Journal Contents: International Journal of Dependable and Trustworthy Information Systems (IJDTIS)

Volume 2 (2011)
Issue 1
Article 1
An Interpretive Study of Critical Issues in Electronic Health Information Exchange (pages 1-17)
Sherrie Drye Cannoy (North Carolina A&T State University, USA)
Article 3
Issue 2
Article 1
Selecting Secure Web Applications Using Trustworthiness Benchmarking (pages 1-16)
Afonso Araújo Neto (University of Coimbra, Portugal), Marco Vieira (University of Coimbra, Portugal)
Article 2
First Experiment on Modeling Safety LifeCycle Process in Railway Systems (pages 17-39)
Brahim Hamid (IRIT, University of Toulouse, France), Yulin (Huaxi) Zhang (IRIT, University of Toulouse, France), Jacob Geisel (IRIT, University of Toulouse, France), David Gonzalez (IKERLAN-IK4, Spain)
Article 3
Network Security and Firewall Technology: A Step to Safety of National IT Vision (pages 40-60)
Afolayan A. Obiniyi (Ahmadu Bello University, Nigeria), Ezugwu E. Absalom (Ahmadu Bello University, Nigeria), Mohammed Dikko (Ahmadu Bello University, Nigeria)
Issue 3
Article 1
Cloud Computing in Case-Based Pedagogy: An Information Systems Success Perspective (pages 1-16)
Charlie C. Chen (Department of Computer Information Systems, Appalachian State University, Boone, NC, USA)
Article 2
Security and Trust of Public Key Cryptography for HIP and HIP Multicast (pages 17-35)
Amir K.C (Aalto University, Helsinki, Finland), Harri Forsgren (University of Helsinki, Finland), Kaj Grahn (Arcada University of Applied Sciences, Helsinki, Finland), Timo Karvi (University of Helsinki, Helsinki, Finland), Göran Pulkkis (Arcada University of Applied Sciences, Helsinki, Finland)
Article 3
Evaluation of Information Security Controls in Organizations by Grey Relational Analysis (pages 36-54)
Angel R. Otero (Department of Computer and Information Sciences, Nova Southeastern University, Ft. Lauderdale, FL, USA), Abdel Ejnioui (Department of Information Technology, University of South Florida Lakeland, Lakeland, FL, USA), Carlos E. Otero (Department of Information Technology, University of South Florida Lakeland, Lakeland, FL, USA), Gurvirender Tejay (Department of Computer and Information Sciences, Nova Southeastern University, Ft. Lauderdale, FL, USA)
Article 4
Analyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data (pages 55-68)
Utpal Bose (College of Business, University of Houston Downtown, Houston, TX, USA)
Volume 1 (2010)
Issue 1
Article 2
A Conceptual Framework for Adaptive and Configurable Activity-Aware Trust in Collaborative Environments (pages 25-44)
Ioanna Dionysiou (University of Nicosia, Cyprus), David E. Bakken (Washington State University, USA)
Article 3
Social Networks and Trust in e-Commerce (pages 45-59)
G. Scott Erickson (Ithaca College, USA), Kurt Komaromi (Ithaca College, USA), Fahri Unsal (Ithaca College, USA)
Article 4
STRIDE: A Secure Framework for Modeling Trust-Privacy Tradeoffs in Distributed Computing Environments (pages 60-81)
Rima Deghaili (American University of Beirut, Lebanon), Ali Chehab (American University of Beirut, Lebanon), Ayman Kayssi (American University of Beirut, Lebanon), Wassim Itani (American University of Beirut, Lebanon)
Issue 2
Article 1
Trusted Platform Validation and Management (pages 1-31)
Andreas U. Schmidt (Novalyst IT AG, Germany), Andreas Leicher (Novalyst IT AG, Germany), Inhyok Cha (InterDigital Communications, USA), Yogendra Shah (InterDigital Communications, USA)
Article 2
Benchmarking Untrustworthiness: An Alternative to Security Measurement (pages 32-54)
Afonso Araújo Neto (University of Coimbra, Portugal), Marco Vieira (University of Coimbra, Portugal)
Article 3
Information Technology, Political Institutions, and Generalized Trust: An Empirical Assessment Using Structural Equation Models (pages 55-69)
Blaine Robbins (University of Washington, USA), Maria Grigoryeva (University of Washington, USA)
Article 4
Trust Over the Net: The Case of Israeli Youth (pages 70-85)
Oren Golan (New York University, USA)
Issue 3
Article 1
A Mobile Service Platform for Trustworthy E-Learning Service Provisioning (pages 1-13)
Zongwei Luo (University of Hong Kong, Hong Kong), Tianle Zhang (Beijing University of Posts and Telecommunications, China)
Article 2
A Framework for Studying the Problem of Trust in Online Settings (pages 14-31)
Tina Guenther (Lecturer in Sociology, Founder and Author of Sozlog, Germany), Guido Möllering (Max Planck Institute for the Study of Societies, Germany)
Article 3
Trust Issues and Solutions in Multimedia Content Distribution (pages 32-54)
Shiguo Lian (France Telecom R&D (Orange Labs) Beijing, China)
Issue 4
Article 1
Incorporating Social Trust into Design Practices for Secure Systems (pages 1-24)
Piotr Cofta (BT (British Telecom), UK), Hazel Lacohée (BT (British Telecom), UK), Paul Hodgson (BT (British Telecom), UK)
Article 2
Mobile Trusted Computing Based on MTM (pages 25-42)
Jan-Erik Ekberg (Nokia Research Center, Finland)
Article 3
Internet Trust as a Specific Form of Technology Trust and its Influence on Online Banking Adoption (pages 43-60)
Sonja Grabner-Kräuter (Klagenfurt University, Austria), Rita Faullant (Klagenfurt University, Austria)
Article 4
Human-Machine Trust Interaction: A Technical Overview (pages 61-74)
Conghui Liu (Renmin University of China, China)