{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:16:42Z","timestamp":1776100602011,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642138683","type":"print"},{"value":"9783642138690","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_27","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T07:24:20Z","timestamp":1277796260000},"page":"367-380","source":"Crossref","is-referenced-by-count":20,"title":["The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.org"],"prefix":"10.1007","author":[{"given":"Jun-E","family":"Tan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"27_CR1","volume-title":"Trust: Reason, Routine Reflexivity","author":"G. M\u00f6llering","year":"2006","unstructured":"M\u00f6llering, G.: Trust: Reason, Routine Reflexivity. Elsevier Ltd., Oxford (2006)"},{"key":"27_CR2","first-page":"94","volume-title":"Trust: Making and breaking cooperative relations","author":"N. Luhmann","year":"1988","unstructured":"Luhmann, N.: Familiarity, confidence, trust: problems and alternatives. In: Gambetta, D. (ed.) Trust: Making and breaking cooperative relations, pp. 94\u2013107. Basil Blackwell, Oxford (1988)"},{"key":"27_CR3","volume-title":"Bowling Alone: The Collapse and Revival of American Community","author":"R. Putnam","year":"2001","unstructured":"Putnam, R.: Bowling Alone: The Collapse and Revival of American Community. Simon & Schuster, Inc., New York (2001)"},{"key":"27_CR4","first-page":"737","volume":"58","author":"C. Corritore","year":"2003","unstructured":"Corritore, C., Kracher, B., Wiedenbeck, S.: On-line trust: concepts, evolving themes, a model. Trust and Technology\u00a058, 737 (2003)","journal-title":"Trust and Technology"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Wang, Y.D., Emurian, H.H.: An overview of online trust: Concepts, elements and implications. Computers in Human Behaviour\u00a0105 (2005)","DOI":"10.1016\/j.chb.2003.11.008"},{"key":"27_CR6","doi-asserted-by":"crossref","first-page":"393","DOI":"10.5465\/amr.1998.926617","volume":"23","author":"D.M. Rousseau","year":"1998","unstructured":"Rousseau, D.M., Sitkin, S.B., Burt, R.S., Camerer, C.: Not so different after all: A cross-discipline view of trust. Academy of Management Review\u00a023, 393 (1998)","journal-title":"Academy of Management Review"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"459","DOI":"10.2307\/259289","volume":"23","author":"R. Bhattacharya","year":"1998","unstructured":"Bhattacharya, R., Devinney, T.M., Pillutla, M.M.: A formal model of trust based on outcomes. Academy of Management Review\u00a023, 459 (1998)","journal-title":"Academy of Management Review"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Shankar, V., Urban, G.L., Sultan, F.: Online trust: a stakeholder perspective, concepts, implications and future directions. Journal of Strategic Information Systems\u00a0325 (2002)","DOI":"10.1016\/S0963-8687(02)00022-7"},{"key":"27_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/355112.355124","volume":"43","author":"B. Shneiderman","year":"2000","unstructured":"Shneiderman, B.: Designing trust into online experiences. ACM Commun.\u00a043, 57 (2000)","journal-title":"ACM Commun."},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Ba, S.: Establishing online trust through a community responsibility system. Decision Support Systems\u00a0323 (2001)","DOI":"10.1016\/S0167-9236(00)00144-5"},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1177\/0038038505050536","volume":"39","author":"J. Brownlie","year":"2005","unstructured":"Brownlie, J., Howson, A.: \u2018Leaps of faith\u2019 and MMR: An empirical study of trust. Sociology\u00a039, 221 (2005)","journal-title":"Sociology"},{"key":"27_CR12","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1057\/palgrave.kmrp.8500105","volume":"4","author":"J.B. Kidd","year":"2006","unstructured":"Kidd, J.B.: Book Review \u2013 Trust: Reason, Routine, Reflexivity. Knowledge Management Research & Practice\u00a04, 254 (2006)","journal-title":"Knowledge Management Research & Practice"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Nooteboom, B.: Book Review Organization Studies\u00a027, 1907 (December 1, 2006)","DOI":"10.1177\/0170840606074945"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"boyd, d.m., Ellison, N.B.: Social Network Sites: Definition, history and scholarship. Journal of Computer-Mediated Communication\u00a013 (2007)","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"27_CR15","unstructured":"Heesakkers, P.: Participate in creating a better world, one couch at a time: An explorative study on the phenomenon of Couchsurfing. Thesis published by NHTV Breda University of Applied Sciences (2008)"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Molz, J.G.: Cosmopolitans on the couch: Mobile hospitality and the Internet. In: Jennie Germann Molz, S.G. (ed.) Mobilizing Hospitality: The Ethics of Social Relations in a Mobile World, Ashgate, Hampshire, pp. 65\u201380 (2007)","DOI":"10.4324\/9781315595795-5"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Lauterbach, D., Truong, H., Shah, T., Adamic, L.: Surfing a web of trust: Reputation and reciprocity on Couchsurfing.com. In: IEEE International Conference on Computational Science and Engineering, vol.\u00a04, p. 4, pp. 346\u2013353 (2009)","DOI":"10.1109\/CSE.2009.345"},{"key":"27_CR18","unstructured":"Bialski, P.: Intimate Tourism: Friendships in a state of mobility \u2013 The case of the online hospitality network. Thesis published by University of Warsaw (2007)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:44:45Z","timestamp":1606167885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}