{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T07:19:34Z","timestamp":1744183174845},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642003271"},{"type":"electronic","value":"9783642003288"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00328-8_69","type":"book-chapter","created":{"date-parts":[[2009,6,6]],"date-time":"2009-06-06T09:17:14Z","timestamp":1244279834000},"page":"687-697","source":"Crossref","is-referenced-by-count":3,"title":["Digital Identity and Reputation in the Context of a Bounded Social Ecosystem"],"prefix":"10.1007","author":[{"given":"Ben","family":"Jennings","sequence":"first","affiliation":[]},{"given":"Anthony","family":"Finkelstein","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"69_CR1","unstructured":"Akerlof, G.: Market for lemons: Quality uncertainty and the market mechanism, ideas.repec.org"},{"key":"69_CR2","series-title":"Economic Organizations as Games","volume-title":"Game theory: A survey","author":"K. Binmore","year":"1986","unstructured":"Binmore, K., Dasgupta, P.: Game theory: A survey. Economic Organizations as Games. Basil Blackwell, Oxford (1986)"},{"key":"69_CR3","doi-asserted-by":"crossref","unstructured":"Bird, C., Gourley, A., Devanbu, P., Gertz, M., Swaminathan, A.: Mining email social networks. In: Proceedings of the 2006 international workshop on Mining software repositories, pp. 137\u2013143 (2006)","DOI":"10.1145\/1137983.1138016"},{"key":"69_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1146\/annurev.so.15.080189.000525","volume":"15","author":"J.L. Bradach","year":"1989","unstructured":"Bradach, J.L., Eccles, R.G.: Markets versus hierarchies: from ideal types to plural forms. Annual Review of Sociology\u00a015, 97\u2013118 (1989)","journal-title":"Annual Review of Sociology"},{"key":"69_CR5","volume-title":"The mythical man-month","author":"F.P. Brooks","year":"1979","unstructured":"Brooks, F.P.: The mythical man-month. Addison-Wesley Pub., Reading (1979)"},{"key":"69_CR6","doi-asserted-by":"crossref","unstructured":"Burt, R.: A note on social capital and network content. Social Networks, pp. 355\u2013373.","DOI":"10.1016\/S0378-8733(97)00003-8"},{"key":"69_CR7","unstructured":"Clugage, K., Shaffer, D., Nainani, B.: Workflow services in oracle bpel pm 10.1.3 (March 2006), http:\/\/tinyurl.com\/2sal77"},{"issue":"4","key":"69_CR8","first-page":"121","volume":"76","author":"T.H. Davenport","year":"1998","unstructured":"Davenport, T.H.: Putting the enterprise into the enterprise system. Harvard Business Review\u00a076(4), 121\u2013131 (1998)","journal-title":"Harvard Business Review"},{"key":"69_CR9","doi-asserted-by":"crossref","unstructured":"Dellarocas, C.: Analyzing the Economic Efficiency of eBay-like Online Reputation Reporting Mechanisms, MIT Sloan School of Management, pp. 4181\u20134101 (2001)","DOI":"10.1145\/501158.501177"},{"key":"69_CR10","unstructured":"Efimova, L., Grudin, J.: Crossing boundaries: A case study of employee blogging. In: Proceedings of the Fortieth Hawaii International Conference on System Sciences, pp. 11\u201324 (2006)"},{"key":"69_CR11","doi-asserted-by":"crossref","unstructured":"Emler, N.: A social psychology of reputation. European Review of Social Psychology (1990)","DOI":"10.1080\/14792779108401861"},{"key":"69_CR12","unstructured":"Farrell, S., Lau, T.: Fringe contacts: People-tagging for the enterprise. In: Collab. Web Tagging Workshop in conj. with WWW 2006, pp. 10\u2013100 (2008)"},{"key":"69_CR13","doi-asserted-by":"crossref","unstructured":"Fombrun, C., Shanley, M.: What\u2019s in a name? reputation building and corporate strategy. Academy of Management Journal (1990)","DOI":"10.5465\/256324"},{"key":"69_CR14","unstructured":"Gambetta, D.: Can we trust trust. Trust: Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford, 213\u2013237 (2000)"},{"key":"69_CR15","unstructured":"Good, N., Schafer, J., Konstan, J., Borchers, A.: Combining collaborative filtering with personal agents for better recommendations. In: Proceedings of AAAI, pp. 9166\u20139172 (1999)"},{"issue":"4","key":"69_CR16","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T. Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials\u00a03(4), 2\u201316 (2000)","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"69_CR17","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th international conference on World Wide Web, pp. 403\u2013412 (2004)","DOI":"10.1145\/988672.988727"},{"issue":"7","key":"69_CR18","doi-asserted-by":"publisher","first-page":"3310","DOI":"10.1145\/3894.3895","volume":"28","author":"S.R. Hiltz","year":"1985","unstructured":"Hiltz, S.R., Turoff, M.: Structuring computer-mediated communication systems to avoid information overload. Communications of the ACM\u00a028(7), 3310\u20133312 (1985)","journal-title":"Communications of the ACM"},{"key":"69_CR19","unstructured":"Jennings, B., Finkelstein, A.: Flexible Workflows: Reputation-based Message Routing. In: Proceedings of BPMDS, vol.\u00a08, p. 97"},{"key":"69_CR20","unstructured":"Kakizawa, Y.: In-house use of web 2.0: Enterprise 2.0. Nec Technical Journal, 8623\u20138635 (2007)"},{"key":"69_CR21","unstructured":"Li, C.: Blogging: Bubble or big deal?, Forrester Research Document, 9290\u20139392 (2004)"},{"key":"69_CR22","unstructured":"Locke, C., Weinberger, D., Searls, D.: The Cluetrain Manifesto: The End of Business As Usual. Perseus Publishing (2001)"},{"key":"69_CR23","doi-asserted-by":"crossref","unstructured":"Luna-Reyes, L., Cresswell, A., Richardson, G.: Knowledge and the development of interpersonal trust: a dynamic model. System Sciences (2004)","DOI":"10.1109\/HICSS.2004.1265241"},{"key":"69_CR24","unstructured":"Massa, P.: I\u00a0ITC-IRST, A survey of trust use and modeling in real online systems"},{"issue":"2","key":"69_CR25","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/BF01145458","volume":"1","author":"A. Mehrabian","year":"1977","unstructured":"Mehrabian, A.: A questionnaire measure of individual differences in stimulus screening and associated differences in arousability. Journal of Nonverbal Behavior\u00a01(2), 89\u2013103 (1977)","journal-title":"Journal of Nonverbal Behavior"},{"key":"69_CR26","doi-asserted-by":"crossref","unstructured":"Millen, D., Feinberg, J., Kerr, B.: Dogear: Social bookmarking in the enterprise. In: Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pp. 8561\u20138580 (2006)","DOI":"10.1145\/1124772.1124792"},{"issue":"02","key":"69_CR27","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1177\/S0038038501000190","volume":"35","author":"G. M\u00f6llering","year":"2001","unstructured":"M\u00f6llering, G.: The nature of trust: From georg simmel to a theory of expectation, interpretation and suspension. Sociology\u00a035(02), 403\u2013420 (2001)","journal-title":"Sociology"},{"key":"69_CR28","doi-asserted-by":"crossref","unstructured":"Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation for e-businesses. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS 2002), vol.\u00a07, pp. 3184\u20133200 (2002)","DOI":"10.1109\/HICSS.2002.994181"},{"key":"69_CR29","doi-asserted-by":"crossref","unstructured":"Navarro, G.: A guided tour to approximate string matching. ACM Computing Surveys (CSUR), pp. 31\u201388 (2001)","DOI":"10.1145\/375360.375365"},{"issue":"2","key":"69_CR30","first-page":"167","volume":"45","author":"M.E.J. Newman","year":"2004","unstructured":"Newman, M.E.J.: The structure and function of complex networks. Structure\u00a045(2), 167\u2013256 (2004)","journal-title":"Structure"},{"key":"69_CR31","doi-asserted-by":"crossref","unstructured":"Nurcan, S.: Analysis and design of co-operative work processes: a framework. Information and Software Technology, pp. 143\u2013156 (1998)","DOI":"10.1016\/S0950-5849(98)00048-2"},{"issue":"4","key":"69_CR32","first-page":"10","volume":"10","author":"A. Quan-Haase","year":"1997","unstructured":"Quan-Haase, A., Cothrel, J., Wellman, B.: Instant messaging for collaboration: A case study of a high-tech firm. Journal of Computer-Mediated Communication\u00a010(4), 00\u201310 (1997)","journal-title":"Journal of Computer-Mediated Communication"},{"key":"69_CR33","doi-asserted-by":"crossref","unstructured":"Raub, W., Weesie, J.: Reputation and efficiency in social interactions: An example of network effects. American Journal of Sociology (1990)","DOI":"10.1086\/229574"},{"key":"69_CR34","unstructured":"Russell, N., ter Hofstede, A.H.M., Edmond, D., van der Aalst, W.M.P.: Workflow resource patterns. BETA Working Paper Series (2004)"},{"key":"69_CR35","doi-asserted-by":"crossref","unstructured":"Shapiro, C.: Consumer information, product quality, and seller reputation. Bell Journal of Economics (1982)","DOI":"10.2307\/3003427"},{"key":"69_CR36","doi-asserted-by":"crossref","unstructured":"Stvilia, B., Twidale, M., Smith, L.: Information quality work organization in wikipedia (2008)","DOI":"10.1002\/asi.20813"},{"key":"69_CR37","doi-asserted-by":"crossref","unstructured":"Tichy, W.: Should computer scientists experiment more (1998), doi:ieeecs.org","DOI":"10.1109\/2.675631"},{"key":"69_CR38","doi-asserted-by":"crossref","unstructured":"Tinsley, C., O\u2019Connor, K., Sullivan, B.: Tough guys finish last: the perils of a distributive reputation. Organizational Behavior and Human Decision Processes (2002)","DOI":"10.1016\/S0749-5978(02)00005-5"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00328-8_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T18:47:03Z","timestamp":1558378023000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00328-8_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642003271","9783642003288"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00328-8_69","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2009]]}}}