Issue 1, March 2012

3 - 10Friendship and Privacy in Online Social Networks

DOI: 10.20533/jitst.2046.3723.2012.0001
Soudeh Ghorbani, Yashar Ganjali Download Paper
11 - 14Informational Privacy Preservation through Universal Service Obligations

DOI: 10.20533/jitst.2046.3723.2012.0002
Maria Moloney, Liam Church Download Paper
15 - 20On Assurance of Information Security using Elliptic Curves Cryptosystems

DOI: 10.20533/jitst.2046.3723.2012.0003
Ion Tutanescu, Constantin Anton, Laurentiu Ionescu, Daniel Caragata Download Paper
21 - 25Cryptanalysis of Password Authentication Scheme Using Smart Cards

DOI: 10.20533/jitst.2046.3723.2012.0004
Sattar J Aboud, Abid T. Al Ajeeli Download Paper

Issue 2, June 2012

26 - 33Multiple Language Learning: Creating User Models through Voronoi Iteration

DOI: 10.20533/jitst.2046.3723.2012.0005
Maria Virvou, Christos Troussas, Efthimios Alepis Download Paper
34 - 41To Use or Not to Use Mobile Devices

DOI: 10.20533/jitst.2046.3723.2012.0006
Blaž Markelj, Igor Bernik Download Paper
42 - 51The Need for an Adoption and Acceptance Framework for Mobile Digital Library Services

DOI: 10.20533/jitst.2046.3723.2012.0007
Sumayyah AL-Faresi, Nayna Patel Download Paper
52 - 60Mobile Visualization of Biomedical Volume Datasets

DOI: 10.20533/jitst.2046.3723.2012.0008
Movania Muhammad Mobeen, Lin Feng Download Paper

Issue 3, September 2012

61 - 67The Way Forward in Addressing Cybercrime Regulation on a Global Level

DOI: 10.20533/jitst.2046.3723.2012.0009
Murdoch Watney Download Paper
68 - 78Integrated Database Security System Architectures based on WCF Services

DOI: 10.20533/jitst.2046.3723.2012.0010
Ayman Mohamed Mostafa, Mohamed Hashem Abdel Aziz, Ibrahim Mahmoud El-henawy Download Paper
79 - 85Study of Countermeasure Systems for Leaks of Onscreen Content by Digital Video/Camera Shooting

DOI: 10.20533/jitst.2046.3723.2012.0011
Masaki Fujikawa, Ryosuke Kamai, Fumihiko Oda, Kengo Moriyasu, Shingo Fuchi, Yoshikazu Takeda, Hikaru Mori, Kenji Terada Download Paper
86 - 92Defining a Baseline Complexity Model for ERP Systems over SaaS

DOI: 10.20533/jitst.2046.3723.2012.0012
Kenneth J. Spiteri, Cristina Luca, Tim Reynolds, George Wilson Download Paper

Issue 4, December 2012

93 - 99Building an Ontology Based on Folksonomy: An attempt to Represent Knowledge Embedded in Filmed Materials

DOI: 10.20533/jitst.2046.3723.2012.0013
Reyad Binzabiah, Steve Wade Download Paper
100 - 109Building Information Science Ontology (OIS) with Methontology and Protégé

DOI: 10.20533/jitst.2046.3723.2012.0014
Ahlam F. Sawsaa, Joan Lu Download Paper
110 - 116The Information Systems Security Training Program: A Work in Progress

DOI: 10.20533/jitst.2046.3723.2012.0015
Asim Gençer Gökce, Yilmaz Çankaya Download Paper
117 - 122Identifying and Finding Forensic Evidence From Windows Application

DOI: 10.20533/jitst.2046.3723.2012.0016
Funminiyi Olajide, Nick Savage, Galyna Akmayeva, Charles Shoniregun Download Paper