{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:40:10Z","timestamp":1725572410241},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540213123"},{"type":"electronic","value":"9783540247470"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24747-0_12","type":"book-chapter","created":{"date-parts":[[2010,12,17]],"date-time":"2010-12-17T15:40:19Z","timestamp":1292600419000},"page":"146-160","source":"Crossref","is-referenced-by-count":7,"title":["Using Risk Analysis to Assess User Trust"],"prefix":"10.1007","author":[{"given":"Gyrd","family":"Br\u00e6ndeland","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ketil","family":"St\u00f8len","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Australian\/New Zealand Standard for Risk Management 4360:1999"},{"key":"12_CR2","first-page":"51","volume-title":"EDOC 2002","author":"J.\u00d8. Aagedal","year":"2002","unstructured":"Aagedal, J.\u00d8., den Braber, F., Dimitrakos, T., Gran, B.A., Raptis, D., St\u00f8len, K.: Model-based risk assessment to improve enterprise security. In: EDOC 2002, pp. 51\u201362. IEEE Computer Society, Los Alamitos (2002)"},{"key":"12_CR3","unstructured":"Bj\u00f8rkeng, P.K., Haraldsen, C., Stenseng, S.: Strykkarakter til internett-bank. Aftenposten (August 2000)"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1142\/S0218539394000362","volume":"1","author":"A. Bouti","year":"1994","unstructured":"Bouti, A., Kadi, D.A.: A state-of-the-art review of FMEA\/FMECA. International journal of reliability, quality and safety engineering\u00a01, 515\u2013543 (1994)","journal-title":"International journal of reliability, quality and safety engineering"},{"key":"12_CR5","first-page":"159","volume-title":"I3E 2002","author":"T. Dimitrakos","year":"2002","unstructured":"Dimitrakos, T., Ritchie, B., Raptis, D., Aagedal, J.\u00d8., den Braber, F., St\u00f8len, K., Houmb, S.-H.: Integrating model-based security risk managament into ebusiness systems development: The coras approach. In: I3E 2002, pp. 159\u2013175. Kluwer, Dordrecht (2002)"},{"key":"12_CR6","unstructured":"Egger, F.N.: Towards a model of trust for e-commerce system design. In: CHI 2000: Workshop Designing Interactive Systems for 1-to-1 E-commerce (April 2000), http:\/\/www.zurich.ibm.com\/~mrs\/chi2000\/contributions\/egger.html"},{"key":"12_CR7","unstructured":"Egger, F.N.: From Interactions to Transactions: Designing the Trust Experience for Business-to-Consumer Electronic Commerce. PhD thesis, Eindhoven University of Technology (2003)"},{"key":"12_CR8","unstructured":"Fogg, B., Soohoo, C., Danielson, D., Marable, L., Stanford, J., Tauber, E.R.: How do people evaluate a web sites credibility? Technical report, Stanford Persuasive Technology Lab (October 2002), http:\/\/www.consumerwebwatch.org\/news\/report3_credibilityresearch\/stanfordPTL_abstract.htm"},{"key":"12_CR9","series-title":"Using Computers to Change What We Think and Do","volume-title":"Persuasive Technology","author":"B.J. Fogg","year":"2002","unstructured":"Fogg, B.J.: Persuasive Technology. Using Computers to Change What We Think and Do. Morgan Kaufman Publishers, San Francisco (December 2002)"},{"key":"12_CR10","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/302979.303001","volume-title":"Proceedings of the SIGCHI conference on Human factors in computing systems","author":"B.J. Fogg","year":"1999","unstructured":"Fogg, B.J., Tseng, H.: The elements of computer credibility. In: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 80\u201387. ACM Press, New York (1999)"},{"key":"12_CR11","unstructured":"Herrmann, P.: How to integrate trust management into a risk analysis process. In: Second Internal iTrust Workshop On Trust Management In Dynamic Open Systems (September 2003)"},{"key":"12_CR12","unstructured":"IEC 1025. Fault Tree Analysis, FTA (1990)"},{"key":"12_CR13","unstructured":"ISO\/IEC TR 13335-1. Information Technology - Guidelines for the management of IT Security - Part 1: Concepts and models for IT security (2001)"},{"key":"12_CR14","series-title":"A logical framework","volume-title":"The open agent society, ch. 3","author":"A.J.I. Jones","year":"2004","unstructured":"Jones, A.J.I.: The open agent society, ch. 3. A logical framework. John Wiley & Sons, Chichester (2004)"},{"issue":"12","key":"12_CR15","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/355112.355128","volume":"43","author":"S. Jones","year":"2000","unstructured":"Jones, S., Wilikens, M., Morris, P., Masera, M.: Trust requirements in e-business. Communications of the ACM\u00a043(12), 81\u201387 (2000)","journal-title":"Communications of the ACM"},{"key":"12_CR16","unstructured":"J\u00f8sang, A., Knapskog, S.: A metric for trusted systems. In: 21st National Security Conference (1998), http:\/\/csrc.nist.gov\/nissc\/1998\/proceedings\/paperA2.pdf"},{"key":"12_CR17","unstructured":"Koufaris, M., Hampton-Sosa, W.: Customer trust online: Examening the role of the experience with the web site. Technical Report #CIS-2002-05, Department of Statistics & Computer informations systems. Zicklin school of business, Baruch college, CIS Working paper series (May 2002)"},{"key":"12_CR18","unstructured":"Lund, M.S., Hogganvik, I., Seehusen, F., St\u00f8len, K.: UML profile for security assessment. Technical Report STF40 A03066, SINTEF Telecom and informatics (December 2003)"},{"issue":"3","key":"12_CR19","doi-asserted-by":"publisher","first-page":"709","DOI":"10.2307\/258792","volume":"20","author":"R.C. Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Academy of management review\u00a020(3), 709\u2013734 (1995)","journal-title":"Academy of management review"},{"key":"12_CR20","volume-title":"Hazop and software hazop","author":"F. Redmill","year":"1999","unstructured":"Redmill, F., Chudleigh, M., Catmur, J.: Hazop and software hazop. Wiley, Chichester (1999)"}],"container-title":["Lecture Notes in Computer Science","Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24747-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T14:59:12Z","timestamp":1685890752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24747-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540213123","9783540247470"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24747-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}