{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:36:43Z","timestamp":1729633003315,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,2]]},"DOI":"10.1109\/conielecomp.2010.5440766","type":"proceedings-article","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T05:11:43Z","timestamp":1270617103000},"page":"206-211","source":"Crossref","is-referenced-by-count":7,"title":["Business-to-consumer e-commerce Web Sites: Vulnerabilities, Threats and quality evaluation model"],"prefix":"10.1109","author":[{"given":"Radwan M.","family":"Al-Dwairi","sequence":"first","affiliation":[]},{"given":"Mumtaz A.","family":"Kamala","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"327","article-title":"Consumer satisfaction with Internet shopping","volume":"113","author":"cheung","year":"2005","journal-title":"ACM International Conference Proceeding Series"},{"key":"ref32","first-page":"10","author":"tsiakis","year":"2004","journal-title":"The Concept of security and Trust in electronic payments"},{"key":"ref31","first-page":"645","volume":"105","author":"cao","year":"2005","journal-title":"B2C e-commerce web site quality an empirical examination"},{"journal-title":"Proceedings of thw 13 th European conference on Information System in a Rapidly Changing Economy ECIS","year":"2005","author":"oliveira","key":"ref30"},{"key":"ref34","first-page":"1","article-title":"Developing, Trust in Internet Commerce","author":"araujo","year":"2003","journal-title":"Proceedings of the 2003 Conference of the Centre for Advanced Studies on Collaborative Research"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060815"},{"article-title":"Electronic Commerce","year":"0","author":"schneider","key":"ref11"},{"article-title":"Web Security: The Emperor's New Armour","year":"2001","author":"josang","key":"ref12"},{"article-title":"Cryptography and Network Security-Principals and Practices","year":"2006","author":"stallings","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352627"},{"year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511498"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00112-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1039174.1039200"},{"article-title":"Spyware: Background and policy issues for Congress","year":"2005","author":"smith","key":"ref19"},{"key":"ref28","article-title":"Fuzzy Inferencing in the Web Page Layout Design","author":"ahmed","year":"2003","journal-title":"Proceedings of the WSMAI 2003&#x2013;5th International Conference on Enterprise Information Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1089551.1089593"},{"key":"ref27","first-page":"331","article-title":"Evaluating E-Commerce Sites with AI tools: a modeling approach","volume":"a","author":"stefani","year":"0","journal-title":"11th Panhellenic Conference on Informatics with International Participation"},{"key":"ref3","first-page":"143","article-title":"Measuring E-commerce Effectiveness: A conceptual Model","volume":"47","author":"pather","year":"0","journal-title":"ACM International Conference Proceeding Series"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/570705.570720"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.35.8.982"},{"key":"ref5","article-title":"Security in Mobile Communications: Challenges and Opportunities","volume":"21","author":"josang","year":"2003","journal-title":"Australasian Information Security Workshop (AISW2003) Adelaide Australia Conferences in Research and Practice in Information Technology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511498"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994190"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/296336.296357","article-title":"A comparison of two current E-commerce sites","author":"tilson","year":"1998","journal-title":"Proceedings of the 16th annual international conference on Computer documentation"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2009.35"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254327"},{"journal-title":"CNET Networks","article-title":"Zombies: the Digital Undead","year":"2005","key":"ref20"},{"year":"0","key":"ref22"},{"journal-title":"POWERGROUP UK Glossary","year":"0","key":"ref21"},{"journal-title":"SQL Injection","year":"0","key":"ref24"},{"article-title":"Cross-Site Scripting (XSS) Attack Lab","year":"2006","author":"du","key":"ref23"},{"key":"ref26","first-page":"105","article-title":"A model for assessing the quality of e-commerce systems","author":"xenos","year":"0","journal-title":"Proceeding of the PC-HCI 2001 Conference on Human Computer Ineraction"},{"article-title":"Avoiding Social Engineering and Phishing Attacks","year":"2004","author":"mcdowell","key":"ref25"}],"event":{"name":"2010 20th International Conference on Electronics Communications and Computers (CONIELECOMP)","start":{"date-parts":[[2010,2,22]]},"location":"Cholula, Puebla, Mexico","end":{"date-parts":[[2010,2,24]]}},"container-title":["2010 20th International Conference on Electronics Communications and Computers (CONIELECOMP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5433810\/5440746\/05440766.pdf?arnumber=5440766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T16:02:07Z","timestamp":1635177727000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5440766\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/conielecomp.2010.5440766","relation":{},"subject":[],"published":{"date-parts":[[2010,2]]}}}