Skip to Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 4, Issue 2

2012 June - 16 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (16)

  • Article
  • Open Access
80 Citations
24,292 Views
11 Pages

Smart Homes for Older People: Positive Aging in a Digital World

  • Quynh Lê,
  • Hoang Boi Nguyen and
  • Tony Barnett

19 June 2012

Smart homes are homes with technologically advanced systems to enable domestic task automation, easier communication, and higher security. As an enabler of health and well-being enhancement, smart homes have been geared to accommodate people with spe...

  • Article
  • Open Access
8 Citations
11,844 Views
15 Pages

15 June 2012

The main objective of this paper is to focus on how an integrated system based on Information Communication Technology (ICT) and face-to-face communication can increase participation in order to have a positive effect on quality of life, plans and de...

  • Article
  • Open Access
26 Citations
19,085 Views
17 Pages

6 June 2012

Routing services for outdoor areas are omnipresent and also three-dimensional (3D) visualization is quite common within this area. Recent research efforts are now trying to adapt well known outdoor routing services to complex indoor environments. How...

  • Article
  • Open Access
11 Citations
11,715 Views
12 Pages

5 June 2012

Volunteered Geographic Information (VGI) tools appear to enhance the possibilities offered by a collaborative approach to planning. The present paper analyzes both the results of experiences of the author and of those available in the literature, hig...

  • Article
  • Open Access
12 Citations
12,569 Views
12 Pages

Crowd Sourcing for Conservation: Web 2.0 a Powerful Tool for Biologists

  • David A. Newell,
  • Margaret M. Pembroke and
  • William E. Boyd

24 May 2012

The advent and adoption of Web 2.0 technologies offers a powerful approach to enhancing the capture of information in natural resource ecology, notably community knowledge of species distributions. Such information has previously been collected using...

  • Editorial
  • Open Access
2 Citations
10,070 Views
6 Pages

23 May 2012

The social transformations brought about by the mobile internet are extensive. In discussing the broad range of these transformations—positioned as a shift from personal computing to pervasive computing—this editorial elaborates on the key contributi...

  • Article
  • Open Access
25 Citations
11,605 Views
17 Pages

Assessing the Adoption of e-Government Services by Teachers in Greece

  • Kostas Zafiropoulos,
  • Ioannis Karavasilis and
  • Vasiliki Vrana

21 May 2012

Technological developments and governments’ understanding of what citizens need usually determine the design of public online services. For successful implementation of e-Government services, governments have to place the user in the center of future...

  • Article
  • Open Access
5 Citations
10,982 Views
14 Pages

18 May 2012

Little is known about the views of young patients themselves on interactive Web portal services provided by pediatric practitioners. We aimed to explore their perceptions of a real-world diabetes portal that offers facts and contact with peers and pr...

  • Article
  • Open Access
3 Citations
15,848 Views
26 Pages

Distributed Performance Measurement and Usability Assessment of the Tor Anonymization Network

  • Sebastian Müller,
  • Franziska Brecht,
  • Benjamin Fabian,
  • Steffen Kunz and
  • Dominik Kunze

15 May 2012

While the Internet increasingly permeates everyday life of individuals around the world, it becomes crucial to prevent unauthorized collection and abuse of personalized information. Internet anonymization software such as Tor is an important instrume...

  • Article
  • Open Access
36 Citations
19,630 Views
19 Pages

Security Analysis in the Migration to Cloud Environments

  • David G. Rosado,
  • Rafael Gómez,
  • Daniel Mellado and
  • Eduardo Fernández-Medina

8 May 2012

Cloud computing is a new paradigm that combines several computing concepts and technologies of the Internet creating a platform for more agile and cost-effective business applications and IT infrastructure. The adoption of Cloud computing has been in...

  • Article
  • Open Access
10 Citations
15,545 Views
18 Pages

Collaborative Open Source Geospatial Tools and Maps Supporting the Response Planning to Disastrous Earthquake Events

  • Maurizio Pollino,
  • Grazia Fattoruso,
  • Luigi La Porta,
  • Antonio Bruno Della Rocca and
  • Valentina James

7 May 2012

The latest improvements in geo-informatics offer new opportunities in a wide range of territorial and environmental applications. In this general framework, a relevant issue is represented by earthquake early warning and emergency management. This re...

  • Article
  • Open Access
7 Citations
14,495 Views
21 Pages

A Survey of Patterns for Web Services Security and Reliability Standards

  • Eduardo B. Fernandez,
  • Ola Ajaj,
  • Ingrid Buckley,
  • Nelly Delessy-Gassant,
  • Keiko Hashizume and
  • Maria M. Larrondo-Petrie

20 April 2012

An important aspect for the acceptance of Service-Oriented Architectures is having convenient ways to help designers build secure applications. Numerous standards define ways to apply security in web services. However, these standards are rather comp...

  • Article
  • Open Access
3 Citations
11,537 Views
17 Pages

Bloggers’ Community Characteristics and Influence within Greek Political Blogosphere

  • Kostas Zafiropoulos,
  • Vasiliki Vrana and
  • Dimitrios Vagianos

19 April 2012

This paper investigates the properties of central or core political blogs. They can be located as clusters of blogs whose members have many incoming links. Other blogs form clouds around them in the sense that they link the core blogs. A case study r...

  • Article
  • Open Access
3 Citations
10,903 Views
17 Pages

Principles of Eliminating Access Control Lists within a Domain

  • John N. Davies,
  • Paul Comerford and
  • Vic Grout

19 April 2012

The infrastructure of large networks is broken down into areas that have a common security policy called a domain. Security within a domain is commonly implemented at all nodes. However this can have a negative effect on performance since it introduc...

  • Article
  • Open Access
1 Citations
15,349 Views
24 Pages

11 April 2012

Semantic Web Services (SWS) are Web Service (WS) descriptions augmented with semantic information. SWS enable intelligent reasoning and automation in areas such as service discovery, composition, mediation, ranking and invocation. This paper applies...

  • Article
  • Open Access
3 Citations
12,066 Views
10 Pages

2 April 2012

This article explores the ways in which collaboration between professionals using videoconferencing affects the e-health delivered to patients. In Norway, general practitioners (GPs) and specialists routinely hold videoconferences. Observations of 42...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903