{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T21:45:54Z","timestamp":1766180754352,"version":"3.41.2"},"reference-count":66,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2015,3,9]],"date-time":"2015-03-09T00:00:00Z","timestamp":1425859200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3,9]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 This paper aims to focus on online fraud occurrence in retailing banking sectors both in the UK and China. Online financial transactions bring convenience to individuals dramatically and improve banking service quality efficiently. However, the latest service channel, Internet, has been exploited by fraudsters excessively, standing at a huge monetary loss worldwide. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 In aspects of demographic factors, financial activities and IT usage, results would benefit financial organisations and local authorities in strengthening customers\u2019 education and improving policymaking. The fraud occurrence model is empirically tested using quantitative data, and comparison is discussed using qualitative data collected in both countries. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The findings provide solid understanding of customers\u2019 behaviours towards online financial transactions and fraud occurrence internationally. As the main implication, customer education is proposed to benefit financial organisations in both countries. According to the data collection process and the data analysis results, individual customers are aware of banking policies and practices to some extent. Particularly in China, customers\u2019 satisfaction level is relatively lower and service quality is not reasonable in most circumstances. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title>\n               <jats:p> \u2013 The research experiences gained from this study suggest a number of areas for future research, particularly the under-researched area of fraud. Rather than approaching the research questions through individuals, there would be much value in working with merchants and financial organisations that are dealing with financial transactions and fraud on a daily basis. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 By combining three approaches (demographic factors, financial activities and IT usage), this study is trying to develop a comprehensive and statistical understanding of online fraud occurrences.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/ics-10-2013-0076","type":"journal-article","created":{"date-parts":[[2015,2,26]],"date-time":"2015-02-26T06:35:30Z","timestamp":1424932530000},"page":"3-19","source":"Crossref","is-referenced-by-count":2,"title":["Influential factors of online fraud occurrence in retailing banking sectors from a global prospective"],"prefix":"10.1108","volume":"23","author":[{"given":"Yan","family":"Sun","sequence":"first","affiliation":[]},{"given":"Ian","family":"Davidson","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122521300490200_b1","unstructured":"Abbott, B.\n                (2009), \u201cProtect against card fraud\u201d, Sunday Express, 23 August."},{"key":"key2020122521300490200_b2","doi-asserted-by":"crossref","unstructured":"Agarwal, R.\n               , \n                  Rastogi, S.\n                and \n                  Mehrotra, A.\n                (2009), \u201cCustomers\u2019 perspectives regarding e-banking in an emerging economy\u201d, \n                  Journal of Retailing and Consumer Services\n               , Vol. 16 No. 5, pp. 340-351.","DOI":"10.1016\/j.jretconser.2009.03.002"},{"key":"key2020122521300490200_b71","unstructured":"Anderson, R.\n               , \n                  Bond, M.\n                and \n                  Murdoch, S.J.\n                (2006), \u201cChip and spin\u201d, \n                  Computer Security Journal\n               , Vol. 22 No. 2."},{"key":"key2020122521300490200_b3","unstructured":"APACS\n                (2013), \n                  Fraud, the Facts 2013\n               , APACS, The UK Cards Association, London."},{"key":"key2020122521300490200_b4","doi-asserted-by":"crossref","unstructured":"Ash, D.\n                (2011), \u201cThe UK fraud landscape for financial services\u201d, \n                  Computer Fraud & Security\n               , Vol. 2011 No. 4, pp. 16-18.","DOI":"10.1016\/S1361-3723(11)70042-2"},{"key":"key2020122521300490200_b6","doi-asserted-by":"crossref","unstructured":"Black, N.J.\n               , \n                  Lockett, A.\n               , \n                  Winklhofer, H.\n                and \n                  Ennew, C.\n                (2001), \u201cThe adoption of Internet financial services: a qualitative study\u201d, \n                  International Journal of Retail & Distribution Management\n               , Vol. 29 No. 8, pp. 390-398.","DOI":"10.1108\/09590550110397033"},{"key":"key2020122521300490200_b7","doi-asserted-by":"crossref","unstructured":"Button, M.\n                (2012), \u201cCross-border fraud and the case for an \u2018interfraud\u2019\u201d, \n                  An International Journal of Police Strategies & Management\n               , Vol. 35 No. 2, pp. 285-303.","DOI":"10.1108\/13639511211230057"},{"key":"key2020122521300490200_b5","unstructured":"Casu, B.\n               , \n                  Girardone, C.\n                and \n                  Molyneux, P.\n                (2006), \n                  Introduction to Banking\n               , Pearson, Prentice Hall, Edinburgh."},{"key":"key2020122521300490200_b8","doi-asserted-by":"crossref","unstructured":"Celic, H.\n                (2008), \u201cWhat determines Turkish customer\u2019s acceptance of Internet banking?\u201d, \n                  International Journal of Bank Marketing\n               , Vol. 26 No. 5, pp. 353-370.","DOI":"10.1108\/02652320810894406"},{"key":"key2020122521300490200_b72","doi-asserted-by":"crossref","unstructured":"Clemes, M.D.\n               , \n                  Gan, C.\n                and \n                  Zhang, J.L.\n                (2013), \u201cAn empirical analysis of online shopping adoption in Beijing, China\u201d, \n                  Journal of Retailing and Consumer Services\n                (in press).","DOI":"10.1016\/j.jretconser.2013.08.003"},{"key":"key2020122521300490200_b9","doi-asserted-by":"crossref","unstructured":"Clemes, M.D.\n               , \n                  Gan, C.\n                and \n                  Zhang, J.L.\n                (2014), \u201cAn empirical analysis of online shopping adoption in Beijing, China\u201d, \n                  Journal of Retailing and Consumer Services\n               , Vol. 21 No. 3, pp. 364-375.","DOI":"10.1016\/j.jretconser.2013.08.003"},{"key":"key2020122521300490200_b10","doi-asserted-by":"crossref","unstructured":"Davinson, N.\n                and \n                  Sillence, E.\n                (2010), \u201cIt wont\u2019s happen to me: promoting secure behaviour among Internet users\u201d, \n                  Computers in Human Behavior\n               , Vol. 26 No. 6, pp. 1739-1747.","DOI":"10.1016\/j.chb.2010.06.023"},{"key":"key2020122521300490200_b11","doi-asserted-by":"crossref","unstructured":"Davis, F.D.\n                (1989), \u201cPerceived usefulness, perceived ease of use and user of acceptance of information technology\u201d, \n                  MIS Quarterly\n               , Vol. 3 No. 3, pp. 319-340.","DOI":"10.2307\/249008"},{"key":"key2020122521300490200_b12","unstructured":"Dyrud, M.\n                (2006), \u201cI brought you good news. An analysis of Nigerian 419 letters\u201d, Proceedings of the 2005 Association of Business Communication Annual Convention, Irvine, CA."},{"key":"key2020122521300490200_b13","unstructured":"Gralla, P.\n                (2006), \n                  How Personal & Internet Security Works\n               , QUE, Indianapolis, IN, p. 91."},{"key":"key2020122521300490200_b14","doi-asserted-by":"crossref","unstructured":"Grazioli, S.\n                (2004), \u201cWhere did they go wrong? An analysis of the failure of knowledgeable Internet consumers to detect deception over the Internet\u201d, \n                  Group Decision and Negotiation\n               , Vol. 13 No. 13, pp. 149-172.","DOI":"10.1023\/B:GRUP.0000021839.04093.5d"},{"key":"key2020122521300490200_b15","unstructured":"Guo, L.\n                (2008), \u201cRisk management of online banking in China: case study\u201d, \n                  Journal of ABC Wuhan Training College\n               , Vol. 4, p. 63."},{"key":"key2020122521300490200_b16","doi-asserted-by":"crossref","unstructured":"Hanafizadeh, P.\n               , \n                  Keating, B.W.\n                and \n                  Khedmatgozar, H.R.\n                (2014), \u201cA systematic review of Internet banking adoption\u201d, \n                  Telematics and Informatics\n               , Vol. 31 No. 3, pp. 492-510.","DOI":"10.1016\/j.tele.2013.04.003"},{"key":"key2020122521300490200_b74","doi-asserted-by":"crossref","unstructured":"Hoehle, H.\n               , \n                  Scornavacca, E.\n                and \n                  Huff, S.\n                (2012), \u201cThree decades of research on consumer adoption and utilization of electronic banking channels: a literature analysis\u201d, \n                  Decision Support Systems\n               , Vol. 54 No. 1, pp. 122-132.","DOI":"10.1016\/j.dss.2012.04.010"},{"key":"key2020122521300490200_b19","doi-asserted-by":"crossref","unstructured":"Howcroft, B.\n               , \n                  Hamilton, R.\n                and \n                  Hewer, P.\n                (2002), \u201cConsumer attitude and the usage and adoption of home-based banking in the United Kingdom\u201d, \n                  International Journal of Bank Marketing\n               , Vol. 20 No. 3, pp. 111-121.","DOI":"10.1108\/02652320210424205"},{"key":"key2020122521300490200_b20","doi-asserted-by":"crossref","unstructured":"Huang, D.-L.\n               , \n                  Rau, P.-L.P.\n               , \n                  Salvendy, G.\n               , \n                  Gao, F.\n                and \n                  Zhou, J.\n                (2011), \u201cFactors affecting perception of information security and their impacts on IT adoption and security practices\u201d, \n                  International Journal of Human-Computer Studies\n               , Vol. 69 No. 12, pp. 870-883.","DOI":"10.1016\/j.ijhcs.2011.07.007"},{"key":"key2020122521300490200_b21","doi-asserted-by":"crossref","unstructured":"Jayawardhena, C.\n                and \n                  Foley, P.\n                (2000), \u201cChanges in the banking sector - the case of Internet banking in the UK\u201d, \n                  Internet Research: Electronic Networking Applications and Policy\n               , Vol. 10 No. 1, pp. 19-30.","DOI":"10.1108\/10662240010312048"},{"key":"key2020122521300490200_b22","doi-asserted-by":"crossref","unstructured":"Joinson, A.N.\n                (2001), \u201cSelf-disclosure in computer-mediated communication: the role of self-awareness and visual anonymity\u201d, \n                  European Journal of Social Psychology\n               , Vol. 31 No. 2, pp. 177-192.","DOI":"10.1002\/ejsp.36"},{"key":"key2020122521300490200_b23","doi-asserted-by":"crossref","unstructured":"Joinson, A.N.\n               , \n                  Reips, U.D.\n               , \n                  Buchanan, T.\n                and \n                  Schofield, C.B.P.\n                (2010), \u201cPrivacy, trust and self-disclosure online\u201d, \n                  Human-computer Interaction\n               , Vol. 25 No. 1, pp. 1-24.","DOI":"10.1080\/07370020903586662"},{"key":"key2020122521300490200_b24","doi-asserted-by":"crossref","unstructured":"Lee, M.C.\n                (2009), \u201cFactors influencing the adoption of Internet banking: an integration of TAM and TPB with perceived risk and perceived benefit\u201d, \n                  Electronic Commerce Research and Applications\n               , Vol. 8 No. 3, pp. 130-141.","DOI":"10.1016\/j.elerap.2008.11.006"},{"key":"key2020122521300490200_b25","unstructured":"Lee, J.-W.\n                (2010), \u201cThe roles of demographics on the perceptions of electronic commerce adoption\u201d, \n                  Academy of Marketing Studies Journal\n               , Vol. 14 No. 1."},{"key":"key2020122521300490200_b26","doi-asserted-by":"crossref","unstructured":"Lin, H.-Y.\n                and \n                  Hsu, C.-L.\n                (2011), \u201cA novel identity-based key-insulated convertible authenticated encryption scheme\u201d, \n                  International Journal of Foundations of Computer Science\n               , Vol. 22 No. 3, pp. 739-756.","DOI":"10.1142\/S0129054111008325"},{"key":"key2020122521300490200_b27","unstructured":"Liu, Y.\n                (2008), \u201cAn analysis of bank card in China\u201d, MSc dissertation, People\u2019s University of China, Beijing."},{"key":"key2020122521300490200_b28","doi-asserted-by":"crossref","unstructured":"Logsdon, J.M.\n                and \n                  Patterson, K.D.W.\n                (2009), \u201cDeception in business networks: is it easier to lie online?\u201d, \n                  Journal of Business Ethics\n               , Vol. 90 No. 4, pp. 537-549.","DOI":"10.1007\/s10551-010-0605-z"},{"key":"key2020122521300490200_b33","doi-asserted-by":"crossref","unstructured":"Mckechnie, S.\n                (1992), \u201cConsumer buying behaviour in financial services: an overview\u201d, \n                  International Journal of Bank Marketing\n               , Vol. 10 No. 5, pp. 4-12.","DOI":"10.1108\/02652329210016803"},{"key":"key2020122521300490200_b34","doi-asserted-by":"crossref","unstructured":"McKenna, G.\n               , \n                  McKenna, K.Y.A.\n               , \n                  Green, A.S.\n                and \n                  Gleason, M.E.J.\n                (2002), \u201cRelationship formation on the Internet: what\u2019s the big attraction?\u201d, \n                  Journal of Social Issues\n               , Vol. 58 No. 1, pp. 9-31.","DOI":"10.1111\/1540-4560.00246"},{"key":"key2020122521300490200_b29","doi-asserted-by":"crossref","unstructured":"Mallat, N.\n                (2007), \u201cExploring consumer adoption of mobile payments \u2013 a qualitative study\u201d, \n                  Journal of Strategic Information Systems\n               , Vol. 16 No. 4, pp. 413-432.","DOI":"10.1016\/j.jsis.2007.08.001"},{"key":"key2020122521300490200_b30","doi-asserted-by":"crossref","unstructured":"Martins, C.\n               , \n                  Oliveira, T.\n                and \n                  Popovic, A.\n                (2014), \u201cUnderstanding the Internet banking adoption: a unified theory of acceptance and use of technology and perceived risk application\u201d, \n                  International Journal of Information Management\n               , Vol. 34 No. 1, pp. 1-13.","DOI":"10.1016\/j.ijinfomgt.2013.06.002"},{"key":"key2020122521300490200_b31","doi-asserted-by":"crossref","unstructured":"Mavlanova, T.\n                and \n                  Fich, R.B.\n                (2010), \u201cCounterfeit products on the Internet: the role of seller-level and product-level information\u201d, \n                  International Journal of Electronic Commerce\n               , Vol. 15 No. 2, pp. 79-104.","DOI":"10.2753\/JEC1086-4415150203"},{"key":"key2020122521300490200_b35","doi-asserted-by":"crossref","unstructured":"Mesiranta, N.\n               , \n                  Maenpaa, K.\n               , \n                  Kale, S.H.\n                and \n                  Kuusela, H.\n                (2008), \u201cConsumer perceptions of Internet banking in Finland: the moderating role of familiarity\u201d, \n                  Journal of Retailing and Consumer Services\n               , Vol. 15 No. 4, pp. 266-276.","DOI":"10.1016\/j.jretconser.2007.05.007"},{"key":"key2020122521300490200_b36","doi-asserted-by":"crossref","unstructured":"Nasri, W.\n                and \n                  Charfeddine, L.\n                (2012), \u201cFactors affecting the adoption of Internet banking in Tunisia: an integration theory of acceptance model and theory of planned behavior\u201d, \n                  Journal of High Technology Management Research\n               , Vol. 23 No. 1, pp. 1-14.","DOI":"10.1016\/j.hitech.2012.03.001"},{"key":"key2020122521300490200_b37","doi-asserted-by":"crossref","unstructured":"Nguyen, M.\n               , \n                  Bin, Y.S.\n                and \n                  Campell, A.\n                (2012), \u201cComparing online and offline self-disclosure: a systematic review\u201d, \n                  Cyberpsychology, Behavior and Social Networking\n               , Vol. 15 No. 2.","DOI":"10.1089\/cyber.2011.0277"},{"key":"key2020122521300490200_b38","unstructured":"Onyszko, T.\n                (2006), \u201cSecure socket layer\u201d, WindowSecurity, available at: www.windowsecurity.com\/articles\/Secure_Socket_Layer.html (accessed 22 March 2010)."},{"key":"key2020122521300490200_b70","unstructured":"Penn, C.\n                (2005), \u201cChip and PIN worldwide\u201d, \n                  HCIMA YEARBOOK\n               , pp. 34-37."},{"key":"key2020122521300490200_b39","unstructured":"PBC\n                (2010), \u201cPeople\u2019s Bank of China. Bank cards \u2013 an overview\u201d, available at: www.pbc.gov.cn\/zhifutixi\/zhifugongju\/yinhangka\/gaishu.asp (accessed 20 March 2010)."},{"key":"key2020122521300490200_b42","doi-asserted-by":"crossref","unstructured":"Pol, L.G.\n                (1986), \u201cMarketing and the demographic perspective\u201d, \n                  The journal of Consumer Marketing\n               , Vol. 3 No. 1, pp. 57-65.","DOI":"10.1108\/eb008153"},{"key":"key2020122521300490200_b73","doi-asserted-by":"crossref","unstructured":"Powers, T.L.\n                and \n                  Sterling, J.U.\n                (2008), \u201cSegmenting business-to-business markets: a micro-macro linking methodology\u201d, \n                  Journal of Business & Industrial Marketing\n               , Vol. 23 No. 3, pp. 170-177.","DOI":"10.1108\/08858620810858436"},{"key":"key2020122521300490200_b43","unstructured":"Quazi, A.\n                and \n                  Talukder, M.\n                (2011), \u201cDemographic determinants of adoption of technological innovation\u201d, \n                  Journal of Computer Information Systems\n               , Vol. 51 No. 3."},{"key":"key2020122521300490200_b44","doi-asserted-by":"crossref","unstructured":"Rogers, D.\n                (1986), \u201cDemographic data reports\u201d, \n                  Retail & Distribution Management\n               , Vol. 14 No. 5, pp. 23-26.","DOI":"10.1108\/eb018317"},{"key":"key2020122521300490200_b45","unstructured":"Rogers, E.M.\n                (1995), \n                  Diffusion of Innovations\n               , 4th ed., Free Press, New York, NY."},{"key":"key2020122521300490200_b46","doi-asserted-by":"crossref","unstructured":"Rotchanakitumnuai, S.\n                and \n                  Speece, M.\n                (2003), \u201cBarriers to Internet banking adoption: a qualitative study among corporate customers in Thailand\u201d, \n                  International Journal of Bank Marketing\n               , Vol. 21 Nos 6\/7, pp. 312-323.","DOI":"10.1108\/02652320310498465"},{"key":"key2020122521300490200_b47","doi-asserted-by":"crossref","unstructured":"Roweth, B.\n                (1984), \u201cSources of data: demographic\/educational\/social\u201d, \n                  Aslib Proceedings\n               , Vol. 36 Nos 11\/12, pp. 429-435.","DOI":"10.1108\/eb050949"},{"key":"key2020122521300490200_b49","doi-asserted-by":"crossref","unstructured":"Schiffrin, H.\n               , \n                  Edelman, A.\n               , \n                  Falkenstern, M.\n                and \n                  Steward, C.\n                (2010), \u201cThe associations among computer-mediated communication, relationships and well-being\u201d, \n                  Cyberpsychology, Behavior and Social Networking\n               , Vol. 13 No. 3.","DOI":"10.1089\/cyber.2009.0173"},{"key":"key2020122521300490200_b50","unstructured":"Sina-Finance\n                (2010), available at: http:\/\/finance.sina.com.cn\/money\/bank\/bank_hydt\/20110304\/07109470268.shtml (accessed 2 July 2013)."},{"key":"key2020122521300490200_b52","doi-asserted-by":"crossref","unstructured":"Taddei, S.\n                and \n                  Contena, B.\n                (2013), \u201cPrivacy, trust and control: which relationships with online self-disclosure?\u201d, \n                  Computer in Human Behavior\n               , Vol. 29 No. 3, pp. 821-826.","DOI":"10.1016\/j.chb.2012.11.022"},{"key":"key2020122521300490200_b53","doi-asserted-by":"crossref","unstructured":"Tsai, C.L.\n               , \n                  Chen, C.J.\n                and \n                  Zhuang, D.J.\n                (2012), \u201cSecure OTP and biometric verification scheme for mobile banking\u201d, 2012 Third FTRA International Conference on Mobile, Vancouver, Ubiquitous and Intelligent Computer.","DOI":"10.1109\/MUSIC.2012.31"},{"key":"key2020122521300490200_b54","doi-asserted-by":"crossref","unstructured":"Tzenga, S.-F.\n               , \n                  Hwangb, M.-S.\n                and \n                  Chen, H.-B.\n                (2005), \u201cA secure on-line software transaction scheme\u201d, \n                  Computer Standards & Interfaces\n               , Vol. 27, 303-312.","DOI":"10.1016\/S0920-5489(04)00069-8"},{"key":"key2020122521300490200_b55","doi-asserted-by":"crossref","unstructured":"Vincent, O.R.\n               , \n                  Folorunso, O.\n                and \n                  Akinde, A.D.\n                (2010), \u201cImproving e-payment security using Elliptic Curve Cryptosystem\u201d, \n                  Electronic Commerce Research\n               , Vol. 10 No. 1, pp. 27-41.","DOI":"10.1007\/s10660-010-9047-z"},{"key":"key2020122521300490200_b56","doi-asserted-by":"crossref","unstructured":"Vishwanath, A.\n               , \n                  Herath, T.\n               , \n                  Chen, R.\n               , \n                  Wang, J.\n                and \n                  Rao, H.R.\n                (2011), \u201cWhy do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model\u201d, \n                  Decision Support Systems\n               , Vol. 51 No. 3, pp. 576-586.","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"key2020122521300490200_b57","unstructured":"Wang, D.\n                (2007), \u201cThe development of online banking and future trend in China\u201d, \n                  Finance and Computer\n               , Vol. 1, pp. 8-11."},{"key":"key2020122521300490200_b51","doi-asserted-by":"crossref","unstructured":"Worthington, S.\n               , \n                  Thompson, F.M.\n                and \n                  Stewart, D.B.\n                (2011), \u201cCredit cards in a Chinese cultural context \u2013 the young, affluent Chinese as early adopters\u201d, \n                  Journal of Retailing and Consumer Services\n               , Vol. 18 No. 6.","DOI":"10.1016\/j.jretconser.2011.07.003"},{"key":"key2020122521300490200_b59","doi-asserted-by":"crossref","unstructured":"Wright, R.\n               , \n                  Chakraborty, S.\n               , \n                  Basoglu, A.\n                and \n                  Marett, K.\n                (2010), \u201cWhere did they go right? Understanding the deception in phishing communications\u201d, \n                  Group Decision and Negotiation\n               , Vol. 19 No. 4, pp. 391-416.","DOI":"10.1007\/s10726-009-9167-9"},{"key":"key2020122521300490200_b60","doi-asserted-by":"crossref","unstructured":"Xiao, B.\n                and \n                  Bennasat, I.\n                (2011), \u201cProduct-related deception in e-commerce: a theoretical perspective\u201d, \n                  MIS Quarterly\n               , Vol. 35 No. 1 pp. 169-195.","DOI":"10.2307\/23043494"},{"key":"key2020122521300490200_b62","doi-asserted-by":"crossref","unstructured":"Zhao, A.L.\n                (2008), \u201cPerceived risk and Chinese consumers\u2019 Internet banking services adoption\u201d, \n                  International Journal of Bank Marketing\n               , Vol. 26 No. 7, pp. 505-525.","DOI":"10.1108\/02652320810913864"},{"key":"key2020122521300490200_frd1","doi-asserted-by":"crossref","unstructured":"Harrison, A.\n                (2000), \u201cCompanies point fingers over Nike web site hijacking\u201d, Computer World, 30 June.","DOI":"10.1093\/combul\/42.4.30"},{"key":"key2020122521300490200_frd2","doi-asserted-by":"crossref","unstructured":"Hoehle, H.\n               , \n                  Scornavacca, E.\n                and \n                  Huff, S.\n                (2012), \u201cThree decades of research on consumer adoption and utilization of electronic banking channels: a literature analysis\u201d, \n                  Decision Support Systems\n               , Vol. 54 No. 1, pp. 122-132.","DOI":"10.1016\/j.dss.2012.04.010"},{"key":"key2020122521300490200_frd3","unstructured":"McGillivray, R.J.\n                and \n                  Lieske, S.C.\n                (2001), \u201cWebjacking\u201d, \n                  Computer and Internet Lawyer\n               , Vol. 18 No. 7."},{"key":"key2020122521300490200_frd4","unstructured":"Pereira, V.\n                (1999), \u201cComplaint for permanent injunction and other equitable relief\u201d, Case No. 99-1367-A, Federal Trade Commission: United States District Court, Northern District of Florida."},{"key":"key2020122521300490200_frd5","unstructured":"Pitofsky, R.\n                (1998), \u201cPrepared statement of the federal trade commission on \u2018Internet fraud\u2019 before the subcommittee on investigations of the government affairs committee of the United States senate\u201d, Vol. 10, FTC, Washington, DC."},{"key":"key2020122521300490200_frd6","doi-asserted-by":"crossref","unstructured":"Salu, A.O.\n                (2004), \u201cOnline crimes and advance fee fraud in Nigeria- are available legal remedies adequate?\u201d, \n                  Journal of Money Laundering Control\n               , Vol. 8 No. 2, pp. 159-167.","DOI":"10.1108\/13685200510621091"},{"key":"key2020122521300490200_frd7","doi-asserted-by":"crossref","unstructured":"Zhang, Y.\n               , \n                  Fang, Y.\n               , \n                  Wei, K.-K.\n               , \n                  Ramsey, E.\n               , \n                  McCole, P.\n                and \n                  Chen, H.\n                (2011), \u201cRepurchase intention in B2C e-commerce - a relationship quality perspective\u201d, \n                  Information & Management\n               , Vol. 48 No. 6, pp. 192-200.","DOI":"10.1016\/j.im.2011.05.003"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ICS-10-2013-0076","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-10-2013-0076\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-10-2013-0076\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:13Z","timestamp":1753406593000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/23\/1\/3-19\/111045"}},"subtitle":["An empirical study of individual customers in the UK and China"],"short-title":[],"issued":{"date-parts":[[2015,3,9]]},"references-count":66,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3,9]]}},"alternative-id":["10.1108\/ICS-10-2013-0076"],"URL":"https:\/\/doi.org\/10.1108\/ics-10-2013-0076","relation":{},"ISSN":["2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2015,3,9]]}}}