{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:14:32Z","timestamp":1766268872258},"reference-count":18,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2004,5,1]],"date-time":"2004-05-01T00:00:00Z","timestamp":1083369600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information &amp; Management"],"published-print":{"date-parts":[[2004,5]]},"DOI":"10.1016\/s0378-7206(03)00090-9","type":"journal-article","created":{"date-parts":[[2003,9,16]],"date-time":"2003-09-16T18:58:25Z","timestamp":1063738705000},"page":"561-575","source":"Crossref","is-referenced-by-count":16,"title":["Digital signature: use and modification to achieve success in next generational e-business processes"],"prefix":"10.1016","volume":"41","author":[{"given":"Alok","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Y.Alex","family":"Tung","sequence":"additional","affiliation":[]},{"given":"James R.","family":"Marsden","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0378-7206(03)00090-9_BIB1","unstructured":"American Bar Association, Digital Signature Guidelines Tutorial, Posted at ABA site: http:\/\/www.abanet.org\/scitech\/ec\/isc\/dsg-tutorial.html, 2001."},{"key":"10.1016\/S0378-7206(03)00090-9_BIB2","doi-asserted-by":"crossref","unstructured":"J.P. Campbell Jr., Speaker recognition: a tutorial, Proceedings of the IEEE 85 (9) (1997) 1437\u20131463.","DOI":"10.1109\/5.628714"},{"issue":"11","key":"10.1016\/S0378-7206(03)00090-9_BIB3","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1109\/34.244676","article-title":"High confidence visual recognition of persons by a test of statistical independence","volume":"15","author":"Daugman","year":"1993","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"4","key":"10.1016\/S0378-7206(03)00090-9_BIB4","doi-asserted-by":"crossref","first-page":"304","DOI":"10.5912\/jcb447","article-title":"Security issues for systems used for collecting, storing and interpreting human biological data","volume":"8","author":"Harrison","year":"2002","journal-title":"Journal of Commercial Biotechnology"},{"issue":"2","key":"10.1016\/S0378-7206(03)00090-9_BIB5","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1145\/328236.328110","article-title":"Biometric identification","volume":"43","author":"Jain","year":"2000","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0378-7206(03)00090-9_BIB6","doi-asserted-by":"crossref","unstructured":"A.K. Jain, L. Hong, S. Pankanti, R. Bolle, An identity-authentication system using fingerprints, Proceedings of the IEEE 85 (9) (1997) 1365\u20131388.","DOI":"10.1109\/5.628674"},{"issue":"3","key":"10.1016\/S0378-7206(03)00090-9_BIB7","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/0377-2217(87)90041-5","article-title":"MEDIATOR: towards a negotiation support system","volume":"31","author":"Jarke","year":"1987","journal-title":"European Journal of Operational Research"},{"issue":"8","key":"10.1016\/S0378-7206(03)00090-9_BIB8","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1016\/S0378-7206(01)00071-4","article-title":"Security threats to Internet: a Korean multi-industry investigation","volume":"38","author":"Jung","year":"2001","journal-title":"Information and Management"},{"issue":"3","key":"10.1016\/S0378-7206(03)00090-9_BIB9","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1080\/07421222.1992.11517966","article-title":"A theoretical perspective of negotiation support systems","volume":"9","author":"Lim","year":"1992","journal-title":"Journal of Management Information Systems"},{"issue":"10","key":"10.1016\/S0378-7206(03)00090-9_BIB10","doi-asserted-by":"crossref","first-page":"1325","DOI":"10.1287\/mnsc.37.10.1325","article-title":"Information technology for negotiating groups: generating options for mutual gain","volume":"37","author":"Nunamaker","year":"1991","journal-title":"Management Science"},{"issue":"5","key":"10.1016\/S0378-7206(03)00090-9_BIB11","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1145\/253769.253802","article-title":"Internet security: firewalls and beyond","volume":"40","author":"Oppliger","year":"1997","journal-title":"Communications of the ACM"},{"issue":"8","key":"10.1016\/S0378-7206(03)00090-9_BIB12","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1287\/mnsc.43.8.1147","article-title":"Using computers to realize joint gains in negotiations: toward an electronic bargaining table","volume":"43","author":"Rangaswamy","year":"1997","journal-title":"Management Science"},{"issue":"3","key":"10.1016\/S0378-7206(03)00090-9_BIB13","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/S0378-7206(97)00013-X","article-title":"Evaluating security threats in mainframe and client\/server environments","volume":"32","author":"Ryan","year":"1997","journal-title":"Information and Management"},{"issue":"6","key":"10.1016\/S0378-7206(03)00090-9_BIB14","first-page":"72","article-title":"Use of electronic signatures: past and present","volume":"56","author":"Sausser","year":"2002","journal-title":"Healthcare Financial Management"},{"key":"10.1016\/S0378-7206(03)00090-9_BIB15","unstructured":"B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, second ed., Wiley, New York, 1996."},{"issue":"1","key":"10.1016\/S0378-7206(03)00090-9_BIB16","doi-asserted-by":"crossref","first-page":"29","DOI":"10.2307\/249710","article-title":"Electronic document management: challenges and opportunities for information systems managers","volume":"19","author":"Sprague","year":"1995","journal-title":"MIS Quarterly"},{"key":"10.1016\/S0378-7206(03)00090-9_BIB17","doi-asserted-by":"crossref","unstructured":"R.P. Wildes, Iris recognition: an emerging biometric technology, Proceedings of the IEEE 85 (9) (1997) 1348\u20131364.","DOI":"10.1109\/5.628669"},{"key":"10.1016\/S0378-7206(03)00090-9_BIB18","doi-asserted-by":"crossref","unstructured":"J. Zhang, Y. Yan, M. Lades, Face recognition: eigenface, elastic matching, and neural nets, Proceedings of the IEEE 85 (9) (1997) 1423\u20131436.","DOI":"10.1109\/5.628712"}],"container-title":["Information &amp; Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0378720603000909?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0378720603000909?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T03:56:34Z","timestamp":1550980594000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0378720603000909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,5]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2004,5]]}},"alternative-id":["S0378720603000909"],"URL":"https:\/\/doi.org\/10.1016\/s0378-7206(03)00090-9","relation":{},"ISSN":["0378-7206"],"issn-type":[{"value":"0378-7206","type":"print"}],"subject":[],"published":{"date-parts":[[2004,5]]}}}