{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:35:16Z","timestamp":1767339316918},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T00:00:00Z","timestamp":1353542400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s00779-012-0631-1","type":"journal-article","created":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T14:22:49Z","timestamp":1353594169000},"page":"117-128","source":"Crossref","is-referenced-by-count":23,"title":["Incorporating behavioral trust theory into system development for ubiquitous applications"],"prefix":"10.1007","volume":"18","author":[{"given":"Holger","family":"Hoffmann","sequence":"first","affiliation":[]},{"given":"Matthias","family":"S\u00f6llner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,22]]},"reference":[{"issue":"2","key":"631_CR1","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","volume":"5","author":"D Artz","year":"2007","unstructured":"Artz D, Gil Y (2007) A survey of trust in computer science and the semantic web. Web Semant Sci Serv Agents World Wide Web 5(2):58\u201371","journal-title":"Web Semant Sci Serv Agents World Wide Web"},{"key":"631_CR2","doi-asserted-by":"crossref","unstructured":"Stephens RT (2004) A framework for the identification of electronic commerce design elements that enable trust within the small hotel industry. Paper presented at the 42nd annual Southeast Regional Conference (ACM-SE), Huntsville, 02\u201303 April 2004","DOI":"10.1145\/986537.986613"},{"key":"631_CR3","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/BF03250770","volume":"6","author":"D Gerd tom Markotten","year":"2000","unstructured":"Gerd tom Markotten D, Kaiser J (2000) Usable security\u2014challenges and model for e-commerce systems. Wirtschaftsinformatik 6:531\u2013538","journal-title":"Wirtschaftsinformatik"},{"issue":"1","key":"631_CR4","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1518\/hfes.46.1.50.30392","volume":"46","author":"JD Lee","year":"2004","unstructured":"Lee JD, See KA (2004) Trust in automation: designing for appropriate reliance. Hum Factors 46(1):50\u201380","journal-title":"Hum Factors"},{"key":"631_CR5","doi-asserted-by":"crossref","unstructured":"S\u00f6llner M, Hoffmann A, Hoffmann H, Leimeister JM (2012) How to use behavioral research insights on trust for HCI system design. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2012), Austin, 05\u201310 May 2012","DOI":"10.1145\/2212776.2223696"},{"key":"631_CR6","volume-title":"Software engineering","author":"I Sommerville","year":"2007","unstructured":"Sommerville I (2007) Software engineering, 8th edn. Addison-Wesley, Harlow","edition":"8"},{"issue":"1","key":"631_CR7","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen D, Karahanna E, Straub DW (2003) Trust and TAM in online shopping: an integrated model. MIS Q 27(1):51\u201390","journal-title":"MIS Q"},{"issue":"2","key":"631_CR8","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/359205.359223","volume":"44","author":"J Viega","year":"2001","unstructured":"Viega J, Kohno T, Potter B (2001) Trust (and mistrust) in secure applications. Commun ACM 44(2):31\u201336","journal-title":"Commun ACM"},{"issue":"1","key":"631_CR9","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie J-C, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1(1):11\u201333","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"631_CR10","doi-asserted-by":"crossref","unstructured":"Sillence E, Briggs P, Fishwick L, Harris P (2004) Trust and mistrust of online health sites. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2004), Vienna, 24\u201329 April 2004","DOI":"10.1145\/985692.985776"},{"issue":"3","key":"631_CR11","doi-asserted-by":"crossref","first-page":"393","DOI":"10.5465\/AMR.1998.926617","volume":"23","author":"DM Rousseau","year":"1998","unstructured":"Rousseau DM, Sitkin SB (1998) Not so different at all: a cross disciplinary view of trust. Acad Manag Rev 23(3):393\u2013404","journal-title":"Acad Manag Rev"},{"issue":"3","key":"631_CR12","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manag Rev 20(3):709\u2013734","journal-title":"Acad Manag Rev"},{"key":"631_CR13","first-page":"213","volume-title":"Trust: making and breaking cooperative relations","author":"D Gambetta","year":"1990","unstructured":"Gambetta D (1990) Can we trust trust? In: Gambetta D (ed) Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213\u2013237"},{"issue":"4","key":"631_CR14","doi-asserted-by":"crossref","first-page":"73","DOI":"10.2753\/MIS0742-1222240403","volume":"24","author":"A Vance","year":"2008","unstructured":"Vance A, Elie-Dit-Cosaque C, Straub DW (2008) Examining trust in information technology artifacts: the effects of system quality and culture. J Manag Inf Syst 24(4):73\u2013100","journal-title":"J Manag Inf Syst"},{"issue":"2","key":"631_CR15","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1086\/376806","volume":"30","author":"CB Jarvis","year":"2003","unstructured":"Jarvis CB, Mackenzie SB, Podsakoff PM (2003) A critical review of construct indicators and measurement model misspecification in marketing and consumer research. J Consum Res 30(2):199\u2013218","journal-title":"J Consum Res"},{"issue":"11","key":"631_CR16","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1080\/00140139408964957","volume":"37","author":"BM Muir","year":"1994","unstructured":"Muir BM (1994) Trust in automation: part I. Theoretical issues in the study of trust and human intervention in automated systems. Ergonomics 37(11):1905\u20131922","journal-title":"Ergonomics"},{"key":"631_CR17","unstructured":"S\u00f6llner M, Leimeister JM (2010) 15\u00a0years of measurement model misspecification in trust research? A theory based approach to solve this problem. In: 10th Academy of Management Annual Meeting, Rome"},{"issue":"3\u20134","key":"631_CR18","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/S0963-8687(02)00022-7","volume":"11","author":"V Shankar","year":"2002","unstructured":"Shankar V, Urban GL, Sultan F (2002) Online trust: a stakeholder perspective, concepts, implications, and future directions. J Strateg Inf Syst 11(3\u20134):325\u2013344","journal-title":"J Strateg Inf Syst"},{"key":"631_CR19","unstructured":"S\u00f6llner M, Hoffmann A, Hoffmann H, Leimeister JM (2011) Towards a theory of explanation and prediction for the formation of trust in IT artifacts. Paper presented at the 10. Annual Workshop on HCI Research in MIS, Shanghai, 04 December 2011"},{"key":"631_CR20","doi-asserted-by":"crossref","unstructured":"Shirey R (2000) RFC 4949\u2014internet security glossary, version 2. The Internet Society, Geneva","DOI":"10.17487\/rfc2828"},{"issue":"4","key":"631_CR21","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/07421222.2005.11045825","volume":"21","author":"JM Leimeister","year":"2005","unstructured":"Leimeister JM, Ebner W, Krcmar H (2005) Design, implementation, and evaluation of trust-supporting components in virtual communities for patients. J Manag Inf Syst 21(4):101\u2013135","journal-title":"J Manag Inf Syst"},{"key":"631_CR22","unstructured":"Manouchehri S, S\u00f6llner M, Leimeister JM (2010) Trust as a design aspect of context aware systems. In: Beigl M, Cazorla-Almeida FJ (eds) Proceedings of the 23rd international conference on architecture of computing systems (ARCS 2010), Hannover, Germany, pp 183\u2013190"},{"key":"631_CR23","first-page":"75","volume-title":"Security and usability: designing secure systems that people can use","author":"AS Patrick","year":"2005","unstructured":"Patrick AS, Briggs P, Marsh S (2005) Designing systems that people will trust. In: Cranor L, Garfinkel S (eds) Security and usability: designing secure systems that people can use. O\u2019Reilly, Sebastopol, pp 75\u2013100"},{"issue":"1","key":"631_CR24","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/BF02802920","volume":"3","author":"A Sutcliffe","year":"1998","unstructured":"Sutcliffe A (1998) Scenario-based requirements analysis. Requir Eng 3(1):48\u201365","journal-title":"Requir Eng"},{"issue":"1","key":"631_CR25","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1049\/sej.1996.0002","volume":"11","author":"G Kotonya","year":"1996","unstructured":"Kotonya G, Sommerville I (1996) Requirements engineering with viewpoints. Softw Eng J 11(1):5\u201318","journal-title":"Softw Eng J"},{"key":"631_CR26","doi-asserted-by":"crossref","unstructured":"Herrmann A, Daneva M (2008) Requirements prioritization based on benefit and cost prediction: an agenda for future research. Paper presented at the 16th IEEE International Requirements Engineering Conference, Barcelona, 08\u201312 September 2008","DOI":"10.1109\/RE.2008.48"},{"issue":"3","key":"631_CR27","first-page":"46","volume":"18","author":"B Boehm","year":"2001","unstructured":"Boehm B, Gr\u00fcnbacher P, Briggs RO (2001) Developing groupware for requirements negotiation: lessons learned. IEEE Distrib Syst Online 18(3):46\u201355","journal-title":"IEEE Distrib Syst Online"},{"key":"631_CR28","unstructured":"Pohl K (2008) Requirements engineering. dpunkt Verlag, Heidelberg"},{"key":"631_CR29","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5269-7","volume-title":"Non-functional requirements in software engineering","author":"L Chung","year":"2000","unstructured":"Chung L, Nixon BA, Yu E, Mylopoulos J (2000) Non-functional requirements in software engineering. Kluwer, Boston"},{"key":"631_CR30","unstructured":"Cleland-Huang J, Settimi R, BenKhadra O, Berezhanskaya E, Christina S (2005) Goal-centric traceability for managing non-functional requirements. In: 27th international conference on software engineering. ACM, St. Louis, pp 362\u2013371"},{"issue":"1","key":"631_CR31","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/s007660170013","volume":"6","author":"D Gross","year":"2001","unstructured":"Gross D, Yu E (2001) From non-functional requirements to design through patterns. Requir Eng 6(1):18\u201336","journal-title":"Requir Eng"},{"key":"631_CR32","volume-title":"Software requirement patterns","author":"S Withall","year":"2007","unstructured":"Withall S (2007) Software requirement patterns. Microsoft Press, Redmond"},{"key":"631_CR33","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/1-4020-4258-2_7","volume-title":"Trust in technology: a socio-technical perspective","author":"D Martin","year":"2006","unstructured":"Martin D, Rouncefield M, Sommerville I (2006) Patterns for dependable design. In: Clarke K, Hardstone G, Rouncefield M, Sommerville I (eds) Trust in technology: a socio-technical perspective. Springer, Doordrecht, pp 147\u2013168"},{"key":"631_CR34","first-page":"829","volume-title":"Encyclopedia of machine learning","author":"P Melville","year":"2010","unstructured":"Melville P, Sindhwani V (2010) Recommender systems. In: Sammut C, Webb G (eds) Encyclopedia of machine learning. Springer, Berlin, pp 829\u2013837"},{"key":"631_CR35","volume-title":"Task-centered user interface design: a practical introduction","author":"C Lewis","year":"1993","unstructured":"Lewis C, Rieman J (1993) Task-centered user interface design: a practical introduction. University of Colorado, Boulder"},{"key":"631_CR36","volume-title":"Usability engineering","author":"J Nielsen","year":"1993","unstructured":"Nielsen J (1993) Usability engineering. Morgan Kaufmann, San Francisco"},{"key":"631_CR37","volume-title":"Requirements engineering: processes and techniques","author":"G Kotonya","year":"1998","unstructured":"Kotonya G, Sommerville I (1998) Requirements engineering: processes and techniques. Wiley, Chichester"},{"key":"631_CR38","unstructured":"Forrester Research (2009) North American Technographics Media and Marketing Online Survey. Forrester Research, Inc., Cambridge"},{"key":"631_CR39","doi-asserted-by":"crossref","unstructured":"Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the facebook. In: Danezis G, Golle P (eds) Privacy enhancing technologies, vol 4258. Lecture notes in computer science. Springer, Berlin, pp 36\u201358. doi: 10.1007\/11957454_3","DOI":"10.1007\/11957454_3"},{"key":"631_CR40","first-page":"219","volume-title":"Selected papers from the third international conference on human-computer interaction, vol 753. Lecture notes in computer science","author":"D Salber","year":"1993","unstructured":"Salber D, Coutaz J (1993) Applying the Wizard of Oz technique to the study of multimodal systems. In: Bass L, Gornostaev J, Unger C (eds) Selected papers from the third international conference on human-computer interaction, vol 753. Lecture notes in computer science. Springer, Berlin, pp 219\u2013230"},{"issue":"3","key":"631_CR41","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1080\/00140139608964474","volume":"39","author":"BM Muir","year":"1996","unstructured":"Muir BM, Moray N (1996) Trust in automation. Part II. Experimental studies of trust and human intervention in a process control simulation. Ergonomics 39(3):429\u2013460","journal-title":"Ergonomics"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-012-0631-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-012-0631-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-012-0631-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T19:40:50Z","timestamp":1562355650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-012-0631-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,22]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["631"],"URL":"https:\/\/doi.org\/10.1007\/s00779-012-0631-1","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,22]]}}}