Skip to Content

Future Internet, Volume 8, Issue 3

2016 September - 19 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (19)

  • Feature Paper
  • Article
  • Open Access
8 Citations
9,418 Views
9 Pages

9 September 2016

In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its...

  • Article
  • Open Access
51 Citations
19,455 Views
16 Pages

Main Issues in Big Data Security

  • Julio Moreno,
  • Manuel A. Serrano and
  • Eduardo Fernández-Medina

1 September 2016

Data is currently one of the most important assets for companies in every field. The continuous growth in the importance and volume of data has created a new problem: it cannot be handled by traditional analysis techniques. This problem was, therefor...

  • Article
  • Open Access
2 Citations
7,115 Views
14 Pages

25 August 2016

Mobile devices can be exploited for enabling people to interact with Internet of Things (IoT) services. The MicroApp Generator [1] is a service-composition tool for supporting the generation of mobile applications directly on the mobile device. The u...

  • Article
  • Open Access
47 Citations
9,583 Views
16 Pages

10 August 2016

Social and mobile computing open up new possibilities for integrating citizens’ information, knowledge, and social capital in emergency management (EM). This participation can improve the capacity of local agencies to respond to unexpected events by...

  • Article
  • Open Access
6 Citations
7,611 Views
16 Pages

We developed a mechanism for seamlessly providing weather data and long-term historical climate data from a gridded data source through an international standard web API, which was the Sensor Observation Service (SOS) defined by the Open Geospatial C...

  • Article
  • Open Access
14 Citations
9,309 Views
22 Pages

Cost estimation is one of the most critical tasks for building construction project management. The existing building construction cost estimation methods of many countries, including China, require information from several sources, including materia...

  • Article
  • Open Access
2 Citations
6,066 Views
14 Pages

The problem of optimal multicast routing in Wireless Mess Networks (WMNs) with Quality-of-Service (QoS) provisioning, which is Non-Deterministic Polynomial (NP)-complete, is studied in this paper. The existing algorithms are not very efficient or eff...

  • Feature Paper
  • Review
  • Open Access
186 Citations
52,861 Views
14 Pages

Instagram and WhatsApp in Health and Healthcare: An Overview

  • Maged N. Kamel Boulos,
  • Dean M. Giustini and
  • Steve Wheeler

Instagram and WhatsApp are two social media and networking services introduced in 2010. They are currently subsidiaries of Facebook, Inc., California, USA. Using evidence from the published literature and case reports indexed in PubMed and other sour...

  • Feature Paper
  • Review
  • Open Access
30 Citations
15,132 Views
29 Pages

Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tac...

  • Article
  • Open Access
9 Citations
8,817 Views
24 Pages

Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems

  • Antonio Santos-Olmo,
  • Luis Enrique Sánchez,
  • David G. Rosado,
  • Eduardo Fernández-Medina and
  • Mario Piattini

Society is increasingly dependent on Information Security Management Systems (ISMS), and having these kind of systems has become vital for the development of Small and Medium-Sized Enterprises (SMEs). However, these companies require ISMS that have b...

  • Article
  • Open Access
2 Citations
8,717 Views
10 Pages

Big data makes cloud computing more and more popular in various fields. Video resources are very useful and important to education, security monitoring, and so on. However, issues of their huge volumes, complex data types, inefficient processing perf...

  • Article
  • Open Access
6 Citations
9,540 Views
22 Pages

Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

  • Angélica Flórez,
  • Lenin Serrano,
  • Urbano Gómez,
  • Luis Suárez,
  • Alejandro Villarraga and
  • Hugo Rodríguez

This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC). This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between the...

  • Article
  • Open Access
18 Citations
15,524 Views
16 Pages

In the recent years the progress in technology and the increasing availability of fast connections have produced a migration of functionalities in Information Technologies services, from static servers to distributed technologies. This article descri...

  • Article
  • Open Access
11 Citations
12,007 Views
23 Pages

What is the boundary between a vigorous argument and a breakdown of relations? What drives a group of individuals across it? Taking Wikipedia as a test case, we use a hidden Markov model to approximate the computational structure and social grammar o...

  • Article
  • Open Access
18 Citations
11,063 Views
27 Pages

The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets

  • Antonio Santos-Olmo,
  • Luis Enrique Sánchez,
  • Ismael Caballero,
  • Sara Camacho and
  • Eduardo Fernandez-Medina

The information society is increasingly more dependent on Information Security Management Systems (ISMSs), and the availability of these kinds of systems is now vital for the development of Small and Medium-Sized Enterprises (SMEs). However, these co...

  • Article
  • Open Access
51 Citations
10,213 Views
8 Pages

The Windows Operating System (OS) is the most popular desktop OS in the world, as it has the majority market share of both servers and personal computing necessities. However, as its default signature-based security measures are ineffectual for detec...

  • Article
  • Open Access
11 Citations
6,847 Views
26 Pages

Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such as single or multi-keyword queries, but cannot handle substring search queries over encrypted data that also involve identifying the position of the...

  • Article
  • Open Access
1 Citations
5,186 Views
12 Pages

Energy efficiency is of major concern in wireless sensor networks, especially in difficult node deployment environments. Clustering is an effective method to save energy consumption and prolong the network lifetime. There are two kinds of clustering...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903