{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:35:22Z","timestamp":1740141322341,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,9,10]],"date-time":"2015-09-10T00:00:00Z","timestamp":1441843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,9,10]],"date-time":"2015-09-10T00:00:00Z","timestamp":1441843200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-09-2-0053"],"award-info":[{"award-number":["W911NF-09-2-0053"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s10588-015-9193-x","type":"journal-article","created":{"date-parts":[[2015,9,10]],"date-time":"2015-09-10T14:36:31Z","timestamp":1441895791000},"page":"461-490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["TANDEM: a trust-based agent framework for networked decision making"],"prefix":"10.1007","volume":"21","author":[{"given":"Sibel","family":"Adal\u0131","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Jin-Hee","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,10]]},"reference":[{"key":"9193_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7031-1","volume-title":"Modeling trust context in networks. Springer Briefs","author":"S Adal\u0131","year":"2013","unstructured":"Adal\u0131 S (2013) Modeling trust context in networks. Springer Briefs. Springer, New York"},{"key":"9193_CR2","unstructured":"Alberts DS, Huber RK, Moffat J (2010) NATO NEC C2 maturity model. DoD command and control research program"},{"issue":"3","key":"9193_CR3","doi-asserted-by":"publisher","first-page":"595615","DOI":"10.1037\/0021-9010.92.3.595","volume":"92","author":"S Bell","year":"2007","unstructured":"Bell S (2007) Deep-level composition variables as predictors of team performance: a meta-analysis. J Appl Psychol 92(3):595615","journal-title":"J Appl Psychol"},{"key":"9193_CR4","doi-asserted-by":"crossref","unstructured":"Bolstad CA, Endsley MR (2003) Tools for supporting team SA and collaboration in army operations. Collaborative technology alliances conferences: advanced decision archiecture conference","DOI":"10.1037\/e577042012-026"},{"key":"9193_CR5","doi-asserted-by":"crossref","unstructured":"Chan K, Adal\u0131 S (2012) An agent based model for trust and information sharing in networked systems. 2012 IEEE international multi-disciplinary conf on cognitive methods in situation awareness and decision support","DOI":"10.1109\/CogSIMA.2012.6188414"},{"key":"9193_CR6","unstructured":"Chan K, Ivanic N (2010) Connections between communications and social networks using ELICIT. In: Proceedings of 15th international command and control research and technology symposium, Santa Monica, CA"},{"key":"9193_CR7","unstructured":"Chan K, Cho JH, Adal\u0131 S (2013) A trust-based framework for information sharing behavior in command and control environments. 22nd conference on behavior representation in modeling and simulation (BRiMS)"},{"issue":"4","key":"9193_CR8","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","volume":"13","author":"J Cho","year":"2011","unstructured":"Cho J, Swami A, Chen IR (2011) A survey on trust management for mobile ad hoc networks. IEEE Commun Surveys and Tutor 13(4):562\u2013583","journal-title":"IEEE Commun Surveys and Tutor"},{"key":"9193_CR9","unstructured":"Dekker T (2006) Centralization vs. self-synchronization: an agent-based investigation. In: Proceedings of 11th international command and control research and technology symposium"},{"key":"9193_CR10","first-page":"35","volume":"11","author":"AG Edge","year":"1984","unstructured":"Edge AG, Remus W (1984) The impact of hierarchical and egalitarian organization structure on group decision making and attitudes. Dev Bus Simul Exp Learn 11:35\u201339","journal-title":"Dev Bus Simul Exp Learn"},{"issue":"1","key":"9193_CR11","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"MR Endsley","year":"1995","unstructured":"Endsley MR (1995) Toward a theory of situation awareness in dynamic systems. Hum Factors 37(1):32\u201364","journal-title":"Hum Factors"},{"issue":"2","key":"9193_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.tics.2006.11.005","volume":"11","author":"ST Fiske","year":"2007","unstructured":"Fiske ST, Cuddy AJ, Glick P (2007) Universal dimensions of social cognition: warmth and competence. Trends Cogn Sci 11(2):77\u201383","journal-title":"Trends Cogn Sci"},{"issue":"3","key":"9193_CR13","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1287\/orsc.1070.0278","volume":"18","author":"MG Jacobides","year":"2007","unstructured":"Jacobides MG (2007) The inherent limits of organizational structure and the unfulfilled role of hierarchy: lessons from a near-war. Organ Sci 18(3):455\u2013477","journal-title":"Organ Sci"},{"key":"9193_CR14","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1177\/1046496404264941","volume":"35","author":"N Katz","year":"2004","unstructured":"Katz N, Lazer D, Arrow H, Contractor N (2004) Network theory and small groups. Small Group Res 35:307\u2013332","journal-title":"Small Group Res"},{"issue":"11","key":"9193_CR15","first-page":"1477","volume":"50","author":"DZ Levin","year":"2002","unstructured":"Levin DZ, Cross R (2002) The strength of weak ties you can trust: the mediating role of trust in effective knowledge transfer. Acad Manag J 50(11):1477\u20131490","journal-title":"Acad Manag J"},{"key":"9193_CR16","unstructured":"Leweling TA, Nissen ME (2007) Hypothesis testing of edge organizations: laboratory experimentation using the elicit multiplayer intelligence game. In: Proceedings of 12th international command and control research and technology symposium"},{"issue":"3","key":"9193_CR17","doi-asserted-by":"crossref","first-page":"356","DOI":"10.5465\/amr.2001.4845785","volume":"26","author":"MA Marksand","year":"2001","unstructured":"Marksand MA, Mathieu JE, Zaccaro SJ (2001) A temporally based framework and taxonomy of team processes. Acad Manag Rev 26(3):356\u2013376","journal-title":"Acad Manag Rev"},{"key":"9193_CR18","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"R Mayer","year":"1995","unstructured":"Mayer R, Davis J, Schoorman F (1995) An integrative model of organizational trust. Acad Manag Rev 20:709\u2013734","journal-title":"Acad Manag Rev"},{"issue":"2","key":"9193_CR19","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1037\/a0013773","volume":"94","author":"JR Mesmer-Magnus","year":"2009","unstructured":"Mesmer-Magnus JR, DeChurch LA (2009) Information sharing and team performance: a meta-analysis. J Appl Psychol 94(2):535\u2013546","journal-title":"J Appl Psychol"},{"key":"9193_CR20","unstructured":"Morgan R (2008) Company intelligence support teams. Armor Mag"},{"key":"9193_CR21","unstructured":"United States Office of the Director\u00a0of National\u00a0Intelligence (2008) United States Intelligence Community Information Sharing Strategy Online: \n                    www.fas.org\/irp\/dni\/iss"},{"key":"9193_CR22","first-page":"503","volume":"20","author":"M Stevens","year":"1994","unstructured":"Stevens M, Campion M (1994) The knowledge, skill, and ability requirements for teamwork: Implications for human resource management. J Manag 20:503\u2013530","journal-title":"J Manag"},{"key":"9193_CR23","first-page":"142","volume-title":"The handbook of organizations","author":"A Stinchcombe","year":"1965","unstructured":"Stinchcombe A (1965) Social structure and environment. In: March JG (ed) The handbook of organizations. University of California Press, Berkeley, pp 142\u2013193"},{"key":"9193_CR24","doi-asserted-by":"publisher","unstructured":"Suri S, Watts DJ (2011) Cooperation and contagion in web-based, networked public goods experiments. PLoS ONE 6(3). doi:\n                    10.1371\/journal.pone.0016836","DOI":"10.1371\/journal.pone.0016836"},{"key":"9193_CR25","unstructured":"Thunholm P, Chong NE, Cheah M, Tan K, Chua N, Chua CL (2009) Exploring alternative edge versus hierarchy C2 organizations using the elicit platform with configurable chat system. Int Command Control (C2) J 3(2)"},{"key":"9193_CR26","doi-asserted-by":"publisher","first-page":"674","DOI":"10.2307\/2096399","volume":"61","author":"B Uzzi","year":"1996","unstructured":"Uzzi B (1996) The sources and consequences of embeddedness for the economic performance of organizations: the network effect. Am Sociol Rev 61:674\u2013698","journal-title":"Am Sociol Rev"},{"key":"9193_CR27","doi-asserted-by":"publisher","first-page":"224023","DOI":"10.1088\/1751-8113\/41\/22\/224023","volume":"41","author":"B Uzzi","year":"2008","unstructured":"Uzzi B (2008) A social network\u2019s changing statistical properties and the quality of human innovation. J Phys A 41:224023","journal-title":"J Phys A"},{"issue":"3","key":"9193_CR28","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1016\/j.cognition.2008.07.002","volume":"108","author":"V Wout","year":"2008","unstructured":"Wout V, Sanfey A (2008) Friend or foe: the effect of implicit trustworthiness judgments in social decision-making. Cognition 108(3):796\u2013803","journal-title":"Cognition"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-015-9193-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-015-9193-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-015-9193-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-015-9193-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T08:39:27Z","timestamp":1589704767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-015-9193-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,10]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["9193"],"URL":"https:\/\/doi.org\/10.1007\/s10588-015-9193-x","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"type":"print","value":"1381-298X"},{"type":"electronic","value":"1572-9346"}],"subject":[],"published":{"date-parts":[[2015,9,10]]},"assertion":[{"value":"10 September 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}