{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T17:14:35Z","timestamp":1654103675910},"reference-count":18,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10,1]]},"abstract":"<p>The Electronic Signature Law of the People\u2019s Republic of China has been implemented for over seven years. However, a wide variety of legal problems exists. This paper analyzes four cases about e-signature use in China that covers four different areas: E-mail, short text message, E-banking, and online shopping. Various solutions to problems concerning e-signature use are also discussed.<\/p>","DOI":"10.4018\/ijcbpl.2012100106","type":"journal-article","created":{"date-parts":[[2013,2,15]],"date-time":"2013-02-15T22:49:29Z","timestamp":1360968569000},"page":"73-83","source":"Crossref","is-referenced-by-count":0,"title":["E-Signature Use in China"],"prefix":"10.4018","volume":"2","author":[{"given":"Zhonghao","family":"Liu","sequence":"first","affiliation":[{"name":"Hangzhou No.2 High School of Zhejiang, Hangzhou, BinJiang District, Zhejiang Province, China"}]}],"member":"2432","reference":[{"key":"ijcbpl.2012100106-0","author":"J.An","year":"2005","journal-title":"Paraphrase of electronic signature law of People\u2019s Republic of China"},{"key":"ijcbpl.2012100106-1","unstructured":"Brochure. (n. d.). Company profile. Retrieved July 3, 2012, from http:\/\/www.cfca.com.cn\/us\/us.htm"},{"key":"ijcbpl.2012100106-2","year":"2005"},{"key":"ijcbpl.2012100106-3","unstructured":"Li, S. H. (2008). \u624b\u673a\u77ed\u4fe1\u53ef\u4ee5\u4f5c\u4e3a\u8bc1\u636e\u4f7f\u7528 [Cell phone short messages can be used as evidence]. Retrieved from http:\/\/www.66law.cn\/goodcase\/3714.aspx"},{"key":"ijcbpl.2012100106-4","unstructured":"Li, Y. (2007, April 2). \u7f51\u94f6\u5b89\u5168\u7ef4\u6743\u4e4b\u8def, \u9996\u4f8b\u7f51\u94f6\u88ab\u76d7?\u6237?\u5168\u989d?\u4ed8 [Way towards E-banking safety, first full refund case of E-bank theft]. Shanghai Securities News. Retrieved July 2, 2012, from http:\/\/biz.cn.yahoo.com\/07-04-\/4\/lhfj.html\/"},{"key":"ijcbpl.2012100106-5","unstructured":"Li, Z. M., & Bian, N. (2005, April 2). \u4e2d\u79d1\u5927\u7a83\u4fe1\u5973\u751f\u88ab\u5f00\u9664 \u5c11\u5e74\u73ed\u6559\u80b2\u518d\u8d77\u4e89\u8bae [Mail stealing student was expelled from University of Science and Technology of China, Disputes about juvenile class education arose again]. Beijing Youth Daily. Retrieved form http:\/\/news.xinhuanet.com\/edu\/2005-04\/04\/content_2782970.htm"},{"key":"ijcbpl.2012100106-6","unstructured":"Liu, C. (2011, April 25) \u7f51\u94f6\u906d\u7a83\u7528\u6237\u57cb\u5355 \u7ef4\u6743\u8270\u96be\u4ec5\u4e00\u4f8b\u6210\u529f [There is only one of E-banking clients succeed to rights protection whose money were stolen]. IT Time. Retrieved June 2, 2012, from http:\/\/www.isc.org.cn\/zxzx\/jsyy\/listinfo-9548.html"},{"key":"ijcbpl.2012100106-7","unstructured":"Ministry of Commerce People\u2019s Republic of China. (1999). Contract Law of the People\u2019s Republic of China. Retrieved June 2, 2012, from http:\/\/wenku.baidu.com\/view\/108f4408581b6bd97f19ea62.html"},{"key":"ijcbpl.2012100106-8","unstructured":"Qiao, X. H. (2012, March 29). \u7535\u5b50\u7b7e\u540d\u80fd\u5426\u62ef\u6551\u7f51\u8d2d\u5b89\u5168 [Whether the E-signature can save safety of online shopping]. Retrieved May 1, 2012, from http:\/\/tech.qq.com\/a\/20120328\/000209.htm"},{"key":"ijcbpl.2012100106-9","unstructured":"Renmin University of China. (2012). Civil Procedure Law of the People's Republic of China. Retrieved October 2, 2012, from http:\/\/www.calaw.cn\/article\/default.asp?id=7482"},{"key":"ijcbpl.2012100106-10","unstructured":"The Ministry of Industry and Information Technology of China. (2009). List of electronic authentication services administrative licensing certification bodies. Retrieved from http:\/\/www.miit.gov.cn\/n11293472\/n11505629\/n11506629\/n11967886\/n11967946\/12432542.html"},{"key":"ijcbpl.2012100106-11","year":"2001"},{"key":"ijcbpl.2012100106-12","year":"1996"},{"key":"ijcbpl.2012100106-13","unstructured":"Wang, Q., & Jin, Z. (2012, March 7).\u4eac\u4e1c\u5546\u57ce\u4e24\u5343\u5e10?\u88ab\u76d7,4\u540d\u9ed1\u5ba2\u5f02\u5730\u76d7\u7528\u88ab\u6355 [Over 2000 accounts were stolen at Jing Dong Mall, four hackers were arrested]. Beijing Evening News. Retrieved from http:\/\/it.people.com.cn\/GB\/17819773.html"},{"key":"ijcbpl.2012100106-14","unstructured":"Wei, J. L. (2012). \u4e2d\u56fd\u7535\u5b50\u90ae\u4ef6\u7b2c\u4e00\u6848 [The first case of e-mail in China]. Retrieved June 15, 2012, from http:\/\/ishare.iask.sina.com.cn\/f\/22305520.html"},{"key":"ijcbpl.2012100106-15","unstructured":"Wikipedia. (2012). Digital signatures and law. Retrieved June 2, 2012, from http:\/\/en.wikipedia.org\/wiki\/Digital_signatures_and_law"},{"key":"ijcbpl.2012100106-16","unstructured":"Yang, G. Q. (2012, July 6). \u8d21\u732e\u5927 \u4efb\u52a1\u91cd \u6311\u6218\u591a---\u6539\u9769\u5f00\u653e\u4ee5\u6765\u51fa\u56fd\u7559\u5b66\u5de5\u4f5c\u7efc\u8ff0 [Great contributions, heavy tasks and more challenges---Review of overseas studying after reforming and opening]. China Education Daily. Retrieved July 27, 2012, from http:\/\/www.moe.gov.cn\/publicfiles\/business\/htmlfiles\/moe\/s5147\/201207\/138882.html"},{"key":"ijcbpl.2012100106-17","first-page":"225","volume":"16","author":"S. S.Zhang","year":"2010","journal-title":"Modern Science"}],"container-title":["International Journal of Cyber Behavior, Psychology and Learning"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=75173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T16:34:28Z","timestamp":1654101268000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcbpl.2012100106"}},"subtitle":["Four Case Studies"],"short-title":[],"issued":{"date-parts":[[2012,10,1]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcbpl.2012100106","relation":{},"ISSN":["2155-7136","2155-7144"],"issn-type":[{"value":"2155-7136","type":"print"},{"value":"2155-7144","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10,1]]}}}