NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 12 results Save | Export
Peer reviewed Peer reviewed
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Choo, Chun Wei; Marton, Christine – Internet Research, 2003
Presents findings of a research study on how women in information technology (IT) professions seek information on the Web as part of their daily work. Develops a behavioral model of Web information seeking that identifies four complementary modes of information seeking: undirected viewing, conditioned viewing, informal search, and formal search.…
Descriptors: Data Collection, Females, Information Dissemination, Information Networks
Peer reviewed Peer reviewed
Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Olla, Phillip; Patel, Nayna; Atkinson, Chris – Internet Research, 2003
Reports on a case study at an organization that created MADIC, an innovative approach to developing mobile applications developed by third party independent developer. Presents MMO2's, a conceptual wireless reference model used to define the various system constituents required to create effective mobile applications. (Author/AEF)
Descriptors: Case Studies, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Bouras, C.; Ganos, P.; Karaliotas, A. – Internet Research, 2003
The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…
Descriptors: Computer Networks, Computer System Design, Design Requirements, Information Networks
Peer reviewed Peer reviewed
Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Zubey, Michael L.; Wagner, William; Otto, James R. – Internet Research, 2002
Managers need to understand the tradeoffs associated with voice over Internet protocol (VoIP) networks as compared to the Public Switched Telephone Network (PSTN). This article measures the preference structures between IP telephony and PSTN services using conjoint analysis. The purpose is to suggest VoIP technology attributes that best meet…
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Information Networks, Information Services
Peer reviewed Peer reviewed
Loo, Alfred; Choi, Y. K. – Internet Research, 2002
In peer-to-peer systems, the lack of dedicated links between constituent computers presents a major challenge. Discusses the problems of distributed database operation with reference to an example. Presents two statistical selection algorithms-one for the intranet with broadcast/multicast facilities, the other for Internet without…
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Computer Networks, Databases
Peer reviewed Peer reviewed
Siyal, M. Y.; Barkat, B. – Internet Research, 2002
Presents a framework for enhancing trust in Internet commerce. Shows how trust can be provided through a network of Trust Service Providers (TSp). Identifies a set of services that should be offered by a TSp. Presents a distributed object-oriented implementation of trust services using CORBA, JAVA and XML. (Author/AEF)
Descriptors: Business, Information Industry, Information Networks, Information Services
Peer reviewed Peer reviewed
Yu, Hsiang-Fu; Tseng, Li-Ming – Internet Research, 2002
Approaches to designing a proxy server with Web usage control and to making the proxy server effective on local area networks are proposed to prevent abnormal Web access and to prioritize Web usage. A system is implemented to demonstrate the approaches. The implementation reveals that the proposed approaches are effective, such that the abnormal…
Descriptors: Information Management, Information Networks, Information Systems, Internet
Peer reviewed Peer reviewed
Burgin, Robert – Internet Research, 1996
Because North Carolina's telecommunications services have been unable to provide cost-effective, statewide dial-access service to public libraries, the state library has had to identify a suitable alternative for public library network access. This article outlines the state library's efforts to provide access to the Internet and to electronic…
Descriptors: Access to Information, Cost Effectiveness, Information Networks, Internet
Peer reviewed Peer reviewed
Klobas, Jane E. – Internet Research, 1996
A study of Australian university staff focused on Internet use and the potential impact of network use on librarians. This article reports on innovative uses of the Internet (information transfer, homework, evaluation of course material, reading information from networked resources, electronic journals), users' responses to the Internet, and…
Descriptors: Academic Libraries, Educational Innovation, Electronic Journals, Foreign Countries