{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:48:28Z","timestamp":1729626508684,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/repa.2012.6359968","type":"proceedings-article","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T21:14:14Z","timestamp":1354310054000},"page":"7-11","source":"Crossref","is-referenced-by-count":9,"title":["Towards trust-based software requirement patterns"],"prefix":"10.1109","author":[{"given":"Axel","family":"Hoffmann","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Sollner","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Hoffmann","sequence":"additional","affiliation":[]},{"given":"Jan Marco","family":"Leimeister","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"175","article-title":"A Pattern-based Method for building Requirements Documents in Call-for-tender Processes","volume":"6","author":"renault","year":"2009","journal-title":"International Journal of Computer Science and Applications"},{"key":"17","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/978-3-642-30823-9_17","article-title":"Designing Socio-technical Applications for Ubiquitous Computing - Results from a Multidisciplinary Case Study","author":"comes","year":"2012","journal-title":"Proc Distributed Applications and Interoperable Systems (DAIS 2012)"},{"journal-title":"Software Requirement Patterns","year":"2008","author":"withall","key":"18"},{"key":"15","first-page":"791","article-title":"Investigating trust in e-commerce: A literature review and a model for its formation in customer relationships","author":"papadopoulou","year":"2001","journal-title":"Proc AMCIS 2001 Proceedings"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00022-7"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1501434.1501448"},{"key":"14","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1111\/j.1468-2370.2011.00311.x","article-title":"A Holistic Framework for Trust in Online Transactions","volume":"14","author":"li","year":"2012","journal-title":"International Journal of Management Reviews"},{"key":"11","article-title":"Understanding the Sources and Impacts of Trust in ECommerce: A Meta-Analysis","author":"he","year":"0","journal-title":"Proc AMCIS 2011 Proceedings 2011"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-005-0022-5"},{"key":"21","article-title":"RePa Requirements Pattern Template","author":"chung","year":"2012","journal-title":"Second International Workshop on Requirement Pattern (RePa' 12) Chicago USA"},{"key":"20","article-title":"Writing Good Requirements (A Requirements Working Group Information Report)","volume":"2","author":"hooks","year":"1993","journal-title":"Proc Third International Symposium of the NCOSE"},{"key":"22","first-page":"427","author":"sheridan","year":"1988","journal-title":"Trustworthiness of Command and Control Systems"},{"key":"23","article-title":"Measuring human-computer trust","author":"madsen","year":"0","journal-title":"Proc 11th Australasian Conference on Information Systems 2000"},{"journal-title":"Trust in Automated Systems","year":"2003","author":"adams","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1518\/155723405783703082"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2223696"},{"key":"2","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","article-title":"Trust and TAM in Online Shopping: An Integrated Model","volume":"27","author":"gefen","year":"2003","journal-title":"MIS Quarterly"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1177\/0018720811417254"},{"journal-title":"Trust and Power","year":"1979","author":"luhmann","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50.30392"},{"key":"6","doi-asserted-by":"crossref","first-page":"941","DOI":"10.2307\/25148760","article-title":"The Effects of Personalization and Familiarity on Trust and Adoption of Recommendation Agents","volume":"30","author":"komiak","year":"2006","journal-title":"MIS Quarterly"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1995.9508080335"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.03.013"},{"key":"8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1922649.1922651","article-title":"Consumer trust in e-commerce web sites: A meta-study","volume":"43","author":"beatty","year":"2011","journal-title":"ACM Comput Surv"}],"event":{"name":"2012 IEEE Second International Workshop on Requirements Patterns (RePa)","start":{"date-parts":[[2012,9,24]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2012,9,24]]}},"container-title":["2012 Second IEEE International Workshop on Requirements Patterns (RePa)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6338383\/6359964\/06359968.pdf?arnumber=6359968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T04:50:19Z","timestamp":1562388619000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6359968\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/repa.2012.6359968","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}