{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:17:56Z","timestamp":1725520676158},"publisher-location":"Boston, MA","reference-count":43,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387785776"},{"type":"electronic","value":"9780387785783"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-0-387-78578-3_14","type":"book-chapter","created":{"date-parts":[[2008,11,7]],"date-time":"2008-11-07T11:52:59Z","timestamp":1226058779000},"page":"767-779","source":"Crossref","is-referenced-by-count":4,"title":["Trust Ontology for Information Systems Development"],"prefix":"10.1007","author":[{"given":"Kamaljit Kaur","family":"Bimrah","sequence":"first","affiliation":[]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[]},{"given":"David","family":"Preston","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,9,12]]},"reference":[{"key":"14_CR1_14","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S (2000) Supporting Trust in Virtual Communities. In Proceedings of the Hawaii International Conference on System Sciences 33. Maui, Hawaii.","DOI":"10.1109\/HICSS.2000.926814"},{"key":"14_CR2_14","doi-asserted-by":"crossref","unstructured":"Alberts, C., Dorofee, A., Stevens, J., Woody, C. (2003) Introduction to the OCTAVE Approach. . Software Engineering Institute. Carnegie Mellon University, Pittsburgh, PA.","DOI":"10.21236\/ADA634134"},{"key":"14_CR3_14","unstructured":"Alford, J. (2004) Building Trust in Partnerships Between Community Orgnization and Government. Changing the Way Government Works Seminar. Melbourne."},{"key":"14_CR4_14","unstructured":"Almenarez, F., Marin, A., Campo, C., Garcia, C. (2004 ) PTM: A Pervasive Trust Management Model for Dynamic Open Environments. First Workshop on Pervasive Security, Privacy and Trust, PSPT\u201904 in conjunction with Mobiquitous. Boston."},{"key":"14_CR5_14","unstructured":"Cams and the Department of Commerce and Trade (2003) A Security Management Framework for Online Services."},{"key":"14_CR6_14","doi-asserted-by":"crossref","unstructured":"Carbone, M., Nielsen, M., Sassone, V. (2003) A Formal Model for Trust in Dynamic Networks. BRICS Report RS-03\u20134.","DOI":"10.1109\/SEFM.2003.1236207"},{"key":"14_CR7_14","doi-asserted-by":"crossref","unstructured":"Casare , S., Sichman, J. (2005) Towards a Functional Ontology of Reputation, Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems. The Netherlands.","DOI":"10.1145\/1082473.1082550"},{"key":"14_CR8_14","doi-asserted-by":"crossref","unstructured":"Chang, E., Hussain, F.K., Dillon, T. (2005) Reputation Ontology for Reputation Systems. International Workshop on Web Semantics (SWWS), pp. 957\u2013966.","DOI":"10.1007\/11575863_117"},{"key":"14_CR9_14","doi-asserted-by":"crossref","unstructured":"Chopra, K., Wallace, W.A. (2003) Trust in Electronic Environments. Proceedings of the 36th Hawaii Conference on System Sciences (HICSS\u201903). Hawaii.","DOI":"10.1109\/HICSS.2003.1174902"},{"key":"14_CR10_14","doi-asserted-by":"crossref","unstructured":"Cuske, C., Korthaus, A., Seedorf, S., Tomczyk, P. (2005) Towards Formal Ontologies for Technology Risk Measurement in the Banking Industry. Proceedings of the 1st Workshop Formal Ontologies Meet Industry. Verona, Italy.","DOI":"10.2139\/ssrn.744404"},{"key":"14_CR11_14","unstructured":"Fernandez-Lopez, M., Gomez-Perez, A. (2002) Deliverable 1.4: A Survey on Methodologies for Developing, Maintaining, Integrating, Evaluating and Reengineering Ontologies."},{"key":"14_CR12_14","volume-title":"Engineering Knowledge in the Age of the SemanticWeb: 14th International Conference, EKAW 2004, Proceedings Whittlebury Hall, UK","author":"J. Golbeck","year":"2004","unstructured":"Golbeck, J., Hendler, J. (2004) Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks. Engineering Knowledge in the Age of the SemanticWeb: 14th International Conference, EKAW 2004, Proceedings Whittlebury Hall, UK. Springer, Berlin\/Heidelberg."},{"key":"14_CR13_14","volume-title":"Ontological Engineering","author":"A. Gomez-Perez","year":"2004","unstructured":"Gomez-Perez, A., Fernandez-Lopez, Corcho, O. (2004) Ontological Engineering, Springer-Verlag, London."},{"key":"14_CR14_14","unstructured":"Jomes, D., Bench-Capon, T., Visser, P. (1998) Methodologies for Ontology Development. In Proceedings of IT&KNOWS \u2014 Information Technology and Knowledge Systems \u2014 Conference of the 15th IFIP World Computer Congress. Vienna\/Austria\/Budapest, Bulgaria."},{"key":"14_CR15_14","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1023\/B:ELEC.0000009279.89570.27","volume":"4","author":"A. J\u00f8sang","year":"2004","unstructured":"J\u00f8sang, A., Patton, M.A. (2004) Technologies for Trust in Electronic Commerce. Electronic Commerce Research Journal, 4, 9\u201321.","journal-title":"Electronic Commerce Research Journal"},{"key":"14_CR16_14","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Kesar, C., Dimitrakos, T. (2005) Can We Manage Trust? 3rd International Conference on Trust Management (iTrust). Paris.","DOI":"10.1007\/11429760_7"},{"issue":"2","key":"14_CR17_14","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., and Boyd, C. (2007) A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, 43(2), 618\u2013644.","journal-title":"Decision Support Systems"},{"key":"14_CR18_14","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Lo Presti, S. (2004) Analysing the Relationship Between Risk and Trust. IN DIMITRAKOS, T. (Ed.) Proceedings of the Second International Conference on Trust Management. Oxford.","DOI":"10.1007\/978-3-540-24747-0_11"},{"key":"14_CR19_14","unstructured":"Kethers , S.E.A. (2005) Modelling Trust Relationships in a Healthcare Network: Experiences with the TCD Framework. In Proceedings of the Thirteenth European Conference on Information Systems. Regensburg, Germany."},{"key":"14_CR20_14","volume-title":"Lecture Notes in Computer Science","author":"A. Kim","year":"2005","unstructured":"Kim, A., Luo, J., Kang, M. (2005) Security Ontology for Annotating Resources. In Meersman, R.T.Z. (Ed.) Lecture Notes in Computer Science. Agai Napa, Cyprus, Springer-Verlag Berlin\/Heidelberg."},{"key":"14_CR21_14","unstructured":"Lau, T.S., Sure, Y. (2002) Introducing Ontology-based Skills Management at a Large Insurance Company. pp. 123\u2013134."},{"key":"14_CR22_14","unstructured":"Li, X., Valachich, J.S., Hess, T.J. (2004) Predicting User Trust in Information Systems: A Comparison of Competing Trust Models. The Proceedings of the 37th Hawaii International Conference on Systems Sciences. Hawaii."},{"key":"14_CR23_14","unstructured":"Lo Presti, S., Cusack, M., Booth, C. (2003) Deliverable WP2-01 \u2014 Trust Issues in Pervasive Environments. QinetiQ & the University of Southampton."},{"key":"14_CR24_14","unstructured":"Maarof, M.A., Krishna, K. (2002) A Hybrid Trust Management Model For MAS Based. Information Security Group, Faculty of Computer Science and Information System University of Technology Malaysia. 81310 Skudai, Johor."},{"key":"14_CR25_14","unstructured":"Martimiano, A.F.M., Moreira, E.S. (2005) An OWL-based Security Incident Ontology. In:Proceedings of the Eighth International Protege Conference. pp. 43\u201344 Poster."},{"key":"14_CR26_14","unstructured":"Mayer, N., Rifaut, A., Dubois, E. (2005) Towards a Risk-Based Security Requirements Engineering Framework. 11th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ\u201905), in conjunction with CAiSE\u201905. Porto, Portugal."},{"key":"14_CR27_14","unstructured":"Mayer, N., Heymans, P., Matulevicius, R. (2007) Design of a Modelling Language for Information System Security Risk Managemen. 1st International Conference on Research Challenges in Information Science (RCIS 2007). Ouarzazate, Morocco."},{"key":"14_CR28_14","first-page":"4","volume":"5","author":"J. B. Michael","year":"2002","unstructured":"Michael, J. B., Hestad, D.R., Pedersen, C.M., Gaines L.T. (2002) Incorporating the Human Element of Trust into Information Systems. IAnewsletter, 5, 4\u20138.","journal-title":"IAnewsletter"},{"key":"14_CR29_14","unstructured":"Mouratidis, H., Giorgini, P., Manson, G., Philip, I. (2002) Using Tropos Methodology to Model an Integrated Health Assessment System. Proceedings of the 4th International Bi-Conference Workshop on Agent-Oriented Information Systems (AOIS-2002). Toronto-Ontario."},{"key":"14_CR30_14","doi-asserted-by":"crossref","unstructured":"Mouratidis, H., Giorgini, P., Manson, G. (2003) An Ontology for Modelling Security: The Tropos Approach. In Palade, V., Howlett, R. (Ed.) Proceedings of the 7th International Conference on Knowledge-Based Intelligent Information and Engineering Systems. Oxford, England.","DOI":"10.1007\/978-3-540-45224-9_187"},{"key":"14_CR32_14","doi-asserted-by":"crossref","unstructured":"Mouratidis, H., Giorgini, P (2006) Integrating Security and Software Engineering: Advances and Future Vision. Idea Group.","DOI":"10.4018\/978-1-59904-147-6"},{"key":"14_CR33_14","unstructured":"Noy, N.F., McGuinness, D.L. (2001) Ontology Development 101: A Guide to Creating Your First Ontology. Technical Report KSL-01\u201305. Stanford Knowledge Systems Laboratory."},{"key":"14_CR34_14","unstructured":"Numan, J. (1998) Knowledge-Based Systems as Companions: Trust, Human Computer Interaction and Complex Systems. University of Groningen."},{"key":"14_CR35_14","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/s10115-003-0138-1","volume":"6","author":"H.S. Pinto","year":"2004","unstructured":"Pinto, H.S., Martins, J.P. (2004) Ontologies: How Can They Be Built? Knowledge and Information Systems, 6, 441\u2013464.","journal-title":"Knowledge and Information Systems"},{"key":"14_CR36_14","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/S0167-4048(01)00605-8","volume":"20","author":"S. Purser","year":"2001","unstructured":"Purser, S. (2001) A Simple Graphical Tool for Modelling Trust. Computers and Security, 20, 479\u2013484.","journal-title":"Computers and Security"},{"key":"14_CR37_14","doi-asserted-by":"publisher","first-page":"574","DOI":"10.2307\/2393868","volume":"41","author":"S.L. Robinson","year":"1996","unstructured":"Robinson, S.L. (1996) Trust and Breach of the Psychological Contract. Administrative Science Quarterly, 41, 574\u2013579.","journal-title":"Administrative Science Quarterly"},{"key":"14_CR38_14","doi-asserted-by":"crossref","unstructured":"Simmonds, A., Sandilands, P., Ekert, L.V. (2004) An Ontology for Network Security Attacks. In Manandharm, S., A., J., Desai, U., Oyangi, Y., Talukder, A. (Ed.) Lecture Notes in Computer Science. Kathmandu, Nepal, Springer Berlin\/Heidelberg","DOI":"10.1007\/978-3-540-30176-9_41"},{"key":"14_CR39_14","unstructured":"Stolen, K. (2002) Model-Based Risk Assessment - the CORAS Approach, In Proceedings of the First iTrust Workshop."},{"key":"14_CR40_14","doi-asserted-by":"crossref","unstructured":"Sutcliffe, A. (2006) Trust: From Cognition to Conceptual Models and Design. In Dubois, E., Pohl, K (Ed.) 18th International Conference, CAiSE 2006, June 5, 2006 Proceedings. Luxembourg, Luxembourg, Springer-Verlag, Berlin\/Heidelberg.","DOI":"10.1007\/11767138_1"},{"key":"14_CR41_14","doi-asserted-by":"publisher","first-page":"69.","DOI":"10.1017\/S0269888900007797","volume":"11","author":"M. Uschold","year":"1996","unstructured":"Uschold, M., Gruninger, M (1996) Ontologies: Principles, Methods and Applications. Knowledge Engineering Review, 11, 69.","journal-title":"Knowledge Engineering Review"},{"key":"14_CR42_14","doi-asserted-by":"crossref","unstructured":"Viljanen, L. (2005) Towards an Ontology of Trust. Lecture Notes in Computer Science. Copenhagen, Denmark. Springer, Berlin\/Heidelberg.","DOI":"10.1007\/11537878_18"},{"key":"14_CR43_14","doi-asserted-by":"crossref","unstructured":"Yu, E., Liu, L (2001) Modelling Trust for System Design Using the i* Strategic Actors Framework. In Verlag, S. (Ed.) Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives.","DOI":"10.1007\/3-540-45547-7_11"},{"key":"14_CR44_14","unstructured":"Yu, E., Cysneiros, LM (2002) Designing for Privacy and Other Computing Requirements. 2nd Symposium on Requirements Engineering for Information Security. Raleigh, North Carolina."}],"container-title":["Information Systems Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-78578-3_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,20]],"date-time":"2023-05-20T18:52:06Z","timestamp":1684608726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-78578-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,12]]},"ISBN":["9780387785776","9780387785783"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-78578-3_14","relation":{},"subject":[],"published":{"date-parts":[[2008,9,12]]}}}