{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:21:35Z","timestamp":1730276495527,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335067","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:50:11Z","timestamp":1448319011000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Robustness of computational intelligent assurance models when assessing e-Commerce sites"],"prefix":"10.1109","author":[{"given":"Thembekile O.","family":"Mayayise","sequence":"first","affiliation":[]},{"given":"Isaac O.","family":"Osunmakinde","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"3","volume":"38","author":"ouedraogo","year":"2013","journal-title":"Selecting a Cloud Service Provider in the age of cybercrime Computers and Security"},{"journal-title":"Rackspace","year":"2015","key":"ref11"},{"journal-title":"Netsuite","year":"2015","key":"ref12"},{"year":"2015","author":"world","key":"ref13"},{"journal-title":"Qualys","year":"2015","key":"ref14"},{"key":"ref15","first-page":"540","volume":"24","author":"raval","year":"2008","journal-title":"PCI-DSS Payment Card Industry data security standards in context Computer Law and Security Report"},{"key":"ref16","first-page":"46","volume":"32","author":"runyan","year":"2008","journal-title":"Implications of Web assurance services on e-commerce Accounting Forum"},{"journal-title":"The Analytic Hierarchy Process","year":"1980","author":"saaty","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.01.011"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.07.007"},{"journal-title":"Site Seals","year":"2015","key":"ref4"},{"journal-title":"Analytical Hierachy Process","year":"2012","author":"barnard","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2010.5489942"},{"year":"0","key":"ref5"},{"journal-title":"Cloud Computing","year":"2015","key":"ref8"},{"journal-title":"Cloud Computing","year":"2015","key":"ref7"},{"journal-title":"Bankinfosecurity","year":"2015","key":"ref2"},{"key":"ref9","first-page":"95","volume":"4","author":"kaplan","year":"2003","journal-title":"A Web assurance services model for trust for B2C e-commerce International Journal of Accounting"},{"journal-title":"Privacy","year":"2015","key":"ref1"},{"journal-title":"Small SEO Tools","year":"2015","key":"ref20"},{"journal-title":"Visual Paradigm","year":"2015","key":"ref22"},{"journal-title":"Sony","year":"0","key":"ref21"},{"key":"ref24","first-page":"1390","author":"zhengdong","year":"2007","journal-title":"Study on new method of GAHP International Conference grey Systems and Intelligent Service"},{"journal-title":"Trustee","year":"2015","key":"ref23"},{"key":"ref26","first-page":"1","article-title":"Design and implementation of a trusted monitoring framework for cloud platforms","volume":"29","author":"zou","year":"2012","journal-title":"Future Generation Computer Systems"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.024"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335067.pdf?arnumber=7335067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T04:57:33Z","timestamp":1490417853000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335067","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}