{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T21:40:01Z","timestamp":1768426801677,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100012947","name":"IRD","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012947","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011061","name":"AFD","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011061","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,9]]},"DOI":"10.1109\/icit58056.2023.10226142","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:26:12Z","timestamp":1693329972000},"page":"13-18","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of Critical Factors Influencing E-Learning Platforms Security"],"prefix":"10.1109","author":[{"given":"Essohanam","family":"Djeki","sequence":"first","affiliation":[{"name":"Institut de Math&#x00E9;matiques et de Sciences Physiques,Porto-Novo,Benin"}]},{"given":"Jules","family":"D\u00e9gila","sequence":"additional","affiliation":[{"name":"Institut de Math&#x00E9;matiques et de Sciences Physiques,Porto-Novo,Benin"}]},{"given":"Muhtar Hanif","family":"Alhassan","sequence":"additional","affiliation":[{"name":"National Open University of Nigeria (NOUN),Abuja,Nigeria"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2897248"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6866552"},{"key":"ref15","article-title":"The Importance of Web Browser Security and Privacy","author":"howard","year":"0","journal-title":"ADMI 2021 Symp Comput Minor Inst"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3440749.3442611"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4102\/sajim.v20i1.926"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.34105\/j.kmel.2019.11.012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s40692-022-00235-x"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963333"},{"key":"ref17","author":"dict","year":"2022","journal-title":"NOUN | National Open University of Nigeria"},{"key":"ref16","article-title":"SOK: On the Analysis of Web Browser Security","author":"lim","year":"2021","journal-title":"ArXiv211215561 Cs"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCR56254.2022.9995769"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WMTE.2002.1039229"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EduCon.2013.6530268"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11224-9_9"},{"key":"ref9","article-title":"Not for higher education: cybercriminals target academic & research institutions across the world","author":"point","year":"2020","journal-title":"Check point software Clusterxl"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICOCO56118.2022.10031923"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICOCO53166.2021.9673575"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TEMSCONEUROPE54743.2022.9801945"},{"key":"ref5","article-title":"E-Learning 3.0= E-Learning 2.0+ Web 3.0?","author":"hussain","year":"2012","journal-title":"Int Ass for Dev of the Info Soc"}],"event":{"name":"2023 International Conference on Information Technology (ICIT)","location":"Amman, Jordan","start":{"date-parts":[[2023,8,9]]},"end":{"date-parts":[[2023,8,10]]}},"container-title":["2023 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10225686\/10225751\/10226142.pdf?arnumber=10226142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:43:47Z","timestamp":1695059027000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10226142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icit58056.2023.10226142","relation":{},"subject":[],"published":{"date-parts":[[2023,8,9]]}}}