Volume 6 (2018)
Issue 1, March 2018
Pages | Title | Author(s) | Papers |
526 - 533 | Assessment of six E-Mail Encryption Solutions Using an Utility Value Analysis DOI: 10.20533/jitst.2046.3723.2018.0065 |
D. Fischer, B. Markscheffel, K. Scherr | |
534 - 540 | Switching to Electronic Government through Transformational Leadership: Implications of Multichannel and Digital Divide DOI: 10.20533/jitst.2046.3723.2018.0066 |
Khurram Mahmood, Zainab Nayyar, Hafiz Mushtaq Ahmad | |
541 - 547 | Majority Rule Approach to Deep Learning for Large Benchmark Data and Real Credit Card Transaction Data DOI: 10.20533/jitst.2046.3723.2018.0067 |
Ayahiko Niimi | |
548 - 555 | Designing GDPR Data Protection Principles in Systems Development DOI: 10.20533/jitst.2046.3723.2018.0068 |
Fredrik Blix, Salah Addin Elshekeil, Saran Laoyookhong |
Issue 2, June 2018
Pages | Title | Author(s) | Papers |
556 - 568 | Analysis of Cloud-Based E-government Services Acceptance in Jordan: Challenges and Barriers DOI: 10.20533/jitst.2046.3723.2018.0069 |
Abeer Alkhwaldi, Mumtaz Kamala, Rami Qahwaji | |
569 - 578 | Design and Evaluation of Mobile Games for Enhancing Cyber Security Awareness DOI: 10.20533/jitst.2046.3723.2018.0070 |
F. Alotaibi, S. Furnell, I.Stengel, M.Papadaki | |
579 - 587 | A Novel Approach for Protection of Accounts’ Names against Hackers Combining Cluster Analysis and Chaotic Theory DOI: 10.20533/jitst.2046.3723.2018.0071 |
Desislav Andreev, Simona Petrakieva, Ina Taralova | |
588 - 595 | Intractable Problems in Malware Analysis and Practical Solutions DOI: 10.20533/jitst.2046.3723.2018.0072 |
Ali Aydin Selçuk, Fatih Orhan, Berker Batur |
Issue 3, September 2018
Pages | Title | Author(s) | Papers |
596 - 604 | The Impact of Trusted and Secured Transactions in an E-Commerce Environment on Consumers’ Behaviour: The Case of Saudis in the UK DOI: 10.20533/jitst.2046.3723.2018.0073 |
Haya Alshehri, Farid Meziane | |
605 - 614 | A Gamified System for Task Monitoring and Performance Evaluation Using the Learning Vectors (LV) Model DOI: 10.20533/jitst.2046.3723.2018.0074 |
Michelle G. Cacais, Givandenys L. Sales, Weslley L. Caldas | |
615 - 622 | Integration of LMS with Facial Recognition Systems Based on Artificial Intelligence DOI: 10.20533/jitst.2046.3723.2018.0075 |
Anderson Holguin Ávila, Brigitte Rodríguez Mendoza, María Bohórquez Sotelo, Juan Sebastián Delgadillo Loaiza | |
623 - 630 | Efficient Hardware Implementation of ITUbee for Lightweight Application DOI: 10.20533/jitst.2046.3723.2018.0076 |
Juhua Liu, Wei Li, Guoqiang Bai |