Hubbard, R., Schroeder, C. N., Mead, N. R. 2000. An
assessment of the relative efficiency of a facilitator-
driven requirements collection process with respect to
the conventional interview method. In Proceedings
Fourth International Conference on Requirements
Engineering. ICRE 2000. 178-186. IEEE.
IEEE Standards Coordinating Committee. 1990. IEEE
Standard Glossary of Software Engineering
Terminology (IEEE Std 610.12-1990). Los Alamitos.
CA: IEEE Computer Society, 169.
Jin, L., Takabi, H., Joshi, J. B. 2011. Towards active
detection of identity clone attacks on online social
networks. In Proceedings of the first ACM conference
on Data and application security and privacy, 27-38.
ACM.
Keymolen, E. 2016. Trust on the line: a philosophycal
exploration of trust in the networked era.
Kipnis, D. 1996. Trust and technology. Trust in
organizations: Frontiers of theory and research, 39, 50.
Leppänen, S., Møller, J. S., Nørreby, T. R., Stæhrc, A.,
Kytölä, S. 2015. Authenticity, normativity and social
media. Discourse, Context and Media, 8.
Lewicki, R. J., Wiethoff, C. 2000. Trust, trust development,
and trust repair. The handbook of conflict resolution:
Theory and practice, 1(1), 86-107.
Luhmann, N. 2018. Trust and power. John Wiley & Sons.
Marcelino-Jesus, E., Sarraipa, J., Agostinho, C., Jardim-
Goncalves, R. 2014. A Requirements Engineering
Methodology for Technological Innovations
Assessment. In ISPE CE, 577-586.
Mayer, R. C., Davis, J. H., Schoorman, F. D. 1995. An
integrative model of organizational trust. Academy of
management review, 20(3), 709-734.
Mohammadi, N. G., Paulus, S., Bishr, M., Metzger, A.,
Koennecke, H., Hartenstein, S., Pohl, K. 2013. An
Analysis of Software Quality Attributes and Their
Contribution to Trustworthiness. In CLOSER, 542-552.
Mohammadi, N. G., Bandyszak, T., Paulus, S., Meland, P.
H., Weyer, T., Pohl, K. 2015. Extending Software
Development Methodologies to Support
Trustworthiness-by-Design. In CAiSE Forum, 213-220.
Mohammadi, N. G., Heisel, M. 2016a. Patterns for
identification of trust concerns and specification of
trustworthiness requirements. In Proceedings of the
21st European Conference on Pattern Languages of
Programs, 31. ACM.
Mohammadi, N. G., Heisel, M. 2016b. A framework for
systematic analysis and modeling of trustworthiness
requirements using i* and BPMN. In International
Conference on Trust and Privacy in Digital Business,
3-18. Springer, Cham.
Mohammadi, N. G., Heisel, M. 2016c. Enhancing business
process models with trustworthiness requirements. In
IFIP International Conference on Trust Management,
33-51. Springer, Cham.
Möllering, G. 2005. The trust/control duality: An
integrative perspective on positive expectations of
others. International sociology, 20(3), 283-305.
Obada-Obieh, B., Somayaji, A., 2017. Can I believe you?:
Establishing Trust in Computer Mediated
Introductions. In Proceedings of the 2017 New Security
Paradigms Workshop, 94-106. ACM.
Obada-Obieh, B., Chiasson, S., Somayaji, A. 2017. “Don’t
Break My Heart!”: User Security Strategies for Online
Dating. In Workshop on Usable Security (USEC).
Object Management Group, 2003. UML 2.0 Infrastructure
– Final adopted specification. http://www.omg.org/
docs/ad/03-09-15.pdf
Quiroz, P. A. (2013). From Finding the Perfect Love Online
to Satellite Dating and ‘Loving-the-One-You’re Near’
A Look at Grindr, Skout, Plenty of Fish, Meet Moi,
Zoosk and Assisted Serendipity. Humanity & Society,
37(2), 181-185.
Robak, S., Franczyk, B., Politowicz, K. 2002. Extending
the UML for modelling variability for system families.
International Journal of Applied Mathematics and
Computer Science, 12, 285-298.
Rotter, J. B. 1980. Interpersonal trust, trustworthiness, and
gullibility. American psychologist, 35(1), 1.
Stroppi, L. J. R., Chiotti, O., Villarreal, P. D. 2011.
Extending BPMN 2.0: method and tool support. In
International Workshop on Business Process Modeling
Notation, 59-73. Springer, Berlin, Heidelberg.
Sztompka, P. 1999. Trust: A sociological theory.
Cambridge University Press.
Thaichon, P., Quach, T. N., Lobo, A. 2013. Marketing
communications: Factors influencing brand loyalty of
internet service provider. In meeting of Australian and
New Zealand Marketing Academy Conference.
Auckland, New Zealand.
Walther, J. B., Loh, T., Granka, L. 2005. Let me count the
ways: The interchange of verbal and nonverbal cues in
computer-mediated and face-to-face affinity. Journal of
language and social psychology, 24(1), 36-65.
Xia, L. 2013. Effects of companies' responses to consumer
criticism in social media. International Journal of
Electronic Commerce, 17(4), 73-100.
Yu, E. S. K. 1997. Towards modelling and reasoning
support for early-phase requirements engineering. In
Proceedings of ISRE'97: 3rd IEEE International
Symposium on Requirements Engineering, 226-235.
IEEE.