{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:25:45Z","timestamp":1776680745761,"version":"3.51.2"},"reference-count":131,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:00:00Z","timestamp":1724716800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:00:00Z","timestamp":1724716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s10799-024-00438-x","type":"journal-article","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T13:02:36Z","timestamp":1724763756000},"page":"71-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Unraveling trust management in cybersecurity: insights from a systematic literature review"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7222-5589","authenticated-orcid":false,"given":"Ang\u00e9lica","family":"Pigola","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0631-9800","authenticated-orcid":false,"given":"Fernando","family":"de Souza Meirelles","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,27]]},"reference":[{"key":"438_CR1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2021.01335","author":"S Agarwal","year":"2024","unstructured":"Agarwal S, Ghosh P, Ruan T, Zhang Y (2024) Transient customer response to data breaches of their information. Manag Sci. https:\/\/doi.org\/10.1287\/mnsc.2021.01335","journal-title":"Manag Sci"},{"key":"438_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-023-00409-8","author":"SJ Oh","year":"2023","unstructured":"Oh SJ, Xiao S, Park BI, Roh T (2023) Coping or threat? Unraveling the mechanisms enabling user acceptance of blockchain technologies. Inf Technol Manag. https:\/\/doi.org\/10.1007\/s10799-023-00409-8","journal-title":"Inf Technol Manag"},{"key":"438_CR3","doi-asserted-by":"publisher","first-page":"65407","DOI":"10.1109\/ACCESS.2023.3290911","volume":"11","author":"IU Din","year":"2023","unstructured":"Din IU, Awan KA, Almogren A (2023) Secure and privacy-preserving trust management system for trustworthy communications in intelligent transportation systems. IEEE Access 11:65407\u201365417. https:\/\/doi.org\/10.1109\/ACCESS.2023.3290911","journal-title":"IEEE Access"},{"key":"438_CR4","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/OJCOMS.2023.3239115","volume":"4","author":"R Sedar","year":"2023","unstructured":"Sedar R, Kalalas C, Vazquez-Gallego F et al (2023) A comprehensive survey of V2X cybersecurity mechanisms and future research paths. IEEE Open J Commun Soc 4:325\u2013391. https:\/\/doi.org\/10.1109\/OJCOMS.2023.3239115","journal-title":"IEEE Open J Commun Soc"},{"key":"438_CR5","doi-asserted-by":"publisher","first-page":"88116","DOI":"10.1109\/ACCESS.2023.3306452","volume":"11","author":"Z Li","year":"2023","unstructured":"Li Z, Fang W, Zhu C et al (2023) AI-enabled trust in distributed networks. IEEE Access 11:88116\u201388134. https:\/\/doi.org\/10.1109\/ACCESS.2023.3306452","journal-title":"IEEE Access"},{"key":"438_CR6","doi-asserted-by":"publisher","first-page":"21127","DOI":"10.1109\/ACCESS.2020.2969820","volume":"8","author":"E Bellini","year":"2020","unstructured":"Bellini E, Iraqi Y, Damiani E (2020) Blockchain-based distributed trust and reputation management systems: a survey. IEEE Access 8:21127\u201321151. https:\/\/doi.org\/10.1109\/ACCESS.2020.2969820","journal-title":"IEEE Access"},{"key":"438_CR7","doi-asserted-by":"publisher","first-page":"744","DOI":"10.3390\/electronics8070744","volume":"8","author":"W Fang","year":"2019","unstructured":"Fang W, Zhang W, Shan L et al (2019) DDTMS: Dirichlet-distribution-based trust management scheme in internet of things. Electronics 8:744. https:\/\/doi.org\/10.3390\/electronics8070744","journal-title":"Electronics"},{"key":"438_CR8","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MNET.2022.9919737","volume":"36","author":"Z Yan","year":"2022","unstructured":"Yan Z, Yang LT, Li T et al (2022) Guest Editorial: trust, security and privacy of 6G. IEEE Network 36:100\u2013102. https:\/\/doi.org\/10.1109\/MNET.2022.9919737","journal-title":"IEEE Network"},{"key":"438_CR9","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1186\/s13677-023-00416-8","volume":"12","author":"M Aaqib","year":"2023","unstructured":"Aaqib M, Ali A, Chen L, Nibouche O (2023) IoT trust and reputation: a survey and taxonomy. J Cloud Comp 12:42. https:\/\/doi.org\/10.1186\/s13677-023-00416-8","journal-title":"J Cloud Comp"},{"key":"438_CR10","doi-asserted-by":"publisher","first-page":"13345","DOI":"10.1007\/s10489-021-03078-8","volume":"52","author":"K Alattas","year":"2022","unstructured":"Alattas K, Wu Q (2022) A framework to evaluate the barriers for adopting the internet of medical things using the extended generalized TODIM method under the hesitant fuzzy environment. Appl Intell 52:13345\u201313363. https:\/\/doi.org\/10.1007\/s10489-021-03078-8","journal-title":"Appl Intell"},{"key":"438_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2023.113401","volume":"183","author":"Y Cao","year":"2023","unstructured":"Cao Y, Li S, Lv C et al (2023) Towards cyber security for low-carbon transportation: overview, challenges and future directions. Renew Sustain Energy Rev 183:113401. https:\/\/doi.org\/10.1016\/j.rser.2023.113401","journal-title":"Renew Sustain Energy Rev"},{"key":"438_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109650","volume":"225","author":"R Gupta","year":"2023","unstructured":"Gupta R, Gupta J (2023) Federated learning using game strategies: State-of-the-art and future trends. Comput Netw 225:109650. https:\/\/doi.org\/10.1016\/j.comnet.2023.109650","journal-title":"Comput Netw"},{"key":"438_CR13","doi-asserted-by":"publisher","first-page":"20995","DOI":"10.1109\/ACCESS.2022.3149958","volume":"10","author":"R Jabbar","year":"2022","unstructured":"Jabbar R, Dhib E, Said AB et al (2022) Blockchain technology for intelligent transportation systems: a systematic literature review. IEEE Access 10:20995\u201321031. https:\/\/doi.org\/10.1109\/ACCESS.2022.3149958","journal-title":"IEEE Access"},{"key":"438_CR14","doi-asserted-by":"publisher","first-page":"3283","DOI":"10.3390\/electronics12153283","volume":"12","author":"N Jeffrey","year":"2023","unstructured":"Jeffrey N, Tan Q, Villar JR (2023) A review of anomaly detection strategies to detect threats to cyber-physical systems. Electronics 12:3283. https:\/\/doi.org\/10.3390\/electronics12153283","journal-title":"Electronics"},{"key":"438_CR15","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.comcom.2023.09.010","volume":"211","author":"JM Jorquera Valero","year":"2023","unstructured":"Jorquera Valero JM, S\u00e1nchez S\u00e1nchez PM, Gil P\u00e9rez M et al (2023) Trust-as-a-service: a reputation-enabled trust framework for 5G network resource provisioning. Comput Commun 211:229\u2013238. https:\/\/doi.org\/10.1016\/j.comcom.2023.09.010","journal-title":"Comput Commun"},{"key":"438_CR16","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1080\/0952813X.2021.1960641","volume":"35","author":"A Patnaik","year":"2023","unstructured":"Patnaik A, Mallik B, Krishna MV (2023) Blockchain based holistic trust management protocol for ubiquitous and pervasive IoT network. J Exp Theor Artif Intell 35:629\u2013648. https:\/\/doi.org\/10.1080\/0952813X.2021.1960641","journal-title":"J Exp Theor Artif Intell"},{"key":"438_CR17","doi-asserted-by":"publisher","first-page":"1857","DOI":"10.1080\/00207543.2018.1509392","volume":"57","author":"MR Rasouli","year":"2019","unstructured":"Rasouli MR (2019) Intelligent process-aware information systems to support agility in disaster relief operations: a survey of emerging approaches. Int J Prod Res 57:1857\u20131872. https:\/\/doi.org\/10.1080\/00207543.2018.1509392","journal-title":"Int J Prod Res"},{"key":"438_CR18","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1287\/isre.1.3.255","volume":"1","author":"DW Straub","year":"1990","unstructured":"Straub DW (1990) Effective IS security: an empirical study. Inf Syst Res 1:255\u2013276. https:\/\/doi.org\/10.1287\/isre.1.3.255","journal-title":"Inf Syst Res"},{"key":"438_CR19","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1057\/ejis.2012.24","volume":"22","author":"BR Schlichter","year":"2013","unstructured":"Schlichter BR, Rose J (2013) Trust dynamics in a large system implementation: six theoretical propositions. Eur J Inf Syst 22:455\u2013474. https:\/\/doi.org\/10.1057\/ejis.2012.24","journal-title":"Eur J Inf Syst"},{"key":"438_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1111\/j.1365-2575.2011.00392.x","volume":"23","author":"J Rose","year":"2013","unstructured":"Rose J, Schlichter BR (2013) Decoupling, re-engaging: managing trust relationships in implementation projects: managing trust relationships in implementation projects. Inf Syst J 23:5\u201333. https:\/\/doi.org\/10.1111\/j.1365-2575.2011.00392.x","journal-title":"Inf Syst J"},{"key":"438_CR21","doi-asserted-by":"publisher","first-page":"46363","DOI":"10.1109\/ACCESS.2018.2865539","volume":"6","author":"W Ahmad","year":"2018","unstructured":"Ahmad W, Wang S, Ullah A et al (2018) Reputation-aware trust and privacy-preservation for mobile cloud computing. IEEE Access 6:46363\u201346381. https:\/\/doi.org\/10.1109\/ACCESS.2018.2865539","journal-title":"IEEE Access"},{"key":"438_CR22","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1504\/IJWGS.2015.070962","volume":"11","author":"Y Kim","year":"2015","unstructured":"Kim Y, Shin Y, Doh KG (2015) Quantitative trust management with QoS-aware service selection. IJWGS 11:247. https:\/\/doi.org\/10.1504\/IJWGS.2015.070962","journal-title":"IJWGS"},{"key":"438_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.cose.2014.03.010","volume":"47","author":"Y Shen","year":"2014","unstructured":"Shen Y, Yan Z, Kantola R (2014) Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory. Comput Secur 47:3\u201325. https:\/\/doi.org\/10.1016\/j.cose.2014.03.010","journal-title":"Comput Secur"},{"key":"438_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2808206","volume":"12","author":"S Ma","year":"2015","unstructured":"Ma S, Yan Z (2015) PSNController: an unwanted content control system in pervasive social networking based on trust management. ACM Trans Multimedia Comput Commun Appl 12:1\u201323. https:\/\/doi.org\/10.1145\/2808206","journal-title":"ACM Trans Multimedia Comput Commun Appl"},{"key":"438_CR25","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/S0167-9236(00)00139-1","volume":"31","author":"AD Fernandes","year":"2001","unstructured":"Fernandes AD (2001) Risking \u201ctrust\u201d in a public key infrastructure: old techniques of managing risk applied to new technology. Decis Support Syst 31:303\u2013322. https:\/\/doi.org\/10.1016\/S0167-9236(00)00139-1","journal-title":"Decis Support Syst"},{"key":"438_CR26","doi-asserted-by":"publisher","first-page":"3501","DOI":"10.1109\/TII.2021.3119038","volume":"18","author":"M Alazab","year":"2022","unstructured":"Alazab M et al (2022) Federated learning for cybersecurity: concepts, challenges, and future directions. IEEE Trans Ind Inf 18:3501\u20133509. https:\/\/doi.org\/10.1109\/TII.2021.3119038","journal-title":"IEEE Trans Ind Inf"},{"key":"438_CR27","doi-asserted-by":"publisher","first-page":"4662","DOI":"10.3390\/s22134662","volume":"22","author":"T Jabar","year":"2022","unstructured":"Jabar T, Mahinderjit Singh M (2022) Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework. Sensors 22:4662. https:\/\/doi.org\/10.3390\/s22134662","journal-title":"Sensors"},{"key":"438_CR28","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s10799-021-00338-4","volume":"23","author":"G Li","year":"2022","unstructured":"Li G, Fang C-C (2022) Exploring factors that influence information resources sharing intention via the perspective of consensus perception of blockchain. Inf Technol Manag 23:23\u201338. https:\/\/doi.org\/10.1007\/s10799-021-00338-4","journal-title":"Inf Technol Manag"},{"key":"438_CR29","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.future.2021.05.007","volume":"124","author":"M Gimenez-Aguilar","year":"2021","unstructured":"Gimenez-Aguilar M, De Fuentes JM, Gonzalez-Manzano L, Arroyo D (2021) Achieving cybersecurity in blockchain-based systems: a survey. Futur Gener Comput Syst 124:91\u2013118. https:\/\/doi.org\/10.1016\/j.future.2021.05.007","journal-title":"Futur Gener Comput Syst"},{"key":"438_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.120613","volume":"166","author":"Z-J Liu","year":"2021","unstructured":"Liu Z-J, Chernov S, Mikhaylova AV (2021) Trust management and benefits of vehicular social networking: An approach to verification and safety. Technol Forecast Soc Chang 166:120613. https:\/\/doi.org\/10.1016\/j.techfore.2021.120613","journal-title":"Technol Forecast Soc Chang"},{"key":"438_CR31","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-030-93646-4_14","volume-title":"Advances in blockchain technology for cyber physical systems","author":"F Rabby","year":"2022","unstructured":"Rabby F, Chimhundu R, Hassan R (2022) Blockchain-enabled trust management for digital marketing in the Industry 4.0 Era. In: Maleh Y, Tawalbeh L, Motahhir S, Hafid AS (eds) Advances in blockchain technology for cyber physical systems. Springer, Cham, pp 303\u2013321"},{"key":"438_CR32","doi-asserted-by":"publisher","first-page":"275","DOI":"10.25300\/MISQ\/2013\/37.1.12","volume":"37","author":"W Hong","year":"2013","unstructured":"Hong W, Thong JYL (2013) Internet privacy concerns: an integrated conceptualization and four empirical studies. MISQ 37:275\u2013298. https:\/\/doi.org\/10.25300\/MISQ\/2013\/37.1.12","journal-title":"MISQ"},{"key":"438_CR33","first-page":"305","volume":"20","author":"P Hristov","year":"2019","unstructured":"Hristov P, Dimitrov W (2019) The blockchain as a backbone of GDPR compliant frameworks. Calitatea 20:305","journal-title":"Calitatea"},{"key":"438_CR34","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.17705\/1jais.00630","volume":"21","author":"WA Cram","year":"2020","unstructured":"Cram WA, Templier M, Pare G (2020) (Re)considering the concept of literature review reproducibility. JAIS 21:1103\u20131114. https:\/\/doi.org\/10.17705\/1jais.00630","journal-title":"JAIS"},{"key":"438_CR35","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03712","author":"G Schryen","year":"2015","unstructured":"Schryen G (2015) Writing qualitative IS literature reviews\u2014guidelines for synthesis, interpretation, and guidance of research. CAIS. https:\/\/doi.org\/10.17705\/1CAIS.03712","journal-title":"CAIS"},{"key":"438_CR36","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1080\/0960085X.2017.1398880","volume":"27","author":"M Templier","year":"2018","unstructured":"Templier M, Par\u00e9 G (2018) Transparency in literature reviews: an assessment of reporting practices across review types and genres in top IS journals. Eur J Inf Syst 27:503\u2013550. https:\/\/doi.org\/10.1080\/0960085X.2017.1398880","journal-title":"Eur J Inf Syst"},{"key":"438_CR37","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1641\/0006-3568(2006)56[958:RARIE]2.0.CO;2","volume":"56","author":"P Cassey","year":"2006","unstructured":"Cassey P, Blackburn TM (2006) Reproducibility and repeatability in ecology. Bioscience 56:958. https:\/\/doi.org\/10.1641\/0006-3568(2006)56[958:RARIE]2.0.CO;2","journal-title":"Bioscience"},{"key":"438_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17705\/1atrr.00001","volume":"1","author":"A Dennis","year":"2014","unstructured":"Dennis A, Valacich J (2014) A Replication Manifesto. AIS TRR 1:1\u20134. https:\/\/doi.org\/10.17705\/1atrr.00001","journal-title":"AIS TRR"},{"key":"438_CR39","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1126\/science.1213847","volume":"334","author":"RD Peng","year":"2011","unstructured":"Peng RD (2011) Reproducible research in computational science. Science 334:1226\u20131227. https:\/\/doi.org\/10.1126\/science.1213847","journal-title":"Science"},{"key":"438_CR40","doi-asserted-by":"publisher","first-page":"467","DOI":"10.7326\/M18-0850","volume":"169","author":"AC Tricco","year":"2018","unstructured":"Tricco AC, Lillie E, Zarin W et al (2018) PRISMA Extension for Scoping Reviews (PRISMA-ScR): checklist and explanation. Ann Intern Med 169:467\u2013473. https:\/\/doi.org\/10.7326\/M18-0850","journal-title":"Ann Intern Med"},{"key":"438_CR41","doi-asserted-by":"publisher","first-page":"284","DOI":"10.20397\/2177-6652\/2020.v20i4.1994","volume":"20","author":"CM Ronzani","year":"2020","unstructured":"Ronzani CM, Da Costa PR, Da Silva LF et al (2020) Qualitative methods of analysis: an example of Atlas.TI\u2122 Software usage. G&T 20:284\u2013311. https:\/\/doi.org\/10.20397\/2177-6652\/2020.v20i4.1994","journal-title":"G&T"},{"key":"438_CR42","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1177\/1094428112452151","volume":"16","author":"DA Gioia","year":"2013","unstructured":"Gioia DA, Corley KG, Hamilton AL (2013) Seeking qualitative rigor in inductive research: notes on the gioia methodology. Organ Res Methods 16:15\u201331. https:\/\/doi.org\/10.1177\/1094428112452151","journal-title":"Organ Res Methods"},{"key":"438_CR43","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1177\/02683962211019406","volume":"37","author":"B Negoita","year":"2022","unstructured":"Negoita B, Rahrovani Y, Lapointe L, Pinsonneault A (2022) Distributed IT championing: a process theory. J Inf Technol 37:2\u201330. https:\/\/doi.org\/10.1177\/02683962211019406","journal-title":"J Inf Technol"},{"key":"438_CR44","volume-title":"Qualitative research & evaluation methods: integrating theory and practice","author":"MQ Patton","year":"2023","unstructured":"Patton MQ (2023) Qualitative research & evaluation methods: integrating theory and practice, 4th edn. Sage, Thousand Oaks","edition":"4"},{"key":"438_CR45","doi-asserted-by":"publisher","first-page":"315","DOI":"10.5465\/amr.35.2.zok315","volume":"35","author":"M Ketokivi","year":"2010","unstructured":"Ketokivi M, Mantere S (2010) Two strategies for inductive reasoning in organizational research. AMR 35:315\u2013333. https:\/\/doi.org\/10.5465\/amr.35.2.zok315","journal-title":"AMR"},{"key":"438_CR46","doi-asserted-by":"crossref","unstructured":"Blaze M, Feigenbaum J, Lacy J (1996) Decentralized trust management. In: Proceedings 1996 IEEE symposium on security and privacy. IEEE Computer Society Press, Oakland, CA, USA, pp 164\u2013173","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"438_CR47","doi-asserted-by":"publisher","first-page":"722","DOI":"10.17705\/1jais.00348","volume":"14","author":"J Goh","year":"2013","unstructured":"Goh J, Pan S, Zuo M (2013) Developing the agile IS development practices in large-scale IT projects: the trust-mediated organizational controls and IT Project Team capabilities perspectives. JAIS 14:722\u2013756. https:\/\/doi.org\/10.17705\/1jais.00348","journal-title":"JAIS"},{"key":"438_CR48","doi-asserted-by":"publisher","first-page":"758","DOI":"10.17705\/1jais.00474","volume":"18","author":"M Warkentin","year":"2017","unstructured":"Warkentin M, Goel S, Menard P (2017) Shared benefits and information privacy: What determines smart meter technology adoption? JAIS 18:758\u2013786. https:\/\/doi.org\/10.17705\/1jais.00474","journal-title":"JAIS"},{"key":"438_CR49","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.sysarc.2009.01.002","volume":"55","author":"D Kova\u010d","year":"2009","unstructured":"Kova\u010d D, Tr\u010dek D (2009) Qualitative trust modeling in SOA. J Syst Architect 55:255\u2013263. https:\/\/doi.org\/10.1016\/j.sysarc.2009.01.002","journal-title":"J Syst Architect"},{"key":"438_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103093","volume":"142","author":"S Ayed","year":"2023","unstructured":"Ayed S, Hbaieb A, Chaari L (2023) Blockchain and trust-based clustering scheme for the IoV. Ad Hoc Netw 142:103093. https:\/\/doi.org\/10.1016\/j.adhoc.2023.103093","journal-title":"Ad Hoc Netw"},{"key":"438_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2019.101579","volume":"28","author":"J Lansing","year":"2019","unstructured":"Lansing J, Siegfried N, Sunyaev A, Benlian A (2019) Strategic signaling through cloud service certifications: comparing the relative importance of certifications\u2019 assurances to companies and consumers. J Strateg Inf Syst 28:101579. https:\/\/doi.org\/10.1016\/j.jsis.2019.101579","journal-title":"J Strateg Inf Syst"},{"key":"438_CR52","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04425","author":"S Lins","year":"2019","unstructured":"Lins S, Schneider S, Szefer J et al (2019) Designing monitoring systems for continuous certification of cloud services: deriving meta-requirements and design guidelines. CAIS. https:\/\/doi.org\/10.17705\/1CAIS.04425","journal-title":"CAIS"},{"key":"438_CR53","doi-asserted-by":"publisher","first-page":"93575","DOI":"10.1109\/ACCESS.2022.3204171","volume":"10","author":"N Capuano","year":"2022","unstructured":"Capuano N, Fenza G, Loia V, Stanzione C (2022) Explainable artificial intelligence in CyberSecurity: a survey. IEEE Access 10:93575\u201393600. https:\/\/doi.org\/10.1109\/ACCESS.2022.3204171","journal-title":"IEEE Access"},{"key":"438_CR54","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1109\/TIFS.2013.2248726","volume":"8","author":"IM Abbadi","year":"2013","unstructured":"Abbadi IM, Ruan A (2013) Towards trustworthy resource scheduling in clouds. IEEE Trans Inform Forensic Secur 8:973\u2013984. https:\/\/doi.org\/10.1109\/TIFS.2013.2248726","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"438_CR55","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.jnca.2014.11.011","volume":"49","author":"QM Ashraf","year":"2015","unstructured":"Ashraf QM, Habaebi MH (2015) Autonomic schemes for threat mitigation in Internet of Things. J Netw Comput Appl 49:112\u2013127. https:\/\/doi.org\/10.1016\/j.jnca.2014.11.011","journal-title":"J Netw Comput Appl"},{"key":"438_CR56","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.jpdc.2017.05.021","volume":"109","author":"G Tuna","year":"2017","unstructured":"Tuna G, Kogias DG, Gungor VC et al (2017) A survey on information security threats and solutions for machine to machine (M2M) communications. J Parallel Distrib Comput 109:142\u2013154. https:\/\/doi.org\/10.1016\/j.jpdc.2017.05.021","journal-title":"J Parallel Distrib Comput"},{"key":"438_CR57","doi-asserted-by":"publisher","first-page":"1961","DOI":"10.1109\/JBHI.2021.3107339","volume":"26","author":"M Ebrahimi","year":"2022","unstructured":"Ebrahimi M, Haghighi MS, Jolfaei A et al (2022) A secure and decentralized trust management scheme for smart health systems. IEEE J Biomed Health Inform 26:1961\u20131968. https:\/\/doi.org\/10.1109\/JBHI.2021.3107339","journal-title":"IEEE J Biomed Health Inform"},{"key":"438_CR58","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.csi.2005.01.003","volume":"27","author":"F Massacci","year":"2005","unstructured":"Massacci F, Prest M, Zannone N (2005) Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation. Comput Stand Interfaces 27:445\u2013455. https:\/\/doi.org\/10.1016\/j.csi.2005.01.003","journal-title":"Comput Stand Interfaces"},{"key":"438_CR59","doi-asserted-by":"publisher","first-page":"161488","DOI":"10.1109\/ACCESS.2021.3132580","volume":"9","author":"ST Alshammari","year":"2021","unstructured":"Alshammari ST, Alsubhi K, Aljahdali HMA, Alghamdi AM (2021) Trust management systems in cloud services environment: taxonomy of reputation attacks and defense mechanisms. IEEE Access 9:161488\u2013161506. https:\/\/doi.org\/10.1109\/ACCESS.2021.3132580","journal-title":"IEEE Access"},{"key":"438_CR60","doi-asserted-by":"publisher","first-page":"46218","DOI":"10.1109\/ACCESS.2023.3274774","volume":"11","author":"MA Al-Shareeda","year":"2023","unstructured":"Al-Shareeda MA, Manickam S (2023) A systematic literature review on security of vehicular ad-hoc network (VANET) based on VEINS framework. IEEE Access 11:46218\u201346228. https:\/\/doi.org\/10.1109\/ACCESS.2023.3274774","journal-title":"IEEE Access"},{"key":"438_CR61","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1186\/s13677-022-00353-y","volume":"11","author":"YI Alzoubi","year":"2022","unstructured":"Alzoubi YI, Gill A, Mishra A (2022) A systematic review of the purposes of blockchain and fog computing integration: classification and open issues. J Cloud Comp 11:80. https:\/\/doi.org\/10.1186\/s13677-022-00353-y","journal-title":"J Cloud Comp"},{"key":"438_CR62","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10799-019-00306-z","volume":"21","author":"T Kumar","year":"2020","unstructured":"Kumar T, Braeken A, Jurcut AD et al (2020) AGE: authentication in gadget-free healthcare environments. Inf Technol Manag 21:95\u2013114. https:\/\/doi.org\/10.1007\/s10799-019-00306-z","journal-title":"Inf Technol Manag"},{"key":"438_CR63","doi-asserted-by":"publisher","first-page":"1654","DOI":"10.1109\/TIFS.2018.2883272","volume":"14","author":"J Pawlick","year":"2019","unstructured":"Pawlick J, Chen J, Zhu Q (2019) iSTRICT: an interdependent strategic trust mechanism for the cloud-enabled internet of controlled things. IEEE Trans Inform Forensic Secur 14:1654\u20131669. https:\/\/doi.org\/10.1109\/TIFS.2018.2883272","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"438_CR64","doi-asserted-by":"publisher","first-page":"66","DOI":"10.17705\/1CAIS.02811","volume":"28","author":"HA Smith","year":"2011","unstructured":"Smith HA, McKeen JD (2011) The identity management challenge. CAIS 28:66. https:\/\/doi.org\/10.17705\/1CAIS.02811","journal-title":"CAIS"},{"key":"438_CR65","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1057\/ejis.2009.9","volume":"18","author":"J Zhang","year":"2009","unstructured":"Zhang J, Luo X, Akkaladevi S, Ziegelmayer J (2009) Improving multiple-password recall: an empirical study. Eur J Inf Syst 18:165\u2013176. https:\/\/doi.org\/10.1057\/ejis.2009.9","journal-title":"Eur J Inf Syst"},{"key":"438_CR66","doi-asserted-by":"publisher","first-page":"1812","DOI":"10.3390\/electronics12081812","volume":"12","author":"J Zhao","year":"2023","unstructured":"Zhao J, Hu H, Huang F et al (2023) Authentication technology in internet of things and privacy security issues in typical application scenarios. Electronics 12:1812. https:\/\/doi.org\/10.3390\/electronics12081812","journal-title":"Electronics"},{"key":"438_CR67","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1111\/j.1365-2575.2012.00420.x","volume":"24","author":"T Herath","year":"2014","unstructured":"Herath T, Chen R, Wang J et al (2014) Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Inf Syst J 24:61\u201384. https:\/\/doi.org\/10.1111\/j.1365-2575.2012.00420.x","journal-title":"Inf Syst J"},{"key":"438_CR68","doi-asserted-by":"publisher","first-page":"141610","DOI":"10.1109\/ACCESS.2023.3343411","volume":"11","author":"J Lee","year":"2023","unstructured":"Lee J, Choi H-K, Yoon JH, Kim S (2023) An empirical analysis of incorrect account remediation in the case of broken authentication. IEEE Access 11:141610\u2013141627. https:\/\/doi.org\/10.1109\/ACCESS.2023.3343411","journal-title":"IEEE Access"},{"key":"438_CR69","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.compind.2012.05.001","volume":"63","author":"Y Zeng","year":"2012","unstructured":"Zeng Y, Wang L, Deng X et al (2012) Secure collaboration in global design and supply chain environment: problem analysis and literature review. Comput Ind 63:545\u2013556. https:\/\/doi.org\/10.1016\/j.compind.2012.05.001","journal-title":"Comput Ind"},{"key":"438_CR70","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-41354-9_6","volume-title":"Trust Management X","author":"S Behrooz","year":"2016","unstructured":"Behrooz S, Marsh S (2016) A trust-based framework for information sharing between mobile health care applications. In: Habib SM, Vassileva J, Mauw S, M\u00fchlh\u00e4user M (eds) Trust Management X. Springer, Cham, pp 79\u201395"},{"key":"438_CR71","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2023.104926","volume":"102","author":"MV Kadam","year":"2023","unstructured":"Kadam MV, Mahajan HB, Uke NJ, Futane PR (2023) Cybersecurity threats mitigation in internet of vehicles communication system using reliable clustering and routing. Microprocess Microsyst 102:104926. https:\/\/doi.org\/10.1016\/j.micpro.2023.104926","journal-title":"Microprocess Microsyst"},{"key":"438_CR72","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1007\/s12559-018-9543-3","volume":"10","author":"M Mahmud","year":"2018","unstructured":"Mahmud M, Kaiser MS, Rahman MM et al (2018) A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cogn Comput 10:864\u2013873. https:\/\/doi.org\/10.1007\/s12559-018-9543-3","journal-title":"Cogn Comput"},{"key":"438_CR73","doi-asserted-by":"publisher","first-page":"372","DOI":"10.3390\/fi14120372","volume":"14","author":"W Meng","year":"2022","unstructured":"Meng W, Giannetsos T, Jensen CD (2022) Information and future internet security. Trust Privacy Future Internet 14:372. https:\/\/doi.org\/10.3390\/fi14120372","journal-title":"Trust Privacy Future Internet"},{"key":"438_CR74","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1109\/ACCESS.2017.2665640","volume":"5","author":"A Ometov","year":"2017","unstructured":"Ometov A, Levina A, Borisenko P et al (2017) Mobile social networking under side-channel attacks: practical security challenges. IEEE Access 5:2591\u20132601. https:\/\/doi.org\/10.1109\/ACCESS.2017.2665640","journal-title":"IEEE Access"},{"key":"438_CR75","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.jsis.2005.07.006","volume":"14","author":"V Katos","year":"2005","unstructured":"Katos V, Adams C (2005) Modelling corporate wireless security and privacy. J Strateg Inf Syst 14:307\u2013321. https:\/\/doi.org\/10.1016\/j.jsis.2005.07.006","journal-title":"J Strateg Inf Syst"},{"key":"438_CR76","doi-asserted-by":"publisher","first-page":"487","DOI":"10.17705\/1jais.00463","volume":"18","author":"R Crossler","year":"2017","unstructured":"Crossler R, Posey C (2017) Robbing Peter to Pay Paul: surrendering privacy for security\u2019s sake in an identity ecosystem. JAIS 18:487\u2013515. https:\/\/doi.org\/10.17705\/1jais.00463","journal-title":"JAIS"},{"key":"438_CR77","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1057\/ejis.2013.18","volume":"23","author":"MC Oetzel","year":"2014","unstructured":"Oetzel MC, Spiekermann S (2014) A systematic methodology for privacy impact assessments: a design science approach. Eur J Inf Syst 23:126\u2013150. https:\/\/doi.org\/10.1057\/ejis.2013.18","journal-title":"Eur J Inf Syst"},{"key":"438_CR78","doi-asserted-by":"publisher","first-page":"126931","DOI":"10.1109\/ACCESS.2022.3225462","volume":"10","author":"ZJ Al-Araji","year":"2022","unstructured":"Al-Araji ZJ, Ahmad SSS, Kausar N et al (2022) Fuzzy theory in fog computing: review, taxonomy, and open issues. IEEE Access 10:126931\u2013126956. https:\/\/doi.org\/10.1109\/ACCESS.2022.3225462","journal-title":"IEEE Access"},{"key":"438_CR79","doi-asserted-by":"publisher","first-page":"2185","DOI":"10.1002\/sec.748","volume":"7","author":"SM Habib","year":"2014","unstructured":"Habib SM, Ries S, M\u00fchlh\u00e4user M, Varikkattu P (2014) Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source: towards a trust management system for cloud computing. Secur Comm Netw 7:2185\u20132200. https:\/\/doi.org\/10.1002\/sec.748","journal-title":"Secur Comm Netw"},{"key":"438_CR80","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s12065-018-0154-4","volume":"10","author":"J Kusyk","year":"2018","unstructured":"Kusyk J, Uyar MU, Sahin CS (2018) Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks. Evol Intell 10:95\u2013117. https:\/\/doi.org\/10.1007\/s12065-018-0154-4","journal-title":"Evol Intell"},{"key":"438_CR81","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MSP.2005.11","volume":"3","author":"RL Trope","year":"2005","unstructured":"Trope RL (2005) Directors\u2019 digital fiduciary duties. IEEE Secur Privacy Mag 3:78\u201382. https:\/\/doi.org\/10.1109\/MSP.2005.11","journal-title":"IEEE Secur Privacy Mag"},{"key":"438_CR82","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1080\/0960085X.2021.1980444","volume":"32","author":"A Yazdanmehr","year":"2023","unstructured":"Yazdanmehr A, Wang J (2023) Can peers help reduce violations of information security policies? The role of peer monitoring. Eur J Inf Syst 32:508\u2013528. https:\/\/doi.org\/10.1080\/0960085X.2021.1980444","journal-title":"Eur J Inf Syst"},{"key":"438_CR83","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1287\/isre.2016.0677","volume":"27","author":"Y Ji","year":"2016","unstructured":"Ji Y, Kumar S, Mookerjee V (2016) When being hot is not cool: monitoring hot lists for information security. Inf Syst Res 27:897\u2013918. https:\/\/doi.org\/10.1287\/isre.2016.0677","journal-title":"Inf Syst Res"},{"key":"438_CR84","doi-asserted-by":"publisher","first-page":"102657","DOI":"10.1109\/ACCESS.2020.2999213","volume":"8","author":"H Baniata","year":"2020","unstructured":"Baniata H, Kertesz A (2020) A survey on blockchain-fog integration approaches. IEEE Access 8:102657\u2013102668. https:\/\/doi.org\/10.1109\/ACCESS.2020.2999213","journal-title":"IEEE Access"},{"key":"438_CR85","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1109\/TITS.2022.3191634","volume":"24","author":"I Mirzadeh","year":"2023","unstructured":"Mirzadeh I, Sayad Haghighi M, Jolfaei A (2023) Filtering malicious messages by trust-aware cognitive routing in vehicular ad hoc networks. IEEE Trans Intell Transp Syst 24:1134\u20131143. https:\/\/doi.org\/10.1109\/TITS.2022.3191634","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"438_CR86","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1016\/j.aej.2015.07.011","volume":"54","author":"B Mokhtar","year":"2015","unstructured":"Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc networks. Alex Eng J 54:1115\u20131126. https:\/\/doi.org\/10.1016\/j.aej.2015.07.011","journal-title":"Alex Eng J"},{"key":"438_CR87","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109354","volume":"217","author":"J Ren","year":"2022","unstructured":"Ren J, Qin T (2022) A novel multidimensional trust evaluation and fusion mechanism in fog-based Internet of Things. Comput Netw 217:109354. https:\/\/doi.org\/10.1016\/j.comnet.2022.109354","journal-title":"Comput Netw"},{"key":"438_CR88","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s10799-019-00307-y","volume":"21","author":"S Naoui","year":"2020","unstructured":"Naoui S, Elhdhili ME, Saidane LA (2020) Collaborative and verifiable key derivation protocol for smart home security: CV-KDP. Inf Technol Manag 21:115\u2013129. https:\/\/doi.org\/10.1007\/s10799-019-00307-y","journal-title":"Inf Technol Manag"},{"key":"438_CR89","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1080\/07421222.2017.1373006","volume":"34","author":"SO Yang","year":"2017","unstructured":"Yang SO, Hsu C, Sarker S, Lee AS (2017) Enabling effective operational risk management in a financial institution: an action research study. J Manag Inf Syst 34:727\u2013753. https:\/\/doi.org\/10.1080\/07421222.2017.1373006","journal-title":"J Manag Inf Syst"},{"key":"438_CR90","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2015.06.013","volume":"59","author":"W Fang","year":"2016","unstructured":"Fang W, Zhang C, Shi Z et al (2016) BTRES: Beta-based trust and reputation evaluation system for wireless sensor networks. J Netw Comput Appl 59:88\u201394. https:\/\/doi.org\/10.1016\/j.jnca.2015.06.013","journal-title":"J Netw Comput Appl"},{"key":"438_CR91","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1002\/ett.3879","volume":"31","author":"W Fang","year":"2020","unstructured":"Fang W, Zhang W, Liu Y et al (2020) BTDS: Bayesian-based trust decision scheme for intelligent connected vehicles in VANETs. Trans Emerging Tel Technol 31:66. https:\/\/doi.org\/10.1002\/ett.3879","journal-title":"Trans Emerging Tel Technol"},{"key":"438_CR92","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9648-4","author":"J Li","year":"2011","unstructured":"Li J, Liu X, Liu L et al (2011) HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree. Telecommun Syst. https:\/\/doi.org\/10.1007\/s11235-011-9648-4","journal-title":"Telecommun Syst"},{"key":"438_CR93","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for Internet of Things. J Netw Comput Appl 42:120\u2013134. https:\/\/doi.org\/10.1016\/j.jnca.2014.01.014","journal-title":"J Netw Comput Appl"},{"key":"438_CR94","doi-asserted-by":"publisher","DOI":"10.1108\/BPMJ-10-2021-0663","author":"M Er","year":"2022","unstructured":"Er M, Funke C, Rosemann M et al (2022) Trust-aware process design: the case of GoFood. BPMJ. https:\/\/doi.org\/10.1108\/BPMJ-10-2021-0663","journal-title":"BPMJ"},{"key":"438_CR95","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1057\/ejis.2013.27","volume":"24","author":"A Tsohou","year":"2015","unstructured":"Tsohou A, Karyda M, Kokolakis S, Kiountouzis E (2015) Managing the introduction of information security awareness programmes in organisations. Eur J Inf Syst 24:38\u201358. https:\/\/doi.org\/10.1057\/ejis.2013.27","journal-title":"Eur J Inf Syst"},{"key":"438_CR96","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1057\/ejis.2009.51","volume":"19","author":"P Seltsikas","year":"2010","unstructured":"Seltsikas P, O\u2019Keefe RM (2010) Expectations and outcomes in electronic identity management: the role of trust and public value. Eur J Inf Syst 19:93\u2013103. https:\/\/doi.org\/10.1057\/ejis.2009.51","journal-title":"Eur J Inf Syst"},{"key":"438_CR97","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1057\/palgrave.ejis.3000674","volume":"16","author":"M Grimsley","year":"2007","unstructured":"Grimsley M, Meehan A (2007) e-Government information systems: evaluation-led design for public value and client trust. Eur J Inf Syst 16:134\u2013148. https:\/\/doi.org\/10.1057\/palgrave.ejis.3000674","journal-title":"Eur J Inf Syst"},{"key":"438_CR98","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1057\/ejis.2009.8","volume":"18","author":"SR Boss","year":"2009","unstructured":"Boss SR, Kirsch LJ, Angermeier I et al (2009) If someone is watching, I\u2019ll do what I\u2019m asked: mandatoriness, control, and information security. Eur J Inf Syst 18:151\u2013164. https:\/\/doi.org\/10.1057\/ejis.2009.8","journal-title":"Eur J Inf Syst"},{"key":"438_CR99","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1108\/10662240510629448","volume":"15","author":"M Coetzee","year":"2005","unstructured":"Coetzee M, Eloff JHP (2005) Autonomous trust for web services. Internet Res 15:498\u2013507. https:\/\/doi.org\/10.1108\/10662240510629448","journal-title":"Internet Res"},{"key":"438_CR100","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.108246","volume":"219","author":"Y Wang","year":"2022","unstructured":"Wang Y, Chen P, Wu B et al (2022) A trustable architecture over blockchain to facilitate maritime administration for MASS systems. Reliab Eng Syst Saf 219:108246. https:\/\/doi.org\/10.1016\/j.ress.2021.108246","journal-title":"Reliab Eng Syst Saf"},{"key":"438_CR101","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s10799-018-00297-3","volume":"20","author":"JK Deane","year":"2019","unstructured":"Deane JK, Goldberg DM, Rakes TR, Rees LP (2019) The effect of information security certification announcements on the market value of the firm. Inf Technol Manag 20:107\u2013121. https:\/\/doi.org\/10.1007\/s10799-018-00297-3","journal-title":"Inf Technol Manag"},{"key":"438_CR102","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121676","volume":"238","author":"S Azad","year":"2024","unstructured":"Azad S, Mahmud M, Zamli KZ et al (2024) iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems. Expert Syst Appl 238:121676. https:\/\/doi.org\/10.1016\/j.eswa.2023.121676","journal-title":"Expert Syst Appl"},{"key":"438_CR103","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3476248","volume":"13","author":"M Ebrahimi","year":"2022","unstructured":"Ebrahimi M, Tadayon MH, Haghighi MS, Jolfaei A (2022) A quantitative comparative study of data-oriented trust management schemes in Internet of Things. ACM Trans Manage Inf Syst 13:1\u201330. https:\/\/doi.org\/10.1145\/3476248","journal-title":"ACM Trans Manage Inf Syst"},{"key":"438_CR104","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1080\/0960085X.2021.1978344","volume":"31","author":"C Donalds","year":"2022","unstructured":"Donalds C, Barclay C (2022) Beyond technical measures: a value-focused thinking appraisal of strategic drivers in improving information security policy compliance. Eur J Inf Syst 31:58\u201373. https:\/\/doi.org\/10.1080\/0960085X.2021.1978344","journal-title":"Eur J Inf Syst"},{"key":"438_CR105","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1287\/isre.2021.1014","volume":"32","author":"Y Chen","year":"2021","unstructured":"Chen Y, Galletta DF, Lowry PB et al (2021) Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model. Inf Syst Res 32:1043\u20131065. https:\/\/doi.org\/10.1287\/isre.2021.1014","journal-title":"Inf Syst Res"},{"key":"438_CR106","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1080\/0960085X.2019.1624141","volume":"28","author":"M Niemimaa","year":"2019","unstructured":"Niemimaa M, Niemimaa E (2019) Abductive innovations in information security policy development: an ethnographic study. Eur J Inf Syst 28:566\u2013589. https:\/\/doi.org\/10.1080\/0960085X.2019.1624141","journal-title":"Eur J Inf Syst"},{"key":"438_CR107","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1111\/isj.12043","volume":"25","author":"PB Lowry","year":"2015","unstructured":"Lowry PB, Moody GD (2015) Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies: proposing the control-reactance compliance model (CRCM). Info Systems J 25:433\u2013463. https:\/\/doi.org\/10.1111\/isj.12043","journal-title":"Info Systems J"},{"key":"438_CR108","doi-asserted-by":"publisher","first-page":"263","DOI":"10.2753\/MIS0742-1222290410","volume":"29","author":"A Vance","year":"2013","unstructured":"Vance A, Lowry PB, Eggett D (2013) Using accountability to reduce access policy violations in information systems. J Manag Inf Syst 29:263\u2013290. https:\/\/doi.org\/10.2753\/MIS0742-1222290410","journal-title":"J Manag Inf Syst"},{"key":"438_CR109","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1186\/s13638-015-0353-y","volume":"2015","author":"SA Soleymani","year":"2015","unstructured":"Soleymani SA, Abdullah AH, Hassan WH et al (2015) Trust management in vehicular ad hoc network: a systematic review. J Wireless Com Network 2015:146. https:\/\/doi.org\/10.1186\/s13638-015-0353-y","journal-title":"J Wireless Com Network"},{"key":"438_CR110","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1287\/isre.1120.0437","volume":"24","author":"T Wang","year":"2013","unstructured":"Wang T, Kannan KN, Ulmer JR (2013) The association between the disclosure and the realization of information security risk factors. Inf Syst Res 24:201\u2013218. https:\/\/doi.org\/10.1287\/isre.1120.0437","journal-title":"Inf Syst Res"},{"key":"438_CR111","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1108\/LHT-07-2021-0244","volume":"41","author":"S Alam","year":"2023","unstructured":"Alam S, Zardari S, Shamsi J (2023) Comprehensive three-phase bibliometric assessment on the blockchain (2012\u20132020). LHT 41:287\u2013308. https:\/\/doi.org\/10.1108\/LHT-07-2021-0244","journal-title":"LHT"},{"key":"438_CR112","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1007\/s12063-023-00358-z","volume":"16","author":"S Khan","year":"2023","unstructured":"Khan S, Haleem A, Husain Z et al (2023) Barriers to blockchain technology adoption in supply chains: the case of India. Oper Manag Res 16:668\u2013683. https:\/\/doi.org\/10.1007\/s12063-023-00358-z","journal-title":"Oper Manag Res"},{"key":"438_CR113","doi-asserted-by":"publisher","first-page":"827","DOI":"10.17705\/1jais.00681","volume":"22","author":"Y Wu","year":"2021","unstructured":"Wu Y, Tayi GK, Feng G, Fung RYK (2021) Managing information security outsourcing in a dynamic cooperation environment. JAIS 22:827\u2013850. https:\/\/doi.org\/10.17705\/1jais.00681","journal-title":"JAIS"},{"key":"438_CR114","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1287\/isre.2018.0812","volume":"30","author":"KL Hui","year":"2019","unstructured":"Hui KL, Ke PF, Yao Y, Yue WT (2019) Bilateral liability-based contracts in information security outsourcing. Inf Syst Res 30:411\u2013429. https:\/\/doi.org\/10.1287\/isre.2018.0812","journal-title":"Inf Syst Res"},{"key":"438_CR115","doi-asserted-by":"publisher","first-page":"117","DOI":"10.2753\/MIS0742-1222290304","volume":"29","author":"K-L Hui","year":"2012","unstructured":"Hui K-L, Hui W, Yue WT (2012) Information security outsourcing with system interdependency and mandatory security requirement. J Manag Inf Syst 29:117\u2013156. https:\/\/doi.org\/10.2753\/MIS0742-1222290304","journal-title":"J Manag Inf Syst"},{"key":"438_CR116","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2024.2345867","author":"JG Proudfoot","year":"2024","unstructured":"Proudfoot JG, Cram WA, Madnick S (2024) Weathering the storm: examining how organisations navigate the sea of cybersecurity regulations. Eur J Inf Syst. https:\/\/doi.org\/10.1080\/0960085X.2024.2345867","journal-title":"Eur J Inf Syst"},{"key":"438_CR117","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1111\/isj.12460","volume":"33","author":"WA Cram","year":"2023","unstructured":"Cram WA, D\u2019Arcy J (2023) \u2018What a waste of time\u2019: an examination of cybersecurity legitimacy. Inf Syst J 33:1396\u20131422. https:\/\/doi.org\/10.1111\/isj.12460","journal-title":"Inf Syst J"},{"key":"438_CR118","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1111\/isj.12037","volume":"24","author":"H Li","year":"2014","unstructured":"Li H, Sarathy R, Zhang J, Luo X (2014) Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance. Inf Syst J 24:479\u2013502. https:\/\/doi.org\/10.1111\/isj.12037","journal-title":"Inf Syst J"},{"key":"438_CR119","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1109\/TSG.2021.3113287","volume":"13","author":"Z Cheng","year":"2022","unstructured":"Cheng Z, Chow M-Y (2022) Resilient collaborative distributed ac optimal power flow against false data injection attacks: a theoretical framework. IEEE Trans Smart Grid 13:795\u2013806. https:\/\/doi.org\/10.1109\/TSG.2021.3113287","journal-title":"IEEE Trans Smart Grid"},{"key":"438_CR120","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s10799-022-00362-y","volume":"24","author":"EH Park","year":"2023","unstructured":"Park EH, Kim J, Wiles L (2023) The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information. Inf Technol Manag 24:177\u2013193. https:\/\/doi.org\/10.1007\/s10799-022-00362-y","journal-title":"Inf Technol Manag"},{"key":"438_CR121","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1080\/07421222.2023.2301178","volume":"41","author":"BM Ampel","year":"2024","unstructured":"Ampel BM, Samtani S, Zhu H et al (2024) Improving threat mitigation through a cybersecurity risk management framework: a computational design science approach. J Manag Inf Syst 41:236\u2013265. https:\/\/doi.org\/10.1080\/07421222.2023.2301178","journal-title":"J Manag Inf Syst"},{"key":"438_CR122","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2024.114184","volume":"180","author":"X Xiang","year":"2024","unstructured":"Xiang X, Cao J, Fan W et al (2024) Blockchain enabled dynamic trust management method for the internet of medical things. Decis Support Syst 180:114184. https:\/\/doi.org\/10.1016\/j.dss.2024.114184","journal-title":"Decis Support Syst"},{"key":"438_CR123","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2022.02056","author":"H Jiang","year":"2024","unstructured":"Jiang H, Khanna N, Yang Q, Zhou J (2024) The cyber risk premium. Manag Sci. https:\/\/doi.org\/10.1287\/mnsc.2022.02056","journal-title":"Manag Sci"},{"key":"438_CR124","doi-asserted-by":"publisher","first-page":"2604","DOI":"10.3390\/s22072604","volume":"22","author":"M Asif","year":"2022","unstructured":"Asif M, Aziz Z, Bin Ahmad M et al (2022) Blockchain-based authentication and trust management mechanism for smart cities. Sensors 22:2604. https:\/\/doi.org\/10.3390\/s22072604","journal-title":"Sensors"},{"key":"438_CR125","doi-asserted-by":"publisher","first-page":"13926","DOI":"10.1109\/JIOT.2021.3068175","volume":"8","author":"H Xiao","year":"2021","unstructured":"Xiao H, Zhang W, Li W et al (2021) Joint clustering and blockchain for real-time information security transmission at the crossroads in C-V2X networks. IEEE Internet Things J 8:13926\u201313938. https:\/\/doi.org\/10.1109\/JIOT.2021.3068175","journal-title":"IEEE Internet Things J"},{"key":"438_CR126","doi-asserted-by":"publisher","first-page":"13476","DOI":"10.1109\/ACCESS.2019.2892712","volume":"7","author":"W Fang","year":"2019","unstructured":"Fang W, Xu M, Zhu C et al (2019) FETMS: fast and efficient trust management scheme for information-centric networking in internet of things. IEEE Access 7:13476\u201313485. https:\/\/doi.org\/10.1109\/ACCESS.2019.2892712","journal-title":"IEEE Access"},{"key":"438_CR127","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/s10916-015-0341-0","volume":"39","author":"P Guo","year":"2015","unstructured":"Guo P, Wang J, Ji S et al (2015) A lightweight encryption scheme combined with trust management for privacy-preserving in body sensor networks. J Med Syst 39:190. https:\/\/doi.org\/10.1007\/s10916-015-0341-0","journal-title":"J Med Syst"},{"key":"438_CR128","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1016\/j.dss.2012.09.016","volume":"54","author":"A Wierzbicki","year":"2013","unstructured":"Wierzbicki A, Kaszuba T, Nielek R et al (2013) Improving computational trust representation based on Internet auction traces. Decis Support Syst 54:929\u2013940. https:\/\/doi.org\/10.1016\/j.dss.2012.09.016","journal-title":"Decis Support Syst"},{"key":"438_CR129","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10799-011-0098-1","volume":"12","author":"P Wang","year":"2011","unstructured":"Wang P, Chao K-M, Lo C-C, Farmer R (2011) An evidence-based scheme for web service selection. Inf Technol Manag 12:161\u2013172. https:\/\/doi.org\/10.1007\/s10799-011-0098-1","journal-title":"Inf Technol Manag"},{"key":"438_CR130","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10799-014-0203-3","volume":"16","author":"DS Sayogo","year":"2015","unstructured":"Sayogo DS, Zhang J, Luna-Reyes L et al (2015) Challenges and requirements for developing data architecture supporting integration of sustainable supply chains. Inf Technol Manag 16:5\u201318. https:\/\/doi.org\/10.1007\/s10799-014-0203-3","journal-title":"Inf Technol Manag"},{"key":"438_CR131","doi-asserted-by":"publisher","first-page":"1212","DOI":"10.1111\/isj.12441","volume":"33","author":"F Hassandoust","year":"2023","unstructured":"Hassandoust F, Johnston AC (2023) Peering through the lens of high-reliability theory: a competencies driven security culture model of high-reliability organisations. Inf Syst J 33:1212\u20131238. https:\/\/doi.org\/10.1111\/isj.12441","journal-title":"Inf Syst J"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-024-00438-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10799-024-00438-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-024-00438-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T07:13:02Z","timestamp":1772608382000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10799-024-00438-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,27]]},"references-count":131,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["438"],"URL":"https:\/\/doi.org\/10.1007\/s10799-024-00438-x","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,27]]},"assertion":[{"value":"10 August 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}