Your browser version is outdated. We recommend that you update your browser to the latest version.

Special Issue on Internet Computing and Its Applications

 

PREFACE


This special issue presents leading-edge knowledge and advances in Internet Computing and associated domains. Its objectives are to facilitate and support research related to Internet computing and the applications. The issue brings revised and significantly extended versions of ten papers presented and selected at The 5th International Conference on Internet (ICONI 2013). ICONI 2013 was the fifth International Conference having targeted objectives to congregate researchers and practitioners from academia and industry to advance the state-of-the-art of soft computing research and practice. ICONI 2013 was hosted in Pattaya, apopular beach resort on the Gulf of Thailand just 150 km southeast of Bangkok on December 12-16, 2013.

The work by Yong Ho Shin et al. entitled “Subspace Clustering and Temporal Mining for Wind Power Forecasting” has proposed subspace clustering method for generating clusters of similar wind power patterns of data to be analyzed and the calendar-based temporal associative classification rule mining for reflecting temporal information of wind power on the classification/prediction model.

The article by Seung Ryul Jeong et al. “Text Opinion Mining to Analyze News for Stock Market Prediction” has introduced a method of mining, text opinions to analyze Korean language news in order to predict rises and falls on KOSPI (Korea Composite Stock Price Index) by carrying out the NLP (Natural Language Processing) of news.

In the area of Internet Banking, the article by Dong Hoon Lee et al. entitled “Prevention Schemes against Phishing Attacks on Internet Banking Systems” investigated the phishing problem in the online banking system by suggesting two server authentication schemes based on SSL/TLS to protect Internet Banking customers.

Hyung-Woo Lee et al. proposed an efficient preprocessing method for Big-data mobile web log information that can also be applied to detect attacks on mobile web servers for the analytics of Big mobile Web Log Data in their paper entitled “Big Data Preprocessing Mechanism for Analytics of Mobile Web Log”.

The article by Ismassabah Ismail et al. entitled “Studies on the Extensive Use of Multimedia Elements and User Preferences for Islamic Knowledge Dissemination” has explored the users’ retention and understanding about the Islamic contents, whether on website or mobile applications by two studies using content analysis and survey method.

Hazinah Kutty Mammy et al. has highlighted the problem, message confidentiality of the Instant Messaging and tried to verify the effectiveness of applying One Time Pad (OTP) encryption in the Instant Messaging System in their paper entitled “Study on the Effectiveness of Securing Instant Messaging Using One Time Pad”.

The paper entitled “Secure Searchable Based Asymmetric Encryption in Cloud Computing” by Majid Bakhtiari et al. has focused on the area of cloud computing and has proposed an improved secure, searchable encryption algorithm based on Indistinguishability under Adaptive Chosen Ciphertext Attack(IND-CCA2).

The next article in the area of Agile software development is the one of Norsaremah Salleh et al. that investigates the adoption of Agile methods in Indonesia by including perceptions and level of awareness in using these methods. The paper provides the findings, that can be used as evidence about Agile adoption and practice in Indonesia and as roadmap for future Agile-focused research studies.

The paper entitled “An Agile Software Project Management Manifesto-A Reference Discipline Framework for Agile Development” by Ray Morien has proffered the Agile Project Management Manifesto to describe the new paradigm of Software Development and Project Management by bringing together concepts and practices of ‘Agile Development’, ‘lean product development’, ‘chaordic systems’, ‘leadership studies’ and concepts of the learning organizations with the model of Concurrent Perception.

Laleh Boroumand et al. in their paper entitled “Virtualization Technique for Port Knocking in Mobile Cloud Computing” proposed virtual port knocking authentication method by employing virtualization concept in Mobile Cloud Computing (MCC) to enhance the performance in terms of security.


Guest Editors:
Seung Ryul Jeong
Vice President for International Affairs and Public Relations
Professor, School of Management Information Systems
Professor, Graduate School of Business IT
Kookmin University, Seoul, Korea
E-mail: srjeong@kookmin.ac.kr


Bong Gyou Lee
Professor, Graduate School of Information,
Yonsei University, Seoul, Korea
E-mail: bglee@yonsei.ac.kr