{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T10:07:46Z","timestamp":1725012466907},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T00:00:00Z","timestamp":1503360000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s12599-017-0493-1","type":"journal-article","created":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T08:38:13Z","timestamp":1503391093000},"page":"273-287","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Interactive Reputation Systems"],"prefix":"10.1007","volume":"60","author":[{"given":"Johannes","family":"S\u00e4nger","sequence":"first","affiliation":[]},{"given":"G\u00fcnther","family":"Pernul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,22]]},"reference":[{"issue":"2","key":"493_CR2","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","volume":"5","author":"D Artz","year":"2007","unstructured":"Artz D, Gil Y (2007) A survey of trust in computer science and the Semantic Web. Web Semant 5(2):58\u201371","journal-title":"Web Semant"},{"key":"493_CR3","unstructured":"Awad NF, Ragowsky A (2008) Establishing trust in electronic commerce through online word of mouth: an examination across genders. J Manag Inf Syst 24(4):101\u2013121"},{"key":"493_CR4","doi-asserted-by":"crossref","unstructured":"Ba S, Pavlou PA (2002) Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior. MIS Q 26(3):243\u2013268","DOI":"10.2307\/4132332"},{"key":"493_CR5","volume-title":"SUS\u2014a quick and dirty usability scale. Usability evaluation in industry","author":"J Brooke","year":"1996","unstructured":"Brooke J (1996) SUS\u2014a quick and dirty usability scale. Usability evaluation in industry. Taylor & Francis, London"},{"issue":"4","key":"493_CR6","first-page":"59","volume":"11","author":"B Chandrasekaran","year":"1990","unstructured":"Chandrasekaran B (1990) Design problem solving: a task analysis. AI Mag 11(4):59\u201371","journal-title":"AI Mag"},{"key":"493_CR7","doi-asserted-by":"crossref","unstructured":"Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proceedings of the 2nd ACM conference on electronic commerce, Minneapolis, MN, USA, October 17\u201320, pp 150\u2013157","DOI":"10.1145\/352871.352889"},{"key":"493_CR8","doi-asserted-by":"crossref","unstructured":"Dellarocas C (2001) Analyzing the economic efficiency of eBay-like online reputation reporting mechanisms. In: Proceedings of the 3rd ACM conference on electronic commerce, Tampa, EC \u201901, pp 171\u2013179","DOI":"10.1145\/501158.501177"},{"issue":"1","key":"493_CR9","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1177\/0003122413512316","volume":"79","author":"A Diekmann","year":"2013","unstructured":"Diekmann A, Jann B, Przepiorka W, Wehrli S (2013) Reputation formation and the evolution of cooperation in anonymous online markets. Am Sociol Rev 79(1):65\u201385","journal-title":"Am Sociol Rev"},{"key":"493_CR10","first-page":"213","volume-title":"Trust: making and breaking cooperative relations","author":"D Gambetta","year":"1988","unstructured":"Gambetta D (1988) Can we trust trust? In: Gambetta D (ed) Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213\u2013237"},{"key":"493_CR11","doi-asserted-by":"crossref","unstructured":"Gefen D, Elena K, DW Straub (2003) Trust and TAM in online shopping: an integrated model. MIS Q 27(1):51\u201390","DOI":"10.2307\/30036519"},{"key":"493_CR12","unstructured":"Hammer S, Kiefhaber R, Redlin M, Andre E, Ungerer T (2013) A user centric study of reputation metrics in online communities. In: Proceedings of the 3rd workshop on trust, reputation and user modeling (TRUM\u201913), Rome"},{"key":"493_CR13","unstructured":"Heinrich J, Weiskopf D (2013) State of the art of parallel coordinates. In: STAR proceedings of eurographics . Eurographics Association, pp 95\u2013116"},{"issue":"1","key":"493_CR1","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner AR, March ST, Park J, Ram S (2004) Design science in information systems research. MIS Q 28(1):75\u2013105","journal-title":"MIS Q"},{"key":"493_CR14","doi-asserted-by":"crossref","unstructured":"Hillebrand C, Coetzee M (2015) The design of a configurable reputation service. In: Proceedings of the 12th international conference on trust, privacy and security in digital business (TrustBus 2015), Valencia, pp 60\u201370","DOI":"10.1007\/978-3-319-22906-5_5"},{"issue":"1","key":"493_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1592451.1592452","volume":"42","author":"K Hoffman","year":"2009","unstructured":"Hoffman K, Zage D, Nita-Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv 42(1):1\u201331","journal-title":"ACM Comput Surv"},{"issue":"2","key":"493_CR16","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1111\/j.1530-9134.2006.00103.x","volume":"15","author":"D Houser","year":"2006","unstructured":"Houser D, Wooders J (2006) Reputation in auctions: theory, and evidence from eBay. J Econ Manag Strateg 15(2):353\u2013369","journal-title":"J Econ Manag Strateg"},{"issue":"2","key":"493_CR17","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/BF01898350","volume":"1","author":"A Inselberg","year":"1985","unstructured":"Inselberg A (1985) The plane with parallel coordinates. Vis Comput 1(2):69\u201391","journal-title":"Vis Comput"},{"key":"493_CR18","unstructured":"J\u00f8sang A (2012) Robustness of trust and reputation systems: does it matter? In: Trust management VI\u2014proceedings of the 6th IFIP WG 11.11 international conference IFIPTM 2012, Surat, pp 253\u2013262"},{"issue":"2","key":"493_CR19","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618\u2013644","journal-title":"Decis Support Syst"},{"key":"493_CR20","doi-asserted-by":"crossref","unstructured":"J\u00f8sang A, Golbeck J (2009) Challenges for robust of trust and reputation systems. In: Proceedings of the 5th international workshop on security and trust management, Saint Malo","DOI":"10.1109\/SASOW.2010.33"},{"key":"493_CR21","unstructured":"J\u00f8sang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th Bled electronic commerce conference, Bled, pp 41\u201355"},{"key":"493_CR22","volume-title":"Mastering the information age\u2014solving problems with visual analytics","author":"Daniel A Keim","year":"2010","unstructured":"Keim Daniel A, Kohlhammer J\u00f6rn, Ellis Geoffrey, Mansmann Florian (2010) Mastering the information age\u2014solving problems with visual analytics. Eurographics Association, Geneve"},{"key":"493_CR23","unstructured":"Kerr R, Cohen R (2009) Smart cheaters do prosper: defeating trust and reputation systems. In: Proceedings of The 8th international conference on autonomous agents and multiagent systems\u2013volume 2 AAMAS \u201909, Budapest, pp 993\u20131000"},{"issue":"23","key":"493_CR24","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.cosrev.2012.01.002","volume":"6","author":"E Koutrouli","year":"2012","unstructured":"Koutrouli E, Tsalgatidou A (2012) Taxonomy of attacks and defense mechanisms in P2P reputation systems\u2014lessons for reputation system designers. Comput Sci Rev 6(23):47\u201370","journal-title":"Comput Sci Rev"},{"key":"493_CR25","unstructured":"Liu S, Zhang J, Miao C, Theng Y-L, Kot AC (2011) iCLUB: an integrated clustering-based approach to improve the robustness of reputation systems. In: The 10th international conference on autonomous agents and multiagent systems\u2014volume 3 (AAMAS \u201911), Taipei, pp 1151\u20131152"},{"key":"493_CR26","doi-asserted-by":"crossref","unstructured":"Malik Z, Akbar I, Bouguettaya A (2009) Web services reputation assessment using a hidden Markov model. In: Proceeding of the 7th international joint conference on service-oriented computing (ICSOC-ServiceWave \u201909), Stockholm, pp 576\u2013591","DOI":"10.1007\/978-3-642-10383-4_42"},{"key":"493_CR27","unstructured":"Marsh SP (1994) Formalising trust as a computational concept. PhD thesis, University of Stirling, Stirling"},{"key":"493_CR28","doi-asserted-by":"crossref","unstructured":"Marsh S, Basu A, Dwyer N (2012) Rendering unto Caesar the things that are Caesar\u2019s: complex trust models and human understanding. In: Proceedings of the 6th IFIP WG 11.11 international conference, IFIPTM 2012, Surat, pp 191\u2013200","DOI":"10.1007\/978-3-642-29852-3_13"},{"key":"493_CR29","unstructured":"McKnight DH, Chervany NL (1996) The meanings of trust. Technical report MISRC working paper series 96-04, University of Minnesota, Management Information Systems Research Center"},{"key":"493_CR30","volume-title":"Human problem solving","author":"A Newell","year":"1972","unstructured":"Newell A (1972) Human problem solving. Prentice-Hall, Upper Saddle River"},{"key":"493_CR31","doi-asserted-by":"crossref","unstructured":"Peffers K, Tuunanen T, Rothenberger M, Chatterjee S (2007) A design science research methodology for information systems research. J Manag Inf Syst 24(3):45\u201377","DOI":"10.2753\/MIS0742-1222240302"},{"issue":"12","key":"493_CR32","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P Resnick","year":"2000","unstructured":"Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 43(12):45\u201348","journal-title":"Commun ACM"},{"issue":"2","key":"493_CR33","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s10683-006-4309-2","volume":"9","author":"P Resnick","year":"2006","unstructured":"Resnick P, Zeckhauser R, Swanson J, Lockwood K (2006) The value of reputation on eBay: a controlled experiment. Exp Econ 9(2):79\u2013101","journal-title":"Exp Econ"},{"issue":"2","key":"493_CR34","first-page":"23","volume":"11","author":"P Resnick","year":"2002","unstructured":"Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of ebays reputation system. Econ Internet E-commerce 11(2):23\u201325","journal-title":"Econ Internet E-commerce"},{"issue":"3","key":"493_CR35","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.ijhcs.2005.01.001","volume":"62","author":"J Riegelsberger","year":"2005","unstructured":"Riegelsberger J, Angela Sasse M, McCarthy JD (2005) The mechanics of trust: a framework for research and design. Int J Hum-Comput Stud 62(3):381\u2013422","journal-title":"Int J Hum-Comput Stud"},{"key":"493_CR36","doi-asserted-by":"crossref","unstructured":"Sabater J, Sierra C (2001) REGRET: reputation in gregarious societies. In: Proceedings of the 5th international conference on autonomous agents (AGENTS \u201901), Hakodate, pp 194\u2013195","DOI":"10.1145\/375735.376110"},{"key":"493_CR37","doi-asserted-by":"crossref","unstructured":"S\u00e4nger J, H\u00e4nsch N, Glass B, Benenson Z, Landwirth R, Angela Sasse M (2016) Look before you leap: improving the users ability to detect fraud in electronicmMarketplaces. In: Proceedings of the ACM SIGCHI conference on human factors in computing systems (CHI 2016), San Jose","DOI":"10.1145\/2858036.2858555"},{"key":"493_CR38","doi-asserted-by":"crossref","unstructured":"S\u00e4nger J, Pernul G (2014) Visualizing transaction context in trust and reputation systems. In: Proceedings of the 9th international conference on availability, reliability and security (ARES), Fribourg","DOI":"10.1109\/ARES.2014.19"},{"issue":"1","key":"493_CR39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40493-016-0026-8","volume":"3","author":"J S\u00e4nger","year":"2016","unstructured":"S\u00e4nger J, Pernul G (2016) TRIVIA: visualizing reputation profiles to detect malicious sellers in electronic marketplaces. J Trust Manag 3(1):1\u201322","journal-title":"J Trust Manag"},{"key":"493_CR40","doi-asserted-by":"crossref","unstructured":"S\u00e4nger J, Richthammer C, Kremser A, Pernul G (2015a) Personalized composition of trustful reputation systems. In: Proceedings of the 29th Annual IFIP WG 11.3 working conference on data and applications security and privacy XXIX (DBSec 2015), Fairfax","DOI":"10.1007\/978-3-319-20810-7_13"},{"key":"493_CR41","unstructured":"S\u00e4nger J, Richthammer C, Kunz M, Meier S, Pernul G (2015b) Visualizing unfair ratings in online reputation systems. In: Proceedings of the 23rd European conference on information systems, ECIS 2015, M\u00fcnster"},{"issue":"5","key":"493_CR42","first-page":"1","volume":"2","author":"J S\u00e4nger","year":"2015","unstructured":"S\u00e4nger J, Richthammer C, Pernul G (2015c) Reusable components for online reputation systems. J Trust Manag 2(5):1\u201321","journal-title":"J Trust Manag"},{"key":"493_CR43","doi-asserted-by":"crossref","unstructured":"Sun Y, Liu Y (2012) Security of online reputation systems: the evolution of attacks and defenses. IEEE Signal Proc Mag 29(2):87\u201397","DOI":"10.1109\/MSP.2011.942344"},{"issue":"2","key":"493_CR44","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10458-006-5952-x","volume":"12","author":"WT Teacy","year":"2006","unstructured":"Teacy WT, Patel J, Jennings NR, Luck M (2006) TRAVOS: trust and reputation in the context of inaccurate information sources. Auton Agents Multi-Agent Syst 12(2):183\u2013198","journal-title":"Auton Agents Multi-Agent Syst"},{"key":"493_CR45","unstructured":"Yamagishi T, Matsuda M (2002) Improving the lemons market with a reputation system: an experimental study of internet auctioning. Hokkaido University"},{"issue":"1","key":"493_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4067\/S0718-18762012000100001","volume":"7","author":"Y Yao","year":"2012","unstructured":"Yao Y, Ruohomaa S, Feng X (2012) Addressing common vulnerabilities of reputation systems for electronic commerce. J Theor Appl Electron Commer Res 7(1):1\u201320","journal-title":"J Theor Appl Electron Commer Res"},{"key":"493_CR47","doi-asserted-by":"crossref","unstructured":"Yu B, Singh MP (2002) An evidential model of distributed reputation management. In: Proceedings of the 1st international joint conference on autonomous agents and multi-agent systems (AAMAS \u201902), Bologna, pp 294\u2013301","DOI":"10.1145\/544741.544809"},{"key":"493_CR48","doi-asserted-by":"crossref","unstructured":"Zhang L, Jiang S, Zhang J, Keong Ng W (2012b) Robustness of trust models and combinations for handling unfair ratings. In: Trust management VI\u2014proceedings of the 6th IFIP WG 11.11 international conference, IFIPTM 2012, Surat, pp 36\u201351","DOI":"10.1007\/978-3-642-29852-3_3"},{"key":"493_CR49","doi-asserted-by":"crossref","unstructured":"Zhang H, Wang Y, Zhang X (2012a) A trust vector approach to transaction context-aware trust evaluation in e-commerce and e-service environments. In: Proceedings of the 5th IEEE international conference on service-oriented computing and applications, Taipeh, pp 1\u20138","DOI":"10.1109\/SOCA.2012.6449461"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12599-017-0493-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-017-0493-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-017-0493-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T17:16:22Z","timestamp":1570036582000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12599-017-0493-1"}},"subtitle":["How to Cope with Malicious Behavior in Feedback Mechanisms"],"short-title":[],"issued":{"date-parts":[[2017,8,22]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["493"],"URL":"https:\/\/doi.org\/10.1007\/s12599-017-0493-1","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,22]]}}}