{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:51:29Z","timestamp":1729608689600,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wcins.2010.5544628","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T20:30:50Z","timestamp":1281472250000},"page":"643-646","source":"Crossref","is-referenced-by-count":0,"title":["E-commerce website credible model based on fuzzy grey method"],"prefix":"10.1109","author":[{"given":"Hongying","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Ling","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Usability Evaluation of B2C E-Commerce Web Site","volume":"24","author":"jinling","year":"2005","journal-title":"Journal of the China Society for Scientific and Technical Information"},{"key":"ref3","first-page":"1933","article-title":"High Confidence Software Engineering Technologies","volume":"31","author":"huowang","year":"2003","journal-title":"Acta Electronica Sinica"},{"key":"ref10","first-page":"250","article-title":"Multi-level grey comprehensive evaluation on service quality of NPOs","author":"yangcheng","year":"2009","journal-title":"Computer Science and Information Technology"},{"key":"ref6","first-page":"69","article-title":"Evaluation of the Service Quality of E-commerce Web Site Based on the Functional Integrity","volume":"28","author":"yabei","year":"2009","journal-title":"Journal of Intelligence"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1080\/10864415.2003.11044270","article-title":"The Impact of Customer Trust and Perception of security Control on the Acceptance of Electronic Commerce","volume":"7","author":"suh","year":"2003","journal-title":"International Journal of Electronic Commerce"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ECBI.2009.93"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IEMC.2001.960550"},{"key":"ref2","first-page":"754","article-title":"Study on Mobile E-commerce Security Payment System","volume":"0","author":"hua","year":"2008","journal-title":"Proceedings of the 2008 International Symposium on Electronic Commerce and Security"},{"article-title":"Application of Comprehensive Fuzzy Evaluation in Network Course","year":"2009","author":"zhiming","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.206308"}],"event":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)","start":{"date-parts":[[2010,6,25]]},"location":"Beijing, China","end":{"date-parts":[[2010,6,27]]}},"container-title":["2010 IEEE International Conference on Wireless Communications, Networking and Information Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5524730\/5541718\/05544628.pdf?arnumber=5544628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:29:39Z","timestamp":1559402979000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5544628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/wcins.2010.5544628","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}