Subjects -> COMPUTER SCIENCE (Total: 2313 journals)
    - ANIMATION AND SIMULATION (33 journals)
    - ARTIFICIAL INTELLIGENCE (133 journals)
    - AUTOMATION AND ROBOTICS (116 journals)
    - CLOUD COMPUTING AND NETWORKS (75 journals)
    - COMPUTER ARCHITECTURE (11 journals)
    - COMPUTER ENGINEERING (12 journals)
    - COMPUTER GAMES (23 journals)
    - COMPUTER PROGRAMMING (25 journals)
    - COMPUTER SCIENCE (1305 journals)
    - COMPUTER SECURITY (59 journals)
    - DATA BASE MANAGEMENT (21 journals)
    - DATA MINING (50 journals)
    - E-BUSINESS (21 journals)
    - E-LEARNING (30 journals)
    - ELECTRONIC DATA PROCESSING (23 journals)
    - IMAGE AND VIDEO PROCESSING (42 journals)
    - INFORMATION SYSTEMS (109 journals)
    - INTERNET (111 journals)
    - SOCIAL WEB (61 journals)
    - SOFTWARE (43 journals)
    - THEORY OF COMPUTING (10 journals)

SOCIAL WEB (61 journals)

Showing 1 - 58 of 58 Journals sorted alphabetically
ACM Transactions on Social Computing     Hybrid Journal  
ACM Transactions on the Web (TWEB)     Hybrid Journal   (Followers: 3)
American Journal of Information Systems     Open Access   (Followers: 4)
Asiascape : Digital Asia     Hybrid Journal   (Followers: 1)
CCF Transactions on Networking     Hybrid Journal  
Communications in Mobile Computing     Open Access   (Followers: 14)
Computational Social Networks     Open Access   (Followers: 4)
Cyberpolitik Journal     Open Access  
Cyberpsychology, Behavior, and Social Networking     Hybrid Journal   (Followers: 16)
Data Science     Open Access   (Followers: 6)
Digital Library Perspectives     Hybrid Journal   (Followers: 40)
Discover Internet of Things     Open Access   (Followers: 2)
Informação & Informação     Open Access   (Followers: 2)
Information Technology and Libraries     Open Access   (Followers: 312)
Infrastructure Complexity     Open Access   (Followers: 5)
International Journal of Art, Culture and Design Technologies     Full-text available via subscription   (Followers: 10)
International Journal of Bullying Prevention     Hybrid Journal   (Followers: 1)
International Journal of Digital Humanities     Hybrid Journal   (Followers: 3)
International Journal of e-Collaboration     Full-text available via subscription  
International Journal of E-Entrepreneurship and Innovation     Full-text available via subscription   (Followers: 6)
International Journal of Entertainment Technology and Management     Hybrid Journal   (Followers: 1)
International Journal of Information Privacy, Security and Integrity     Hybrid Journal   (Followers: 25)
International Journal of Information Technology and Web Engineering     Hybrid Journal   (Followers: 2)
International Journal of Interactive Communication Systems and Technologies     Full-text available via subscription   (Followers: 2)
International Journal of Interactive Mobile Technologies     Open Access   (Followers: 8)
International Journal of Internet and Distributed Systems     Open Access   (Followers: 2)
International Journal of Knowledge Society Research     Full-text available via subscription  
International Journal of Networking and Virtual Organisations     Hybrid Journal   (Followers: 11)
International Journal of Social and Humanistic Computing     Hybrid Journal  
International Journal of Social Computing and Cyber-Physical Systems     Hybrid Journal  
International Journal of Social Media and Interactive Learning Environments     Hybrid Journal   (Followers: 14)
International Journal of Social Network Mining     Hybrid Journal   (Followers: 3)
International Journal of Virtual Communities and Social Networking     Full-text available via subscription   (Followers: 1)
International Journal of Web Based Communities     Hybrid Journal  
International Journal of Web-Based Learning and Teaching Technologies     Hybrid Journal   (Followers: 20)
International Journal on Semantic Web and Information Systems     Hybrid Journal   (Followers: 4)
Internet Technology Letters     Hybrid Journal  
JLIS.it     Open Access   (Followers: 7)
Journal of Cyber Policy     Hybrid Journal   (Followers: 1)
Journal of Digital & Social Media Marketing     Full-text available via subscription   (Followers: 18)
Journal of Social Structure     Open Access   (Followers: 1)
Medicine 2.0     Open Access   (Followers: 2)
Observatorio (OBS*)     Open Access  
Online Social Networks and Media     Hybrid Journal   (Followers: 9)
Policy & Internet     Hybrid Journal   (Followers: 11)
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies     Hybrid Journal  
Redes. Revista Hispana para el Análisis de Redes Sociales     Open Access  
RESET     Open Access  
Scientific Phone Apps and Mobile Devices     Open Access  
Social Media + Society     Open Access   (Followers: 24)
Social Network Analysis and Mining     Hybrid Journal   (Followers: 4)
Social Networking     Open Access   (Followers: 3)
Social Networks     Hybrid Journal   (Followers: 20)
Social Science Computer Review     Hybrid Journal   (Followers: 13)
Synthesis Lectures on the Semantic Web: Theory and Technology     Full-text available via subscription  
Teknokultura. Revista de Cultura Digital y Movimientos Sociales     Open Access  
Terminal     Open Access  
Texto Digital     Open Access  
Similar Journals
Journal Cover
International Journal of Information Privacy, Security and Integrity
Number of Followers: 25  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 1741-8496 - ISSN (Online) 1741-850X
Published by Inderscience Publishers Homepage  [451 journals]
  • Conflict resolution in management policies: case study in cloud
           computing and internet of things

    • Free pre-print version: Loading...

      Authors: Nughthoh Arfawi Kurdhi, Yuliana, Bambang Suratno
      Pages: 93 - 110
      Abstract: Policy conflicts detection and resolution in distributed management systems are very crucial issues which strongly influence the efficiency of management. In this paper, first the management policies are discussed in the context of their complexity in the management structures. Next, the policy conflicts that may arise in a management hierarchy are examined along with the various proposed resolutions techniques in the literature. Then, the significance of propagation policies down through a management hierarchy is examined. A conflict resolution algorithm for propagation policies is proposed based on similar well-known inheritance mechanisms used in the object-oriented programming. Next, fruitful case examples in the cloud computing services and internet of things (IoT) management depict the high value of the proposed algorithm in distributed systems and network policy-based management. Finally, open issues and future work are discussed.
      Keywords: distributed system management; policy hierarchies; policy conflict detection; policy conflict resolution; object-oriented multiple inheritance; cloud computing; internet of things; IoT
      Citation: International Journal of Information Privacy, Security and Integrity, Vol. 5, No. 2 (2021) pp. 93 - 110
      PubDate: 2022-01-17T23:20:50-05:00
      DOI: 10.1504/IJIPSI.2021.120352
      Issue No: Vol. 5, No. 2 (2022)
       
  • A survey on user privacy preserving blockchain for health insurance using
           Ethereum smart contract

    • Free pre-print version: Loading...

      Authors: Geethu Mary George, L.S. Jayashree
      Pages: 111 - 137
      Abstract: Blockchain, the foundation of Ethereum, has received greater attention on recent years as a decentralised and distributed public ledger technology that offers different properties like security, privacy, scalability and immutability during online data transactions, reduces cost of transactions, and enables verification and efficient exchange of personnel information across many computers without any trusted parties. The goal of this survey is to propel some methods in preserving user privacy during data transactions using Ethereum smart contract. We analysed the privacy challenges in blockchain and figured out the existing cryptographic mechanisms in preserving the transaction privacy. We also addressed some technique for simplifying claim settlement process in healthcare insurance. By using Ethereum blockchain via smart contract, current challenges in insurance such as being time-consuming, can be avoided thereby preventing insurance frauds and thus improving transparency to all members in-network. It also helps to avoid paper-based contracts, which are prone to errors, and removes the intermediaries. Furthermore, there is still a need to examine and consider future research in order to overcome privacy attacks when using blockchain.
      Keywords: blockchain; Ethereum; smart contract; distributed ledger; privacy; transparency
      Citation: International Journal of Information Privacy, Security and Integrity, Vol. 5, No. 2 (2021) pp. 111 - 137
      PubDate: 2022-01-17T23:20:50-05:00
      DOI: 10.1504/IJIPSI.2021.120354
      Issue No: Vol. 5, No. 2 (2022)
       
  • The willingness to provide personal information - a potential relationship
           with the usage of privacy enhancing self-sovereign identity technology

    • Free pre-print version: Loading...

      Authors: Matthew Kenneth Hendricks, Benedikt Hirschfelder, Pragasen Pillay
      Pages: 138 - 153
      Abstract: Self-sovereign identity technology, currently in its early stages, may allow consumers to have full control of their consumer data via blockchain. This theoretical paper proposes a conceptual model intended to illuminate the factors that influence a consumer to disclose personal information over the internet. More importantly, this paper proposes a model to understand a proposed connection between this willingness to disclose personal information, and the use of self-sovereign identity technology. This model was tested empirically using an online survey of 347 adult South Africans and utilised partial least squares structural equation modelling. A novel connection between the intention to use self-sovereign identity technology and the willingness to provide personal information was confirmed. Additionally, <i>past experience with a company</i>, <i>reputation of a company</i>, <i>type of personal information requested</i>, <i>benefits</i>, <i>consumer characteristics</i> and <i>control</i> were shown to be significant influencers of the willingness to disclose personal information.
      Keywords: blockchain technology; self-sovereign identity; SSI; personal information; privacy
      Citation: International Journal of Information Privacy, Security and Integrity, Vol. 5, No. 2 (2021) pp. 138 - 153
      PubDate: 2022-01-17T23:20:50-05:00
      DOI: 10.1504/IJIPSI.2021.120356
      Issue No: Vol. 5, No. 2 (2022)
       
  • Novel attribute selection technique for an efficient intrusion detection
           system

    • Free pre-print version: Loading...

      Authors: N.D. Patel, B.M. Mehtre, Rajeev Wankar
      Pages: 154 - 172
      Abstract: An intrusion detection system (IDS) is one of the popular countermeasures against network attacks or anomalies in the network. IDS requires data dimension reduction methods such as data filtering, attribute selection, and data clustering to improve the system's performance. Identifying the most significant attributes will produce the computational time complexity drastically. This paper proposes novel attribute selection methods for data reduction. The NSL-KDD dataset is selected for experimental evaluation. The attribute value ratios (AVRs) is calculated using average values with numeric attributes and frequency with binary attributes to select attributes. The proposed attributes selection model is also compared with the traditional attribute section method that is correlation-based feature selection (CFS), information gain (IG) and gain ratio (GR). Further, the accuracy (ACC), detection rate (DR) and false alarm rate (FAR) are computed using the proposed attributes selection model with J48Consolidated classifier and achieve better results than other state-of-the-art methodologies.
      Keywords: network intrusion detection; NID; intrusion detection system; IDS; NSL-KDD dataset; J48Consolidated tree construction; attribute selection
      Citation: International Journal of Information Privacy, Security and Integrity, Vol. 5, No. 2 (2021) pp. 154 - 172
      PubDate: 2022-01-17T23:20:50-05:00
      DOI: 10.1504/IJIPSI.2021.120358
      Issue No: Vol. 5, No. 2 (2022)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.238.125.76
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-