{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:04:03Z","timestamp":1729634643312,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/fgct.2013.6767213","type":"proceedings-article","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T15:25:36Z","timestamp":1395329136000},"page":"132-136","source":"Crossref","is-referenced-by-count":2,"title":["Evaluation of the di.me trust metric in CRM settings"],"prefix":"10.1109","author":[{"given":"Sophie","family":"Wrobel","sequence":"first","affiliation":[{"name":"CAS Software AG Karlsruhe, Germany"}]},{"given":"Marcel","family":"Heupel","sequence":"additional","affiliation":[{"name":"University of Siegen Siegen, Germany"}]},{"given":"Simon","family":"Thiel","sequence":"additional","affiliation":[{"name":"Fraunhofer IAO Stuttgart, Germany"}]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1518\/001872098779649355"},{"key":"18","article-title":"Page not found | usenix","author":"akhawe","year":"2013","journal-title":"Proceedings of the 22th USENIX Security"},{"key":"15","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"venkatesh","year":"2003","journal-title":"MIS Quarterly"},{"key":"16","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1524\/9783486841749.145","article-title":"Die akzeptanz zuku?nftiger ubiquitous computing anwendungen","author":"beier","year":"2006","journal-title":"Mensch und Computer 2006 Mensch und Computer im Strukturwandel"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39265-8_5"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ACHI.2010.38"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2012.6208766"},{"journal-title":"Privacy in the Digital Econ-omy","year":"2013","author":"santucci","key":"3"},{"journal-title":"Privacy by Design Take the Challenge Information and Privacy Commissioner of Ontario","year":"2009","author":"cavoukian","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ITHET.2010.5480038"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"journal-title":"Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-based Social Networks","year":"2004","author":"golbeck","key":"6"},{"key":"5","first-page":"238","author":"golbeck","year":"2003","journal-title":"7th International Workshop on Cooperative Information Agents (CIA-03"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-13451-7","author":"wierzbicki","year":"2010","journal-title":"Trust and Fairness in Open Distributed Systems"},{"journal-title":"Trust-Based Access Control in Federated Environments","year":"2009","author":"boursas","key":"9"},{"key":"8","article-title":"Analysing topologies of transitive trust","author":"j\ufffdsang","year":"2003","journal-title":"Proceedings of the First International Workshop on Formal Aspects in Security & Trust (FAST2003)"}],"event":{"name":"2013 Second International Conference on Future Generation Communication Technology (FGCT)","start":{"date-parts":[[2013,11,12]]},"location":"London, UK","end":{"date-parts":[[2013,11,14]]}},"container-title":["Second International Conference on Future Generation Communication Technologies (FGCT 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6766332\/6767177\/06767213.pdf?arnumber=6767213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T12:39:10Z","timestamp":1648643950000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6767213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/fgct.2013.6767213","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}