[AISWorld] Abstract Announcement for International Journal of Hyperconnectivity and the Internet of Things (IJHIoT) 1(1)

Maurice Dawson maurice.e.dawson at gmail.com
Mon Mar 20 16:21:47 EDT 2017


The contents of the latest issue of:
*International Journal of Hyperconnectivity and the Internet of Things
(IJHIoT)*
Volume 1, Issue 1, January - June 2017
Published: Semi-Annually in Print and Electronically
ISSN: 2473-4365; EISSN: 2473-4373;
Published by IGI Global Publishing, Hershey, USA
www.igi-global.com/ijhiot
<http://www.igi-global.com/journal/international-journal-hyperconnectivity-internet-things/157228>

Editor-in-Chief: Maurice Dawson (University of Missouri - St. Louis, USA)
*Note: There are no submission or acceptance fees for manuscripts submitted
to the International Journal of Hyperconnectivity and the Internet of
Things (IJHIoT). All manuscripts are accepted based on a double-blind peer
review editorial process.*

*ARTICLE 1*

Internet of Things: Privacy and Security Implications

Mohamed A Eltayeb (Colorado Technical University, Colorado Springs, CO, USA)

In the contemporary world, we are surrounded by a complex network of
interconnected sensors. These allows us to share, collate, transmit, and
store vast amounts of data. These systems are known as the Internet of
Things (IoT), and this technological offering has attracted a large amount
of interest from academics, researchers, and developers in recent years due
to its highly scalable and agile nature. However, while the IoT delivers
significant benefits, it also poses some risks. The data that is stored and
exchanged via the IoT is extremely valuable to individuals who have
malevolent intent. In more recent years, the increasing popularity of the
IoT as a means of sharing information has been associated with privacy and
security risks that have undermined users' trust in the IoT. This paper
examines what these risks are and some of the actions that can be taken to
mitigate them.

To obtain a copy of the entire article, click on the link below.
www.igi-global.com/article/internet-of-things/179894

To read a PDF sample of this article, click on the link below.
www.igi-global.com/viewtitlesample.aspx?id=179894

*ARTICLE 2*

A Security Framework for Enhancing User Experience

Van Nguyen (Department of Computer Science, Saint Leo University, Saint
Leo, FL, USA), Marwan Omar (Department of Computer Science, Saint Leo
University, Saint Leo, FL, USA), Derek Mohammed (Department of Computer
Science, Saint Leo University, Saint Leo, FL, USA)

In this paper, we present a novel framework that enhances user experience
for their daily computing activities while being protected from cyber
threats. The conceptual security framework also targets two additional
goals: enabling end-users to experiment software applications before making
a decision for a real installation, and serving as a testing environment
for both research scholars and security practitioners to analyze and
predict potentially malicious activities. The framework introduces three
modes of operations (full lockdown, partial lockdown, and administration)
and a virtual storage that provides a safe, secure, and reliable computing
environment for end-users. We also present three use cases that show the
applicability of their framework in a real-world environment.

To obtain a copy of the entire article, click on the link below.
www.igi-global.com/article/a-security-framework-for-enhancing-user-experience/179895

To read a PDF sample of this article, click on the link below.
www.igi-global.com/viewtitlesample.aspx?id=179895

*ARTICLE 3*

Protecting Data Confidentiality in the Cloud of Things

Bashar Alohali (School of Computing and Mathematical Sciences, Liverpool
John Moores University, Liverpool, UK), Vassilios G. Vassilakis (Department
of Computer Science, University of York, York, UK)

Following the rapid development of the Internet of Things (IoT) technology
worldwide, the integration of the IoT to the cloud, referred to as the
Cloud of Things (CoT), has become essential for easy access and management
of remote resources. However, security and malicious intrusions must be
seriously considered to ensure network reliability and data
confidentiality. In this paper, the authors analyze the security
implications of CoT and propose a solution for data confidentiality. They
prove that the proposed solution can effectively protect against a number
of security attacks.

To obtain a copy of the entire article, click on the link below.
www.igi-global.com/article/protecting-data-confidentiality-in-the-cloud-of-things/179896

To read a PDF sample of this article, click on the link below.
www.igi-global.com/viewtitlesample.aspx?id=179896

*ARTICLE 4*

Tails Linux Operating System: Remaining Anonymous with the Assistance of an
Incognito System in Times of High Surveillance

Maurice Dawson (University of Missouri-St. Louis, St. Louis, MO, USA), Jose
Antonio Cárdenas-Haro (California State University, Bakersfield, CA, USA)

After the information released by Edward Snowden, the world realized about
the security risks of high surveillance from governments to citizens or
among governments, and how it can affect the freedom, democracy, and peace.
And organizations such as WikiLeaks has shown just how much data is
collected to include the poor security controls in place to protect that
information. Research has been carried out for the creation of the
necessary tools for the countermeasures to all these surveillance. One of
the most potent tools is the Tails system as a complement of The Onion
Router (TOR). Even though there are limitations and flaws, the progress has
been significant, and we are moving in the right direction. As more
individuals and organizations fall under a watchful eye on their Internet
activities then maintaining anonymity it not only essential for getting out
information but one's safety.

To obtain a copy of the entire article, click on the link below.
www.igi-global.com/article/tails-linux-operating-system/179897

To read a PDF sample of this article, click on the link below.
www.igi-global.com/viewtitlesample.aspx?id=179897

------------------------------
For full copies of the above articles, check for this issue of the
*International
Journal of Hyperconnectivity and the Internet of Things (IJHIoT)* in your
institution's library. This journal is also included in the IGI Global
aggregated *"InfoSci-Journals"* database: www.igi-global.com/isj
<http://www.igi-global.com/e-resources/infosci-databases/infosci-journals/>.
------------------------------

*CALL FOR PAPERS*

Mission of IJHIoT:

The mission of the International Journal of Hyperconnectivity and the
Internet of Things (IJHIoT) is to explore a range of related topics and
generate research debates in relation to cyber security, hyperconnectivity,
Internet of Things (IoT), Web of Things (WoT), and Internet of Everything
(IoE). Targeting researchers, practitioners, academicians, government
officials, military professionals and other industry professionals. IJHIoT
provides a forum to discuss technical, human, societal, and policy issues
in relation to hyperconnectivity, and IoT. Articles published in IJHIoT
deal with a vast number of issues concerning usage, failure, success,
policies, strategies, security concerns, the development, and integration
of IoT applications in organizations in and across developed, emerging and
developing nations.

Coverage of IJHIoT:

Topics to be discussed in this journal include (but are not limited to) the
following:

*Hyperconnectivity and IoT topics*


   - Hyperconnectivity
   - Internet of Things (IoT)
   - Web of Things (WoT)
   - Internet of Everything (IoE)
   - Service oriented IoT Architecture
   - IoT Application Programming Interface (API)
   - IoT platform
   - IoT devices
   - IoT management
   - IoT development
   - System of systems concepts

*IoT and cyber security topics*


   - IoT cyber security
   - IoT network security
   - Cryptography
   - Data security
   - IoT asset management
   - Secure software for IoT
   - Software logistics for IoT
   - Security engineering
   - IoT risk management

*IoT platform and environment topics*


   - SCADA platforms
   - Smart cities
   - Data mining
   - Geographic Information Systems (GIS)
   - Standard Development Organizations (SDO)
   - System usability
   - Technology Adoption
   - Wearable Computing
   - Network Architecture

Interested authors should consult the journal's manuscript submission
guidelines
www.igi-global.com/calls-for-papers/international-journal-hyperconnectivity-internet-things/157228



More information about the AISWorld mailing list