{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:13:31Z","timestamp":1767626011426,"version":"3.41.2"},"reference-count":21,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[1998,3,1]],"date-time":"1998-03-01T00:00:00Z","timestamp":888710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,3,1]]},"abstract":"<jats:p>While the term \u201celectronic commerce\u201d was a buzzword in the early 1990s, it has fast become an essential business tool as we approach the next century. In traditional EDI many of these transactions already occur electronically, but require prior arrangements and dedicated lines or VANs. The resulting costs and lead times of the VANs create entry barriers to widespread small business participation, hindering expansion of EDI beyond large organisations and their major trading partners. Conversely, more organisations are using or considering using the Internet for electronic commerce and EDI. The Internet\u2010based EDI is viable and is becoming an essential element of value\u2010added\u2010network services. The downside is that Internet EDI lacks security and does not guarantee delivery. The potential for fraud and deception is far greater. The ability to tap into information around the clock from almost anywhere in the world is perceived as a benefit of electronic commerce. Misconceptions must be overcome before it can be deemed suitable for electronic commerce. Commonly expressed concerns include reliability, security, scalability, ease of use and payment. <\/jats:p>","DOI":"10.1108\/09685229810207434","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"33-39","source":"Crossref","is-referenced-by-count":38,"title":["Internet\u2010based EDI trust and security"],"prefix":"10.1108","volume":"6","author":[{"given":"Pauline","family":"Ratnasingham","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2022031020370715700_b1","doi-asserted-by":"crossref","unstructured":"Applegate, L.M., Holsapple, C.W., Kalakota, R., Radermacher, F.J. and Whinston, A.B (1996, \u201cElectronic commerce: building blocks of new business opportunity\u201d, Journal of Organizational Computing and Electronic Commerce, Vol. 6 No. 1, pp. 1\u201010.","DOI":"10.1080\/10919399609540264"},{"key":"key2022031020370715700_b2","unstructured":"Baskerville, R. (1988, Designing Information Systems Security, John Wiley Information Systems, John Wiley & Sons, NJ."},{"key":"key2022031020370715700_b3","doi-asserted-by":"crossref","unstructured":"Bequai, A. (1996a, \u201cSecuring electronic commerce with digital signatures\u201d, Computer Audit Update, July, pp. 28\u201032.","DOI":"10.1016\/0960-2593(96)88550-8"},{"key":"key2022031020370715700_b4","doi-asserted-by":"crossref","unstructured":"Bequai, A. (1996b, \u201cThe embattled Internet\u201d, Computer Audit Update, May, pp. 23\u20106.","DOI":"10.1016\/0960-2593(96)84797-5"},{"key":"key2022031020370715700_b5","doi-asserted-by":"crossref","unstructured":"Bhimani, A. (1996, \u201cSecuring the commercial Internet\u201d, Communications of the ACM, Vol. 39 No. 6, June, pp 29\u201035.","DOI":"10.1145\/228503.228509"},{"key":"key2022031020370715700_b6","doi-asserted-by":"crossref","unstructured":"Borenstein, N.S. (1996, \u201cPerils and pitfalls of practical cybercommerce\u201d, Communications of the ACM, June, Vol. 39 No. 6, pp. 36\u201044.","DOI":"10.1145\/228503.228510"},{"key":"key2022031020370715700_b7","unstructured":"Clarke, R. (1997, Promises and Threats in Electronic Commerce, http:\/\/www.anu.edu.u\/\npeople\/Roger.Clarke\/EC\/Quantum.html."},{"key":"key2022031020370715700_b8","unstructured":"Drummond, R. (1995, \u201cSafe and secure electronic commerce\u201d, Network Computing, December, Vol. 7 No. 19, pp. 116\u201021."},{"key":"key2022031020370715700_b9","unstructured":"Hruska, S. (1995, \u201cThe Internet: a strategic backbone for EDI?\u201d, EDI Forum, Vol. 8 No. 4, pp. 83\u20105."},{"key":"key2022031020370715700_b10","unstructured":"Hudoklin, A. and Stadler, A. (1997, \u201cSecurity and privacy of electronic commerce\u201d, Tenth EDI\u2010IOS Conference in Organisational Systems, Bled, Slovenia, June 9\u201011, pp. 523\u201031."},{"key":"key2022031020370715700_b11","doi-asserted-by":"crossref","unstructured":"Kalakota, R. and Whinston, B. (1996, Frontiers of Electronic Commerce, Addison\u2010Wesley Publishing Co Inc.","DOI":"10.1109\/TCPMC.1996.507151"},{"key":"key2022031020370715700_b12","unstructured":"Mak, H.C. and Johnston, R.B. (1997, \u201cA survey of Internet strategies for EDI\u201d, CoLLECTer Conference, Adelaide, pp. 126\u201041."},{"key":"key2022031020370715700_b13","doi-asserted-by":"crossref","unstructured":"Menkus, B. (1992, \u201cIntroduction to computer security\u201d, Computers and Security, Vol. 11, pp. 121\u20107.","DOI":"10.1016\/0167-4048(92)90036-Q"},{"key":"key2022031020370715700_b14","unstructured":"Muiznieks, V. (1995, \u201cThe Internet and EDI\u201d, Telecommunications, November, pp. 45\u20108."},{"key":"key2022031020370715700_b15","doi-asserted-by":"crossref","unstructured":"Nejmeh, B.A. (1994, \u201cInternet: a strategic tool for the software enterprise\u201d, Communications of the ACM, Vol. 37 No. 11, pp. 23\u20107.","DOI":"10.1145\/188280.188288"},{"key":"key2022031020370715700_b16","doi-asserted-by":"crossref","unstructured":"Pethia, R., Crocker, S. and Fraser, B. (1991, Guidelines for the Secure Operation of the Internet, http:\/\/andrew2.andrew.cmu.du\/rfc\/rfc1281.\nhtml.","DOI":"10.17487\/rfc1281"},{"key":"key2022031020370715700_b17","doi-asserted-by":"crossref","unstructured":"Pyle, R. (1996, \u201cElectronic commerce and the Internet\u201d, Communications of the ACM, June, Vol. 39 No. 6, p. 23.","DOI":"10.1145\/228503.228507"},{"key":"key2022031020370715700_b18","doi-asserted-by":"crossref","unstructured":"Ratnasingham, P. and Swatman, P.A. (1997, \u201cSecurity in the EDI Context\u201d, First Pacific\u2010Asia Workshop in Electronic Commerce (PAWEC), April 5, Queensland University of Technology, Brisbane.","DOI":"10.1108\/09685229710182848"},{"key":"key2022031020370715700_b19","unstructured":"SIMBA\/Communication Trends (1994, The Future of Electronic Commerce Explored at EM 2000."},{"key":"key2022031020370715700_b20","unstructured":"The Age (1997), \u201cElectronic commerce or perish\u201d, November 17, p. 20."},{"key":"key2022031020370715700_b21","doi-asserted-by":"crossref","unstructured":"Zwass, V. (1996, \u201cElectronic commerce: structures and issues\u201d, International Journal of Electronic Commerce, Fall, Vol. 1 No. 1, pp. 3\u201023.","DOI":"10.1080\/10864415.1996.11518273"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229810207434","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810207434\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810207434\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:47Z","timestamp":1753402187000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/6\/1\/33-39\/174312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,3,1]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1998,3,1]]}},"alternative-id":["10.1108\/09685229810207434"],"URL":"https:\/\/doi.org\/10.1108\/09685229810207434","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1998,3,1]]}}}