{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T22:25:45Z","timestamp":1648765545606},"reference-count":13,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Organizational Computing and Electronic Commerce"],"published-print":{"date-parts":[[2002,6]]},"DOI":"10.1207\/s15327744joce1202_05","type":"journal-article","created":{"date-parts":[[2004,1,14]],"date-time":"2004-01-14T15:10:14Z","timestamp":1074093014000},"page":"175-195","source":"Crossref","is-referenced-by-count":7,"title":["Data Models for Information Sharing in E-Partnerships: Analysis, Improvements, and Relevance"],"prefix":"10.1080","volume":"12","author":[{"given":"Boris","family":"Jukic","sequence":"first","affiliation":[]},{"given":"Nenad","family":"Jukic","sequence":"additional","affiliation":[]},{"given":"Manoj","family":"Parameswaran","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"p_1_118","unstructured":"R. Kalakota and A. B. Whinston, Electronic Commerce, A Manager's Guide. Reading, MA: Addison-Wesley, 1997."},{"issue":"1","key":"p_2_119","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/isre.8.1.1","volume":"8","author":"Choudhry V.","year":"1997","journal-title":"Information Systems Research"},{"key":"p_3_120","doi-asserted-by":"publisher","DOI":"10.1145\/336460.336473"},{"key":"p_4_121","first-page":"92","volume":"22","author":"Biggs M.","year":"2000","journal-title":"InfoWorld"},{"key":"p_5_122","unstructured":"J. T. Haigh, R. C. O'Brien, and D. J. Thomasen, \"The LDV secure relational DBMS model,\" in Database SecurityIV: Status and Prospects, S. Jajodia and C. E. Landwehr, Eds. New York: North-Holland, 1991, pp. 265-279."},{"key":"p_6_123","first-page":"50","volume":"1991","author":"Jajodia S.","journal-title":"in Proc. ACM SIGMOD"},{"key":"p_7_124","first-page":"199","volume":"1992","author":"Smith K.","journal-title":"in Proc. of 18th VLDB Conf."},{"key":"p_8_125","first-page":"128","volume":"1995","author":"Sandhu R.","journal-title":"in Proc. IEEE Symposium on Security and Privacy"},{"key":"p_9_126","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(97)00045-1"},{"key":"p_10_127","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(99)00023-X"},{"key":"p_11_128","unstructured":"D. E. Bell and L. J. LaPadula, \"Secure computer systems: Mathematical foundations and model,\" MITRE Corporation, Bedford, MA, Tech. Rep. M74-244, 1974."},{"key":"p_12_129","unstructured":"L. Downes and C. Mui, Unleashing the Killer Application: Digital Strategies for Market Dominance. Cambridge, MA: Harvard Business School Press, 1998."},{"key":"p_13_130","unstructured":"K. Maddux and D. Blankenhorn, Web Commerce: Building a Digital Business. New York: Wiley, 1998."}],"container-title":["Journal of Organizational Computing and Electronic Commerce"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1207\/S15327744JOCE1202_05","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T06:40:12Z","timestamp":1522996812000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1207\/S15327744JOCE1202_05"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,6]]},"references-count":13,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,6]]}},"alternative-id":["10.1207\/S15327744JOCE1202_05"],"URL":"https:\/\/doi.org\/10.1207\/s15327744joce1202_05","relation":{},"ISSN":["1091-9392","1532-7744"],"issn-type":[{"value":"1091-9392","type":"print"},{"value":"1532-7744","type":"electronic"}],"subject":[],"published":{"date-parts":[[2002,6]]}}}