{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:54:56Z","timestamp":1759146896387,"version":"3.41.2"},"reference-count":1,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[1997,12,1]],"date-time":"1997-12-01T00:00:00Z","timestamp":880934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997,12,1]]},"abstract":"<jats:p>Suggests that for electronic commerce to thrive among parties who have never met each other, trust must become a commodity item. Certification authorities (CAs) are the standard mechanism by which online entities can identify one another. The policies and practices followed by a CA are just as important as the basic security of the electronic commerce network. This recognition is now standard, and \u201ctrust models\u201d are emerging wherein diverse online business partners can trust one another, through the mutual recognition of their respective CAs. Overviews security and trust in electronic commerce. Discusses the role of certificates, with particular reference to the Australian <jats:italic>Public Key Authentication Framework.<\/jats:italic> Presents a vision for electronic commerce, premissed on electronic trust as a commodity.<\/jats:p>","DOI":"10.1108\/eum0000000004466","type":"journal-article","created":{"date-parts":[[2004,5,11]],"date-time":"2004-05-11T21:50:49Z","timestamp":1084312249000},"page":"175-181","source":"Crossref","is-referenced-by-count":11,"title":["Certificates and trust in electronic commerce"],"prefix":"10.1108","volume":"5","author":[{"given":"Stephen","family":"Wilson","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022020420483334000_b1","unstructured":"OECD (1997, \u201cRecommendation of the Council concerning guidelines for cryptographic policy\u201d, 27 March.."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/EUM0000000004466","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EUM0000000004466\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EUM0000000004466\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:03:02Z","timestamp":1753405382000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/5\/5\/175-181\/178453"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,12,1]]},"references-count":1,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1997,12,1]]}},"alternative-id":["10.1108\/EUM0000000004466"],"URL":"https:\/\/doi.org\/10.1108\/eum0000000004466","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1997,12,1]]}}}