Academic literature on the topic 'Fournisseurs de services Internet – France'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Fournisseurs de services Internet – France.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Fournisseurs de services Internet – France"

1

Richebourg, Aube. "Internet non marchand et division du travail militant." Réseaux N° 240, no. 4 (September 21, 2023): 213–40. http://dx.doi.org/10.3917/res.240.0213.

Full text
Abstract:
Les collectifs qui défendent l’existence d’un internet alternatif et non marchand sont souvent présentés par les sciences sociales comme marginaux et inaudibles (Hintz et Milan, 2009 ; Alexandre et al ., 2022). Certes les fournisseurs d’accès à internet (FAI) associatifs demeurent relativement invisibles au niveau national en France, mais le Parlement allemand a reconnu au réseau libre Freifunk un statut d’utilité publique en 2020. Si l’internet non marchand est réservé à une élite compétente, comment expliquer que les destins des infrastructures libres puissent être différents ? Partant du programme d’« ethnographie des infrastructures » (Star, 1999) et d’une enquête auprès de FAI associatifs en France et en Allemagne, nous montrerons que les services alternatifs ont façonné un discours de résistance à l’égard de l’internet commercial qui est entré, dans une certaine mesure, en écho avec les politiques publiques. Nous analysons en particulier le rôle de la division du travail dans le succès de ces collectifs dont la mission porte autant sur la construction d’infrastructures de connexion que sur la formulation d’un discours de plaidoyer en leur faveur. L’accession à une reconnaissance d’utilité publique apparaît corrélée à une division du travail autour de ces deux missions, au sein d’institutions distinctes.
APA, Harvard, Vancouver, ISO, and other styles
2

Hamel, Sophie. "Infrastructures Internet en Océanie." Revue Défense Nationale N° 872, no. 7 (July 10, 2024): 58–64. http://dx.doi.org/10.3917/rdna.872.0058.

Full text
Abstract:
Les infrastructures Internet – essentiellement les câbles sous-marins et la 5G – sont au cœur d’une compétition entre les puissances, principalement les États-Unis et la Chine, leurs fournisseurs de technologies et de services. Les États insulaires du Pacifique (EIP) y voient surtout un catalyseur du développement économique et cherchent à trouver un équilibre entre les différents acteurs, tout en préservant leur souveraineté.
APA, Harvard, Vancouver, ISO, and other styles
3

Jacquin, Clément. "Les services d’hébergement Internet en France." Netcom 17, no. 1 (2003): 23–34. http://dx.doi.org/10.3406/netco.2003.1568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Quairel, Françoise, and Marie-Noëlle Auberger. "La diffusion de la RSE par la relation fournisseurs." Revue internationale P.M.E. 20, no. 3-4 (February 16, 2012): 69–94. http://dx.doi.org/10.7202/1008524ar.

Full text
Abstract:
Les grands textes et références internationales confient aux grandes entreprises la responsabilité de diffuser les valeurs environnementales et sociales dans leur sphère d’influence. Cette vision « messianique » de leur responsabilité les conduit à promouvoir des pratiques RSE au sein de leur chaîne d’approvisionnement, notamment auprès de leurs fournisseurs et sous-traitants PME. Dans une vision managériale, elles demandent à leurs fournisseurs de signer des codes de conduite et autres clauses contractuelles pour se protéger des risques liés à un comportement non responsable. Quelle que soit la vision, les grandes entreprises sont considérées comme des acteurs majeurs de la diffusion de pratiques socialement et environnementalement responsables pour les PME de leur chaîne d’approvisionnement. À partir de cinq études de cas de grands groupes industriels considérés comme socialement responsables et à partir d’une enquête auprès de PME françaises, cet article se propose d’analyser les facteurs, freins ou leviers qui expliquent l’influence exercée sur les PME par la gestion « durable » de la relation fournisseurs. Il cherche à répondre à la question : dans quelle mesure les PME sont-elles poussées à adopter des politiques RSE par les grandes entreprises clientes ? Dans les pays développés comme la France, cette influence est faible, même lorsque les grands clients se disent engagés dans la RSE. Nous avons dégagé les principaux déterminants de cette influence : le degré de formalisation et surtout de contrôle des engagements demandés au fournisseur, le degré des contradictions entre les exigences économiques de prix toujours plus bas et les exigences de conformité avec les codes de conduite ou autres standards, la nature de la relation commerciale entre les acteurs basée sur un rapport de force économique dans une approche de stricte conformité ou basée sur la confiance, les relations personnelles et le partenariat gagnant-gagnant. Les grandes entreprises, même proactives, ne sont que de faibles leviers de la diffusion de la RSE chez leurs fournisseurs PME parce que tous ces facteurs jouent faiblement ou comme des freins, ce qui traduit une mise en œuvre encore très partielle des objectifs annoncés de développement durable au sein des services achat. Les objectifs et l’engagement du chef d’entreprise dans la PME constituent des facteurs clés pour l’adoption de stratégies RSE dans les PME et donc pour aller au-delà de la stricte conformité et transformer les exigences RSE du client en opportunités. Nous proposons huit types de réponses stratégiques des PME fournisseurs aux exigences de leurs clients en fonction des facteurs dégagés ci-dessous.
APA, Harvard, Vancouver, ISO, and other styles
5

Kaabachi, Souheila, Selima Ben Mrad, and Maria Petrescu. "Consumer initial trust toward internet-only banks in France." International Journal of Bank Marketing 35, no. 6 (September 4, 2017): 903–24. http://dx.doi.org/10.1108/ijbm-09-2016-0140.

Full text
Abstract:
Purpose The purpose of this paper is to investigate internet-only banks’ (IOBs) adoption by French consumers and attempt to understand the factors that influence consumers’ initial trust in this type of service. Design/methodology/approach A non-probability convenience sample of potential IOBs adopters from France was used to test a structural equation model that analyzed the antecedents of initial trust and usage intentions of IOBs. Findings The study shows that trust is a major influencer in IOBs’ adoption in France. It has also been found that consumer familiarity with internet banking, high perceived structural assurance, perceived website quality, bank reputation and relative advantage are critical factors influencing IOBs’ initial trust formation. Research limitations/implications This study shows the applicability of the initial trust-building model in the context of IOBs and underlines the importance of factors such as familiarity, reputation and perceived quality in the context of online banking services in France. Practical implications This paper provides e-banking companies with the most important factors that contribute to build the initial trust of customers. E-banks need to focus on making themselves known and promoting their brand more effectively through advertising and advocacy. Originality/value This study contributes significantly to the marketing research related to consumer trust and brand reputation, as well as to the electronic banking literature. The results show the importance of initial trust in the context of services and the main factors that influence it, including a key branding variable such as reputation. The paper also focuses on the IOBs’ adoption in France, a market understudied compared to the USA, and seeks to understand the mechanisms associated with the initial formation of French consumers’ trust toward it.
APA, Harvard, Vancouver, ISO, and other styles
6

Volkmann, Christian. "Trademark Use and Liability of Referencing Service In Keyword Advertising – Google AdWords and Trademark Law." European Journal of Risk Regulation 2, no. 3 (September 2011): 450–54. http://dx.doi.org/10.1017/s1867299x00006887.

Full text
Abstract:
Cases C-236/08 to C-238/08 Google France SARL, Google Inc. v. Louis Vuitton Malletier SA (C.236/08) and Google France SARL v. Viaticum, Luteciel SARL (C-237/08) and Google France SARL v. Centre national de recherche en relations humaines (CNRRH) SARL, Pierre-Alexis Thonet, Bruno Raboin, Tiger SARL (C-238/08)1. The proprietor of a trade mark is entitled to prohibit an advertiser from advertising, on the basis of a keyword identical with that trade mark which that advertiser has, without the consent of the proprietor, selected in connection with an internet referencing service, goods or services identical with those for which that mark is registered, in the case where that advertisement does not enable an average internet user, or enables that user only with difficulty, to ascertain whether the goods or services referred to therein originate from the proprietor of the trade mark or an undertaking economically connected to it or, on the contrary, originate from a third party.
APA, Harvard, Vancouver, ISO, and other styles
7

Jelassi, Kaouther, and Chantal Ammi. "Les services Internet Mobile en France : une proposition de mesure de la continuité d'usage." Management & Avenir 45, no. 5 (2011): 238. http://dx.doi.org/10.3917/mav.045.0238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mougin, Bruno, Jérôme Nicolas, Yannick Vigier, Hélène Bessière, and Stéphane Loigerot. "« MétéEAU Nappes » : un site Internet contenant des services utiles à la gestion des étiages." La Houille Blanche, no. 5 (October 2020): 28–36. http://dx.doi.org/10.1051/lhb/2020045.

Full text
Abstract:
Le site Internet « MétéEAU Nappes » offre un ensemble de services permettant le suivi du comportement actuel et futur des aquifères en France et ainsi la disponibilité de la ressource en eau par anticipation. Il est possible, pour les points de surveillance actuellement proposés et associés à un modèle global, de visualiser les mesures les plus récentes issues du réseau piézométrique national. Ces données sont représentées sous forme de cartes et de courbes issues de travaux de modélisation et de prévision des niveaux des nappes en basses eaux en lien avec des problématiques de sécheresse. Ces prévisions, lancées sur 6 mois, sont comparées à des seuils piézométriques de sécheresse issus des arrêtés préfectoraux de restriction d'usage en cours. Des données météorologiques, hydrologiques et piézométriques sont mises en ligne en temps réel et en format interopérable sur 10 sites représentatifs de France métropolitaine. Les moyens technologiques employés afin d'aboutir à ces services sont : la technologie GPRS (à ce jour déployée sur près de 1400 stations du réseau piézométrique national) permettant de mettre à disposition quotidiennement les données mesurées, ainsi qu'une architecture technique dédiée s'appuyant sur des standards internationaux et sur des technologies récentes permettant le croisement de données temps réel de sources différentes et la valorisation de modélisations déjà effectuées. Le site Internet public ouvrira vraisemblablement en 2020.
APA, Harvard, Vancouver, ISO, and other styles
9

Lallement, Gérard, and Matthias de Jouvenel. "Le Baromètre du numérique." Annales des Mines - Enjeux numériques N° 1, no. 1 (January 24, 2018): 91–97. http://dx.doi.org/10.3917/ennu.001.0091.

Full text
Abstract:
Le Baromètre du numérique est une enquête réalisée annuellement sur les équipements et les usages numériques en France. Elle s’est établie au fil du temps comme une source de référence pour les acteurs intéressés par le numérique (pouvoirs publics, entreprises…). La société française peut être qualifiée de « société numérique » : 76 % des Français se connectent à Internet tous les jours, et 12 % d’entre eux ne sont pas internautes. Le développement du smartphone a explosé en quelques années : désormais, c’est le moyen de connexion à Internet le plus fréquemment utilisé, avant l’ordinateur. Les utilisateurs sont prudents et avertis : le développement du numérique dépend de la confiance dans le numérique (protection des données personnelles, qualité et fiabilité de l’information, sécurité des moyens de paiement…). Internet est devenu une condition d’intégration dans la société : 76 % des personnes se sentent prêtes à adopter de nouvelles technologies ou de nouveaux services numériques.
APA, Harvard, Vancouver, ISO, and other styles
10

Koster, Alexis. "Fighting Internet Piracy: The French Experience With The Hadopi Law." International Journal of Management & Information Systems (IJMIS) 16, no. 4 (September 20, 2012): 327. http://dx.doi.org/10.19030/ijmis.v16i4.7310.

Full text
Abstract:
With the ever-increasing speed of the Internet and the ever-increasing power of personal computers and mobile devices, illegal downloading affects not only recorded music, but also movies and other medias. To stem the loss of revenues caused to copyright holders, France passed the Hadopi Law in September 2009 to be enforced by a new agency - the Hadopi Authority. The Hadopi Authoritys mission includes three major objectives. 1) to enforce the copyright law on the Internet through legal actions against violators, 2) to educate Internet users about illegal versus legal activities with respect to the copyright law, and 3) to facilitate the development of Internet services providing legal access to copyrighted works. To deter piracy and, at the same time, to serve as a pedagogical tool, Hadopi uses the graduated response system. Users who participate in illegal downloading are first warned two times. After a third violation, their file is forwarded to a court for possible prosecution. Between October 2010 and March 2012, the Hadopi Authority performed several surveys of Internet use to measure the effectiveness of the Law. The resulting reports show some modest positive changes in the behavior of French Internet users.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Fournisseurs de services Internet – France"

1

Albrieux, Sandrine. "La responsabilité du fournisseur de moyens de communication électronique." Paris 2, 2004. http://www.theses.fr/2004PA020057.

Full text
Abstract:
Le fournisseur de moyens de communication électronique - qui n'est ni l'auteur, ni l'éditeur des informations circulant sur l'internet mais celui qui offre aux fournisseurs de contenus les instruments permettant ou facilitant la diffusion ou la localisation auprès du public des données qu'ils ont produites - n'a jamais pu se réjouir de pouvoir évoluer dans un espace de " non-droit ". Ses activités n'échappent pas à l'emprise du Droit, lorsqu'il fournit intentionnellement ou imprudemment l'instrument du délit. En dehors des quelques hypothèses où il peut invoquer son irresponsabilité ou une cause d'exonération de responsabilité, consacrées par la loi pour la confiance dans l'économie numérique, il doit répondre de son comportement dommageable pour autrui ou affectant la société. Sa responsabilité peut être engagée au titre de la complicité lorsqu'il participe à l'infraction pénale du fournisseur de contenus sciemment et volontairement, si l'infraction de l'auteur principal reçoit la qualification de délit continu. Son comportement est civilement fautif, lorsqu'il a connaissance ou ne peut ignorer l'illicéité du contenu qu'il transmet, héberge, référence ou dont il facilite l'échange et n'agit pas promptement pour le retirer du réseau ou en rendre l'accès impossible, laissant ainsi perdurer l'acte dommageable qu'il pouvait empêcher ou faire cesser. Mais dans un univers transcendant les frontières, la mise en œuvre de la réponse judiciaire peut s'avérer délicate et la dette du fournisseur de moyens établi à l'étranger demeurer inexécutée, car l'autorité des décisions françaises ne possède pas une valeur internationale s'imposant aux autorités étrangères
The supplier of electronic ways of communication - who is not the author nor the editor of the informations circulating on internet, but the person who offers to the suppliers of contents the instruments permitting or facilitating the diffusion or the localization to the public of the information they have produced - has never been able to evolve in a " no-go area". His activities do not escape the rulings of the law when he supplies intentionally or unwisely the cause of the offence. Apart a few assumptions where he can put forward his irresponsibility or exemption of responsibility, dedicated by law for the trust in digital economy, he must answer for his harmful attitude towards others or affecting society. His responsibility can be committed as conniving when he is part of the criminal offense of the supplier of contents knowlingly and voluntarily, providing that the offense of the principal author receive the qualification of continuous offense. His attitude is reprehensible from then on he has the knowledge or could not ignore the illicitness of the content being transmitted by him, housed, reference of which is facilitated and do not act promptly to withdraw it from the network or to make access impossible, letting in this way continue the harmful action he could prevent or stop. But in a universe transcending the frontiers, the implementation of the judicial answer can be delicate and the debt of the supplier of electronic ways of communication settled abroad stand unfulfilled, because the authority of the French decisions does not have an international value as to impress the foreign authorities
APA, Harvard, Vancouver, ISO, and other styles
2

El, Hayek Audine. "La responsabilité des intermédiaires de l'internet." Nantes, 2006. http://www.theses.fr/2006NANT4016.

Full text
Abstract:
Le contenu diffusé sur Internet peut donner lieu à certaines responsabilités lorsqu'il est jugé préjudiciable. L'auteur du contenu peut bénéficier de l'anonymat, être impossible à trouver ou insolvable. C'est en partant de ce constat que les victimes et les juges se sont retournés vers les intermédiaires techniques de l'Internet. En tant que professionnels, il est important d'encadrer leurs activités. Trois catégories sont généralement retenues : les fournisseurs d'hébergement, les fournisseurs d'accès, et les activités de "caching". Ce fut logiquement au juge d'apprécier les premiers litiges impliquant un intermédiaire de l'Internet et ainsi de poser les premiers jalons d'une nouvelle responsabilité. Dans ce contexte le législateur intervient pour tenter de concilier les pratiques nouvelles avec la règle de droit. En France la LCEN du 21 juin 2004 a consacré une exonération sauf quelques exceptions. C'est la connaissance de l'existence du contenu critiquable sur le réseau qui constitue la pierre d'édifice de l'imputation de la responsabilité. Une procédure de notification est établie pour prouver cette connaissance. Cependant , les problématiques posées sur Internet ne sont pas seulement nationales car le réseau ne s'arrête pas aux frontières des pays. Ainsi se posent les problèmes de la désignation du juge compétent et de la loi applicable. A ces deux sujets de droit international privé, s'ajoute celui de la reconnaissance et de l'exécution de la décision étrangère. Ainsi, une harmonisation mondiale des législations concernant la responsabilité des intermédiaires de l'Internet reste la solution la plus adéquate pour résoudre les problèmes provoqués par ce réseau.
APA, Harvard, Vancouver, ISO, and other styles
3

Richebourg, Aube. "L'internet associatif en France et en Allemagne : sociologie d'une rémanence utopique." Electronic Thesis or Diss., Paris, EHESS, 2024. http://www.theses.fr/2024EHES0134.

Full text
Abstract:
À la marge de la révolution numérique, inconnu·es du grand public, des bénévoles continuent depuis trente ans, d’administrer et de fournir des services internet non lucratifs. Ces associations, parfois très anciennes, cherchent à faire vivre l’utopie organisationnelle qui remonte aux débuts du réseau et les valeurs qui s’y rattachent. Mais qu’est-ce qui pousse encore des bénévoles à défendre cette cause perdue ? Quelle fonction remplit leur engagement ? Comment le situer dans l’évolution d’internet ces trente dernières années ?Cette thèse propose une analyse sociologique de la « pratique utopique » et des conditions de sa « rémanence » à partir d’une enquête comparée entre la France et l’Allemagne, croisant ethnographie et travail d’archives. Grâce à la perspective de l’analyse configurationnelle empruntée à Norbert Elias, on expliquera comment la capacité conservatrice et adaptative de ce mouvement associatif répond aux frustrations relatives des déçu·es de la révolution numérique, en croisant les niveaux d’analyse structurel, organisationnel et individuel.La thèse commence par retracer la sociogenèse de l’internet associatif dans les années 1990, entre pratiques pionnières, marginalisation économique et insertion discrète dans les politiques publiques locales de la connexion. C’est dans les années 2000 que l’activité associative s’est « utopisée », sous l’action d’« entrepreneurs d’utopie », à la marge de l’espace du militantisme pour la défense des droits et libertés numériques alors émergent. Ensuite, sur le plan organisationnel, la thèse montre comment les associations de l’internet ont été travaillées de l’intérieur par les vagues successives de bénévoles investissant, en fonction de leurs socialisations propres à internet, un sens de la cause et un modèle d’organisation correspondant.Enfin, sur le plan individuel, grâce à une division du travail utopique permettant d’exercer autrement son métier, l’engagement dans ces associations a comporté des rétributions tant pour les pionniers que pour les bénévoles plus tardifs. Trait d’union entre des socialisations alternatives constituantes du rapport à l’apprentissage, désir d’autonomie, de liberté et de sécurité, les associations créent les conditions d’une utopie individuelle pour ceux, et plus rarement celles, qui parviennent à s’y intégrer, compensant les rapports de force dont ils et elles font par ailleurs l’expérience au travail.Ainsi, tout en organisant la conservation de pratiques pré-marchandes de collaborationentre pairs, l’internet associatif offre des voies de transformations à ses adeptes, notamment sur le plan du rapport individuel et collectif à l’activité. La comparaison permet de saisir quant à elle les contours d’une utopie internet européenne et ce que la diversité des pratiques utopiques doit aux structures nationales de pouvoir, notamment en matière de régulation du marché des télécommunications. Au-delà d’une perspective normative voyant dans l’utopie en société un facteur de changement univoque ou un système d’idées opposé aux fictions conservatrices, tourné vers une société meilleure, cette thèse entend contribuer à la compréhension sociologique des phénomènes utopiques à partir des logiques pratiques
On the fringes of the digital revolution, unknown to the general public, volunteers have been administering and providing non-profit Internet services for thirty years. These associations, some of them very old, are trying to keep alive the organisational utopia that dates back to the beginnings of the network and the values associated with it. But what is it that still drives volunteers to defend this lost cause? What function does their commitment fulfil? And how does it fit into the evolution of the internet over the last thirty years?This thesis offers a sociological analysis of the “utopian practice” and the conditions of its persistence, based on a comparative survey between France and Germany combining ethnography and archival work. Using the perspective of configuration analysis borrowed from Norbert Elias, we will explain how the conservative and adaptive capacity of this associative movement responds to the relative frustrations of those disappointed by the digital revolution, by crossing structural, organisational and individual levels of analysis.The thesis begins by tracing the sociogenesis of the associative Internet in the 1990s, between pioneering practices, economic marginalisation and discreet insertion into local public connection policies. It was in the 2000s that associative activity became ‘utopian’, through the actions of ‘utopian entrepreneurs’, on the fringes of the then emerging activism in defence of digital rights and freedoms. Secondly, the thesis shows, from an organisational point of view, how Internet associations were shaped from the inside by successive waves of volunteers who, according to their own socialisation on the Internet, invested in a sense of the cause and a corresponding organisational model. Finally, on an individual level, thanks to a utopian division of labour that enabled people to practise their profession in a different way, we will explain how involvement in these associations was rewarded for pioneers and later volunteers alike. As a link between the alternative socialisations that make up the relationship to learning, the desire for autonomy, freedom and security, the associations create the conditions for an individual utopia for those who manage to join them, compensating for the power relationships they experience at work.So, while organising the preservation of pre-market practices of collaboration between peers, the associative internet offers its followers avenues of transformation, particularly regarding the individual and collective relationship to activity. The comparison enables us to grasp the contours of a European Internet utopia and what the diversity of utopian practices owes to national power structures, particularly regarding regulation of the telecommunications market. Beyond a normative perspective that sees utopia in society as a factor for unambiguous change, or as a system of ideas opposing conservative fictions and geared towards a better society, this thesis aims to contribute to a sociological understanding of utopian phenomena based on an analysis of their logical practices
APA, Harvard, Vancouver, ISO, and other styles
4

Marchet, Nathalie. "La responsabilité civile des intermédiaires techniques de l'Internet." Toulouse 1, 2003. http://www.theses.fr/2003TOU10056.

Full text
Abstract:
Les décisions jurisprudentielles et les textes législatifs se sont multipliés ces dernières années pour essayer de résoudre l'épineux problème de la responsabilité des intermédiaires techniques de l'Internet. Les voix se sont levées haut et fort pour débattre principalement du sort du fournisseur d'hébergement, laissant ainsi planer l'incertitude de la mise en oeuvre de la responsabilité d'autres intermédiaires. Les États-Unis ont anticipé les difficultés en adoptant, en 1998, le DMCA qui consacre un principe général d'exonération. L'Union européenne a tenté de s'aligner sur la législation américaine en établissant des principes directeurs communs aux pays d'Europe. La France, restée en retrait, s'est dotée d'une législation peu satisfaisante qui a été farouchement critiquée par les professionnels de l'Internet. D'ailleurs, la loi nʿ2000-719 du 1er août 2000 est actuellement en voie de refonte. Notre expérience au sein du centre d'expertise CELOG et auprès de l'Agence pour la Protection des Programmes nous a permis de contribuer à la réflexion sur la mise en œuvre de la responsabilité civile des cinq catégories principales d'intermédiaires techniques
In an attempt to solve the delicate issue of responsability for the service providers on the internet, many case laws and new statutes have been published over the last few years. A strongly opinionated discussion has broken out, questioning the future of Storage Service Providers, raising doubts about the amount of responsability taken by other Internet third parties. The United States of America have anticipated this issue as early as 1998 by voting the DMCA based on a general principal of limitation on liability relating to material on line. The EU tried to follow the American way, setting up some common rules for all European countries. France is still far behind after passing a legislation (08/01/00) which was little satisfaying and heavily criticised by the professioals of the Internet industry. However this legislation is presently being looked into and changed accordingly. Our experience within the Expert center CELOG, together with the agency for the Protection of Programs, enabled us to work on the civil responsabilities for the five main categories of service providers which role more or less involve an access to the information available
APA, Harvard, Vancouver, ISO, and other styles
5

Biri, Aroua. "Proposition de nouveaux mécanismes de protection contre l'usurpation d'identité pour les fournisseurs de services Internet." Thesis, Evry, Institut national des télécommunications, 2011. http://www.theses.fr/2011TELE0009/document.

Full text
Abstract:
De plus en plus d’organisations sont informatisées et plus une organisation est grande, plus elle peut être la cible d’attaques via Internet. On note également que les internautes utilisent de plus en plus Internet pour faire des achats sur des sites de commerce électronique, pour se connecter à l’administration en ligne, pour voter de manière électronique, etc. Par ailleurs, certains d’entre eux ont de plus en plus d'équipements électroniques qui peuvent être raccordés à Internet et ce dans divers sites (domicile, voiture, lieu de travail, etc.). Ces équipements forment ce qu’on appelle un réseau personnel qui permet la mise en place de nouvelles applications centrées sur l’internaute. Les fournisseurs de services Internet peuvent ainsi étoffer leurs offres de services en présentant une offre de sécurisation de ce genre de réseau. Selon le rapport du cabinet « Arbor Networks » intitulé « Worldwide Infrastructure Security Report », les menaces identifiées comme les plus sévères sont relatives aux attaques de déni de service distribué. Ce type d’attaque a pour but de rendre indisponible un service en empêchant les utilisateurs légitimes de l'utiliser. Il utilise la technique de l’usurpation d’identité qui consiste en la création de paquets (de type IP, ARP, etc.) avec une adresse source forgée et ce dans le but d’usurper un système informatique ou d’usurper l’identité de l’émetteur. La technique de l’usurpation d’identité permet ainsi de rendre un service indisponible, d’écouter, de corrompre, de bloquer le trafic des internautes ou de nuire au bon fonctionnement des protocoles de routage et des réseaux personnels des clients. De plus, la technique de l’usurpation d’identité est également utilisée pour des activités interdites par la loi « Hadopi » en rigueur en France comme le téléchargement illégal. De ce fait, les fournisseurs de services Internet se doivent de prémunir leurs clients des attaques basées sur la technique de l’usurpation d’identité. Ces dits fournisseurs comptent sur les protocoles de routage qu’ils déroulent pour participer au bon acheminement des données de leurs clients. Cependant, le protocole intra-domaine OSPF et le protocole inter-domaine BGP sont vulnérables aux attaques utilisant la technique de l’usurpation d’identité qui peuvent conduire à l’acheminement des paquets vers des destinataires non légitimes ou au déni de service. Nous proposons donc deux mécanismes dédiés respectivement au protocole intra-domaine OSPF et au protocole inter-domaine BGP. D’une part, afin de protéger les routeurs OSPF contre les attaques utilisant la technique d’usurpation d’identité, nous avons préconisé le stockage de l’identité et du matériel cryptographique dans un coffre-fort électronique que sont les cartes à puce. Les cartes déroulent ensuite un algorithme de dérivation de clés avec les cartes des routeurs voisins ainsi qu’avec celle du routeur désigné. Les clés dérivées entre les cartes à puce servent à signer les messages OSPF et à authentifier le niveau MAC. Nous avons décrit par la suite la plateforme du démonstrateur et les scénarios de tests adoptés pour évaluer les performances de notre prototype et les comparer avec ceux du logiciel Quagga sur la base de trois critères : le temps requis pour traiter une annonce d'état de liens, le temps de convergence ainsi que le temps de re-calcul d’une table de routage après un changement. Ces temps augmentent peu avec l’introduction de la carte à puce implémentant les fonctions de sécurité proposées. Ainsi, cette solution permet de renforcer la sécurité du protocole OSPF avec un impact raisonnable sur les performances. D’autre part, afin de protéger les routeurs BGP contre les attaques utilisant la technique d’usurpation d’identité, nous avons préconisé la « clustérisation » des domaines Internet et la sécurisation des liens entre les clusters ainsi qu’au sein de chacun d’eux grâce aux paradigmes de « web of trust » et de la cryptographie sans certificats […]
More and more organizations are computerized and more an organization is great, plus it can be the target of Internet attacks. Moreover, some of them have a growing number of electronic equipments that can be connected to the Internet from various locations (home, car, workplace, etc.). These devices form a so-called personal area network that allows the development of new applications centered on users. The ISPs can then expand their service offerings by providing a secure supply of such networks. According to the report of the firm “Arbor Networks”, entitled "Worldwide Infrastructure Security Report ", the most severe threats are related to distributed denial of service. This type of attack aims to make available a service by preventing legitimate users from using it. It uses the technique of identity theft that involves the creation of packages (like IP, ARP, etc.) with a forged source address and that in order to usurp the Identity of the issuer or of the computer system. Thus, the technique of identity theft allows to render a service unavailable, to listen, to corrupt, to block traffic from Internet users or to undermine the legitimate operation of routing protocols and personal networks. Moreover, the technique of identity theft is also used for prohibited activities by "HADOPI" law in France and related to illegal downloading issues. Thus, the ISPs have a duty to protect their customers from attacks based on the technique of identity theft. The mechanisms of protection against spoofing attacks for access networks are crucial for customer adoption of new applications offered by Internet service providers. This part of the doctoral thesis is part of the European project “MAGNET Beyond" whose vision is to put into practice the concept of personal networks, with the ultimate objective to design, develop, prototype and validate the concept. In the context of user equipment’s access to the network of an Internet services provider from a public place, we proposed a cross-layer protocol based on the principles of information theory. This protocol fixes the security hole not addressed by other proposals that is the attack of identity theft that occurs at the beginning of communication and thus protects users against the middle man attacks. We proposed that the person who wants to have secure access to the Internet must be on a specific circle has been called "RED POINT" so that the attacker is not able to be on the same circle at the same time. The proposed cross-layer protocol can be divided into three phases: the phase of checking the position of the user, the extraction phase of the shared secret of the physical layer and the phase of the derivation of the shared key at the MAC layer. We subsequently validated our solution through a formal tool AVISPA and presented the results of its implementation. In a private context, communication between devices convey users' personal data which may be confidential, so we must prevent equipment not belonging to the legitimate user to access its network. Thus, we proposed two mechanisms of protection against attacks based on spoofing so that illegitimate equipment is unable to impersonate legitimate equipment. The first phase will be dedicated to personal networks and the second will be dedicated to the particular case of medical networks. Regarding the mechanism dedicated to personal networks, we have proposed the use of a protocol based on out-of-band channel in order to provide certificates to user equipments. We derive bilateral key for personal network’s equipments of the same site and between equipments at remote sites. Concerning the particular case of medical networks, we proposed to cover their deployment phases and their operational phases. This proposal was submitted to the IEEE 802.15.6 working group that conducts research for the standardization of medical networks […]
APA, Harvard, Vancouver, ISO, and other styles
6

Biri, Aroua. "Proposition de nouveaux mécanismes de protection contre l'usurpation d'identité pour les fournisseurs de services Internet." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2011. http://www.theses.fr/2011TELE0009.

Full text
Abstract:
De plus en plus d’organisations sont informatisées et plus une organisation est grande, plus elle peut être la cible d’attaques via Internet. On note également que les internautes utilisent de plus en plus Internet pour faire des achats sur des sites de commerce électronique, pour se connecter à l’administration en ligne, pour voter de manière électronique, etc. Par ailleurs, certains d’entre eux ont de plus en plus d'équipements électroniques qui peuvent être raccordés à Internet et ce dans divers sites (domicile, voiture, lieu de travail, etc.). Ces équipements forment ce qu’on appelle un réseau personnel qui permet la mise en place de nouvelles applications centrées sur l’internaute. Les fournisseurs de services Internet peuvent ainsi étoffer leurs offres de services en présentant une offre de sécurisation de ce genre de réseau. Selon le rapport du cabinet « Arbor Networks » intitulé « Worldwide Infrastructure Security Report », les menaces identifiées comme les plus sévères sont relatives aux attaques de déni de service distribué. Ce type d’attaque a pour but de rendre indisponible un service en empêchant les utilisateurs légitimes de l'utiliser. Il utilise la technique de l’usurpation d’identité qui consiste en la création de paquets (de type IP, ARP, etc.) avec une adresse source forgée et ce dans le but d’usurper un système informatique ou d’usurper l’identité de l’émetteur. La technique de l’usurpation d’identité permet ainsi de rendre un service indisponible, d’écouter, de corrompre, de bloquer le trafic des internautes ou de nuire au bon fonctionnement des protocoles de routage et des réseaux personnels des clients. De plus, la technique de l’usurpation d’identité est également utilisée pour des activités interdites par la loi « Hadopi » en rigueur en France comme le téléchargement illégal. De ce fait, les fournisseurs de services Internet se doivent de prémunir leurs clients des attaques basées sur la technique de l’usurpation d’identité. Ces dits fournisseurs comptent sur les protocoles de routage qu’ils déroulent pour participer au bon acheminement des données de leurs clients. Cependant, le protocole intra-domaine OSPF et le protocole inter-domaine BGP sont vulnérables aux attaques utilisant la technique de l’usurpation d’identité qui peuvent conduire à l’acheminement des paquets vers des destinataires non légitimes ou au déni de service. Nous proposons donc deux mécanismes dédiés respectivement au protocole intra-domaine OSPF et au protocole inter-domaine BGP. D’une part, afin de protéger les routeurs OSPF contre les attaques utilisant la technique d’usurpation d’identité, nous avons préconisé le stockage de l’identité et du matériel cryptographique dans un coffre-fort électronique que sont les cartes à puce. Les cartes déroulent ensuite un algorithme de dérivation de clés avec les cartes des routeurs voisins ainsi qu’avec celle du routeur désigné. Les clés dérivées entre les cartes à puce servent à signer les messages OSPF et à authentifier le niveau MAC. Nous avons décrit par la suite la plateforme du démonstrateur et les scénarios de tests adoptés pour évaluer les performances de notre prototype et les comparer avec ceux du logiciel Quagga sur la base de trois critères : le temps requis pour traiter une annonce d'état de liens, le temps de convergence ainsi que le temps de re-calcul d’une table de routage après un changement. Ces temps augmentent peu avec l’introduction de la carte à puce implémentant les fonctions de sécurité proposées. Ainsi, cette solution permet de renforcer la sécurité du protocole OSPF avec un impact raisonnable sur les performances. D’autre part, afin de protéger les routeurs BGP contre les attaques utilisant la technique d’usurpation d’identité, nous avons préconisé la « clustérisation » des domaines Internet et la sécurisation des liens entre les clusters ainsi qu’au sein de chacun d’eux grâce aux paradigmes de « web of trust » et de la cryptographie sans certificats […]
More and more organizations are computerized and more an organization is great, plus it can be the target of Internet attacks. Moreover, some of them have a growing number of electronic equipments that can be connected to the Internet from various locations (home, car, workplace, etc.). These devices form a so-called personal area network that allows the development of new applications centered on users. The ISPs can then expand their service offerings by providing a secure supply of such networks. According to the report of the firm “Arbor Networks”, entitled "Worldwide Infrastructure Security Report ", the most severe threats are related to distributed denial of service. This type of attack aims to make available a service by preventing legitimate users from using it. It uses the technique of identity theft that involves the creation of packages (like IP, ARP, etc.) with a forged source address and that in order to usurp the Identity of the issuer or of the computer system. Thus, the technique of identity theft allows to render a service unavailable, to listen, to corrupt, to block traffic from Internet users or to undermine the legitimate operation of routing protocols and personal networks. Moreover, the technique of identity theft is also used for prohibited activities by "HADOPI" law in France and related to illegal downloading issues. Thus, the ISPs have a duty to protect their customers from attacks based on the technique of identity theft. The mechanisms of protection against spoofing attacks for access networks are crucial for customer adoption of new applications offered by Internet service providers. This part of the doctoral thesis is part of the European project “MAGNET Beyond" whose vision is to put into practice the concept of personal networks, with the ultimate objective to design, develop, prototype and validate the concept. In the context of user equipment’s access to the network of an Internet services provider from a public place, we proposed a cross-layer protocol based on the principles of information theory. This protocol fixes the security hole not addressed by other proposals that is the attack of identity theft that occurs at the beginning of communication and thus protects users against the middle man attacks. We proposed that the person who wants to have secure access to the Internet must be on a specific circle has been called "RED POINT" so that the attacker is not able to be on the same circle at the same time. The proposed cross-layer protocol can be divided into three phases: the phase of checking the position of the user, the extraction phase of the shared secret of the physical layer and the phase of the derivation of the shared key at the MAC layer. We subsequently validated our solution through a formal tool AVISPA and presented the results of its implementation. In a private context, communication between devices convey users' personal data which may be confidential, so we must prevent equipment not belonging to the legitimate user to access its network. Thus, we proposed two mechanisms of protection against attacks based on spoofing so that illegitimate equipment is unable to impersonate legitimate equipment. The first phase will be dedicated to personal networks and the second will be dedicated to the particular case of medical networks. Regarding the mechanism dedicated to personal networks, we have proposed the use of a protocol based on out-of-band channel in order to provide certificates to user equipments. We derive bilateral key for personal network’s equipments of the same site and between equipments at remote sites. Concerning the particular case of medical networks, we proposed to cover their deployment phases and their operational phases. This proposal was submitted to the IEEE 802.15.6 working group that conducts research for the standardization of medical networks […]
APA, Harvard, Vancouver, ISO, and other styles
7

Kyeongja, Lee Toguyeni Abdoul Karim Armand Rahmani Ahmed. "Modèle global pour la Qualité de Service dans les réseaux de FAI intégration de DiffServ et de l'ingénierie de trafic basée sur MPLS /." Villeneuve d'Ascq : Université des sciences et technologies de Lille, 2008. https://iris.univ-lille1.fr/dspace/handle/1908/1057.

Full text
Abstract:
Reproduction de : Thèse de doctorat : Automatique et informatique industrielle : Villeneuve d'Ascq, Ecole centrale de Lille : 2006.
Texte en anglais. Résumé en français et en anglais. Titre provenant de la page de titre du document numérisé. Bibliogr. p. [131]-140.
APA, Harvard, Vancouver, ISO, and other styles
8

Mignard, Jean-Pierre. "Cybercriminalité et cyber-répression entre désordre et harmonisation mondiale." Paris 1, 2004. http://www.theses.fr/2004PA010310.

Full text
Abstract:
Internet est le support technologique mondial de la liberté de communication. Le réseau est aussi un espace où des comportements illicites ou illégaux, ou simplement préjudiciables constituent des abus à la liberté d'expression. Les réglementations étatiques pénales nationales apportent des réponses diverses voire divergentes à la cybercriminalité. Les politiques criminelles observables dans le cyberespace relèvent de deux modèles. L'un de type Etat / société démocratique, l'autre de type Etat autoritaire. L'équilibre entre la liberté et la répression de ces abus conditionne la sécurité juridique des Internautes. L'élaboration de la politique criminelle française, judiciaire et législative, traduit la complexité de l'élaboration d'une politique criminelle nationale du cyberespace. Les systèmes juridiques de l'Union Européenne et du Conseil de l'Europe, des Etats-Unis, de la République Populaire de Chine témoignent des limites ou des impasses nées des conflits de lois, de la souveraineté des Etats et de la multiplicité des normes. Internet est un bien public-collectif mondial dont la protection nécessite une politique criminelle mondiale. La coopération des Etats, des acteurs économiques et de la société civile est indispensable à l'harmonisation minimale des politiques criminelles nationales aux fins de parvenir à une régulation pertinente du cyberespace. Cette harmonisation exige la définition d'un cadre juridique international.
APA, Harvard, Vancouver, ISO, and other styles
9

Chahine, Rony. "Services multi-fournisseurs et trans-réseaux : mécanismes pour un plan contrôle global, application à un nouveau paradigme de signalisation et aux médiateurs de signalisation /." Paris : École nationale supérieure des télécommunications, 2007. http://catalogue.bnf.fr/ark:/12148/cb41024516r.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chahine, Rony. "Services multi-fournisseurs et trans-réseaux : mécanismes pour un plan contrôle global : application à un nouveau paradigme de signalisation et aux médiateurs de signalisation." Phd thesis, Télécom ParisTech, 2006. http://pastel.archives-ouvertes.fr/pastel-00002128.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Fournisseurs de services Internet – France"

1

Arnaud, Michel. Les espaces publics d'accès à Internet: Réalités et devenir d'une nouvelle géographie des territoires et des réseaux. Paris: Presses universitaires de France, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arnaud, Michel, and Jacques Perriault. Les Espaces publics d'accès à Internet. Presses Universitaires de France - PUF, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lessard, Bill, and Steve Baldwin. NetSlaves: True Tales of Working the Web. McGraw-Hill Companies, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lessard, Bill, and Steve Baldwin. NetSlaves: True Tales of Working the Web. McGraw-Hill Companies, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Telecom Extreme Transformation: The Road to a Digital Service Provider. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Braun, Harald, Kaveh Hushyar, and Hossein Eslambolchi. Telecom Extreme Transformation: The Road to a Digital Service Provider. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Braun, Harald, Kaveh Hushyar, and Hossein Eslambolchi. Telecom Extreme Transformation: The Road to a Digital Service Provider. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Service Providers ASPs, ISPs, MSPs, NSPs, and WSPs: A Wiley Tech Brief. John Wiley & Sons, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

P'ŭllaetp'om cheguk ŭi t'ansaeng kwa pŭraendŭ ŭi mirae: K'up'ang, Neibŏ, Paemin poda mŏnjŏ ch'annŭn pŭraendŭ nŭn muŏt i tarŭn'ga. Sŏul-si: Mirae ŭi Ch'ang, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Allen, Jonathan P. Digital Entrepreneurship. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Fournisseurs de services Internet – France"

1

Çag̃layan, Mehmet Ufuk. "AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results." In Communications in Computer and Information Science, 1–12. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_1.

Full text
Abstract:
AbstractThis article summarizes briefly the contributions presented in this EuroCyberSecurity Workshop 2021 which is organized as part of the series of International Symposia on Computer and Information Sciences (ISCIS), with the support of the European Commission funded IoTAC Project, that was held on November and in NIce, France, and sponsored by the Institute of Teoretical and Applied Informatics of the Polish Academy of Sciences. It also summarizes some of the research contributions of several EU Projects including NEMESYS, GHOST, KONFIDO, SDK4ED and IoTAC, primarily with a cybersecurity and Machine Learning orientation. Thus subjects covered include the cybersecurity of Mobile Networks and of the Internet of Things (IoT), the design of IoT Gateways and their performance, the security of networked health systems that provide health services to individuals across the EU Member states, as well as the issues of energy consumption by ICT which are becoming increasingly important, including in the cybersecurity perspective, as we focus increasingly on climate change and the needed transition towards highly reduced emissions. Many of the techniques and results discussed in this article are based either on Machine Learning (ML) methods, or on methods for the performance modeling and optimization of networked and distributed computer systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Bernier, Gwenaëlle. "France: Invoicing and E-Commerce: What Are the Tax Constraints? Is Electronic Invoicing the Best Solution?" In Global E-Business Law & Taxation, 129–41. Oxford University PressNew York, NY, 2009. http://dx.doi.org/10.1093/oso/9780195367218.003.0008.

Full text
Abstract:
Abstract When a company reaches the point where all its transactions are conducted on the Internet (prospecting, selling, and, for intangible services or goods, even delivering), the temptation grows even stronger to think that it can simply do away with all its paper-filing requirements and other obligations that compel it to issue paper documents (e.g., invoices) to its customers.
APA, Harvard, Vancouver, ISO, and other styles
3

i Martinez, Agustí Cerrill. "Accessing Administration's Information via Internet in Spain." In Global Information Technologies, 2558–73. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch186.

Full text
Abstract:
Information in the hands of public administrations plays a fundamental role in developing democracies and carrying out daily tasks—not only the public administrations’ tasks, but also those of the general public and companies (European Commission, 1998). New information and communications technologies (ICT) are vastly increasing the range of information in the hands of the general public and considerably diversifying both quantitatively and, above all, qualitatively the tools for conveying this, with the Internet being the means chosen by Organisation for Economic Co-Operation and Development (OECD) Member States to provide the general public with access to the information held by the administration (OECD, 2003). Nowadays, public administrations create, collect, develop and disseminate large amounts of information: business and economic information, environmental information, agricultural information, social information, legal information, scientific information, political information and social information. Access to information is the first step towards developing e-governments and is something that has grown most in recent years, not only from the viewpoint of supply but also of demand. At present, most people using e-government do so to obtain information from public administrations. Throughout history, information has not always had the same relevance or legal acknowledgement in the West. Bureaucratic public administrations had no need to listen to the general public nor notify citizens of their actions. Hence, one of the bureaucratic administration’s features was withholding the secret that it had legitimized, since this was considered the way to maintain the traditional system of privileges within the bureaucratic institution—by making control and responsibility for information difficult, and also by allowing the public administration to free itself of exogenous obstacles (Arteche, 1984; Gentot, 1994). In most European countries, except the Nordic countries (Sweden, Norway, Finland), secrets were the dominant principle. For instance, it was not until 1978 that France passed a law concerning access to public sector information; in 1990, Italy did likewise. Crises in the bureaucratic model of public administration have brought with them the existence of new models. Receptivity, focusing on the client and quality management, have been some responses to the crisis of this model in the 1980s and 1990s, since the advent of the post-bureaucratic paradigm ( Mendieta, 1996; Behn, 1995). The process of modernizing Public administrations has meant that those governed have come to be considered clients of these administrative services (Brugué, Amorós, & Gomà, 1994). Citizens, considered as clients, now enjoy a revitalized status as seen from public administrations, which provides citizens with a wide range of rights and powers in order to carry out their needs, including obtaining information from the administration (Chevalier, 1988). This process has coincided over the years with the rules regulating access to public-sector information being extended in countries of the West. But the evolution does not stop here. Societies that are pluralist, complex and interdependent require new models of public administration that allow the possibility of responding and solving present challenges and risks (Kooiman, 1993; OECD, 2001b). Internet administration represents a model of public administration based on collaboration between the administration and the general public. It has brought about a model of administration that was once hierarchical to become one based on a network in which many links have been built between the different nodes or main active participants, all of whom represent interests that must be included in the scope of general interest due to the interdependence existing between them (Arena, 1996). The way the administration is governed online requires, first and foremost, information to be transparent, with the aim of guaranteeing and facilitating the participation of all those involved (European Commission, 2001). It is essential that all those involved in the online process are able to participate with as much information as possible available. Information is an indispensable resource for decision-making processes. The strategic participants taking part in these will consider the information as an element upon which they may base their participation online. Information becomes a resource of power that each participant may establish, based on other resources he or she has available, and this will influence their strategies in the Internet. This allows us to see that the networks distributing information may be asymmetrical, which leads to proposing a need to adopt a means to confront this asymmetrical information. In this task, ICT can be of great help with the necessary intervention of law. Public-sector information has an important role in relation with citizens’ rights and business. Public administration also needs information to achieve its goals.
APA, Harvard, Vancouver, ISO, and other styles
4

Kaspar, Christian, Florian Resatsch, and Svenja Hagenhoff. "Basic Concepts of Mobile Radio Technologies." In Networking and Telecommunications, 562–70. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch036.

Full text
Abstract:
Mobile radio technologies have seen a rapid growth in recent years. Sales numbers and market penetration of mobile handsets have reached new heights worldwide. With almost two billion GSM users in June 2006, and 74.7 million users of third generation devices, there is a large basis for business and product concepts in mobile commerce (GSM Association, 2006). Penetration rates average 80%, even surpassing 100% in some European countries (NetSize, 2006). The technical development laid the foundation for an increasing number of mobile service users with high mobile Web penetrations. The highest is seen in Germany and Italy (34% for each), followed by France with 28%, while in the U.S., 19% account for mobile internet usage (ComScore, 2006). One of the largest growing services is mobile games, with 59.9 million downloaded in 2006 (Telephia, 2006). Compared to the overall availability of handsets, the continuing high complexity and dynamic of mobile technologies accounts for limited mobile service adoption rates and business models in data services. Therefore, particular aspects of mobile technologies as a basis of promising business concepts within mobile commerce are illustrated in the following on three different levels: First on the network level, whereas available technology alternatives for the generation of digital radio networks need to be considered; second, on the service level, in order to compare different transfer standards for the development of mobile information services; third, on the business level, in order to identify valuable application scenarios from the customer point of view.
APA, Harvard, Vancouver, ISO, and other styles
5

Kaspar, Christian, Florian Resatsch, and Svenja Hagenhoff. "Basic Concepts of Mobile Radio Technologies." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 113–20. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch016.

Full text
Abstract:
Mobile radio technologies have seen a rapid growth in recent years. Sales numbers and market penetration of mobile handsets have reached new heights worldwide. With almost two billion GSM users in June 2006, and 74.7 million users of third generation devices, there is a large basis for business and product concepts in mobile commerce (GSM Association, 2006). Penetration rates average 80%, even surpassing 100% in some European countries (NetSize, 2006). The technical development laid the foundation for an increasing number of mobile service users with high mobile Web penetrations. The highest is seen in Germany and Italy (34% for each), followed by France with 28%, while in the U.S., 19% account for mobile internet usage (ComScore, 2006). One of the largest growing services is mobile games, with 59.9 million downloaded in 2006 (Telephia, 2006). Compared to the overall availability of handsets, the continuing high complexity and dynamic of mobile technologies accounts for limited mobile service adoption rates and business models in data services. Therefore, particular aspects of mobile technologies as a basis of promising business concepts within mobile commerce are illustrated in the following on three different levels: First on the network level, whereas available technology alternatives for the generation of digital radio networks need to be considered; second, on the service level, in order to compare different transfer standards for the development of mobile information services; third, on the business level, in order to identify valuable application scenarios from the customer point of view.
APA, Harvard, Vancouver, ISO, and other styles
6

Saygili, Ebru E., and Tuncay Ercan. "An Overview of International Fintech Instruments Using Innovation Diffusion Theory Adoption Strategies." In Innovative Strategies for Implementing FinTech in Banking, 46–66. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3257-7.ch003.

Full text
Abstract:
The aim of this chapter is to evaluate and predict the future of international fintech instruments in the domain of innovation diffusion theory (IDT) adoption strategies. Further, the consequences of the new payments system directive (PSD2) in Europe and blockchain applications are discussed. For instance, money transfer and payments have the highest rate of adoption (ROA) while insurance services have the highest speed of growing ROA due to relative advantages, high compatibility and trialability levels, and low level of complexity and uncertainty. Cross country comparisons include descriptive statistics about fintech deal value and volume, innovation rank, B2C commerce market, ROA and internet penetration. Germany is the only country listed in all of the top 10 ranking lists, followed by the U.S., the U.K., and France. Also, China, India, and Canada have distinguished success in terms of fintech indicators while the growth in Japan is expected to be slow. Accordingly, ROA in five emerging markets is much higher than some of the developed countries which can be explained by the Cancian Theory.
APA, Harvard, Vancouver, ISO, and other styles
7

Rahman, Hakikur. "Role of ICT in Establishing E-Government System for Disadvantaged Communities." In Information Communication Technologies, 1482–93. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-949-6.ch101.

Full text
Abstract:
Information and communications technologies (ICTs) are playing an increasingly vital role in the daily lives of all communities by revolutionizing their working procedures and rules of governance. ICTs offer a unique opportunity for governing elite to overcome the crisis of representative democracy, as ICT and the Internet empower civil society to play its role more effectively and facilitate the performance of governments’ main function-serving the people who elect them (Misnikov, 2003). In the realm of government, ICT applications are promising to enhance the delivery of public goods and services to common people not only by improving the process and management of government, but also by redefining the age-old traditional concepts. Community networking groups and local government authorities are well placed to campaign for greater inclusion for all members of the community in the information society. Possible areas to target include the provision of technology at low or no cost to groups through community technology centres or out of hours school access. There are many possibilities and local government must take a significant role in these activities (Young, 2000). Information society is based on the effective use and easy access of information and knowledge, while ICT for development (or ICTD) is not restricted to technology itself but focusing on manifold development and diverse manifestations for the people to improve their well-being. ICTD has deep roots in governance, is part of governance and has effects on governance patters and practices at both central and local level. By recognizing these facts, UNDP focuses on technologies to end poverty at WSIS Cyber Summit 2003, and emphasizes on ways that new technologies can help lift more than one billion people out of extreme poverty (UNDP, 2003). Apart from the four Asian IT giants (Korea, Rep., Hong Kong, China, Taiwan, China, and Japan), most of the Asian countries have fallen under the “low access” category of the Digital Access Index. This has also been referred in the WSIS Cyber Summit 2003, until now, limited infrastructure has often been regarded as the main barrier to bridging the digital divide (ITU, 2003). Among the countries with ICT spending as share of their GDP, Sweden, UK, The Netherlands, Denmark, and France (8.63, 7.97, 7.39, 7.19, and 6.57% respectively during 1992-2001) remain at the top (Daveri, 2002, p. 9), while countries like Bangladesh, Greece, Mexico, Niger, and many more remain at the bottom (EC, 2001; ITU, 2003b; Miller, 2001; Piatkowski, 2002). In a similar research it has been found that in terms of average share of ICT spending GDP, New Zealand, Sweden, Australia, USA, and UK (9.3, 8.4, 8.1, 8.1, and 7.8% respectively during 1992-1999) were among the highest (Pohjola, 2002, p. 7), though most of the countries in the Asian and African regions remain below the average of 5%. The disadvantaged communities in the countries staying below average in ICT spending seem to be lagging in forming appropriate information-based economy and eventually fall behind in achieving proper e-government system. The e-government system in those countries need to enhance access to and delivery of government services to benefit people, help strengthen government’s drive toward effective governance and increased transparency, and better management of the country’s social and economic resources for development. The key to e-government is the establishment of a long-term dynamic strategy to fulfill the citizen needs by transforming internal operations. E-government should result in the efficiency and swift delivery and services to citizens, business, government employees and agencies. For citizens and businesses, e-government seems the simplification of procedures and streamlining of different approval processes, while for government employees and agencies, it means the facilitation of cross-agency coordination and collaboration to ensure appropriate and timely decision-making. Thus, e-government demands transformation of government procedures and redefining the process of working with people and activities relating to people. The outcome would be a societal, organizational, and technological change for the government and to its people, with IT as an enabling factor. E-government should concentrate on more efficient delivery of public services, better management of financial, human and public resources and goods at all levels of government, in particular at local level, under conditions of sustainability, participation, interoperability, increased effectiveness and transparency (EU, 2002). ICT brings pertinent sides more closely by prioritizing partnerships between the state, business and civil society. A few East European countries have became economically liberal with the high level of foreign direct investment per capita and at the same time became ICT-advanced regional leaders in terms of economic reform. These countries also present the region’s most vivid examples of partnerships and collaboration. They have clearly manifested the importance of the public-private partnerships, transparent bottom-up strategies, involvement of all stakeholders, total governmental support, capturing economic opportunities, and enabling electronic mediated businesses, responding to the challenges of globalization.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Fournisseurs de services Internet – France"

1

Samkharadze, Sophio, Marika Zurmukhtashvili, Eka Kokhreidze, Elene Kharashvili, and Sesili Beriashvili. "Availability of Dental Services for Medical Students in Georgia." In Socratic Lectures 8. University of Lubljana Press, 2023. http://dx.doi.org/10.55295/psl.2023.ii5.

Full text
Abstract:
Oral health is important issue in field of public health and can be negatively affected by psycho-emotional factors. Foreign medical students can be subjected to oral disease risk factors and therefore be in significant need for regular dental care, but there is a lack of in-formation how good students access the dental clinics. Study aimed to evaluate the acces-sibility to dental care for foreign medical students in Georgia. We conducted an online survey in duration of two weeks in October – November 2022. Study sample were medical undergraduate students, they answered 12 questions about frequency and type of dental visits, about availability and quality of dental care they received in Georgia. Overall from 270 medical undergraduate students aged between 18-45 years, 70% were male and 30% female. 70% were from Jordan, Iran - 15%, Egypt - 4%; Great Britain - 4%, France - 4% and Rwanda - 4%. In their countries 50% of students used to visit dental clinics every 6 months for regular check-up (70%); professional cleaning (31%) and dental pain (27%). 81.48% of interviewed students have never visited a dental clinic in Georgia. Among them who vis-ited, the purpose was check-up (65%) and dental pain (30%). For the source of information about dental clinics the students named internet (60%). Access to dental care was rated as medium (37.50%), while overall satisfaction was rated as normal (47.62%). The study showed very low rate of referral to the dentist. However, among those who visited the clin-ic, their evaluations were satisfactory. We can estimate the lack of information as an im-portant barrier for students. In addition, some students arrived in Georgia only a few months before the study started, so there might be no need to visit dentist in the time inter-val studied. Further research is needed to clearly identify possible barriers for dental care for medical students. Keywords: Oral health; Dental care; Accessibility of dental care; Medical students
APA, Harvard, Vancouver, ISO, and other styles
2

Thi Thien Nhi, Dam, Margarita Chuloy, and Leonhard Glomann. "Environmental Impact of Video Streaming from Users’ Perspectives." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1005098.

Full text
Abstract:
While the Internet has undeniably made a significant impact on human life, it comes with a drawback: its extensive energy consumption, leading to adverse consequences for the environment. The proliferation of video streaming services, which constitute the largest portion of Internet traffic, amplifies the environmental burden of the Internet. Recognising the critical role of users’ video consumption behaviour to improve the situation, we employed a qualitative approach to explore users’ perspectives on pollution caused by video streaming. Interviews were conducted with video streaming app users aged from 18 to 26 years old, originating from Germany, France, and the UK. Our aim was to uncover the relationship between users' awareness levels and their willingness to change behaviour regarding video content consumption. The research findings provide comprehensive insights into users’ perceptions of video streaming impacts, and suggest potential avenues for future design and research aiming at promoting pro-environmental behaviour in video content consumption.
APA, Harvard, Vancouver, ISO, and other styles
3

Larouk, Omar, and Marina Garanovich. "EVALUATION THE QUALITY OF MOOCS BY REDESIGNING LEARNING SPACES: ERGONOMICS, CREDIBILITY, DENSITY AND INFORMATION RETRIEVAL." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-179.

Full text
Abstract:
Access to scientific knowledge is widely described by the process of skills acquisition by students regardless of their status. One of the main drivers for the development of learning is linked to access to scientific and educational literature in the digital age. It consists of improving the quality of education and increasing the efficiency of the educational process by using new educational technologies and advanced teaching methods. The first MOOC (Massive Open Online Course) projects democratized access via learning platforms characterized by open access to often unlicensed contentThe development of digital technology has stimulated the development of online courses open to science, and to respond to the handicaps affecting some students. The training (MOOC) is open to everyone, via the Internet, offered by university establishments in order to offer everyone the opportunity to learn or update their knowledge.American universities (MIT, OpenCourseWare, etc.) have developed academic initiatives to make their courses visible on the web, as have organizations like COURSERA. MOOCs contribute to knowledge sharing by making their educational resources available in French with FUN-MOOC. However, there are still many unresolved issues related to the course design. In this article, we give an overview of existing platforms in France and the United States, presenting their characteristics and their relationships with digital documentation. Many universities have asked their students to take MOOC courses, but these devices have become veritable information portals. We will be interested in new digital production methods by evaluating via predominant macro-criteria such as: -access and ergonomics, the credibility and the certification of institutions and information research services,
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Fournisseurs de services Internet – France"

1

Lefevre, Bruno, and Philippe Bouquillion. Communications, media and internet concentration in France, 2019-2021. Global Media and Internet Concentration Project, Carleton University, 2024. http://dx.doi.org/10.22215/gmicp/2024.2.

Full text
Abstract:
This report focuses on approximately thirty French markets, contributing to local debates and research as part of the Global Media and Internet Concentration Project (GMICP). It explores the dynamics of diversified economic players in cultural industries (press, audiovisual, books, music), emphasizing the coexistence of 'traditional' and 'new' entrants. The study provides sector-based and global analyses, revealing a dual dynamic of diversification and concentration in the production, distribution, and broadcasting of cultural and information content. Audiovisual content broadcasting, both free and pay, demonstrates national dominance but faces challenges from foreign groups. Financialization and concentration affect media and cultural goods industries, posing risks to diversity of opinion. The dominance of North American groups in digital services, particularly in advertising, is noted, impacting traditional media revenues. Telecom operators lead the French market, with regulators monitoring concentration dynamics for potential negative impacts on diversity.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography