{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:10:41Z","timestamp":1725516641197},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642314780"},{"type":"electronic","value":"9783642314797"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31479-7_47","type":"book-chapter","created":{"date-parts":[[2012,8,9]],"date-time":"2012-08-09T00:10:15Z","timestamp":1344471015000},"page":"274-279","source":"Crossref","is-referenced-by-count":1,"title":["How Will Software Engineers of the Internet of Things Reason about Trust?"],"prefix":"10.1007","author":[{"given":"Andrew J. B.","family":"Fugard","sequence":"first","affiliation":[]},{"given":"Elke","family":"Beck","sequence":"additional","affiliation":[]},{"given":"Magdalena","family":"G\u00e4rtner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"15","key":"47_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L. Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. Computer Networks\u00a054(15), 2787\u20132805 (2010)","journal-title":"Computer Networks"},{"key":"47_CR2","doi-asserted-by":"crossref","DOI":"10.1002\/9780470519851","volume-title":"Trust Theory: A Socio-cognitive and Computational Model","author":"C. Castelfranchi","year":"2010","unstructured":"Castelfranchi, C., Falcone, R.: Trust Theory: A Socio-cognitive and Computational Model. John Wiley and Sons Ltd., Chichester (2010)"},{"key":"47_CR3","unstructured":"Dijkstra, E.W.: On anthropomorphism in science. Tech. rep. (1985), \n                    \n                      http:\/\/www.cs.utexas.edu\/users\/EWD\/ewd09xx\/EWD936.PDF"},{"issue":"4","key":"47_CR4","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1038\/scientificamerican1004-76","volume":"291","author":"N. Gershenfeld","year":"2004","unstructured":"Gershenfeld, N., Krikorian, R., Cohen, D.: The Internet of Things. Scientific American\u00a0291(4), 76\u201381 (2004)","journal-title":"Scientific American"},{"key":"47_CR5","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s10339-007-0170-2","volume":"8","author":"J.M. Kilner","year":"2007","unstructured":"Kilner, J.M., Friston, K.J., Frith, C.D.: Predictive coding: an account of the mirror neuron system. Cognitive Processing\u00a08, 159\u2013166 (2007)","journal-title":"Cognitive Processing"},{"key":"47_CR6","unstructured":"M\u00f6llering, G.: Trust: Reason, Routine, Reflexivity. Elsevier, Oxford (2006)"},{"key":"47_CR7","unstructured":"Riegelsberger, J., Sasse, M.A.: Ignore these at your peril: Ten principles for trust design. In: Proceedings of Trust 2010: 3rd International Conference on Trust and Trustworthy Computing (2010)"}],"container-title":["Communications in Computer and Information Science","Constructing Ambient Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31479-7_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T20:07:21Z","timestamp":1557173241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31479-7_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642314780","9783642314797"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31479-7_47","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}