{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:45:20Z","timestamp":1776105920652,"version":"3.50.1"},"publisher-location":"Cham","reference-count":72,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319680583","type":"print"},{"value":"9783319680590","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68059-0_3","type":"book-chapter","created":{"date-parts":[[2017,9,20]],"date-time":"2017-09-20T12:54:10Z","timestamp":1505912050000},"page":"40-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Modelling Trust: An Empirical Assessment"],"prefix":"10.1007","author":[{"given":"Siddharth","family":"Gulati","sequence":"first","affiliation":[]},{"given":"Sonia","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"David","family":"Lamas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,21]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-69746-3_2","volume-title":"Action Control","author":"I Ajzen","year":"1985","unstructured":"Ajzen, I.: From intentions to actions: a theory of planned behavior. In: Kuhl, J., Beckmann, J. (eds.) Action Control, pp. 11\u201339. Springer, Heidelberg (1985)"},{"issue":"9","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1037\/0003-066X.44.9.1175","volume":"44","author":"A Bandura","year":"1989","unstructured":"Bandura, A.: Human agency in social cognitive theory. Am. Psychol. 44(9), 1175 (1989)","journal-title":"Am. Psychol."},{"issue":"6","key":"3_CR3","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1016\/j.im.2014.05.016","volume":"51","author":"D Belanche","year":"2014","unstructured":"Belanche, D., Casal\u00f3, L.V., Flavi\u00e1n, C., Schepers, J.: Trust transfer in the continued usage of public e-services. Inf. Manage. 51(6), 627\u2013640 (2014)","journal-title":"Inf. Manage."},{"issue":"3","key":"3_CR4","first-page":"72","volume":"6","author":"I Benbasat","year":"2005","unstructured":"Benbasat, I., Wang, W.: Trust in and adoption of online recommendation agents. J. Assoc. Inf. Syst. 6(3), 72\u2013101 (2005)","journal-title":"J. Assoc. Inf. Syst."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Biel, B., Grill, T., Gruhn, V.: Patterns of trust in ubiquitous environments. In: Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia, pp. 391\u2013396. ACM (2008)","DOI":"10.1145\/1497185.1497269"},{"key":"3_CR6","first-page":"219","volume":"5","author":"P Bromiley","year":"1995","unstructured":"Bromiley, P., Cummings, L.L.: Transactions costs in organizations with trust. Res. Negot. Organ. 5, 219\u2013250 (1995)","journal-title":"Res. Negot. Organ."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, X., Macaulay, L.: Investigating individual trust for collaboration using spider diagram. In: Proceedings of the 15th European Conference on Cognitive Ergonomics: the Ergonomics of Cool Interaction, p. 24. ACM (2008)","DOI":"10.1145\/1473018.1473048"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Compeau, D.R., Higgins, C.A.: Computer self-efficacy: development of a measure and initial test. MIS Q. 189\u2013211 (1995)","DOI":"10.2307\/249688"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/11767138_3","volume-title":"Advanced Information Systems Engineering","author":"LL Constantine","year":"2006","unstructured":"Constantine, L.L.: Trusted interaction: user control and system responsibilities in interaction design for information systems. In: Dubois, E., Pohl, K. (eds.) CAiSE 2006. LNCS, vol. 4001, pp. 20\u201330. Springer, Heidelberg (2006). doi:10.1007\/11767138_3"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 319\u2013340 (1989)","DOI":"10.2307\/249008"},{"issue":"2","key":"3_CR11","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1080\/21515581.2011.603514","volume":"1","author":"G Dietz","year":"2011","unstructured":"Dietz, G.: Going back to the source: why do people trust each other? J. Trust Res. 1(2), 215\u2013222 (2011)","journal-title":"J. Trust Res."},{"issue":"2","key":"3_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/1251829","volume":"61","author":"PM Doney","year":"1997","unstructured":"Doney, P.M., Cannon, J.P.: An examination of the nature of trust in buyer-seller relationships. J. Mark. 61(2), 35\u201351 (1997)","journal-title":"J. Mark."},{"issue":"6","key":"3_CR13","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/3001896","volume":"23","author":"U Farooq","year":"2016","unstructured":"Farooq, U., Grudin, J.: Human-computer integration. Interactions 23(6), 26\u201332 (2016)","journal-title":"Interactions"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Fogg, B.J.: Persuasive technology: using computers to change what we think and do. In: Ubiquity 2002 (December), Article no. 5 (2002)","DOI":"10.1145\/764008.763957"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2307\/3151312","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18, 39\u201350 (1981)","journal-title":"J. Mark. Res."},{"issue":"12","key":"3_CR16","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/355112.355120","volume":"43","author":"B Friedman","year":"2000","unstructured":"Friedman, B., Khan Jr, P.H., Howe, D.C.: Trust online. Commun. ACM 43(12), 34\u201340 (2000)","journal-title":"Commun. ACM"},{"key":"3_CR17","first-page":"322","volume":"56","author":"H Fritz","year":"1958","unstructured":"Fritz, H., et al.: The psychology of interpersonal relations. J. Mark. 56, 322 (1958)","journal-title":"J. Mark."},{"issue":"1","key":"3_CR18","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., Straub, D.W.: Trust and tam in online shopping: an integrated model. MIS Q. 27(1), 51\u201390 (2003)","journal-title":"MIS Q."},{"issue":"6","key":"3_CR19","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/j.omega.2004.01.006","volume":"32","author":"D Gefen","year":"2004","unstructured":"Gefen, D., Straub, D.W.: Consumer trust in B2C e-commerce and the importance of social presence: experiments in e-products and e-services. Omega 32(6), 407\u2013424 (2004)","journal-title":"Omega"},{"issue":"7\u20138","key":"3_CR20","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s12243-016-0525-8","volume":"71","author":"JP Gibson","year":"2016","unstructured":"Gibson, J.P., Krimmer, R., Teague, V., Pomares, J.: A review of e-voting: the past, present and future. Ann. Telecommun. 71(7\u20138), 279\u2013286 (2016)","journal-title":"Ann. Telecommun."},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"161","DOI":"10.2307\/2092623","volume":"25","author":"AW Gouldner","year":"1960","unstructured":"Gouldner, A.W.: The norm of reciprocity: a preliminary statement. Am. Sociol. Rev. 25, 161\u2013178 (1960)","journal-title":"Am. Sociol. Rev."},{"issue":"2","key":"3_CR22","doi-asserted-by":"publisher","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","volume":"19","author":"JF Hair","year":"2011","unstructured":"Hair, J.F., Ringle, C.M., Sarstedt, M.: PLS-SEM: indeed a silver bullet. J. Mark. Theory Pract. 19(2), 139\u2013152 (2011)","journal-title":"J. Mark. Theory Pract."},{"key":"3_CR23","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"JF Hair Jr","year":"2016","unstructured":"Hair Jr., J.F., Hult, G.T.M., Ringle, C., Sarstedt, M.: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage Publications, Thousand Oaks (2016)"},{"issue":"1","key":"3_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17011\/ht\/urn.201305211719","volume":"9","author":"P H\u00e4kkinen","year":"2013","unstructured":"H\u00e4kkinen, P.: Evolving technologies for a variety of human practices. Hum. Technol. Interdisc. J. Hum. ICT Environ. 9(1), 1\u20133 (2013)","journal-title":"Hum. Technol. Interdisc. J. Hum. ICT Environ."},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Heiberg, S., Parsovs, A., Willemson, J.: Log analysis of Estonian internet voting 2013\u20132014. In: International Conference on E-Voting and Identity, pp. 19\u201334. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-319-22270-7_2"},{"key":"3_CR26","doi-asserted-by":"publisher","first-page":"238","DOI":"10.2307\/3033919","volume":"45","author":"CT Hill","year":"1982","unstructured":"Hill, C.T., Stull, D.E.: Disclosure reciprocity: conceptual and measurement issues. Soc. Psychol. Q. 45, 238\u2013244 (1982)","journal-title":"Soc. Psychol. Q."},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-1-4419-6108-2_21","volume-title":"Information Systems Theory","author":"MA Hossain","year":"2012","unstructured":"Hossain, M.A., Quaddus, M.: Expectation-confirmation theory in information system research: a review and analysis. In: Dwivedi, Y., Wade, M., Schneberger, S. (eds.) Information Systems Theory, pp. 441\u2013469. Springer, Heidelberg (2012)"},{"issue":"4","key":"3_CR28","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1086\/266350","volume":"15","author":"CI Hovland","year":"1951","unstructured":"Hovland, C.I., Weiss, W.: The influence of source credibility on communication effectiveness. Public Opin. Q. 15(4), 635\u2013650 (1951)","journal-title":"Public Opin. Q."},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Hung, Y.T., Dennis, A.R., Robert, L.: Trust in virtual teams: towards an integrative model of trust formation. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, pp. 1\u201311. IEEE (2004)","DOI":"10.1109\/HICSS.2004.1265156"},{"issue":"6","key":"3_CR30","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1016\/j.ijhcs.2005.02.008","volume":"62","author":"RD Johnson","year":"2005","unstructured":"Johnson, R.D.: An empirical investigation of sources of application-specific computer-self-efficacy and mediators of the efficacy-performance relationship. Int. J. Hum. Comput. Stud. 62(6), 737\u2013758 (2005)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"1","key":"3_CR31","doi-asserted-by":"crossref","first-page":"113","DOI":"10.2307\/25148670","volume":"29","author":"A Kankanhalli","year":"2005","unstructured":"Kankanhalli, A., Tan, B.C., Wei, K.K.: Contributing knowledge to electronic knowledge repositories: an empirical investigation. MIS Q. 29(1), 113\u2013143 (2005)","journal-title":"MIS Q."},{"key":"3_CR32","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.sbspro.2012.09.1205","volume":"57","author":"ES Kassim","year":"2012","unstructured":"Kassim, E.S., Jailani, S.F.A.K., Hairuddin, H., Zamzuri, N.H.: Information system acceptance and user satisfaction: the mediating role of trust. Procedia Soc. Behav. Sci. 57, 412\u2013418 (2012)","journal-title":"Procedia Soc. Behav. Sci."},{"issue":"3\u20134","key":"3_CR33","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/s12130-010-9123-7","volume":"23","author":"AH Kiran","year":"2010","unstructured":"Kiran, A.H., Verbeek, P.P.: Trusting our selves to technology. Knowl. Technol. Policy 23(3\u20134), 409\u2013427 (2010)","journal-title":"Knowl. Technol. Policy"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Knowles, B., Rouncefield, M., Harding, M., Davies, N., Blair, L., Hannon, J., Walden, J., Wang, D.: Models and patterns of trust. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, pp. 328\u2013338. ACM (2015)","DOI":"10.1145\/2675133.2675154"},{"issue":"4","key":"3_CR35","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/s10209-015-0445-9","volume":"15","author":"L Kyriakoullis","year":"2016","unstructured":"Kyriakoullis, L., Zaphiris, P.: Culture and HCI: a review of recent cultural studies in HCI and social networks. Univ. Access Inf. Soc. 15(4), 629\u2013642 (2016)","journal-title":"Univ. Access Inf. Soc."},{"issue":"2","key":"3_CR36","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/1989098.1989101","volume":"42","author":"NK Lankton","year":"2011","unstructured":"Lankton, N.K., McKnight, D.H.: What does it mean to trust Facebook? Examining technology and interpersonal trust beliefs. ACM SiGMiS Database 42(2), 32\u201354 (2011)","journal-title":"ACM SiGMiS Database"},{"issue":"10","key":"3_CR37","first-page":"880","volume":"16","author":"NK Lankton","year":"2015","unstructured":"Lankton, N.K., McKnight, D.H., Tripp, J.: Technology, humanness, and trust: rethinking trust in technology. J. Assoc. Inf. Syst. 16(10), 880 (2015)","journal-title":"J. Assoc. Inf. Syst."},{"issue":"10","key":"3_CR38","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1080\/00140139208967392","volume":"35","author":"J Lee","year":"1992","unstructured":"Lee, J., Moray, N.: Trust, control strategies and allocation of function in human-machine systems. Ergonomics 35(10), 1243\u20131270 (1992)","journal-title":"Ergonomics"},{"issue":"1","key":"3_CR39","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1006\/ijhc.1994.1007","volume":"40","author":"JD Lee","year":"1994","unstructured":"Lee, J.D., Moray, N.: Trust, self-confidence, and operators\u2019 adaptation to automation. Int. J. Hum. Comput. Stud. 40(1), 153\u2013184 (1994)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"2","key":"3_CR40","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1080\/21515581.2014.966489","volume":"4","author":"PP Li","year":"2014","unstructured":"Li, P.P.: A tentative typology of context for trust research and beyond. J. Trust Res. 4(2), 83\u201389 (2014)","journal-title":"J. Trust Res."},{"key":"3_CR41","volume-title":"Trust and Power","author":"N Luhmann","year":"1979","unstructured":"Luhmann, N.: Trust and Power. Willey, New York (1979)"},{"key":"3_CR42","unstructured":"Madsen, M., Gregor, S.: Measuring human-computer trust. In: 11th Australasian Conference on Information Systems, vol. 53, pp. 6\u20138. Citeseer (2000)"},{"issue":"3","key":"3_CR43","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manage. Rev. 20(3), 709\u2013734 (1995)","journal-title":"Acad. Manage. Rev."},{"issue":"2","key":"3_CR44","first-page":"12","volume":"2","author":"DH Mcknight","year":"2011","unstructured":"Mcknight, D.H., Carter, M., Thatcher, J.B., Clay, P.F.: Trust in a specific technology: an investigation of its components and measures. ACM Trans. Manage. Inf. Syst. (TMIS) 2(2), 12 (2011)","journal-title":"ACM Trans. Manage. Inf. Syst. (TMIS)"},{"issue":"3","key":"3_CR45","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1287\/isre.13.3.334.81","volume":"13","author":"DH McKnight","year":"2002","unstructured":"McKnight, D.H., Choudhury, V., Kacmar, C.: Developing and validating trust measures for e-commerce: an integrative typology. Inf. Syst. Res. 13(3), 334\u2013359 (2002)","journal-title":"Inf. Syst. Res."},{"issue":"3","key":"3_CR46","doi-asserted-by":"crossref","first-page":"473","DOI":"10.5465\/amr.1998.926622","volume":"23","author":"DH McKnight","year":"1998","unstructured":"McKnight, D.H., Cummings, L.L., Chervany, N.L.: Initial trust formation in new organizational relationships. Acad. Manage. Rev. 23(3), 473\u2013490 (1998)","journal-title":"Acad. Manage. Rev."},{"issue":"4","key":"3_CR47","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1086\/209566","volume":"26","author":"Y Moon","year":"2000","unstructured":"Moon, Y.: Intimate exchanges: using computers to elicit self-disclosure from consumers. J. Consum. Res. 26(4), 323\u2013339 (2000)","journal-title":"J. Consum. Res."},{"issue":"5\u20136","key":"3_CR48","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/S0020-7373(87)80013-5","volume":"27","author":"BM Muir","year":"1987","unstructured":"Muir, B.M.: Trust between humans and machines, and the design of decision aids. Int. J. Man Mach. Stud. 27(5\u20136), 527\u2013539 (1987)","journal-title":"Int. J. Man Mach. Stud."},{"issue":"3","key":"3_CR49","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1080\/00140139608964474","volume":"39","author":"BM Muir","year":"1996","unstructured":"Muir, B.M., Moray, N.: Trust in automation. Part ii. Experimental studies of trust and human intervention in a process control simulation. Ergonomics 39(3), 429\u2013460 (1996)","journal-title":"Ergonomics"},{"issue":"6","key":"3_CR50","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1006\/ijhc.1996.0073","volume":"45","author":"C Nass","year":"1996","unstructured":"Nass, C., Fogg, B., Moon, Y.: Can computers be teammates? Int. J. Hum. Comput. Stud. 45(6), 669\u2013678 (1996)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"2","key":"3_CR51","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1006\/ijhc.1995.1042","volume":"43","author":"C Nass","year":"1995","unstructured":"Nass, C., Moon, Y., Fogg, B., Reeves, B., Dryer, D.: Can computer personalities be human personalities? Int. J. Hum. Comput. Stud. 43(2), 223\u2013239 (1995)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"10","key":"3_CR52","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1111\/j.1559-1816.1997.tb00275.x","volume":"27","author":"C Nass","year":"1997","unstructured":"Nass, C., Moon, Y., Green, N.: Are machines gender neutral? Gender-stereotypic responses to computers with voices. J. Appl. Soc. Psychol. 27(10), 864\u2013876 (1997)","journal-title":"J. Appl. Soc. Psychol."},{"key":"3_CR53","doi-asserted-by":"crossref","unstructured":"Nass, C., Steuer, J., Tauber, E.R.: Computers are social actors. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 72\u201378. ACM (1994)","DOI":"10.1145\/259963.260288"},{"key":"3_CR54","doi-asserted-by":"publisher","first-page":"460","DOI":"10.2307\/3150499","volume":"17","author":"RL Oliver","year":"1980","unstructured":"Oliver, R.L.: A cognitive model of the antecedents and consequences of satisfaction decisions. J. Mark. Res. 17, 460\u2013469 (1980)","journal-title":"J. Mark. Res."},{"issue":"12","key":"3_CR55","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/355112.355121","volume":"43","author":"JS Olson","year":"2000","unstructured":"Olson, J.S., Olson, G.M.: i2i trust in e-commerce. Commun. ACM 43(12), 41\u201344 (2000)","journal-title":"Commun. ACM"},{"issue":"1","key":"3_CR56","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1037\/0022-3514.49.1.95","volume":"49","author":"JK Rempel","year":"1985","unstructured":"Rempel, J.K., Holmes, J.G., Zanna, M.P.: Trust in close relationships. J. Person. Soc. Psychol. 49(1), 95\u2013112 (1985)","journal-title":"J. Person. Soc. Psychol."},{"key":"3_CR57","unstructured":"Riegelsberger, J., Sasse, M.A.: Ignore these at your peril: ten principles for trust design. In: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (2010)"},{"key":"3_CR58","doi-asserted-by":"crossref","unstructured":"Riegelsberger, J., Vasalou, A.: Trust 2.1: advancing the trust debate. In: CHI 2007 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2007, pp. 2137\u20132140 (2007)","DOI":"10.1145\/1240866.1240967"},{"key":"3_CR59","doi-asserted-by":"crossref","unstructured":"Rieser, D.C., Bernhard, O.: Measuring trust: the simpler the better?. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2940\u20132946. ACM (2016)","DOI":"10.1145\/2851581.2892468"},{"key":"3_CR60","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-319-26896-5_4","volume-title":"The Future of Law and eTechnologies","author":"S S\u00e4rav","year":"2016","unstructured":"S\u00e4rav, S., Kerikm\u00e4e, T.: E-residency: a cyberdream embodied in a digital identity card? In: Kerikm\u00e4e, T., Rull, A. (eds.) The Future of Law and eTechnologies, pp. 57\u201379. Springer, Cham (2016). doi:10.1007\/978-3-319-26896-5_4"},{"issue":"1","key":"3_CR61","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1207\/s15326985ep2501_6","volume":"25","author":"DH Schunk","year":"1990","unstructured":"Schunk, D.H.: Goal setting and self-efficacy during self-regulated learning. Educ. Psychol. 25(1), 71\u201386 (1990)","journal-title":"Educ. Psychol."},{"issue":"12","key":"3_CR62","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/355112.355124","volume":"43","author":"B Shneiderman","year":"2000","unstructured":"Shneiderman, B.: Designing trust into online experiences. Commun. ACM 43(12), 57\u201359 (2000)","journal-title":"Commun. ACM"},{"key":"3_CR63","unstructured":"S\u00f6llner, M., Hoffmann, A., Hoffmann, H., Wacker, A., Leimeister, J.M.: Understanding the formation of trust in it artifacts. In: Proceedings of the International Conference on Information Systems (ICIS). Association for Information Systems (2012)"},{"key":"3_CR64","unstructured":"S\u00f6llner, M., Leimeister, J.M.: What We Really Know about Antecedents of Trust: A Critical Review of the Empirical Information Systems Literature on Trust. Nova Science Publishers (2013)"},{"key":"3_CR65","unstructured":"Solvak, M., Vassil, K.: E-voting in Estonia: technological diffusion and other developments over ten years (2005\u20132015). The Johan Skytte Institute of Political Studies, University of Tartu, Tartu (2016)"},{"key":"3_CR66","volume-title":"A Practical Guide to Behavioral Research: Tools and Techniques","author":"B Sommer","year":"1991","unstructured":"Sommer, B., Sommer, R.: A Practical Guide to Behavioral Research: Tools and Techniques. Oxford University Press, Oxford (1991)"},{"key":"3_CR67","first-page":"128","volume-title":"International Conference on Learning and Collaboration Technologies","author":"S Sousa","year":"2014","unstructured":"Sousa, S., Lamas, D., Dias, P.: A model for human-computer trust. In: Zaphiris, P., Ioannou, A. (eds.) International Conference on Learning and Collaboration Technologies, pp. 128\u2013137. Springer, Heidelberg (2014)"},{"key":"3_CR68","doi-asserted-by":"crossref","unstructured":"Springall, D., Finkenauer, T., Durumeric, Z., Kitcat, J., Hursti, H., MacAlpine, M., Halderman, J.A.: Security analysis of the estonian internet voting system. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 703\u2013715. ACM (2014)","DOI":"10.1145\/2660267.2660315"},{"issue":"4","key":"3_CR69","doi-asserted-by":"publisher","first-page":"73","DOI":"10.2753\/MIS0742-1222240403","volume":"24","author":"A Vance","year":"2008","unstructured":"Vance, A., Elie-Dit-Cosaque, C., Straub, D.W.: Examining trust in information technology artifacts: the effects of system quality and culture. J. Manage. Inf. Syst. 24(4), 73\u2013100 (2008)","journal-title":"J. Manage. Inf. Syst."},{"key":"3_CR70","doi-asserted-by":"crossref","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 425\u2013478 (2003)","DOI":"10.2307\/30036540"},{"issue":"1","key":"3_CR71","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/25148667","volume":"29","author":"MM Wasko","year":"2005","unstructured":"Wasko, M.M., Faraj, S.: Why should i share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Q. 29(1), 35\u201357 (2005)","journal-title":"MIS Q."},{"key":"3_CR72","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.jesp.2014.01.005","volume":"52","author":"A Waytz","year":"2014","unstructured":"Waytz, A., Heafner, J., Epley, N.: The mind in the machine: Anthropomorphism increases trust in an autonomous vehicle. J. Exper. Soc. Psychol. 52, 113\u2013117 (2014)","journal-title":"J. Exper. Soc. Psychol."}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68059-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:19:40Z","timestamp":1632097180000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-68059-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319680583","9783319680590"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68059-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"21 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bombay","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}