{"id":"https://openalex.org/W2089876911","doi":"https://doi.org/10.1108/09685229910292682","title":"Internet\u2010based business opportunities: buyers beware of scams","display_name":"Internet\u2010based business opportunities: buyers beware of scams","publication_year":1999,"publication_date":"1999-10-01","ids":{"openalex":"https://openalex.org/W2089876911","doi":"https://doi.org/10.1108/09685229910292682","mag":"2089876911"},"language":"en","primary_location":{"id":"doi:10.1108/09685229910292682","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685229910292682","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085147293","display_name":"Mohsen Attaran","orcid":"https://orcid.org/0000-0002-0358-4107"},"institutions":[{"id":"https://openalex.org/I118839592","display_name":"California State University, Bakersfield","ror":"https://ror.org/019ts0j55","country_code":"US","type":"education","lineage":["https://openalex.org/I118839592"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohsen Attaran","raw_affiliation_strings":["Professor of Operations Management, School of Business and Public Administration, California State University, Bakersfield, California, USA","(Professor of Operations Management, School of Business and Public Administration, California State University, Bakersfield, California, USA)"],"affiliations":[{"raw_affiliation_string":"Professor of Operations Management, School of Business and Public Administration, California State University, Bakersfield, California, USA","institution_ids":["https://openalex.org/I118839592"]},{"raw_affiliation_string":"(Professor of Operations Management, School of Business and Public Administration, California State University, Bakersfield, California, USA)","institution_ids":["https://openalex.org/I118839592"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5085147293"],"corresponding_institution_ids":["https://openalex.org/I118839592"],"apc_list":null,"apc_paid":null,"fwci":0.8234,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.83338064,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":95},"biblio":{"volume":"7","issue":"4","first_page":"176","last_page":"178"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.8895000219345093,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.8895000219345093,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12501","display_name":"Digital Economy and Work Transformation","score":0.8194000124931335,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11536","display_name":"Consumer Retail Behavior Studies","score":0.8149999976158142,"subfield":{"id":"https://openalex.org/subfields/1406","display_name":"Marketing"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.8762097358703613},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7338671684265137},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.673377513885498},{"id":"https://openalex.org/keywords/online-business","display_name":"Online business","score":0.5800623893737793},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5225979089736938},{"id":"https://openalex.org/keywords/advertising","display_name":"Advertising","score":0.505868136882782},{"id":"https://openalex.org/keywords/internet-shopping","display_name":"Internet shopping","score":0.4318179488182068},{"id":"https://openalex.org/keywords/business-model","display_name":"Business model","score":0.42717641592025757},{"id":"https://openalex.org/keywords/commerce","display_name":"Commerce","score":0.3893234133720398},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.3829289674758911},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.331092894077301},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3026609420776367},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.24308034777641296}],"concepts":[{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.8762097358703613},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7338671684265137},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.673377513885498},{"id":"https://openalex.org/C2986873142","wikidata":"https://www.wikidata.org/wiki/Q734253","display_name":"Online business","level":3,"score":0.5800623893737793},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5225979089736938},{"id":"https://openalex.org/C112698675","wikidata":"https://www.wikidata.org/wiki/Q37038","display_name":"Advertising","level":1,"score":0.505868136882782},{"id":"https://openalex.org/C2982881734","wikidata":"https://www.wikidata.org/wiki/Q212930","display_name":"Internet shopping","level":3,"score":0.4318179488182068},{"id":"https://openalex.org/C4216890","wikidata":"https://www.wikidata.org/wiki/Q815823","display_name":"Business model","level":2,"score":0.42717641592025757},{"id":"https://openalex.org/C54750564","wikidata":"https://www.wikidata.org/wiki/Q26643","display_name":"Commerce","level":1,"score":0.3893234133720398},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.3829289674758911},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.331092894077301},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3026609420776367},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.24308034777641296},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/09685229910292682","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685229910292682","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.49000000953674316,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2989773094","https://openalex.org/W2029962541","https://openalex.org/W4310251651","https://openalex.org/W2240973714","https://openalex.org/W1485070072","https://openalex.org/W3037838562","https://openalex.org/W2990056054","https://openalex.org/W4294017689","https://openalex.org/W2014800287","https://openalex.org/W3095948709"],"abstract_inverted_index":{"The":[0,22],"online":[1,8],"consumer":[2],"market":[3],"is":[4,24],"growing":[5],"geometrically.":[6],"Although":[7],"shopping":[9],"offers":[10],"convenience":[11],"and":[12,30,57],"saves":[13],"time,":[14],"it":[15],"has":[16],"its":[17],"serious":[18],"drawbacks":[19],"as":[20,32,34],"well.":[21],"Internet":[23],"a":[25,35],"fabulous":[26,36],"tool":[27,37],"for":[28,38,60],"shoppers":[29],"investors,":[31],"well":[33],"scam":[39],"artists.":[40],"This":[41],"article":[42],"gives":[43],"an":[44],"overview":[45],"of":[46,48],"some":[47],"the":[49,54],"deceptive":[50],"business":[51],"opportunities":[52],"in":[53],"virtual":[55],"mall":[56],"provides":[58],"tips":[59],"safeguarding":[61],"against":[62],"them.":[63]},"counts_by_year":[{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
