{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T05:38:52Z","timestamp":1770961132890,"version":"3.50.1"},"reference-count":16,"publisher":"Emerald","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,10,1]]},"abstract":"<jats:p>Electronic commerce is about business. Businesses are built on relationships and relationships are built on trust, especially in today\u2019s virtual competitive world. Trust is an essential ingredient for electronic commerce in creating loyal and very satisfied customers. This paper discusses the concept of trust and its importance for secure electronic commerce.<\/jats:p>","DOI":"10.1108\/09685229810227667","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"162-166","source":"Crossref","is-referenced-by-count":33,"title":["Trust in Web-based electronic commerce security"],"prefix":"10.1108","volume":"6","author":[{"given":"Pauline","family":"Ratnasingham","sequence":"first","affiliation":[{"name":"Department of Information Systems, University of Melbourne, Victoria, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"2025072819530128100_b1","unstructured":"Bernstein, T\n          . et al. (1996), Internet Security for Business, John Wiley & Sons, New York, NY, p. 23."},{"key":"2025072819530128100_b2","unstructured":"Clarke, R.\n           (1997), Promises and Threats in Electronic Commerce, http:\/\/www.anu.edu.u\/ people\/Roger.Clarke\/EC\/Quantum.html."},{"key":"2025072819530128100_b3","doi-asserted-by":"crossref","unstructured":"Cummings, L.L.\n           and Bromiley, P. (1996), \u201cThe organizational trust inventory (OTI): development and validation\u201d, in Kramer, R.M. and Tyler, T.R. (Eds), Trust in Organizations: Frontiers of Theory and Research, Sage Publications, Thousand Oaks, CA, pp. 302-20.","DOI":"10.4135\/9781452243610.n15"},{"issue":"1","key":"2025072819530128100_b4","doi-asserted-by":"crossref","first-page":"85","DOI":"10.2307\/256729","article-title":"Does familiarity breed trust? The implications of repeated ties for contractual choice in alliances","volume":"38","author":"Gulati","year":"1995","journal-title":"Academy of Management Journal"},{"issue":"3","key":"2025072819530128100_b5","first-page":"40","article-title":"Trust and the virtual organisation","volume":"73","author":"Handy","year":"1995","journal-title":"Harvard Business Review"},{"issue":"1","key":"2025072819530128100_b6","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1287\/orsc.8.1.23","article-title":"Power and trust: critical factors in the adoption and use of electronic data interchange","volume":"8","author":"Hart","year":"1997","journal-title":"Organization Science"},{"key":"2025072819530128100_b7","unstructured":"Jarvenpaa, S.L.\n           and Leidner, D. (1997), \u201cDo you read me? The development and maintenance of trust in global virtual teams\u201d, Organization Science, Communication Processes for Virtual Organizations.."},{"key":"2025072819530128100_b8","doi-asserted-by":"crossref","unstructured":"Kipnis, D.\n           (1996), Trust and Technology, Trust in Organizations: Frontiers of Theory and Research, Sage Publications, Thousand Oaks, CA, pp. 39-50.","DOI":"10.4135\/9781452243610.n3"},{"key":"2025072819530128100_b9","doi-asserted-by":"crossref","unstructured":"Kramer, R.M.\n           and Tyler, T.R. (1996), \u201cWhither trust?\u201d, in Kramer, R.M. and Tyler, T.R. (Eds), Trust in Organizations: Frontiers of Theory and Research, Sage Publications, Thousand Oaks, CA.","DOI":"10.4135\/9781452243610"},{"key":"2025072819530128100_b10","doi-asserted-by":"crossref","unstructured":"Lewicki, R.J.\n           and Bunker, B.B. (1996), \u201cDeveloping and maintaining trust in work relationships\u201d, in Kramer, R.M. and Tyler, T.R. (Eds), Trust in Organizations: Frontiers of Theory and Research, Sage Publications, Thousand Oaks, CA, pp. 114-39.","DOI":"10.4135\/9781452243610.n7"},{"issue":"3","key":"2025072819530128100_b11","doi-asserted-by":"crossref","first-page":"709","DOI":"10.2307\/258792","article-title":"An integrative model of organizational trust","volume":"20","author":"Mayer","year":"1995","journal-title":"Academy of Management Review"},{"key":"2025072819530128100_b12","doi-asserted-by":"crossref","unstructured":"Miles, R.E.\n           and Snow, C.C. (1992), \u201cCauses of failure in network organizations\u201d, California Management Review, Summer, pp. 53-72.","DOI":"10.2307\/41166703"},{"key":"2025072819530128100_b13","doi-asserted-by":"crossref","unstructured":"Mishra, A.K.\n           (1996), Organizational Responses to Crisis - The Centrality of Trust, Trust in Organizations: Frontiers of Theory and Research, Sage Publications, Thousand Oaks, CA, pp. 261-87.","DOI":"10.4135\/9781452243610.n13"},{"key":"2025072819530128100_b14","unstructured":"Nohria, N.\n           and Eccles, R.G. (1992), \u201cFace-to-face: making network organizations work\u201d, in Nohria, N. and Eccles, R.G. (Eds), Networks and Organizations, Harvard Business School Press, Boston, MA, pp. 288-308."},{"key":"2025072819530128100_b15","doi-asserted-by":"crossref","unstructured":"Shapiro, D.\n          , Sheppard, B.H. and Cheraskin, L. (1992), \u201cBusiness on a handshake\u201d, The Negotiation Journal, October, pp. 365-78.","DOI":"10.1111\/j.1571-9979.1992.tb00679.x"},{"key":"2025072819530128100_b16","unstructured":"TRUSTe\n           (http:\/\/www.etrust.org\/users\/ abouttruste.html)."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810227667\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/6\/4\/162\/1246892\/09685229810227667.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/6\/4\/162\/1246892\/09685229810227667.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T23:53:09Z","timestamp":1753746789000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ics\/article\/6\/4\/162\/182346\/Trust-in-Web-based-electronic-commerce-security"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,10,1]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1998,10,1]]}},"URL":"https:\/\/doi.org\/10.1108\/09685229810227667","relation":{},"ISSN":["0968-5227","1758-5805"],"issn-type":[{"value":"0968-5227","type":"print"},{"value":"1758-5805","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998,10,1]]}}}