RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 1
TI Achieve your career goals with the fit that's right for you. House Advertisement
AB Advertisement, IEEE.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.62
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.62

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 2
TI Table of Contents
AB Presents the table of contents for this issue of the publication.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.61
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.61

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 4
TI Twenty Years in the Making
A1 M. Brian Blake, K1 Internet/Web technologies
K1 usable security and privacy
K1 collaborative filtering
K1 intelligent systems

AB In honor of IEEE Internet Computing's 20th anniversary, Editor-in-Chief Brian Blake discusses the articles showcased in this issue to celebrate this special milestone.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.51
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.51

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 5
TI Masthead
AB Presents a listing of the editorial board, current staff, committee members, and society editors for this issue of the publication.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.54
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.54

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 6
TI Internet Computing Begins
A1 Charles Petrie, K1 Internet/Web technologies
K1 online publishing
K1 Internet computing

AB In celebration of IEEE Internet Computing's 20th anniversary, the inaugural Editor-in-Chief Charles Petrie reminisces about the time period surrounding the magazine's beginnings, as well as how IC became the IEEE Computer Society's first magazine posted online.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.64
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.64

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 8
TI Past as Prolog(ue): Humans, Machines, and 20 Years of Internet Computing
A1 William Regli,
K1 Internet computing
K1 Technological innovation
K1 Internet and web services
K1 Artificial intelligence
K1 Intelligent systems
K1 Privacy
K1 Internet/Web technologies
K1 human-machine interfaces
K1 artificial intelligence
K1 intelligent systems
K1 Internet computing
K1 security and privacy
AB To celebrate IEEE Internet Computing's 20th anniversary, William Regli reflects on writing the lead technical article of the inaugural issue in 1997. Some of the observations he made two decades ago, as this discipline arose, were temporal in nature, and indicative of the times. Others, however, carried a certain prescience while distilling enduring themes.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.71
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.71

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 11
TI 2017-2018 Editorial Calendar House Advertisement
AB Advertisement, IEEE.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.60
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.60

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 12
TI Two Decades of Recommender Systems at Amazon.com
A1 Brent Smith,
A1 Greg Linden,
K1 Collaboration
K1 Internet and web services
K1 Recommender systems
K1 Real-time systems
K1 Social network services
K1 Artificial intelligence
K1 Business
K1 Internet/Web technologies
K1 recommender systems
K1 intelligent systems
K1 artificial intelligence
K1 software engineering
K1 item-based collaborative filtering
K1 personalization
AB Amazon is well-known for personalization and recommendations, which help customers discover items they might otherwise not have found. In this update to their original paper, the authors discuss some of the changes as Amazon has grown.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.72
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.72

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 19
TI Usable Security
A1 Rick Wash,
A1 Mary Ellen Zurko,
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined,
K1 Special issues and sections
K1 Internet and web services
K1 Computer security
K1 Privacy
K1 Human computer interaction
K1 Usability
K1 Internet/Web technologies
K1 security and privacy
K1 human-computer interaction
K1 HCI
K1 usable security
AB Protecting computing systems involves the efforts of a large number of people. However, the connection between people and computers is often the biggest vulnerability in the system. This issue includes seven papers that describe how people protect computing systems, and the challenges and opportunities they provide.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.69
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.69

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 22
TI TLS Inspection: How Often and Who Cares?
A1 Mark O'Neill,
A1 Scott Ruoti,
A1 Kent Seamons,
A1 Daniel Zappala,
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined,
K1 Encryption
K1 Cryptography
K1 Browsers
K1 Privacy
K1 Telecommunication traffic
K1 Malware
K1 Computer security
K1 Usability
K1 Internet/Web technologies
K1 security and privacy
K1 usability
K1 measurement
K1 TLS
K1 SSL
K1 HTTPS
K1 TLS Proxy
K1 TLS interception
K1 TLS inspection
K1 middlebox
K1 certificates
K1 certificate forgery
K1 man-in-the-middle detection
K1 notification
K1 consent
K1 user attitudes
K1 Flash
K1 Google Adwords
K1 Amazon Mechanical Turk
AB TLS inspection -- inline decryption, inspection, and re-encryption of TLS traffic -- is a controversial practice used for both benevolent and malicious purposes. This article describes measurements of how often TLS inspection occurs and reports on a survey of the general public regarding the practice of TLS inspection. This helps inform security researchers and policymakers regarding current practices and user preferences.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.58
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.58

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 30
TI Balancing Security and Usability in Encrypted Email
A1 Wei Bai,
A1 Doowon Kim,
A1 Moses Namara,
A1 Yichen Qian,
A1 Patrick Gage Kelley,
A1 Michelle L. Mazurek,
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined,
K1 Digital communication
K1 Encryption
K1 Usability
K1 Privacy
K1 Public key
K1 Computer security
K1 Internet/Web technologies
K1 human factors
K1 security and privacy
K1 usable security
K1 encryption
K1 public policy
AB End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been extremely difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties for convenience. The authors wanted to understand how average users think about these tradeoffs. They conducted a 52-person user study and found that participants could learn to understand properties of different encryption models. Users also made coherent assessments about when different tradeoffs might be appropriate. Participants recognized that the less-convenient exchange model was more secure overall, but considered the registration model's security sufficient for most everyday purposes.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.57
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.57

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 39
TI IEEE Computer Society Harlan D. Mills Award House Advertisement
AB Advertisement, IEEE.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.74
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.74

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 40
TI Humans Are Dynamic - Our Tools Should Be Too
A1 Sathya Chandran Sundaramurthy,
A1 Michael Wesch,
A1 Xinming Ou,
A1 John McHugh,
A1 S. Raj Rajagopalan,
A1 Alexandru G. Bardas,
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined,
K1 Computer security
K1 Human factors
K1 Creativity
K1 Malware
K1 Technological innovation
K1 Internet/Web technologies
K1 usable security
K1 security and privacy
K1 activity theory
K1 security operation center
K1 SOC
AB Security Operation Centers (SOCs) are being operated by universities, government agencies, and corporations to defend their enterprise networks and identify and thwart malicious behaviors in both networks and hosts. The success of a SOC depends on combining good tools and processes with efficient and effective analysts. During four years of anthropological fieldwork methods to study SOCs, the authors discovered that successful SOC innovations must resolve multiple internal and external conflicts to be effective and efficient. This discovery, guided by activity theory (AT) as a framework for analyzing the fieldwork data, enabled them understand these realities. Their research indicates conflict resolution is a prerequisite for continuous improvement of SOCs in both human and technological aspects. Failure to do so can lead to adverse effects, such as analyst burnout and reduction in overall effectiveness.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.52
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.52

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 47
TI Focus on Your Job Search House Advertisement
AB Advertisement, IEEE.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.59
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.59

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 48
TI Longitudinal Privacy Management in Social Media: The Need for Better Controls
A1 Mainack Mondal,
A1 Johnnatan Messias,
A1 Saptarshi Ghosh,
A1 Krishna P. Gummadi,
A1 Aniket Kate,
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined,
K1 Privacy
K1 Twitter
K1 Social network services
K1 Software systems
K1 Facebook
K1 Usability
K1 Internet and web services
K1 Internet/Web technologies
K1 Twitter
K1 usable privacy
K1 longitudinal exposure
K1 tweet deletion
K1 inactivity-based withdrawal
K1 residual activities
K1 security and privacy
AB This large-scale measurement study of Twitter focuses on understanding how users control the longitudinal exposure of their publicly shared social data -- that is, their tweets -- and the limitations of currently used control mechanisms. The study finds that, while Twitter users widely employ longitudinal exposure control mechanisms, they face two fundamental problems. First, even when users delete their data or account, the current mechanisms leave significant traces of residual activity. Second, these mechanisms single out withdrawn tweets or accounts, attracting undesirable attention to them. To address both problems, an inactivity-based withdrawal scheme for improved longitudinal exposure control is explored.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.76
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.76

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 56
TI Understanding the Physical Safety, Security, and Privacy Concerns of People with Visual Impairments
A1 Tousif Ahmed,
A1 Roberto Hoyle,
A1 Patrick Shaffer,
A1 Kay Connelly,
A1 David Crandall,
A1 Apu Kapadia,
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined,
K1 Privacy
K1 Computer security
K1 Visualization
K1 Safety
K1 Portable computers
K1 Blindness
K1 Usability
K1 Assistive technology
K1 Internet/Web technologies
K1 safety
K1 blindness
K1 visually impaired
K1 assistive technologies
K1 security and privacy
K1 usable security
AB With the help of various assistive devices, people with visual impairments are able to live their lives with greater independence both online and offline. But significant work remains to understand and address their safety, security, and privacy concerns, especially in the physical, offline world. For example, people with visual impairments are particularly vulnerable to physical assault and theft, shoulder-surfing attacks, and being overheard during private conversations. The authors conducted two sets of interviews -- one in a small-town setting and the other in a larger metropolitan area -- with 33 participants with visual impairments to identify their physical safety, security, and privacy issues and find out how they manage these concerns and how assistive technologies could help alleviate them. The resulting research proposes design considerations for camera-based devices that would help people with visual impairments monitor for potential threats around them.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.77
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.77

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 64
TI May the Force Be with You: The Future of Force-Sensitive Authentication
A1 Katharina Krombholz,
A1 Thomas Hupperich,
A1 Thorsten Holz,
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined,
K1 Usability
K1 Authentication
K1 Internet and web services
K1 Entropy
K1 Computer security
K1 Privacy
K1 Internet/Web technologies
K1 usable security
K1 authentication
K1 security and privacy
AB Modern smartphones provide a rich set of possible touchscreen interactions, but most authentication schemes still rely on simple digit or character input. Previous studies examined the shortcomings of such schemes (digit-PINs, for example). Here, the authors discuss the potential of a new PIN type called force-PINs. The idea behind this approach is to augment the security of digit-PINs by assigning a binary pressure value to each digit in the sequence. By adding this (practically) invisible pressure component, force-PINs help users select stronger PINs that are harder to observe. The authors also discuss implications for future research on force-sensitive authentication.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.78
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.78

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 70
TI Designing Effective Privacy Notices and Controls
A1 Florian Schaub,
A1 Rebecca Balebako,
A1 Lorrie Faith Cranor,
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined,
K1 Privacy
K1 Data privacy
K1 Usability
K1 Internet and web services
K1 Context modeling
K1 Internet/Web technologies
K1 security and privacy
K1 public policy issues
K1 human factors
K1 human-computer interaction
AB Privacy notice and choice are essential aspects of privacy and data protection regulation worldwide. Yet, today's privacy notices and controls are surprisingly ineffective at informing users or allowing them to express choice. Here, the authors analyze why existing privacy notices fail to inform users and tend to leave them helpless, and discuss principles for designing more effective privacy notices and controls.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.75
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.75

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 78
TI Internet Evolution
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined,
K1 Internet and web services
K1 Quality of service
K1 Protocols
K1 Cloud computing
K1 Computational modeling
K1 Technological innovation
K1 Internet/Web technologies
K1 network virtualization
K1 Internet evolution
K1 network as a computer
K1 NaaC
K1 content distribution networks
K1 edge computing
K1 cloud computing
AB Can the Internet evolve, and what is the direction of this evolution? This article offers a plausible model for Internet evolution, and explains its implications for different stakeholders.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.55
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.55

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 82
TI Do Not Capture: Automated Obscurity for Pervasive Imaging
A1 Moo-Ryong Ra,
A1 Seungjoon Lee,
A1 Emiliano Miluzzo,
A1 Eric Zavesky,
K1 Smart phones
K1 Media
K1 Internet and web services
K1 Mobile handsets
K1 Sensors
K1 Privacy
K1 Cameras
K1 Wearable computing
K1 Computer security
K1 Internet/Web technologies
K1 pervasive computing
K1 wearable computing
K1 security and privacy
AB The pervasive use of smartphones and wearables can compromise individuals' privacy, as they become unaware subjects of pictures and videos. Do Not Capture is a novel technology that removes unwilling subjects from media at capture time.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.67
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.67

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 88
TI Keep It Simple: Bidding for Servers in Today's Cloud Platforms
A1 Prateek Sharma,
A1 David Irwin,
A1 Prashant Shenoy,
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined,
K1 Servers
K1 Fault tolerance
K1 Fault tolerant systems
K1 Cloud computing
K1 Contracts
K1 Supply and demand
K1 Internet/Web technologies
K1 cloud computing
K1 spot servers
K1 spot instance pricing
K1 cloud resource management
K1 fault tolerance
AB Public clouds now offer computing services with a variety of pricing schemes. Spot servers, which offer large cost savings, are an increasingly popular platform on which applications are being deployed. Spot servers are dynamically priced and require users to submit a bid. In this article, the authors show the effect of bidding on application cost and availability when running on spot servers. Based on their analysis, they present simple and effective bidding strategies for users and provide motivation for new research directions in cloud resource management and fault tolerance.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.56
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.56

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 93
TI IEEE Computer Society House Advertisement
AB Advertisement, IEEE.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.70
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.70

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 94
TI In Defense of MapReduce
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined,
K1 Internet
K1 Big Data
K1 Optimization
K1 Internet and web services
K1 Performance evaluation
K1 Computational modeling
K1 Internet/Web technologies
K1 big data
K1 MapReduce
K1 Spark
AB Don't throw the MapReduce baby out with the bath water!
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.53
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.53

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 99
TI You Let That In?
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined,
K1 Computer securityu
K1 Internet and web services
K1 Wireless fidelity
K1 Data privacy
K1 Privacy
K1 Internet/Web technologies
K1 IoT
K1 cybersecurity
K1 security and privacy
K1 Internet of Things
AB For the sake of safety, security, and privacy, humans are particular about who or what can cross the threshold of their homes. But the items most likely to make humans unsafe are what they hold near and dear: their connected, smart electronic devices. What can consumers do to mitigate the risks?
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.73
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.73

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP 103
TI On the Simulation of Everything
A1 Vinton G. Cerf, K1 Internet/Web technologies
K1 simulation
K1 visualization
K1 city planning
K1 emergency response
K1 emergent behavior
K1 graphics

AB Affordable computing and memory capacity have enabled fascinating work in the "world" of computer visualization and simulation. As high-resolution complexities are modeled, offering new and sometimes unexpected results, these intricate artifacts answer questions while leading to new ones.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.50
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.50

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP c1
TI Front Cover
AB Presents the front cover for this issue of the publication.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.68
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.68

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP c2
TI New Membership Options for a Better Fit House Advertisement
AB Advertisement, IEEE.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.63
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.63

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP c3
TI IEEE Internet Computing: Call for Papers House Advertisement
AB Advertisement, IEEE.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.65
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.65

RT Journal Article
JF IEEE Internet Computing
YR 2017
VO 21
IS 3
SP c4
TI One membership. Unlimited knowledge. House Advertisement
AB Advertisement, IEEE.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1089-7801
LA English
DO 10.1109/MIC.2017.66
LK http://doi.ieeecomputersociety.org/10.1109/MIC.2017.66