Volume 2, Issue 1, February 2017
Wireless Network Security Threats, Vulnerabilities and Their Defences
Alex Roney Mathew, Aayad Al Hajj
Pages: 1-4     Published Online: Jan. 3, 2017
DOI: 10.11648/j.ajomis.20170201.11
Abstract | Full-Text PDF (170KB) | Full-Text Html
View 5671                 Downloads 203
Online Transaction Security Risk Management for E-commerce Web Applications
Kuo-Sui Lin
Pages: 5-14     Published Online: Jan. 3, 2017
DOI: 10.11648/j.ajomis.20170201.12
Abstract | Full-Text PDF (480KB) | Full-Text Html
View 6599                 Downloads 213
Business Processes Modelling of the Karaganda Crisis Center Activity
Olga Shikulskaya, Timur Esmagambetov
Pages: 15-20     Published Online: Jan. 5, 2017
DOI: 10.11648/j.ajomis.20170201.13
Abstract | Full-Text PDF (559KB) | Full-Text Html
View 2979                 Downloads 105
Health Websites Evaluation in Saudi Arabia: A Case Study
Sahar A. El_Rahman
Pages: 21-31     Published Online: Jan. 20, 2017
DOI: 10.11648/j.ajomis.20170201.14
Abstract | Full-Text PDF (977KB) | Full-Text Html
View 6395                 Downloads 85
Browse journals by subject