{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:03:52Z","timestamp":1762430632410},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642290466"},{"type":"electronic","value":"9783642290473"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29047-3_42","type":"book-chapter","created":{"date-parts":[[2012,3,19]],"date-time":"2012-03-19T23:05:59Z","timestamp":1332198359000},"page":"348-356","source":"Crossref","is-referenced-by-count":2,"title":["Whodunit? Collective Trust in Virtual Interactions"],"prefix":"10.1007","author":[{"given":"Shuyuan Mary","family":"Ho","sequence":"first","affiliation":[]},{"given":"Issam","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Salome","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-0-387-77672-9_15","volume-title":"Social Computing, Behavioral Modeling","author":"S.M. Ho","year":"2008","unstructured":"Ho, S.M.: Attribution-Based Anomaly Detection: Trustworthiness in an Online Community. In: Liu, H., Salerno, J.J., Young, M.J. (eds.) Social Computing, Behavioral Modeling, pp. 129\u2013140. Springer, Tempe (2008)"},{"key":"42_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4419-0056-2_15","volume-title":"Social Computing and Behavioral Modeling","author":"S.M. Ho","year":"2009","unstructured":"Ho, S.M.: A Socio-Technical Approach to Understanding Perceptions of Trustworthiness in Virtual Organizations. In: Liu, H., Salerno, J.J., Young, M.J. (eds.) Social Computing and Behavioral Modeling, pp. 1\u201310. Springer, Tempe (2009)"},{"issue":"4","key":"42_CR3","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1093\/sf\/63.4.967","volume":"63","author":"J.D. Lewis","year":"1985","unstructured":"Lewis, J.D., Wrigert, A.: Trust as a Social Reality. Social Forces\u00a063(4), 967\u2013985 (1985)","journal-title":"Social Forces"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"McEvily, B., et al.: Can groups be trusted? An experimental study of collective trust, Carnegie Mellon University Department of Social and Decision Sciences (2002)","DOI":"10.2139\/ssrn.323223"},{"key":"42_CR5","first-page":"80","volume-title":"Trust and Reciprocity: Interdisciplinary Lessons From Experimental Research","author":"R. Hardin","year":"2003","unstructured":"Hardin, R.: Gaming Trust. In: Ostrom, E., Walker, J. (eds.) Trust and Reciprocity: Interdisciplinary Lessons From Experimental Research, pp. 80\u2013101. Russell Sage Foundation, New York (2003)"},{"key":"42_CR6","first-page":"437","volume-title":"School of Information Studies 2009","author":"S.M. Ho","year":"2009","unstructured":"Ho, S.M.: Behavioral Anomaly Detection: A Socio-Technical Study of Trustworthiness in Virtual Organizations. In: School of Information Studies 2009, p. 437. Syracuse University, Syracuse (2009)"},{"issue":"2","key":"42_CR7","doi-asserted-by":"crossref","first-page":"379","DOI":"10.5465\/amr.1995.9507312923","volume":"20","author":"L.T. Hosmer","year":"1995","unstructured":"Hosmer, L.T.: Trust: The Connecting Link Between Organizational Theory and Philosophical Ethics. Academy of Management Review\u00a020(2), 379\u2013403 (1995)","journal-title":"Academy of Management Review"},{"issue":"1","key":"42_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1037\/0003-066X.35.1.1","volume":"35","author":"J.B. Rotter","year":"1980","unstructured":"Rotter, J.B.: Interpersonal Trust, Trustworthiness and Gullibility. American Psychologist\u00a035(1), 1\u20137 (1980)","journal-title":"American Psychologist"},{"issue":"4","key":"42_CR9","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1111\/j.1559-1816.1971.tb00371.x","volume":"1","author":"J.B. Rotter","year":"1971","unstructured":"Rotter, J.B., Stein, D.K.: Public Attitudes Toward the Trustworthiness, Competence, and Altruism of Twenty Selected Occupations. Journal of Applied Social Psychology\u00a01(4), 334\u2013343 (1971)","journal-title":"Journal of Applied Social Psychology"},{"key":"42_CR10","doi-asserted-by":"publisher","first-page":"301","DOI":"10.2307\/3053563","volume":"22","author":"T.R. Tyler","year":"1988","unstructured":"Tyler, T.R.: What is Procedural Justice? Law and Society Review\u00a022, 301\u2013355 (1988)","journal-title":"Law and Society Review"},{"key":"42_CR11","doi-asserted-by":"crossref","first-page":"331","DOI":"10.4135\/9781452243610.n16","volume-title":"Trust in Organizations: Frontiers of Theory and Research","author":"T.R. Tyler","year":"1996","unstructured":"Tyler, T.R., Degoey, P.: Trust in Organizational Authorities: The Influence of Motive Attributions on Willingness to Accept Decisions. In: Kramer, R.M., Tyler, T.R. (eds.) Trust in Organizations: Frontiers of Theory and Research, pp. 331\u2013356. Sage, Thousand Oaks (1996)"},{"issue":"3","key":"42_CR12","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"R.C. Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An Integrative Model of Organizational Trust. Academy of Management Review\u00a020(3), 709\u2013734 (1995)","journal-title":"Academy of Management Review"},{"issue":"1","key":"42_CR13","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1037\/0021-9010.84.1.123","volume":"84","author":"R.C. Mayer","year":"1999","unstructured":"Mayer, R.C., Davis, J.H.: The Effect of the Performance Appraisal System on Trust for Management: A Field Quasi-Experiment. Journal of Applied Psychology\u00a084(1), 123\u2013136 (1999)","journal-title":"Journal of Applied Psychology"},{"key":"42_CR14","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1037\/h0055425","volume":"51","author":"F. Heider","year":"1944","unstructured":"Heider, F.: Social Perception and Phenomenal Causality. Psychological Review\u00a051, 358\u2013374 (1944)","journal-title":"Psychological Review"},{"key":"42_CR15","doi-asserted-by":"publisher","DOI":"10.1037\/10628-000","volume-title":"The Psychology of Interpersonal Relations","author":"F. Heider","year":"1958","unstructured":"Heider, F.: The Psychology of Interpersonal Relations. John Wiley & Sons, New York (1958)"},{"issue":"2","key":"42_CR16","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I. Ajzen","year":"1991","unstructured":"Ajzen, I.: The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes\u00a050(2), 179\u2013211 (1991)","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"3","key":"42_CR17","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0092-6566(91)90021-H","volume":"25","author":"L. Beck","year":"1991","unstructured":"Beck, L., Ajzen, I.: Predicting Dishonest Actions Using the Theory of Planned Behavior. Journal of Research in Personality\u00a025(3), 285\u2013301 (1991)","journal-title":"Journal of Research in Personality"},{"key":"42_CR18","volume-title":"Review of Personality and Social Psychology","author":"J.G. Holmes","year":"1989","unstructured":"Holmes, J.G., Rempel, J.K.: Trust in Close Relationships. In: Hendrick, C. (ed.) Review of Personality and Social Psychology. Sage, Beverly Hills (1989a)"},{"key":"42_CR19","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1037\/0022-3514.49.1.95","volume":"49","author":"J.K. Rempel","year":"1985","unstructured":"Rempel, J.K., Holmes, J.G., Zanba, M.D.: Trust in Close Relationship. Journal of Personality and Social Psychology\u00a049, 95\u2013112 (1985)","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"42_CR20","doi-asserted-by":"crossref","first-page":"405","DOI":"10.5465\/amr.1998.926618","volume":"23","author":"G.A. Bigley","year":"1998","unstructured":"Bigley, G.A., Pearce, J.L.: Straining for shared meaning in organizational science: Problems of trust and distrust. Academy of Management Review\u00a023(3), 405\u2013421 (1998)","journal-title":"Academy of Management Review"},{"issue":"2","key":"42_CR21","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1037\/h0034225","volume":"28","author":"H.H. Kelley","year":"1973","unstructured":"Kelley, H.H., et al.: The Process of Causal Attribution. American Psychology\u00a028(2), 107\u2013128 (1973)","journal-title":"American Psychology"},{"key":"42_CR22","unstructured":"von Ahn, L.: Games with a Purpose. IEEE Computer Magazine, 96\u201398 (2006)"},{"key":"42_CR23","doi-asserted-by":"crossref","unstructured":"von Ahn, L., Dabbish, L.: General Techniques for Designing Games with a Purpose. Communications of the ACM, 58\u201367 (2008)","DOI":"10.1145\/1378704.1378719"},{"key":"42_CR24","doi-asserted-by":"crossref","unstructured":"von Ahn, L., et al.: reCAPTCHA: Human-based Character Recognition via Web Security Measures. Science, 1465\u20131468 (2008)","DOI":"10.1126\/science.1160379"}],"container-title":["Lecture Notes in Computer Science","Social Computing, Behavioral - Cultural Modeling and Prediction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29047-3_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:53:23Z","timestamp":1558299203000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29047-3_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642290466","9783642290473"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29047-3_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}