{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T14:29:27Z","timestamp":1773239367830,"version":"3.50.1"},"reference-count":23,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2004,6,1]],"date-time":"2004-06-01T00:00:00Z","timestamp":1086048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,6,1]]},"abstract":"<jats:p>The information revolution, coupled with the strategic leveraging of the Internet, has exposed a number of relatively open societies to the dangers of cybercriminal and cyberterrorist acts, especially in commercial business transactions. With the development of e\u2010commerce, this commercial dark side has become known as cybercrime and has taken on many forms that affect the perceptions of the way we shop online. Corporations should realize that these threats to their online businesses have strategic implications to their business future and take proper measures to ensure that these threats are eliminated or significantly reduced so that consumer confidence in the Internet as an alternative means of shopping is maintained. These counter measures, coined as cybersecurity, have been developed to ensure the safety of consumer privacy and information and allow for a carefree shopping experience. There is need for the development of models that will allow corporations to study the effects of cybercrime on online consumer confidence and to counter through leveraging the benefits associated with the latest developments in cybersecurity. With these two facets of e\u2010commerce impacting the online consumer, corporations must ensure that the security measures taken will ultimately prevail to assure that consumers will continue to use the Internet to satisfy their shopping needs.<\/jats:p>","DOI":"10.1108\/14684520410543670","type":"journal-article","created":{"date-parts":[[2004,7,1]],"date-time":"2004-07-01T22:06:51Z","timestamp":1088719611000},"page":"224-234","source":"Crossref","is-referenced-by-count":31,"title":["Cybercriminal impacts on online business and consumer confidence"],"prefix":"10.1108","volume":"28","author":[{"given":"Alan D.","family":"Smith","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022020120291727800_b1","unstructured":"Berkowitz, B.S. (2003), \u201cCyber security: who's watching the store?\u201d, Issues in Science and Technology, Vol. 19 No. 3."},{"key":"key2022020120291727800_b2","unstructured":"Chan, P.S. (2003), \u201cSucceeding in the dotcom: economic challenges for brick and mortar companies\u201d, International Journal of Management, Vol. 20 No. 1."},{"key":"key2022020120291727800_b3","unstructured":"Fishman, R., Josephberg, K., Linn, J., Pollack, J. and Victoriano, J. (2002), \u201cThreat of international cyberterorrism on the rise\u201d, Intellectual Property and Technology Law Journal, Vol. 14 No. 10."},{"key":"key2022020120291727800_b4","doi-asserted-by":"crossref","unstructured":"Galaskiewicz, J. (1985), \u201cInterorganizational relations\u201d, Annual Review of Sociology, Vol. 11, pp. 281\u2010304.","DOI":"10.1146\/annurev.so.11.080185.001433"},{"key":"key2022020120291727800_b5","doi-asserted-by":"crossref","unstructured":"Grabner\u2010Kraeuter, S. (2002), \u201cThe role of consumer's trust in online shopping\u201d, Journal of Business Ethics, Vol. 39 No. 1, pp. 43\u201050.","DOI":"10.1023\/A:1016323815802"},{"key":"key2022020120291727800_b6","doi-asserted-by":"crossref","unstructured":"Granovetter, M. (1985), \u201cEconomic action and social structure: the problem of embeddedness\u201d, American Journal of Sociology, Vol. 91, pp. 481\u2010510.","DOI":"10.1086\/228311"},{"key":"key2022020120291727800_b7","unstructured":"Guenther, K. (2003), \u201cProtecting your Web site, protecting your users\u201d, Online, Vol. 27 No. 3, pp. 63\u20106."},{"key":"key2022020120291727800_b8","doi-asserted-by":"crossref","unstructured":"Hamann, E.M., Henn, H., Schack, T. and Seliger, F. (2001), \u201cSecuring e\u2010business applications using smart cards\u201d, IBM Systems Journal, Vol. 40 No. 3, pp. 635\u201047.","DOI":"10.1147\/sj.403.0635"},{"key":"key2022020120291727800_b9","unstructured":"Hester, E. (1998), \u201cIndustry corner: smart cards for an information\u2010hungry world\u201d, Business Economics, January."},{"key":"key2022020120291727800_b10","unstructured":"Isaac, R.G., Zerbe, W.J. and Pitt, D.G. (2001), \u201cLeadership and motivation: the effective application of expectancy theory\u201d, Journal of Managerial Issues, Vol. 13 No. 2, pp. 212\u201026."},{"key":"key2022020120291727800_b11","doi-asserted-by":"crossref","unstructured":"Koufaris, M. (2002), \u201cApplying the technology acceptance model and flow theory to online consumer behavior\u201d, Information Systems Research, Vol. 13 No. 2, pp. 205\u201023.","DOI":"10.1287\/isre.13.2.205.83"},{"key":"key2022020120291727800_b12","unstructured":"Meckbach, G. (1999), \u201cSmart card success requires making new partnerships first: high costs are still associated with products\u201d, Computer Dealer News, 4 June."},{"key":"key2022020120291727800_b14","doi-asserted-by":"crossref","unstructured":"Miyazaki, A.D. and Fernandez, A. (2000), \u201cInternet privacy and security: an examination of online retailer disclosures\u201d, Journal of Public Policy and Marketing, Vol. 19 No. 1, pp. 54\u201061.","DOI":"10.1509\/jppm.19.1.54.16942"},{"key":"key2022020120291727800_b15","unstructured":"Movahedi\u2010Lankarani, S.J. (2002), \u201cE\u2010commerce: resources for doing business on the Internet\u201d, Reference & User Services Quarterly, Vol. 41 No. 4, pp. 316\u201025."},{"key":"key2022020120291727800_b16","unstructured":"Phillips, J.T. (2002), \u201cPrivacy vs cybersecurity\u201d, Information Management Journal, Vol. 36 No. 3, pp. 46\u20109."},{"key":"key2022020120291727800_b17","doi-asserted-by":"crossref","unstructured":"Saban, K.A., McGivern, E. and Saykiewicz, J.N. (2002), \u201cA critical look at the impact of cyber crime on consumer Internet behavior\u201d, Journal of Marketing Theory and Practice, Vol. 10 No. 2, pp. 29\u201037.","DOI":"10.1080\/10696679.2002.11501914"},{"key":"key2022020120291727800_b18","unstructured":"Smith, A.D. (2002), \u201cLoyalty and e\u2010marketing issues: customer retention on the Web\u201d, Quarterly Journal of E\u2010commerce, Vol. 3 No. 2, pp. 149\u201061."},{"key":"key2022020120291727800_b19","doi-asserted-by":"crossref","unstructured":"Smith, A.D. and Rupp, W.T. (2002a), \u201cIssues in cybersecurity: understanding the potential risks associated with hackers\/crackers\u201d, Information Management and Computer Security, Vol. 10 No. 4, pp. 178\u201083.","DOI":"10.1108\/09685220210436976"},{"key":"key2022020120291727800_b20","doi-asserted-by":"crossref","unstructured":"Smith, A.D. and Rupp, W.T. (2002b), \u201cApplication service providers (ASP): moving downstream to enhance competitive advantage\u201d, Information Management and Computer Security, Vol. 10 No. 2, pp. 64\u201072.","DOI":"10.1108\/09685220210424113"},{"key":"key2022020120291727800_b21","unstructured":"Tillman, B. (2002), \u201cInternet privacy legislation emerges\u201d, Information Management Journal, Vol. 36 No. 5, pp. 14, 16\u201018."},{"key":"key2022020120291727800_b22","unstructured":"Tuthill, M. (2002), \u201cPaying online: losing money may not be the biggest threat\u201d, AFP Exchange, Vol. 22 No. 6."},{"key":"key2022020120291727800_b23","doi-asserted-by":"crossref","unstructured":"Uzzi, B. (1997), \u201cSocial structure and competition in interfirm networks: the paradox of embeddedness\u201d, Administrative Science Quarterly, Vol. 42, pp. 35\u201067.","DOI":"10.2307\/2393808"},{"key":"key2022020120291727800_frg1","doi-asserted-by":"crossref","unstructured":"Miyazaki, A.D. (2002), \u201cConsumer perceptions of privacy and security risks for online shopping\u201d, The Journal of Consumer Affairs, Vol. 35 No. 1, pp. 27\u201044.","DOI":"10.1111\/j.1745-6606.2001.tb00101.x"}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14684520410543670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520410543670\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520410543670\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:40:10Z","timestamp":1753404010000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/28\/3\/224-234\/301899"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,6,1]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,6,1]]}},"alternative-id":["10.1108\/14684520410543670"],"URL":"https:\/\/doi.org\/10.1108\/14684520410543670","relation":{},"ISSN":["1468-4527"],"issn-type":[{"value":"1468-4527","type":"print"}],"subject":[],"published":{"date-parts":[[2004,6,1]]}}}