Journal Navigation
Published: Jan 1, 2011
DOI: 10.4018/jdtis.2011010101
Volume 2
Sherrie Drye Cannoy
In this paper, the author examines the critical issues that have emerged in the area of electronic healthcare information exchange (HIE) in the United States. An interpretive, longitudinal study was... Show More
Download Sample (PDF): Article
Cite Article

MLA

Cannoy, Sherrie Drye. "An Interpretive Study of Critical Issues in Electronic Health Information Exchange." IJDTIS vol.2, no.1 2011: pp.1-17. http://doi.org/10.4018/jdtis.2011010101

APA

Cannoy, S. D. (2011). An Interpretive Study of Critical Issues in Electronic Health Information Exchange. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(1), 1-17. http://doi.org/10.4018/jdtis.2011010101

Chicago

Cannoy, Sherrie Drye. "An Interpretive Study of Critical Issues in Electronic Health Information Exchange," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.1: 1-17. http://doi.org/10.4018/jdtis.2011010101

Export Reference

Mendeley
Published: Jan 1, 2011
DOI: 10.4018/jdtis.2011010102
Volume 2
Sandra A. Vannoy
The Internet and emerging technologies are facilitating the creation of new marketplaces designed to address a diverse range of business and societal needs. As companies are utilizing technology to... Show More
Download Sample (PDF): Article
Cite Article

MLA

Vannoy, Sandra A. "A Structured Content Analytic Assessment of Business Services Advertisements in the Cloud-Based Web Services Marketplace." IJDTIS vol.2, no.1 2011: pp.18-49. http://doi.org/10.4018/jdtis.2011010102

APA

Vannoy, S. A. (2011). A Structured Content Analytic Assessment of Business Services Advertisements in the Cloud-Based Web Services Marketplace. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(1), 18-49. http://doi.org/10.4018/jdtis.2011010102

Chicago

Vannoy, Sandra A. "A Structured Content Analytic Assessment of Business Services Advertisements in the Cloud-Based Web Services Marketplace," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.1: 18-49. http://doi.org/10.4018/jdtis.2011010102

Export Reference

Mendeley
Published: Jan 1, 2011
DOI: 10.4018/jdtis.2011010103
Volume 2
A. F. Salam
Increasingly firms are competing through the formation of extended enterprises. An extended enterprise consists of a set of firms within a value chain that collaborate to produce a finished product.... Show More
Download Sample (PDF): Article
Cite Article

MLA

Salam, A. F. "Semantic Matchmaking and Decision Support System for Dependable Supplier Selection in the Extended Enterprise Supply Chain." IJDTIS vol.2, no.1 2011: pp.50-80. http://doi.org/10.4018/jdtis.2011010103

APA

Salam, A. F. (2011). Semantic Matchmaking and Decision Support System for Dependable Supplier Selection in the Extended Enterprise Supply Chain. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(1), 50-80. http://doi.org/10.4018/jdtis.2011010103

Chicago

Salam, A. F. "Semantic Matchmaking and Decision Support System for Dependable Supplier Selection in the Extended Enterprise Supply Chain," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.1: 50-80. http://doi.org/10.4018/jdtis.2011010103

Export Reference

Mendeley
Published: Apr 1, 2011
DOI: 10.4018/jdtis.2011040101
Volume 2
Afonso Araújo Neto, Marco Vieira
The multiplicity of existing software and component alternatives for web applications, especially in open source communities, has boosted interest in suitable benchmarks, able to assist in the... Show More
Download Sample (PDF): Article
Cite Article

MLA

Neto, Afonso Araújo, and Marco Vieira. "Selecting Secure Web Applications Using Trustworthiness Benchmarking." IJDTIS vol.2, no.2 2011: pp.1-16. http://doi.org/10.4018/jdtis.2011040101

APA

Neto, A. A. & Vieira, M. (2011). Selecting Secure Web Applications Using Trustworthiness Benchmarking. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(2), 1-16. http://doi.org/10.4018/jdtis.2011040101

Chicago

Neto, Afonso Araújo, and Marco Vieira. "Selecting Secure Web Applications Using Trustworthiness Benchmarking," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.2: 1-16. http://doi.org/10.4018/jdtis.2011040101

Export Reference

Mendeley
Published: Apr 1, 2011
DOI: 10.4018/jdtis.2011040102
Volume 2
Brahim Hamid, Yulin (Huaxi) Zhang, Jacob Geisel, David Gonzalez
The conception and design of Resource Constrained Embedded Systems (RCES) is an inherently complex endeavor. Non-functional requirements from security and dependability are exacerbate this... Show More
Download Sample (PDF): Article
Cite Article

MLA

Hamid, Brahim, et al. "First Experiment on Modeling Safety LifeCycle Process in Railway Systems." IJDTIS vol.2, no.2 2011: pp.17-39. http://doi.org/10.4018/jdtis.2011040102

APA

Hamid, B., Zhang, Y. H., Geisel, J., & Gonzalez, D. (2011). First Experiment on Modeling Safety LifeCycle Process in Railway Systems. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(2), 17-39. http://doi.org/10.4018/jdtis.2011040102

Chicago

Hamid, Brahim, et al. "First Experiment on Modeling Safety LifeCycle Process in Railway Systems," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.2: 17-39. http://doi.org/10.4018/jdtis.2011040102

Export Reference

Mendeley
Published: Apr 1, 2011
DOI: 10.4018/jdtis.2011040103
Volume 2
Afolayan A. Obiniyi, Ezugwu E. Absalom, Mohammed Dikko
With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and... Show More
Download Sample (PDF): Article
Cite Article

MLA

Obiniyi, Afolayan A., et al. "Network Security and Firewall Technology: A Step to Safety of National IT Vision." IJDTIS vol.2, no.2 2011: pp.40-60. http://doi.org/10.4018/jdtis.2011040103

APA

Obiniyi, A. A., Absalom, E. E., & Dikko, M. (2011). Network Security and Firewall Technology: A Step to Safety of National IT Vision. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(2), 40-60. http://doi.org/10.4018/jdtis.2011040103

Chicago

Obiniyi, Afolayan A., Ezugwu E. Absalom, and Mohammed Dikko. "Network Security and Firewall Technology: A Step to Safety of National IT Vision," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.2: 40-60. http://doi.org/10.4018/jdtis.2011040103

Export Reference

Mendeley
Published: Jul 1, 2011
DOI: 10.4018/jdtis.2011070101
Volume 2
Charlie C. Chen
Case-based pedagogy has evolved as an important tool for enhancing students’ analytical thinking and problem solving skills, as well as fostering the ability to make decisions under conditions of... Show More
Download Sample (PDF): Article
Cite Article

MLA

Chen, Charlie C. "Cloud Computing in Case-Based Pedagogy: An Information Systems Success Perspective." IJDTIS vol.2, no.3 2011: pp.1-16. http://doi.org/10.4018/jdtis.2011070101

APA

Chen, C. C. (2011). Cloud Computing in Case-Based Pedagogy: An Information Systems Success Perspective. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(3), 1-16. http://doi.org/10.4018/jdtis.2011070101

Chicago

Chen, Charlie C. "Cloud Computing in Case-Based Pedagogy: An Information Systems Success Perspective," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.3: 1-16. http://doi.org/10.4018/jdtis.2011070101

Export Reference

Mendeley
Published: Jul 1, 2011
DOI: 10.4018/jdtis.2011070102
Volume 2
Amir K.C, Harri Forsgren, Kaj Grahn, Timo Karvi, Göran Pulkkis
Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be... Show More
Download Sample (PDF): Article
Cite Article

MLA

K.C, Amir, et al. "Security and Trust of Public Key Cryptography for HIP and HIP Multicast." IJDTIS vol.2, no.3 2011: pp.17-35. http://doi.org/10.4018/jdtis.2011070102

APA

K.C, A., Forsgren, H., Grahn, K., Karvi, T., & Pulkkis, G. (2011). Security and Trust of Public Key Cryptography for HIP and HIP Multicast. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(3), 17-35. http://doi.org/10.4018/jdtis.2011070102

Chicago

K.C, Amir, et al. "Security and Trust of Public Key Cryptography for HIP and HIP Multicast," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.3: 17-35. http://doi.org/10.4018/jdtis.2011070102

Export Reference

Mendeley
Published: Jul 1, 2011
DOI: 10.4018/jdtis.2011070103
Volume 2
Angel R. Otero, Abdel Ejnioui, Carlos E. Otero, Gurvirender Tejay
In an era where dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by is becoming critical.... Show More
Download Sample (PDF): Article
Cite Article

MLA

Otero, Angel R., et al. "Evaluation of Information Security Controls in Organizations by Grey Relational Analysis." IJDTIS vol.2, no.3 2011: pp.36-54. http://doi.org/10.4018/jdtis.2011070103

APA

Otero, A. R., Ejnioui, A., Otero, C. E., & Tejay, G. (2011). Evaluation of Information Security Controls in Organizations by Grey Relational Analysis. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(3), 36-54. http://doi.org/10.4018/jdtis.2011070103

Chicago

Otero, Angel R., et al. "Evaluation of Information Security Controls in Organizations by Grey Relational Analysis," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.3: 36-54. http://doi.org/10.4018/jdtis.2011070103

Export Reference

Mendeley
Published: Jul 1, 2011
DOI: 10.4018/jdtis.2011070104
Volume 2
Utpal Bose
Rapid transformation in marketing information technologies has enabled corporations to build ample consumer databases and analyze those using sophisticated data-mining techniques to obtain extensive... Show More
Download Sample (PDF): Article
Cite Article

MLA

Bose, Utpal. "Analyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data." IJDTIS vol.2, no.3 2011: pp.55-68. http://doi.org/10.4018/jdtis.2011070104

APA

Bose, U. (2011). Analyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(3), 55-68. http://doi.org/10.4018/jdtis.2011070104

Chicago

Bose, Utpal. "Analyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.3: 55-68. http://doi.org/10.4018/jdtis.2011070104

Export Reference

Mendeley
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100