{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:32:28Z","timestamp":1729668748216,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/iscit.2014.7011936","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T19:36:49Z","timestamp":1421869009000},"page":"378-382","source":"Crossref","is-referenced-by-count":3,"title":["Accountability in internet transactions revisited"],"prefix":"10.1109","author":[{"given":"Chian","family":"Techapanupreeda","sequence":"first","affiliation":[]},{"given":"Roongroj","family":"Chokngamwong","sequence":"additional","affiliation":[]},{"given":"Chalee","family":"Thammarat","sequence":"additional","affiliation":[]},{"given":"Supakorn","family":"Kungpisdan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Conceptualising accountability","author":"andreas","year":"1999","journal-title":"The Self-Restraining State Power and Accountability in New Democracies Lynne Reinner London"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jopan.2013.01.002"},{"key":"18","article-title":"Privacy, security and storage issues in medical data management internet (ah-ici","author":"khadka","year":"0","journal-title":"2013 Third Himalayas International Conference"},{"key":"33","doi-asserted-by":"crossref","first-page":"946","DOI":"10.1080\/01402382.2010.486119","article-title":"Two concepts of accountability: Accountability as a virtue and as a mechanism","volume":"33","author":"mark","year":"2010","journal-title":"West European Politics"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIINFS.2011.6038039"},{"journal-title":"Accountability and Health Systems Overview Framework An D Strategies","year":"2003","author":"brinkerhoff","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2003.1212787"},{"key":"13","article-title":"Accountability and monitoring in health initiative","author":"flores","year":"0","journal-title":"Open Society Foundations (2011) Community Monitoring for Accountability in Health Review of Literature"},{"key":"14","article-title":"Accountability for patient safety: A review of cases","author":"rivard","year":"2003","journal-title":"Practice Concepts"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2110363.2110410"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6210.2005.00434.x"},{"key":"21","first-page":"9","volume":"43","author":"durante","year":"2013","journal-title":"How to Cross Boundaries in the Information Society Vulnerability Responsiveness and Accountability Law School"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055874"},{"key":"22","first-page":"135","volume":"55","author":"moe ronald","year":"1995","journal-title":"Rediscovering Principles of Public Administration The Neglected Foundation of Public Law Public Administration Review"},{"key":"23","first-page":"277","article-title":"Principled agents: The cultural bases of behavior in a federal government bureaucracy","volume":"4","author":"dilulio","year":"1994","journal-title":"Journal of Public Administration Research and Theory"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.2307\/975521"},{"key":"25","doi-asserted-by":"crossref","first-page":"144","DOI":"10.2307\/975457","article-title":"Process accountability and the creativ e use of intergovernmental resources","volume":"41","author":"mckinney","year":"1981","journal-title":"Public Administration Review"},{"journal-title":"The Politics of Bureaucracy","year":"1965","author":"gordon","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/49.839935"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(02)00049-X"},{"key":"29","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/978-3-540-24676-3_18","article-title":"Concurrent signatures,\" in","volume":"3027","author":"chen","year":"2004","journal-title":"Advances in Cryptology-EUROCRYPT 2004 Lecture Notes in Computer Science"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286423"},{"key":"2","first-page":"268","article-title":"Practical reasoning about accountability in electronic commerce protocols","volume":"2288","author":"kungpisdan","year":"2002","journal-title":"LNCS"},{"journal-title":"A Study of Literat Ure Review on Individual Accountability","year":"2013","author":"arti","key":"10"},{"key":"1","volume":"22","author":"kailar","year":"1996","journal-title":"Protocols"},{"key":"30","first-page":"14","article-title":"Perfect concurrent signature schemes,\" in","volume":"3269","author":"susilo","year":"2004","journal-title":"ICICS 2004 Lecture Notes in Computer Science"},{"key":"7","first-page":"37a","article-title":"A disclosu re framework for service accountability in soa","author":"zou","year":"2008","journal-title":"IEEE International Conference on e-Business Engineering"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2007.12"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEE.2008.24"},{"key":"5","first-page":"268","volume":"2288","author":"kungpisdan","year":"2005","journal-title":"Modelling Design and Analysis of Secure Mobile Payment Systems"},{"key":"31","first-page":"435","article-title":"The fairness of perfect concurrent signatures, \" in","volume":"4307","author":"wang","year":"2006","journal-title":"LNCS of ICCS'06"},{"key":"4","article-title":"Lightweight mobile credit-card payment protocol","volume":"2003","author":"kungpisdan","year":"2003","journal-title":"Proc Indocrypt"},{"key":"9","first-page":"556","article-title":"The practical detailed requirements of accountability and its app lication in the electronic payment protocols e-technology, e-commerce and e-service 2005 eee '05","author":"meng","year":"2005","journal-title":"Proceedings the 2005 IEEE International Conference on"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.167"}],"event":{"name":"2014 14th International Symposium on Communications and Information Technologies (ISCIT)","start":{"date-parts":[[2014,9,24]]},"location":"Incheon, South Korea","end":{"date-parts":[[2014,9,26]]}},"container-title":["2014 14th International Symposium on Communications and Information Technologies (ISCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7000610\/7011852\/07011936.pdf?arnumber=7011936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T04:03:40Z","timestamp":1498190620000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7011936\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/iscit.2014.7011936","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}