{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T04:33:42Z","timestamp":1770698022778,"version":"3.49.0"},"reference-count":77,"publisher":"Informa UK Limited","issue":"3","license":[{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["BE 1422\/21-2"],"award-info":[{"award-number":["BE 1422\/21-2"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["HE 2745\/16-2"],"award-info":[{"award-number":["HE 2745\/16-2"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2026,2,7]]},"DOI":"10.1080\/0144929x.2025.2518236","type":"journal-article","created":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T01:22:11Z","timestamp":1751937731000},"page":"388-408","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["Building trust in workplace information systems: a four-company study"],"prefix":"10.1080","volume":"45","author":[{"given":"Lea S.","family":"M\u00fcller","sequence":"first","affiliation":[{"name":"University of M\u00fcnster","place":["M\u00fcnster, Germany"]}]},{"given":"Christoph","family":"Nohe","sequence":"additional","affiliation":[{"name":"University of M\u00fcnster","place":["M\u00fcnster, Germany"]}]},{"given":"Sebastian","family":"Reiners","sequence":"additional","affiliation":[{"name":"University of M\u00fcnster","place":["M\u00fcnster, Germany"]}]},{"given":"J\u00f6rg","family":"Becker","sequence":"additional","affiliation":[{"name":"University of M\u00fcnster","place":["M\u00fcnster, Germany"]}]},{"given":"Guido","family":"Hertel","sequence":"additional","affiliation":[{"name":"University of M\u00fcnster","place":["M\u00fcnster, Germany"]}]}],"member":"301","published-online":{"date-parts":[[2025,7,7]]},"reference":[{"key":"e_1_3_5_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjir.12517"},{"key":"e_1_3_5_3_1","doi-asserted-by":"publisher","DOI":"10.1108\/02683940710733115"},{"key":"e_1_3_5_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1988.11517807"},{"key":"e_1_3_5_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.03.013"},{"key":"e_1_3_5_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.107.2.238"},{"key":"e_1_3_5_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.88.3.588"},{"key":"e_1_3_5_8_1","doi-asserted-by":"publisher","DOI":"10.1006\/ccog.1996.0011"},{"key":"e_1_3_5_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.emj.2017.02.007"},{"key":"e_1_3_5_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1581258"},{"key":"e_1_3_5_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.934287"},{"key":"e_1_3_5_12_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.3.05"},{"key":"e_1_3_5_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpp.2386"},{"key":"e_1_3_5_14_1","article-title":"Trust Management\u2014An Information Systems Perspective","author":"Chasin F.","year":"2019","unstructured":"Chasin, F., D. M. Riehle, and M. Rosemann. 2019. \u201cTrust Management\u2014An Information Systems Perspective.\u201d Proceedings of the 27th European Conference on Information Systems.","journal-title":"Proceedings of the 27th European Conference on Information Systems"},{"key":"e_1_3_5_15_1","doi-asserted-by":"publisher","DOI":"10.2307\/41703503"},{"key":"e_1_3_5_16_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2016.9"},{"key":"e_1_3_5_17_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240402"},{"key":"e_1_3_5_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045748"},{"key":"e_1_3_5_19_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290309"},{"key":"e_1_3_5_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12369-019-00596-x"},{"key":"e_1_3_5_21_1","doi-asserted-by":"publisher","DOI":"10.1108\/00251741111143603"},{"key":"e_1_3_5_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9500-y"},{"key":"e_1_3_5_23_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15328007SEM0803_5"},{"key":"e_1_3_5_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(95)00052-6"},{"key":"e_1_3_5_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/hrm.20018"},{"key":"e_1_3_5_26_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240411"},{"key":"e_1_3_5_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036519"},{"key":"e_1_3_5_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-531-92042-9"},{"key":"e_1_3_5_29_1","doi-asserted-by":"publisher","DOI":"10.1177\/1046496406292337"},{"key":"e_1_3_5_30_1","doi-asserted-by":"publisher","DOI":"10.5465\/annals.2018.0057"},{"key":"e_1_3_5_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.emj.2023.03.004"},{"key":"e_1_3_5_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/13594320344000228"},{"key":"e_1_3_5_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2019.1574361"},{"key":"e_1_3_5_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720814547570"},{"key":"e_1_3_5_35_1","doi-asserted-by":"publisher","DOI":"10.17705\/2msqe.00008"},{"key":"e_1_3_5_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.07.001"},{"key":"e_1_3_5_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2011.624638"},{"key":"e_1_3_5_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2015.04.001"},{"key":"e_1_3_5_39_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.2000.2904"},{"key":"e_1_3_5_40_1","first-page":"375","article-title":"Do People Trust Facebook as a Technology or as a \u201cPerson\u201d? Distinguishing Technology Trust from Interpersonal Trust","author":"Lankton N. K.","year":"2008","unstructured":"Lankton, N. K., and D. H. McKnight. 2008. \u201cDo People Trust Facebook as a Technology or as a \u201cPerson\u201d? Distinguishing Technology Trust from Interpersonal Trust.\u201d AMCIS 2008 Proceedings : 375.","journal-title":"AMCIS 2008 Proceedings"},{"key":"e_1_3_5_41_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00411"},{"key":"e_1_3_5_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929031000136548"},{"key":"e_1_3_5_43_1","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50_30392"},{"key":"e_1_3_5_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481287"},{"key":"e_1_3_5_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2008.01.001"},{"key":"e_1_3_5_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1988.10478722"},{"key":"e_1_3_5_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/09537287.2020.1784481"},{"key":"e_1_3_5_48_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9508080335"},{"key":"e_1_3_5_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985347.1985353"},{"key":"e_1_3_5_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00020-3"},{"key":"e_1_3_5_51_1","doi-asserted-by":"publisher","DOI":"10.1026\/0932-4089\/a000306"},{"key":"e_1_3_5_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2020.1758797"},{"key":"e_1_3_5_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2023.2286910"},{"key":"e_1_3_5_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2023.2196598"},{"key":"e_1_3_5_55_1","volume-title":"Mplus User\u2019s Guide","author":"Muth\u00e9n L. K.","year":"1998","unstructured":"Muth\u00e9n, L. K., and B. O. Muth\u00e9n. 1998. Mplus User\u2019s Guide. 8th ed. Los Angeles, CA: Muth\u00e9n & Muth\u00e9n.","edition":"8"},{"key":"e_1_3_5_56_1","doi-asserted-by":"publisher","DOI":"10.1026\/0012-1924\/a000067"},{"key":"e_1_3_5_57_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.2005.69.4.167"},{"key":"e_1_3_5_58_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000663"},{"key":"e_1_3_5_59_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0165"},{"key":"e_1_3_5_60_1","volume-title":"Introduction to Information Systems","author":"Rainer R. K.","year":"2023","unstructured":"Rainer, R. K., and B. Prince. 2023. Introduction to Information Systems (10th ed.). Oakville, ON: John Wiley & Sons.","edition":"10"},{"key":"e_1_3_5_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11846-023-00657-6"},{"key":"e_1_3_5_62_1","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1998.926617"},{"key":"e_1_3_5_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2022.2120634"},{"key":"e_1_3_5_64_1","doi-asserted-by":"publisher","DOI":"10.23668\/psycharchives.12784"},{"key":"e_1_3_5_65_1","unstructured":"Sch\u00fcffler A. and A. Kluge. 2023. \u201cIntentional Forgetting Reduces Cognitive Load and Effort\u201d. Unpublished Manuscript."},{"key":"e_1_3_5_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.02.056"},{"key":"e_1_3_5_67_1","volume-title":"24th European conference on information systems (ECIS)","author":"S\u00f6llner M.","year":"2016","unstructured":"S\u00f6llner, M., and P. A. Pavlou. 2016. \u201cA Longitudinal Perspective on Trust in IT Artefacts.\u201d 24th European conference on information systems (ECIS)."},{"key":"e_1_3_5_68_1","doi-asserted-by":"publisher","DOI":"10.1177\/00131640121971455"},{"key":"e_1_3_5_69_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327906mbr2502_4"},{"key":"e_1_3_5_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.2017.1421954"},{"key":"e_1_3_5_71_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj.5483"},{"key":"e_1_3_5_72_1","doi-asserted-by":"publisher","DOI":"10.7232\/iems.2022.21.2.192"},{"key":"e_1_3_5_73_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2013.11645666"},{"key":"e_1_3_5_74_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206314543475"},{"key":"e_1_3_5_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2022.102471"},{"key":"e_1_3_5_76_1","first-page":"219","volume-title":"Modeling Longitudinal and Multilevel Data: Practical Issues, Applied Approaches and Specific Examples","author":"Wothke W.","year":"2000","unstructured":"Wothke, W. 2000. \u201cLongitudinal and Multi-group Modeling with Missing Data.\u201d In Modeling Longitudinal and Multilevel Data: Practical Issues, Applied Approaches and Specific Examples, edited by T. D. Little, K. U. Schnabel, and J. Baumert, 219\u2013240. Mahwah, NJ: Lawrence Erlbaum Associates, Inc."},{"key":"e_1_3_5_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025171.3025219"},{"key":"e_1_3_5_78_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2014.0528"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2025.2518236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T10:54:27Z","timestamp":1770634467000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2025.2518236"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,7]]},"references-count":77,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,2,7]]}},"alternative-id":["10.1080\/0144929X.2025.2518236"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2025.2518236","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,7]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-03-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}