Abraham, Ch., Sims, R.R., Daultrey, S., Buff, A., Fealey, A. (2019), How Digital Trust Drives Culture Change. Retrieved: https://sloanreview.mit.edu/article/how-digital-trust-drives-culture-change/ (accessed 18 April 2021).
Acedo, F., Casillas, J. (2005), Current paradigms in the international management field: an author co-citation analysis, International Business Review, 14(5): 619–639. DOI: 10.1016/j.ibusrev.2005.05.003.
Akram R.N., Ko, R.K.L. (2014), Digital Trust - Trusted Computing and Beyond: A Position Paper, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications: 884-892. DOI: 10.1109/TrustCom.2014.116.
AL-Dwairi, R.M., Kamala, M.A. (2009), An Integrated Trust Model for Business-to-Consumer (B2C) E-Commerce: Integrating Trust with the Technology Acceptance Model, 2009 International Conference on CyberWorlds: 351-356. DOI: 10.1109/CW.2009.34.
Aljazzaf, Z.M., Perry, M., Capretz, M.A.M. (2010), Online Trust: Definition and Principles, 2010 Fifth International Multi-conference on Computing in the Global Information Technology: 163-168. DOI: 10.1109/ICCGI.2010.17.
Bachmann, R., Inkpen, A.C. (2011), Understanding institutional-based trust building processes in inter-organizational relationships, Organization Studies, 32(2): 281-301. DOI: 10.1177/0170840610397477.
Bailey, B.P., Gurak, L.J., Konstan, J. (1998), Trust in cyberspace, in: Ch. Forsythe, E. Grose, J. Ratner (Eds.), Human Factors and Web Development (pp. 311-321), New York: Lawrence Erlbaum Associates.
Bapna, R., Gupta, A., Rice, S., Sundararajan, A. (2017), Trust and the Strength of Ties in Online Social Networks: An Exploratory Field Experiment, Management Information Systems Quarterly, 41(1): 115-130. DOI: 10.25300/MISQ/2017/41.1.06.
Bauman, A., Bachmann, R. (2017), Online Consumer Trust: Trends in Research, Journal of Technology Management and Innovation, 12(2): 68-79. DOI: 10.4067/S0718-27242017000200008.
Beldad, A., de Jong, M., Steehouder, M. (2010), How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust, Computers in Human Behavior, 26(5): 857-869. DOI: 10.1016/j.chb.2010.03.013.
Cook, K., Cheshire, C., Gerbasi, A., Aven, B. (2009), Assessing Trustworthiness in Providers, in: K. Cook, C. Snijders, V. Buskens, C. Cheshire (Eds.), eTrust: Forming relationships in the online world (pp. 189-214), New York: Russell Sage Foundation.
Coombes, P., Nicholson, J. (2013), Business models and their relationship in marketing:
a systematic literature review. Industrial Marketing Management, 42(5): 656–664. DOI: 10.1016/j.indmarman.2013.05.005.
Dietz, G. (2011), Going back to the source: Why do people trust each other?, Journal of Trust Research, 1(2): 215-222. DOI: 10.1080/21515581.2011.603514.
Edwards, J., Davey, J.D., Armstrong, K.A. (2013), Returning to the roots of culture: a review and reconceptualisation of safety culture, Safety Science, 55: 70-80. DOI: 10.1016/j.ssci.2013.01.004.
Friedman, B., Howe, D., Kahn, P. (2000), Trust online, Communications of the ACM, 43(12): 34–40. DOI: 10.1145/355112.355120.
Fukuyama, F. (1995), Trust: The Social Virtues and the Creation of Prosperity, New York: The Free Press.
Gambetta, D. (1988), Can we trust trust?, in: D. Gambetta (Eds.), Trust: Making and Breaking, Cooperative Relations (pp. 213-237), Oxford: Blackwell Publishing.
Gcaza, N., von Solms, R. (2017), Cybersecurity Culture: An Ill-Defined Problem. Retrieved: https://hal.inria.fr/hal-01690975/document (accessed 16 April 2021).
Gebayew, C., Hardini, I., Panjaitan, G., Kurniawan, N. (2018), A systematic literature review on digital transformation, Proceedings of the International Conference on Information Technology Systems and Innovation: 260–265. DOI: 10.1109/ICITSI.2018.8695912.
Geyskens, I., Steenkamp J.B.E.M., Kumar N. (1998), Generalizations about trust in marketing channel relationships using meta-analysis, International Journal of Research in Marketing 1998, 15: 223-248. DOI: 10.1016/S0167-8116(98)00002-0.
Golembiewski, R.T., McConkie, M. (1975), The centrality of interpersonal trust in group processes, in: G.L. Cooper (Eds.), Theories of group processes (pp. 131-185), London: John Wiley & Sons.
Grabner-Kräuter, S. (2002), The Role of Consumers’ Trust in Online-Shopping, Journal of Business Ethics, 39: 43–50. DOI: 10.1023/A:1016323815802.
Grabner-Kräuter, S., Kaluscha, A.E. (2008), Consumer trust in electronic commerce: conceptualization and classification of trust building measures, in: T. Kautonen and H. Karjaluoto (Eds.), Trust and New Technologies. Marketing and Management on the Internet and Mobile Media (pp. 3-22), Cheltenham-Northampton: Edward Elgar Publishing.
Guldenmund, F.W. (2000), The nature of safety culture: a review of theory and research, Safety Science, 34: 215-257. DOI: 10.1016/S0925-7535(00)00014-X.
Hoffman, D.L., Novak, T.P., Peralta, M. (1999), Building consumer trust in online environments: The case of information privacy, Communications of the ACM 1999, 42(4): 80-85. DOI: 10.1145/299157.299175.
Impellizzeri, F.M., Bizzini, M. (2012), Systematic Review and Meta-Analysis: A Primer,
The International Journal of Sports Physical Therapy, 7(5): 493-503.
Jarvenpaa, S., Rao, V. (2003), Trust in Online Consumer Exchanges: Emerging Conceptual and Theoretical Trends, in: M. Shaw (Eds.), The E-Commerce and the Digital Economy (pp. 229-246), New York: M.E. Sharpe, Inc.
Kacperska, E., Łukasiewicz, K. (2020), The Importance of Trust in Knowledge Sharing and the Efficiency of Doing Business on the Example of Tourism, Information, 11(6): 311. DOI: 10.3390/info11060311.
Kim, D.J., Ferin, D.L., Rao, H.R. (2008), A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents, Decision Support Systems, 44(2): 544-564. DOI: 10.1016/j.dss.2007.07.001.
Khan, W.Z., Aalsalem, M.Y., Khan, M.K., Arshad, Q. (2016), Enabling Consumer Trust Upon Acceptance of IoT Technologies Through Security and Privacy Model, in: J. Park, H. Jin, Y.S. Jeong and M. Khan (Eds.), Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering (pp. 111-117), New York: Springer.
Kramer, R.M., Tyler, T.R. (1996), Trust in Organizations: Frontiers of Theory and Research, Thousand Oaks-London-New Delhi: SAGE Publications.
Liberati, A., Altman, D.G., Tetzlaff, J., Mulrow, C., Gøtzsche, P.C., Ioannidis, J.P.A., Clarke, M., Devereaux, P.J., Kleijnen, J., Moher, D. (2009), The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration, Journal of Clinical Epidemiology, 62: e1-e34. DOI: 10.1136/bmj.b2700.
Marcella, A.J. (1999), Establishing trust in vertical markets, Altamonte Springs: The Institute of Internal Auditors.
Marcial, D.E., Launer, M.A. (2019), Towards the Measurement of Digital Trust in the Workplace: A Proposed Framework, International Journal of Scientific Engineering and Science, 3(12): 1-7.
Mattila, J., Seppälä, T. (2016), Digital Trust, Platforms, and Policy. Retrieved: https://ideas.repec.org/p/rif/briefs/42.html (accessed 15 April 2021).
Mayer, R.C., Davis, J.H., Schoorman, F.D. (1995), An Integrative Model of Organizational Trust, Academy of Management Review, 20(3): 709-734. DOI: 10.2307/258792.
McKnight, D.H., Choudhury, V., Kacmar, Ch. (2002), Developing and validating trust measures for e-commerce: An integrative typology, Information Systems Research, 13(3): 334-359. DOI: 10.1287/isre.13.3.334.81.
Metalidou, E., Marinagi, C., Trivellas, P., Eberhagen, N., Skourlas, C., Giannakopoulos,
G. (2014), The Human Factor of Information Security: Unintentional Damage Perspective, Social and Behavioral Sciences, 147: 424–428. DOI: 10.1016/j.sbspro.2014.07.133.
Mollering, G. (2006), Trust: Reason, Routine, Reflexivity, Oxford: Elsevier.
Okoli, C., Mbarika, V.W., McCoy, A. (2010), The effects of infrastructure and policy on e-business in Latin America and SubSaharan Africa, Europe Journal Information System, 1(19): 5-20. DOI: 10.1057/ejis.2009.48.
Parente, S.L., Prescott, E.C. (1994), Barriers to technology adoption and development, Journal Politic Economy, 2(102): 298–321.
Pavlou, P.A. (2003), Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model, International Journal of Electronic Commerce, 7(3): 69-103. DOI: 10.1080/10864415.2003.11044275.
Petticrew, M., Roberts, H. (2006), How to appraise the studies: an introduction to assessing study quality, in: M. Petticrew and H. Roberts (Eds.), Systematic Reviews in the Social Sciences: A Practical Guide (pp.125-163), Oxford: Blackwell Publishing.
Pohjola, M. (2003), The adoption and diffusion of ICT across countries: patterns and determinants, in: D.C. Jones (Eds.), The new economy handbook (pp. 77-100), New York: Elsevier.
Reegård, K., Blackett, C., Katta, V. (2019), The Concept of Cybersecurity Culture, Proceedings of the 29th European Safety and Reliability Conference 2019: 4036-4043. DOI: 10.3850/978-981-11-2724-3_0761-cd.
Reid, R., van Niekerk, J. (2014), From Information Security to Cyber Security Cultures Organizations to Societies. Retrieved: https://digifors.cs.up.ac.za/issa/2014/Proceedings/ Full/42_Paper.pdf (accessed 15 April 2021).
Reis, J., Amorim, M., Melão, N., Matos, P. (2018), Digital Transformation: A Literature Review and Guidelines for Future Research, in: Á. Rocha, H. Adeli, L.P. Reis and
S. Costanzo (Eds.), Trends and Advances in Information Systems and Technologies (pp. 411-421), Cham: Springer.
Sauser, W.I., Jr. (2008), Crafting a Culture of Character. The Role of the Executive Suite, in: S.A. Quatro S.A., R.R. Sims (Eds.), Executive Ethics: Ethical Dilemmas and Challenges for the C-Suite (pp. 1-18), Charlotte, NC: Information Age Publishing.
Seleznyov, A., Ahmed, M.O, Hailes, S. (2004), Co-Operation in the Digital Age - Engendering Trust in Electronic Environments, BT Technology Journal, 22: 95–105. DOI: 10.1023/B:BTTJ.0000047124.46203.fc.
Selke, S., Mallick, B., Holzbach, A. (2008), e-Honesty: Technical Potentials and Social Risks of Local e-Government Strategies in Bangladesh for Supporting the Fight Against Corruption, Proceedings of the 8th European Conference on E-Government: 475-482.
Shankar, V., Urban, G.L., Sultan, F. (2002), Online trust: A stakeholder perspective, concepts, implications, and future directions, Journal of Strategic Information Systems, 11(3): 325-344. DOI: 10.1016/S0963-8687(02)00022-7.
Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R.P., Markantonakis, K., Akram, R.N., Sauveron, D., Conchon, E. (2016), Secure and Trusted Execution: Past, Present and Future -
A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems, 2016 IEEE Trustcom/BigDataSE/ISPA 2016: 168-177. DOI: 10.1109/TrustCom. 2016.0060.
Smith, J.B., Barclay, D.W. (1997), The Effects of Organizational Differences and Trust on the Effectiveness of Selling Partner Relationships, Journal of Marketing, 61: 3-21.DOI: 10.2307/1252186.
Snyder, H., Witell, L., Gustafsson, A., Fombelle, P., Kristensson, P. (2016), Identifying categories of service innovation: A review and synthesis of the literature, Journal of Business Research, 69(7): 2401-2408. DOI: 10.1016/j.jbusres.2016.01.009.
Taddeo, M. (2009), Defining Trust and E-Trust, International Journal of Technology and Human Interaction, 5(2): 23-35. DOI: 10.4018/jthi.2009040102.
Tranfield, D., Denyer, D., Smart, P. (2003), Towards a methodology for developing evidence-informed management knowledge by means of systematic review, British Journal of Management, 14: 207-222. DOI: 10.1111/1467-8551.00375.
Uzelac, A. (2008), How to understand digital culture: Digital culture - a resource for
a knowledge society?, in: A. Uzelac, B. Cvjetièanin, (Eds.), Digital Culture: The Changing Dynamics (pp. 7-24), Zagreb: Institute for International Relations.
Van Niekerk, J.F., von Solms, R. (2010), Information security culture: A management perspective, Computers & Security, 29: 476-486. DOI: 10.1016/j.cose.2009.10.005.
Walter, F., Smallbone D. (2006), Exploring the Role of Trust in Entrepreneurial Activity, Entrepreneurship Theory and Practice, 30(4): 465-475. DOI: 10.1111/j.1540-6520.2006.00130.x.
Wang, Y.D., Emurian, H. (2005), An Overview of Online Trust: Concepts, Elements, and Implications, Computers in Human Behavior, 21: 105-125. DOI: 10.1016/j.chb.2003. 11.008.
Wiegmann, D.A., Zhang, H., von Thaden, T.L., Sharma, G., Mitchell Gibbons, A. (2004), Safety Culture: An Integrative Review, The International Journal of Aviation Psychology, 14(2): 117-134. DOI: 10.1207/s15327108ijap1402_1.
Witell, L., Snyder, H., Gustafsson, A., Fombelle, P., Kristensson, P. (2016), Defining service innovation: A review and synthesis, Journal of Business Research, 69(8): 2863-2872. DOI: 10.1016/j.jbusres.2015.12.055.
Wong, S.T.C. (1996), A Cryptologic Based Trust Center for Medical Images, Journal of the American Medical Informatics Association, 3(6): 410-421. DOI: 10.1136/jamia.1996. 97084514.
Young, L.C., Wilkinson I.F. (1989), The role of trust and cooperation in marketing channels:
a preliminary study, European Journal of Marketing, 32: 109-122.
Zeira, J. (1998), Workers, machines, and economic growth, Quarto Journal Economy, 4(13): 1091–1117.