{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:40:17Z","timestamp":1755794417694,"version":"3.44.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/isda.2015.7489164","type":"proceedings-article","created":{"date-parts":[[2016,6,13]],"date-time":"2016-06-13T18:22:17Z","timestamp":1465842137000},"page":"493-498","source":"Crossref","is-referenced-by-count":0,"title":["Agent-based system simulation of electronic commerce: Effect of cut-link on prisoner's dilemma with Small World topology"],"prefix":"10.1109","author":[{"given":"Jalal Eddine","family":"Bahbouhi","sequence":"first","affiliation":[{"name":"LAROSERI, Department of Computer Science, University of Chouaib Doukkali, EL Jadida, Morocco"}]},{"given":"Najem","family":"Moussa","sequence":"additional","affiliation":[{"name":"LAROSERI, Department of Computer Science, University of Chouaib Doukkali, EL Jadida, Morocco"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Social commerce defined","volume":"23747","author":"dennison","year":"2009","journal-title":"White Paper"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.dddmp.4350098"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1282100.1282157"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00129-X"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.242"},{"article-title":"Trust: Making and breaking cooperative relations","year":"1988","author":"gambetta","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2004.01.006"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2007.19"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2004.10.009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12436-5_16"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2010.05.003"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1409540.1409550"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2012.12.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.165"},{"key":"ref1","article-title":"Fundamental aspects of privacy and deception in electronic auctions","author":"brandt","year":"2003","journal-title":"Technische Universitat Mtinchen Univer-sitatsbibliothek"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2009.09.003"}],"event":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","start":{"date-parts":[[2015,12,14]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7484413\/7489153\/07489164.pdf?arnumber=7489164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T18:18:47Z","timestamp":1755281927000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7489164\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/isda.2015.7489164","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}