IEEE Internet Computing Journal Impact Factor & Information

Publisher: IEEE Computer Society, Institute of Electrical and Electronics Engineers

Journal description

Edited for users and developers. Focuses on Internet-based computer applications and enabling technologies in complex, multidisciplinary projects. Addresses Internet services for engineers, scientists, and other professionals, based on the World Wide Web, intelligent agents, and similar technologies. Carries reviewed articles and lively departments that emphasize current practice, case studies, and real-world solutions.

Current impact factor: 2.00

Impact Factor Rankings

2015 Impact Factor Available summer 2015
2013 / 2014 Impact Factor 2
2012 Impact Factor 2.039
2011 Impact Factor 2
2010 Impact Factor 2.514
2009 Impact Factor 3.108
2008 Impact Factor 2.309
2007 Impact Factor 1.551
2006 Impact Factor 1.935
2005 Impact Factor 2.304
2004 Impact Factor 2.554
2003 Impact Factor 2.579
2002 Impact Factor 1.024
2001 Impact Factor 1.155
2000 Impact Factor 1.351

Impact factor over time

Impact factor

Additional details

5-year impact 2.50
Cited half-life 6.50
Immediacy index 0.25
Eigenfactor 0.00
Article influence 1.03
Website IEEE Internet Computing Magazine website
Other titles IEEE internet computing, Institute of Electrical and Electronics Engineers internet computing, Internet computing
ISSN 1089-7801
OCLC 35127474
Material type Periodical, Internet resource
Document type Journal / Magazine / Newspaper, Internet Resource

Publisher details

Institute of Electrical and Electronics Engineers

  • Pre-print
    • Author can archive a pre-print version
  • Post-print
    • Author can archive a post-print version
  • Conditions
    • Author's pre-print on Author's personal website, employers website or publicly accessible server
    • Author's post-print on Author's server or Institutional server
    • Author's pre-print must be removed upon publication of final version and replaced with either full citation to IEEE work with a Digital Object Identifier or link to article abstract in IEEE Xplore or replaced with Authors post-print
    • Author's pre-print must be accompanied with set-phrase, once submitted to IEEE for publication ("This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible")
    • Author's pre-print must be accompanied with set-phrase, when accepted by IEEE for publication ("(c) 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.")
    • IEEE must be informed as to the electronic address of the pre-print
    • If funding rules apply authors may post Author's post-print version in funder's designated repository
    • Author's Post-print - Publisher copyright and source must be acknowledged with citation (see above set statement)
    • Author's Post-print - Must link to publisher version with DOI
    • Publisher's version/PDF cannot be used
    • Publisher copyright and source must be acknowledged
  • Classification
    ​ green

Publications in this journal

  • [Show abstract] [Hide abstract]
    ABSTRACT: The current development towards the Internet of Things introduces new demands and the need for more flexibility for stream processing models. To counter these challenges, the authors propose an elastic stream processing model for a distributed environment, building on top of Cloud computing and allowing a scalable and more flexible solution compared to traditional approaches.
    IEEE Internet Computing 11/2015;
  • [Show abstract] [Hide abstract]
    ABSTRACT: The rapidly expanding market for wearable devices, driven by the confluence of information and communication technology and public acceptance of a design aesthetic, suggests near limitless potential for consumer uses. As adoption of wearables spreads, there are cultural and social impacts that represent both barriers and opportunities, with subsequent public policy ramifications. All too often designers, technologists, and policymakers operate independently with the consequence of products that are out of sync, lack interoperability, or are hindered by well meaning, but obstructive policy. This paper proposes a collaborative policy design framework, based on initial trials undertaken at a multi-disciplinary collaborative engineering center, the Wireless Rehabilitation Engineering Research Center. We expect that the proposed collaborative policy design process will enhance the development of wearable devices and guide interdisciplinary collaborators as they explore the various implications and effects of device design in social technological and regulatory contexts.
    IEEE Internet Computing 07/2015; 19(5). DOI:10.1109/MIC.2015.74
  • [Show abstract] [Hide abstract]
    ABSTRACT: Guest editor -
    IEEE Internet Computing 07/2015; 19:8-9. DOI:10.1109/MIC.2015.83
  • [Show abstract] [Hide abstract]
    ABSTRACT: Beyond what normal antivirus products do, how can we protect ourselves from the increasing sophistication and subtlety of malware attacks?
    IEEE Internet Computing 06/2015; 19(3):72-76. DOI:10.1109/MIC.2015.64
  • [Show abstract] [Hide abstract]
    ABSTRACT: Could crowd services be the next big thing? Here, Editor-in-Chief Brian Blake outlines the prospects of a world where we organize timely, instinctive information by harnessing the power of human crowds.
    IEEE Internet Computing 06/2015; 19(3):4-6. DOI:10.1109/MIC.2015.57
  • [Show abstract] [Hide abstract]
    ABSTRACT: In the past decade social networking services (SNS) flooded the Web. The nature of such sites makes identity deception easy, offering a quick way to set up and manage identities, and then connect with and deceive others. Fighting deception requires a coordinated approach by users and developers to ensure detection and prevention. This article identifies the most prevalent approaches in detecting and preventing identity deception (from both a user's and developer's perspective), evaluating their efficiency, and providing recommendations to help eradicate this issue.
    IEEE Internet Computing 06/2015; 19(3):41-49. DOI:10.1109/MIC.2015.21
  • [Show abstract] [Hide abstract]
    ABSTRACT: The emergence of cyber-physical-social systems (CPSS) and context-aware technologies has helped boost a growing interest in building frameworks for adaptive smart services that hide heterogeneity in the infrastructure and support services by seamlessly integrating the cyber, physical, and social worlds. However, this entails an enormous amount of computational and networking contextual complexity. Here, the proposed smart services framework in CPSS (called Dynamic Social Structure of Things, or DSSoT) boosts sociality and narrows down the contextual complexity based on situational awareness. DSSoT monitors spatiotemporal situations and, depending on users' individual goals and other social aspects, induces and structures relevant social objects and smart services in a temporal network of interactions. An application using DSSoT, called Airport Dynamic Social, provides a proof of concept.
    IEEE Internet Computing 06/2015; 19(3):1-1. DOI:10.1109/MIC.2015.27
  • [Show abstract] [Hide abstract]
    ABSTRACT: Physical-cyber-social (PCS) computing involves a holistic treatment of data, information, and knowledge from the physical, cyber, and social worlds to integrate, understand, correlate, and provide contextually relevant abstractions to humans and the applications that serve them. PCS computing extends current progress in cyber-physical, socio-technical, and cyber-social systems. Here, the guest editors consider powerful ways to exploit data available through various Internet of Things (IoT), citizen and social sensing, Web, and open data sources that are seeing explosive growth. This special issue highlights a variety of PCS applications, such as smart firefighting, intelligent infrastructure, and user guidance in an airport.
    IEEE Internet Computing 06/2015; 19(3):7-11. DOI:10.1109/MIC.2015.65
  • [Show abstract] [Hide abstract]
    ABSTRACT: What are the next challenges and trends for online transaction-processing (OLTP) database systems? Here, Andrew Pavlo opines on how database management system developers will need to respond as new hardware technologies become widely available.
    IEEE Internet Computing 06/2015; 19(3):68-71. DOI:10.1109/MIC.2015.59
  • [Show abstract] [Hide abstract]
    ABSTRACT: Cyberspace is the processing, manipulation, and exploitation of information; the facilitation and augmentation of communication among people; and the interaction of people, information, and devices. The main characteristic of cyberspace is the interconnection of computers, information, devices, and people. Many actors are involved in cyberspace's construction and operation -- namely, telcos; application, service, and content providers; users; and governments. The issue of privacy protection is a global challenge that requires a global response. The regulation of privacy in cyberspace depends on regulatory, technical, and social factors. Multistakeholder mechanisms can be a promising way to deal with privacy policies in the global cyberspace.
    IEEE Internet Computing 06/2015; 19(3):50-53. DOI:10.1109/MIC.2015.66
  • [Show abstract] [Hide abstract]
    ABSTRACT: Video constitutes a large fraction of Internet traffic today. The growth of mobile video has been significant in recent years, due to a tremendous increase in mobile device adoption and the ease with which videos are generated and consumed by such devices. Although the demand for mobile videos is significantly on the rise, the network infrastructure resources needed to deliver mobile videos haven't increased proportionally. This article discusses challenges in delivering streaming videos over cellular networks and possible ways to tackle those problems. Also considered is the potential impact of virtualizing network functions and services on mobile video delivery.
    IEEE Internet Computing 06/2015; 19(3):64-67. DOI:10.1109/MIC.2015.63
  • [Show abstract] [Hide abstract]
    ABSTRACT: How can digital information be preserved for access in the future? Even though not all digital content can or will be preserved, it's important to overcome obstacles for preserving such data and its correct interpretation and have a choice of suitable access options.
    IEEE Internet Computing 06/2015; 19(3):80-c3. DOI:10.1109/MIC.2015.62
  • [Show abstract] [Hide abstract]
    ABSTRACT: Smart systems are everywhere. They have the unique ability to optimize their performance under a variety of inputs and recover quickly from a wide variety of disturbances. This ability depends on both the cognitive and physical capabilities of such systems. Currently available cyber technologies have dramatically increased the cognitive capabilities of machines. As these technologies advance, so will those cognitive capabilities. This means that humans and machines can work more collaboratively, as joint partners, to execute those capabilities. Here, a system is described that takes advantage of such technologies to deploy a smart firefighting approach.
    IEEE Internet Computing 06/2015; 19(3):28-31. DOI:10.1109/MIC.2015.54
  • [Show abstract] [Hide abstract]
    ABSTRACT: For 30 years, Internet email addresses have used the format, with the character set A-Z, 0-9, ., and -. Gradually mail has been extended to support bæ, löffel, and 中国 in most places, but not in addresses. Now Email Address Internationalization (EAI) work has added support for unicode in addresses, simplifying syntax simultaneously. (To ensure that characters display correctly, please read the PDF version of this article.)
    IEEE Internet Computing 06/2015; 19(3):60-63. DOI:10.1109/MIC.2015.58
  • IEEE Internet Computing 05/2015; 19(3):77-79. DOI:10.1109/MIC.2015.69
  • IEEE Internet Computing 04/2015; 19(4):20-27. DOI:10.1109/MIC.2015.51
  • [Show abstract] [Hide abstract]
    ABSTRACT: Despite the rapid growth of eHealth technology, eHealth applications are rarely embedded within primary care. Largely, this is due to a lack of interoperability among different systems. This article describes the identification of requirements for, and barriers towards interoperable eHealth technology from the perspective of healthcare professionals. These actors are crucial end-users of eHealth technology, as they are able to decide when, and which patients make use of it. We distributed online surveys and performed in-depth, semi-structured interviews in seven Dutch primary care centers. Next, we coded the data and applied thematic analysis. This resulted in an overview of context-driven requirements and barriers. It turned out that we could subdivide these results according to an interoperability framework into levels of interoperability, as workflow process, information, applications, and IT infrastructure. Only when all identified levels of interoperability are taken into account, implementation of interoperable eHealth technology in primary care can succeed.
    IEEE Internet Computing 04/2015; PP(99). DOI:10.1109/MIC.2015.53
  • [Show abstract] [Hide abstract]
    ABSTRACT: How can standards working groups protect Internet users from pervasive monitoring, where users' data are being massively collected, aggregated, and analyzed?
    IEEE Internet Computing 03/2015; 19(2):75-77. DOI:10.1109/MIC.2015.44