{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:59:29Z","timestamp":1742921969306,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642164187"},{"type":"electronic","value":"9783642164194"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16419-4_35","type":"book-chapter","created":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T10:14:38Z","timestamp":1291198478000},"page":"345-354","source":"Crossref","is-referenced-by-count":1,"title":["Adoption of Authenticated Peer-to-Peer Academic Networks \u2013 A Case Study of a Failure"],"prefix":"10.1007","author":[{"given":"Ant\u00f3nio","family":"Tavares","sequence":"first","affiliation":[]},{"given":"Lu\u00eds","family":"Amaral","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/11530657","volume-title":"Peer-to-peer systems and applications","author":"R. Steinmetz","year":"2005","unstructured":"Steinmetz, R., Wehrle, K.: Peer-to-peer systems and applications. Springer, Berlin (2005)"},{"key":"35_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/581571.581573","volume":"45","author":"D.P. Anderson","year":"2002","unstructured":"Anderson, D.P., Cobb, J., Korpela, E., Lebofsky, M., Werthimer, D.: SETI@home - An experiment in public-resource computing. ACM Commun.\u00a045, 56\u201361 (2002)","journal-title":"ACM Commun."},{"unstructured":"Singel, R.: Peer-to-Peer Pass\u00e9, Report Finds. Wired Magazine (2009)","key":"35_CR3"},{"key":"35_CR4","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.comcom.2007.08.004","volume":"31","author":"J. Walkerdine","year":"2008","unstructured":"Walkerdine, J., Hughes, D., Rayson, P., Simms, J., Gilleade, K., Mariani, J., Sommerville, I.: A framework for P2P application development. Computer Communications\u00a031, 387\u2013401 (2008)","journal-title":"Computer Communications"},{"key":"35_CR5","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.tele.2007.01.006","volume":"24","author":"H.M. Sigurdsson","year":"2007","unstructured":"Sigurdsson, H.M., Halldorsson, U.R., Hasslinger, G.: Potentials and challenges of peer-to-peer based content distribution. Telematics and Informatics\u00a024, 348\u2013365 (2007)","journal-title":"Telematics and Informatics"},{"key":"35_CR6","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.elerap.2007.01.001","volume":"7","author":"J. Hughes","year":"2008","unstructured":"Hughes, J., Lang, K.R., Vragov, R.: An analytical framework for evaluating peer-to-peer business models. Electronic Commerce Research and Applications\u00a07, 105\u2013118 (2008)","journal-title":"Electronic Commerce Research and Applications"},{"unstructured":"Nagaraja, K., Rollins, S., Khambatti, M.: Looking beyond the Legacy of Napster and Gnutella. IEEE Distributed Systems Online 7 (2006)","key":"35_CR7"},{"unstructured":"ONU: UN Recommendation in favour of P2P in Science. In: Civil Society Science Information Working Group (2004)","key":"35_CR8"},{"key":"35_CR9","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F.D. Davis","year":"1989","unstructured":"Davis, F.D.: Perceived Usefulness, Perceived Ease Of Use, And User Acceptance Of Information Technology. Mis Quarterly\u00a013, 319\u2013340 (1989)","journal-title":"Mis Quarterly"},{"key":"35_CR10","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V. Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: Toward a unified view. Mis Quarterly\u00a027, 425\u2013478 (2003)","journal-title":"Mis Quarterly"},{"key":"35_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/1027802.1027828","volume-title":"Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services","author":"D. Ennis","year":"2004","unstructured":"Ennis, D., Anchan, D., Pegah, M.: The front line battle against P2P. In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services, pp. 101\u2013106. ACM, Baltimore (2004)"},{"key":"35_CR12","first-page":"419","volume":"14","author":"J. Putter","year":"2006","unstructured":"Putter, J.: Copyright Infringement v. Academic Freedom on the Internet: Dealing with Infringing Use of Peer-to-Peer Technology on Campus Networks. Journal of Law and Policy\u00a014, 419 (2006)","journal-title":"Journal of Law and Policy"},{"unstructured":"Halm, M.: LionShare: Connecting and Extending Peer-to-Peer Networks (Final Report). Pennsylvania State University (2006)","key":"35_CR13"},{"unstructured":"White, D.: LionShare in the UK: \u2018technical and political pros and cons\u2019 Report. In: JISC Project Secure personal institutional and inter-institutional repository environment (SPIRE) (2006), \n                    \n                      http:\/\/spire.conted.ox.ac.uk\/","key":"35_CR14"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y.C., Shi, H., Wang, X., Zhang, J.Y.: Collaborative legal information sharing on P2P network. In: Proceedings of 2007 Ifip International Conference on Network and Parallel Computing Workshops, pp. 41\u201347 (2007)","key":"35_CR15","DOI":"10.1109\/NPC.2007.174"},{"doi-asserted-by":"crossref","unstructured":"Lin, F., Lin, S., Wang, Y.: Can Peer-to-Peer Networks Facilitate Information Sharing in Collaborative Learning? In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences, p. 5 (2008)","key":"35_CR16","DOI":"10.1109\/HICSS.2008.87"},{"unstructured":"Tavares, A.: Partilha de Conhecimento P2P (Report). Universidade do Minho, Braga, Portugal (2004)","key":"35_CR17"},{"unstructured":"Tavares, A.: Como usar redes P2P autenticadas em contexto acad\u00e9mico? In: 8a Confer\u00eancia da Associa\u00e7\u00e3o Portuguesa de Sistemas de Informa\u00e7\u00e3o, Setubal (2008)","key":"35_CR18"},{"unstructured":"Dennis, A., Venkatesh, V., Venkatraman, R.: Adoption of Collaboration Technologies: Integrating Technology Acceptance and Collaboration Technology Research. Working paper, TR-142-1, Information Systems Department, Indiana University (2004)","key":"35_CR19"},{"unstructured":"Venkatesh, V., Dennis, A.R., Brown, S.: Predicting Collaboration Technology Use: Integrating Technology Adoption and Collaboration. Journal of Management Information Systems (forthcoming)","key":"35_CR20"},{"issue":"4","key":"35_CR21","doi-asserted-by":"publisher","first-page":"49","DOI":"10.4018\/jebr.2007100103","volume":"3","author":"J. Song","year":"2007","unstructured":"Song, J., Walden, E.: How Consumer Perceptions of Network Size and Social Interactions Influence the Intention to Adopt Peer-to-Peer Technologies. International Journal of E-Business Research (IJEBR)\u00a03(4), 49\u201366 (2007)","journal-title":"International Journal of E-Business Research (IJEBR)"},{"key":"35_CR22","first-page":"201","volume-title":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS 2005)","author":"H. Xu","year":"2005","unstructured":"Xu, H., Wang, H., Teo, H.: Predicting the Usage of P2P Sharing Software: The Role of Trust and Perceived Risk. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS 2005), vol.\u00a07, pp. 201\u2013211. IEEE Press, New York (2005)"}],"container-title":["Communications in Computer and Information Science","ENTERprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16419-4_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T21:48:42Z","timestamp":1558388922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16419-4_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642164187","9783642164194"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16419-4_35","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}