{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:12:22Z","timestamp":1775754742171,"version":"3.50.1"},"reference-count":33,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T00:00:00Z","timestamp":1112313600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2005,4]]},"DOI":"10.1108\/09685220510589299","type":"journal-article","created":{"date-parts":[[2005,4,26]],"date-time":"2005-04-26T02:00:06Z","timestamp":1114480806000},"page":"106-120","source":"Crossref","is-referenced-by-count":182,"title":["An empirical study of the effect of perceived risk upon intention to use online applications"],"prefix":"10.1108","volume":"13","author":[{"given":"Hsi\u2010Peng","family":"Lu","sequence":"first","affiliation":[]},{"given":"Chin\u2010Lung","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Hsiu\u2010Ying","family":"Hsu","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"b1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00026-3"},{"key":"b3","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(01)00111-7"},{"key":"b4","doi-asserted-by":"publisher","DOI":"10.1145\/228503.228509"},{"key":"b5","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1996.11518128"},{"key":"b6","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00127-6"},{"key":"b7","doi-asserted-by":"publisher","DOI":"10.1145\/217278.217285"},{"key":"b9","doi-asserted-by":"publisher","DOI":"10.1007\/BF02310555"},{"key":"b11","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"b12","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.35.8.982"},{"key":"b13","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00101-3"},{"key":"b14","doi-asserted-by":"crossref","unstructured":"Dowling, R. and Staelin, R. (1994), \u201cA model of perceived risk and intended risk\u2010handling activity\u201d,Journal of Consumer Research, Vol. 21 No. 6, pp. 110\u201034.","DOI":"10.1086\/209386"},{"key":"b15","doi-asserted-by":"crossref","unstructured":"Hong, W.J., Thong, J.Y.L., Wong, W.M. and Tam, K.Y. (2002), \u201cDeterminants of user acceptance of digital libraries: an empirical examination of individual differences and system characteristics\u201d,Journal of Management Information Systems, Vol. 18 No. 3, pp. 97\u2010124.","DOI":"10.1080\/07421222.2002.11045692"},{"key":"b16","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1996.11518115"},{"key":"b18","doi-asserted-by":"publisher","DOI":"10.1037\/h0036657"},{"key":"b19","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.2.205.83"},{"key":"b20","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(00)00076-2"},{"key":"b21","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(00)00005-0"},{"key":"b22","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(97)00029-7"},{"key":"b23","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(00)00059-8"},{"key":"b24","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000358"},{"key":"b25","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.173"},{"key":"b26","doi-asserted-by":"publisher","DOI":"10.1145\/506724.506730"},{"key":"b27","doi-asserted-by":"publisher","DOI":"10.1080\/02642069300000068"},{"key":"b28","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(00)00061-6"},{"key":"b30","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.2.208.9697"},{"key":"b31","doi-asserted-by":"publisher","DOI":"10.2307\/1250565"},{"key":"b32","doi-asserted-by":"publisher","DOI":"10.1108\/02635570210450181"},{"key":"b33","doi-asserted-by":"publisher","DOI":"10.2307\/249621"},{"key":"b34","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.42.1.85"},{"key":"b35","doi-asserted-by":"crossref","unstructured":"Tan, M. and Teo, T.S.H. (2000), \u201cFactors influencing the adoption of internet banking\u201d,Journal of the AIS, Vol. 1 No. 5, available at: http:\/\/jais.isworld.org\/articles\/1\u20105\/.","DOI":"10.17705\/1jais.00005"},{"key":"b36","doi-asserted-by":"publisher","DOI":"10.1108\/07363769910260515"},{"key":"b37","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(98)00028-0"},{"key":"b38","unstructured":"Vivo, M., Vivo, G.O. and Isern, G. (1998), \u201cInternet security attacks at the basic levels\u201d,Communications of the ACM, Vol. 32 No. 2, pp. 4\u201015."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510589299","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220510589299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:53Z","timestamp":1753402133000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/13\/2\/106-120\/183977"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,4]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2005,4]]}},"alternative-id":["10.1108\/09685220510589299"],"URL":"https:\/\/doi.org\/10.1108\/09685220510589299","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[2005,4]]}}}