- From: Michael Fitzgerald Nowlan <mfn3@georgetown.edu>
- Date: Thu, 10 Aug 2006 18:53:23 -0400
The contents of the latest issue of: International Journal of Information Technology and Web Engineering (IJITWE) Official Publication of the Information Resources Management Association Volume 1, Issue 2, April-June 2006 Published: Quarterly in Print and Electronically ISSN: 1554-1045 EISSN: 1554-1053 Co-Editors-In-Chief: Ghazi Alkhatib, Applied Science University, Amman, Jordan David Rine, George Mason University, USA EDITORIAL PREFACE: David Rine, George Mason University, USA Ghazi Alkhatib, Applied Science University, Amman, Jordan Zakaria Maamar, IJSWIS Board Coordinator, Zayed University, United Arab Emirates The papers in this second issue of the International Journal of Information Technology and Web Engineering address three important dimensions of design in the deployment of modern Web-engineered knowledge intensive systems: users, user Web communities, and associated risk and security measures. The authors discuss how these topics are interrelated and how they are important to the future of ubiquitous computing. RESEARCH PAPERS PAPER ONE: “Agile Development of Secure Web-Based Applications” A. F. Tappenden, University of Alberta, Canada T. Huynh, University of Alberta, Canada J. Miller, University of Alberta, Canada A. Geras, University of Calgary, Canada M. Smith, University of Calgary, Canada This article outlines a four-point strategy for the development of secure Web-based applications within an agile development framework and introduces strategies to mitigate security risks commonly present in Web-based applications. The proposed strategy includes the representation of security requirements as test cases supported by the open source tool FIT, the deployment of a highly testable architecture allowing for security testing of the application at all levels, the outlining of an extensive security testing strategy supported by the open source unit-testing framework HTTPUnit, and the introduction of the novel technique of security refactoring that transforms insecure working code into a functionally equivalent secure code. To obtain a copy of the entire article, click on the link below. http://www.idea-group.com/articles/details.asp?id=6085 PAPER TWO: “E-Portfolio to Promote the Virtual Learning Group Communities on the Grid” Guy Gouardères, Laboratoire LIUPPA - Université de Pau et des Pays de l’Adour, France Emilie Conté, Laboratoire LIUPPA - Université de Pau et des Pays de l’Adour, France In vocational and educational training (VET), new trends are toward social learning and, more precisely, toward informal learning. This article introduces a process the e-Qualification to manage informal learning on the ELeGI (“Learning Grid Infrastructure”). It argues that this process must occur in a social context, such as virtual communities. It describes their necessary characteristics and properties that lead to the creation of a new kind of virtual community: the Virtual Learning Grid Community (VLGC). The e-Qualification and Virtual Learning Grid Communities’ management will rely on the cooperation of different distributed, autonomous, goal-oriented entities, called Mobile Peer-to-Peer (P2P) agents. Implementing these services will decrease the lack of informal learning treatment on the grid and will become the basis for new services on the learning grid. To obtain a copy of the entire article, click on the link below. http://www.idea-group.com/articles/details.asp?id=6086 PAPER THREE: “High Performance Scheduling Mechanism for Mobile Computing Based on Self-Ranking Algorithm” Hesham A. Ali, Mansoura University, Egypt Tamer Ahmed Farrag, Mansoura University, Egypt Due to the rapidly increasing number of mobile devices connected to the Internet, an increasing amount of research is being conducted to maximize the benefit of such integration. This article describes how to enhance the performance of the scheduling mechanism of the mobile computing environment by distributing some of the responsibilities of the access point among the available attached mobile devices. To this aim, the authors investigate a scheduling mechanism framework that comprises an algorithm, providing the mobile device with the authority to evaluate itself as a resource. The proposed mechanism is based on the “self ranking algorithm” (SRA), which provides a lifetime opportunity to reach a proper solution. The authors also evaluate the performance of the investigated algorithm extensively, to show how it overcomes the connection stability problem of the mobile devices. To obtain a copy of the entire article, click on the link below. http://www.idea-group.com/articles/details.asp?id=6087 PAPER FOUR: “Incremental Learning for Interactive E-Mail Filtering” Ding-Yi Chen, University of Queensland, Australia Xue Li, University of Queensland, Australia Zhao Yang Dong, University of Queensland, Australia Xia Chen, University of Queensland, Australia In this article, the authors propose a frameworkPrediction-Learning-Distillation (PLD)for interactive document classification and distilling misclassified documents. Whenever a user points out misclassified documents, the PLD learns from the mistakes and identifies the same mistakes from all other classified documents. The PLD then enforces this learning for future classifications. If the classifier fails to accept relevant documents or reject irrelevant documents on certain categories, then PLD will assign those documents as new positive/negative training instances. The classifier can then strengthen its weakness by learning from these new training instances. To obtain a copy of the entire article, click on the link below. http://www.idea-group.com/articles/details.asp?id=6088 ***************************************************** For full copies of the above articles, check for this issue of International Journal of Information Technology and Web Engineering (IJITWE) in your Institution's library. If your library is not currently subscribed to this Journal, please recommend IJITWE subscription to your librarian. ***************************************************** Note: For only $18.00, purchase an IJITWE article or any of over 1,200 single journal articles available electronically by visiting www.idea-group.com/articles. CALL FOR PAPERS Mission of IJITWE: The main objective of the journal is to publish refereed papers in the area covering Information Technology (IT) concepts, tools, methodologies, and ethnography, in the contexts of global communication systems and Web engineered applications. In accordance with this emphasis on the Web and communication systems, the journal publishes papers on IT research and practice that support seamless end-to-end information and knowledge flow among individuals, teams, and organizations. This end-to-end strategy for research and practice requires emphasis on integrated research among the various steps involved in data/knowledge (structured and unstructured) capture (manual or automated), classification and clustering, storage, analysis, synthesis, dissemination, display, consumption, and feedback. The secondary objective is to assist in the evolving and maturing of IT-dependent organizations, as well as individuals, in information and knowledge based culture and commerce, including e-com merce. Coverage of IJITWE: Web systems architectures, including distributed, grid computer, and communication systems processing Web systems engineering design Web systems performance engineering studies Web user interfaces design, development, and usability engineering studies Radio Frequency Identification (RFID) research and applications in web engineered systems Mobile, location-aware, and ubiquitous computing Ontology and semantic Web studies Software agent-based applications Integrated user profile, provisioning, and context-based processing Security, integrity, privacy and policy issues Quality of service and service level agreement issues among integrated systems Information filtering and display adaptation techniques for wireless devices Metrics-based performance measurement of IT-based and Web-based organizations Data analytics for business and government organizations Integrated heterogeneous and homogeneous workflows and databases within and across organizations and with suppliers and customers Case studies validating Web-based IT solutions Data and knowledge capture and quality issues Data and knowledge validation and verification Knowledge structure, classification and search algorithms or engines Strategies for linking business needs and IT IT readiness and technology transfer studies IT Education and Training Human factors and cultural impact of IT-based systems Virtual teams and virtual enterprises: communication, policies, operation, creativity, and innovation Competitive/intelligent information systems. Interested authors should consult the Journal's manuscript submission guidelines at http://www.idea-group.com/ijitwe All inquiries and submissions should be sent to: Ghazi Alkhatib at alkhatib@asu.edu.jo Or David Rine at drine@gmu.edu
Received on Thursday, 10 August 2006 22:54:40 UTC