Issue 1, March 2018

Pages Title Author(s) Papers
526 - 533 Assessment of six E-Mail Encryption Solutions Using an Utility Value Analysis

DOI: 10.20533/jitst.2046.3723.2018.0065
D. Fischer, B. Markscheffel, K. Scherr Download Paper
534 - 540 Switching to Electronic Government through Transformational Leadership: Implications of Multichannel and Digital Divide

DOI: 10.20533/jitst.2046.3723.2018.0066
Khurram Mahmood, Zainab Nayyar, Hafiz Mushtaq Ahmad Download Paper
541 - 547 Majority Rule Approach to Deep Learning for Large Benchmark Data and Real Credit Card Transaction Data

DOI: 10.20533/jitst.2046.3723.2018.0067
Ayahiko Niimi Download Paper
548 - 555 Designing GDPR Data Protection Principles in Systems Development

DOI: 10.20533/jitst.2046.3723.2018.0068
Fredrik Blix, Salah Addin Elshekeil, Saran Laoyookhong Download Paper

Issue 2, June 2018

Pages Title Author(s) Papers
556 - 568 Analysis of Cloud-Based E-government Services Acceptance in Jordan: Challenges and Barriers

DOI: 10.20533/jitst.2046.3723.2018.0069
Abeer Alkhwaldi, Mumtaz Kamala, Rami Qahwaji Download Paper
569 - 578 Design and Evaluation of Mobile Games for Enhancing Cyber Security Awareness

DOI: 10.20533/jitst.2046.3723.2018.0070
F. Alotaibi, S. Furnell, I.Stengel, M.Papadaki Download Paper
579 - 587 A Novel Approach for Protection of Accounts’ Names against Hackers Combining Cluster Analysis and Chaotic Theory

DOI: 10.20533/jitst.2046.3723.2018.0071
Desislav Andreev, Simona Petrakieva, Ina Taralova Download Paper
588 - 595 Intractable Problems in Malware Analysis and Practical Solutions

DOI: 10.20533/jitst.2046.3723.2018.0072
Ali Aydin Selçuk, Fatih Orhan, Berker Batur Download Paper

Issue 3, September 2018

Pages Title Author(s) Papers
596 - 604 The Impact of Trusted and Secured Transactions in an E-Commerce Environment on Consumers’ Behaviour: The Case of Saudis in the UK

DOI: 10.20533/jitst.2046.3723.2018.0073
Haya Alshehri, Farid Meziane Download Paper
605 - 614 A Gamified System for Task Monitoring and Performance Evaluation Using the Learning Vectors (LV) Model

DOI: 10.20533/jitst.2046.3723.2018.0074
Michelle G. Cacais, Givandenys L. Sales, Weslley L. Caldas Download Paper
615 - 622 Integration of LMS with Facial Recognition Systems Based on Artificial Intelligence

DOI: 10.20533/jitst.2046.3723.2018.0075
Anderson Holguin Ávila, Brigitte Rodríguez Mendoza, María Bohórquez Sotelo, Juan Sebastián Delgadillo Loaiza Download Paper
623 - 630 Efficient Hardware Implementation of ITUbee for Lightweight Application

DOI: 10.20533/jitst.2046.3723.2018.0076
Juhua Liu, Wei Li, Guoqiang Bai Download Paper