{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T05:14:55Z","timestamp":1740287695014,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642145964"},{"type":"electronic","value":"9783642145971"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14597-1_13","type":"book-chapter","created":{"date-parts":[[2010,7,9]],"date-time":"2010-07-09T13:50:13Z","timestamp":1278683413000},"page":"212-226","source":"Crossref","is-referenced-by-count":4,"title":["Exploring Trust of Mobile Applications Based on User Behaviors"],"prefix":"10.1007","author":[{"given":"Zheng","family":"Yan","sequence":"first","affiliation":[]},{"given":"Yan","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Valtteri","family":"Niemi","sequence":"additional","affiliation":[]},{"given":"Guoliang","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"13_CR1","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1287\/isre.13.3.334.81","volume":"13","author":"D.H. McKnight","year":"2002","unstructured":"McKnight, D.H., Choudhury, V., Kacmar, C.: Developing and Validating Trust Measures for E-Commerce: an Integrative Typology. Information Systems Research\u00a013(3), 334\u2013359 (2002)","journal-title":"Information Systems Research"},{"unstructured":"Marsh, S.: Formalising Trust as a Computational Concept. Doctoral dissertation, University of Stirling (1994)","key":"13_CR2"},{"doi-asserted-by":"crossref","unstructured":"Yan, Z., Holtmanns, S.: Trust Modeling and Management: from Social Trust to Digital Trust. In: Book chapter of Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions. IGI Global (2008)","key":"13_CR3","DOI":"10.4018\/978-1-59904-804-8.ch013"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-02704-8_15","volume-title":"Autonomic and Trusted Computing","author":"Z. Yan","year":"2009","unstructured":"Yan, Z., Yan, R.: Formalizing Trust Based on Usage Behaviours for Mobile Applications. In: Gonz\u00e1lez Nieto, J., Reif, W., Wang, G., Indulska, J. (eds.) ATC 2009. LNCS, vol.\u00a05586, pp. 194\u2013208. Springer, Heidelberg (2009)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-642-02704-8_14","volume-title":"Autonomic and Trusted Computing","author":"Z. Yan","year":"2009","unstructured":"Yan, Z., Niemi, V.: A Methodology towards Usable Trust Management. In: Gonz\u00e1lez Nieto, J., Reif, W., Wang, G., Indulska, J. (eds.) ATC 2009. LNCS, vol.\u00a05586, pp. 179\u2013193. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Li, X., Valacich, J.S., Hess, T.J.: Predicting User Trust in Information Systems: a Comparison of Competing Trust Models. In: Proc. of 37th Annual Hawaii International Conference on System Sciences, 10 p. (2004)","key":"13_CR6","DOI":"10.1109\/HICSS.2004.1265619"},{"issue":"3","key":"13_CR7","doi-asserted-by":"crossref","first-page":"405","DOI":"10.5465\/amr.1998.926618","volume":"23","author":"G.A. Bigley","year":"1998","unstructured":"Bigley, G.A., Pearce, J.L.: Straining for Shared Meaning in Organization Science. Problems of Trust and Distrust. Acad. Management Rev.\u00a023(3), 405\u2013421 (1998)","journal-title":"Problems of Trust and Distrust. Acad. Management Rev."},{"key":"13_CR8","volume-title":"Beliefs, Attitude, Intention and Behavior: an Introduction to Theory and Research","author":"M. Fishbein","year":"1975","unstructured":"Fishbein, M., Ajzen, I.: Beliefs, Attitude, Intention and Behavior: an Introduction to Theory and Research. Addison-Wesley, Reading (1975)"},{"issue":"1","key":"13_CR9","doi-asserted-by":"publisher","first-page":"42","DOI":"10.2307\/1252172","volume":"54","author":"J.C. Anderson","year":"1990","unstructured":"Anderson, J.C., Narus, J.A.: A model of Distributor Firm and Manufacturer Firm Working Partnerships. Marketing\u00a054(1), 42\u201358 (1990)","journal-title":"Marketing"},{"key":"13_CR10","volume-title":"Beyond Contract: Work, Power, and Trust Relations","author":"A. Fox","year":"1974","unstructured":"Fox, A.: Beyond Contract: Work, Power, and Trust Relations. Faber, London (1974)"},{"key":"13_CR11","volume-title":"The Resolution of Conflict: Constructive and Destructive Processes","author":"M. Deutsch","year":"1973","unstructured":"Deutsch, M.: The Resolution of Conflict: Constructive and Destructive Processes. Yale University Press, New Haven (1973)"},{"issue":"3","key":"13_CR12","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1086\/209170","volume":"15","author":"B.H. Sheppard","year":"1988","unstructured":"Sheppard, B.H., Hartwick, J., Warshaw, P.R.: The Theory of Reasoned Action; A Meta Analysis of Past Research with Recommendations for Modifications in Future Research. Consumer Res.\u00a015(3), 325\u2013343 (1988)","journal-title":"Consumer Res."},{"issue":"2","key":"13_CR13","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V. Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Sci.\u00a046(2), 186\u2013204 (2000)","journal-title":"Management Sci."},{"issue":"6","key":"13_CR14","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1016\/S1071-5819(03)00043-0","volume":"58","author":"S. Grabner-Kr\u00e4uter","year":"2003","unstructured":"Grabner-Kr\u00e4uter, S., Kaluscha, E.A.: Empirical Research in On-line Trust: a Review and Critical Assessment. Int. J. of Human-Computer Studies\u00a058(6), 783\u2013812 (2003)","journal-title":"Int. J. of Human-Computer Studies"},{"issue":"11","key":"13_CR15","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1080\/00140139408964957","volume":"37","author":"B.M. Muir","year":"1994","unstructured":"Muir, B.M.: Trust in Automation: Part I. Theoretical Issues in the Study of Trust and Human Intervention in Automated Systems. Ergonomics\u00a037(11), 1905\u20131922 (1994)","journal-title":"Ergonomics"},{"issue":"3","key":"13_CR16","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1080\/00140139608964474","volume":"39","author":"B.M. Muir","year":"1996","unstructured":"Muir, B.M.: Trust in Automation Part II: Experimental Studies of Trust and Human Intervention in a Process Control Simulation. Ergonomics\u00a039(3), 429\u2013469 (1996)","journal-title":"Ergonomics"},{"issue":"10","key":"13_CR17","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1080\/00140139208967392","volume":"35","author":"J. Lee","year":"1992","unstructured":"Lee, J., Moray, N.: Trust, Control Strategies and Allocation of Function in Human-Machine Systems. Ergonomics\u00a035(10), 1243\u20131270 (1992)","journal-title":"Ergonomics"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-540-69295-9_36","volume-title":"Autonomic and Trusted Computing","author":"Z. Yan","year":"2008","unstructured":"Yan, Z., Niemi, V., Dong, Y., Yu, G.: A User Behavior Based Trust Model for Mobile Applications. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. LNCS, vol.\u00a05060, pp. 455\u2013469. Springer, Heidelberg (2008)"},{"issue":"3","key":"13_CR19","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1037\/1082-989X.4.3.272","volume":"4","author":"L.R. Fabrigar","year":"1999","unstructured":"Fabrigar, L.R., Wegener, D.T., MacCallum, R.C., Strahan, E.J.: Evaluating the Use of Exploratory Factor Analysis in Psychological Research. Psychological Methods\u00a04(3), 272\u2013299 (1999)","journal-title":"Psychological Methods"},{"issue":"3","key":"13_CR20","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1037\/0033-2909.103.3.411","volume":"103","author":"J.C. Anderson","year":"1988","unstructured":"Anderson, J.C., Gerbing, D.W.: Structural Equation Modeling in Practice: a Review and Recommended Two-Step Approach. Psychological Bulletin\u00a0103(3), 411\u2013423 (1988)","journal-title":"Psychological Bulletin"},{"issue":"6","key":"13_CR21","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1016\/S1071-5819(03)00041-7","volume":"58","author":"C.L. Corritore","year":"2003","unstructured":"Corritore, C.L., Kracher, B., Wiedenbeck, S.: On-line Trust: Concepts, Evolving Themes, a Model. Int. J. of Human-Computer Studies, Trust and Technology\u00a058(6), 737\u2013758 (2003)","journal-title":"Int. J. of Human-Computer Studies, Trust and Technology"},{"unstructured":"Crocker, L., Algina, J.: Introduction to Classical and Modern Test Theory. Thomson Leaning (1986)","key":"13_CR22"},{"key":"13_CR23","volume-title":"Psychometric Theory","author":"J.C. Nunnally","year":"1978","unstructured":"Nunnally, J.C.: Psychometric Theory, 2nd edn. McGraw-Hill, New York (1978)","edition":"2"},{"issue":"7","key":"13_CR24","first-page":"1","volume":"7","author":"D. Gefen","year":"2000","unstructured":"Gefen, D., Straub, D., Boudreau, M.: Structural Equation Modeling and Regression: Guidelines for Research Practice. Comm. AiS\u00a07(7), 1\u201378 (2000)","journal-title":"Comm. AiS"},{"issue":"3","key":"13_CR25","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1080\/07421222.1999.11518262","volume":"16","author":"J.J. Jiang","year":"1999","unstructured":"Jiang, J.J., Klein, G.: Supervisor Support and Career Anchor Impact on the Career Satisfaction of the Entry-level Information Systems Professional. Management Inform. Systems\u00a016(3), 219\u2013240 (1999\/2000)","journal-title":"Management Inform. Systems"},{"key":"13_CR26","volume-title":"Testing Structural Equation Models","author":"M.W. Browne","year":"1992","unstructured":"Browne, M.W., Cudeck, R.: Alternative Ways of Assessing Model Fit. In: BoUen, K.A., Long, J.S. (eds.) Testing Structural Equation Models. Sage, Beverly Hills (1992)"},{"issue":"3","key":"13_CR27","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1037\/0033-2909.88.3.588","volume":"88","author":"P.M. Bentler","year":"1980","unstructured":"Bentler, P.M., Bonnett, D.G.: Significance Tests and Goodness of Fit in the Analysis of Covariance Structures. Psychological Bulletin\u00a088(3), 588\u2013606 (1980)","journal-title":"Psychological Bulletin"},{"unstructured":"Bentler, P.M.: EQS Structural Equations Program Manual. BMDP Statistical Software. Los Angeles (1989)","key":"13_CR28"},{"issue":"2","key":"13_CR29","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1006\/jvbe.1999.1713","volume":"56","author":"D. Carlson","year":"2000","unstructured":"Carlson, D., Kacmar, K., Williams, L.: Construction and Initial Validation of a Multidimensional Measure of Work-Family Conflict. Journal of Vocational Behavior\u00a056(2), 249\u2013276 (2000)","journal-title":"Journal of Vocational Behavior"},{"issue":"1","key":"13_CR30","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans. on Dependable and Secure Computing\u00a01(1), 11\u201333 (2004)","journal-title":"IEEE Trans. on Dependable and Secure Computing"},{"unstructured":"Yan, Z.: Trust Management for Mobile Computing Platforms, PhD dissertation, Dept. of Electrical and Communication Eng., Helsinki Univ. of Technology (2007)","key":"13_CR31"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14597-1_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T20:12:52Z","timestamp":1740255172000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14597-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642145964","9783642145971"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14597-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}