{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:00:48Z","timestamp":1754157648457,"version":"3.41.2"},"reference-count":5,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2000,8,1]],"date-time":"2000-08-01T00:00:00Z","timestamp":965088000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000,8,1]]},"abstract":"<jats:p>The major reason why most people are still sceptical about electronic commerce is the perceived security risks associated with electronic transactions over the Internet. The Internet, however, holds many opportunities that could mean survival or competitive advantage for many organisations. To exploit these opportunities, it is important to first analyse the risks they hold. Electronic commerce is based on business as well as technological risks, making it a very difficult environment to secure. Apart from these two types of risk categories there are several other issues and problems that need to be addressed.<\/jats:p>","DOI":"10.1108\/09685220010372582","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"154-157","source":"Crossref","is-referenced-by-count":13,"title":["Electronic commerce: the information\u2010security challenge"],"prefix":"10.1108","volume":"8","author":[{"given":"L.","family":"Labuschagne","sequence":"first","affiliation":[]},{"given":"J.H.P.","family":"Eloff","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2021010604463796600_B1","unstructured":"Badenhorst, K.P. and Eloff, J.H.P. (1994), \u201cTOPM: a formal approach to optimization of information technology risk management\u201d, Computers & Security, Vol. 13 No. 5, Elsevier Science Ltd, pp. 411\u201035."},{"key":"key2021010604463796600_B2","unstructured":"Carrol, J.M. (1996), Computer Security, Butterworth\u2010Heinemann, USA."},{"key":"key2021010604463796600_B3","unstructured":"Ernst & Young (1998), Internet Shopping \u2013 An Ernst & Young Special Report, Section 2, January."},{"key":"key2021010604463796600_B4","unstructured":"Foresight (1998), \u201cE\u2010commerce sets new rules\u201d, Systems Relationships Marketing, on behalf of Datatec Ltd, Vol. 1 No. 3, November."},{"key":"key2021010604463796600_B5","doi-asserted-by":"crossref","unstructured":"Straub, D.W. and Welke, R.J. (1998), \u201cCoping with systems risk: security planning models for management decision making\u201d, MIS Quarterly, December.","DOI":"10.2307\/249551"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220010372582","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220010372582\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220010372582\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:33Z","timestamp":1753402113000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/8\/3\/154-157\/185343"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,8,1]]},"references-count":5,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2000,8,1]]}},"alternative-id":["10.1108\/09685220010372582"],"URL":"https:\/\/doi.org\/10.1108\/09685220010372582","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2000,8,1]]}}}