Descriptor
Source
Internet Research | 8 |
Author
Atkinson, Chris | 1 |
Choi, Y. K. | 1 |
Chou, David C. | 1 |
Claessens, Joris | 1 |
Diaz, Claudia | 1 |
Dumortier, Jos | 1 |
Goemans, Caroline | 1 |
Hong, Pei-lin | 1 |
Horn, G. | 1 |
Kiani, G. Reza | 1 |
Kroselberg, D. | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Research | 6 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Loo, Alfred; Choi, Y. K. – Internet Research, 2002
In peer-to-peer systems, the lack of dedicated links between constituent computers presents a major challenge. Discusses the problems of distributed database operation with reference to an example. Presents two statistical selection algorithms-one for the intranet with broadcast/multicast facilities, the other for Internet without…
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Computer Networks, Databases

Chou, David C. – Internet Research, 1998
Moving corporate systems onto an intranet will increase the data traffic within the corporate network, which necessitates a high-quality management process to the intranet. Discusses costs and benefits of adopting an intranet, tool availability and selection criteria, and management issues for developing an intranet. (Author/AEF)
Descriptors: Business, Computer Mediated Communication, Computer Networks, Corporations

Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks

Kiani, G. Reza – Internet Research, 1998
Addresses the opportunities offered by the Web to marketers. Considers the Web as a two-way communication model in which four different communication states can take place. Suggests the necessity of new concepts and models for marketers to manage their Web sites, and presents opportunities supporting the marketers' objectives in the new…
Descriptors: Business, Computer Mediated Communication, Computer Networks, Corporations

Zubey, Michael L.; Wagner, William; Otto, James R. – Internet Research, 2002
Managers need to understand the tradeoffs associated with voice over Internet protocol (VoIP) networks as compared to the Public Switched Telephone Network (PSTN). This article measures the preference structures between IP telephony and PSTN services using conjoint analysis. The purpose is to suggest VoIP technology attributes that best meet…
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Information Networks, Information Services

Olla, Phillip; Patel, Nayna; Atkinson, Chris – Internet Research, 2003
Reports on a case study at an organization that created MADIC, an innovative approach to developing mobile applications developed by third party independent developer. Presents MMO2's, a conceptual wireless reference model used to define the various system constituents required to create effective mobile applications. (Author/AEF)
Descriptors: Case Studies, Computer Mediated Communication, Computer Networks, Information Networks

Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design

Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design