{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:51:15Z","timestamp":1730238675448,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/icdim.2010.5664661","type":"proceedings-article","created":{"date-parts":[[2010,12,14]],"date-time":"2010-12-14T15:28:00Z","timestamp":1292340480000},"page":"367-372","source":"Crossref","is-referenced-by-count":0,"title":["A requirements taxonomy and rating model for secure and usable B2C\/C2C e-commerce websites"],"prefix":"10.1109","author":[{"given":"Ulises Ibarra","family":"Hernandez","sequence":"first","affiliation":[]},{"given":"Miguel Vargas","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Francisco J. Alvarez","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Ricardo Mendoza","family":"Gonzalez","sequence":"additional","affiliation":[]},{"given":"Fabio A. Garcia","family":"Toribio","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2006.296137"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2009.65"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IEMC.2001.960550"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2009.5090096"},{"article-title":"Introduction to Computer Security","year":"2004","author":"bishop","key":"ref14"},{"year":"2009","key":"ref15","article-title":"Information technology - Security techniques - Information security management systems - Overview and vocabulary"},{"article-title":"The Goal Question Metrics Approach","year":"0","author":"basili","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.49"},{"journal-title":"International Organization for Standardization (ISO) \/ International Electrotechnical Commission (IEC)","article-title":"Software engineering - Product Quality; Parts 1&#x2013;4","year":"2001","key":"ref6"},{"article-title":"A Software Quality Model and Metrics for Identifying Project Risk and Assessing Software Quality","year":"0","author":"hayatt","key":"ref5"},{"key":"ref8","article-title":"Characteristics of software quality","volume":"1","author":"bo\u00ebhm","year":"1978","journal-title":"TRW Series of Software Technology"},{"key":"ref7","article-title":"Factors in Software Quality","volume":"1?6","author":"mccall","year":"1977"},{"article-title":"E-commerce Test","year":"2005","author":"chun","key":"ref2"},{"year":"1999","key":"ref1","article-title":"Information Technology - Software Product Evaluation - Part 1 General Overview"},{"key":"ref9","first-page":"43","article-title":"A Taxonomy of Software Security Requirements","author":"calder\u00f3n","year":"2004","journal-title":"Advances in informatics systems (Avances en sistemas en inform&#x00E1;tica)"}],"event":{"name":"2010 Fifth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2010,7,5]]},"location":"Thunder Bay, ON, Canada","end":{"date-parts":[[2010,7,8]]}},"container-title":["2010 Fifth International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5644872\/5662242\/05664661.pdf?arnumber=5664661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T07:12:01Z","timestamp":1490080321000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5664661\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icdim.2010.5664661","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}