- Evangelos Katsamakas, Aditya N. Saharia. Digital Innovation to Transform the Customer Experience. IJSITA, 10(3):38-52, 2019.
- Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui. Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles. IJSITA, 10(4):33-54, 2019.
- Julia Puaschunder. Towards a Utility Theory of Privacy and Information Sharing: The Introduction of Hyper-Hyperbolic Discounting. IJSITA, 10(1):1-22, 2019.
- Yousef Alabbasi, Kamaljeet Sandhu. Blockchain Innovation and Information Technology at GCC: Literature Review and Methodology. IJSITA, 10(3):22-37, 2019.
- Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari. Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users. IJSITA, 10(2):44-58, 2019.
- Marouane Balmakhtar, Scott E. Mensch. Big Data Analytics Adoption Factors in Improving Information Systems Security. IJSITA, 10(3):1-21, 2019.
- Mourad Zerhouni, Sidi Mohamed Benslimane. Large-Scale Ontology Alignment- An Extraction Based Method to Support Information System Interoperability. IJSITA, 10(2):59-84, 2019.
- Abdallah Soualmi, Adel Alti, Lamri Laouamer. A Fast and Effective Watermarking Method for Medical Data security. IJSITA, 10(4):1-15, 2019.
- Abdenour Lazeb, Riad Mokadem, Ghalem Belalem. Towards a New Data Replication Management in Cloud Systems. IJSITA, 10(2):1-20, 2019.
- Wafa Nebili, Brahim Farou, Hamid Seridi. Using Resources Competition and Memory Cell Development to Select the Best GMM for Background Subtraction. IJSITA, 10(2):21-43, 2019.