Advertisement

Plans, Brokers and Trust

  • Marcelo Corrales CompagnucciEmail author
Chapter
Part of the Perspectives in Law, Business and Innovation book series (PLBI)

Abstract

Having discussed the theoretical framework and how to construct Plan-like Architectures, this chapter follows on from the previous principles laid out in Plan Theory.

References

  1. Albers S (2005) The design of alliance governance systems. Koelner Wissenschaftsverlag, Koeln, p 203CrossRefGoogle Scholar
  2. Alhamad M, Dillon T, Chang E (2010) SLA-based trust model for cloud computing. In: 13th International Conference on Network-Based Information Systems. IEEE, TakayamaGoogle Scholar
  3. Allbritton M (2007) A model of contractual project-based work: personal social network connectivity. ICT use, and self-monitoring, p 36. PhD thesis, Syracuse University, The School of Information Studies, Paper 6, SyracuseGoogle Scholar
  4. Alzaid H et al (2013) Reputation-based trust systems for wireless sensor networks: a comprehensive review, pp 67–68. In: Fernandez-Gago C et al (eds) Proceedings of 7th IFIP WG 11.11 International Conference on Trust Management VII, IFIPTM 2013. Springer, HeidelbergCrossRefGoogle Scholar
  5. Amerland D (2015) The tribe that discovered trust: How trust is created, lost and regained in commercial interactions. New Line Publishing, s. l, pp 116–117Google Scholar
  6. Appelrouth S, Desfor L (2008) Classical and contemporary sociological theory: text and readings. Sage Publications, Inc., Los Angeles, p 753Google Scholar
  7. Artz D, Gill Y (2007) A survey on trust in computer science and the semantic web. Web Semant Sci Serv Agents World Wide Web 5(2):58CrossRefGoogle Scholar
  8. Bachmann R, Zaheer A (2006) (eds) Handbook of trust research. Edward Elgar Publishing, Cheltenham, p 2Google Scholar
  9. Baecker D (2004) (ed) Einführung in die Systemtheorie. Carl-Auer Verlag, HeidelbergGoogle Scholar
  10. Baert P, Carreira da Silva F (2010) Social theory in the twentieth century and beyond, 2nd edn. Polity Press, Cambridge, p 119Google Scholar
  11. Bailey J (2010) Thomas Jefferson and executive power, 1st edn. Cambridge University Press, Cambridge, p 31Google Scholar
  12. Baker W, Obstfeld D (1999) Social capital by design: structure, strategies, and institutional context, p 92. In: Leenders R, Gabbay S (eds) Corporate social capital and liability. Kluwer Academic Publishers, NorwellGoogle Scholar
  13. Barber B (1983) The logic and limits of trust. Rutgers University Press, New BrunswickGoogle Scholar
  14. Barling J, Cooper C (2008) (eds) The SAGE handbook of organizational behavior, vol. 1, Micro Perspectives. Sage Publications, Los Angeles, p 100Google Scholar
  15. Barron J (1998) Judgment misguided: intuition and error in public decision making. Oxford University Press, Oxford, pp 185 et seqGoogle Scholar
  16. Bartee R, Brown II (2007) School matters: Why African American students need multiple forms of capital. Peter Lang, New York, p 33Google Scholar
  17. Battre D et al (2007) Gaining users’ trust by publishing failure probabilities, p 193. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007). IEEE, NiceGoogle Scholar
  18. Baum F, Ziersch A (2003) Glossary—social capital. J Epidemiol Community Health 57(5):320–323CrossRefGoogle Scholar
  19. Bechmann G, Stehr N (2002) The Legacy of Niklas Luhmann. Society 39(2):67–75CrossRefGoogle Scholar
  20. Beckert J, Zafirovski M (2006) (eds) International encyclopedia of economic sociology. Routledge, London, p 605Google Scholar
  21. Berghaus M (2011) Luhmann leicht gemacht: Eine Einführung in die Systemtheorie. Boehlau Verlag, KoelnGoogle Scholar
  22. Bhuiyan T (2013) Trust for intelligent recommendation. Springer, New York, p 11CrossRefGoogle Scholar
  23. Bijlsma-Frankema K, Klein Woolthuis R (2005) Trust under pressure: trust and trust building in uncertain circumstances, Chapter 1 with further references. In: Bijlsma-Frankema H, Klein Woolthuis R (eds) Trust under Pressure: empirical investigations of trust and trust building in uncertain circumstances. Edward Elgar Publishing, CheltenhamCrossRefGoogle Scholar
  24. Blaze M et al (1999) The role of trust management in distributed systems security. In: Vitek J, Jensen C (eds) Secure internet programming: security issues for mobile and distributed objects. Springer, Berlin, pp 185–210CrossRefGoogle Scholar
  25. Blegvad B (1995) How to cope with uncertainty: trust and law, p 153. In: Karlsson M, Jonsson O (eds) Law, justice and the state: nordic perspectives, Proceedings of the 16th World Congress of the International Association for Philosophy of Law and Social Philosophy (IVR), Reykjavik, May 26–June 2. 1993, vol IV. Franz Steiner Verlag, StuttgartGoogle Scholar
  26. Bofota Y (2012) Social capital, human capital and economic development: theoretical model and empirical analyses. Presses Universitaires de Louvain, Louvain, p 10Google Scholar
  27. Bourdieu P, Wacquant L (1992) An invitation to reflexive sociology. Polity Press, Cambridge, p 119Google Scholar
  28. Branscomb L, Keller J (1999) (eds) Investing in innovation: creating a research and innovation policy that works. The MIT Press, Cambridge, p 88Google Scholar
  29. Bratianu C (2015) Organizational knowledge dynamics: managing knowledge creation, acquisition, sharing, and transformation. IGI Global, Hershey, p 268Google Scholar
  30. Bratman M (1999) Intention, plans, and practical reason. The David humer series, philosophy and Cognitive Science Reissues. CSLI Publications, CambridgeGoogle Scholar
  31. Bruni L, Sugden R (2000) Moral canals: trust and social capital in the work of Hume Smith and Genovesi. Econ Philos 16(1):21–45CrossRefGoogle Scholar
  32. Burger R, Cachin C, Husmann E (2013) Cloud, trust, privacy: trustworthy cloud computing whitepaper http://www.tclouds-project.eu/downloads/TClouds_12_final_150dpi.pdf. Accessed 10 May 2019
  33. Butterfield A, Ngondi G (2016) A dictionary of computer science, 7th edn. Oxford University Press, Oxford, p 77Google Scholar
  34. Carbo J et al (2003) Trust management through fuzzy reputation. Int J Coop Inf Syst 12(1):135–155CrossRefGoogle Scholar
  35. Castaldo S (2002) Meanings of trust: a meta-analysis of trust definitions. EURAM, Stockholm, p 1Google Scholar
  36. Castelfranchi C, Falcone R (2010) Trust theory: A Socio-Cognitive and Computational Model. Chichester: John Wiley & Sons.Google Scholar
  37. Castelfranchi C, Falcone R (2000) Trust is much more than subjective probability: mental components and sources of trust, pp 1–10. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, https://www.eecis.udel.edu/~decker/courses/886f04/pubs/castelfranchi00.pdf. Accessed 10 May 2019
  38. Castelfranchi C (2003) For a “Cognitive Program”: explicit mental representations for Homo Oeconomicus (The case of trust), p 189. In: Dimitri N, Basili M, Gilboa I (eds) Cognitive processes and economic behavior. Routledge, LondonGoogle Scholar
  39. Celano B (2013) What Plans can do for legal theory? In: Canale D, Tuzet G (eds) The planning theory of law: a critical reading. vol 100. Springer, DordrechtGoogle Scholar
  40. Chami R, Fullenkamp C (2002) Trust as a means of improving corporate governance and efficiency, p 6. IMF Working Paper, International Monetary Fund (IMF)Google Scholar
  41. Chakrabarti A (2007) Grid computing security. Springer, Berlin, p 216Google Scholar
  42. Chavdarova T (2007) Business relations as trusting relations: the case of bulgarian small business, p 279. In: Roth K (ed) Social networks and social trust in the transformation countries. Lit Verlag GmbH & Co. KG Wien, ZurichGoogle Scholar
  43. Chiles T, McMackin J (1996) Integrating variable risk preferences, trust, and transaction cost economics. Acad Manag Rev 21(1):85CrossRefGoogle Scholar
  44. Chircu A, Davis A, Kauffman R (2000a) The role of trust and expertise in the adoption of electronic commerce intermediaries, p 1. MISRC Working Paper http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.194.9152&rep=rep1&type=pdf. Accessed 10 May 2019
  45. Chircu A, Davis G, Kauffman R (2000b) The role of trust and expertise in the adoption of electronic commerce intermediaries, pp 1–7. MISRC Working Paper http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.194.9152&rep=rep1&type=pdf. Accessed 10 May 2019
  46. Cloud Security Alliance (2013) The notorious nine, cloud computing top threats in 2013. Top Threats Working Group https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notori-ous_Nine_Cloud_Computing_Top_Threats_in_2013.pdf. Accessed 10 May 2019
  47. Cohen A (2015) Fairness in the workplace: a global perspective. Palgrave Macmillan, London, p 52CrossRefGoogle Scholar
  48. Cook K et al (2005) Trust building via risk taking: a cross-societal experiment. Soc Psychol Q 68(2):121–142CrossRefGoogle Scholar
  49. Corrales Compagnucci M (2016) “Plan-like Architectures” for mutual trust in the cloud, p 219. In: Fenwick M, Wrbka S (eds) Flexibility in modern business law: a comparative assessment. Springer, TokyoGoogle Scholar
  50. Corritore C et al (2013) Foundations of trust for e-health, p 1170. In: Information Resources Management Association, User-driven healthcare: concepts, methodologies, Tools and Applications, 1st edn. Medical Information Science Reference (IGI Global), HersheyGoogle Scholar
  51. Covey M, Link G (2012) Smart trust: creating prosperity, energy, and joy in a low-trust world. Free Press, New York, p 13Google Scholar
  52. Craib I (1992) Anthony Giddens. Routledge, London, Routledge Revivals, p 67Google Scholar
  53. Cranston J (2014) Questionable dismissal, pp 63–64. lulu.com, s. lGoogle Scholar
  54. Cugelman B, Thelwall M, Dawes P (2008) Website credibility, active trust and behavioral intent, p 51. In: Oinas-Kukkonen H et al (eds) Proceedings of 3rd. International Conference on Persuasive Technology, Oulu, Finland, June 2008. Springer, BerlinGoogle Scholar
  55. Da Silva I, Zisman A (2012) A framework for trusted services, pp 328–343. In: Liu C et al (eds) Proceedings of 10th International Conference on Service-Oriented Computing, ICSOC 2012, Shanghai, China, November 12–15, 2012. Springer, BerlinGoogle Scholar
  56. Dasgupta P (2000) Trust as a commodity. In: Gambetta D (ed) Trust: Making and breaking cooperative relations, electronic edn. Department of sociology, University of Oxford http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf. Accessed 10 April 2019
  57. Davis D (2016) Creative strategy and the business of design. HOW Books, Blue Ash, p 137Google Scholar
  58. Deutsch (1973) The resolution of conflict. Yale University Press, New Haven, p 148Google Scholar
  59. Dietz G, Gillespie N, Chao G (2010) Unraveling the complexities of trust and culture. In: Saunders M et al (eds) Organizational trust: a cultural perspective. Cambridge University Press, Cambridge, pp 9–10Google Scholar
  60. Dinnen R, Hassanien A (2013) Handling customer complaints in the hospitality industry, p 71. In: Eid E (ed) Managing customer trust, satisfaction, and loyalty through information. Business Science Reference (IGI Global), HersheyCrossRefGoogle Scholar
  61. Djemame K, Gourlay I, Padgett J (2006) Introducing risk management into the grid, p 7. In: Proceedings of the Second IEEE International Conference on e-Science and Grid Computing, e-Science’06. https://pc2.uni-paderborn.de/uploads/tx_sibibtex/RiskDje06.pdf. Accessed 10 May 2019
  62. Djemame K et al (2013) Legal issues in clouds: towards a risk inventory. Phil Trans R Soc A 371(1983) https://royalsocietypublishing.org/doi/full/10.1098/rsta.2012.0075. Accessed 10 May 2019CrossRefGoogle Scholar
  63. Dragovic B et al (2003) Managing trust and reputation in the xenoserver open platform, p 60. In: Nixon P, Terzis S (eds) Proceedings of First International Conference on Trust Management, iTrust 2003, Heraklion, Crete, Greece, May 28–30 2003. Springer, BerlinGoogle Scholar
  64. Dutton W et al (2005) The cyber trust tension in e-government: balancing identity, privacy, security, p 14. In: Lips M, Taylor J, Bannister F (eds) Public administration in the information society: essays on risk and trust. IOS Press, AmsterdamCrossRefGoogle Scholar
  65. Dyer J, Chu W (2006) The role of trustworthiness in reducing transaction costs and improving performance: empirical evidence from the United States, Japan and, Korea, p 224. In: Kramer R (ed) Organizational trust: a reader. Oxford University Press, OxfordGoogle Scholar
  66. Earle T, Siegriest M, Gutscher H (2007) Trust, risk perception and the TCC model of cooperation. In: Siegrist M, Earle T, Gutscher H (eds) Trust in risk management: uncertainty and scepticism in the public mind. Earthscan, London, pp 1–2Google Scholar
  67. Eriksson K (2015) Financial services quality: people, processes and performance, p 186. In: Harrison T, Estelami H (eds) The routledge companion to financial services marketing. Routledge, New YorkGoogle Scholar
  68. Farrel H (2009) The political economy of trust: institutions, interests, and inter-firm cooperation in Italy and Germany. Cambridge University Press, Cambridge, p 11Google Scholar
  69. Fontanills G, Gentile T, Cawood R (2001) The stock market course. Wiley, New York, p 72Google Scholar
  70. Fuchs A, Guergens S, Rudolph C (2010) A formal notion of trust—enabling reasoning about security properties, p 200. In: Nishigaki M et al (eds) Proceedings of 4th IFIP WG 11.11 International Conference on Trust Management IV, IFIP Advances in Information and Communication Technology, vol. 321, IFIPTM 2010, Morioka, Japan, June 16–18, 2010. Springer, BerlinGoogle Scholar
  71. Fukuyama F (1996) Trust: the social virtues and the creation of prosperity. Simon & Schuster, New YorkGoogle Scholar
  72. Fu Q (2004) Trust, social capital, and organizational effectiveness. Master Thesis submitted for the Master in Public and International Affairs, Faculty of the Virginia Polytechnic Institute and State University http://www.ipg.vt.edu/papers/qhfumajorpaper.pdf. Accessed 10 May 2019
  73. Gambetta D (1988) (ed) Trust: making and breaking cooperative relations. Basil Blackwell Ltd, Cambridge MAGoogle Scholar
  74. Gambetta D (2000) Can We Trust Trust? pp 213–237. In: Gambetta D (ed) Trust: making and breaking cooperative relations, electronic edition. Department of Sociology, University of Oxford http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf. Accessed 10 May 2019
  75. Gasiorowski-Denis E (2015) Trust and confidence in cloud privacy, ISO News http://www.iso.org/iso/es/news.htm?refid=Ref1921. Accessed 10 May 2019
  76. Geyskens I et al (1998) Generalizations about trust in marketing channel relationships using meta-analysis. Int J Res Mark 15(3):223–248CrossRefGoogle Scholar
  77. Giddens A (1984) The constitution of society: outline of the theory of structuration. Polity Press, CambridgeGoogle Scholar
  78. Giddens A (1986) The constitution of society: outline of the theory of structuration. Polity Press, CambridgeGoogle Scholar
  79. Giddens A (1991) The consequences of modernity. Stanford University Press, StanfordGoogle Scholar
  80. Gladstone J (2004) International Cyberlaw, p 227. In: Bidgoli H (ed) The internet encyclopedia, Vol. 2 (G–O). Wiley, HobokenGoogle Scholar
  81. Glinz & Company (2016) Digital trust: towards a more sustainable approach to personal data, p 3, White Paper. http://iceberg.digital/iceberg_whitepaper_2016.pdf. Accessed 10 May 2019
  82. Gourlay I, Djemame K, Padgett J (2009) Evaluating provider reliability in grid resource brokering, p 37. In: 1th IEEE International Conference on High Performance Computing and Communications. IEEE Computer SocietyGoogle Scholar
  83. Gourlay I, Djemame K, Padgett J (2008) Reliability and Risk in Grid Resource Brokering, p 438. In: 2nd IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2008). IEEE Computer SocietyGoogle Scholar
  84. Graham L, Xie X (2007) The United States insurance market: characteristics and trends, p 78. In: Cummins D, Venard B (eds) Handbook of international insurance: between global dynamics and local contingencies. Springer, New YorkGoogle Scholar
  85. Grandison T (2007) Trust management tools, p 199. In: Ronggong S, Korba L, Yee G (eds) Trust in e-services: technologies, practices and challenges. Idea Group Publishing, HersheyGoogle Scholar
  86. Guinnane T (2005) Trust: a concept too many, pp 1–2. Discussion Paper No. 907, Economic Growth Center, Yale University http://aida.wss.yale.edu/growth_pdf/cdp907.pdf. Accessed 10 May 2019
  87. Hartmann E, Kjaer P (2015) (eds) The Evolution of intermediary institutions in Europe: From Corporatism to Governance. Palgrave McMillan, New YorkGoogle Scholar
  88. Hardin R (2004) Distrust: manifestations and management, p 6. In: Hardin R (ed). Distrust. Russell Sage Foundations, New YorkGoogle Scholar
  89. Haubarer J (2011) Social Capital Theory: Towards a Methodological Foundation, p 147, 1st edn. Springer Fachmedien Wiesbaden GmbH, WiesbadenGoogle Scholar
  90. Hawley K (2012) Trust: a very short introduction. Oxford University Press, Oxford, p 38Google Scholar
  91. He R, Niu J, Zhang G (2005) CBTM: A trust model with uncertainty quantifications and reasoning for pervasive computing, p 541. In: Pan Y et al (eds) Proceedings of Third International Symposium on Parallel and Distributed Processing and Applications, ISPA 2005, Nanjing, China, November 2005. Springer, BerlinGoogle Scholar
  92. Healy J (2016) Improving health care safety and quality: reluctant regulators. Routledge, New York, p 311CrossRefGoogle Scholar
  93. Herzberg A et al (2000) Access control meets public key infrastructure, or assigning roles to strangers, pp 2–15. In: Proceedings of IEEE Symposium on Security and Privacy S&P 2000. IEEE Computer Society, Los AlamitosGoogle Scholar
  94. Hollis M (1998) Trust within reason. Cambridge University Press, Cambridge, p 41Google Scholar
  95. Hoog A, Strzempka K (2011) iPhone and iOS forensics: investigation, analysis and mobile security for Apple iPhone, iPad and iOS Devices. Elsevier, Waltham, p 94Google Scholar
  96. Hosseini H (2015) Insufficient social capital and economic underdevelopment, p 662. In: Altman M (ed) Handbook of contemporary behavioral economics: foundations and developments. Routledge, New YorkGoogle Scholar
  97. Houlihan B, Groeneveld M (2011) Social capital, governance and sport, p 4. In: Groeneveld M, Houlihan B, Ohl F (eds) Social capital and sport governance in Europe. Routledge, New YorkGoogle Scholar
  98. Huang P (2015) A dissection of bitcoin. Lulu.com, p 3, s lGoogle Scholar
  99. Huemer L, Von Krogh G, Roos J (2000) Knowledge and the Concept of Trust, p 129. In: von Krogh G, Roos J, Kleine D (eds) Knowing in firms: understanding, managing and measuring knowledge. SAGE Publications, LondonGoogle Scholar
  100. Hume D (1737) A treatise of human nature. In: Selby-Bigge LA, Nidditch PH (eds) 1975. Clarendon Press, OxfordGoogle Scholar
  101. Humphreys E (2007) Implementing the ISO/IEC 27001 information security management system standard, information security and privacy series, 1st edn. Artech House, BostonGoogle Scholar
  102. Ishiyama J, Breuning M (2011) (eds) 21st century political science: a reference handbook, p 195, vol 1. Sage Publications, Los AngelesGoogle Scholar
  103. Jalava J (2006) Trust as a decision: the problems and functions of trust in Luhmannian systems theory, p 2. PhD thesis, Published by the Department of Social Policy, University of Helsinki, HelsinkiGoogle Scholar
  104. Janovs V, Fomin V (2011) Development of e-services in latvian insurance industry: the critical role of quality benchmarking, p 231. In: Skersys T et al (eds) 11th IFIP WG 6.11 Conference on e-Business, Building the e-world ecosystem. Springer, HeidelbergGoogle Scholar
  105. Johns J (1996) A concept analysis of trust. J Adv Nurs 24(1):76CrossRefGoogle Scholar
  106. Johnstone S (2011) A history of trust in ancient Greece, p 3. The University of Chicago Press, ChicagoGoogle Scholar
  107. Jones K (1996) Trust as an affective attitude. Ethics 107(1):4–25CrossRefGoogle Scholar
  108. Jonker C et al (2004) Human experiments in trust dynamics, p 207. In: Jensen C, Poslad D, Dimitrakos T (eds) Proceedings of Second International Conference on Trust Management, iTrust 2004, Oxford, UK, March/April 2004. Springer, BerlinGoogle Scholar
  109. Josag A et al (2007) Security usability principles for vulnerability analysis and risk assessment, pp 269–278. In: Proceedings of Twenty-Third Annual Computer Security Applications Conference, 2007. ACSAC 2007. IEEE Computer Society, Los AlamosGoogle Scholar
  110. Joseph B (2010) E-government adoption landscape zambia: context, issues, and challenges, p 243. In: Reddick C (ed) Comparative e-government. Springer, New YorkGoogle Scholar
  111. Kahn A et al (2012) Security risks and their management in cloud computing, p 121. In: IEEE 4th International Conference on Cloud Computing Technology and Science, IEEE Computer SocietyGoogle Scholar
  112. Kidder R (2010) Trust: a primer on current thinking, p 1. Institute for Global Ethics. http://www.touroinstitute.com/trust.pdf. Accessed 10 May 2019
  113. Kini A, Choobineh J (1998) Trust in electronic commerce: definition and theoretical considerations. https://pdfs.semanticscholar.org/9db5/5d845b43a09ac26868f23df851c19bea95e0.pdf. Accessed 10 May 2019
  114. Kneer G, Nassehi A (2009) Niklas Luhmanns Theorie sozialer Systeme. Wilhelm Fink GmbH & Co., Verlags-KG, PaderbornGoogle Scholar
  115. Komesar N (1994) Imperfect alternatives: choosing institutions in law, economics and public policy. The University of Chicago Press, ChicagoGoogle Scholar
  116. Kosba A et al (2015) Hawk: the blockchain model of cryptography and privacy-preserving smart contracts, p 1 https://www.weusecoins.com/as-sets/pdf/library/Hawk%20-%20The%20Blockchain%20Model%20of%20Cryptography%20and%20Privacy-Preserving%20Smart%20Contracts.pdf. Accessed 10 May 2019
  117. Kost de Sevres N (2016) The blockchain revolution, smart contracts and financial transactions. https://www.dlapiper.com/en/uk/insights/publications/2016/04/the-blockchainrevolution/. Accessed 10 May 2019
  118. Kramer R (1999) Trust and distrust in organizations: emerging perspectives, enduring questions. Annu Rev Psychol 50:569–598CrossRefGoogle Scholar
  119. Krukow K, Nielsen M, Sassone V (2008) Trust models in ubiquitous computing. Phil Trans R Soc A 366:3781–3793CrossRefGoogle Scholar
  120. La Porta R et al (1996) Trust in large organizations. American Economic Review Papers and Proceedings 87(2):333–338Google Scholar
  121. Lane C (1998) Introduction: theories and issues in the study of trust, p 16. In: Lane C, Bachmann R (eds) Trust within and between organizations: conceptual issues and empirical applications. Oxford University Press, OxfordGoogle Scholar
  122. Lauziere L (2002) Dependence and interdependence in the lawyer-client relationship, p 48. In: Law Commission of Canada (ed) Personal relationships of dependence and interdependence in law. UBC Press, VancouverGoogle Scholar
  123. Lee K, Vachonp S (2016) Business value and sustainability: an integrated supply network perspective, p 102. Palgrave MacMillan, LondonCrossRefGoogle Scholar
  124. Lee Y, Trim P (2008) Strategic marketing decision-making within Japanese and South Korean Companies, p. 91. Chandos Publishing, OxfordCrossRefGoogle Scholar
  125. Lewicki R, Bunker B (1996) Developing and maintaining trust in work relationships, p. 116. In: Kramer R, Tyler T (eds) Trust in organizations: frontiers of theory and research. SAGE Publications, Thousand OaksGoogle Scholar
  126. Lewis D, Weigert A (1985) Trust as a social reality. The University of North Carolina Press, Soc Forces 63(4):967Google Scholar
  127. Linthicum D (2016) Linking up blockchain and cloud. https://www.cloudtp.com/doppler/linking-blockchain-cloud/. Accessed 10 May 2019
  128. Liu J, Issarny V (2004) Enhanced reputation mechanism for mobile ad hoc networks, p 50. In: Jensen C, Poslad S, Dimitrakos T (eds) Trust management. iTrust 2004. Lecture notes in computer science, vol 2995. Springer, BerlinGoogle Scholar
  129. Luhmann N (1973) Vertrauen: Ein Mechanismus der Reduktion sozialer Komplexität. Ferdinand Enke Verlag, SttutgartGoogle Scholar
  130. Luhmann N (1987) Soziale Systeme: Grundriß einer allgemeinen Theorie. Suhrkamp Verlag, Frankfurt am MainGoogle Scholar
  131. Luhmann N (1988) Familiarity, confidence, trust: problems and alternatives. In: Gambetta D (ed) Trust: making and breaking cooperative relations. Basil Blackwell Ltd., Oxford, pp 96–97Google Scholar
  132. Mandelli A (2004) Exploring the origins of new transaction costs in connected societies, p 226. In: Huotari M, Iivonen M (eds) Trust in knowledge management and systems in organizations. Idea Group Publishing, CambridgeGoogle Scholar
  133. Marinescu D (2013) Cloud computing: theory and practice. Morgan Kaufmann, WalthamCrossRefGoogle Scholar
  134. Marsh S (1994) Formalizing trust as a computational concept, p 26. Submitted in partial fulfillment of the degree of Doctor of Philosophy. http://www.cs.stir.ac.uk/research/publications/techreps/pdf/TR133.pdf/. Accessed 10 May 2019
  135. Mayer R, Davis J, Schoorman F (1995) An integrative model of organizational trust. Acad Manag Rev 20(3):709–734CrossRefGoogle Scholar
  136. McCarthy C (2006) Digital libraries: security and preservation considerations, p 60. In: Bidgoli H (ed) Handbook of information security, information warfare, social, legal, and international issues; and security foundations, vol 2. Wiley, HobokenGoogle Scholar
  137. McCullagh A, Little P, Caelli W (1998) Electronic signatures: understand the past to develop the future. Univ N S W Law J 21(2):452–465Google Scholar
  138. McDonald E (2004) Difficult conversations in medicine. Oxford University Press, OxfordGoogle Scholar
  139. McKnight H, Chervany N (1996) The meanings of trust, pp 1–17 http://misrc.umn.edu/workingpapers/fullpapers/1996/9604_040100.pdf. Accessed 10 May 2019
  140. McMyler B (2011) Testimony, trust, & authority, p 113. Oxford University Press, OxfordGoogle Scholar
  141. Mehta A (2007) Trust in a Time of Crisis: The Mass Media as a Guardian of Trust, p. 156. In: Bakir V, Barlow D (eds) Communication in the age of suspicion: trust and the media. Palgrave Macmillan, HampshireCrossRefGoogle Scholar
  142. Mendelsohn T (2016) Dropbox hackers stole e-mail addresses, Hashed passwords from 68 M accounts. http://arstechnica.co.uk/security/2016/08/dropbox-hackers-stole-email-addresses-hashed-passwords-68m-accounts. Accessed 10 May 2019
  143. Miller J (2000) Trust: the moral importance of an emotional attitude. Practical Philosophy 3(3):38–45Google Scholar
  144. Misztal B (1996) Trust in modern societies: the search for the bases of social order, p 9. Polity Press, CambridgeGoogle Scholar
  145. Mougayar W (2015) Understanding the blockchain: we must be prepared for the blockchain’s promise to become a new development environment. https://www.oreilly.com/ideas/understanding-the-blockchain. Accessed 10 May 2019
  146. Munesh K, Sareen M (2012) (ed) Trust and technology in B2B e-commerce: practices and strategies for assurance, 1st edn. IGI Global, Hershey, p 26Google Scholar
  147. Mutti A (1987) Trust: a fragile concept, a solid reality (in Italian: “La Fiducia. Un Concetto Fragile Una Solida Realtà”). Rassenga Italian di Sociologia 2:23–247Google Scholar
  148. Nannestad P (2009) Making Integration Work, p. 311. In: Svendsen G, Svendsen G (eds) Handbook of social capital: the troika of sociology, political science and economics. Edward Elgar Publishing, CheltenhamGoogle Scholar
  149. Nielsen M, Krukow K (2003) Towards a formal notion of trust, p 1 https://userscs.au.dk/krukow/research/publications/online_papers/TaFNoT03.ps. Accessed 10 May 2019
  150. Niezen M, Steijn W (2015) Understanding the cloud: the social implications of cloud computing and the need for accountability, pp 203 et seq. In: Felici M, Fernández-Gago C (eds) Proceedings of First Summer School on Accountability and Security in the Cloud, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2–6, 2014. Springer, ChamGoogle Scholar
  151. Noor T, Sheng Q, Bouguettaya A (2014) Trust management in cloud services, p 13. Springer, ChamGoogle Scholar
  152. Ojima T (2011) Social capital and population approach, p 133. In: Muto T, Nakahara T, Nam E (eds) Asian perspectives and evidence on health promotion and education. Springer, TokyoCrossRefGoogle Scholar
  153. Oomsels P, Bouchaert G (2014) Studying interorganizational trust in public administration: a conceptual and analytical framework for “administrational trust”. Public Perform Manag Rev 37(4):5–7Google Scholar
  154. Ostrom E (2005) Understanding institutional diversity. Princeton University Press, Princeton, pp 97–98Google Scholar
  155. Ostrom E, Ostrom V (2014) Choice, rules and collective action: the Ostroms on the study of institutions and governance. ECPR Press, Colcherster, p 143Google Scholar
  156. Ouderkirk S (2007) Social capital and the third choice, p 5. Master thesis, Graduate School of Binghamton University, New YorkGoogle Scholar
  157. Padgett J et al (2009) Risk-aware SLA brokering using WS-agreement, p 284. In: 2009 International Conference on Advanced Information Networking and Applications Workshops, IEEE Computer SocietyGoogle Scholar
  158. Pawar P et al (2014) Trust assessment using cloud brokers, pp 237–244. In: Zhou J et al (eds) Proceedings of 8th IFIP WG 11.11 International Conference on Trust Management VIII. IFIPTM 2014, Singapore, July 7–10, 2014. Springer, HeidelbergGoogle Scholar
  159. Pedersen E (2015) An outline of interpersonal trust and distrust, p 108. In: Liisberg S, Pedersen E, Dalsgard A (eds) Anthropology & philosophy: dialogues on trust and hope. Berghahn, New YorkGoogle Scholar
  160. Pennanen K (2006) How Consumers build trust in e-commerce: towards a trust formation model, p 39. In: Gonzalez S, Luna D (eds) Latin American advances in consumer research, vol 1. Association for Consumer Research, DuluthGoogle Scholar
  161. Peters W (2010) Verifiability of electronic voting: between confidence and trust, p. 160. In: Gutwirth S, Poullet Y, De Hert P (eds) Data protection in a profiled world. Springer, DordrechtGoogle Scholar
  162. Peterson (2016) The 10 laws of trust: building the bonds that make a business great, Foreword. Amacom, New YorkGoogle Scholar
  163. Pettit P (1995) The cunninng of trust. Philos Public Aff 24(3):204CrossRefGoogle Scholar
  164. Pivar W, Harlan D (1995) Real estate ethics: good ethics = good business, 3rd edn. Dearborn Financial Publishing, Chicago, pp. 19 et seqGoogle Scholar
  165. Porta RL et al (1997) Trust in large organizations. Am Econ Rev Pap Proc 87(2):333–338Google Scholar
  166. Purser S (2004) A practical guide to managing information security. Artech House, Inc., Norwood, p 15Google Scholar
  167. Putnam R, Leonardi R, Nonetti R (1993) Making democracy work: civic traditions in modern Italy. Princeton University Press, Princeton, p 167Google Scholar
  168. Putnam R (1995) Bowling alone: America’s declining social capital. J Democracy 6(1):65–78CrossRefGoogle Scholar
  169. Putnam R (2000) Bowling alone: the collapse and revival of American community. Simon & Schuster, New York, pp 16–18Google Scholar
  170. Reed M (2001) Organization, trust and control. Organ Stud 22(2):201–228CrossRefGoogle Scholar
  171. Robinson N et al (2011) The cloud understanding the security, privacy and trust challenges. RAND Corporation, Santa MonicaGoogle Scholar
  172. Robinson S (1996) Trust and breach of the psychological contract. Adm Sci Q 41:574–599CrossRefGoogle Scholar
  173. Robinson S, Rousseau D (1994) Violating the psychological contract: not the exception but the norm. J Organ Behav 15:245–259CrossRefGoogle Scholar
  174. Rose R (2000) Getting things done in an anti-modern society: social capital networks in Russia, p 155. In: Dasgupta D, Serageldin I (eds) Social capital: a multifaceted perspective. The World Bank, WashingtonGoogle Scholar
  175. Rose R, Weller (2003) What does social capital add to democratic values? p 201. In: Badescu G, Uslaner E (eds) Social capital and the transition to democracy. Routledge, LondonGoogle Scholar
  176. Rousseau D et al (1998) Not so different after all: a cross-discipline view of trust. Acad Manag Rev 23(3):393–404CrossRefGoogle Scholar
  177. Rubinstein A, Wolinsky A (1987) Middlemen. Quart J Econ 102:581–593CrossRefGoogle Scholar
  178. Ruokonen F (2013) Trust, trustworthiness, and responsibility. In: Mäkelä P, Townley C (eds) Trust: analytic and applied perspective. Rodopi B.V, Amsterdam, pp 1–3Google Scholar
  179. Sajise P, Fellizar F, Saguiguit G (2003) The road to community-based resource management in the Philippines: entries, bends, tolls and dead ends, p 223. In: Persoon G, van Est D, Sajise P (eds) Co-management of natural resources in Asia: a comparative perspective. Nias Press, CopenhagenGoogle Scholar
  180. Sangrasi A, Djemame K (2011) Component level risk assessment in grids: a probabilistic risk model and experimentation. In: Proceedings of the 5th 2011 IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), DaejeonGoogle Scholar
  181. Sangrasi A, Djemame K (2012) Risk assessment modeling in grids at component level: considering grid resources as repairable. In: Omatu S et al (eds) Distributed computing and artificial intelligence. Springer, Berlin, pp 321–330CrossRefGoogle Scholar
  182. Sangrasi A, Djemame K, Jokhio I (2012) Aggregating node level risk assessment in grids using an R-out-of-N model. Commun Comput Inf Sci 281:445–452Google Scholar
  183. Scarlat E, Maries I (2009) Towards an increase of collective intelligence within organizations using trust and reputation models, p 142. In: Nguyen N, Kowalczyk R, Chen S (eds) Proceedings of 1st International Conference on Computational Collective Intelligence: Semantic Web, Social Networks and Multiagent Systems, ICCCI 2009. Springer, BerlinCrossRefGoogle Scholar
  184. Schenker J (2016) How blockchain will allow banks to become brokers of personal data. https://medium.com/@jennifer.schenker/how-blockchain-will-allow-banks-to-become-brokers-of-personal-data-7d2971ed222e#.ol7rm22ps. Accessed 10 May 2019
  185. Schwegler U (2011) Vertrauen in interkulturellen Kooperationsbezihungen. In: Dreyer E, Hößler U (eds) Perspektiven interkultureller Kompetenz. Vandenhoeck & Ruprecht GmbH & Co., Goettingen, pp 137–147CrossRefGoogle Scholar
  186. Seigneur J, Jensen C (2004) Trading privacy for trust, pp 93–107. In: Jensen C, Posland S, Dimitrakos T (eds) Proceedings of Second International Conference on Trust Management, iTrust 2004, Oxford, UK, March/April 2004. Springer, BerlinGoogle Scholar
  187. Shapiro S (1987) The social control of impersonal trust. Am J Sociol 93(3):625CrossRefGoogle Scholar
  188. Shapiro S (2011) Legality. Belknap Press, Cambridge MAGoogle Scholar
  189. Shapiro S (2012) The grammar of trust, p 100. In: Pixley J (ed) New perspectives on emotions in finance: the sociology of confidence, fear and betrayal. Routledge international studies in money and banking. Routledge, LondonGoogle Scholar
  190. Silva E et al (2013) Inferring hidden trust relationships in social networks for encouraging collaboration and cooperation among individuals, p 42, In: Antunes P et al (eds) Proceedings of 19th International Conference on Collaboration and Technology, CRIWG 2013, Wellington, New Zealand, October/November. Springer, BerlinGoogle Scholar
  191. Simpson J (2007) Foundations of interpersonal trust, p 587. In: Kruglanski A, Higgins T (eds) Social psychology: handbook of basic principles, 2nd edn. The Guilford Press, New YorkGoogle Scholar
  192. Simpson T (2014) Computing and the search for trust, p 114. In: Harper R (ed) Trust, computing, and society. Cambridge University Press, CambridgeGoogle Scholar
  193. Sinn R (2008) Software security technologies: a programmatic approach. Cengage Learning, Stamford, pp 130 et seqGoogle Scholar
  194. Skevington P, Hart T (1998) Trusted third parties in electronic commerce, p 60. In: Sim S, Davies J (eds) The internet and beyond. Springer, DordrechtCrossRefGoogle Scholar
  195. Slovic P (1993) Perceived risk, trust, and democracy. Risk Anal 13(6):675–682CrossRefGoogle Scholar
  196. Smigielska G, Wierzbinski B (2015) The role of trust and culture in building mutual relations in business competitive market, pp 275–276. http://www.asecu.gr/files/11th_conf_files/21.pdf. Accessed 10 May 2019
  197. Smith B (2015) In the cloud we trust. http://news.microsoft.com/stories/inthecloudwetrust/. Accessed 10 May 2019
  198. Solhaug B, Stolen K (2012) Uncertainty, subjectivity, trust and risk: How it all fits together, pp 1–5. In: Meadows C, Fernández-Gago C (eds) 7th International Workshop on Security and Trust Management, STM 2011, Copenhagen, Denmark, June 27–28, 2011. Springer, BerlinGoogle Scholar
  199. Srinivasan S (2014) Risk management in the cloud and cloud outages, p 150. In: Srinivasan S (ed) Security, trust, and regulatory aspects of cloud computing in business. Information Science Reference (IGI Global), HersheyGoogle Scholar
  200. Stark J (2016) How close are smart contracts to impacting real-world law? http://www.coindesk.com/blockchain-smarts-contracts-real-world-law/. Accessed May 10 2019
  201. Stirling W, Giraud-Carrier C, Felin T (2012) A framework for the design and synthesis of coordinated social systems, p 355. In: Aberer K et al (eds) Proceedings of 4th International Conference on Social Informatics, SocInfo 2012 Lausanne, Switzerland, December 2012. Springer, BerlinGoogle Scholar
  202. Stockheim T (2006) Supply network optimization: coordination based on scheduling, negotiation, and trust, p 142. Books on Demand GmbH, FrankfurtGoogle Scholar
  203. Sunderland D (2007) Social Capital, Trust and the industrial revolution, 1780–1880. Routledge Explorations in Economic History. Routledge, London, p 1Google Scholar
  204. Swan M (2015) Blockchain: blueprint for a new economy, 1st edn. O’Reilly, Sebastopol, p 16Google Scholar
  205. Swartz T, Iacobucci D (eds) (2000) Handbook of services marketing and management. SAGE Publications, Thousand Oaks, p 358Google Scholar
  206. Swedberg R (2003) Principles of economic sociology. Princeton University Press, Princeton, p 45Google Scholar
  207. Szabo N (1997a) Contracts with bearer. http://szabo.best.vwh.net/bearer_contracts.html. Accessed 10 May 2019
  208. Szabo N (1997b) The idea of smart contracts. http://szabo.best.vwh.net/smart_con-tracts_idea.html. Accessed 10 May 2019
  209. Sztompka P (1999) Trust: a sociological theory. Cambridge University Press, CambridgeGoogle Scholar
  210. Tarnacha A (2008) The impact of platform certification on a platform-based product market: the case of mobile applications. ProQuest LLC., Ann Arbor, p 43Google Scholar
  211. The PACE Project (2019) Practical architectural approach for composing egocentric trust. http://isr.uci.edu/projects/pace/trustdef.html. Accessed 10 May 2019
  212. Thomborson C (2010) A framework for system security, p 17. In: Stavroulakis P, Stamp M (eds) Handbook of information and communication security. Springer, HeidelbergCrossRefGoogle Scholar
  213. Townend P et al (2013) Risk assessment and trust in services computing: applications and experience, pp 287, 289 and 395. In: 2013 IEEE 10th International Conference on Services Computing, IEEE Computer SocietyGoogle Scholar
  214. Trusted Computing Platform Alliance (2001) Trusted form alliance announces v.1.0 specifications for trusted computing. https://web.archive.org/web/20030719234815/, http://www.trustedcomputing.org/docs/tcpa_final.pdf
  215. Tsai C et al (2015) Big data analytics: a survey. J Big Data 2(21):1–32Google Scholar
  216. Tuomela R (2000) Cooperation: a philosophical study. Kluwer Academic Publisher, Dordrecht, p 93CrossRefGoogle Scholar
  217. Venters C et al (2011) Provenance: current directions and future challenges for service oriented computing, p. 262. In: Proceedings of the 6th IEEE International Symposium on Service Oriented System Engineering (SOSE 2011), s.lGoogle Scholar
  218. Walczuch R, Seelen J, Lundgren H (2001) Psychological determinants for consumer trust in e-retailing. In: Proceeding of the Eight Research Symposium on Emerging Electronic Markets (RSEEM 01) http://citeseerx.ist.psu.edu/viewdoc/down-load?doi=10.1.1.64.9004&rep=rep1&type=pdf. Accessed 10 May 2019
  219. Walker J, Ostrom E (2005) (eds) Trust & reciprocity: interdisciplinary lessons from experimental research, p 382. A volume in the Russel Sage Foundation on Trust. Russell Sage Foundation, New YorkGoogle Scholar
  220. Walker J, Ostrom E (2009) Trust and reciprocity as foundations for cooperation, p 91. In: Cook K, Levi M, Hardin R (eds) Whom can we trust? How groups, networks, and institutions make trust possible. Russel Sage Foundation, New YorkGoogle Scholar
  221. Wattenhofer R (2016) The science of the blockchain, p 85. Inverted Forest Publishing, s. lGoogle Scholar
  222. Weber I et al (2016) Untrusted business process monitoring and execution using blockchain, p 330. In: La Rosa M, Loos P, Pastor O (eds) Proceedings of 14th International Conference on Business Process Management, BPM 2016, Rio de Janeiro, Brazil, September 18–22, 2016. Springer, ChamGoogle Scholar
  223. Weigl T (2008) Strategy, structure and performance in a transition economy: an institutional perspective on configurations in Russia, p 77, 1st edn. Gabler Verlag, (Springer), WiesbadenGoogle Scholar
  224. Weitzenboeck E (2012) A legal framework for emerging business models: dynamic networks as collaborative contracts (corporations, globalization and the law). Edward Elgar Publishing, Cheltenham, p 77Google Scholar
  225. Westlund H (2006) Social capital in the knowledge economy: theory and empirics, pp 1–2. Springer, BerlinGoogle Scholar
  226. Wierzbicki A (2010) Trust and fairness in open, distributed systems, p 36, Studies in computational intelligence. Springer, BerlinCrossRefGoogle Scholar
  227. Williamson O (1985) The economic institutions of capitalism: firms, markets, relational contracting. The Free Press, New York, pp 62–63, 66, 293Google Scholar
  228. Williamson O (1993) Calculativeness, trust, and economic organization. In: John M (ed) Olin Centennial Conference in Law and Economics at the University of Chicago. J Law Econ 36(1):453Google Scholar
  229. Wintterlin F, Blobaum B (2016) Examining journalist’s trust in sources: an analytical model capturing a key problem in journalism, p 77. In: Blobaum B (ed) Trust and communication in a digitized world: models and concepts of trust research. Springer, ChamGoogle Scholar
  230. Yamagishi T (2005) Cross-societal experimentation on trust: a comparison of the United States and Japan, pp 15, 352–370. In: Ostrom E, Walker J (eds) Trust and reciprocity: interdisciplinary lessons for experimental research. Russell Sage Foundation, New YorkGoogle Scholar
  231. Yamagishi T (2011) Trust: the evolutionary game of mind and society. Springer, Tokyo, pp 12 et seqCrossRefGoogle Scholar
  232. Yamagishi T, Yamagishi M (1994) Trust and commitment in the United States and Japan. Motiv Emot 18(2):31CrossRefGoogle Scholar
  233. Zabolotnyi R, Leitner P, Dustdar S (2014) Building elastic java application services seamlessly in the cloud: a middleware framework, p 566. In: Ramanathan R (ed) Handbook of research on architectural trends in service-driven computing. Information Science Reference (IGI Global), HersheyGoogle Scholar
  234. Zanini M, Migueles C (2013) Trust as an element of informal coordination and its relationship with organizational performance. Economia 14(2):77–87CrossRefGoogle Scholar
  235. Zheng Y (2010) Trust modeling and management in digital environments: from social concept to system development. Information Science Reference, HersheyGoogle Scholar
  236. Zsolnai L (2005) The rationality of trust (Russell Hardin: trust and trustworthiness. New York: 2002, Russell Sage Foundation), (Book Review). Int J Soc Econ 3:268-269Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Centre for Advanced Studies in Biomedical Innovation Law (CeBIL)University of CopenhagenCopenhagenDenmark

Personalised recommendations