{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T07:51:30Z","timestamp":1773301890749,"version":"3.50.1"},"reference-count":60,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/hicss.2003.1174902","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T20:27:43Z","timestamp":1087936063000},"page":"10 pp.","source":"Crossref","is-referenced-by-count":90,"title":["Trust in electronic environments"],"prefix":"10.1109","author":[{"given":"K.","family":"Chopra","sequence":"first","affiliation":[]},{"given":"W.A.","family":"Wallace","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"40","article-title":"Solving the problem of trust","author":"heimer","year":"2001","journal-title":"Trust in Society"},{"key":"ref38","first-page":"56","article-title":"Building trust is an art","volume":"40","author":"maccoby","year":"1997","journal-title":"Research Technology Management"},{"key":"ref33","first-page":"417","article-title":"The Turing Effect: The nature of trust in expert system advice","author":"lerch","year":"1997","journal-title":"Expertise in Context Human and Machine"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1287\/isre.7.3.342"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/00048409412345881"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1086\/292745"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"438","DOI":"10.5465\/amr.1998.926620","article-title":"Trust and distrust: New relationships and realities","volume":"23","author":"lewicki","year":"1998","journal-title":"Academy of Management Review"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"422","DOI":"10.5465\/amr.1998.926619","article-title":"The grammars of trust: A model and general implications","volume":"23","author":"sheppard","year":"1998","journal-title":"Academy of Management Review"},{"key":"ref35","first-page":"94","article-title":"Familiarity, confidence, trust:Problems and alternatives","author":"luhmann","year":"1988","journal-title":"Trust Making and Breaking Cooperative Relations"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/088395199117441"},{"key":"ref60","article-title":"Google Search Technology","volume":"2002","year":"2002"},{"key":"ref28","author":"fukuyama","year":"1995","journal-title":"Trust The Social Virtues and the Creation of Prosperity"},{"key":"ref27","first-page":"386","article-title":"Trust and Governance","author":"braithwaite","year":"1998","journal-title":"Russell Sage Foundation Series on Trust"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/301353.301402"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(00)00021-9"},{"key":"ref1","article-title":"Trust in Cyberspace","author":"schneider","year":"1999"},{"key":"ref20","first-page":"213","article-title":"Can we trust trust?","author":"gambetta","year":"1988","journal-title":"Trust Making and Breaking Cooperative Relations"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.9.2.141"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2307\/256727"},{"key":"ref24","first-page":"229","article-title":"Trusting","volume":"2","author":"solomon","year":"2000","journal-title":"Heidegger Coping and Cognitive Science Essays in Honor of Hubert L Dreyfus"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1515\/9781400822379","author":"seligman","year":"1997","journal-title":"The Problem of Trust"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355125"},{"key":"ref25","author":"luhmann","year":"1979","journal-title":"Trust and Power"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1177\/016555159502100204"},{"key":"ref51","first-page":"7","article-title":"Managing information quality","author":"marchand","year":"1990","journal-title":"Information Quality Definitions and Dimensions"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1177\/016555159802400306"},{"key":"ref58","first-page":"9","article-title":"Reliance and reliability: The problem of information on the Internet","volume":"20","author":"wachbroit","year":"2000","journal-title":"Report from the Institute for Philosophy & Public Policy"},{"key":"ref57","first-page":"52","article-title":"Evaluation criteria and indicators of quality for Internet resources","volume":"37","author":"wilkinson","year":"1997","journal-title":"Educational Technology"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/253769.253804"},{"key":"ref55","article-title":"Testing the surf: Criteria for evaluating Internet information resources","volume":"8","author":"smith","year":"1997","journal-title":"The Public-Access Computer Systems Review"},{"key":"ref54","article-title":"Understanding judgment of information quality and cognitive authority in the WWW","author":"rieh","year":"1998","journal-title":"presented at Proceedings of the 61st ASIS annual meeting"},{"key":"ref53","first-page":"91","article-title":"Information quality factors and the cognitive authority of electronic information","author":"olaisen","year":"1990","journal-title":"Information Quality Definitions and Dimensions"},{"key":"ref52","first-page":"104","article-title":"Uses and perceptions of the World Wide Web in an information-seeking environment","volume":"32","author":"dalgleish","year":"2000","journal-title":"Journal of Librarianship and Information Science"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.49.1.95"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1177\/014920639101700307"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.2307\/1251829"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","article-title":"An integrative model of organizational trust","volume":"20","author":"mayer","year":"1995","journal-title":"Academy of Management Review"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0956-5221(97)84644-1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250130702"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1037\/h0031464"},{"key":"ref16","author":"giddens","year":"1990","journal-title":"The Consequences of Modernity"},{"key":"ref17","first-page":"3","article-title":"Conceptions and explanations of trust","author":"hardin","year":"2001","journal-title":"Trust in Society"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1998.926617"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.8.4.310"},{"key":"ref4","author":"alexander","year":"1999","journal-title":"Web Wisdom How to Evaluate and Create Information Quality on the Web"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1998.655251"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/00140139408964957"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/355112.355120","article-title":"Trust online","volume":"43","author":"batya","year":"2000","journal-title":"Communications of the ACM"},{"key":"ref8","author":"barber","year":"1983","journal-title":"The Logic and Limits of Trust"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1977.40.1.75"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1996.0073"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/63.4.967"},{"key":"ref46","first-page":"201","article-title":"Reasoning about computers as moral agents: A research note","author":"friedman","year":"1997","journal-title":"Human Values and the Design of Computer Technology CSLI Lecture Notes"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.35.1.1"},{"key":"ref48","first-page":"137","article-title":"Computers are social actors: A review of current research","author":"nass","year":"1997","journal-title":"Human Values and the Design of Computer Technology CSLI Lecture Notes"},{"key":"ref47","first-page":"191","article-title":"&#x2018;Social&#x2019; human-computer interaction","author":"kiesler","year":"1997","journal-title":"Human Values and the Design of Computer Technology CSLI Lecture Notes"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.5840\/bpej1997161\/2\/311"},{"key":"ref41","first-page":"20","article-title":"Organization: Trust in virtual teams","volume":"76","author":"coutu","year":"1998","journal-title":"Harvard Business Review"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355120"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355123"}],"event":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","location":"Big Island, HI, USA","start":{"date-parts":[[2003,1,9]]},"end":{"date-parts":[[2003,1,9]]}},"container-title":["36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8360\/26341\/01174902.pdf?arnumber=1174902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T16:59:43Z","timestamp":1624467583000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1174902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/hicss.2003.1174902","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}