NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 21 results Save | Export
Peer reviewed Peer reviewed
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Olla, Phillip; Patel, Nayna; Atkinson, Chris – Internet Research, 2003
Reports on a case study at an organization that created MADIC, an innovative approach to developing mobile applications developed by third party independent developer. Presents MMO2's, a conceptual wireless reference model used to define the various system constituents required to create effective mobile applications. (Author/AEF)
Descriptors: Case Studies, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Miladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Zubey, Michael L.; Wagner, William; Otto, James R. – Internet Research, 2002
Managers need to understand the tradeoffs associated with voice over Internet protocol (VoIP) networks as compared to the Public Switched Telephone Network (PSTN). This article measures the preference structures between IP telephony and PSTN services using conjoint analysis. The purpose is to suggest VoIP technology attributes that best meet…
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Information Networks, Information Services
Peer reviewed Peer reviewed
Loo, Alfred; Choi, Y. K. – Internet Research, 2002
In peer-to-peer systems, the lack of dedicated links between constituent computers presents a major challenge. Discusses the problems of distributed database operation with reference to an example. Presents two statistical selection algorithms-one for the intranet with broadcast/multicast facilities, the other for Internet without…
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Computer Networks, Databases
Peer reviewed Peer reviewed
Rettie, Ruth – Internet Research, 2001
Uses focus groups to facilitate identification and discussion of respondents' Internet experience. Explores respondents' awareness and experience of flow-identified in research as a key characteristic of Internet consumer behavior. Finds half the respondents recognized Internet flow experience and Internet flow seems to prolong Internet and Web…
Descriptors: Computer Mediated Communication, Computer Oriented Programs, Information Technology, Internet
Peer reviewed Peer reviewed
Teo, Thompson, S. H. – Internet Research, 2001
Examines demographic variables (gender, age, educational level) and motivation variables (perceived ease of use, perceived enjoyment, perceived usefulness) associated with Internet usage activities (defined in terms of messaging, browsing, downloading, and purchasing). The questionnaire is appended. (Contains 57 references.) (Author/AEF)
Descriptors: Computer Mediated Communication, Downloading, Electronic Mail, Internet
Peer reviewed Peer reviewed
Pauleen, David J.; Yoong, Pak – Internet Research, 2001
Reports part of a qualitative research study that used participatory action research and grounded action research to show how facilitators of virtual teams build and maintain online relationships. Focuses on how virtual team facilitators use Internet-based and conventional electronic communication channels to build personal relationships with team…
Descriptors: Action Research, Computer Mediated Communication, Internet, Interpersonal Relationship
Peer reviewed Peer reviewed
Martin, Lynn M.; Matlay, Harry – Internet Research, 2001
Outlines the DTI (Department of Trade and Industry) ladder adoption model which represents a limited/limiting vision of government-inspired support for ICT (Information and Communications Technology) implementation and development needs of firms in the small business sector of the UK economy. A more discriminate approach is recommended, focused…
Descriptors: Business, Computer Mediated Communication, Foreign Countries, Internet
Peer reviewed Peer reviewed
Schwartz, David G. – Internet Research, 1998
Examines the use of shared semantics information to link concepts in an organizational memory to e-mail communications. Presents a framework for determining shared semantics based on organizational and personal user profiles. Illustrates how shared semantics are used by the HyperMail system to help link organizational memories (OM) content to…
Descriptors: Computer Mediated Communication, Electronic Mail, Information Dissemination, Information Transfer
Peer reviewed Peer reviewed
Perry, Timothy T.; Perry, Leslie Anne; Hosack-Curlin, Karen – Internet Research, 1998
Surveys were administered to 548 students from three regional universities in the southeastern United States, examining: how many students regularly use the Internet, hours per week regular users spend on the Internet, types of computers used, use of e-mail, use of the Internet to obtain university information, number of students who had home…
Descriptors: College Students, Computer Mediated Communication, Electronic Mail, Higher Education
Peer reviewed Peer reviewed
Ng, T. W. – Internet Research, 1998
Discusses scientific communication (discussion and publication) via print and the Internet, comparing cost, peer review, production speed, and level of interaction and explains why electronic digests appear to provide the best scope in supplanting newsletters, comparing preparation, production, and distribution. (PEN)
Descriptors: Comparative Analysis, Computer Mediated Communication, Electronic Journals, Electronic Publishing
Peer reviewed Peer reviewed
Bell, Hudson; Tang, Nelson K. H. – Internet Research, 1998
A user survey of 60 company Web sites (electronic commerce, entertainment and leisure, financial and banking services, information services, retailing and travel, and tourism) determined that 30% had facilities for conducting online transactions and only 7% charged for site access. Overall, Web sites were rated high in ease of access, content, and…
Descriptors: Banking, Business, Computer Mediated Communication, Financial Services
Previous Page | Next Page ยป
Pages: 1  |  2