in a Convergent World, 1st edn., 310 p. Wiley-Blackwell, Chichester (2007)","DOI":"10.1002\/9780470517857"},{"key":"39_CR16","unstructured":"Power, M.: The Audit Society: Rituals of Verification, New edition, 208 p. Oxford University Press, Oxford (1999)"},{"key":"39_CR17","unstructured":"Weber, M.: Wirtschaft und Gesellschaft, 868 p. Mohr, T\u00fcbingen (1922)"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Hutter, B.: Anticipating Risks and Organising Risk Regulation, 320 p. Cambridge University Press, Cambridge (2010)","DOI":"10.1017\/CBO9780511761553"},{"issue":"3","key":"39_CR19","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1080\/03085140600844902","volume":"35","author":"U Beck","year":"2006","unstructured":"Beck, U.: Living in the world risk society: a Hobhouse Memorial Public Lecture given on Wednesday 15 February 2006 at the London School of Economics. Econ. Soc. 35(3), 329\u2013345 (2006)","journal-title":"Econ. Soc."},{"key":"39_CR20","unstructured":"Schneier, B.: Beyond Fear: Thinking Sensibly About Security in an Uncertain World, 2nd edn., 296 p. Copernicus, New York (2003)"},{"key":"39_CR21","unstructured":"Cofta, P., Furnell, S.: Understanding Public Perceptions: Trust and Engagement in ICT-mediated Services, 262 p. International Engineering Consortium, Chicago (2008)"},{"key":"39_CR22","unstructured":"Schneier, B.: Liars and Outliers: Enabling the Trust that Society Needs to Thrive, 366 p. Wiley, Indianapolis (2012)"},{"key":"39_CR23","unstructured":"Luhmann, N.: Vertrauen: Ein Mechanismus der Reduktion sozialer Komplexit\u00e4t, 140 p. Lucius & Lucius, Stuttgart (2000)"},{"key":"39_CR24","first-page":"19","volume-title":"Trust and Reciprocity","author":"E Ostrom","year":"2003","unstructured":"Ostrom, E.: Towards a behavioral theory linking trust, reciprocity and reputation. In: Ostrom, E. (ed.) Trust and Reciprocity, pp. 19\u201379. Oxford University Press, New York (2003)"},{"key":"39_CR25","unstructured":"Hamill, H., Gambetta, D.: Streetwise: How Taxi Drivers Establish Customers\u2019 Trustworthiness, 256 p. Russell Sage, London (2005)"},{"key":"39_CR26","unstructured":"Simmel, G.: Soziologie. Untersuchungen \u00fcber die Formen der Vergesellschaftung, 804 p. Duncker and Humblot, Leipzig (1908)"},{"key":"39_CR27","unstructured":"Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd edn., 1080 p. Wiley, New York (2008)"},{"key":"39_CR28","first-page":"168","volume-title":"The Oxford Handbook of Analytical Sociology","author":"D Gambetta","year":"2009","unstructured":"Gambetta, D.: Signalling. In: Hedstr\u00f6m, P., Bearman, P. (eds.) The Oxford Handbook of Analytical Sociology, pp. 168\u2013194. Oxford University Press, Oxford (2009)"},{"key":"39_CR29","volume-title":"Risikogesellschaft. Auf dem Weg in eine andere Moderne","author":"U Beck","year":"1986","unstructured":"Beck, U.: Risikogesellschaft. Auf dem Weg in eine andere Moderne. Suhrkamp, Frankfurt (1986)"},{"key":"39_CR30","unstructured":"Giddens, A.: The Consequences of Modernity, New edition, 200 p. Polity Press, Cambridge (1991)"},{"key":"39_CR31","unstructured":"Ostrom, E.: Trust and Reciprocity, 409 p. Oxford University Press, New York (2003)"},{"key":"39_CR32","doi-asserted-by":"crossref","unstructured":"Goldthorpe, J.: On Sociology: Numbers, Narratives, and the Integration of Research and Theory, 337 p. Oxford University Press, Oxford (2000)","DOI":"10.1093\/oso\/9780198295716.001.0001"},{"key":"39_CR33","volume-title":"The Problem of Solidarity: Theories and Models","author":"J Weesie","year":"1998","unstructured":"Weesie, J., Buskens, V., Raub, W.: The management of trust relations via institutional and structural embeddedness. In: Doreian, P., Fararo, T.J. (eds.) The Problem of Solidarity: Theories and Models. Taylor & Francis, Boca Raton (1998)"},{"key":"39_CR34","doi-asserted-by":"crossref","unstructured":"Arksey, H., Knight, P.: Interviewing for Social Scientists, 224 p. Sage Publications Ltd., London (1999)","DOI":"10.4135\/9781849209335"},{"key":"39_CR35","doi-asserted-by":"crossref","unstructured":"King, G., Keohane, R., Verba, S.: Designing Social Inquiry: Scientific Inference in Qualitative Research, 300 p. Princeton University Press, Princeton (1994)","DOI":"10.1515\/9781400821211"},{"key":"39_CR36","doi-asserted-by":"crossref","unstructured":"Corbin, J.M., Strauss, A.: Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, 3rd edn., 400 p. Sage, Los Angeles (2008)","DOI":"10.4135\/9781452230153"},{"key":"39_CR37","unstructured":"Silverman, D.: Doing Qualitative Research, 3rd edn., 472 p. Sage, London (2009)"},{"key":"39_CR38","volume-title":"Qualitative Data Analysis - A Methods Sourcebook","author":"M Miles","year":"2014","unstructured":"Miles, M., Huberman, M., Saldana, J.: Qualitative Data Analysis - A Methods Sourcebook. Sage, London (2014)"},{"issue":"3","key":"39_CR39","doi-asserted-by":"publisher","first-page":"355","DOI":"10.2307\/1882010","volume":"87","author":"M Spence","year":"1973","unstructured":"Spence, M.: Job market signaling. Q. J. Econ. 87(3), 355\u2013374 (1973)","journal-title":"Q. J. Econ."},{"issue":"3","key":"39_CR40","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1257\/00028280260136200","volume":"92","author":"M Spence","year":"2002","unstructured":"Spence, M.: Signaling in retrospect and the informational structure of markets. Am. Econ. Rev. 92(3), 434\u2013459 (2002)","journal-title":"Am. Econ. Rev."},{"issue":"1","key":"39_CR41","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1142\/S0219198906000795","volume":"8","author":"P Battigalli","year":"2006","unstructured":"Battigalli, P.: Rationalization in signaling games: theory and applications. Int. Game Theory Rev. 8(1), 67\u201393 (2006)","journal-title":"Int. Game Theory Rev."},{"issue":"4","key":"39_CR42","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1093\/oxfordjournals.esr.a018272","volume":"15","author":"JO Jonsson","year":"1999","unstructured":"Jonsson, J.O.: Explaining sex differences in educational choice an empirical assessment of a rational choice model. Eur. Sociol. Rev. 15(4), 391\u2013404 (1999)","journal-title":"Eur. Sociol. Rev."},{"key":"39_CR43","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2001","unstructured":"McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a feather: homophily in social networks. Ann. Rev. Sociol. 27, 415\u2013444 (2001)","journal-title":"Ann. Rev. Sociol."}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T02:46:40Z","timestamp":1719197200000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_39"}},"subtitle":["How Do Practitioners Find Out Whom to Work With?"],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}