• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: ACC ]" (76)
  1. 31. A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone
    Jong-jin Park, Min-kyong Choi, Jong-chang Ahn, Vol. 18, No. 1, pp. 105-120, Feb. 2017
    10.7472/jksii.2017.18.1.105
    Keywords: Smartphones, information security, Degree of personal risk accepting, Buying intention, Android, iOS
  2. 32. An ICT Framework for Tourism Industry of Nepal: Prospect and Challenges
    Deepanjal Shrestha, Seung Ryul Jeong, Vol. 17, No. 6, pp. 113-122, Dec. 2016
    10.7472/jksii.2016.17.6.113
    Keywords: ICT, information access, Internet, data center, tourism industry
  3. 33. Access Control as a Service for Information Protection in Semantic Web based Smart Environment
    Yousra Abdul Alsahib S.Aldeen, Shaligram Prajapat, Mojtaba Raeisi Nejad Dobuneh, Noor Azeera Abdul Aziz, Jung-Gyu Lee, Muhammad Younas, Do Yeon Kim, Minjae Park, NurLiyanaSulaiman NurLiyanaSulaiman, Taghi Javdani Gandomani, Noorrezam Yusop, Isma Farah Siddiqui, Yoosin Kim, Mina Ziaei Nafchi, Seung-Ryul Jeong, MohdNaz'ri Mahrin, MohdAizainiMaarof MohdAizainiMaarof, Ashok Sharma, Dayang N.A. Jawawi, Imran Ghani, Mazleena Salleh, Hyun Ahn, Massila Kamalrudin, Scott Uk-Jin Lee, Ramjeevan Singh Thakur, Dayang Norhayati Abang Jawawi, Anazida Zainal, Kwanghoon Pio Kim, Sang Hyun Choi, Mokhtar Mohd Yusof, RasimahCheMohd Yusoff, Muhammad Murad Khan, Mohammed HazimAlkawaz, Safiah Sidek, Vol. 17, No. 5, pp. 9-16, Oct. 2016
    10.7472/jksii.2016.17.5.09
    Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT)
  4. 34. On Frequency Separation among Radio Access Technologies in Heterogeneous Networks
  5. 35. Factors of Leading the Adoption of Diet/Exercise Apps on Smartphones: Application of Channel Expansion Theory
  6. 36. Medical Information Dynamic Access System in Smart Mobile Environments
  7. 37. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
    Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
    10.7472/jksii.2015.16.1.21
    Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication
  8. 38. A Study on Improvement Plan of Web Accessibility for the Disabled
    Woochun Jun, Suk-Ki Hong, Vol. 15, No. 4, pp. 81-90, Aug. 2014
    10.7472/jksii.2014.15.4.81
    Keywords: Web Accessibility, the Disabled, Digital Divide
  9. 39. Channel Searching Method of IEEE 802.15.4 Nodes for Avoiding WiFi Traffic Interference
    Myong Lyol Song, Vol. 15, No. 2, pp. 19-32, Apr. 2014
    10.7472/jksii.2014.15.2.19
    Keywords: Interference, IEEE 802.15.4, WiFi, CSMA-CA, medium access delay, channel search
  10. 40. A fuzzy ART Approach for IS Personnel Selection and Evaluation