{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:17Z","timestamp":1750307597994,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,10,27]],"date-time":"2009-10-27T00:00:00Z","timestamp":1256601600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,10,27]]},"DOI":"10.1145\/1643823.1643894","type":"proceedings-article","created":{"date-parts":[[2009,11,10]],"date-time":"2009-11-10T18:36:45Z","timestamp":1257878205000},"page":"383-390","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The crucial role of user's perceived trust in the orchestration and adoption of IT-ecosystems"],"prefix":"10.1145","author":[{"given":"Klaus-Peter","family":"Wiedmann","sequence":"first","affiliation":[{"name":"Leibniz University of Hanover, Hanover, Germany"}]},{"given":"Marc-Oliver","family":"Reeh","sequence":"additional","affiliation":[{"name":"Leibniz University of Hanover, Hanover, Germany"}]},{"given":"Dieter","family":"Varelmann","sequence":"additional","affiliation":[{"name":"Leibniz University of Hanover, Hanover, Germany"}]},{"given":"Nadine","family":"Hennigs","sequence":"additional","affiliation":[{"name":"Leibniz University of Hanover, Hanover, Germany"}]}],"member":"320","published-online":{"date-parts":[[2009,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Kuhl, J.\/Beckmann, J. (Eds.), Action control: From cognition to behavior","author":"Ajzen I.","year":"1985","unstructured":"Ajzen , I. From intentions to actions: A theory of planned behaviour . In Kuhl, J.\/Beckmann, J. (Eds.), Action control: From cognition to behavior , Springer , Berlin , 1985 , 11--39. Ajzen, I. From intentions to actions: A theory of planned behaviour. In Kuhl, J.\/Beckmann, J. (Eds.), Action control: From cognition to behavior, Springer, Berlin, 1985, 11--39."},{"key":"e_1_3_2_1_2_1","volume-title":"Englewood Cliffs","author":"Ajzen I.","year":"1980","unstructured":"Ajzen , I. and Fishbein , M . Understanding attitudes and predicting social behavior . Englewood Cliffs , New York , 1980 . Ajzen, I. and Fishbein, M. Understanding attitudes and predicting social behavior. Englewood Cliffs, New York, 1980."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1086\/209080"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.4337\/9781847202819","volume-title":"Handbook of trust research","author":"Bachmann R.","year":"2006","unstructured":"Bachmann , R. Handbook of trust research . Cheltenham : Elgar , 2006 . Bachmann, R. Handbook of trust research. Cheltenham: Elgar, 2006."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1086\/292745"},{"key":"e_1_3_2_1_8_1","volume-title":"The Logic and limits of trust","author":"Barber B.","year":"1983","unstructured":"Barber , B. The Logic and limits of trust . New Brunswick, NJ : Rutgers Univ. Press , 1983 . Barber, B. The Logic and limits of trust. New Brunswick, NJ: Rutgers Univ. Press, 1983."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250150912"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.14.1.32.12815"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00018-5"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"Expert systems and the man-machine interface. Part Two: The user interface","volume":"4","author":"Berry D. C.","year":"2007","unstructured":"Berry , D. C. and Broadbent , D. E . Expert systems and the man-machine interface. Part Two: The user interface . Expert Systems , 4 , 1 , 2007 , 18--27. Berry, D. C. and Broadbent, D. E. Expert systems and the man-machine interface. Part Two: The user interface. Expert Systems, 4, 1, 2007, 18--27.","journal-title":"Expert Systems"},{"key":"e_1_3_2_1_13_1","volume-title":"Aarts: Springer (Ambient Intelligence)","author":"Bohn J.","year":"2005","unstructured":"Bohn , J. , Coroama , V. , Langheinrich , M. , Mattern , F. and Rohs , M . Social, economic and ethical implications of ambient intelligence and ubiquitous. W. Weber, J. Rabaey und E. (Eds) . Aarts: Springer (Ambient Intelligence) , 2005 , 5--29. Bohn, J., Coroama, V., Langheinrich, M., Mattern, F. and Rohs, M. Social, economic and ethical implications of ambient intelligence and ubiquitous. W. Weber, J. Rabaey und E. (Eds). Aarts: Springer (Ambient Intelligence), 2005, 5--29."},{"key":"e_1_3_2_1_14_1","volume-title":"The dynamics of interpersonal trust: Resolving uncertainty in the face of risk. R. A. Hinde&amp","author":"Boon S. D.","year":"1991","unstructured":"Boon , S. D. and Holmes , J. G . The dynamics of interpersonal trust: Resolving uncertainty in the face of risk. R. A. Hinde&amp ;J. Groebel (Eds.). Cambridge : University Press (Cooperation and prosocial behavior :), 1991 , 190--211. Boon, S. D. and Holmes, J. G. The dynamics of interpersonal trust: Resolving uncertainty in the face of risk. R. A. Hinde&amp;J. Groebel (Eds.). Cambridge: University Press (Cooperation and prosocial behavior:), 1991, 190--211."},{"key":"e_1_3_2_1_15_1","volume-title":"Government Performance and Trust in Government. Paper for the Permanent Study Group of Productivity and Quality in the Public Sector","author":"Bouckaert G.","year":"2001","unstructured":"Bouckaert , G. and Van de Walle , S. ( 2001 ): Government Performance and Trust in Government. Paper for the Permanent Study Group of Productivity and Quality in the Public Sector ; EGPA Annual Conference , Vaasa, Finland , 5--8 (Sep. 2001). Bouckaert, G. and Van de Walle, S. (2001): Government Performance and Trust in Government. Paper for the Permanent Study Group of Productivity and Quality in the Public Sector; EGPA Annual Conference, Vaasa, Finland, 5--8 (Sep. 2001)."},{"key":"e_1_3_2_1_16_1","volume-title":"A Strategic Decision-Making Approach","author":"Boyd H. W.","year":"2002","unstructured":"Boyd , H. W. , Walker , O. C. , Mullins , J. and Larr\u00e9ch\u00e9 , J. C . Marketing Management , A Strategic Decision-Making Approach , McGraw-Hill\/Irwin , Columbus , 2002 . Boyd, H. W., Walker, O. C., Mullins, J. and Larr\u00e9ch\u00e9, J. C. Marketing Management, A Strategic Decision-Making Approach, McGraw-Hill\/Irwin, Columbus, 2002."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-0005-3"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1086\/209031"},{"key":"e_1_3_2_1_19_1","first-page":"427","article-title":"The economics of cyber trust between cyber partners. Trust and Crime in Information Societies. Herausgegeben von R. and Collins B","volume":"380","author":"Cave J","year":"2005","unstructured":"Cave , J . The economics of cyber trust between cyber partners. Trust and Crime in Information Societies. Herausgegeben von R. and Collins B . S. Mansell. Cheltenham: Edward Elgar , 2005 , 380 -- 427 . Cave, J. The economics of cyber trust between cyber partners. Trust and Crime in Information Societies. Herausgegeben von R. and Collins B. S. Mansell. Cheltenham: Edward Elgar, 2005, 380--427.","journal-title":"S. Mansell. Cheltenham: Edward Elgar"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1076583"},{"key":"e_1_3_2_1_21_1","volume-title":"Increasing E-Trust: A Solution to Minimize Risk in E Government Adoption. JAQM - Journal Of Applied Quantitative Methods, 4, 1","author":"Colesca S. E.","year":"2009","unstructured":"Colesca , S. E. Increasing E-Trust: A Solution to Minimize Risk in E Government Adoption. JAQM - Journal Of Applied Quantitative Methods, 4, 1 , 2009 , 31--44. Colesca, S. E. Increasing E-Trust: A Solution to Minimize Risk in E Government Adoption. JAQM - Journal Of Applied Quantitative Methods, 4, 1, 2009, 31--44."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.04.001"},{"key":"e_1_3_2_1_23_1","first-page":"1","article-title":"-S","volume":"19","author":"Das T. K.","year":"2004","unstructured":"Das , T. K. and Teng , B . -S . The Risk-Based View of Trust: A Conceptual Framework. Journal of Business and Psychology , 19 , 1 , 2004 , 85--116. Das, T. K. and Teng, B.-S. The Risk-Based View of Trust: A Conceptual Framework. Journal of Business and Psychology, 19, 1, 2004, 85--116.","journal-title":"Journal of Business and Psychology"},{"key":"e_1_3_2_1_24_1","volume-title":"Perceived Ease of Use, and User Acceptance of Information Technology.MIS Quarterly, 13, 3","author":"Davis F. D.","year":"1989","unstructured":"Davis , F. D. Perceived Usefulness , Perceived Ease of Use, and User Acceptance of Information Technology.MIS Quarterly, 13, 3 , 1989 , 319--340. Available from: http:\/\/www.jstor.org\/stable\/249008. Davis, F. D. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology.MIS Quarterly, 13, 3, 1989, 319--340. Available from: http:\/\/www.jstor.org\/stable\/249008."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1006\/imms.1993.1022"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","DOI":"10.12987\/9780300159356","volume-title":"The resolution of conflict. constructive and destructive processes. 2. print. New Haven Conn. u.a.: Yale Univ","author":"Deutsch M.","year":"1977","unstructured":"Deutsch , M. The resolution of conflict. constructive and destructive processes. 2. print. New Haven Conn. u.a.: Yale Univ . Press , 1977 . Deutsch, M. The resolution of conflict. constructive and destructive processes. 2. print. New Haven Conn. u.a.: Yale Univ. Press, 1977."},{"key":"e_1_3_2_1_27_1","first-page":"1","article-title":"Trust and organizational information flow","volume":"9","author":"Droege S. B.","year":"2003","unstructured":"Droege , S. B. , Anderson , J. R. and Bowler , M . Trust and organizational information flow . Journal of Business and Management , 9 , 1 , 2003 , 45--59. Droege, S. B., Anderson, J. R. and Bowler, M. Trust and organizational information flow. Journal of Business and Management, 9, 1, 2003, 45--59.","journal-title":"Journal of Business and Management"},{"key":"e_1_3_2_1_28_1","volume-title":"youth and crisis","author":"Erikson E.","year":"1994","unstructured":"Erikson , E. Homburger Identity , youth and crisis . New York : Norton , 1994 . Erikson, E. Homburger Identity, youth and crisis. New York: Norton, 1994."},{"key":"e_1_3_2_1_29_1","volume-title":"The social virtues and the creation of prosperity. 1","author":"Fukuyama F.","year":"1996","unstructured":"Fukuyama , F. Trust . The social virtues and the creation of prosperity. 1 . Free Press paperback ed. New York : Free Press , 1996 . Fukuyama, F. Trust. The social virtues and the creation of prosperity. 1. Free Press paperback ed. New York: Free Press, 1996."},{"key":"e_1_3_2_1_30_1","volume-title":"Trust: Making and breaking cooperative relations. Can we trust trust?","author":"Gambetta D.","year":"1988","unstructured":"Gambetta , D. Trust: Making and breaking cooperative relations. Can we trust trust? New York : Basil Blackwell , 1988 . Gambetta, D. Trust: Making and breaking cooperative relations. Can we trust trust? New York: Basil Blackwell, 1988."},{"key":"e_1_3_2_1_31_1","first-page":"381","article-title":"A Conception of and Experiments with \"Trust\" as a Condition of Concerted Stable Actions","volume":"370","author":"Garfinkel H","year":"2001","unstructured":"Garfinkel , H . A Conception of and Experiments with \"Trust\" as a Condition of Concerted Stable Actions . The Production of Reality , 2001 , 370 -- 381 . Garfinkel, H. A Conception of and Experiments with \"Trust\" as a Condition of Concerted Stable Actions. The Production of Reality, 2001, 370--381.","journal-title":"The Production of Reality"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017181.2017185"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00043-0"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2307\/249487"},{"key":"e_1_3_2_1_36_1","volume-title":"Economics of Trust in the Information Economy: Issues of Identity, Privacy and Security (OECD Information Security and Privacy Working Paper No. JT00142557","author":"Guerra G. A.","year":"2003","unstructured":"Guerra , G. A. , Zizzo , D. J. , Dutton , W. H. and Peltu , M . Economics of Trust in the Information Economy: Issues of Identity, Privacy and Security (OECD Information Security and Privacy Working Paper No. JT00142557 ; OII Research Report No . 1.), 2003 . Guerra, G. A., Zizzo, D. J., Dutton, W. H. and Peltu, M. Economics of Trust in the Information Economy: Issues of Identity, Privacy and Security (OECD Information Security and Privacy Working Paper No. JT00142557; OII Research Report No. 1.), 2003."},{"key":"e_1_3_2_1_37_1","first-page":"7","article-title":"Can the building of trust overcome consumer perceived risk online?, Marketing Intelligence&amp;","volume":"24","author":"Harridge-March S","year":"2006","unstructured":"Harridge-March , S . Can the building of trust overcome consumer perceived risk online?, Marketing Intelligence&amp; Planning , 24 , 7 , 2006 , 746--761. Harridge-March, S. Can the building of trust overcome consumer perceived risk online?, Marketing Intelligence&amp;Planning, 24, 7, 2006, 746--761.","journal-title":"Planning"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/175247.175249"}],"event":{"name":"MEDES '09: The International Conference on Management of Emergent Digital EcoSystems 2009","sponsor":["The French Chapter of ACM Special Interest Group on Applied Computing","SIGAPP ACM Special Interest Group on Applied Computing"],"location":"France","acronym":"MEDES '09"},"container-title":["Proceedings of the International Conference on Management of Emergent Digital EcoSystems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1643823.1643894","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1643823.1643894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:26Z","timestamp":1750250726000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1643823.1643894"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,27]]},"references-count":38,"alternative-id":["10.1145\/1643823.1643894","10.1145\/1643823"],"URL":"https:\/\/doi.org\/10.1145\/1643823.1643894","relation":{},"subject":[],"published":{"date-parts":[[2009,10,27]]},"assertion":[{"value":"2009-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}