{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T18:02:00Z","timestamp":1648922520708},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T00:00:00Z","timestamp":1408406400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s10796-014-9521-6","type":"journal-article","created":{"date-parts":[[2014,8,18]],"date-time":"2014-08-18T01:54:19Z","timestamp":1408326859000},"page":"725-742","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Reasoning about the impacts of information sharing"],"prefix":"10.1007","volume":"17","author":[{"given":"Yuqing","family":"Tang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Federico","family":"Cerutti","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nir","family":"Oren","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chatschik","family":"Bisdikian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,8,19]]},"reference":[{"key":"9521_CR1","unstructured":"Bisdikian, C., Tang Y., Cerutti F., Oren N. (2013) A framework for using trust to assess risk in information sharing Ches\u015bevar, C. Onaindia, E. Ossowski, S. Vouros, G. (eds), Agreement Technologies, Lecture Notes in Computer Science, vol 8068 Springer Berlin Heidelberg, pp 135\u2013149, doi: 10.1007\/978-3-642-39860-5-11 ."},{"key":"9521_CR2","unstructured":"Burnett, C., Norman T.J., Sycara K. (2011). Trust decision-making in multi-agent systems. Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume One, AAAI Press, IJCAI\u201911 , 115\u2013120."},{"key":"9521_CR3","unstructured":"Caminada, M.W. (2009). Truth, Lies and Bullshit; distinguishing classes of dishonesty. In: Social Simulation workshop (SS@IJCAI), 39\u201350."},{"key":"9521_CR4","unstructured":"Castelfranchi, C., & Falcone, R. (2010). In Trust theory A socio-cognitive and computational model. Wiley Series in Agent Technology."},{"key":"9521_CR5","unstructured":"Chakraborty, S., Raghavan K.R., Srivastava M.B., Bisdikian C., Kaplan L.M. (2012). Balancing value and risk in information sharing through obfuscation. In: Proceedings of the 15th Int\u2019l Conf. on Information Fusion (FUSION \u201912)."},{"issue":"1","key":"9521_CR6","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1023\/B:JOBU.0000040274.23551.1b","volume":"19","author":"TK Das","year":"2004","unstructured":"Das, T.K., Teng B.S. (2004). The Risk-Based View of Trust: A Conceptual Framework. Journal of Business and Psychology, 19(1), 85\u2013116. doi: 10.1023\/B:JOBU.0000040274.23551.1b .","journal-title":"Journal of Business and Psychology"},{"key":"9521_CR7","unstructured":"Goffman, E. (1970). Strategic Interaction. Basil Blackwell Oxford."},{"issue":"3","key":"9521_CR8","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A., (2001). A logic for uncertain probabilities. International Journal of Uncertainty. Fuzziness and Knowledge-Based Systems, 9(3), 279\u2013311.","journal-title":"Fuzziness and Knowledge-Based Systems"},{"key":"9521_CR9","unstructured":"J\u00f8sang, A., & Ismail, R. (2002). The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference."},{"issue":"1","key":"9521_CR10","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1111\/j.1539-6924.1981.tb01350.x","volume":"1","author":"S Kaplan","year":"1981","unstructured":"Kaplan, S., & Garrick, B.J. (1981). On the quantitative definition of risk. Risk Analysis, 1(1), 11\u201327.","journal-title":"Risk Analysis"},{"key":"9521_CR11","doi-asserted-by":"crossref","unstructured":"Mardziel, P., Magill, S., Hicks, M., Srivatsa, M. (2011). Dynamic enforcement of knowledge-based security policies. In Proceedings of the 24th IEEE Computer Security Foundations Symposium, (pp. 114\u2013128).","DOI":"10.1109\/CSF.2011.15"},{"key":"9521_CR12","unstructured":"Stentz, K., & Ferson, S. (2002). Combination of evidence in Dempster-Shafer theory. Tech. Rep. SAND 2002-0835, Sandia National Laboratories."},{"issue":"3","key":"9521_CR13","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/S0167-9236(02)00014-3","volume":"33","author":"YH Tan","year":"2002","unstructured":"Tan, Y.H., & Thoen, W. (2002). Formal aspects of a generic model of trust for electronic commerce. Decision Support Systems, 33(3), 233\u2013246. doi: 10.1016\/S0167-9236(02)00014-3 .","journal-title":"Decision Support Systems"},{"key":"9521_CR14","doi-asserted-by":"crossref","unstructured":"Tang, Y., Cai, K., McBurney, P., Sklar, E., Parsons, S. (2011). Using argumentation to reason about trust and belief. Journal of Logic and Computation. doi: 10.1093\/logcom\/exr038 .","DOI":"10.1093\/logcom\/exr038"},{"issue":"2","key":"9521_CR15","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10458-006-5952-x","volume":"12","author":"WTL Teacy","year":"2006","unstructured":"Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M. (2006). Travos: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems, 12(2), 183\u2013198.","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"9521_CR16","unstructured":"Urbano, J., Rocha, A., Oliveira, E. (2013). A socio-cognitive perspective of trust. Ossowski, S., Agreement Technologies, Law, Governance and Technology Series, vol 8, Springer Netherlands, 419\u2013429, doi: 10.1007\/978-94-007-5583-3-23 ."},{"key":"9521_CR17","doi-asserted-by":"crossref","unstructured":"Wang, X., Williams, M.A. (2011). Risk, uncertainty and possible worlds. In: Privacy, security, risk and trust (passat), IEEE Third International Conference on Social Computing (SOCIALCOM) 1278\u20131283 doi: 10.1109\/PASSAT\/SocialCom.2011.130 .","DOI":"10.1109\/PASSAT\/SocialCom.2011.130"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-014-9521-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-014-9521-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-014-9521-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:36:25Z","timestamp":1559248585000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-014-9521-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,19]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["9521"],"URL":"https:\/\/doi.org\/10.1007\/s10796-014-9521-6","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,19]]}}}