{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T13:58:43Z","timestamp":1761919123084},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540682547"},{"type":"electronic","value":"9783540682554"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-68255-4_22","type":"book-chapter","created":{"date-parts":[[2008,6,9]],"date-time":"2008-06-09T07:26:03Z","timestamp":1212996363000},"page":"204-207","source":"Crossref","is-referenced-by-count":4,"title":["Investigating the Role of Trust in Agile Methods Using a Light Weight Systematic Literature Review"],"prefix":"10.1007","author":[{"given":"Eisha","family":"Hasnain","sequence":"first","affiliation":[]},{"given":"Tracy","family":"Hall","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Fowler, M., Highsmith, J.: The Agile Manifesto [November 10, 2007] (2001), http:\/\/www.ddj.com\/linux-open-source\/184414755"},{"key":"22_CR2","unstructured":"Kitchenham, B.: Procedure for Performing Systematic Literature Reviews. Keele University Technical Report, 1353\u20137776 (2004)"},{"issue":"2","key":"22_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MITP.2007.27","volume":"9","author":"L. Cao","year":"2007","unstructured":"Cao, L.: Agile Software Development: Ad Hoc Practices or Sound Principles? IT Professional\u00a09(2), 41\u201347 (2007)","journal-title":"IT Professional"},{"key":"22_CR4","unstructured":"Huang, J.: Trust Judgement in Knowledge Provenance. In: Proceedings of Sixteenth International Workshop on Database and Expert Systems, pp. 524\u2013528 (2005)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Nguyen, T.P., Babar, A.M., Verner, J.: Critical Factors in Establishing and Maintaining Trust in Software Outsourcing Relationship. In: International Conference on Software Engineering, pp. 624\u2013627 (2006)","DOI":"10.1145\/1134285.1134377"},{"key":"22_CR6","first-page":"139","volume-title":"Extreme Programming and Agile Processes in Software Engineering","author":"H. Sharp","year":"2004","unstructured":"Sharp, H., Robinson, H.: Extreme Programming and Agile Processes in Software Engineering, pp. 139\u2013147. Springer, Heidelberg (2004)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Adolph, S.: Are we ready to be Unleashed? A Comparative Analysis between Agile Software Development and War Fighting. In: Proceedings of Agile Conference, pp. 20\u201328 (2005)","DOI":"10.1109\/ADC.2005.13"}],"container-title":["Lecture Notes in Business Information Processing","Agile Processes in Software Engineering and Extreme Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68255-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T21:34:56Z","timestamp":1557610496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68255-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540682547","9783540682554"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68255-4_22","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2008]]}}}