Journal Navigation
Published: Jan 1, 2019
DOI: 10.4018/IJSITA.2019010101
Volume 10
Julia Puaschunder
Sustainability management has originally and—to this day—primarily been focused on environmental aspects. Today, enormous data storage capacities and computational power in the e-big data era have... Show More
Download Sample (PDF): Article
Cite Article

MLA

Puaschunder, Julia. "Towards a Utility Theory of Privacy and Information Sharing: The Introduction of Hyper-Hyperbolic Discounting." IJSITA vol.10, no.1 2019: pp.1-22. http://doi.org/10.4018/IJSITA.2019010101

APA

Puaschunder, J. (2019). Towards a Utility Theory of Privacy and Information Sharing: The Introduction of Hyper-Hyperbolic Discounting. International Journal of Strategic Information Technology and Applications (IJSITA), 10(1), 1-22. http://doi.org/10.4018/IJSITA.2019010101

Chicago

Puaschunder, Julia. "Towards a Utility Theory of Privacy and Information Sharing: The Introduction of Hyper-Hyperbolic Discounting," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.1: 1-22. http://doi.org/10.4018/IJSITA.2019010101

Export Reference

Mendeley
Published: Jan 1, 2019
DOI: 10.4018/IJSITA.2019010102
Volume 10
Isaac Kofi Mensah
This study integrated culture (language) and perceived service quality into the UTAUT model to explore the intention of international students to order food online in China. The results have... Show More
Download Sample (PDF): Article
Cite Article

MLA

Mensah, Isaac Kofi. "Factors Influencing International Students Behavioral Intention to Order Online Food Delivery Services." IJSITA vol.10, no.1 2019: pp.23-39. http://doi.org/10.4018/IJSITA.2019010102

APA

Mensah, I. K. (2019). Factors Influencing International Students Behavioral Intention to Order Online Food Delivery Services. International Journal of Strategic Information Technology and Applications (IJSITA), 10(1), 23-39. http://doi.org/10.4018/IJSITA.2019010102

Chicago

Mensah, Isaac Kofi. "Factors Influencing International Students Behavioral Intention to Order Online Food Delivery Services," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.1: 23-39. http://doi.org/10.4018/IJSITA.2019010102

Export Reference

Mendeley
Published: Jan 1, 2019
DOI: 10.4018/IJSITA.2019010103
Volume 10
Mohamed Hamroun, Sonia Lajmi, Henri Nicolas, Ikram Amous
Concept detection has been considered a difficult problem and has attracted the interest of the content-based multimedia retrieval community. This detection implies an association between the... Show More
Download Sample (PDF): Article
Cite Article

MLA

Hamroun, Mohamed, et al. "Descriptor Optimization for Semantic Concept Detection Using Visual Content." IJSITA vol.10, no.1 2019: pp.40-59. http://doi.org/10.4018/IJSITA.2019010103

APA

Hamroun, M., Lajmi, S., Nicolas, H., & Amous, I. (2019). Descriptor Optimization for Semantic Concept Detection Using Visual Content. International Journal of Strategic Information Technology and Applications (IJSITA), 10(1), 40-59. http://doi.org/10.4018/IJSITA.2019010103

Chicago

Hamroun, Mohamed, et al. "Descriptor Optimization for Semantic Concept Detection Using Visual Content," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.1: 40-59. http://doi.org/10.4018/IJSITA.2019010103

Export Reference

Mendeley
Volume 10
Editorial Preface
Abdelmalek Amine, Reda Mohamed Hamou
Published: Apr 1, 2019
DOI: 10.4018/IJSITA.2019040101
Volume 10
Abdenour Lazeb, Riad Mokadem, Ghalem Belalem
Applications produce huge volumes of data that are distributed on remote and heterogeneous sites. This generates problems related to access and sharing data. As a result, managing data in... Show More
Download Sample (PDF): Article
Cite Article

MLA

Lazeb, Abdenour, et al. "Towards a New Data Replication Management in Cloud Systems." IJSITA vol.10, no.2 2019: pp.1-20. http://doi.org/10.4018/IJSITA.2019040101

APA

Lazeb, A., Mokadem, R., & Belalem, G. (2019). Towards a New Data Replication Management in Cloud Systems. International Journal of Strategic Information Technology and Applications (IJSITA), 10(2), 1-20. http://doi.org/10.4018/IJSITA.2019040101

Chicago

Lazeb, Abdenour, Riad Mokadem, and Ghalem Belalem. "Towards a New Data Replication Management in Cloud Systems," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.2: 1-20. http://doi.org/10.4018/IJSITA.2019040101

Export Reference

Mendeley
Published: Apr 1, 2019
DOI: 10.4018/IJSITA.2019040102
Volume 10
Wafa Nebili, Brahim Farou, Hamid Seridi
Background subtraction is an essential step in the process of monitoring videos. Several works have proposed models to differentiate the background pixels from the foreground pixels. Mixtures of... Show More
Download Sample (PDF): Article
Cite Article

MLA

Nebili, Wafa, et al. "Using Resources Competition and Memory Cell Development to Select the Best GMM for Background Subtraction." IJSITA vol.10, no.2 2019: pp.21-43. http://doi.org/10.4018/IJSITA.2019040102

APA

Nebili, W., Farou, B., & Seridi, H. (2019). Using Resources Competition and Memory Cell Development to Select the Best GMM for Background Subtraction. International Journal of Strategic Information Technology and Applications (IJSITA), 10(2), 21-43. http://doi.org/10.4018/IJSITA.2019040102

Chicago

Nebili, Wafa, Brahim Farou, and Hamid Seridi. "Using Resources Competition and Memory Cell Development to Select the Best GMM for Background Subtraction," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.2: 21-43. http://doi.org/10.4018/IJSITA.2019040102

Export Reference

Mendeley
Published: Apr 1, 2019
DOI: 10.4018/IJSITA.2019040103
Volume 10
Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari
The main purpose of designing vehicular ad-hoc networks (VANETs) is to achieve safety by periodically broadcasting the vehicle's coordinates with a high precision. This advantage brings a threat... Show More
Download Sample (PDF): Article
Cite Article

MLA

Babaghayou, Messaoud, et al. "Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users." IJSITA vol.10, no.2 2019: pp.44-58. http://doi.org/10.4018/IJSITA.2019040103

APA

Babaghayou, M., Labraoui, N., & Ari, A. A. (2019). Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users. International Journal of Strategic Information Technology and Applications (IJSITA), 10(2), 44-58. http://doi.org/10.4018/IJSITA.2019040103

Chicago

Babaghayou, Messaoud, Nabila Labraoui, and Ado Adamou Abba Ari. "Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.2: 44-58. http://doi.org/10.4018/IJSITA.2019040103

Export Reference

Mendeley
Published: Apr 1, 2019
DOI: 10.4018/IJSITA.2019040104
Volume 10
Mourad Zerhouni, Sidi Mohamed Benslimane
Ontology alignment is an important way of establishing interoperability between Semantic Web applications that use different but related ontologies. Ontology alignment is the process of identifying... Show More
Download Sample (PDF): Article
Cite Article

MLA

Zerhouni, Mourad, and Sidi Mohamed Benslimane. "Large-Scale Ontology Alignment- An Extraction Based Method to Support Information System Interoperability." IJSITA vol.10, no.2 2019: pp.59-84. http://doi.org/10.4018/IJSITA.2019040104

APA

Zerhouni, M. & Benslimane, S. M. (2019). Large-Scale Ontology Alignment- An Extraction Based Method to Support Information System Interoperability. International Journal of Strategic Information Technology and Applications (IJSITA), 10(2), 59-84. http://doi.org/10.4018/IJSITA.2019040104

Chicago

Zerhouni, Mourad, and Sidi Mohamed Benslimane. "Large-Scale Ontology Alignment- An Extraction Based Method to Support Information System Interoperability," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.2: 59-84. http://doi.org/10.4018/IJSITA.2019040104

Export Reference

Mendeley
Published: Jul 1, 2019
DOI: 10.4018/IJSITA.2019070101
Volume 10
Marouane Balmakhtar, Scott E. Mensch
This research measured determinants that influence the willingness of IT/IA professionals to recommend Big Data analytics to improve information systems security in an organization. A review of the... Show More
Download Sample (PDF): Article
Cite Article

MLA

Balmakhtar, Marouane, and Scott E. Mensch. "Big Data Analytics Adoption Factors in Improving Information Systems Security." IJSITA vol.10, no.3 2019: pp.1-21. http://doi.org/10.4018/IJSITA.2019070101

APA

Balmakhtar, M. & Mensch, S. E. (2019). Big Data Analytics Adoption Factors in Improving Information Systems Security. International Journal of Strategic Information Technology and Applications (IJSITA), 10(3), 1-21. http://doi.org/10.4018/IJSITA.2019070101

Chicago

Balmakhtar, Marouane, and Scott E. Mensch. "Big Data Analytics Adoption Factors in Improving Information Systems Security," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.3: 1-21. http://doi.org/10.4018/IJSITA.2019070101

Export Reference

Mendeley
Published: Jul 1, 2019
DOI: 10.4018/IJSITA.2019070102
Volume 10
Yousef Alabbasi, Kamaljeet Sandhu
Blockchain has become an epidemic and significant decision that organizations may make in the next few years, enabling institutions to integrate business functions, operations, and processes in a... Show More
Download Sample (PDF): Article
Cite Article

MLA

Alabbasi, Yousef, and Kamaljeet Sandhu. "Blockchain Innovation and Information Technology at GCC: Literature Review and Methodology." IJSITA vol.10, no.3 2019: pp.22-37. http://doi.org/10.4018/IJSITA.2019070102

APA

Alabbasi, Y. & Sandhu, K. (2019). Blockchain Innovation and Information Technology at GCC: Literature Review and Methodology. International Journal of Strategic Information Technology and Applications (IJSITA), 10(3), 22-37. http://doi.org/10.4018/IJSITA.2019070102

Chicago

Alabbasi, Yousef, and Kamaljeet Sandhu. "Blockchain Innovation and Information Technology at GCC: Literature Review and Methodology," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.3: 22-37. http://doi.org/10.4018/IJSITA.2019070102

Export Reference

Mendeley
Published: Jul 1, 2019
DOI: 10.4018/IJSITA.2019070103
Volume 10
Evangelos Katsamakas, Aditya Saharia
Digital innovation is becoming a strategic priority for business and IT leaders in many companies. This article explores digital innovation at Six Flags Entertainment Corporation, the world's... Show More
Download Sample (PDF): Article
Cite Article

MLA

Katsamakas, Evangelos, and Aditya Saharia. "Digital Innovation to Transform the Customer Experience." IJSITA vol.10, no.3 2019: pp.38-52. http://doi.org/10.4018/IJSITA.2019070103

APA

Katsamakas, E. & Saharia, A. (2019). Digital Innovation to Transform the Customer Experience. International Journal of Strategic Information Technology and Applications (IJSITA), 10(3), 38-52. http://doi.org/10.4018/IJSITA.2019070103

Chicago

Katsamakas, Evangelos, and Aditya Saharia. "Digital Innovation to Transform the Customer Experience," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.3: 38-52. http://doi.org/10.4018/IJSITA.2019070103

Export Reference

Mendeley
Volume 10
Guest Editorial Preface
Nassira Ghoualmi-Zine
Published: Oct 1, 2019
DOI: 10.4018/IJSITA.2019100101
Volume 10
Abdallah Soualmi, Adel Alti, Lamri Laouamer
Personal health information is considered a target for illegal users that attempt to read, delete, and/or steal data. Therefore, watermarking techniques offer new ways to protect sensitive data... Show More
Download Sample (PDF): Article
Cite Article

MLA

Soualmi, Abdallah, et al. "A Fast and Effective Watermarking Method for Medical Data security." IJSITA vol.10, no.4 2019: pp.1-15. http://doi.org/10.4018/IJSITA.2019100101

APA

Soualmi, A., Alti, A., & Laouamer, L. (2019). A Fast and Effective Watermarking Method for Medical Data security. International Journal of Strategic Information Technology and Applications (IJSITA), 10(4), 1-15. http://doi.org/10.4018/IJSITA.2019100101

Chicago

Soualmi, Abdallah, Adel Alti, and Lamri Laouamer. "A Fast and Effective Watermarking Method for Medical Data security," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.4: 1-15. http://doi.org/10.4018/IJSITA.2019100101

Export Reference

Mendeley
Published: Oct 1, 2019
DOI: 10.4018/IJSITA.2019100102
Volume 10
Sarra Hammoudi, Saad Harous, Zibouda Aliouat
Sensors in Internet of Things generate a huge amount of data. The massive volume of the captured data is stored on cloud servers. Over time, the unbalanced load servers prevent better resource... Show More
Download Sample (PDF): Article
Cite Article

MLA

Hammoudi, Sarra, et al. "A Robust IOT-Cloud IaaS for Data Availability within Minimum Latency." IJSITA vol.10, no.4 2019: pp.16-32. http://doi.org/10.4018/IJSITA.2019100102

APA

Hammoudi, S., Harous, S., & Aliouat, Z. (2019). A Robust IOT-Cloud IaaS for Data Availability within Minimum Latency. International Journal of Strategic Information Technology and Applications (IJSITA), 10(4), 16-32. http://doi.org/10.4018/IJSITA.2019100102

Chicago

Hammoudi, Sarra, Saad Harous, and Zibouda Aliouat. "A Robust IOT-Cloud IaaS for Data Availability within Minimum Latency," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.4: 16-32. http://doi.org/10.4018/IJSITA.2019100102

Export Reference

Mendeley
Published: Oct 1, 2019
DOI: 10.4018/IJSITA.2019100103
Volume 10
Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Abdelhak Mourad Gueroui
The internet of vehicles (IoV) is getting a considerable amount of attention from different research parties. IoV aims at enhancing the driving experience with its wide range of applications varying... Show More
Download Sample (PDF): Article
Cite Article

MLA

Babaghayou, Messaoud, et al. "Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles." IJSITA vol.10, no.4 2019: pp.33-54. http://doi.org/10.4018/IJSITA.2019100103

APA

Babaghayou, M., Labraoui, N., Abba Ari, A. A., & Gueroui, A. M. (2019). Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles. International Journal of Strategic Information Technology and Applications (IJSITA), 10(4), 33-54. http://doi.org/10.4018/IJSITA.2019100103

Chicago

Babaghayou, Messaoud, et al. "Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.4: 33-54. http://doi.org/10.4018/IJSITA.2019100103

Export Reference

Mendeley
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100