{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T23:22:27Z","timestamp":1775604147863,"version":"3.50.1"},"reference-count":95,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2003,6,1]],"date-time":"2003-06-01T00:00:00Z","timestamp":1054425600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Human-Computer Studies"],"published-print":{"date-parts":[[2003,6]]},"DOI":"10.1016\/s1071-5819(03)00041-7","type":"journal-article","created":{"date-parts":[[2003,5,19]],"date-time":"2003-05-19T18:04:16Z","timestamp":1053367456000},"page":"737-758","source":"Crossref","is-referenced-by-count":792,"title":["On-line trust: concepts, evolving themes, a model"],"prefix":"10.1016","volume":"58","author":[{"given":"Cynthia L.","family":"Corritore","sequence":"first","affiliation":[]},{"given":"Beverly","family":"Kracher","sequence":"additional","affiliation":[]},{"given":"Susan","family":"Wiedenbeck","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1071-5819(03)00041-7_BIB1","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1086\/292745","article-title":"Trust and antitrust","volume":"96","author":"Baier","year":"1986","journal-title":"Ethics"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB2","series-title":"The Logic and Limits of Trust","author":"Barber","year":"1983"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB3","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1002\/smj.4250150912","article-title":"Trustworthiness as a source of competitive advantage","volume":"15","author":"Barney","year":"1994","journal-title":"Strategic Management Journal"},{"issue":"2","key":"10.1016\/S1071-5819(03)00041-7_BIB4","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1111\/1467-6486.00133","article-title":"Trust in business to business relationships","volume":"36","author":"Blois","year":"1999","journal-title":"Journal of Management Studies"},{"issue":"2","key":"10.1016\/S1071-5819(03)00041-7_BIB5","doi-asserted-by":"crossref","first-page":"293","DOI":"10.2307\/3857330","article-title":"Trust, morality and international business","volume":"8","author":"Brenkert","year":"1998","journal-title":"Business Ethics Quarterly"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB6","unstructured":"Cheskin Research and Studio Archetype\/Sapient, 1999. Ecommerce trust study, http:\/\/www.sapient.com\/cheskin\/, accessed 5\/9\/2000"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB7","unstructured":"Cheskin Research and Studio Archetype\/Sapient, 2000.Trustin the wired Americas, http:\/\/www.cheskin.com. Accessed 5\/25\/2000"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB8","series-title":"Usability Evaluation and Interface Design: Cognitive Engineering, Intelligent Agents and Virtual Reality","first-page":"1548","article-title":"Trust in the online environment","author":"Corritore","year":"2001"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB9","series-title":"Trust in Organizations: Frontiers of Theory and Research","first-page":"16","article-title":"Trust in organizations","author":"Creed","year":"1996"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB10","series-title":"Trust: Making and Breaking Cooperative Relations","first-page":"49","article-title":"Trust as a commodity","author":"Dasgupta","year":"1988"},{"issue":"3","key":"10.1016\/S1071-5819(03)00041-7_BIB11","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","author":"Davis","year":"1989","journal-title":"MIS Quarterly"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB12","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1006\/ijhc.1996.0040","article-title":"A critical assessment of potential measurement biases in the technology acceptance model","volume":"45","author":"Davis","year":"1996","journal-title":"International Journal of Human\u2013Computer Studies"},{"issue":"8","key":"10.1016\/S1071-5819(03)00041-7_BIB13","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","article-title":"User acceptance of computer technology","volume":"35","author":"Davis","year":"1989","journal-title":"Management Science"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB14","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1177\/002200275800200401","article-title":"Trust and suspicion","volume":"4","author":"Deutsch","year":"1958","journal-title":"Conflict Resolution, II"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB15","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1177\/001872676001300202","article-title":"The effect of motivational orientation upon trust and suspicion","volume":"13","author":"Deutsch","year":"1960","journal-title":"Human Relations"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB16","first-page":"275","article-title":"Cooperation and trust","volume":"10","author":"Deutsch","year":"1962","journal-title":"Nebraska Symposium on Motivation"},{"issue":"6","key":"10.1016\/S1071-5819(03)00041-7_BIB17","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/352580.352587","article-title":"Social navigation","volume":"7","author":"Dieberger","year":"2000","journal-title":"Interactions"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB18","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/1251829","article-title":"An examination of the nature of trust in buyer\u2013seller relationships","volume":"61","author":"Doney","year":"1997","journal-title":"Journal of Marketing"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB19","first-page":"231","article-title":"The importance of consistency in establishing cognitive-based trust","volume":"96","author":"Dunn","year":"2000","journal-title":"Teaching Business Ethics"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB20","doi-asserted-by":"crossref","unstructured":"Fogg, B.J., Tseng, H., 1999. The elements of computer credibility. In: Proceedings of the CHI \u201999. ACM Press, New York, pp. 80\u201387.","DOI":"10.1145\/302979.303001"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB21","doi-asserted-by":"crossref","unstructured":"Fogg, B.J., Marshall, J., Kameda, T., Solomon, J., Rangnekar, A., Boyd, J., Brown, B., 2001a. Web credibility research: a method for online experiments and early study results. In: Proceedings of the Conference on Human Factors in Computing Systems CHI 2001 Extended Abstracts. ACM Press, New York, pp. 295\u2013296.","DOI":"10.1145\/634067.634242"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB22","doi-asserted-by":"crossref","unstructured":"Fogg, B.J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P., Treinen, M., 2001b. What makes web sites credible? A report on a large quantitative study. In: Proceedings of the Conference on Human Factors in Computing Systems CHI 2001. ACM Press, New York, pp. 61\u201368.","DOI":"10.1145\/365024.365037"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/1252265","article-title":"Determinants of long-term orientation in buyer\u2013seller relationships","volume":"58","author":"Ganesan","year":"1994","journal-title":"Journal of Marketing"},{"issue":"4","key":"10.1016\/S1071-5819(03)00041-7_BIB24","doi-asserted-by":"crossref","first-page":"389","DOI":"10.2307\/249720","article-title":"Gender differences in the perception and use of e-mail","volume":"21","author":"Gefen","year":"1997","journal-title":"MIS Quarterly"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB25","series-title":"The Consequences of Modernity","author":"Giddens","year":"1990"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB26","series-title":"Trust: Making and Breaking Cooperative Relations","first-page":"32","article-title":"Individuals, interpersonal relations, and trust","author":"Good","year":"1988"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB27","doi-asserted-by":"crossref","unstructured":"Hankowski, R.J, Kantowitz, B.H., Kantowitz, S.C., 1994. Driver acceptance of unrealiable route guidance information. In: Proceedings of the Human Factors and Ergonomics Society 38th Meeting, HFES, Santa Monica, CA, pp. 1062\u20131066.","DOI":"10.1177\/154193129403801615"},{"issue":"2","key":"10.1016\/S1071-5819(03)00041-7_BIB28","doi-asserted-by":"crossref","first-page":"233","DOI":"10.2307\/3857327","article-title":"The ethical limits of trust in business relations","volume":"8","author":"Husted","year":"1998","journal-title":"Business Ethics Quarterly"},{"issue":"3","key":"10.1016\/S1071-5819(03)00041-7_BIB29","doi-asserted-by":"crossref","first-page":"279","DOI":"10.2307\/249498","article-title":"Personal computing acceptance factors in small firms","volume":"17","author":"Igbaria","year":"1997","journal-title":"MIS Quarterly"},{"issue":"6","key":"10.1016\/S1071-5819(03)00041-7_BIB30","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1287\/orsc.10.6.791","article-title":"Communication and trust in global virtual teams","volume":"10","author":"Jarvenpaa","year":"1999","journal-title":"Organization Science"},{"issue":"2","key":"10.1016\/S1071-5819(03)00041-7_BIB31","doi-asserted-by":"crossref","DOI":"10.1111\/j.1083-6101.1999.tb00337.x","article-title":"Consumer trust in an Internet store","volume":"5","author":"Jarvenpaa","year":"1999","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"3","key":"10.1016\/S1071-5819(03)00041-7_BIB32","first-page":"64","article-title":"Patterns of information seeking on the Web","volume":"1","author":"Jenkins","year":"2003","journal-title":"Information Technology and Society"},{"issue":"2","key":"10.1016\/S1071-5819(03)00041-7_BIB33","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1518\/001872097778543831","article-title":"Driver acceptance of unreliable traffic information in familiar and unfamiliar settings","volume":"39","author":"Kantowitz","year":"1997","journal-title":"Human Factors"},{"issue":"3","key":"10.1016\/S1071-5819(03)00041-7_BIB34","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1177\/002200277001400307","article-title":"Conceptual and methodological considerations in the study of trust and suspicion","volume":"14","author":"Kee","year":"1970","journal-title":"Conflict Resolution"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0953-5438(97)00037-4","article-title":"Designing towards emotional usability in customer interfaces-trustworthiness of cyber-banking system interfaces","volume":"10","author":"Kim","year":"1997","journal-title":"Interacting With Computers"},{"issue":"2","key":"10.1016\/S1071-5819(03)00041-7_BIB36","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1111\/j.1744-1714.1996.tb00695.x","article-title":"Should we trust in trust?","volume":"34","author":"Koehn","year":"1996","journal-title":"American Business Law Journal"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB37","doi-asserted-by":"crossref","unstructured":"Lee, J.D., 1991. The dynamics of trust in a supervisory control simulation. In: Proceedings of the Human Factors Society 35th Annual Meeting, HFS, Santa Monica, CA, pp. 1128\u20131232.","DOI":"10.1177\/154193129103501712"},{"issue":"10","key":"10.1016\/S1071-5819(03)00041-7_BIB38","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1080\/00140139208967392","article-title":"Trust, control strategies and allocation of function in human\u2013machine systems","volume":"35","author":"Lee","year":"1992","journal-title":"Ergonomics"},{"issue":"1","key":"10.1016\/S1071-5819(03)00041-7_BIB39","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1080\/10864415.2001.11044227","article-title":"A trust model for consumer internet shopping","volume":"6","author":"Lee","year":"2001","journal-title":"International Journal of Electronic Commerce"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB40","doi-asserted-by":"crossref","unstructured":"Lee, J., Kim, J., Moon, J.Y., 2000. What makes Internet users visit cyber stores again? Key design factors for customer loyalty. In: Proceedings of the Conference on Human Factors in Computing Systems CHI 2000. ACM, New York, pp. 305\u2013312.","DOI":"10.1145\/332040.332448"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB41","series-title":"Conflict, Cooperation, and Justice: Essays Inspired by the Work of Morton Deutsch","first-page":"133","article-title":"Trust in relationships","author":"Lewicki","year":"1995"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB42","series-title":"Trust in Organizations: Frontiers of Theory and Research","first-page":"114","article-title":"Developing and maintaining trust in work relationships","author":"Lewicki","year":"1996"},{"issue":"4","key":"10.1016\/S1071-5819(03)00041-7_BIB43","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1093\/sf\/63.4.967","article-title":"Trust as a social reality","volume":"63","author":"Lewis","year":"1985","journal-title":"Social Forces"},{"issue":"7","key":"10.1016\/S1071-5819(03)00041-7_BIB44","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/278476.278491","article-title":"Electronic shopping","volume":"41","author":"Lohse","year":"1998","journal-title":"Communications of the ACM"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB45","series-title":"Trust and Power","author":"Luhmann","year":"1979"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB46","series-title":"Trust: Making and Breaking Cooperative Relations","first-page":"94","article-title":"Familiarity, confidence, trust","author":"Luhmann","year":"1988"},{"issue":"10","key":"10.1016\/S1071-5819(03)00041-7_BIB47","doi-asserted-by":"crossref","first-page":"638","DOI":"10.2307\/2657332","article-title":"The evolution of trust and cooperation between strangers","volume":"63","author":"Macy","year":"1998","journal-title":"American Sociological Review"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB48","doi-asserted-by":"crossref","unstructured":"Maes, P., Shneiderman, B., Miller, J., 1997. Intelligent software agents vs. user-controlled direct manipulation: a debate. In: Proceedings of the Conference on Human Factors in Computing Systems CHI \u201997. ACM, New York, pp. 496\u2013502.","DOI":"10.1145\/1120212.1120281"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB49","series-title":"Establishing Trust in Virtual Markets","author":"Marcella","year":"1999"},{"issue":"3","key":"10.1016\/S1071-5819(03)00041-7_BIB50","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","article-title":"An integrative model of organizational trust","volume":"20","author":"Mayer","year":"1995","journal-title":"Academy of Management Review"},{"issue":"1","key":"10.1016\/S1071-5819(03)00041-7_BIB51","doi-asserted-by":"crossref","first-page":"24","DOI":"10.2307\/256727","article-title":"Affect- and cognition-based trust as foundations for interpersonal cooperation in organizations","volume":"38","author":"McAllister","year":"1995","journal-title":"Academy of Management Journal"},{"issue":"2","key":"10.1016\/S1071-5819(03)00041-7_BIB52","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1080\/10864415.2001.11044235","article-title":"What trust means in e-commerce customer relationships","volume":"6","author":"McKnight","year":"2002","journal-title":"International Journal of Electronic Commerce"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB53","series-title":"Trust in Organizations: Frontiers of Theory and Research","first-page":"166","article-title":"Swift trust and temporary groups","author":"Meyerson","year":"1996"},{"issue":"1","key":"10.1016\/S1071-5819(03)00041-7_BIB54","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1002\/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9","article-title":"Trust and concern in comsumers\u2019 perceptions of marketing information management practices","volume":"13","author":"Milne","year":"1999","journal-title":"Journal of Interactive Marketing"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB55","series-title":"Trust in Modern Societies","author":"Misztal","year":"1996"},{"issue":"3","key":"10.1016\/S1071-5819(03)00041-7_BIB56","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1080\/00140139608964474","article-title":"Trust in automation","volume":"39","author":"Muir","year":"1994","journal-title":"Ergonomics"},{"issue":"3","key":"10.1016\/S1071-5819(03)00041-7_BIB57","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1080\/00140139608964474","article-title":"Trust in automation","volume":"39","author":"Muir","year":"1996","journal-title":"Ergonomics"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB58","doi-asserted-by":"crossref","unstructured":"Nass, C., Steuer, J., Tauber, E.R., 1994. Computers are social actors. In: Proceedings of the Conference on Human Factors in Computing Systems CHI \u201994. ACM, New York, pp. 72\u201378.","DOI":"10.1145\/259963.260288"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB59","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1006\/ijhc.1995.1042","article-title":"Can computer personalities be human personalities?","volume":"43","author":"Nass","year":"1995","journal-title":"International Journal of Human\u2013Computer Studies"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB60","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1006\/ijhc.1996.0073","article-title":"Can computers be teammates?","volume":"45","author":"Nass","year":"1996","journal-title":"International Journal of Human\u2013Computer Studies"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB61","unstructured":"Nielsen, J., Molich, R., Snyder, C., Farrell, S., 2000. E-commerce user Experience: Trust. Nielsen NormanGroup, Fremont, CA. http:\/\/www.nngroup.com\/reports\/ecommerce\/, accessed 3\/2001"},{"issue":"2&3","key":"10.1016\/S1071-5819(03)00041-7_BIB62","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1207\/S15327051HCI1523_4","article-title":"Distance matters","volume":"15","author":"Olson","year":"2000","journal-title":"Human\u2013Computer Interaction"},{"issue":"12","key":"10.1016\/S1071-5819(03)00041-7_BIB63","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/355112.355121","article-title":"I2i trust in e-commerce","volume":"43","author":"Olson","year":"2000","journal-title":"Communications of the ACM"},{"issue":"1","key":"10.1016\/S1071-5819(03)00041-7_BIB64","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1177\/0021886300361002","article-title":"Measuring social capital in five communities","volume":"36","author":"Onyz","year":"2000","journal-title":"The Journal of Applied Behavioral Science"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB65","unstructured":"Pavlou, P.A., 2001. Integrating trust in electronic commerce with the technology acceptance model: model development and validation. In: Proceedings of the Seventh Americas Conference on Information Systems. Association for Information Systems, Atlanta, GA, pp. 816\u2013822."},{"key":"10.1016\/S1071-5819(03)00041-7_BIB66","doi-asserted-by":"crossref","unstructured":"Picard, R., 2002. Comments made during a CHI 2002 panel. Future Interfaces: Social and Emotional, Minneapolis, MN, April 24.","DOI":"10.1145\/506443.506552"},{"issue":"1","key":"10.1016\/S1071-5819(03)00041-7_BIB67","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1353\/jod.1995.0002","article-title":"Bowling alone","volume":"6","author":"Putnam","year":"1995","journal-title":"Journal of Democracy"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB68","series-title":"The media equation","author":"Reeves","year":"1996"},{"issue":"1","key":"10.1016\/S1071-5819(03)00041-7_BIB69","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1037\/0022-3514.49.1.95","article-title":"Trust in close relationships","volume":"49","author":"Rempel","year":"1985","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"10.1016\/S1071-5819(03)00041-7_BIB70","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/245108.245121","article-title":"Recommender systems","volume":"40","author":"Resnick","year":"1997","journal-title":"Communications of the ACM"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB71","unstructured":"Resnick, P., Zeckhauser, R., 2001. Trust among strangers in Internet transactions: empirical analysis of eBay's reputation system. http:\/\/www.si.umich.edu\/\u223cpresnick, accesed 6\/22\/2001."},{"issue":"12","key":"10.1016\/S1071-5819(03)00041-7_BIB72","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/355112.355122","article-title":"Reputation systems","volume":"43","author":"Resnick","year":"2000","journal-title":"Communications of the ACM"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB73","doi-asserted-by":"crossref","unstructured":"Riegelsberger, J., Sasse, M.A., 2001. Trust builders and trustbusters: the role of trust cues in interfaces to e-commerce applications. In: Towards the E-Society: Proceedings of the First IFIP Conference on E-Commerce, E-Society, and E-Government. Kluwer, London, pp. 17\u201330.","DOI":"10.1007\/0-306-47009-8_2"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB74","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1111\/j.1467-6494.1967.tb01454.x","article-title":"A new scale for the measurement of interpersonal trust","volume":"35","author":"Rotter","year":"1967","journal-title":"Journal of Personality"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB75","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1037\/h0031464","article-title":"Generalized expectancies for interpersonal trust","volume":"26","author":"Rotter","year":"1971","journal-title":"American Psychologist"},{"issue":"1","key":"10.1016\/S1071-5819(03)00041-7_BIB76","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1037\/0003-066X.35.1.1","article-title":"Interpersonal trust, trustworthiness, and gullibility","volume":"35","author":"Rotter","year":"1980","journal-title":"American Psychologist"},{"issue":"9","key":"10.1016\/S1071-5819(03)00041-7_BIB77","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1177\/001872679304600907","article-title":"Studied trust","volume":"46","author":"Sabel","year":"1993","journal-title":"Human Relations"},{"issue":"4","key":"10.1016\/S1071-5819(03)00041-7_BIB78","doi-asserted-by":"crossref","first-page":"517","DOI":"10.2307\/249590","article-title":"Re-examining perceived ease of use and usefulness","volume":"17","author":"Segars","year":"1993","journal-title":"MIS Quarterly"},{"issue":"4","key":"10.1016\/S1071-5819(03)00041-7_BIB79","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1111\/j.1571-9979.1992.tb00679.x","article-title":"Business on a handshake","volume":"8","author":"Shapiro","year":"1992","journal-title":"Negotiation Journal"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB80","doi-asserted-by":"crossref","unstructured":"Shelat, B., Egger, F.N., 2002. What makes people trust online gambling sites? Proceedings of Conference on Human Factors in Computing Systems CHI 2002, Extended Abstracts. ACM Press, New York, pp. 852\u2013853.","DOI":"10.1145\/506443.506631"},{"issue":"12","key":"10.1016\/S1071-5819(03)00041-7_BIB81","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/355112.355124","article-title":"Designing trust into online experiences","volume":"43","author":"Shneiderman","year":"2000","journal-title":"Communications of the ACM"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB82","unstructured":"Sisson, D., 2000. Ecommerce: trust and trustworthiness. http:\/\/www.philosophe.com\/commerce\/trust.html, accessed 5\/17\/2002."},{"key":"10.1016\/S1071-5819(03)00041-7_BIB83","series-title":"Games and Human Behavior: Essays in Honor of Amnon Rapoport","first-page":"355","article-title":"Determinants of trust","author":"Snijders","year":"1999"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB84","series-title":"Building Trust in Business, Politics, Relationships, and Life","author":"Solomon","year":"2001"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB85","unstructured":"Stanford, J., Tauber, E.R., Fogg, B.J., Marable, L., 2002. Experts vs. online consumers: a comparative credibility study of health and finance web sites. http:\/\/www.consumerwebwatch.org\/news\/report3_credibilityresearch\/slicedbread_abstract.htm, Accessed 11\/19\/02."},{"key":"10.1016\/S1071-5819(03)00041-7_BIB86","doi-asserted-by":"crossref","unstructured":"Steinbr\u00fcck, U., Schaumburg, H., Duda, S., Kr\u00fcger, T., 2002. A picture says more than a thousand words\u2014photographs as trust builders in e-commerce websites. In: Proceedings of Conference on Human Factors in Computing Systems CHI 2002, Extended Abstracts. ACM Press, New York, pp. 748\u2013749.","DOI":"10.1145\/506443.506578"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB87","doi-asserted-by":"crossref","unstructured":"Sycara, K., Lewis, M., 1998. Calibrating trust to integrate intelligent agents into human teams. Proceedings of the 31st Hawaii International Conference on System Science (HICSS-98), Hawaii, January 5\u20139, 1998. IEEE, New York.","DOI":"10.1109\/HICSS.1998.653107"},{"issue":"2","key":"10.1016\/S1071-5819(03)00041-7_BIB88","first-page":"61","article-title":"Toward a generic model of trust for electronic commerce","volume":"5","author":"Tan","year":"2001","journal-title":"International Journal of Electronic Commerce"},{"issue":"1","key":"10.1016\/S1071-5819(03)00041-7_BIB89","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/0747-5632(95)00016-X","article-title":"People's perception of human and computer advice","volume":"12","author":"Waern","year":"1996","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB90","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0020-7373(92)90086-Z","article-title":"Communication knowledge for knowledge communication","volume":"37","author":"Waern","year":"1992","journal-title":"International Journal of Man\u2013Machine Studies"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB91","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1006\/ijhc.1996.0106","article-title":"The influence of interaction style and experience on user perceptions of software packages","volume":"46","author":"Wiedenbeck","year":"1997","journal-title":"International Journal of Human\u2013Computer Studies"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB92","unstructured":"Wong, H.C., Sycara, K., 1999. Adding security and trust to multi-agent systems. In: Proceedings of the Autonomous Agents \u201999: Workshop on Deception, Fraud and Trust in Agent Societies, May 1999, Seattle, WA, pp. 149\u2013161."},{"issue":"2","key":"10.1016\/S1071-5819(03)00041-7_BIB93","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1037\/0003-066X.35.2.151","article-title":"Feeling and thinking","volume":"35","author":"Zajonc","year":"1980","journal-title":"American Psychologist"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB94","doi-asserted-by":"crossref","first-page":"229","DOI":"10.2307\/2393957","article-title":"Trust and managerial problem solving","volume":"17","author":"Zand","year":"1972","journal-title":"Administrative Science Quarterly"},{"key":"10.1016\/S1071-5819(03)00041-7_BIB95","doi-asserted-by":"crossref","unstructured":"Zimmerman, J., Kurapati, K., 2002. Exposing profiles to build trust in a recommender. In: Proceedings of the Conference on Human Factors in Computing Systems CHI 2001 Extended Abstracts. ACM Press, New York, pp. 608\u2013609.","DOI":"10.1145\/506443.506507"}],"container-title":["International Journal of Human-Computer Studies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1071581903000417?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1071581903000417?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T16:51:13Z","timestamp":1584636673000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1071581903000417"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,6]]},"references-count":95,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2003,6]]}},"alternative-id":["S1071581903000417"],"URL":"https:\/\/doi.org\/10.1016\/s1071-5819(03)00041-7","relation":{},"ISSN":["1071-5819"],"issn-type":[{"value":"1071-5819","type":"print"}],"subject":[],"published":{"date-parts":[[2003,6]]}}}