You are previewing Journal of Information Technology Research (JITR) Volume 9, Issue 2.
O'Reilly logo
Journal of Information Technology Research (JITR) Volume 9, Issue 2

Book Description

The Journal of Information Technology Research (JITR) presents comprehensive interdisciplinary and refereed research on the most emerging and breakthrough areas of information science and technology. The journal seeks to improve and expand existing research in underrepresented areas of information science and technology in all areas of global implication. Through the current trends in the globalization of technology in the knowledge society, JITR will serve to provide the highest in quality concepts, methodologies, trends and case studies for all audiences. The journal focuses on major breakthroughs within the technological arena, with particular concentration on the accelerating principles, concepts and applications of biocomputing, medical informatics, anthropocentric computing, high-performance computing, technological diffusion, predictive analysis tools, genetic algorithms, and cultural informatics. This scholarly resource endeavors to provide international audiences with the highest quality research manuscripts and accounts of the constant evolution of information science and technology in whole. Researchers, academicians, practitioners and students will find this journal as a critical source of reference for all advanced technological applications and developments.

This issue contains the following articles:

  • Towards Modelling the Impact of Security Policy on Compliance
  • Artificial Haemostasis System for Modern Information Retrieval with 3D Result-Mining
  • New Bio Inspired Techniques in the Filtering of Spam: Synthesis and Comparative Study
  • User Opinion and Differentiated Attribute based Ranking in Federated Cloud
  • A Case Study on Computer Supported Collaborative Learning in Spanish Schools

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. Issue on Mobile Information Technologies
    1. INTRODUCTION
    2. CONTENTS OF THE ISSUE
    3. REFERENCES
  5. Towards Modelling the Impact of Security Policy on Compliance
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. METHODOLOGY
    5. RESULTS
    6. DISCUSSION
    7. CONCLUSION
    8. REFERENCES
  6. Artificial Haemostasis System for Modern Information Retrieval with 3D Result-Mining
    1. ABSTRACT
    2. 1. INTRODUCTION AND PROBLEMATIC
    3. 2. REVIEW OF LITERATURE
    4. 3. RESEARCH METHODOLOGY
    5. 4. EXPERIMENT
    6. 5. RESULTS
    7. 6. INFLUENCE OF WEIGHTING METHOD
    8. 7. VARIATION OF THRESHOLD
    9. 8. VARIATION OF FILTER COEFFICIENT
    10. 9. INFLUENCE OF DIMENSION REDUCTION
    11. 10. COST SENSITIVE EVALUATION
    12. 11. COMPARATIVE STUDY
    13. REFERENCES
  7. New Bio Inspired Techniques in the Filtering of Spam:
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. REVIEW OF LITERATURE
    4. 3. PROCESS OF BIO-INSPIRED SPAM FILTERING (BSF) TECHNIQUES
    5. 4. RESULT AND ANALYSIS
    6. 5. ANALYSIS
    7. 6. IDEAL CONFIGURATION
    8. 7. COMPARATIVE STUDY
    9. 8. INTERPRETATION
    10. 9. CONCLUSION
    11. REFERENCES
  8. User Opinion and Differentiated Attribute based Ranking in Federated Cloud
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORK
    4. 3. PROPOSED FEDERATED CLOUD ARCHITECTURE
    5. 4. RANKING
    6. 5. EXPERIMENTAL RESULTS AND DISCUSSION
    7. 6. CONCLUSION
    8. REFERENCES
  9. A Case Study on Computer Supported Collaborative Learning in Spanish Schools
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. THEORETICAL FOUNDATIONS
    4. 3. RESEARCH DESIGN AND METHODOLOGY
    5. 4. SELECTION OF CASE STUDIES: COMPUTER-SUPPORTED COLLABORATIVE LEARNING PROJECTS
    6. 5. METHODOLOGICAL PROCEDURE FOR THE FIELD WORK
    7. 6. DATA COLLECTION TECHNIQUES
    8. 7. PRESENTATION AND DISCUSSION OF RESULTS
    9. 8. CONCLUSION
    10. REFERENCES
  10. Call For Articles