{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:38:58Z","timestamp":1761597538585,"version":"3.41.2"},"reference-count":63,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2014,8,5]],"date-time":"2014-08-05T00:00:00Z","timestamp":1407196800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8,5]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to investigate risk reduction strategies in online shopping through the perspective of buyer\u2019s trust. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 An explanatory research approach is adopted to identify cause-and-effect relationships between e-quality and customers\u2019 loyalty, satisfaction and trust. This approach is accomplished through field research, which is based on a structured questionnaire that utilizes the E-S-QUAL tool, which is a multiple-item general scale for measuring electronic service quality. The sample is consisted of 92 e-buyers (consumers). <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The field research revealed that three e-quality dimensions, namely, ease of use, customization and assurance, e-scape and responsiveness, have significant positive effects on e-loyalty and e-satisfaction. Regarding e-trust, only customization and assurance exerts a significant positive effect. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title>\n               <jats:p> \u2013 The field research provides in-depth understanding of relationships among e-loyalty, e-satisfaction and e-trust. The majority of the respondents are young people living in Athens, Greece, highly educated, with a relative low monthly income. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 This study investigates how trust is affecting the consumers\u2019 engagement to e-commerce, suggesting the appropriate security that should be taken to mitigate perceived risks. Reviewing security measures can help reduce risks of an e-company and simultaneously enforce the level of trust and customers' intentions to buy.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/jsit-01-2014-0008","type":"journal-article","created":{"date-parts":[[2014,8,29]],"date-time":"2014-08-29T03:32:37Z","timestamp":1409283157000},"page":"170-186","source":"Crossref","is-referenced-by-count":19,"title":["Electronic service quality in online shopping and risk reduction strategies"],"prefix":"10.1108","volume":"16","author":[{"given":"Angeliki","family":"Vos","sequence":"first","affiliation":[]},{"given":"Catherine","family":"Marinagi","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Trivellas","sequence":"first","affiliation":[]},{"given":"Niclas","family":"Eberhagen","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Giannakopoulos","sequence":"first","affiliation":[]},{"given":"Christos","family":"Skourlas","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2020122922305683400_b1","unstructured":"Afuah, A.\n                and \n                  Tucci, C.L.\n                (2003), Internet Business Models and Strategies: Text and Cases, 2nd ed., McGraw-Hill, Boston."},{"key":"key2020122922305683400_b2","doi-asserted-by":"crossref","unstructured":"Angriawan, A.\n                and \n                  Thakur, R.\n                (2008), \u201cA parsimonious model of the antecedents and consequence of online trust: an uncertainty perspective\u201d, Journal of Internet Commerce, Vol. 7 No. 1, pp. 74-94.","DOI":"10.1080\/15332860802004337"},{"key":"key2020122922305683400_b3","unstructured":"Bansal, A.\n               , \n                  Phatak, Y.\n               , \n                  Gupta, I.C.\n                and \n                  Jain, R.\n                (2009), Transcending Horizons Through Innovative Global Practices, Excel Books, New Delhi."},{"key":"key2020122922305683400_b4","doi-asserted-by":"crossref","unstructured":"Bart, Y.\n               , \n                  Shankar, V.\n               , \n                  Sultan, F.\n                and \n                  Urban, G.L.\n                (2005), \u201cAre the drivers and role of online trust the same for all web sites and consumers? A large-scale exploratory empirical study\u201d, Journal of Marketing, Vol. 69 No. 4, pp. 133-152.","DOI":"10.1509\/jmkg.2005.69.4.133"},{"key":"key2020122922305683400_b5","unstructured":"Bauer, R.A.\n                (1960), \u201cConsumer behavior as risk taking\u201d, in \n                  Karp, \n               , \n                  R.E.\n               , \n                  Hancock, \n                and \n                  R.S.\n                (Eds), Issues in Marketing, MSS Information Corporation, New York, NY, pp. 47-53."},{"key":"key2020122922305683400_b6","doi-asserted-by":"crossref","unstructured":"Bhiogade, M.S.\n                (2002), \u201cSecure socket layer\u201d, Proceedings of Informing Science and IT Education Conference, Cork, June, pp. 85-90.","DOI":"10.28945\/2441"},{"key":"key2020122922305683400_b7","doi-asserted-by":"crossref","unstructured":"Cases, A.S.\n                (2002), \u201cPerceived risk and risk-reduction strategies in Internet shopping\u201d, The International Review of Retail, Distribution and Consumer Research, Vol. 12 No. 4, pp. 375-394.","DOI":"10.1080\/09593960210151162"},{"key":"key2020122922305683400_b8","doi-asserted-by":"crossref","unstructured":"Caudill, E.M.\n                and \n                  Murphy, P.E.\n                (2000), \u201cConsumer online privacy: legal and ethical issues\u201d, Journal of Public Policy and Marketing, Vol. 19 No. 1, pp. 7-19.","DOI":"10.1509\/jppm.19.1.7.16951"},{"key":"key2020122922305683400_b9","unstructured":"Chaffey, D.\n                (2009), E-Business and E-Commerce Management: Strategy, Implementation and Practice, 4th ed., FT Prentice Hall, Harlow."},{"key":"key2020122922305683400_b10","doi-asserted-by":"crossref","unstructured":"Cheung, C.M.\n                and \n                  Lee, M.K.\n                (2006), \u201cUnderstanding consumer trust in Internet shopping: a multidisciplinary approach\u201d, Journal of the American Society for Information Science and Technology, Vol. 57 No. 4, pp. 479-492.","DOI":"10.1002\/asi.20312"},{"key":"key2020122922305683400_b13","unstructured":"Cunningham, S.\n                (1967), \u201cThe major dimensions of perceived risk\u201d, in \n                  Cox, \n                and \n                  D.\n                (Ed), Risk Taking and Information Handling in Consumer Behavior, Harvard Business School, Boston, pp. 82-108."},{"key":"key2020122922305683400_b14","doi-asserted-by":"crossref","unstructured":"Das, T.K.\n                and \n                  Teng, B.S.\n                (1998), \u201cBetween trust and control: developing confidence in partner cooperation in alliances\u201d, The Academy of Management Review, Vol. 23 No. 3, pp. 491-512.","DOI":"10.5465\/amr.1998.926623"},{"key":"key2020122922305683400_b16","doi-asserted-by":"crossref","unstructured":"Doolin, B.\n               , \n                  Dillon, S.\n               , \n                  Thompson, F.\n                and \n                  Corner, J.L.\n                (2005), \u201cPerceived risk, the Internet shopping experience and online purchasing behavior: a New Zealand perspective\u201d, Journal of Global Information Management, Vol. 13 No. 2, pp. 66-88.","DOI":"10.4018\/jgim.2005040104"},{"key":"key2020122922305683400_b17","doi-asserted-by":"crossref","unstructured":"Eggert, A.\n                (2006), \u201cIntangibility and perceived risk in online enviroment\u201d, Journal of Marketing Management, Vol. 22, Nos 5\/6, pp. 553-570.","DOI":"10.1362\/026725706777978668"},{"key":"key2020122922305683400_b18","unstructured":"Erikson, E.H.\n                (1963), Childhood and Society, 2nd ed., W.W. Norton, New York, NY."},{"key":"key2020122922305683400_b19","doi-asserted-by":"crossref","unstructured":"Flynn, B.B.\n               , \n                  Sakakibara, S.\n               , \n                  Schroeder, R.\n               , \n                  Bates, K.\n                and \n                  Flynn, J.\n                (1990), \u201cEmpirical research methods in operations management\u201d, Journal of Operations Management, Vol. 9 No. 2, pp. 250-284.","DOI":"10.1016\/0272-6963(90)90098-X"},{"key":"key2020122922305683400_b20","unstructured":"Gengatharen, D.E.\n                and \n                  Standing, C.\n                (2001), \u201cEvaluating the benefits of regional electronic marketplaces: assessing the quality of the REM success model\u201d, Electronic Journal of Information Systems Evaluation, Vol. 7 No. 1, pp. 11-20."},{"key":"key2020122922305683400_b21","doi-asserted-by":"crossref","unstructured":"Grabner-Kraeeter, S.\n                (2002), \u201cThe role of consumers trust in online-shopping\u201d, Journal of Business Ethics, Vol. 39 Nos 1\/2, pp. 43-50.","DOI":"10.1023\/A:1016323815802"},{"key":"key2020122922305683400_b22","doi-asserted-by":"crossref","unstructured":"Greatorex, M.\n                and \n                  Mitchell, V.W.\n                (1994), \u201cModelling consumer risk reduction preferences from perceived loss data\u201d, Journal of Economic Psychology, Vol. 15 No. 4, pp. 669-685.","DOI":"10.1016\/0167-4870(94)90017-5"},{"key":"key2020122922305683400_b23","doi-asserted-by":"crossref","unstructured":"Ha, H.Y.\n                (2004), \u201cFactors influencing consumer perceptions of brand trust online\u201d, Journal of Product and Brand Management, Vol. 13 No. 5, pp. 329-342.","DOI":"10.1108\/10610420410554412"},{"key":"key2020122922305683400_b24","doi-asserted-by":"crossref","unstructured":"Hoffman, D.L.\n               , \n                  Novak, T.P.\n                and \n                  Peralta, M.\n                (1999), \u201cBuilding consumer trust online: how merchants can win back lost consumer trust in the interests of e-commerce sales\u201d, Communications of the ACM, Vol. 42 No. 4, pp. 80-85.","DOI":"10.1145\/299157.299175"},{"key":"key2020122922305683400_b25","unstructured":"Jacoby, J.\n                and \n                  Kaplan, L.B.\n                (1972), \u201cThe components of perceived risk\u201d, in \n                  Venkatesan, M.\n                (Ed), SV \u2013 Proceedings of the Third Annual Conference of the Association for Consumer Research, Association for Consumer Research, Chicago, IL, pp. 382-393."},{"key":"key2020122922305683400_b26","doi-asserted-by":"crossref","unstructured":"Jarvenpaa, S.L. and Todd, P.A.\n                (1996\/\n               1997), \u201cConsumer reactions to electronic shopping on the World Wide Web\u201d, International Journal of Electronic Commerce, Vol. 1 No. 2, pp. 59-88.","DOI":"10.1080\/10864415.1996.11518283"},{"key":"key2020122922305683400_b27","doi-asserted-by":"crossref","unstructured":"Jiang, P.\n               , \n                  Jones, D.B.\n                and \n                  Javie, S.\n                (2008), \u201cHow third-party certification programs relate to consumer trust in online transactions: an exploratory study\u201d, Psychology and Marketing, Vol. 25 No. 9z, pp. 839-858.","DOI":"10.1002\/mar.20243"},{"key":"key2020122922305683400_b28","doi-asserted-by":"crossref","unstructured":"Keeney, R.L.\n                (1999), \u201cThe value of Internet commerce to the customers\u201d, Management Science, Vol. 45 No. 4, pp. 533-542.","DOI":"10.1287\/mnsc.45.4.533"},{"key":"key2020122922305683400_b29","doi-asserted-by":"crossref","unstructured":"Kerkhof, P.\n                and \n                  Van Noort, G.\n                (2010), \u201cThird party Internet seals: reviewing the effects on online consumer trust\u201d, in \n                  Lee, \n                and \n                  I.\n                (Ed), Encyclopedia of E-Business Development and Management in the Global Economy, Information Science Reference, Hershey, PA, pp. 701-708.","DOI":"10.4018\/978-1-61520-611-7.ch069"},{"key":"key2020122922305683400_b30","unstructured":"Khusial, D.\n                and \n                  McKegney, R.\n                (2005), \u201ce-Commerce security: attacks and preventive strategies\u201d, IBM, available at: www.ibm.com\/developerworks\/websphere\/library\/techarticles\/0504_mckegney\/0504_mckegney.html"},{"key":"key2020122922305683400_b31","unstructured":"Kim, D.\n                and \n                  Benbasat, I.\n                (2003), \u201cThe effects of trust-assuring arguments on consumer trust in Internet stores: application of toulmin\u2019s model of argumentation\u201d, Journal of Electronic Commerce Research, Vol. 4 No. 2, pp. 49-64."},{"key":"key2020122922305683400_b32","doi-asserted-by":"crossref","unstructured":"Kim, D.\n                and \n                  Benbasat, I.\n                (2006), \u201cThe effects of trust-assuring arguments on consumer trust in Internet stores: application of toulmin\u2019s model of argumentation\u201d, Information Systems Research, Vol. 17 No. 3, pp. 286-300.","DOI":"10.1287\/isre.1060.0093"},{"key":"key2020122922305683400_b33","doi-asserted-by":"crossref","unstructured":"Kim, D.\n                and \n                  Benbasat, I.\n                (2009), \u201cTrust-assuring arguments in B2C e-commerce: impact of content, source, and price on trust\u201d, Journal of Management Information Systems, Vol. 26 No. 3, pp. 175-206.","DOI":"10.2753\/MIS0742-1222260306"},{"key":"key2020122922305683400_b34","doi-asserted-by":"crossref","unstructured":"Kim, D.\n                and \n                  Benbasat, I.\n                (2010), \u201cTrust-assuring arguments in B2C e-commerce: impact of content, source, and price on trust\u201d, Journal of Management Information Systems, Vol. 26 No. 3, pp. 175-206.","DOI":"10.2753\/MIS0742-1222260306"},{"key":"key2020122922305683400_b35","unstructured":"Kimery, K.M.\n                and \n                  McCord, M.\n                (2002), \u201cThird-party assurances: the road to trust in online retailing\u201d, Proceedings of 35th Annual Hawaii International Conference on System Sciences, HICSS-35, IEEE Computer Society, HI, Big Island."},{"key":"key2020122922305683400_b36","unstructured":"Koufaris, M.\n                and \n                  Hampton-Sosa, W.\n                (2002), Customer Trust Online: Examining the Role of the Experience With the Web Site, CIS Working Paper Series, New York, NY."},{"key":"key2020122922305683400_b37","unstructured":"Layton, T.P.\n                (2005), Informatin Security Awareness: The Psychology Behind the Technology, AuthorHouse, Bloomington."},{"key":"key2020122922305683400_b39","unstructured":"Lewicki, R.J.\n                and \n                  Tomlinson, E.C.\n                (2003), \u201cTrust and trust building\u201d, Beyond Intractability, in \n                  Burgess, G.Burgess, H.\n                (Eds), Conflict Research Consortium, University of Colorado, Boulder, available at: http:\/\/peopleedge.mindtouch.us\/@api\/deki\/files\/452\/Trust_Building.pdf"},{"key":"key2020122922305683400_b40","doi-asserted-by":"crossref","unstructured":"Lewicki, R.J.\n               , \n                  McAllister, D.J.\n                and \n                  Bies, R.J.\n                (1998), \u201cTrust and distrust: new relationships and realities\u201d, Academy of Management Review, Vol. 23 No. 3, pp. 438-458.","DOI":"10.5465\/amr.1998.926620"},{"key":"key2020122922305683400_b41","unstructured":"Luhmann, N.\n                (2000), \u201cFamiliarity, confidence, trust: problems and alternatives\u201d, in \n                  Gambetta, \n                and \n                  D.\n                (Ed), Trust: Making and Breaking Cooperative Relations, Basil Blackwell, Oxford, pp. 94-107."},{"key":"key2020122922305683400_b42","unstructured":"Marek, J.\n               , \n                  Iversen, E.\n                and \n                  Hellesey, O.H.\n                (1987), \u201cRisk, organization and safety on an oil platform\u201d, in \n                  Singleton, \n               , \n                  W.T.\n               , \n                  Hovden, \n                and \n                  J.\n                (Eds), Risk and Decisions, Wiley, New York, NY, pp. 123-138."},{"key":"key2020122922305683400_b43","unstructured":"Meyer, S.\n                and \n                  Ward, P.R.\n                (2009), \u201cReworking the sociology of trust: making a semantic distinction between trust and dependence\u201d, Proceedings of the Annual Conference of Australian Sociological Association Conference, The Future of Sociology, Canberra, pp. 1-16."},{"key":"key2020122922305683400_b44","unstructured":"Mitchell, V.W.\n                (1991), \u201cAn empirical investigation of perceived risk in the purchase of planning consultancy by local authorities\u201d, unpublished PhD thesis, Manchester School of Management, UMIST."},{"key":"key2020122922305683400_b45","doi-asserted-by":"crossref","unstructured":"Mitchell, V.W.\n                (1999), \u201cConsumer perceived risk: conceptualisations and models\u201d, European Journal of Marketing, Vol. 33 Nos 1\/2, pp. 163-195.","DOI":"10.1108\/03090569910249229"},{"key":"key2020122922305683400_b46","doi-asserted-by":"crossref","unstructured":"Miyazaki, A.D.\n                and \n                  Fernandez, A.\n                (2001), \u201cConsumer perceptions of privacy and security risks for online shopping\u201d, Journal of Consumer Affairs, Vol. 35 No. 1, pp. 27-44.","DOI":"10.1111\/j.1745-6606.2001.tb00101.x"},{"key":"key2020122922305683400_b47","unstructured":"Nunnally, J.C.\n                and \n                  Bernstein, I.H.\n                (1994), Psychometric Theory, 3rd ed., McGraw-Hill, New York, NY."},{"key":"key2020122922305683400_b48","unstructured":"Omariba, Z.B.\n               , \n                  Masese, N.B.\n                and \n                  Wanyembi, G.\n                (2012), \u201cSecurity and privacy of electronic banking\u201d, International Journal of Computer Science Issues, Vol. 9 Nos 4\/3, pp. 432-446."},{"key":"key2020122922305683400_b49","doi-asserted-by":"crossref","unstructured":"Parasuraman, A.\n               , \n                  Zeithaml, V.A.\n                and \n                  Malhotra, A.\n                (2005), \u201cE-S-Qual: a multiple item scale for measuring electronic service quality\u201d, Journal of Service Research, Vol. 7 No. 3, pp. 213-233.","DOI":"10.1177\/1094670504271156"},{"key":"key2020122922305683400_b50","doi-asserted-by":"crossref","unstructured":"Pavlou, P.A.\n                and \n                  Fygenson, M.\n                (2006), \u201cUnderstanding and predicting electronic commerce adoption: an extension of the theory of planned behavior\u201d, MIS Quaterly, Vol. 30 No. 1, pp. 115-143.","DOI":"10.2307\/25148720"},{"key":"key2020122922305683400_b51","doi-asserted-by":"crossref","unstructured":"Ranganathan, C.\n                and \n                  Ganapathy, S.\n                (2002), \u201cKey dimensions of business-to-consumer web sites\u201d, Information and Management, Vol. 39 No. 6, pp. 457-465.","DOI":"10.1016\/S0378-7206(01)00112-4"},{"key":"key2020122922305683400_b53","doi-asserted-by":"crossref","unstructured":"Roselius, T.\n                (1971), \u201cConsumer rankings of risk reduction methods\u201d, Journal of Marketing, Vol. 35 No. 1, pp. 55-61.","DOI":"10.1177\/002224297103500110"},{"key":"key2020122922305683400_b54","unstructured":"Ross, I.\n                (1975), \u201cPerceived risk and consumer behavior: a critical review\u201d, in \n                  Schlinger, M.J.\n                (Ed.), Advances in Consumer Research, Association for Consumer Research, Ann Abor, Vol. 2, pp. 1-20."},{"key":"key2020122922305683400_b55","doi-asserted-by":"crossref","unstructured":"Rousseau, D.M.\n               , \n                  Sitkin, S.B.\n               , \n                  Burt, R.S.\n                and \n                  Camerer, C.\n                (1998), \u201cNot so different after all: a cross-discipline view of trust\u201d, Academy of Management Review, Vol. 23 No. 3, pp. 393-404.","DOI":"10.5465\/amr.1998.926617"},{"key":"key2020122922305683400_b56","unstructured":"Rutter, J.\n                (2002), \u201cFrom the sociology of trust towards a sociology of \u2018e-trust\u2019\u201d, International Journal of New Product Development and Innovation Management, Vol. 2 No. 4, pp. 371-385."},{"key":"key2020122922305683400_b57","unstructured":"Santouridis, I.\n                (2009), \u201cE-Service quality and its impact on customer satisfaction and trust: an empirical study on Greek customers of Internet shops\u201d, Proceedings of the 6th International Conference on Enterprise Systems, Accounting and Logistics, 18-19 May, Thessaloniki, pp. 17-31."},{"key":"key2020122922305683400_b58","doi-asserted-by":"crossref","unstructured":"Santouridis, I.\n               , \n                  Trivellas, P.\n                and \n                  Tsimonis, G.\n                (2012), \u201cUsing E-S-QUAL to measure Internet service quality of e-commerce web sites in Greece\u201d, International Journal of Quality and Service Sciences, Vol. 4 No. 1, pp. 86-98.","DOI":"10.1108\/17566691211219751"},{"key":"key2020122922305683400_b59","doi-asserted-by":"crossref","unstructured":"Slovic, P.\n                (2001), \u201cCigarette smokers: rational actors or rational fools?\u201d, in \n                  Slovic, \n                and \n                  P.\n                (Ed), Smoking: Risk, Perception, and Policy, Sage, Thousand Oaks, CA, pp. 97-124.","DOI":"10.4135\/9781452232652.n6"},{"key":"key2020122922305683400_b60","doi-asserted-by":"crossref","unstructured":"Suh, B.\n                and \n                  Han, I.\n                (2003), \u201cThe impact of customer trust and perception of security control on the acceptance of electronic commerce\u201d, International Journal of Electronic Commerce, Vol. 7 No. 3, pp. 135-161.","DOI":"10.1080\/10864415.2003.11044270"},{"key":"key2020122922305683400_b61","unstructured":"Toulmin, S.E.\n                (1958), The Use of Argument, Cambridge University Press, Cambridge."},{"key":"key2020122922305683400_b62","doi-asserted-by":"crossref","unstructured":"Wang, Y.D.\n                and \n                  Emurian, H.H.\n                (2005), \u201cAn overview of online trust: concepts, elements, and implications\u201d, Computer in Human Behavior, Vol. 21 No. 1, pp. 105-125.","DOI":"10.1016\/j.chb.2003.11.008"},{"key":"key2020122922305683400_b63","doi-asserted-by":"crossref","unstructured":"Wylder, J.\n                (2004), Strategic Information Security,\n               Auerbach Publications, Boca Raton, FL.","DOI":"10.1201\/9780203497081"},{"key":"key2020122922305683400_frd1","unstructured":"Cox, D.F.\n                and \n                  Rich, S.U.\n                (1964), \u201cPerceived risk and consumer decision making-the case of telephone shopping\u201d, Journal of Marketing Research, Vol. 1 No. 4, pp. 32-39."},{"key":"key2020122922305683400_frd2","unstructured":"Cripps, H.\n                and \n                  Standing, C.\n                (2012), \u201cBuilding patient trust in electronic health records\u201d, The Proceedings of the 1st Australian eHealth Informatics and Security Conference, Perth, pp. 9-15."},{"key":"key2020122922305683400_frd3","doi-asserted-by":"crossref","unstructured":"Derbaix, C.\n                (1983), \u201cPerceived risk and risk relievers: an empirical investigation\u201d, Journal of Economic Psychology, Vol. 3 No. 1, pp. 19-38.","DOI":"10.1016\/0167-4870(83)90056-9"},{"key":"key2020122922305683400_frd4","unstructured":"Lee, N.\n                (2001), Childhood and Society: Growing Up in an Age of Uncertainty, Open University Press, Buckingham."},{"key":"key2020122922305683400_frd5","doi-asserted-by":"crossref","unstructured":"Roman, S.\n                (2006), \u201cThe ethics of online retailing: a scale development and validation from the consumers\u2019 perspective\u201d, Journal of Business Ethics, Vol. 72 No. 2, pp. 131-148.","DOI":"10.1007\/s10551-006-9161-y"}],"container-title":["Journal of Systems and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JSIT-01-2014-0008","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JSIT-01-2014-0008\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JSIT-01-2014-0008\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:23:35Z","timestamp":1753395815000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jsit\/article\/16\/3\/170-186\/249618"}},"subtitle":[],"editor":[{"given":"Professor","family":"Georgios Giannakopoulos and Professor Damianos Sakas","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2014,8,5]]},"references-count":63,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,8,5]]}},"alternative-id":["10.1108\/JSIT-01-2014-0008"],"URL":"https:\/\/doi.org\/10.1108\/jsit-01-2014-0008","relation":{},"ISSN":["1328-7265"],"issn-type":[{"type":"print","value":"1328-7265"}],"subject":[],"published":{"date-parts":[[2014,8,5]]}}}