{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:15Z","timestamp":1750306275688,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905240","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Critical Analysis of the Cyber Contract Using Electronic Mail"],"prefix":"10.1145","author":[{"given":"Biswajit","family":"Tripathy","sequence":"first","affiliation":[{"name":"Dept of CSE, Biju Pattnaik Univeristy of Technology, Odisha, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"D. M. Nyamaka (2011). Electronic Contracts in Tanzania: An Appraisal of the Legal Framework Accessed from www.http:\/\/works.bepress.com\/cgi\/viewcontent.cgi?article=1001&context=dmnyamaka.  D. M. Nyamaka (2011). Electronic Contracts in Tanzania: An Appraisal of the Legal Framework Accessed from www.http:\/\/works.bepress.com\/cgi\/viewcontent.cgi?article=1001&context=dmnyamaka."},{"key":"e_1_3_2_1_2_1","unstructured":"UNCTAD Report(2000) Building Confidence: Ecommerce and Development. Accessed from www.http:\/\/unctad.org\/en\/Publications.Library.  UNCTAD Report(2000) Building Confidence: Ecommerce and Development. Accessed from www.http:\/\/unctad.org\/en\/Publications.Library."},{"key":"e_1_3_2_1_3_1","unstructured":"D. J. Brinson et al. (2001) Analysing Ecommerce & Internet Law Prentice Hall PRT Upper Saddle River NJ.   D. J. Brinson et al. (2001) Analysing Ecommerce & Internet Law Prentice Hall PRT Upper Saddle River NJ."},{"key":"e_1_3_2_1_4_1","unstructured":"Ibid at 131.  Ibid at 131."},{"key":"e_1_3_2_1_5_1","unstructured":"Nditi N. N. (2004) General Principles of Contract Law in East Africa Dar Es Salaam University Press Africa.  Nditi N. N. (2004) General Principles of Contract Law in East Africa Dar Es Salaam University Press Africa."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Shaw M. J. (2000) \"Electronic Commerce: State of the Art\" in Shaw et al (Eds.) Handbook on Electronic Commerce Springer Germany.  Shaw M. J. (2000) \"Electronic Commerce: State of the Art\" in Shaw et al (Eds.) Handbook on Electronic Commerce Springer Germany.","DOI":"10.1007\/978-3-642-58327-8"},{"key":"e_1_3_2_1_7_1","article-title":"The Electronic Formation of Contracts and the Common Law","author":"Valerie","year":"2004","journal-title":"Mailbox Rule, Baylor Law Review, 175."},{"key":"e_1_3_2_1_8_1","unstructured":"Cyber Security Planning Guide. Accessed from https:\/\/transition.fcc.gov\/cyber\/cyberplanner.pdf  Cyber Security Planning Guide. Accessed from https:\/\/transition.fcc.gov\/cyber\/cyberplanner.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"White Paper on An Architectural framework for enterprise email infrastructure & security: Getting It Right Today Getting Ready For Tomorrow. October 2008. Accessed from http:\/\/www.sendmail.com\/pdfs\/whitepapers\/wp_arch.pdf  White Paper on An Architectural framework for enterprise email infrastructure & security: Getting It Right Today Getting Ready For Tomorrow. October 2008. Accessed from http:\/\/www.sendmail.com\/pdfs\/whitepapers\/wp_arch.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"Conan Albrecht Email Analysis. http:\/\/www.gsaig.gov\/assets\/File\/other-documents\/Forensics-EmailAnalysis.pptx.pdf  Conan Albrecht Email Analysis. http:\/\/www.gsaig.gov\/assets\/File\/other-documents\/Forensics-EmailAnalysis.pptx.pdf"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"J. Mishra B. Tripathy(2007) Cyber Contract and Indian Law Kubota T (Eds.) Cyber law for Global E-Business: Finance Payments and Dispute Resolution Premier Reference Source IGI Global USA. 272--238 J. Mishra B. Tripathy(2007) Cyber Contract and Indian Law Kubota T (Eds.) Cyber law for Global E-Business: Finance Payments and Dispute Resolution Premier Reference Source IGI Global USA. 272--238","DOI":"10.4018\/978-1-59904-828-4.ch013"},{"key":"e_1_3_2_1_12_1","unstructured":"McAfee SaaS Email Protection. Access from: http:\/\/www.mcafee.com\/us\/resources\/solution-briefs\/sb-saas-email-protection-solution-guide.pdf.  McAfee SaaS Email Protection. Access from: http:\/\/www.mcafee.com\/us\/resources\/solution-briefs\/sb-saas-email-protection-solution-guide.pdf."},{"key":"e_1_3_2_1_13_1","unstructured":"A New Standard in Encrypted Email A discussion on push pull and transparent delivery. 2010. Accessed from http:\/\/www.zixcorp.com\/documents\/zixcorpintelligencereport_government.pdf.  A New Standard in Encrypted Email A discussion on push pull and transparent delivery. 2010. Accessed from http:\/\/www.zixcorp.com\/documents\/zixcorpintelligencereport_government.pdf."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2015.62012"},{"key":"e_1_3_2_1_15_1","unstructured":"Charles C. and Laurent R. A Programmable Client-Server Model: Robust Extensibility via DSLs. Accessed from https:\/\/hal.archives-ouvertes.fr\/hal-00350051\/file\/Consel-Reveillere_ase03.pdf  Charles C. and Laurent R. A Programmable Client-Server Model: Robust Extensibility via DSLs. Accessed from https:\/\/hal.archives-ouvertes.fr\/hal-00350051\/file\/Consel-Reveillere_ase03.pdf"},{"key":"e_1_3_2_1_16_1","unstructured":"Renzel K. and Keller W. (1997) Client\/Server Architectures for Business Information Systems A Pattern Language. PLoP'97. Accessed from http:\/\/hillside.net\/plop\/plop97\/Proceedings\/renzel.pdf  Renzel K. and Keller W. (1997) Client\/Server Architectures for Business Information Systems A Pattern Language. PLoP'97. Accessed from http:\/\/hillside.net\/plop\/plop97\/Proceedings\/renzel.pdf"},{"key":"e_1_3_2_1_17_1","unstructured":"Secure Client-Server Architectures for E-Government This text is a module of the E-Government Manual http:\/\/www.e-government-handbuch.de.  Secure Client-Server Architectures for E-Government This text is a module of the E-Government Manual http:\/\/www.e-government-handbuch.de."},{"key":"e_1_3_2_1_18_1","unstructured":"EmailTrackerPro. Accessed from http:\/\/www.Emailtrackerpro.com  EmailTrackerPro. Accessed from http:\/\/www.Emailtrackerpro.com"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.4018\/jebr.2007070106"},{"key":"e_1_3_2_1_20_1","article-title":"A Theory to Guide US Cyber Security Policy","author":"Clinton L.","year":"2011","journal-title":"Journal of Information Technology and Management, 24(5), Cutter IT Journal, 30--35."},{"key":"e_1_3_2_1_21_1","unstructured":"Susskind N. G. (2015) Cyber security compliance and risk management strategies: What Directors Officers and managers need to know New York University Journal of law & business 11(3) 573--635.  Susskind N. G. (2015) Cyber security compliance and risk management strategies: What Directors Officers and managers need to know New York University Journal of law & business 11(3) 573--635."},{"key":"e_1_3_2_1_22_1","unstructured":"Aid4Mail Accessed from http:\/\/www.Aid4Mail.com  Aid4Mail Accessed from http:\/\/www.Aid4Mail.com"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905240","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905240"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":22,"alternative-id":["10.1145\/2905055.2905240","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905240","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}