- Amir K. C, Harri Forsgren, Kaj Grahn, Timo Karvi, Göran Pulkkis. Security and Trust of Public Key Cryptography for HIP and HIP Multicast. IJDTIS, 2(3):17-35, 2011.
- A. F. Salam. Semantic Matchmaking and Decision Support System for Dependable Supplier Selection in the Extended Enterprise Supply Chain. IJDTIS, 2(1):50-80, 2011.
- Sherrie Drye Cannoy. An Interpretive Study of Critical Issues in Electronic Health Information Exchange. IJDTIS, 2(1):1-17, 2011.
- Brahim Hamid, Huaxi (Yulin) Zhang, Jacob Geisel, David Gonzalez. First Experiment on Modeling Safety LifeCycle Process in Railway Systems. IJDTIS, 2(2):17-39, 2011.
- Sandra A. Vannoy. A Structured Content Analytic Assessment of Business Services Advertisements in the Cloud-Based Web Services Marketplace. IJDTIS, 2(1):18-49, 2011.
- Utpal Bose. Analyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data. IJDTIS, 2(3):55-68, 2011.
- Afonso Araújo Neto, Marco Vieira. Selecting Secure Web Applications Using Trustworthiness Benchmarking. IJDTIS, 2(2):1-16, 2011.
- Afolayan A. Obiniyi, Ezugwu E. Absalom, Mohammed Dikko. Network Security and Firewall Technology: A Step to Safety of National IT Vision. IJDTIS, 2(2):40-60, 2011.
- Charlie C. Chen. Cloud Computing in Case-Based Pedagogy: An Information Systems Success Perspective. IJDTIS, 2(3):1-16, 2011.
- Angel R. Otero, Abdel Ejnioui, Carlos E. Otero, Gurvirender Tejay. Evaluation of Information Security Controls in Organizations by Grey Relational Analysis. IJDTIS, 2(3):36-54, 2011.