Volume 2, Issue 1, February 2017
Wireless Network Security Threats, Vulnerabilities and Their Defences
Alex Roney Mathew, Aayad Al Hajj
Pages: 1-4     Published Online: Jan. 3, 2017
DOI: 10.11648/j.ajomis.20170201.11
Abstract | Full-Text PDF (170KB) | Full-Text Html
View 3625                 Downloads 75
Online Transaction Security Risk Management for E-commerce Web Applications
Kuo-Sui Lin
Pages: 5-14     Published Online: Jan. 3, 2017
DOI: 10.11648/j.ajomis.20170201.12
Abstract | Full-Text PDF (480KB) | Full-Text Html
View 4065                 Downloads 98
Business Processes Modelling of the Karaganda Crisis Center Activity
Olga Shikulskaya, Timur Esmagambetov
Pages: 15-20     Published Online: Jan. 5, 2017
DOI: 10.11648/j.ajomis.20170201.13
Abstract | Full-Text PDF (559KB) | Full-Text Html
View 1701                 Downloads 43
Health Websites Evaluation in Saudi Arabia: A Case Study
Sahar A. El_Rahman
Pages: 21-31     Published Online: Jan. 20, 2017
DOI: 10.11648/j.ajomis.20170201.14
Abstract | Full-Text PDF (977KB) | Full-Text Html
View 3437                 Downloads 25
Browse journals by subject