{"id":"https://openalex.org/W4399355122","doi":"https://doi.org/10.1007/s10676-024-09774-6","title":"Engineering the trust machine. Aligning the concept of trust in the context of blockchain applications","display_name":"Engineering the trust machine. Aligning the concept of trust in the context of blockchain applications","publication_year":2024,"publication_date":"2024-06-01","ids":{"openalex":"https://openalex.org/W4399355122","doi":"https://doi.org/10.1007/s10676-024-09774-6"},"language":"en","primary_location":{"id":"doi:10.1007/s10676-024-09774-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10676-024-09774-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10676-024-09774-6.pdf","source":{"id":"https://openalex.org/S13096939","display_name":"Ethics and Information Technology","issn_l":"1388-1957","issn":["1388-1957","1572-8439"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ethics and Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10676-024-09774-6.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018169511","display_name":"E. Poll","orcid":"https://orcid.org/0000-0002-6413-1195"},"institutions":[{"id":"https://openalex.org/I22465464","display_name":"University of M\u00fcnster","ror":"https://ror.org/00pd74e08","country_code":"DE","type":"education","lineage":["https://openalex.org/I22465464"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Eva P\u00f6ll","raw_affiliation_strings":["Department of Philosophy, University of M\u00fcnster, M\u00fcnster, Germany"],"raw_orcid":"https://orcid.org/0000-0002-6413-1195","affiliations":[{"raw_affiliation_string":"Department of Philosophy, University of M\u00fcnster, M\u00fcnster, Germany","institution_ids":["https://openalex.org/I22465464"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5018169511"],"corresponding_institution_ids":["https://openalex.org/I22465464"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":3.73,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.93725397,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"26","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9812999963760376,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9763333797454834},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6549859046936035},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5052834153175354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44325491786003113},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.4235241711139679},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.35762733221054077},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3372523784637451},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.32545793056488037},{"id":"https://openalex.org/keywords/social-science","display_name":"Social science","score":0.09456747770309448},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.09434634447097778}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9763333797454834},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6549859046936035},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5052834153175354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44325491786003113},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.4235241711139679},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35762733221054077},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3372523784637451},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.32545793056488037},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.09456747770309448},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.09434634447097778},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s10676-024-09774-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10676-024-09774-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10676-024-09774-6.pdf","source":{"id":"https://openalex.org/S13096939","display_name":"Ethics and Information Technology","issn_l":"1388-1957","issn":["1388-1957","1572-8439"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ethics and Information Technology","raw_type":"journal-article"},{"id":"pmh:oai:philpapers.org/rec/PLLETT","is_oa":true,"landing_page_url":"https://philpapers.org/rec/PLLETT","pdf_url":"https://philpapers.org/archive/PLLETT.pdf","source":{"id":"https://openalex.org/S4306402131","display_name":"PhilPapers (PhilPapers Foundation)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:philarchive.org/rec/PLLETT","is_oa":false,"landing_page_url":"https://philarchive.org/rec/PLLETT","pdf_url":null,"source":{"id":"https://openalex.org/S4306402130","display_name":"PhilPapers (PhilPapers Foundation)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/s10676-024-09774-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10676-024-09774-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10676-024-09774-6.pdf","source":{"id":"https://openalex.org/S13096939","display_name":"Ethics and Information Technology","issn_l":"1388-1957","issn":["1388-1957","1572-8439"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ethics and Information Technology","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322957","display_name":"Westf\u00e4lische Wilhelms-Universit\u00e4t M\u00fcnster","ror":"https://ror.org/00pd74e08"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4399355122.pdf"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W275838142","https://openalex.org/W1521662974","https://openalex.org/W1558585115","https://openalex.org/W1587383159","https://openalex.org/W1590398854","https://openalex.org/W1996117481","https://openalex.org/W2037881738","https://openalex.org/W2058583438","https://openalex.org/W2087632851","https://openalex.org/W2333326501","https://openalex.org/W2338545932","https://openalex.org/W2762845979","https://openalex.org/W2884204657","https://openalex.org/W2892520153","https://openalex.org/W2905219012","https://openalex.org/W2912453487","https://openalex.org/W2933986653","https://openalex.org/W2976318236","https://openalex.org/W2983579204","https://openalex.org/W2999582630","https://openalex.org/W3009122772","https://openalex.org/W3037899181","https://openalex.org/W3050535409","https://openalex.org/W3127402692","https://openalex.org/W3127864964","https://openalex.org/W3156077785","https://openalex.org/W3204774023","https://openalex.org/W3212131106","https://openalex.org/W3215850795","https://openalex.org/W4205337805","https://openalex.org/W4239224016","https://openalex.org/W4243322117","https://openalex.org/W4283809784","https://openalex.org/W4292877752","https://openalex.org/W4296155012","https://openalex.org/W4297239110","https://openalex.org/W4303198443","https://openalex.org/W4309120487","https://openalex.org/W4319065635","https://openalex.org/W4360863504","https://openalex.org/W4376958085","https://openalex.org/W4378874328","https://openalex.org/W4384521230","https://openalex.org/W4385874231","https://openalex.org/W4387744354","https://openalex.org/W6685981990","https://openalex.org/W6763250853","https://openalex.org/W6783136740","https://openalex.org/W6786627367","https://openalex.org/W7025334563"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4304136894","https://openalex.org/W2989851257","https://openalex.org/W2799059781"],"abstract_inverted_index":{"Abstract":[0],"Complex":[1],"technology":[2,14,45],"has":[3],"become":[4],"an":[5],"essential":[6],"aspect":[7],"of":[8,17,80,99,109,124,158,164,189,202],"everyday":[9],"life.":[10],"We":[11],"rely":[12],"on":[13],"as":[15,67,179],"part":[16],"basic":[18],"infrastructure":[19],"and":[20,36,149,168,194],"repeatedly":[21],"for":[22,62],"tasks":[23],"throughout":[24],"the":[25,31,60,78,86,110,114,137,151,155,159,162,187,200],"day.":[26],"Yet,":[27],"in":[28,40,82,126,166,170,204],"many":[29],"cases":[30],"relation":[32,139],"surpasses":[33],"mere":[34,147],"reliance":[35],"evolves":[37],"to":[38,50,58,76,95,173,198],"trust":[39,63,69,81,125,165,169,177,190,203],"technology.":[41],"A":[42],"new,":[43],"disruptive":[44],"is":[46,94,196],"blockchain.":[47],"It":[48],"claims":[49],"introduce":[51],"trustless":[52],"relationships":[53],"among":[54],"its":[55],"users,":[56],"aiming":[57],"eliminate":[59],"need":[61],"altogether\u2014even":[64],"being":[65,144],"described":[66],"\u201cthe":[68],"machine\u201d.":[70],"This":[71],"paper":[72],"presents":[73],"a":[74,97,105,180],"proposal":[75],"adjust":[77],"concept":[79,98,153,188],"blockchain":[83,127,205],"applications":[84],"with":[85],"tools":[87],"provided":[88],"by":[89,191],"conceptual":[90,138],"engineering.":[91],"Its":[92],"goal":[93],"propose":[96],"trust,":[100,142],"that":[101,113,136,150],"offers":[102],"more":[103],"than":[104,146],"halo":[106],"term,":[107],"devoid":[108],"normative":[111,192],"depth":[112],"original,":[115],"philosophical":[116],"term":[117],"actually":[118],"carries.":[119],"To":[120],"evaluate":[121],"possible":[122],"concepts":[123,163],"applications,":[128],"five":[129],"criteria":[130,134],"are":[131],"proposed:":[132],"These":[133],"ensure":[135],"indeed":[140],"embodies":[141],"thereby":[143],"richer":[145],"reliance,":[148],"chosen":[152],"highlights":[154],"active":[156],"role":[157],"trustor.":[160],"While":[161],"engineers":[167],"algorithms":[171],"have":[172],"be":[174],"discarded,":[175],"institutional":[176],"emerges":[178],"viable":[181],"candidate,":[182],"given":[183],"some":[184],"refinements.":[185],"Ultimately,":[186],"expectations":[193],"attribution":[195],"suggested":[197],"capture":[199],"essence":[201],"applications.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
