{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:59:57Z","timestamp":1763704797954},"reference-count":43,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Electronic Commerce"],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.2753\/jec1086-4415170104","type":"journal-article","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T21:33:39Z","timestamp":1348176819000},"page":"83-118","source":"Crossref","is-referenced-by-count":7,"title":["Metamodeling to Control and Audit E-Commerce Web Applications"],"prefix":"10.1080","volume":"17","author":[{"given":"Shi-Ming","family":"Huang","sequence":"first","affiliation":[{"name":"a Research Center of E-Manufacturing and E-Commerce, National Chung Cheng University, Taiwan"}]},{"given":"Jing-Shiuan","family":"Hua","sequence":"additional","affiliation":[{"name":"b National Chung Cheng University"}]},{"given":"Hartmut","family":"Will","sequence":"additional","affiliation":[{"name":"c University of Victoria in Canada"}]},{"given":"Jhen-Wei","family":"Wu","sequence":"additional","affiliation":[{"name":"d Deloitte &amp; Touche Enterprise Risk Services"}]}],"member":"301","published-online":{"date-parts":[[2014,12,8]]},"reference":[{"issue":"4","key":"1","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.is.2004.02.002","article-title":"Yet Another Workflow Language","volume":"30","author":"W. van Aalst","year":"2005","journal-title":"Information Systems"},{"issue":"4","key":"2","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1002\/stvr.401","article-title":"Modelling methods for Web application verification and testing: State of the art","volume":"19","author":"M. Alalfi","year":"2009","journal-title":"Software Testing, Verification and Reliability"},{"issue":"3","key":"3","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.dss.2003.12.001","article-title":"Model checking for design and assurance of e-business processes","volume":"39","author":"B. Anderson","year":"2005","journal-title":"Decision Support Systems"},{"issue":"8","key":"4","doi-asserted-by":"crossref","first-page":"1045","DOI":"10.1016\/j.ins.2005.01.016","article-title":"Standards and verification for fair-exchange and atomicity in e-commerce transactions","volume":"176","author":"B. Anderson","year":"2006","journal-title":"Information Sciences"},{"issue":"6","key":"5","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/1132469.1132474","article-title":"The application of model checking for securing e-commerce transactions","volume":"49","author":"B. Anderson","year":"2006","journal-title":"Communications of the ACM"},{"key":"6","volume-title":"Auditing and Assurance Services: An Integrated Approach","author":"A. Arens","year":"2009"},{"key":"7","first-page":"1","volume-title":"Metamodeling for Method Engineering","author":"A. Borgida","year":"2009"},{"issue":"4","key":"8","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1145\/1178625.1178627","article-title":"Process modeling in Web applications","volume":"15","author":"M. Brambilla","year":"2006","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"9","first-page":"235","article-title":"Advanced conceptual modeling of Web applications: Embedding operation interfaces in navigation design","author":"C. Cachero","year":"2002"},{"issue":"2","key":"10","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.accinf.2005.10.005","article-title":"Business process modeling approaches in the context of process level audit risk assessment: An analysis and comparison","volume":"7","author":"C. Carnaghan","year":"2006","journal-title":"International Journal of Accounting Information Systems"},{"issue":"1","key":"11","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.entcs.2006.01.023","article-title":"WAVer: A model checking-based tool to verify Web application design","volume":"157","author":"D. Castelluccia","year":"2006","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"1","key":"12","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1080\/10864415.2004.11044320","article-title":"The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers","volume":"9","author":"H. Cavusoglu","year":"2004","journal-title":"International Journal of Electronic Commerce"},{"issue":"1-6","key":"13","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/S1389-1286(00)00040-2","article-title":"Web modeling language (WebML): A modeling language for designing Web sites","volume":"33","author":"S. Ceri","year":"2000","journal-title":"Computer Networks"},{"key":"14","first-page":"67","article-title":"Model checking class specifications for Web applications","author":"E.-H. Choi","year":"2005"},{"key":"15","volume-title":"Model Checking","author":"E. Clarke","year":"1999"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-011-1793-7","volume-title":"Program Verification: Fundamental Issues in Computer Science","author":"T. Colburn","year":"1993"},{"key":"17","unstructured":"Computer Security Institute (CSI) and San Francisco Federal Bureau of Investigation's (FBI) Computer Intrusion Squad. 2009 CSI and FBI Computer Crime and Security Survey. July 15, 2010 (available at <a target=\"_blank\" href='http:\/\/www.GoCSI.com'>www.GoCSI.com<\/a>"},{"issue":"4","key":"18","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSP.2006.108","article-title":"Web application security assessment tools","volume":"4","author":"M. Curphey","year":"2006","journal-title":"IEEE Security & Privacy"},{"issue":"2","key":"19","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1111\/1099-1123.00067","article-title":"The development of embedded audit modules to support continuous monitoring in the electronic commerce environment","volume":"7","author":"R. Debreceny","year":"2003","journal-title":"International Journal of Auditing"},{"key":"20","unstructured":"De Troyer, O., and Casteleyn, S. Modeling complex processes for Web applications using WSDM. In J. Fons, M. Ruiz, V. Torres, and P. J. Valderas (eds.), <i>Proceedings of the 3rd International Workshop on Web-Oriented Software Technologies.<\/i> Oviedo, Asurias: CEUR, 2003 (available at <a target=\"_blank\" href='http:\/\/users.dsic.upv.es\/~west\/iwwost03\/articles\/DeTroyer%20IWWOST%202003.PDF'>http:\/\/users.dsic.upv.es\/~west\/iwwost03\/articles\/DeTroyer%20IWWOST%202003.PDF<\/a>"},{"key":"21","first-page":"609","article-title":"AnWeb: A system for automatic support to Web application verification","author":"E. Di Sciascio","year":"2002"},{"key":"22","first-page":"63","article-title":"Web applications design and maintenance using symbolic model checking","author":"E. Di Sciascio","year":"2003"},{"key":"23","volume-title":"Information System Audit and Assurance","author":"D. Dube","year":"2005"},{"key":"24","first-page":"235","article-title":"Eliminating navigation errors in Web applications via model checking and runtime enforcement of navigation state machines","author":"S. Hall\u00e9","year":"2010"},{"key":"25","first-page":"240","article-title":"Specification patterns for formal Web verification","author":"M. Haydar","year":"2008"},{"key":"26","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511810275","volume-title":"Logic in Computer Science: Modelling and Reasoning About Systems","author":"M. Huth","year":"2004"},{"key":"27","unstructured":"International Organization for Standardization (ISO). ISO\/IEC 13335-1:2004. July 15, 2010 (available at <a target=\"_blank\" href='http:\/\/www.iso.org\/iso\/catalogue_detail.htm?csnumber=39066\/'>www.iso.org\/iso\/catalogue_detail.htm?csnumber=39066\/<\/a>"},{"issue":"1","key":"28","doi-asserted-by":"crossref","first-page":"69","DOI":"10.2753\/JEC1086-4415120103","article-title":"Market reactions to information security breach announcements: An empirical analysis","volume":"12","author":"K. Kannan","year":"2007","journal-title":"International Journal of Electronic Commerce"},{"issue":"7","key":"29","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1145\/360248.360251","article-title":"Formal verification of parallel programs","volume":"19","author":"R. Keller","year":"1976","journal-title":"Communications of the ACM"},{"key":"30","first-page":"105","article-title":"The expressive power of UML-based Web engineering","author":"N. Koch","year":"2002"},{"issue":"1","key":"31","first-page":"22","article-title":"Integration of business processes in Web application models","volume":"3","author":"N. Koch","year":"2004","journal-title":"Journal of Web Engineering"},{"issue":"1","key":"32","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/4236.747320","article-title":"Technologies for a Web object model","volume":"3","author":"F. Manola","year":"1999","journal-title":"IEEE Internet Computing"},{"key":"33","first-page":"47","article-title":"Model checking-based verification of Web application","author":"H. Miao","year":"2007"},{"issue":"2","key":"34","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/52.991329","article-title":"Quality attributes of Web software applications","volume":"19","author":"J. Offutt","year":"2002","journal-title":"IEEE Software"},{"issue":"3","key":"35","doi-asserted-by":"crossref","first-page":"11","DOI":"10.2753\/JEC1086-4415140302","article-title":"Assurance seals, on-line customer satisfaction, and repurchase intention","volume":"14","author":"I. Park","year":"2010","journal-title":"International Journal of Electronic Commerce"},{"issue":"2","key":"36","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MMUL.2006.26","article-title":"Detecting anomaly and failure in Web applications","volume":"13","author":"F. Ricca","year":"2006","journal-title":"IEEE Multimedia"},{"issue":"3","key":"37","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1108\/02686900110385605","article-title":"Continuous auditing: The audit of the future","volume":"16","author":"Z. Rezaee","year":"2001","journal-title":"Managerial Auditing Journal"},{"issue":"1","key":"38","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MIC.2004.1260699","article-title":"Modeling and designing processes in e-commerce applications","volume":"8","author":"H. Schmid","year":"2004","journal-title":"IEEE Internet Computing"},{"key":"39","unstructured":"Uppsala University (UPP) and Aalborg University (AAL). Case studies. Department of Information Technology at Uppsala University, Sweden, and Department of Computer Science at Aalborg University, Denmark, December 8, 2009 (available at <a target=\"_blank\" href='http:\/\/www.uppaal.org'>www.uppaal.org<\/a>"},{"key":"40","volume-title":"A framework for proactive, automated and continuous e-commerce control and assurance","author":"W. Wang","year":"2001"},{"key":"41","volume-title":"Model checking\u2014A rigorous and efficient tool for e-commerce internal control and assurance","author":"W. Wang","year":"2001"},{"key":"42","volume-title":"Case Study Research: Design and Methods","author":"R. Yin","year":"2009"},{"issue":"2","key":"43","first-page":"9","article-title":"User expectations and rankings of quality factors in different Web site domains","volume":"6","author":"P. Zhang","year":"2000-2001","journal-title":"International Journal of Electronic Commerce"}],"container-title":["International Journal of Electronic Commerce"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.2753\/JEC1086-4415170104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T23:29:49Z","timestamp":1562196589000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.2753\/JEC1086-4415170104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2014,12,8]]},"published-print":{"date-parts":[[2012,10]]}},"alternative-id":["10.2753\/JEC1086-4415170104"],"URL":"https:\/\/doi.org\/10.2753\/jec1086-4415170104","relation":{},"ISSN":["1086-4415","1557-9301"],"issn-type":[{"value":"1086-4415","type":"print"},{"value":"1557-9301","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10]]}}}