{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:07:36Z","timestamp":1742947656330,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811575297"},{"type":"electronic","value":"9789811575303"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-7530-3_4","type":"book-chapter","created":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T15:50:27Z","timestamp":1597333827000},"page":"40-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Trust Model for Evaluating Trust and Centrality Based on Entropy Weight Method in Social Commerce"],"prefix":"10.1007","author":[{"given":"Yonghua","family":"Gong","sequence":"first","affiliation":[]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,14]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1016\/j.ipm.2016.04.001","volume":"52","author":"Y Yang","year":"2016","unstructured":"Yang, Y., Xie, G.: Efficient identification of node importance in social networks. Inf. Process. Manage. 52, 911\u2013922 (2016)","journal-title":"Inf. Process. Manage."},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1177\/002200275800200401","volume":"2","author":"M Deutsch","year":"1958","unstructured":"Deutsch, M.: Trust and suspicion. J. Confl. Resolut. 2, 265\u2013279 (1958)","journal-title":"J. Confl. Resolut."},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manage. Rev. 20, 709\u2013734 (1995)","journal-title":"Acad. Manage. Rev."},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2815595","volume":"48","author":"J-H Cho","year":"2015","unstructured":"Cho, J.-H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. (CSUR) 48, 1\u201340 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"4_CR5","unstructured":"Daskapan, S., Van den Berg, J., Ali-Eldin, A.: Towards a trustworthy short-range mobile payment system. In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics, Washington. IEEE (2003)"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.jbusres.2016.10.004","volume":"71","author":"N Hajli","year":"2017","unstructured":"Hajli, N., Sims, J., Zadeh, A.H., et al.: A social commerce investigation of the role of trust in a social networking site on purchase intentions. J. Bus. Res. 71, 133\u2013141 (2017)","journal-title":"J. Bus. Res."},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.knosys.2018.10.027","volume":"164","author":"C Mao","year":"2019","unstructured":"Mao, C., Xu, C., He, Q.: A cost-effective algorithm for inferring the trust between two individuals in social networks. Knowl. Based Syst. 164, 122\u2013138 (2019)","journal-title":"Knowl. Based Syst."},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.tele.2018.11.008","volume":"36","author":"Y Asim","year":"2019","unstructured":"Asim, Y., Malik, A.K., Raza, B., et al.: A trust model for analysis of trust, influence and their relationship in social network communities. Telematics Inform. 36, 94\u2013116 (2019)","journal-title":"Telematics Inform."},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijinfomgt.2019.01.012","volume":"48","author":"J Al Qundus","year":"2019","unstructured":"Al Qundus, J., Paschke, A., Kumar, S., et al.: Calculating trust in domain analysis: theoretical trust model. Int. J. Inf. Manage. 48, 1\u201311 (2019)","journal-title":"Int. J. Inf. Manage."},{"key":"4_CR10","unstructured":"Amr Ali-Eldin, M.T.: Trsut prediction in online social rating networks. Ain Shams Eng. J. 9, 3103\u20133112 (2019)"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"113073","DOI":"10.1016\/j.dss.2019.113073","volume":"123","author":"T Yu","year":"2019","unstructured":"Yu, T., Guo, J.P., Li, W.H., et al.: Recommendation with diversity: an adaptive trust-aware model. Decis. Support Syst. 123, 113073 (2019)","journal-title":"Decis. Support Syst."}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-7530-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T15:51:30Z","timestamp":1597333890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-7530-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811575297","9789811575303"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-7530-3_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OJS\/PKP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"251","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}