{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:08:51Z","timestamp":1754158131356,"version":"3.41.2"},"reference-count":5,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2007,10,2]],"date-time":"2007-10-02T00:00:00Z","timestamp":1191283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10,2]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to address the issue of online security.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Discusses the problem of breaches in online information sharing and security.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>There are many issues to be considered in addressing the matter of online information security that is so important for the future stability of the online world.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Provides a discussion on policy formulation at international and national level, to trust building as a key to online security, to specific technical processes that might help thwart breaches of this security.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14684520710832298","type":"journal-article","created":{"date-parts":[[2007,10,13]],"date-time":"2007-10-13T07:06:05Z","timestamp":1192259165000},"page":"561-565","source":"Crossref","is-referenced-by-count":4,"title":["Who am I, and where's my money? Issues in online security"],"prefix":"10.1108","volume":"31","author":[{"given":"G.E.","family":"Gorman","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022020120372917300_b1","unstructured":"ACM Portal (2007), The Guide to Computing Literature, available at: http:\/\/portal.acm.org\/."},{"key":"key2022020120372917300_b2","unstructured":"BBC News (2006), \u201cIBM pays $1.3bn for security firm\u201d, BBC News, available at: http:\/\/news.bbc.co.uk\/2\/hi\/business\/5279012.stm."},{"key":"key2022020120372917300_b3","unstructured":"CNN.com (2007), \u201cOnline security\u201d, CNN, available at: www.cnn.com\/SPECIALS\/2005\/online.security\/."},{"key":"key2022020120372917300_b4","unstructured":"Fisk, M. (2002), \u201cCauses and Remedies for Social Acceptance of Network Insecurity\u201d, paper presented at Workshop on Economics and internet Security 2002, 1, available at: woozle.org\/\u223cmfisk\/papers\/sececon.pdf."},{"key":"key2022020120372917300_b5","unstructured":"UK House of Lords Science and Technology Committee (2007), Personal internet Security, 5th Report of Session 2006\u20132007, Chair: Lord Broers, HL Papers, 165\u2010I, HMSO, London."}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14684520710832298","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710832298\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710832298\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:40:52Z","timestamp":1753404052000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/31\/5\/561-565\/314557"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,2]]},"references-count":5,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2007,10,2]]}},"alternative-id":["10.1108\/14684520710832298"],"URL":"https:\/\/doi.org\/10.1108\/14684520710832298","relation":{},"ISSN":["1468-4527"],"issn-type":[{"type":"print","value":"1468-4527"}],"subject":[],"published":{"date-parts":[[2007,10,2]]}}}