{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T00:28:30Z","timestamp":1712968110356},"reference-count":108,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Researchers Supporting","award":["RSPD2024R867"]},{"name":"King Saud University, Riyadh, Saudi Arabia"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Eng. Manage."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tem.2024.3376314","type":"journal-article","created":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:45:12Z","timestamp":1710269112000},"page":"7701-7718","source":"Crossref","is-referenced-by-count":0,"title":["Technology Assessment for Cybersecurity Organizational Readiness: Case of Airlines Sector and Electronic Payment"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"http:\/\/orcid.org\/0009-0004-0025-6492","authenticated-orcid":false,"given":"Sultan","family":"Alghamdi","sequence":"first","affiliation":[{"name":"Department of Management Information System, Jeddah University, Jeddah, Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1432-8958","authenticated-orcid":false,"given":"Tugrul","family":"Daim","sequence":"additional","affiliation":[{"name":"Portland State University, Portland, OR, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9003-1094","authenticated-orcid":false,"given":"Saeed","family":"Alzahrani","sequence":"additional","affiliation":[{"name":"Department of Management Information System, King Saud University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.11.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.02.007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/17506161311308142"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2004.5342298"},{"issue":"1","key":"ref5","first-page":"43","article-title":"Mobile banking - near future of banking","volume":"7","author":"Gentiana","year":"2014","journal-title":"Rev. Appl. Socio Econ. Res."},{"key":"ref6","article-title":"Fraud in the airline industry why carriers need to think of themselves as crimefighters","year":"2020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3232287"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/004728750003900210"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/j.1681-4835.2011.tb00335.x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5120\/cae2018652800"},{"key":"ref11","article-title":"Fighting fraud in the airline industry","author":"Walker","year":"2017"},{"key":"ref12","first-page":"1","article-title":"E-commerce, electronic payments","volume":"26","author":"Koponen","year":"2006","journal-title":"Telecommun. Softw. Multimedia"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-6060-3.ch001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.21863\/jcar\/2015.4.1.006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3186733"},{"key":"ref16","article-title":"E-commerce fraud up by 178 over the holidays: Trends and predictions","author":"Varga","year":"2022"},{"key":"ref17","article-title":"IATA industry fraud prevention","year":"2017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icmss.2009.5304469"},{"key":"ref19","doi-asserted-by":"crossref","volume-title":"Hierarchical Decision Modeling Essays in Honor of Dundar F","author":"Daim","year":"2016","DOI":"10.1007\/978-3-319-18558-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tem.2022.3158185"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2012.09.020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1108\/ijrdm-05-2015-0065"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/picmet.2016.7806838"},{"key":"ref24","article-title":"Enhanced automated anti-fraud and anti-money-laundering payment system","author":"Caldera","year":"2016"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.023"},{"key":"ref26","article-title":"Airlines need better anti-fraud data","author":"Praetsch","year":"2019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39736-3_17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1504\/ijebank.2020.114762"},{"key":"ref29","article-title":"Click-fraud prevention","author":"Callanan","year":"2008"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2799979.2800039"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2013.01.009"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1515\/orga-2015-0018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0440.2004.00290.x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.03.041"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.06.015"},{"issue":"9","key":"ref36","first-page":"1753","article-title":"Design of a secure unified e-payment system in Nigeria : A case study","volume":"4","author":"Ayo","year":"2010","journal-title":"Afr. J. Bus. Manage."},{"key":"ref37","article-title":"Understanding COVID-19S impact on the airline sector","author":"Terry","year":"2020"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2514\/1.i010329"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5120\/8184-1538"},{"key":"ref40","first-page":"1","article-title":"E-payment: Challenges and opportunities in Ethiopia","author":"Taddesse","year":"2005"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0267-3649(02)00902-0"},{"key":"ref42","article-title":"Mobile payments app revenue and usage statistics (2023)","author":"Curry","year":"2023"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/inista52262.2021.9548388"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102248"},{"issue":"4","key":"ref45","first-page":"2394","article-title":"Mobile security : A review of new advanced technologies to detect and prevent e - payment mobile frauds","volume":"292","author":"Carmi","year":"2014","journal-title":"Int. J. Comput. Syst."},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.01.005"},{"issue":"77","key":"ref47","first-page":"460","article-title":"E-payment transactions using encrypted QR codes","volume":"10","author":"Surekha","year":"2015","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.4018\/jea.2009010106"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2009.04.014"},{"issue":"1","key":"ref50","first-page":"32","article-title":"Using technology to fight fraud","volume":"23","author":"Garcia","year":"2002","journal-title":"Health Manage. Technol."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2020.2991872"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/icadiwt.2009.5273863"},{"key":"ref53","first-page":"1","article-title":"An analysis of identity theft : Motives, related frauds, techniques and prevention","volume":"4","author":"Hedayati","year":"2012","journal-title":"J. Law Conflict Resolution"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/aeeicb.2017.7972424"},{"issue":"4","key":"ref55","first-page":"137","article-title":"Electronic payment fraud detection techniques","volume":"2","author":"Al-Khatib","year":"2012","journal-title":"World Comput. Sci. Inf. Technol. J."},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05322-5"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1108\/02686900410509802"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/iscisc.2013.6767338"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2009.01.021"},{"key":"ref60","article-title":"Current practices, challenges and prospects of using credit cards as a payment method: The case of Ethiopian airlines enterprise","author":"Getaye","year":"2015"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.4236\/ojbm.2022.101029"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102233"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1319946111"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2019.05.014"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(01)00261-2"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/tem.2021.3052857"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2017.04.004"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/iemc.1994.379926"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/tem.2020.3042452"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2021.110968"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.12.029"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2496(77)90033-5"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/tem.2021.3139836"},{"key":"ref74","volume-title":"The Digital Innovation Playbook : Creating a Transformative Customer Experience","author":"Webb","year":"2011"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.23919\/picmet.2019.8893897"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfineco.2012.01.002"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/picmet.2009.5262107"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2021.101662"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1080\/10429247.2021.1943244"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70887-2_37"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3557504"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.4018\/jea.2012070102"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtrangeo.2009.02.012"},{"issue":"2","key":"ref84","article-title":"Airline deregulation and laissez-faire mythology: Economic theory in turbulence","volume":"56","author":"Dempsey","year":"1990","journal-title":"J. Air Law Commerce"},{"key":"ref85","article-title":"Airlines in the wake of deregulation: Bankruptcy as an alternative to economic reregulation","volume":"19","author":"Heuer","year":"1999","journal-title":"Transp. Law J."},{"issue":"1","key":"ref86","first-page":"69","article-title":"The political economy of fraud on the market","volume":"160","author":"William","year":"2011","journal-title":"Univ. Pennsylvania Law Rev."},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-1714.2002.tb00306.x"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.5120\/5062-7222"},{"key":"ref89","article-title":"Anti-fraud financial transactions system","author":"Song","year":"2023"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1080\/014461900407356"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33743-7_48"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.4018\/jeei.2012010104"},{"key":"ref93","first-page":"2781","article-title":"The role of technological and social factors on the adoption of mobile payment technologies","volume-title":"Proc. 10th Americas Conf. Inf. Syst.","author":"Lee"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/laweb.2014.23"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2008.09.005"},{"key":"ref96","article-title":"Consumer liability in case of fraud with electronic payment instruments: An analysis of European and Russian rules","author":"Mazitova","year":"2015"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.005"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1142\/S0219877020500030"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3011259"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.3390\/s19010019"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.15760\/etd.1622"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.15760\/etd.7137"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/iccias.2006.295321"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3186786"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2021.102444"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1061\/(asce)me.1943-5479.0000858"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/iceltics.2018.8548878"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011064681"}],"container-title":["IEEE Transactions on Engineering Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/17\/10339242\/10470439.pdf?arnumber=10470439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T05:51:51Z","timestamp":1712901111000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10470439\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":108,"URL":"https:\/\/doi.org\/10.1109\/tem.2024.3376314","relation":{},"ISSN":["0018-9391","1558-0040"],"issn-type":[{"value":"0018-9391","type":"print"},{"value":"1558-0040","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}