{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:35:47Z","timestamp":1761989747859,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/"}],"funder":[{"name":"NSF","award":["CNS2206859"],"award-info":[{"award-number":["CNS2206859"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,14]]},"DOI":"10.1145\/3639476.3639775","type":"proceedings-article","created":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T15:15:01Z","timestamp":1716563701000},"page":"57-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Decomposing and Measuring Trust in Open-Source Software Supply Chains"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7157-0426","authenticated-orcid":false,"given":"Lina","family":"Boughton","sequence":"first","affiliation":[{"name":"The College of Wooster, Wooster, Ohio, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5297-4523","authenticated-orcid":false,"given":"Courtney","family":"Miller","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7167-7383","authenticated-orcid":false,"given":"Yasemin","family":"Acar","sequence":"additional","affiliation":[{"name":"University of Paderborn, Paderborn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2921-1254","authenticated-orcid":false,"given":"Dominik","family":"Wermke","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4450-4572","authenticated-orcid":false,"given":"Christian","family":"K\u00e4stner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,5,24]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"2024. Supplementary Material for Decomposing and Measuring Trust in Open-Source Software Supply Chains. Zenodo. 10.5281\/zenodo.10372704","key":"e_1_3_2_1_1_1","DOI":"10.5281\/zenodo.10372704"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/HICSS.2011.36"},{"key":"e_1_3_2_1_3_1","volume-title":"Open Source Development, Adoption and Innovation: IFIP Working Group 2.13 on Open Source Software, June 11--14","author":"Antikainen Maria","year":"2007","unstructured":"Maria Antikainen, Timo Aaltonen, and Jaani V\u00e4is\u00e4nen. 2007. The role of trust in OSS communities---case Linux Kernel community. In Open Source Development, Adoption and Innovation: IFIP Working Group 2.13 on Open Source Software, June 11--14, 2007, Limerick, Ireland 3. Springer, 223--228."},{"unstructured":"Paul Cormier. 2022. The state of enterprise open source: A red hat report. https:\/\/www.redhat.com\/en\/resources\/state-of-enterprise-open-source-report-2022. Accessed: 2023-09-12.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","volume-title":"Measuring trust inside organisations. Personnel review 35, 5","author":"Dietz Graham","year":"2006","unstructured":"Graham Dietz and Deanne N Den Hartog. 2006. Measuring trust inside organisations. Personnel review 35, 5 (2006), 557--588."},{"volume-title":"Roads and bridges: The unseen labor behind our digital infrastructure","author":"Eghbal Nadia","unstructured":"Nadia Eghbal. 2016. Roads and bridges: The unseen labor behind our digital infrastructure. Ford Foundation.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/3503229.3547061"},{"volume-title":"Trust and trustworthiness","author":"Hardin Russell","unstructured":"Russell Hardin. 2002. Trust and trustworthiness. Russell Sage Foundation.","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1111\/nous.12000"},{"unstructured":"Trey Herr William Loomis Stewart Scott and June Lee. 2020. Breaking trust: Shades of crisis across an insecure software supply chain. https:\/\/www.atlanticcouncil.org\/in-depth-research-reports\/report\/breaking-trust-shades-of-crisis-across-an-insecure-software-supply-chain\/. Accessed: 2023-09-12.","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1177\/0018720814547570"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/3442188.3445923"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the fourth Nordic Workshop on Secure IT systems (Nordsec'99)","author":"Karvonen Kristiina","year":"1999","unstructured":"Kristiina Karvonen. 1999. Creating trust. In Proceedings of the fourth Nordic Workshop on Secure IT systems (Nordsec'99). 21--36."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/SP46215.2023.10179304"},{"key":"e_1_3_2_1_15_1","volume-title":"Trust in automation: Designing for appropriate reliance. Human factors 46, 1","author":"Lee John D","year":"2004","unstructured":"John D Lee and Katrina A See. 2004. Trust in automation: Designing for appropriate reliance. Human factors 46, 1 (2004), 50--80."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1002\/job.4030020205"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.2307\/258792"},{"unstructured":"Courtney Miller Christian K\u00e4stner and Bogdan Vasilescu. [n. d.]. \"We Feel Like We're Winging It:\" A Study on Navigating Open-Source Dependency Abandonment. ([n. d.]).","key":"e_1_3_2_1_18_1"},{"volume-title":"Trust in modern societies: The search for the bases of social order","author":"Misztal Barbara","unstructured":"Barbara Misztal. 2013. Trust in modern societies: The search for the bases of social order. John Wiley & Sons.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 8th Working Conference on Mining Software Repositories. 133--142","author":"Sinha Vibha Singhal","year":"2011","unstructured":"Vibha Singhal Sinha, Senthil Mani, and Saurabh Sinha. 2011. Entering the circle of trust: developer initiation as committers in open-source projects. In Proceedings of the 8th Working Conference on Mining Software Repositories. 133--142."},{"key":"e_1_3_2_1_21_1","volume-title":"OSS 2017, Buenos Aires, Argentina, May 22--23, 2017, Proceedings 13","author":"Syeed Mahbubul","year":"2017","unstructured":"Mahbubul Syeed, Juho Lindman, and Imed Hammouda. 2017. Measuring perceived trust in open source software communities. In Open Source Systems: Towards Robust Practices: 13th IFIP WG 2.13 International Conference, OSS 2017, Buenos Aires, Argentina, May 22--23, 2017, Proceedings 13. Springer, 49--54."},{"key":"e_1_3_2_1_22_1","first-page":"261","article-title":"Commitment in cases of trust and distrust. Thought","volume":"6","author":"Tallant Jonathan","year":"2017","unstructured":"Jonathan Tallant. 2017. Commitment in cases of trust and distrust. Thought: A Journal of Philosophy 6, 4 (2017), 261--267.","journal-title":"A Journal of Philosophy"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/2568225.2568315"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1111\/j.1468-0297.2012.02505.x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/SP46214.2022.9833686"},{"key":"e_1_3_2_1_26_1","volume-title":"Internet and Network Economics: 8th International Workshop, WINE 2012, Liverpool, UK, December 10--12, 2012. Proceedings 8. Springer, 114--127","author":"Zadimoghaddam Morteza","year":"2012","unstructured":"Morteza Zadimoghaddam and Aaron Roth. 2012. Efficiently learning from revealed preference. In Internet and Network Economics: 8th International Workshop, WINE 2012, Liverpool, UK, December 10--12, 2012. Proceedings 8. Springer, 114--127."}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"],"acronym":"ICSE-NIER'24","name":"ICSE-NIER'24: 2024 ACM\/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results","location":"Lisbon Portugal"},"container-title":["Proceedings of the 2024 ACM\/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639476.3639775","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3639476.3639775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:39Z","timestamp":1750287219000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639476.3639775"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":26,"alternative-id":["10.1145\/3639476.3639775","10.1145\/3639476"],"URL":"https:\/\/doi.org\/10.1145\/3639476.3639775","relation":{},"subject":[],"published":{"date-parts":[[2024,4,14]]},"assertion":[{"value":"2024-05-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}