{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:20:11Z","timestamp":1740097211537,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662455258"},{"type":"electronic","value":"9783662455265"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45526-5_27","type":"book-chapter","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T06:07:08Z","timestamp":1417414028000},"page":"288-302","source":"Crossref","is-referenced-by-count":0,"title":["Enterprise\u2019s Online Trust Crisis Management: A Life Cycle View"],"prefix":"10.1007","author":[{"given":"Yitang","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Chunhui","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Internet Users in the World Distribution By World Regions-2012 Q2 (December 26, 2012), \n                    \n                      http:\/\/www.internetworldstats.com\/stats.htm"},{"key":"27_CR2","unstructured":"33th statistical report on the Internet Development in China, \n                    \n                      http:\/\/www.cnnic.net.cn"},{"key":"27_CR3","unstructured":"Global e-commerce sales will top $1.25 trillion by 2013, \n                    \n                      http:\/\/www.internetretailer.com\/2012\/06\/14\/global-e-commerce-sales-will-top-125-trillion-2013"},{"key":"27_CR4","unstructured":"The transactions of e-commerce market in China amounted to 5.6 trillion Yuan in the first three seasons, \n                    \n                      http:\/\/finance.sina.com.cn\/chanjing\/cyxw\/20121127\/153913813624.shtml"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.im.2004.01.002","volume":"42","author":"C. Liu","year":"2004","unstructured":"Liu, C., Marchewka, J.T., Lu, J., Yu, C.: Beyond concern: a privacy\u2013trust\u2013behavioral intention model of electronic commerce. Information Management\u00a042, 127\u2013142 (2004)","journal-title":"Information Management"},{"key":"27_CR6","doi-asserted-by":"crossref","first-page":"105","DOI":"10.2307\/25148783","volume":"31","author":"P.A. Pavlou","year":"2007","unstructured":"Pavlou, P.A., Liang, H., Xue, Y.: Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective. MIS Quarterly\u00a031, 105\u2013136 (2007)","journal-title":"MIS Quarterly"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.dss.2010.02.008","volume":"49","author":"X. Luo","year":"2010","unstructured":"Luo, X., Lib, H., Zhang, J., Shimd, J.P.: Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decision Support Systems\u00a049, 222\u2013234 (2010)","journal-title":"Decision Support Systems"},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.1016\/j.chb.2012.03.010","volume":"28","author":"G.S. Mesch","year":"2012","unstructured":"Mesch, G.S.: Is online trust and trust in social teams associated with online disclosure of identifiable information online? Computers in Human Behavior\u00a028, 1471\u20131477 (2012)","journal-title":"Computers in Human Behavior"},{"key":"27_CR9","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"R.C. Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Academy of Management Review\u00a020, 709\u2013734 (1995)","journal-title":"Academy of Management Review"},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1177\/0170840601222007","volume":"22","author":"R. Bachmann","year":"2001","unstructured":"Bachmann, R.: Trust, Power and Control in Transorganizational Relations. Organization Studies\u00a022, 337\u2013365 (2001)","journal-title":"Organization Studies"},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1348\/014466602321149849","volume":"41","author":"T. Devosk","year":"2002","unstructured":"Devosk, T., Spini, D., Schwartz, S.: Conflicts among human values and trust in institutions. British Journal of Social Psychology\u00a041, 481\u2013494 (2002)","journal-title":"British Journal of Social Psychology"},{"key":"27_CR12","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/S0047-2727(01)00084-6","volume":"85","author":"A. Alesina","year":"2002","unstructured":"Alesina, A., Ferrara, E.: Who trusts others? Journal of Public Economics\u00a085, 207\u2013234 (2002)","journal-title":"Journal of Public Economics"},{"key":"27_CR13","doi-asserted-by":"publisher","first-page":"393","DOI":"10.5465\/AMR.1998.926617","volume":"3","author":"D.M. Rousseau","year":"1998","unstructured":"Rousseau, D.M., Stkin, S.B., Camerer, C.: Not so different after all: a cross-discipline view of trust. Academy of Management Review\u00a03, 393\u2013404 (1998)","journal-title":"Academy of Management Review"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1016\/j.chb.2010.03.013","volume":"26","author":"A. Beldad","year":"2010","unstructured":"Beldad, A., Jong, M., Steehouder, M.: How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior\u00a026, 857\u2013869 (2010)","journal-title":"Computers in Human Behavior"},{"key":"27_CR15","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.dss.2012.05.005","volume":"54","author":"V. Midha","year":"2012","unstructured":"Midha, V.: Impact of consumer empowerment on online trust: An examination across genders. Decision Support Systems\u00a054, 198\u2013205 (2012)","journal-title":"Decision Support Systems"},{"key":"27_CR16","volume-title":"Communication, organization and crisis","author":"M.W. Seeger","year":"2003","unstructured":"Seeger, M.W., Sellnow, T.L., Ulmer, R.R.: Communication, organization and crisis. Praeger, Santa Barbara (2003)"},{"key":"27_CR17","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/S0019-8501(01)00182-1","volume":"31","author":"X.M. Luo","year":"2002","unstructured":"Luo, X.M.: Trust production and privacy concerns on the Internet A framework based on relationship marketing and social. Industrial Marketing Management\u00a031, 111\u2013118 (2002)","journal-title":"Industrial Marketing Management"},{"key":"27_CR18","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.chb.2003.11.008","volume":"21","author":"Y.D. Wang","year":"2005","unstructured":"Wang, Y.D., Emurian, H.: An overview of online trust: concepts, elements, and implications. Computers in Human Behavior\u00a021, 105\u2013125 (2005)","journal-title":"Computers in Human Behavior"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"275","DOI":"10.2753\/MIS0742-1222240411","volume":"24","author":"D. Gefen","year":"2008","unstructured":"Gefen, D., Benbasat, I., Pavlou, P.: A research agenda for trust in online environments. Journal of Management Information Systems\u00a024, 275\u2013286 (2008)","journal-title":"Journal of Management Information Systems"},{"key":"27_CR20","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1016\/j.chb.2010.03.013","volume":"26","author":"A. Beldad","year":"2010","unstructured":"Beldad, A., Jong, M., Steehouder, M.: How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior\u00a026, 857\u2013869 (2010)","journal-title":"Computers in Human Behavior"},{"key":"27_CR21","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.jbusres.2010.09.014","volume":"64","author":"R.L. Benedicktus","year":"2011","unstructured":"Benedicktus, R.L.: The effects of 3rd party consensus information on service expectations and online trust. Journal of Business Research\u00a064, 846\u2013853 (2011)","journal-title":"Journal of Business Research"},{"key":"27_CR22","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.dss.2011.12.007","volume":"53","author":"G.W. Bock","year":"2012","unstructured":"Bock, G.W., et al.: The progression of online trust in the multi-channel retailer context and the role of product uncertainty. Decision Support Systems\u00a053, 97\u2013107 (2012)","journal-title":"Decision Support Systems"},{"key":"27_CR23","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1016\/j.knosys.2012.09.002","volume":"37","author":"Y.A. Kim","year":"2013","unstructured":"Kim, Y.A., Ahmad, M.A.: Trust, distrust and lack of confidence of users in online social media-sharing communities. Knowledge-Based Systems\u00a037, 438\u2013450 (2013)","journal-title":"Knowledge-Based Systems"},{"key":"27_CR24","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/S0925-7535(98)00042-3","volume":"30","author":"R. Heath","year":"1998","unstructured":"Heath, R.: Dealing with the complete crisis-the crisis management shell structure. Safety Science\u00a030, 139\u2013150 (1998)","journal-title":"Safety Science"},{"key":"27_CR25","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/S0167-9236(99)00007-X","volume":"25","author":"H.Y. Mak","year":"1999","unstructured":"Mak, H.Y., et al.: Building online crisis management support using workflow systems. Decision Support Systems\u00a025, 209\u2013224 (1999)","journal-title":"Decision Support Systems"},{"key":"27_CR26","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1016\/S0952-8180(00)00223-3","volume":"12","author":"W.B. Murray","year":"2000","unstructured":"Murray, W.B., Foster, P.A.: Crisis Resource Management Among Strangers: Principles of Organizing a Multidisciplinary Group for Crisis Resource Management. Journal of Clinical Anesthesia\u00a012, 633\u2013638 (2000)","journal-title":"Journal of Clinical Anesthesia"},{"key":"27_CR27","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.actaastro.2009.03.088","volume":"66","author":"J. Ryzenko","year":"2010","unstructured":"Ryzenko, J., Smolarkiewicz, M.: Space-enabled information environment for crisis management. Scenario-based analysis and evaluation in an operational environment. Acta Astronautica\u00a066, 33\u201339 (2010)","journal-title":"Acta Astronautica"},{"key":"27_CR28","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.orgdyn.2010.10.008","volume":"40","author":"M. Christine","year":"2011","unstructured":"Christine, M., Pearson, S.: Amy Sommer. Infusing creativity into crisis management: An essential approach today. Organizational Dynamics\u00a040, 27\u201333 (2011)","journal-title":"Organizational Dynamics"},{"key":"27_CR29","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.jdmm.2012.05.003","volume":"1","author":"M. Speakman","year":"2012","unstructured":"Speakman, M., Sharpley, R.: A chaos theory perspective on destination crisis management: Evidence from Mexico. Journal of Destination Marketing & Management\u00a01, 67\u201377 (2012)","journal-title":"Journal of Destination Marketing & Management"},{"key":"27_CR30","doi-asserted-by":"crossref","unstructured":"Sardouk, A., et al.: Crisis management using MAS-based wireless sensor networks. Computer Network (2012), \n                    \n                      http:\/\/dx.doi.org\/10.1016\/j.comnet.2012.08.010","DOI":"10.1016\/j.comnet.2012.08.010"},{"key":"27_CR31","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1016\/j.csi.2008.09.032","volume":"31","author":"D.C. Chou","year":"2009","unstructured":"Chou, D.C., Chou, A.Y.: Information systems outsourcing life cycle and risks analysis. Computer Standards & Interfaces\u00a031, 1036\u20131043 (2009)","journal-title":"Computer Standards & Interfaces"},{"key":"27_CR32","first-page":"1815","volume":"29","author":"C.H. Tan","year":"2011","unstructured":"Tan, C.H., Zeng, Y.T.: Research on the Discrimination of Enterprise Online Trust Crisis Based on \u201cTwice Evaluation\u201d Mechanism. Information Science\u00a029, 1815\u20131819 (2011)","journal-title":"Information Science"},{"key":"27_CR33","unstructured":"Kaoru, I.: Guide to Quality Control, Asian Productivity Organization. UNIPUB. (1976)"},{"key":"27_CR34","volume-title":"Tague\u2019s The Quality Toolbox, Second Edition","author":"R. Nancy","year":"2004","unstructured":"Nancy, R.: Tague\u2019s The Quality Toolbox, Second Edition. ASQ Quality Press, Milwaukee (2004)"},{"key":"27_CR35","first-page":"1559","volume":"29","author":"C.H. Tan","year":"2011","unstructured":"Tan, C.H., Wang, X.: Research on the Model of Enterprise\u2019s Online Trust Crisis Prevention Based on Ontology and Web Mining. Information Science\u00a029, 1559\u20131564 (2011)","journal-title":"Information Science"},{"key":"27_CR36","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1027\/1614-0001\/a000040","volume":"39","author":"T. Gnambs","year":"2011","unstructured":"Gnambs, T., Batinic, B.: Convergent and discriminant validity of opinion leader: Multitrait-multimethod analysis across measurement occasion and informant type. Journal of Individual Differences\u00a039, 94\u2013102 (2011)","journal-title":"Journal of Individual Differences"},{"key":"27_CR37","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1037\/h0026818","volume":"10","author":"E.E. Jones","year":"1968","unstructured":"Jones, E.E., et al.: Pattern of performance and ability attribution: An unexpected primacy effect. Journal of Personality and Social Psychology\u00a010, 317\u2013340 (1968)","journal-title":"Journal of Personality and Social Psychology"},{"key":"27_CR38","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1207\/s1532754xjprr0802_01","volume":"8","author":"A.G. Herrero","year":"1996","unstructured":"Herrero, A.G., Pratt, C.B.: An Integrated Symmetrical Model for Crisis-Communications Management. Journal of Public Relations Research\u00a08, 79\u2013105 (1996)","journal-title":"Journal of Public Relations Research"}],"container-title":["IFIP Advances in Information and Communication Technology","Digital Services and Information Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45526-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T16:22:12Z","timestamp":1559060532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45526-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662455258","9783662455265"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45526-5_27","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2014]]}}}