{"id":"https://openalex.org/W1978770671","doi":"https://doi.org/10.1108/09685221211235634","title":"An evaluation of a secure and trustworthy mobile agent\u2010based e\u2010marketplace system","display_name":"An evaluation of a secure and trustworthy mobile agent\u2010based e\u2010marketplace system","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W1978770671","doi":"https://doi.org/10.1108/09685221211235634","mag":"1978770671"},"language":"en","primary_location":{"id":"doi:10.1108/09685221211235634","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685221211235634","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113723340","display_name":"Ahmed Patel","orcid":null},"institutions":[{"id":"https://openalex.org/I205051169","display_name":"Kingston University","ror":"https://ror.org/05bbqza97","country_code":"GB","type":"education","lineage":["https://openalex.org/I205051169"]},{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["GB","MY"],"is_corresponding":true,"raw_author_name":"Ahmed Patel","raw_affiliation_strings":["Centre of Software Technology and Management (SOFTEM), School of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, KM Bangi, Malaysia and School of Computing and Information Systems, Faculty of Science, Engineering and Computing, Kingston University, Kingston upon Thames, UK"],"affiliations":[{"raw_affiliation_string":"Centre of Software Technology and Management (SOFTEM), School of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, KM Bangi, Malaysia and School of Computing and Information Systems, Faculty of Science, Engineering and Computing, Kingston University, Kingston upon Thames, UK","institution_ids":["https://openalex.org/I205051169","https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110487285","display_name":"Wei Qi","orcid":"https://orcid.org/0009-0002-5834-3666"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Wei Qi","raw_affiliation_strings":["Centre of Software Technology and Management (SOFTEM), School of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, KM Bangi, Malaysia"],"affiliations":[{"raw_affiliation_string":"Centre of Software Technology and Management (SOFTEM), School of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, KM Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040865093","display_name":"Mona Taghavi","orcid":"https://orcid.org/0000-0001-6204-4744"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mona Taghavi","raw_affiliation_strings":["Centre of Software Technology and Management (SOFTEM), School of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, KM Bangi, Malaysia"],"affiliations":[{"raw_affiliation_string":"Centre of Software Technology and Management (SOFTEM), School of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, KM Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5113723340"],"corresponding_institution_ids":["https://openalex.org/I205051169","https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09422726,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":"2","first_page":"123","last_page":"146"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9763000011444092,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7584614753723145},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5747721791267395},{"id":"https://openalex.org/keywords/mobile-agent","display_name":"Mobile agent","score":0.5506366491317749},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49122947454452515},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4728153944015503},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.4658307433128357},{"id":"https://openalex.org/keywords/outreach","display_name":"Outreach","score":0.4606698751449585},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.44467735290527344},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.42459186911582947},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3137194514274597},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.14651164412498474},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.134700745344162}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7584614753723145},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5747721791267395},{"id":"https://openalex.org/C84875433","wikidata":"https://www.wikidata.org/wiki/Q3277848","display_name":"Mobile agent","level":2,"score":0.5506366491317749},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49122947454452515},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4728153944015503},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.4658307433128357},{"id":"https://openalex.org/C2781400479","wikidata":"https://www.wikidata.org/wiki/Q11640","display_name":"Outreach","level":2,"score":0.4606698751449585},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.44467735290527344},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.42459186911582947},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3137194514274597},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.14651164412498474},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.134700745344162},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/09685221211235634","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685221211235634","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W23440280","https://openalex.org/W31976614","https://openalex.org/W63770494","https://openalex.org/W167754982","https://openalex.org/W1481958547","https://openalex.org/W1541095506","https://openalex.org/W1863517429","https://openalex.org/W1964009902","https://openalex.org/W1964246709","https://openalex.org/W1966569294","https://openalex.org/W1990624855","https://openalex.org/W2005598259","https://openalex.org/W2007199417","https://openalex.org/W2033622615","https://openalex.org/W2063522699","https://openalex.org/W2094042797","https://openalex.org/W2164112799","https://openalex.org/W2257569754","https://openalex.org/W2365884566","https://openalex.org/W3139941518","https://openalex.org/W6964210638","https://openalex.org/W7024853833"],"related_works":["https://openalex.org/W2593155302","https://openalex.org/W2041415459","https://openalex.org/W2072812638","https://openalex.org/W3126095231","https://openalex.org/W2352855287","https://openalex.org/W2378906650","https://openalex.org/W2384288445","https://openalex.org/W2382526412","https://openalex.org/W4200071106","https://openalex.org/W2347474189"],"abstract_inverted_index":{"Purpose":[0],"Mobile":[1,49],"agent\u2010based":[2,50,75,95],"e\u2010marketplaces":[3,51],"are":[4,52,109,171,190],"business":[5],"applications":[6],"that":[7,133],"have":[8,139],"been":[9],"developed":[10],"as":[11],"flexible":[12],"and":[13,31,63,67,72,87,92,100,129,137,146,157,169,187],"efficient":[14,147],"approaches":[15],"to":[16,21,25,39,44,61,77,111,142,192],"help":[17],"companies":[18],"or":[19],"corporations":[20],"extend":[22],"their":[23,183],"businesses":[24],"outreach":[26],"larger":[27],"markets":[28],"without":[29],"regional":[30],"continental":[32],"boundaries.":[33],"Every":[34],"distributed":[35],"system":[36,68,108,138],"is":[37,60,123],"unable":[38],"avoid":[40],"security":[41],"problems":[42],"due":[43],"the":[45,106,113,116,121,134,140,172,194,197],"open":[46],"internet":[47],"environment.":[48],"no":[53],"exceptions.":[54],"The":[55,82,102,118,127,153,167,185],"purpose":[56],"of":[57,69,89,105,115,120,196],"this":[58,79,162],"paper":[59],"design":[62],"implement":[64],"a":[65,70,90,144],"framework":[66,136],"secure":[71,91,145],"trustworthy":[73,93],"mobile":[74,94],"e\u2010marketplace":[76,148],"overcome":[78],"problem.":[80],"Design/methodology/approach":[81],"authors":[83,154],"present":[84],"an":[85],"analysis":[86],"evaluation":[88,114,128,186],"e\u2010marketplace,":[96],"which":[97],"was":[98],"specified":[99],"prototyped.":[101],"experimental":[103],"results":[104,131,189,195],"implemented":[107],"used":[110,191],"address":[112],"system.":[117],"discussion":[119],"solution":[122],"also":[124],"presented.":[125],"Findings":[126],"performance":[130,168,188],"show":[132],"proposed":[135],"ability":[141],"provide":[143],"environment":[149],"for":[150,177],"trading":[151],"products.":[152],"draw":[155],"conclusions":[156],"highlight":[158],"future":[159],"work":[160],"on":[161],"specific":[163],"research":[164,198],"area.":[165],"Originality/value":[166],"scalability":[170],"two":[173],"most":[174],"important":[175],"issues":[176],"mobile\u2010agent":[178],"based":[179],"systems":[180],"together":[181],"with":[182],"feasibility.":[184],"reflect":[193],"in":[199],"its":[200],"entirety.":[201]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
