NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 46 results Save | Export
Peer reviewed Peer reviewed
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Choo, Chun Wei; Marton, Christine – Internet Research, 2003
Presents findings of a research study on how women in information technology (IT) professions seek information on the Web as part of their daily work. Develops a behavioral model of Web information seeking that identifies four complementary modes of information seeking: undirected viewing, conditioned viewing, informal search, and formal search.…
Descriptors: Data Collection, Females, Information Dissemination, Information Networks
Peer reviewed Peer reviewed
Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Olla, Phillip; Patel, Nayna; Atkinson, Chris – Internet Research, 2003
Reports on a case study at an organization that created MADIC, an innovative approach to developing mobile applications developed by third party independent developer. Presents MMO2's, a conceptual wireless reference model used to define the various system constituents required to create effective mobile applications. (Author/AEF)
Descriptors: Case Studies, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Bouras, C.; Ganos, P.; Karaliotas, A. – Internet Research, 2003
The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…
Descriptors: Computer Networks, Computer System Design, Design Requirements, Information Networks
Peer reviewed Peer reviewed
Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Prevelakis, Vassilis; Keromytis, Angelos – Internet Research, 2003
Proposes the use of a special purpose drop-in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Discusses features and advantages of the system and demonstrates how Sieve was used in various application areas such as at…
Descriptors: Computer Networks, Computer Security, Computer Software Development, Computer System Design
Peer reviewed Peer reviewed
Zubey, Michael L.; Wagner, William; Otto, James R. – Internet Research, 2002
Managers need to understand the tradeoffs associated with voice over Internet protocol (VoIP) networks as compared to the Public Switched Telephone Network (PSTN). This article measures the preference structures between IP telephony and PSTN services using conjoint analysis. The purpose is to suggest VoIP technology attributes that best meet…
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Information Networks, Information Services
Peer reviewed Peer reviewed
Loo, Alfred; Choi, Y. K. – Internet Research, 2002
In peer-to-peer systems, the lack of dedicated links between constituent computers presents a major challenge. Discusses the problems of distributed database operation with reference to an example. Presents two statistical selection algorithms-one for the intranet with broadcast/multicast facilities, the other for Internet without…
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Computer Networks, Databases
Peer reviewed Peer reviewed
Siyal, M. Y.; Barkat, B. – Internet Research, 2002
Presents a framework for enhancing trust in Internet commerce. Shows how trust can be provided through a network of Trust Service Providers (TSp). Identifies a set of services that should be offered by a TSp. Presents a distributed object-oriented implementation of trust services using CORBA, JAVA and XML. (Author/AEF)
Descriptors: Business, Information Industry, Information Networks, Information Services
Peer reviewed Peer reviewed
Yu, Hsiang-Fu; Tseng, Li-Ming – Internet Research, 2002
Approaches to designing a proxy server with Web usage control and to making the proxy server effective on local area networks are proposed to prevent abnormal Web access and to prioritize Web usage. A system is implemented to demonstrate the approaches. The implementation reveals that the proposed approaches are effective, such that the abnormal…
Descriptors: Information Management, Information Networks, Information Systems, Internet
Peer reviewed Peer reviewed
O'Neil, Dara – Internet Research, 2002
Analyzes the emerging community informatics evaluation literature to develop an understanding of the indicators used to gauge project impacts in community networks and community technology centers. The study finds that community networks and community technology center assessments fall into five key areas: strong democracy; social capital;…
Descriptors: Community Information Services, Evaluation Criteria, Evaluation Methods, Information Centers
Peer reviewed Peer reviewed
Massey, Brian L. – Internet Research, 2000
Market-based and press-freedom variables were tested as predictors of "interactive" online journalism at the Web companions of 17 English-language Asian newspapers. A multidimensional conception of interactivity was used in the analysis. Findings suggest that market-based variables predict only certain facets of an online newspaper's…
Descriptors: Information Networks, Information Sources, Interpersonal Communication, Journalism
Peer reviewed Peer reviewed
Chou, David C. – Internet Research, 1998
Moving corporate systems onto an intranet will increase the data traffic within the corporate network, which necessitates a high-quality management process to the intranet. Discusses costs and benefits of adopting an intranet, tool availability and selection criteria, and management issues for developing an intranet. (Author/AEF)
Descriptors: Business, Computer Mediated Communication, Computer Networks, Corporations
Peer reviewed Peer reviewed
Kiani, G. Reza – Internet Research, 1998
Addresses the opportunities offered by the Web to marketers. Considers the Web as a two-way communication model in which four different communication states can take place. Suggests the necessity of new concepts and models for marketers to manage their Web sites, and presents opportunities supporting the marketers' objectives in the new…
Descriptors: Business, Computer Mediated Communication, Computer Networks, Corporations
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4