{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:35Z","timestamp":1750307795562,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,4,6]],"date-time":"2008-04-06T00:00:00Z","timestamp":1207440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,4,6]]},"DOI":"10.1145\/1357054.1357084","type":"proceedings-article","created":{"date-parts":[[2008,4,8]],"date-time":"2008-04-08T16:27:59Z","timestamp":1207672079000},"page":"173-182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Measuring trust in wi-fi hotspots"],"prefix":"10.1145","author":[{"given":"Tim","family":"Kindberg","sequence":"first","affiliation":[{"name":"Hewlett-Packard Laboratories, Bristol, Bristol, United Kingdom"}]},{"given":"Eamonn","family":"O'Neill","sequence":"additional","affiliation":[{"name":"University of Bath, Bath, UK"}]},{"given":"Chris","family":"Bevan","sequence":"additional","affiliation":[{"name":"University of Bath, Bath, UK"}]},{"given":"Vassilis","family":"Kostakos","sequence":"additional","affiliation":[{"name":"University of Bath, Bath, UK"}]},{"given":"Dana\u00eb","family":"Stanton Fraser","sequence":"additional","affiliation":[{"name":"University of Bath, Bath, UK"}]},{"given":"Tim","family":"Jay","sequence":"additional","affiliation":[{"name":"University of Bath, Bath, UK"}]}],"member":"320","published-online":{"date-parts":[[2008,4,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"'Phishing'. Sourced from Wikipedia. http:\/\/en.wikipedia.org\/wiki\/phishing accessed 05\/03\/07.  'Phishing'. Sourced from Wikipedia. http:\/\/en.wikipedia.org\/wiki\/phishing accessed 05\/03\/07."},{"key":"e_1_3_2_1_2_1","volume-title":"S. Supporting Trust in Virtual Communities. Proc. of the 33rd Hawaii Conference on System Sciences","author":"Abdul-Rahman A.","year":"2000","unstructured":"Abdul-Rahman , A. , Hailes , S. Supporting Trust in Virtual Communities. Proc. of the 33rd Hawaii Conference on System Sciences , 2000 . Abdul-Rahman, A., Hailes, S. Supporting Trust in Virtual Communities. Proc. of the 33rd Hawaii Conference on System Sciences, 2000."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1038\/nn0302-192"},{"key":"e_1_3_2_1_4_1","volume-title":"The Evolution of Cooperation","author":"Axelrod R.","year":"1984","unstructured":"Axelrod , R. The Evolution of Cooperation . Harper Collins , 1984 . Axelrod, R. The Evolution of Cooperation. Harper Collins, 1984."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1006\/game.1995.1027"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0899-8256(03)00119-2"},{"key":"e_1_3_2_1_7_1","first-page":"49","volume-title":"Trust. Making and Breaking Cooperative Relations","author":"Dasgupta P.","year":"1988","unstructured":"Dasgupta , P. Trust as a Commodity . In: Gambetta, D. (Ed.), Trust. Making and Breaking Cooperative Relations . Basil Blackwell , Oxford , pp. 49 -- 71 , 1988 . Dasgupta, P. Trust as a Commodity. In: Gambetta, D. (Ed.), Trust. Making and Breaking Cooperative Relations. Basil Blackwell, Oxford, pp. 49--71, 1988."},{"key":"e_1_3_2_1_8_1","unstructured":"Deriaz M. What is Trust? Position Paper. Available at Http:\/\/scholar.google.com\/url?sa=U&q=http:\/\/cui.unige.ch\/ASG\/publications\/TR2006\/5whatisTrust.pdf.  Deriaz M. What is Trust? Position Paper. Available at Http:\/\/scholar.google.com\/url?sa=U&q=http:\/\/cui.unige.ch\/ASG\/publications\/TR2006\/5whatisTrust.pdf."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/000276427301700206"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143131"},{"key":"e_1_3_2_1_12_1","volume-title":"Some Experimental Games. Research Memorandum RM-789","author":"Flood M.M.","year":"1952","unstructured":"Flood , M.M. Some Experimental Games. Research Memorandum RM-789 . RAND Corporation , Santa Monica, CA , 1952 . Flood, M.M. Some Experimental Games. Research Memorandum RM-789. RAND Corporation, Santa Monica, CA, 1952."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/634067.634242"},{"key":"e_1_3_2_1_14_1","volume-title":"Trust: Making and Breaking Co-Operative Relations","author":"Gambetta D.","year":"1988","unstructured":"Gambetta , D. (ed). Trust: Making and Breaking Co-Operative Relations . Blackwell , 1988 . Gambetta, D.(ed). Trust: Making and Breaking Co-Operative Relations. Blackwell, 1988."},{"key":"e_1_3_2_1_15_1","volume-title":"The Constitution of Society","author":"Giddens A.","year":"1984","unstructured":"Giddens , A. The Constitution of Society . Cambridge Press , 1984 . Giddens, A. The Constitution of Society. Cambridge Press, 1984."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135853"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00181-X"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30119-6_12"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2004.03.001"},{"key":"e_1_3_2_1_20_1","volume-title":"Trust and Distrust Definitions: One Bite at a Time. Trust in Cyber-Societies: Integrating the Human and Artificial Perspectives","author":"McKnight D.H.","year":"2000","unstructured":"McKnight , D.H. , Chervany , N.L. Trust and Distrust Definitions: One Bite at a Time. Trust in Cyber-Societies: Integrating the Human and Artificial Perspectives . Springer Berlin , 2000 . McKnight, D.H., Chervany, N.L. Trust and Distrust Definitions: One Bite at a Time. Trust in Cyber-Societies: Integrating the Human and Artificial Perspectives. Springer Berlin, 2000."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926622"},{"key":"e_1_3_2_1_22_1","volume-title":"Failures and Figures. Edward Elgar","author":"Nooteboom B.","year":"2002","unstructured":"Nooteboom , B. Trust : Forms, Foundations, Functions , Failures and Figures. Edward Elgar , 2002 . Nooteboom, B. Trust: Forms, Foundations, Functions, Failures and Figures. Edward Elgar, 2002."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506575"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.01.001"},{"key":"e_1_3_2_1_25_1","volume-title":"Not so Difficult After All: A Cross-Discipline View of Trust","author":"Rousseau D.M.","year":"1998","unstructured":"Rousseau , D.M. , Sitkin , S.B. , Burt , R.S. , Camerer , C. Not so Difficult After All: A Cross-Discipline View of Trust . Academy of Management Review , 1998 . Rousseau, D.M., Sitkin, S.B., Burt, R.S., Camerer, C. Not so Difficult After All: A Cross-Discipline View of Trust. Academy of Management Review, 1998."},{"key":"e_1_3_2_1_26_1","author":"Rutter J.","year":"2001","unstructured":"Rutter , J. From the Sociology of Trust Towards a Sociology of E-Trust. Int. Journal of New Product Development and Innovation Management. Pp. 371--385 , 2001 . Rutter, J. From the Sociology of Trust Towards a Sociology of E-Trust. Int. Journal of New Product Development and Innovation Management. Pp. 371--385, 2001.","journal-title":"Journal of New Product Development and Innovation Management. Pp. 371--385"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506578"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1038\/nn816"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503402"}],"event":{"name":"CHI '08: CHI Conference on Human Factors in Computing Systems","sponsor":["ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Florence Italy","acronym":"CHI '08"},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1357054.1357084","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1357054.1357084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:24Z","timestamp":1750254984000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1357054.1357084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4,6]]},"references-count":30,"alternative-id":["10.1145\/1357054.1357084","10.1145\/1357054"],"URL":"https:\/\/doi.org\/10.1145\/1357054.1357084","relation":{},"subject":[],"published":{"date-parts":[[2008,4,6]]},"assertion":[{"value":"2008-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}