{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T11:21:41Z","timestamp":1767612101252,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,4,22]],"date-time":"2014-04-22T00:00:00Z","timestamp":1398124800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s10676-014-9342-9","type":"journal-article","created":{"date-parts":[[2014,4,21]],"date-time":"2014-04-21T11:23:16Z","timestamp":1398079396000},"page":"157-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["From open-source software to Wikipedia: \u2018Backgrounding\u2019 trust by collective monitoring and reputation tracking"],"prefix":"10.1007","volume":"16","author":[{"given":"Paul B.","family":"de Laat","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,22]]},"reference":[{"key":"9342_CR1","doi-asserted-by":"crossref","unstructured":"Adler, B. T., Chatterjee, K., de Alfaro, L., Faella, M., Pye, I., & Raman, V. (2008). Assigning trust to Wikipedia content. In Proceedings of the 4th International Symposium on Wikis (WikiSym\u201908), September 8\u201310, 2008, Porto, Portugal. http:\/\/dx.doi.org\/10.1145\/1822258.1822293 .","DOI":"10.1145\/1822258.1822293"},{"key":"9342_CR2","doi-asserted-by":"crossref","unstructured":"Adler, B. T., & de Alfaro, L. (2007). A content-driven reputation system for the Wikipedia. In Proceedings of the 16th International Conference on World Wide Web, May 8\u201312, 2007, Banff, Alberta, Canada. http:\/\/dx.doi.org\/10.1145\/1242572.1242608 .","DOI":"10.1145\/1242572.1242608"},{"key":"9342_CR4","unstructured":"Adler, B. T., de Alfaro, L., Mola-Velasco, S. M., Rosso, P., & West, A. G. (2011). Wikipedia vandalism detection: Combining natural language, metadata, and reputation features. In CICLing \u201811: Proceedings of the 12th International Conference on Intelligent Text Processing and Computational Linguistics, LNCS 6609\u00a0(pp. 277\u2013288), Tokyo, Japan."},{"issue":"4","key":"9342_CR5","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/572260.572264","volume":"30","author":"P Brey","year":"2000","unstructured":"Brey, P. (2000). Disclosive computer ethics. Computers and Society, 30(4), 10\u201316.","journal-title":"Computers and Society"},{"issue":"391","key":"9342_CR6","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1093\/mind\/XCVIII.391.367","volume":"98","author":"LJ Cohen","year":"1989","unstructured":"Cohen, L. J. (1989). Belief and acceptance. Mind, New Series, 98(391), 367\u2013389.","journal-title":"Mind, New Series"},{"key":"9342_CR7","unstructured":"Crowston, K., Annabi, H., Howison, J., & Masango, Ch. (2004). Effective work practices for software engineering: Free\/libre open source software development. In Proceedings of the 2004 ACM workshop on Interdisciplinary software engineering research (WISER \u201804) (pp. 18\u201326), ACM, New York, NY, USA. http:\/\/doi.acm.org\/10.1145\/1029997.1030003 ."},{"issue":"2","key":"9342_CR8","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s10997-007-9022-9","volume":"11","author":"PB Laat de","year":"2007","unstructured":"de Laat, P. B. (2007). Governance of open source software: State of the art. Journal of Management and Governance, 11(2), 165\u2013177.","journal-title":"Journal of Management and Governance"},{"issue":"4","key":"9342_CR9","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/s10676-010-9230-x","volume":"12","author":"PB Laat de","year":"2010","unstructured":"de Laat, P. B. (2010). How can contributors to open-source communities be trusted? On the assumption, inference, and substitution of trust. Ethics and Information Technology, 12(4), 327\u2013341.","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9342_CR10","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1080\/02691728.2011.605478","volume":"26","author":"PB Laat de","year":"2012","unstructured":"de Laat, P. B. (2012a). Open source production of encyclopedias: Editorial policies at the intersection of organizational and epistemological trust. Social Epistemology, 26(1), 71\u2013103.","journal-title":"Social Epistemology"},{"issue":"2","key":"9342_CR11","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s10676-012-9289-7","volume":"14","author":"PB Laat de","year":"2012","unstructured":"de Laat, P. B. (2012b). Coercion or empowerment? Moderation of content in Wikipedia as \u2018essentially contested\u2019 bureaucratic rules. Ethics and Information Technology, 14(2), 123\u2013135.","journal-title":"Ethics and Information Technology"},{"key":"9342_CR12","doi-asserted-by":"crossref","unstructured":"de Laat, P. B. (2012c). Navigating between chaos and bureaucracy: Backgrounding trust in open-content communities. In K. Aberer et al. (Eds.), Proceedings of the 4th International Conference on Social Informatics, SocInfo 2012, LNCS 7710 , Heidelberg: Springer (pp. 534\u2013557), December 5\u20137, Lausanne, Switzerland.","DOI":"10.1007\/978-3-642-35386-4_42"},{"key":"9342_CR13","unstructured":"de Laat, P. B. (2014). Tools and bots against vandalism: Eroding Wikipedia\u2019s moral order? In Proceedings of the 11th International Conference of Computer Ethics: Philosophical Explorations (CEPE), Paris."},{"key":"9342_CR14","unstructured":"Deterding, S., Dixon, D., Khaled, R., & Nacke, L. E. (2011). From game design elements to gamefulness: Defining \u00bbGamification\u00ab. In Mindtrek 2011 Proceedings, Tampere: ACM Press."},{"issue":"3","key":"9342_CR15","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1080\/08109020802270182","volume":"26","author":"WH Dutton","year":"2008","unstructured":"Dutton, W. H. (2008). The wisdom of collaborative network organizations: Capturing the value of networked individuals. Prometheus, 26(3), 211\u2013230.","journal-title":"Prometheus"},{"key":"9342_CR16","volume-title":"Building web reputation systems","author":"FR Farmer","year":"2010","unstructured":"Farmer, F. R., & Glass, B. (2010). Building web reputation systems. Sebastopol: O\u2019Reilly."},{"issue":"5","key":"9342_CR17","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1177\/0002764212469362","volume":"57","author":"A Forte","year":"2013","unstructured":"Forte, A., & Lampe, C. (2013). Defining, understanding, and supporting open collaboration: Lessons from the literature. American Behavioral Scientist, 57(5), 535\u2013547.","journal-title":"American Behavioral Scientist"},{"issue":"4","key":"9342_CR18","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1037\/0022-3514.59.4.601","volume":"59","author":"D Gilbert","year":"1990","unstructured":"Gilbert, D., Krull, D., & Malone, P. (1990). Unbelieving the unbelievable: Some problems in the rejection of false information. Journal of Personality and Social Psychology, 59(4), 601\u2013613.","journal-title":"Journal of Personality and Social Psychology"},{"key":"9342_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/978-1-59140-369-2.ch001","volume-title":"Free\/open source software development","author":"J Holck","year":"2005","unstructured":"Holck, J., & J\u00f8rgensen, N. (2005). Do not check in on red: Control meets anarchy in two open source projects. In S. Koch (Ed.), Free\/open source software development (pp. 1\u201326). Hershey: Idea Group."},{"key":"9342_CR20","volume-title":"Measurement of responsibility: A study of work, payment, and individual capacity","author":"E Jaques","year":"1956","unstructured":"Jaques, E. (1956). Measurement of responsibility: A study of work, payment, and individual capacity. London: Tavistock."},{"issue":"2","key":"9342_CR21","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1080\/00048400801886413","volume":"86","author":"V McGeer","year":"2008","unstructured":"McGeer, V. (2008). Trust, hope and empowerment. Australasian Journal of Philosophy, 86(2), 237\u2013254.","journal-title":"Australasian Journal of Philosophy"},{"key":"9342_CR22","doi-asserted-by":"crossref","unstructured":"Moran, R. (2005). Getting told and being believed. Philosophers\u2019 Imprint, 5(5); also published in\u00a0J. Lackey, & E. Sosa (Eds.) (2006), The epistemology of testimony (pp. 272\u2013306). Oxford: Oxford University Press.","DOI":"10.1093\/acprof:oso\/9780199276011.003.0013"},{"key":"9342_CR23","unstructured":"O\u2019Connor, A. C., & Loomis, R. J. (2010). Economic analysis of role-based access control. Prepared for NIST. http:\/\/csrc.nist.gov\/groups\/SNS\/rbac\/documents\/20101219_RBAC2_Final_Report.pdf ."},{"key":"9342_CR24","unstructured":"Orsila, H., Geldenhuys, J., Ruokonen, A., & Hammouda, I. (2009). Trust issues in open source software development. In\u00a0N. Medvidovic, & T. Tamai (Eds.), Proceedings of the Warm Up Workshop for ACM\/IEEE ICSE 2010 (WUP \u201809)\u00a0(pp. 9\u201312), ACM, New York, NY, USA. http:\/\/doi.acm.org\/10.1145\/1527033.1527037 ."},{"key":"9342_CR25","unstructured":"Pullinger, K. (2012). A million penguins\u2019 five years on, blog post from 25 January 2012. http:\/\/www.katepullinger.com\/blog\/comments\/a-million-penguins-five-years-on\/ ."},{"key":"9342_CR26","unstructured":"Scarfone, K. and Mell, P. (2007). Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication 800-94. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-94\/SP800-94.pdf ."},{"key":"9342_CR27","doi-asserted-by":"crossref","unstructured":"Sperber, D., Cl\u00e9ment, F., Heintz, C., Mascaro, O., Mercier, H., Origgi, G., & Wilson, D. (2010). Epistemic vigilance. Mind & Language, 25, 359\u2013393.","DOI":"10.1111\/j.1468-0017.2010.01394.x"},{"key":"9342_CR28","unstructured":"West, A. G. (2011). Anti\u2010vandalism research: The year in review (Presentation at Wikimania 2011). www.cis.upenn.edu\/~westand\/docs\/wikimania_11_vandalism_slides.pdf ."},{"key":"9342_CR29","doi-asserted-by":"crossref","unstructured":"West, A. G., Chang, J., Venkatasubramanian, K. K., & Lee, I. (2012). Trust in collaborative web applications. Future Generation Computer Systems, 28 (8), 1238\u20131251. http:\/\/dx.doi.org\/10.1016\/j.future.2011.02.007 .","DOI":"10.1016\/j.future.2011.02.007"},{"key":"9342_CR30","unstructured":"WP:Huggle. http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Huggle ."},{"key":"9342_CR31","unstructured":"WP:Lupin. http:\/\/en.wikipedia.org\/wiki\/User:Lupin\/Anti-vandal_tool ."},{"key":"9342_CR32","unstructured":"WP:NPP. http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Npp ."},{"key":"9342_CR33","unstructured":"WP:STiki. http:\/\/en.wikipedia.org\/wiki\/Wikipedia:STiki ."},{"key":"9342_CR34","unstructured":"WP:Twinkle. http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Twinkle ."},{"key":"9342_CR35","unstructured":"WP:UAL. http:\/\/en.wikipedia.org\/wiki\/Wikipedia:User_access_levels ."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-014-9342-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-014-9342-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-014-9342-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T15:13:17Z","timestamp":1565363597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-014-9342-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,22]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["9342"],"URL":"https:\/\/doi.org\/10.1007\/s10676-014-9342-9","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2014,4,22]]}}}