Published: Jan 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019010101
Volume 10
Research Article
Julia Puaschunder
Sustainability management has originally and—to this day—primarily been focused on environmental aspects. Today, enormous data storage capacities and computational power in the e-big data era have...
Show More
Sustainability management has originally and—to this day—primarily been focused on environmental aspects. Today, enormous data storage capacities and computational power in the e-big data era have created unforeseen opportunities for big data hoarding corporations to reap hidden benefits from an individual's information sharing, which occurs bit by bit over time. This article presents a novel angle of sustainability, which is concerned with sensitive data protection given by the recently detected trade-off predicament between privacy and information sharing in the digital big data age. When individual decision makers face the privacy versus information sharing predicament in their corporate leadership, dignity and utility considerations could influence risk management and sustainability operations. Yet, to this day, there has not been a clear connection between dignity and utility of privacy and information sharing as risk management and sustainability drivers. The chapter unravels the legal foundations of dignity in privacy but also the behavioral economics of utility in communication and information sharing in order to draw a case of dignity and utility to be integrated into contemporary corporate governance, risk management and sustainability considerations of e-innovation.
Content Forthcoming
Add to Your Personal Library: Article Published: Jan 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019010102
Volume 10
Research Article
Isaac Kofi Mensah
This study integrated culture (language) and perceived service quality into the UTAUT model to explore the intention of international students to order food online in China. The results have...
Show More
This study integrated culture (language) and perceived service quality into the UTAUT model to explore the intention of international students to order food online in China. The results have demonstrated that performance expectancy, effort expectancy, culture (language), and perceived service quality were all significant predictors of the intention of international students to order food online. Also, culture (language) was determined to influence the perceived service quality, effort expectancy, and performance expectancy of ordering food online. Performance expectancy, and effort expectancy were revealed to be significant predictors of perceived service quality. Furthermore, the intention to order food online was a determinant of the intention to recommend. The implications of these findings are discussed.
Content Forthcoming
Add to Your Personal Library: Article Published: Jan 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019010103
Volume 10
Research Article
Mohamed Hamroun, Sonia Lajmi, Henri Nicolas, Ikram Amous
Concept detection has been considered a difficult problem and has attracted the interest of the content-based multimedia retrieval community. This detection implies an association between the...
Show More
Concept detection has been considered a difficult problem and has attracted the interest of the content-based multimedia retrieval community. This detection implies an association between the concept and the visual content. In other words, the visual characteristics extracted from the video. This includes taking knowledge about the concept itself and its context. This work focuses on the problem of concept detection. For that, several stages are elaborated: first, a method of extraction and semi-automatic annotation of the video plans for the training set is proposed. This new method is based on the genetic algorithm. Then, a preliminary concept detection is carried out to generate the visual dictionary (BoVS). This second step is improved thanks to a noise reduction mechanism. This article's contribution has proven its effectiveness by testing it on a large dataset.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Hamroun, Mohamed, et al. "Descriptor Optimization for Semantic Concept Detection Using Visual Content." IJSITA vol.10, no.1 2019: pp.40-59. http://doi.org/10.4018/IJSITA.2019010103
APA
Hamroun, M., Lajmi, S., Nicolas, H., & Amous, I. (2019). Descriptor Optimization for Semantic Concept Detection Using Visual Content. International Journal of Strategic Information Technology and Applications (IJSITA), 10(1), 40-59. http://doi.org/10.4018/IJSITA.2019010103
Chicago
Hamroun, Mohamed, et al. "Descriptor Optimization for Semantic Concept Detection Using Visual Content," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.1: 40-59. http://doi.org/10.4018/IJSITA.2019010103
Export Reference
Published: Apr 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.20190401.pre
Volume 10
Editorial Preface
Abdelmalek Amine, Reda Mohamed Hamou
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Amine, Abdelmalek, and Reda Mohamed Hamou. "Special issue “Strategic Information Technology: Modeling Some Solutions to Real-World Problems”." IJSITA vol.10, no.2 2019: pp.5-6. http://doi.org/10.4018/IJSITA.20190401.pre
APA
Amine, A. & Hamou, R. M. (2019). Special issue “Strategic Information Technology: Modeling Some Solutions to Real-World Problems”. International Journal of Strategic Information Technology and Applications (IJSITA), 10(2), 5-6. http://doi.org/10.4018/IJSITA.20190401.pre
Chicago
Amine, Abdelmalek, and Reda Mohamed Hamou. "Special issue “Strategic Information Technology: Modeling Some Solutions to Real-World Problems”," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.2: 5-6. http://doi.org/10.4018/IJSITA.20190401.pre
Export Reference
Published: Apr 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019040101
Volume 10
Research Article
Abdenour Lazeb, Riad Mokadem, Ghalem Belalem
Applications produce huge volumes of data that are distributed on remote and heterogeneous sites. This generates problems related to access and sharing data. As a result, managing data in...
Show More
Applications produce huge volumes of data that are distributed on remote and heterogeneous sites. This generates problems related to access and sharing data. As a result, managing data in large-scale environments is a real challenge. In this context, large-scale data management systems often use data replication, a well-known technique that treats generated problems by storing multiple copies of data, called replicas, across multiple nodes. Most of the replication strategies in these environments are difficult to adapt to cloud environments. They aim to achieve the best performance of the system without meeting the important objectives of the cloud provider. This article proposes a new dynamic replication strategy. The proposed algorithm significantly improves provider gain without neglecting customer satisfaction.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Lazeb, Abdenour, et al. "Towards a New Data Replication Management in Cloud Systems." IJSITA vol.10, no.2 2019: pp.1-20. http://doi.org/10.4018/IJSITA.2019040101
APA
Lazeb, A., Mokadem, R., & Belalem, G. (2019). Towards a New Data Replication Management in Cloud Systems. International Journal of Strategic Information Technology and Applications (IJSITA), 10(2), 1-20. http://doi.org/10.4018/IJSITA.2019040101
Chicago
Lazeb, Abdenour, Riad Mokadem, and Ghalem Belalem. "Towards a New Data Replication Management in Cloud Systems," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.2: 1-20. http://doi.org/10.4018/IJSITA.2019040101
Export Reference
Published: Apr 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019040102
Volume 10
Research Article
Wafa Nebili, Brahim Farou, Hamid Seridi
Background subtraction is an essential step in the process of monitoring videos. Several works have proposed models to differentiate the background pixels from the foreground pixels. Mixtures of...
Show More
Background subtraction is an essential step in the process of monitoring videos. Several works have proposed models to differentiate the background pixels from the foreground pixels. Mixtures of Gaussian (GMM) are among the most popular models for a such problem. However, the use of a fixed number of Gaussians influence on their results quality. This article proposes an improvement of the GMM based on the use of the artificial immune recognition system (AIRS) to generate and introduce new Gaussians instead of using a fixed number of Gaussians. The proposed approach exploits the robustness of the mutation function in the generation phase of the new ARBs to create new Gaussians. These Gaussians are then filtered into the resource competition phase in order to keep only ones that best represent the background. The system tested on Wallflower and UCSD datasets has proven its effectiveness against other state-of-art methods.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Nebili, Wafa, et al. "Using Resources Competition and Memory Cell Development to Select the Best GMM for Background Subtraction." IJSITA vol.10, no.2 2019: pp.21-43. http://doi.org/10.4018/IJSITA.2019040102
APA
Nebili, W., Farou, B., & Seridi, H. (2019). Using Resources Competition and Memory Cell Development to Select the Best GMM for Background Subtraction. International Journal of Strategic Information Technology and Applications (IJSITA), 10(2), 21-43. http://doi.org/10.4018/IJSITA.2019040102
Chicago
Nebili, Wafa, Brahim Farou, and Hamid Seridi. "Using Resources Competition and Memory Cell Development to Select the Best GMM for Background Subtraction," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.2: 21-43. http://doi.org/10.4018/IJSITA.2019040102
Export Reference
Published: Apr 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019040103
Volume 10
Research Article
Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari
The main purpose of designing vehicular ad-hoc networks (VANETs) is to achieve safety by periodically broadcasting the vehicle's coordinates with a high precision. This advantage brings a threat...
Show More
The main purpose of designing vehicular ad-hoc networks (VANETs) is to achieve safety by periodically broadcasting the vehicle's coordinates with a high precision. This advantage brings a threat represented in the possible tracking and identification of the vehicles. A possible solution is to use and change pseudonyms. However, even by changing pseudonyms, the vehicle could still be tracked if the adversary has a prior knowledge about the potential start and end points of a particular driver who has social interactions (e.g., with neighbors) which introduces the concept of vehicular social networks (VSNs). This article extends the authors previous work, namely: “EPP Extreme Points Privacy for Trips and Home Identification in Vehicular Social Networks,” which exploits the nature of the end points that are common between VSN users in order to create shared zones to anonymize them. The extension is represented by (a) the evaluation of the enjoyed location privacy of VSN users after quitting the district in addition to (b) detailing the used environment during the evaluation.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Babaghayou, Messaoud, et al. "Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users." IJSITA vol.10, no.2 2019: pp.44-58. http://doi.org/10.4018/IJSITA.2019040103
APA
Babaghayou, M., Labraoui, N., & Ari, A. A. (2019). Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users. International Journal of Strategic Information Technology and Applications (IJSITA), 10(2), 44-58. http://doi.org/10.4018/IJSITA.2019040103
Chicago
Babaghayou, Messaoud, Nabila Labraoui, and Ado Adamou Abba Ari. "Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.2: 44-58. http://doi.org/10.4018/IJSITA.2019040103
Export Reference
Published: Apr 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019040104
Volume 10
Research Article
Mourad Zerhouni, Sidi Mohamed Benslimane
Ontology alignment is an important way of establishing interoperability between Semantic Web applications that use different but related ontologies. Ontology alignment is the process of identifying...
Show More
Ontology alignment is an important way of establishing interoperability between Semantic Web applications that use different but related ontologies. Ontology alignment is the process of identifying semantically equivalent entities from multiple ontologies. This is not always obvious because technical constraints such as data volume and execution time are determining factors in the choice of an alignment algorithm. Nowadays, partitioning and modularization are two main strategies for breaking down large ontologies into blocks or ontology modules respectively to align ontologies. This article proposes ONTEM as an effective alignment method for large-scale ontology based on the ontology entities extraction. This article conducts a comprehensive evaluation using the datasets of the OAEI 2018 campaign. The obtained results are promising, and they revealed that ONTEM is one of the most effective systems.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zerhouni, Mourad, and Sidi Mohamed Benslimane. "Large-Scale Ontology Alignment- An Extraction Based Method to Support Information System Interoperability." IJSITA vol.10, no.2 2019: pp.59-84. http://doi.org/10.4018/IJSITA.2019040104
APA
Zerhouni, M. & Benslimane, S. M. (2019). Large-Scale Ontology Alignment- An Extraction Based Method to Support Information System Interoperability. International Journal of Strategic Information Technology and Applications (IJSITA), 10(2), 59-84. http://doi.org/10.4018/IJSITA.2019040104
Chicago
Zerhouni, Mourad, and Sidi Mohamed Benslimane. "Large-Scale Ontology Alignment- An Extraction Based Method to Support Information System Interoperability," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.2: 59-84. http://doi.org/10.4018/IJSITA.2019040104
Export Reference
Published: Jul 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019070101
Volume 10
Research Article
Marouane Balmakhtar, Scott E. Mensch
This research measured determinants that influence the willingness of IT/IA professionals to recommend Big Data analytics to improve information systems security in an organization. A review of the...
Show More
This research measured determinants that influence the willingness of IT/IA professionals to recommend Big Data analytics to improve information systems security in an organization. A review of the literature as well as the works of prior researchers provided the basis for formulation of research questions. Results of this study found that security effectiveness, organizational need, and reliability play a role in the decision to recommend big data analytics to improve information security. This research has implications for both consumers and providers of big data analytics services through the identification of factors that influence IT/IA professionals. These factors aim to improve information systems security, and therefore, which service offerings are likely to meet the needs of these professionals and their organizations.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Balmakhtar, Marouane, and Scott E. Mensch. "Big Data Analytics Adoption Factors in Improving Information Systems Security." IJSITA vol.10, no.3 2019: pp.1-21. http://doi.org/10.4018/IJSITA.2019070101
APA
Balmakhtar, M. & Mensch, S. E. (2019). Big Data Analytics Adoption Factors in Improving Information Systems Security. International Journal of Strategic Information Technology and Applications (IJSITA), 10(3), 1-21. http://doi.org/10.4018/IJSITA.2019070101
Chicago
Balmakhtar, Marouane, and Scott E. Mensch. "Big Data Analytics Adoption Factors in Improving Information Systems Security," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.3: 1-21. http://doi.org/10.4018/IJSITA.2019070101
Export Reference
Published: Jul 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019070102
Volume 10
Research Article
Yousef Alabbasi, Kamaljeet Sandhu
Blockchain has become an epidemic and significant decision that organizations may make in the next few years, enabling institutions to integrate business functions, operations, and processes in a...
Show More
Blockchain has become an epidemic and significant decision that organizations may make in the next few years, enabling institutions to integrate business functions, operations, and processes in a decentralized distributed ledger technology. This technology will transform the business world and economy in solving the limitations created by centralization and system inefficiency. Accordingly, with the high demand and complexity of growing economies such as the Gulf Cooperation Council GCC countries, the need for a typical solution technology is a game changer. This will lead GCC to a solid economic base. Blockchain technology can be applicable in many different fields such as Banking, education, Health, finance, government and trade. This article will address the literature review and methodology of Blockchain technology and innovation at the GCC, particularly in Saudi Arabia. Also, more research can be conducted in the future as the system may be integrated in these countries.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Alabbasi, Yousef, and Kamaljeet Sandhu. "Blockchain Innovation and Information Technology at GCC: Literature Review and Methodology." IJSITA vol.10, no.3 2019: pp.22-37. http://doi.org/10.4018/IJSITA.2019070102
APA
Alabbasi, Y. & Sandhu, K. (2019). Blockchain Innovation and Information Technology at GCC: Literature Review and Methodology. International Journal of Strategic Information Technology and Applications (IJSITA), 10(3), 22-37. http://doi.org/10.4018/IJSITA.2019070102
Chicago
Alabbasi, Yousef, and Kamaljeet Sandhu. "Blockchain Innovation and Information Technology at GCC: Literature Review and Methodology," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.3: 22-37. http://doi.org/10.4018/IJSITA.2019070102
Export Reference
Published: Jul 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019070103
Volume 10
Research Article
Evangelos Katsamakas, Aditya Saharia
Digital innovation is becoming a strategic priority for business and IT leaders in many companies. This article explores digital innovation at Six Flags Entertainment Corporation, the world's...
Show More
Digital innovation is becoming a strategic priority for business and IT leaders in many companies. This article explores digital innovation at Six Flags Entertainment Corporation, the world's largest regional theme park company, with emphasis on the strategic leadership role of its Chief Information Officer (CIO). The article shows that digital innovation requires appropriate technology infrastructure, organization, leadership skills and a systematic process to evaluate existing and emerging technologies. Innovation ideas may come from many internal or external sources. Five digital initiatives illustrate how digital innovation can create new revenue streams and transform customer experience. Insights are provided on how to justify such initiatives and how to strike the right balance between a focus on innovation, while meeting the traditional operational needs. Overall, a focus on digital innovation is an opportunity for a strategic role of IT leaders, but that requires new skills and new education.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Katsamakas, Evangelos, and Aditya Saharia. "Digital Innovation to Transform the Customer Experience." IJSITA vol.10, no.3 2019: pp.38-52. http://doi.org/10.4018/IJSITA.2019070103
APA
Katsamakas, E. & Saharia, A. (2019). Digital Innovation to Transform the Customer Experience. International Journal of Strategic Information Technology and Applications (IJSITA), 10(3), 38-52. http://doi.org/10.4018/IJSITA.2019070103
Chicago
Katsamakas, Evangelos, and Aditya Saharia. "Digital Innovation to Transform the Customer Experience," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.3: 38-52. http://doi.org/10.4018/IJSITA.2019070103
Export Reference
Published: Oct 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.20191001.pre
Volume 10
Guest Editorial Preface
Nassira Ghoualmi-Zine
Content Forthcoming
Add to Your Personal Library: Article Published: Oct 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019100101
Volume 10
Research Article
Abdallah Soualmi, Adel Alti, Lamri Laouamer
Personal health information is considered a target for illegal users that attempt to read, delete, and/or steal data. Therefore, watermarking techniques offer new ways to protect sensitive data...
Show More
Personal health information is considered a target for illegal users that attempt to read, delete, and/or steal data. Therefore, watermarking techniques offer new ways to protect sensitive data transferred over the Internet. This article presents a novel watermarking approach for securing sensitive data in e-health applications based on DWT and Schur decomposition coefficients. The proposed approach aims to offer a valuable balance between robustness and imperceptibility. Several experiments were conducted using a standard dataset of medical images. The experiments achieved promising results for high-level data protection and good imperceptibility values compared to existing works.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Soualmi, Abdallah, et al. "A Fast and Effective Watermarking Method for Medical Data security." IJSITA vol.10, no.4 2019: pp.1-15. http://doi.org/10.4018/IJSITA.2019100101
APA
Soualmi, A., Alti, A., & Laouamer, L. (2019). A Fast and Effective Watermarking Method for Medical Data security. International Journal of Strategic Information Technology and Applications (IJSITA), 10(4), 1-15. http://doi.org/10.4018/IJSITA.2019100101
Chicago
Soualmi, Abdallah, Adel Alti, and Lamri Laouamer. "A Fast and Effective Watermarking Method for Medical Data security," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.4: 1-15. http://doi.org/10.4018/IJSITA.2019100101
Export Reference
Published: Oct 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019100102
Volume 10
Research Article
Sarra Hammoudi, Saad Harous, Zibouda Aliouat
Sensors in Internet of Things generate a huge amount of data. The massive volume of the captured data is stored on cloud servers. Over time, the unbalanced load servers prevent better resource...
Show More
Sensors in Internet of Things generate a huge amount of data. The massive volume of the captured data is stored on cloud servers. Over time, the unbalanced load servers prevent better resource utilization. It also increases the input and the output response time. Hence, applying load balancing techniques is very important to achieve efficient system performance. Ensuring the critical data availability in such dynamic systems is very essential. In this article, the authors propose ROBUST for ensuring data availability mechanism and a fault-tolerance architecture. ROBUST also realises load balancing among servers within minimum latency, by avoiding the problem of the overloaded sites and unbalanced use of the resources on the servers. Comparing the response time using the ROBUST and Load Balancing in the Cloud Using Specialization (LBCS), ROBUST architecture has given satisfactory results in terms of critical data latency. Compared with LBCS, ROBUST gains 42% critical data recovery from a primary server and 45% when searching for duplicated critical data. The authors implemented the system using the JADE platform.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Hammoudi, Sarra, et al. "A Robust IOT-Cloud IaaS for Data Availability within Minimum Latency." IJSITA vol.10, no.4 2019: pp.16-32. http://doi.org/10.4018/IJSITA.2019100102
APA
Hammoudi, S., Harous, S., & Aliouat, Z. (2019). A Robust IOT-Cloud IaaS for Data Availability within Minimum Latency. International Journal of Strategic Information Technology and Applications (IJSITA), 10(4), 16-32. http://doi.org/10.4018/IJSITA.2019100102
Chicago
Hammoudi, Sarra, Saad Harous, and Zibouda Aliouat. "A Robust IOT-Cloud IaaS for Data Availability within Minimum Latency," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.4: 16-32. http://doi.org/10.4018/IJSITA.2019100102
Export Reference
Published: Oct 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJSITA.2019100103
Volume 10
Research Article
Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Abdelhak Mourad Gueroui
The internet of vehicles (IoV) is getting a considerable amount of attention from different research parties. IoV aims at enhancing the driving experience with its wide range of applications varying...
Show More
The internet of vehicles (IoV) is getting a considerable amount of attention from different research parties. IoV aims at enhancing the driving experience with its wide range of applications varying from safety, road management to entertainment; however, some of such applications bring severe security and privacy issues; identity exposing, and location tracking are good examples. By enabling vehicles to send their statuses to themselves via beacon messages, this creates an environmental awareness for safety purposes but also exposes them to the aforementioned attacks. A lot of work has been done to mitigate the effect of such attacks but still does not provide a holistic solution. In this article, which is an extension to a prior work, the authors investigate the effects of changing the transmission range while sending beacons on the achieved level of location privacy based on two location privacy schemes: SLOW and CAPS. The authors use additional privacy metrics in addition to comparing the strategies in some well-known security attacks. The outcomes confirm the feasibility of using such a mechanism.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Babaghayou, Messaoud, et al. "Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles." IJSITA vol.10, no.4 2019: pp.33-54. http://doi.org/10.4018/IJSITA.2019100103
APA
Babaghayou, M., Labraoui, N., Abba Ari, A. A., & Gueroui, A. M. (2019). Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles. International Journal of Strategic Information Technology and Applications (IJSITA), 10(4), 33-54. http://doi.org/10.4018/IJSITA.2019100103
Chicago
Babaghayou, Messaoud, et al. "Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.4: 33-54. http://doi.org/10.4018/IJSITA.2019100103
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100