Volume 1 (2012)
Issue 1, March 2012
Pages | Title | Author(s) | Papers |
3 - 10 | Friendship and Privacy in Online Social Networks DOI: 10.20533/jitst.2046.3723.2012.0001 |
Soudeh Ghorbani, Yashar Ganjali | |
11 - 14 | Informational Privacy Preservation through Universal Service Obligations DOI: 10.20533/jitst.2046.3723.2012.0002 |
Maria Moloney, Liam Church | |
15 - 20 | On Assurance of Information Security using Elliptic Curves Cryptosystems DOI: 10.20533/jitst.2046.3723.2012.0003 |
Ion Tutanescu, Constantin Anton, Laurentiu Ionescu, Daniel Caragata | |
21 - 25 | Cryptanalysis of Password Authentication Scheme Using Smart Cards DOI: 10.20533/jitst.2046.3723.2012.0004 |
Sattar J Aboud, Abid T. Al Ajeeli |
Issue 2, June 2012
Pages | Title | Author(s) | Papers |
26 - 33 | Multiple Language Learning: Creating User Models through Voronoi Iteration DOI: 10.20533/jitst.2046.3723.2012.0005 |
Maria Virvou, Christos Troussas, Efthimios Alepis | |
34 - 41 | To Use or Not to Use Mobile Devices DOI: 10.20533/jitst.2046.3723.2012.0006 |
Blaž Markelj, Igor Bernik | |
42 - 51 | The Need for an Adoption and Acceptance Framework for Mobile Digital Library Services DOI: 10.20533/jitst.2046.3723.2012.0007 |
Sumayyah AL-Faresi, Nayna Patel | |
52 - 60 | Mobile Visualization of Biomedical Volume Datasets DOI: 10.20533/jitst.2046.3723.2012.0008 |
Movania Muhammad Mobeen, Lin Feng |
Issue 3, September 2012
Pages | Title | Author(s) | Papers |
61 - 67 | The Way Forward in Addressing Cybercrime Regulation on a Global Level DOI: 10.20533/jitst.2046.3723.2012.0009 |
Murdoch Watney | |
68 - 78 | Integrated Database Security System Architectures based on WCF Services DOI: 10.20533/jitst.2046.3723.2012.0010 |
Ayman Mohamed Mostafa, Mohamed Hashem Abdel Aziz, Ibrahim Mahmoud El-henawy | |
79 - 85 | Study of Countermeasure Systems for Leaks of Onscreen Content by Digital Video/Camera Shooting DOI: 10.20533/jitst.2046.3723.2012.0011 |
Masaki Fujikawa, Ryosuke Kamai, Fumihiko Oda, Kengo Moriyasu, Shingo Fuchi, Yoshikazu Takeda, Hikaru Mori, Kenji Terada | |
86 - 92 | Defining a Baseline Complexity Model for ERP Systems over SaaS DOI: 10.20533/jitst.2046.3723.2012.0012 |
Kenneth J. Spiteri, Cristina Luca, Tim Reynolds, George Wilson |
Issue 4, December 2012
Pages | Title | Author(s) | Papers |
93 - 99 | Building an Ontology Based on Folksonomy: An attempt to Represent Knowledge Embedded in Filmed Materials DOI: 10.20533/jitst.2046.3723.2012.0013 |
Reyad Binzabiah, Steve Wade | |
100 - 109 | Building Information Science Ontology (OIS) with Methontology and Protégé DOI: 10.20533/jitst.2046.3723.2012.0014 |
Ahlam F. Sawsaa, Joan Lu | |
110 - 116 | The Information Systems Security Training Program: A Work in Progress DOI: 10.20533/jitst.2046.3723.2012.0015 |
Asim Gençer Gökce, Yilmaz Çankaya | |
117 - 122 | Identifying and Finding Forensic Evidence From Windows Application DOI: 10.20533/jitst.2046.3723.2012.0016 |
Funminiyi Olajide, Nick Savage, Galyna Akmayeva, Charles Shoniregun |