Journal: IJISP

Volume 6, Issue 3

1 -- 37Allan Rwabutaza, Ming Yang, Nikolaos G. Bourbakis. A Comparative Survey on Cryptology-Based Methodologies
38 -- 55Zakarya Alzamil. Information Security Awareness at Saudi Arabians' Organizations: An Information Technology Employee's Perspective
56 -- 74Azam Zavvari, Ahmed Patel. Critical Evaluation of RFID Security Protocols
75 -- 87Amanda Eisenga, Travis L. Jones, Walter Rodriguez. Investing in IT Security: How to Determine the Maximum Threshold
88 -- 110Debajyoti Konar, Chandan Mazumdar. A Practical Approach of Fairness in E-Procurement