{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T05:13:03Z","timestamp":1768972383200,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T00:00:00Z","timestamp":1451865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,1,4]]},"DOI":"10.1145\/2833312.2850445","type":"proceedings-article","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T14:54:02Z","timestamp":1454684042000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy, security, risk, and trust concerns in e-commerce"],"prefix":"10.1145","author":[{"given":"Ghadeer","family":"Neama","sequence":"first","affiliation":[{"name":"Kuwait University"}]},{"given":"Rana","family":"Alaskar","sequence":"additional","affiliation":[{"name":"Kuwait University"}]},{"given":"Mohammad","family":"Alkandari","sequence":"additional","affiliation":[{"name":"Kuwait University"}]}],"member":"320","published-online":{"date-parts":[[2016,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.12.008"},{"key":"e_1_3_2_1_2_1","unstructured":"E-Commerce - Statistics & Market Data Statista. Retrieved October 9 2015 from: http:\/\/www.statista.com\/markets\/413\/e-commerce\/. E-Commerce - Statistics & Market Data Statista. Retrieved October 9 2015 from: http:\/\/www.statista.com\/markets\/413\/e-commerce\/."},{"key":"e_1_3_2_1_3_1","unstructured":"B2C e-commerce sales worldwide 2018 Statista. Retrieved October 9 2015 from: http:\/\/www.statista.com\/statistics\/261245\/b2c-e-commerce-sales-worldwide\/. B2C e-commerce sales worldwide 2018 Statista. Retrieved October 9 2015 from: http:\/\/www.statista.com\/statistics\/261245\/b2c-e-commerce-sales-worldwide\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2004.01.003"},{"key":"e_1_3_2_1_5_1","first-page":"1149","article-title":"Information Security in Big Data: Privacy and Data Mining. Access","volume":"2","author":"Xu L.","year":"2014","unstructured":"Xu , L. , Jiang , C. , Wang , J. , Yuan , J. , & Ren , Y. , 2014 . Information Security in Big Data: Privacy and Data Mining. Access , IEEE , 2 , 1149 -- 1176 . Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y., 2014. Information Security in Big Data: Privacy and Data Mining. Access, IEEE, 2, 1149--1176.","journal-title":"IEEE"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/299157.299175"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Udo G. 2001. Privacy and security concerns as major barriers for e-commerce: a survey study. Information management & Computer Security (9) 4. 165--174. Udo G. 2001. Privacy and security concerns as major barriers for e-commerce: a survey study. Information management & Computer Security (9) 4. 165--174.","DOI":"10.1108\/EUM0000000005808"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1108\/07363760310464578"},{"key":"e_1_3_2_1_9_1","article-title":"Privacy, trust, and disclosure: exploring barriers to electronic commerce","author":"Metzger M.","year":"2004","unstructured":"Metzger , M. , 2004 . Privacy, trust, and disclosure: exploring barriers to electronic commerce . Journal of Computer-Mediated Communication, (9) 4. Metzger, M., 2004. Privacy, trust, and disclosure: exploring barriers to electronic commerce. Journal of Computer-Mediated Communication, (9) 4.","journal-title":"Journal of Computer-Mediated Communication, (9) 4."},{"key":"e_1_3_2_1_10_1","unstructured":"Ackerman M. S. & Davis Jr D. T. 2003. Privacy and security issues in e-commerce. New economy handbook 911--930. Ackerman M. S. & Davis Jr D. T. 2003. Privacy and security issues in e-commerce. New economy handbook 911--930."},{"issue":"3","key":"e_1_3_2_1_11_1","first-page":"1","article-title":"An examination of individual's perceived security and privacy of the internet in Malaysia and the influence of this on their intention to use e-commerce: using an extension of the technology acceptance model","volume":"12","author":"Lallmahamood M.","year":"2007","unstructured":"Lallmahamood , M. , 2007 . An examination of individual's perceived security and privacy of the internet in Malaysia and the influence of this on their intention to use e-commerce: using an extension of the technology acceptance model . Journal of International Banking and Commerce , 12 ( 3 ). 1 -- 24 . Lallmahamood, M., 2007. An examination of individual's perceived security and privacy of the internet in Malaysia and the influence of this on their intention to use e-commerce: using an extension of the technology acceptance model. Journal of International Banking and Commerce, 12 (3). 1--24.","journal-title":"Journal of International Banking and Commerce"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-4972(03)00130-5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Jarvenpaa S. L. Tractinsky N. and Saarinen L. Customer trust in internet store: a cross-cultural validation. Journal of Computer Mediated Communication (5) 2. 1--35. Jarvenpaa S. L. Tractinsky N. and Saarinen L. Customer trust in internet store: a cross-cultural validation. Journal of Computer Mediated Communication (5) 2. 1--35.","DOI":"10.1111\/j.1083-6101.1999.tb00337.x"},{"key":"e_1_3_2_1_14_1","article-title":"Trustworthness in electronic commerce: the role of privacy, security, and site attributes","author":"Belanger F","year":"2002","unstructured":"Belanger , F , Hiller , J. S. , and Smith , W. J. , 2002 . Trustworthness in electronic commerce: the role of privacy, security, and site attributes . Journal of Computer-Mediated Communication, (11) 3--4. 245--270. Belanger, F, Hiller, J. S., and Smith, W. J., 2002. Trustworthness in electronic commerce: the role of privacy, security, and site attributes. Journal of Computer-Mediated Communication, (11) 3--4. 245--270.","journal-title":"Journal of Computer-Mediated Communication, (11) 3--4. 245--270."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/341852.341877"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/336460.336473"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the ICEB+ eBRF Conference.","author":"Pennanen K.","year":"2006","unstructured":"Pennanen , K. , Kaapu , T. , & Paakki , M. K. , 2006 . Trust, risk, privacy, and security in ecommerce . In Proceedings of the ICEB+ eBRF Conference. Pennanen, K., Kaapu, T., & Paakki, M. K., 2006. Trust, risk, privacy, and security in ecommerce. In Proceedings of the ICEB+ eBRF Conference."},{"key":"e_1_3_2_1_18_1","unstructured":"Warren and Brandeis \"The Right to Privacy\" Groups.csail.mit.edu. Retrieved October 9 2015 from: http:\/\/groups.csail.mit.edu\/mac\/classes\/6.805\/articles\/privacy\/Privacy_brand_warr2.html. Warren and Brandeis \"The Right to Privacy\" Groups.csail.mit.edu. Retrieved October 9 2015 from: http:\/\/groups.csail.mit.edu\/mac\/classes\/6.805\/articles\/privacy\/Privacy_brand_warr2.html."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:5"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-007-9002-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.07.001"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00111-3"},{"key":"e_1_3_2_1_23_1","volume-title":"An integrative model of organizational trust","author":"Mayer R. C.","unstructured":"Mayer , R. C. , Davis , J. H. , and Schoorman , F. D . An integrative model of organizational trust . Academy of Management Review , (20) 3. 709--734. Mayer, R. C., Davis, J. H., and Schoorman, F. D. An integrative model of organizational trust. Academy of Management Review, (20) 3. 709--734."},{"key":"e_1_3_2_1_24_1","volume-title":"the proceedings of the twenty first international conference on information systems, (GA","author":"McKnight D. H.","year":"2000","unstructured":"McKnight , D. H. , Choudhury , V. , and Kacmar , C . Trust in e-commerce vendors: a two-stage model . In the proceedings of the twenty first international conference on information systems, (GA , 2000 ), 532--536. McKnight, D. H., Choudhury, V., and Kacmar, C. Trust in e-commerce vendors: a two-stage model. In the proceedings of the twenty first international conference on information systems, (GA, 2000), 532--536."},{"key":"e_1_3_2_1_25_1","volume-title":"Introductory Statistics: Concepts, Models, and Applications. Retrieved","author":"Stockburger D. S.","year":"2015","unstructured":"Stockburger , D. S. Correlation , Introductory Statistics: Concepts, Models, and Applications. Retrieved October 9, 2015 , from: http:\/\/www2.webster.edu\/~woolflm\/correlation\/correlation.html. Stockburger, D. S. Correlation, Introductory Statistics: Concepts, Models, and Applications. Retrieved October 9, 2015, from: http:\/\/www2.webster.edu\/~woolflm\/correlation\/correlation.html."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Tavakol M. & Dennick R. 2011. Making sense of Cronbach's alpha. International journal of medical education 2 53. Tavakol M. & Dennick R. 2011. Making sense of Cronbach's alpha. International journal of medical education 2 53.","DOI":"10.5116\/ijme.4dfb.8dfd"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Churchill G. A paradigm for developing better measure of marketing constructs. Journal of Marketing Research (16) 1. 64--73. Churchill G. A paradigm for developing better measure of marketing constructs. Journal of Marketing Research (16) 1. 64--73.","DOI":"10.1177\/002224377901600110"},{"issue":"1","key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","first-page":"105","DOI":"10.70953\/ERPv38.11005","article-title":". Validity and Reliability in Social Science Research","volume":"38","author":"Drost E. A.","year":"2011","unstructured":"Drost , E. A. , 2011 . Validity and Reliability in Social Science Research . Education Research and Perspectives , 38 ( 1 ), pp. 105 -- 123 . Drost, E. A., 2011. Validity and Reliability in Social Science Research. Education Research and Perspectives, 38(1), pp. 105--123.","journal-title":"Education Research and Perspectives"},{"key":"e_1_3_2_1_29_1","unstructured":"Gustavsson M. & Johansson A. M. 2006. Consumer Trust in E-commerce. Gustavsson M. & Johansson A. M. 2006. Consumer Trust in E-commerce."},{"key":"e_1_3_2_1_30_1","volume-title":"Relationships between variables. Retrieved","author":"Field A.","year":"2015","unstructured":"Field , A. Relationships between variables. Retrieved October 9, 2015 , from: http:\/\/www.statisticshell.com\/docs\/correlation.pdf. Field, A. Relationships between variables. Retrieved October 9, 2015, from: http:\/\/www.statisticshell.com\/docs\/correlation.pdf."},{"key":"e_1_3_2_1_31_1","volume-title":"Statistical Consulting Group. Annotated SPSS Output: t-test. Retrieved","author":"UCLA","year":"2015","unstructured":"UCLA : Statistical Consulting Group. Annotated SPSS Output: t-test. Retrieved October 9, 2015 , from: http:\/\/www.ats.ucla.edu\/stat\/spss\/output\/Spss_ttest.htm UCLA: Statistical Consulting Group. Annotated SPSS Output: t-test. Retrieved October 9, 2015, from: http:\/\/www.ats.ucla.edu\/stat\/spss\/output\/Spss_ttest.htm"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"}],"event":{"name":"ICDCN '16: 17th International Conference on Distributed Computing and Networking","location":"Singapore Singapore","acronym":"ICDCN '16"},"container-title":["Proceedings of the 17th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2833312.2850445","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2833312.2850445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:49Z","timestamp":1750225729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2833312.2850445"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,4]]},"references-count":32,"alternative-id":["10.1145\/2833312.2850445","10.1145\/2833312"],"URL":"https:\/\/doi.org\/10.1145\/2833312.2850445","relation":{},"subject":[],"published":{"date-parts":[[2016,1,4]]},"assertion":[{"value":"2016-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}