{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T12:30:03Z","timestamp":1773405003953,"version":"3.50.1"},"reference-count":15,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[1999,12,1]],"date-time":"1999-12-01T00:00:00Z","timestamp":944006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999,12,1]]},"abstract":"<jats:p>Examines the general requirement for security technologies in order to provide a basis for trust in the e\u2010commerce environment. The discussion is supported by the findings from two surveys, conducted by the authors, among general Internet users (i.e. potential target consumers) and commercial businesses. These surveys considered both the attitudes to e\u2010commerce in general and opinions relating to the associated security requirements. Attempts were also made to assess the respondent\u2019s knowledge of the existing security safeguards that may be applied. The survey results suggest that, while there is significant concern among Internet\u2010based consumers regarding the security of their purchasing activities, these are outweighed by the merits offered by the medium. The results also suggested a lack of awareness or understanding of the security technologies that are available and it is concluded that overcoming this problem would help to establish a wider foundation of trust in the new technology.<\/jats:p>","DOI":"10.1108\/10662249910297778","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"372-382","source":"Crossref","is-referenced-by-count":142,"title":["Security implications of electronic commerce: a survey of consumers and businesses"],"prefix":"10.1108","volume":"9","author":[{"given":"S.M.","family":"Furnell","sequence":"first","affiliation":[]},{"given":"T.","family":"Karweni","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022032020462465200_B1","unstructured":"Anderson Consulting (1998), \u201cYour choice. How eCommerce could impact Europe\u2019s future\u201d, Anderson Consulting http:\/\/www.ac.com\/services\/ecommerce\/ecomrept.pdf"},{"key":"key2022032020462465200_B2","unstructured":"Audit Commission (1998), Ghost in the Machine \u2013 An Analysis of IT Fraud and Abuse, Audit Commission Publications, February."},{"key":"key2022032020462465200_B3","unstructured":"Bicknell, D. (1998), \u201cSecurity flaw strikes at E\u2010commerce users\", Computer Weekly, 2 July, p. 2."},{"key":"key2022032020462465200_B4","unstructured":"Bicknell, D. (1999a), \u201cMPs to release report early in bid to kill off key escrow\u201d, Computer Weekly, 13 May, p. 2."},{"key":"key2022032020462465200_B5","unstructured":"Bicknell, C. (1999b), \u201cE\u2010commerce pirates on the Prowl\u201d, Wired News, 12 May. http:\/\/www.wired.com\/news\/news\/business\/story\/19600.html."},{"key":"key2022032020462465200_B6","unstructured":"Chelmsford, J. (1999), \u201cForward\u201d, Electronic Commerce & Public Policy, Supplement to Information Technology & Public Policy, Journal of the Parliamentary Information Technology Committee, Spring, p. 1."},{"key":"key2022032020462465200_B7","doi-asserted-by":"crossref","unstructured":"Dierks, T. and Allen, C. (1999), \u201cThe TLS Protocol Version 1.0\u201d, RFC 2246, The Internet Society, January.","DOI":"10.17487\/rfc2246"},{"key":"key2022032020462465200_B8","unstructured":"DTI (1999), \u2018\u2018Building confidence in electronic commerce \u2013 a consultation document\u201d, Department of Trade & Industry. Document reference URN 99\/642."},{"key":"key2022032020462465200_B9","unstructured":"European Commission (1997), \u201cEnsuring security and trust in electronic communication \u2013 towards a European framework for digital signatures and encryption\u201d, European Commission Directorate\u2010General XIII, COM (97), p. 503."},{"key":"key2022032020462465200_B10","unstructured":"Frier, A., Karlton, P. and Kocher, P. (1996), The SSL 3.0 Protocol, Netscape Communications Corp., 18 November."},{"key":"key2022032020462465200_B11","doi-asserted-by":"crossref","unstructured":"Hancock, B. (1999), \u201cSecurity views\u201d, Computers & Security, Vol. 18 No. 3, pp. 184\u201098.","DOI":"10.1016\/S0167-4048(99)90912-4"},{"key":"key2022032020462465200_B12","unstructured":"Howell, D. (1998), \u201cCash in your chips\u201d, T3, August, pp. 51\u20103."},{"key":"key2022032020462465200_B13","unstructured":"KPMG (1998), Information Security Survey 1998, KPMG Information Risk Management, London, UK. http:\/\/www.kpmg.co.uk."},{"key":"key2022032020462465200_B14","doi-asserted-by":"crossref","unstructured":"Ratnasingham, P. (1998), \u201cThe importance of trust in electronic commerce\u201d, Internet Research, Vol. 8 No. 4, pp. 313\u201021.","DOI":"10.1108\/10662249810231050"},{"key":"key2022032020462465200_B15","unstructured":"SETCo. (1997), \u201cSET secure electronic transaction specification \u2013 Book 1: business description\u201d, Version 1.0. 31 May 1997. http:\/\/www.setco.org\/set_specifications.html"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662249910297778","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249910297778\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249910297778\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:41:02Z","timestamp":1753400462000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/9\/5\/372-382\/178010"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,12,1]]},"references-count":15,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1999,12,1]]}},"alternative-id":["10.1108\/10662249910297778"],"URL":"https:\/\/doi.org\/10.1108\/10662249910297778","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[1999,12,1]]}}}