Issue 1, March 2012

Pages Title Author(s) Papers
3 - 10 Friendship and Privacy in Online Social Networks

DOI: 10.20533/jitst.2046.3723.2012.0001
Soudeh Ghorbani, Yashar Ganjali Download Paper
11 - 14 Informational Privacy Preservation through Universal Service Obligations

DOI: 10.20533/jitst.2046.3723.2012.0002
Maria Moloney, Liam Church Download Paper
15 - 20 On Assurance of Information Security using Elliptic Curves Cryptosystems

DOI: 10.20533/jitst.2046.3723.2012.0003
Ion Tutanescu, Constantin Anton, Laurentiu Ionescu, Daniel Caragata Download Paper
21 - 25 Cryptanalysis of Password Authentication Scheme Using Smart Cards

DOI: 10.20533/jitst.2046.3723.2012.0004
Sattar J Aboud, Abid T. Al Ajeeli Download Paper

Issue 2, June 2012

Pages Title Author(s) Papers
26 - 33 Multiple Language Learning: Creating User Models through Voronoi Iteration

DOI: 10.20533/jitst.2046.3723.2012.0005
Maria Virvou, Christos Troussas, Efthimios Alepis Download Paper
34 - 41 To Use or Not to Use Mobile Devices

DOI: 10.20533/jitst.2046.3723.2012.0006
Blaž Markelj, Igor Bernik Download Paper
42 - 51 The Need for an Adoption and Acceptance Framework for Mobile Digital Library Services

DOI: 10.20533/jitst.2046.3723.2012.0007
Sumayyah AL-Faresi, Nayna Patel Download Paper
52 - 60 Mobile Visualization of Biomedical Volume Datasets

DOI: 10.20533/jitst.2046.3723.2012.0008
Movania Muhammad Mobeen, Lin Feng Download Paper

Issue 3, September 2012

Pages Title Author(s) Papers
61 - 67 The Way Forward in Addressing Cybercrime Regulation on a Global Level

DOI: 10.20533/jitst.2046.3723.2012.0009
Murdoch Watney Download Paper
68 - 78 Integrated Database Security System Architectures based on WCF Services

DOI: 10.20533/jitst.2046.3723.2012.0010
Ayman Mohamed Mostafa, Mohamed Hashem Abdel Aziz, Ibrahim Mahmoud El-henawy Download Paper
79 - 85 Study of Countermeasure Systems for Leaks of Onscreen Content by Digital Video/Camera Shooting

DOI: 10.20533/jitst.2046.3723.2012.0011
Masaki Fujikawa, Ryosuke Kamai, Fumihiko Oda, Kengo Moriyasu, Shingo Fuchi, Yoshikazu Takeda, Hikaru Mori, Kenji Terada Download Paper
86 - 92 Defining a Baseline Complexity Model for ERP Systems over SaaS

DOI: 10.20533/jitst.2046.3723.2012.0012
Kenneth J. Spiteri, Cristina Luca, Tim Reynolds, George Wilson Download Paper

Issue 4, December 2012

Pages Title Author(s) Papers
93 - 99 Building an Ontology Based on Folksonomy: An attempt to Represent Knowledge Embedded in Filmed Materials

DOI: 10.20533/jitst.2046.3723.2012.0013
Reyad Binzabiah, Steve Wade Download Paper
100 - 109 Building Information Science Ontology (OIS) with Methontology and Protégé

DOI: 10.20533/jitst.2046.3723.2012.0014
Ahlam F. Sawsaa, Joan Lu Download Paper
110 - 116 The Information Systems Security Training Program: A Work in Progress

DOI: 10.20533/jitst.2046.3723.2012.0015
Asim Gençer Gökce, Yilmaz Çankaya Download Paper
117 - 122 Identifying and Finding Forensic Evidence From Windows Application

DOI: 10.20533/jitst.2046.3723.2012.0016
Funminiyi Olajide, Nick Savage, Galyna Akmayeva, Charles Shoniregun Download Paper