{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T11:15:29Z","timestamp":1770462929979,"version":"3.49.0"},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T00:00:00Z","timestamp":1675728000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1016\/j.infsof.2023.107170","type":"journal-article","created":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T03:23:29Z","timestamp":1675913009000},"page":"107170","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["An investigation of causes and effects of trust in Boundary Artefacts"],"prefix":"10.1016","volume":"158","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2679-0517","authenticated-orcid":false,"given":"Raquel","family":"Ouriques","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7298-3021","authenticated-orcid":false,"given":"Fabian","family":"Fagerholm","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0619-6027","authenticated-orcid":false,"given":"Daniel","family":"Mendez","sequence":"additional","affiliation":[]},{"given":"Baldvin Gislason","family":"Bern","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"9","key":"10.1016\/j.infsof.2023.107170_b1","doi-asserted-by":"crossref","first-page":"1515","DOI":"10.1177\/0170840604047998","article-title":"Postcards from the edge: local communities, global programs and boundary objects","volume":"25","author":"Sapsed","year":"2004","journal-title":"Organ. Stud."},{"issue":"3","key":"10.1016\/j.infsof.2023.107170_b2","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/S0361-3682(00)00029-5","article-title":"The role of actor-networks and boundary objects in management accounting change: a field study of an implementation of activity-based costing","volume":"26","author":"Briers","year":"2001","journal-title":"Account. Organ. Soc."},{"issue":"5","key":"10.1016\/j.infsof.2023.107170_b3","article-title":"Boundary objects and their use in agile systems engineering","volume":"31","author":"Wohlrab","year":"2019","journal-title":"J. Softw.: Evol. Process"},{"key":"10.1016\/j.infsof.2023.107170_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2022.111572","article-title":"The role of knowledge-based resources in Agile Software Development contexts","volume":"197","author":"Ouriques","year":"2023","journal-title":"J. Syst. Softw."},{"issue":"1","key":"10.1016\/j.infsof.2023.107170_b5","first-page":"65","article-title":"Transformable boundary artifacts for knowledge-based work in cross-organization virtual communities spaces","volume":"5","author":"Akoumianakis","year":"2011","journal-title":"Intell. Decis. Technol."},{"key":"10.1016\/j.infsof.2023.107170_b6","series-title":"Crossing Occupational Boundaries: Communication and Learning on a Production Floor","author":"Bechky","year":"1999"},{"issue":"4","key":"10.1016\/j.infsof.2023.107170_b7","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1177\/016224399101600402","article-title":"Flexible sketches and inflexible data bases: Visual communication, conscription devices, and boundary objects in design engineering","volume":"16","author":"Henderson","year":"1991","journal-title":"Sci. Technol. Human Values"},{"issue":"3","key":"10.1016\/j.infsof.2023.107170_b8","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s10606-007-9044-5","article-title":"Boundary negotiating artifacts: Unbinding the routine of boundary objects and embracing chaos in collaborative work","volume":"16","author":"Lee","year":"2007","journal-title":"Comput. Support. Coop. Work (CSCW)"},{"issue":"4","key":"10.1016\/j.infsof.2023.107170_b9","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2753\/MIS0742-1222220402","article-title":"Turning a community into a market: A practice perspective on information technology use in boundary spanning","volume":"22","author":"Levina","year":"2014","journal-title":"J. Manage. Inf. Syst."},{"issue":"3","key":"10.1016\/j.infsof.2023.107170_b10","first-page":"575","article-title":"Trusting beliefs: A functional measurement study","volume":"33","author":"Vidotto","year":"2012","journal-title":"Psicol.: Int. J. Methodol. Exp. Psychol."},{"key":"10.1016\/j.infsof.2023.107170_b11","series-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems","first-page":"1875","article-title":"Communication through boundary objects in distributed agile teams","author":"Blomkvist","year":"2015"},{"issue":"2","key":"10.1016\/j.infsof.2023.107170_b12","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1145\/2963175.2963179","article-title":"Trust in cloud computing: Conceptual typology and trust-building antecedents","volume":"47","author":"Lansing","year":"2016","journal-title":"ACM Sigmis Database: Database Adv. Inf. Syst."},{"key":"10.1016\/j.infsof.2023.107170_b13","series-title":"Proceedings of the Evaluation and Assessment in Software Engineering","first-page":"306","article-title":"Visualizing inter-team coordination","author":"Gustavsson","year":"2020"},{"issue":"2","key":"10.1016\/j.infsof.2023.107170_b14","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1111\/isj.12261","article-title":"The use of prototypes to bridge knowledge boundaries in agile software development","volume":"30","author":"Huber","year":"2020","journal-title":"Inf. Syst. J."},{"issue":"sup1","key":"10.1016\/j.infsof.2023.107170_b15","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1080\/12460125.2020.1848342","article-title":"Difficult knowledge boundaries during requirements determination","volume":"29","author":"O\u2019Raghallaigh","year":"2020","journal-title":"J. Decis. Syst."},{"issue":"7","key":"10.1016\/j.infsof.2023.107170_b16","doi-asserted-by":"crossref","first-page":"2315","DOI":"10.1177\/1461444817715020","article-title":"Voodoo software and boundary objects in game development: How developers collaborate and conflict with game engines and art tools","volume":"20","author":"Whitson","year":"2018","journal-title":"New Media Soc."},{"issue":"3","key":"10.1016\/j.infsof.2023.107170_b17","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1177\/030631289019003001","article-title":"Institutional ecology,translations\u2019 and boundary objects: Amateurs and professionals in Berkeley\u2019s Museum of Vertebrate Zoology, 1907-39","volume":"19","author":"Star","year":"1989","journal-title":"Soc. Stud. Sci."},{"key":"10.1016\/j.infsof.2023.107170_b18","series-title":"Distributed Artificial Intelligence","first-page":"37","article-title":"Chapter 2 - The structure of ill-structured solutions: Boundary objects and heterogeneous distributed problem solving","author":"Star","year":"1989"},{"issue":"5","key":"10.1016\/j.infsof.2023.107170_b19","doi-asserted-by":"crossref","first-page":"2777","DOI":"10.1007\/s10270-019-00714-3","article-title":"Artefacts in software engineering: a fundamental positioning","volume":"18","author":"M\u00e9ndez\u00a0Fern\u00e1ndez","year":"2019","journal-title":"Softw. Syst. Model."},{"issue":"5","key":"10.1016\/j.infsof.2023.107170_b20","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1177\/0162243910377624","article-title":"This is not a boundary object: Reflections on the origin of a concept","volume":"35","author":"Leigh\u00a0Star","year":"2010","journal-title":"Sci. Technol. Human Values"},{"issue":"2","key":"10.1016\/j.infsof.2023.107170_b21","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1023\/A:1023976111188","article-title":"Boundary objects and prototypes at the interfaces of engineering design","volume":"12","author":"Subrahmanian","year":"2003","journal-title":"Comput. Support. Coop. Work (CSCW)"},{"key":"10.1016\/j.infsof.2023.107170_b22","series-title":"Boundary Objects and Change in Agile Projects","author":"Zaitsev","year":"2014"},{"issue":"3","key":"10.1016\/j.infsof.2023.107170_b23","doi-asserted-by":"crossref","first-page":"473","DOI":"10.2307\/259290","article-title":"Initial trust formation in new organizational relationships","volume":"23","author":"McKnight","year":"1998","journal-title":"Acad. Manag. Rev."},{"issue":"4","key":"10.1016\/j.infsof.2023.107170_b24","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1006\/ijhc.1999.0348","article-title":"A theoretical model of differential social attributions toward computing technology: when the metaphor becomes the model","volume":"52","author":"Marakas","year":"2000","journal-title":"Int. J. Human-Comput. Stud."},{"issue":"4","key":"10.1016\/j.infsof.2023.107170_b25","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/2691517.2691520","article-title":"Understanding trust in IT artifacts: An evaluation of the impact of trustworthiness and trust on satisfaction with antiviral software","volume":"45","author":"Paravastu","year":"2014","journal-title":"ACM SIGMIS Database: DATABASE Adv. Inf. Syst."},{"key":"10.1016\/j.infsof.2023.107170_b26","series-title":"International Conference on Human-Computer Interaction","first-page":"445","article-title":"Perspectives on information technology artefacts in trust-related interactions","author":"Koelmann","year":"2020"},{"issue":"1","key":"10.1016\/j.infsof.2023.107170_b27","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/TEM.2009.2028320","article-title":"The role of trust in postadoption IT exploration: An empirical examination of knowledge management systems","volume":"58","author":"Thatcher","year":"2010","journal-title":"IEEE Trans. Eng. Manage."},{"issue":"4","key":"10.1016\/j.infsof.2023.107170_b28","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1109\/32.799955","article-title":"Qualitative methods in empirical studies of software engineering","volume":"25","author":"Seaman","year":"1999","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"10.1016\/j.infsof.2023.107170_b29","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","article-title":"Guidelines for conducting and reporting case study research in software engineering","volume":"14","author":"Runeson","year":"2009","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.infsof.2023.107170_b30","series-title":"Qualitative Data Analysis: A Methods Sourcebook","author":"Miles","year":"2018"},{"key":"10.1016\/j.infsof.2023.107170_b31","series-title":"Good Research Practice","first-page":"86","author":"Swedish Research Council","year":"2017"},{"issue":"2","key":"10.1016\/j.infsof.2023.107170_b32","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1177\/174701610900500203","article-title":"Ethical issues in the use of in-depth interviews: Literature review and discussion","volume":"5","author":"Allmark","year":"2009","journal-title":"Res. Ethics"},{"key":"10.1016\/j.infsof.2023.107170_b33","doi-asserted-by":"crossref","first-page":"335","DOI":"10.2307\/25148682","article-title":"The emergence of boundary spanning competence in practice: Implications for implementation and use of information systems","author":"Levina","year":"2005","journal-title":"MIS Q."},{"key":"10.1016\/j.infsof.2023.107170_b34","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1016\/j.procir.2015.02.049","article-title":"Evolving product information in aligning product development decisions across disciplines","volume":"29","author":"Luttikhuis","year":"2015","journal-title":"Procedia CIRP"},{"issue":"5","key":"10.1016\/j.infsof.2023.107170_b35","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1287\/orsc.1040.0094","article-title":"Transferring, translating, and transforming: An integrative framework for managing knowledge across boundaries","volume":"15","author":"Carlile","year":"2004","journal-title":"Organ. Sci."},{"key":"10.1016\/j.infsof.2023.107170_b36","doi-asserted-by":"crossref","DOI":"10.1108\/17410390710823716","article-title":"Framework for internet-supported inter-organizational product development collaboration","author":"Kern","year":"2007","journal-title":"J. Enterp. Inf. Manag."},{"key":"10.1016\/j.infsof.2023.107170_b37","series-title":"Perspectives on Socially Shared Cognition","first-page":"283","article-title":"The social organization of distributed cognition","author":"Hutchins","year":"1991"},{"issue":"2","key":"10.1016\/j.infsof.2023.107170_b38","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1177\/1077800405284363","article-title":"Five misunderstandings about case-study research","volume":"12","author":"Flyvbjerg","year":"2006","journal-title":"Qual. Inquiry"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584923000241?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584923000241?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:36:20Z","timestamp":1760585780000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584923000241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":38,"alternative-id":["S0950584923000241"],"URL":"https:\/\/doi.org\/10.1016\/j.infsof.2023.107170","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An investigation of causes and effects of trust in Boundary Artefacts","name":"articletitle","label":"Article Title"},{"value":"Information and Software Technology","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.infsof.2023.107170","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"107170"}}