Academic literature on the topic 'Fournisseurs de services Internet – France'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Fournisseurs de services Internet – France.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Fournisseurs de services Internet – France"
Richebourg, Aube. "Internet non marchand et division du travail militant." Réseaux N° 240, no. 4 (September 21, 2023): 213–40. http://dx.doi.org/10.3917/res.240.0213.
Full textHamel, Sophie. "Infrastructures Internet en Océanie." Revue Défense Nationale N° 872, no. 7 (July 10, 2024): 58–64. http://dx.doi.org/10.3917/rdna.872.0058.
Full textJacquin, Clément. "Les services d’hébergement Internet en France." Netcom 17, no. 1 (2003): 23–34. http://dx.doi.org/10.3406/netco.2003.1568.
Full textQuairel, Françoise, and Marie-Noëlle Auberger. "La diffusion de la RSE par la relation fournisseurs." Revue internationale P.M.E. 20, no. 3-4 (February 16, 2012): 69–94. http://dx.doi.org/10.7202/1008524ar.
Full textKaabachi, Souheila, Selima Ben Mrad, and Maria Petrescu. "Consumer initial trust toward internet-only banks in France." International Journal of Bank Marketing 35, no. 6 (September 4, 2017): 903–24. http://dx.doi.org/10.1108/ijbm-09-2016-0140.
Full textVolkmann, Christian. "Trademark Use and Liability of Referencing Service In Keyword Advertising – Google AdWords and Trademark Law." European Journal of Risk Regulation 2, no. 3 (September 2011): 450–54. http://dx.doi.org/10.1017/s1867299x00006887.
Full textJelassi, Kaouther, and Chantal Ammi. "Les services Internet Mobile en France : une proposition de mesure de la continuité d'usage." Management & Avenir 45, no. 5 (2011): 238. http://dx.doi.org/10.3917/mav.045.0238.
Full textMougin, Bruno, Jérôme Nicolas, Yannick Vigier, Hélène Bessière, and Stéphane Loigerot. "« MétéEAU Nappes » : un site Internet contenant des services utiles à la gestion des étiages." La Houille Blanche, no. 5 (October 2020): 28–36. http://dx.doi.org/10.1051/lhb/2020045.
Full textLallement, Gérard, and Matthias de Jouvenel. "Le Baromètre du numérique." Annales des Mines - Enjeux numériques N° 1, no. 1 (January 24, 2018): 91–97. http://dx.doi.org/10.3917/ennu.001.0091.
Full textKoster, Alexis. "Fighting Internet Piracy: The French Experience With The Hadopi Law." International Journal of Management & Information Systems (IJMIS) 16, no. 4 (September 20, 2012): 327. http://dx.doi.org/10.19030/ijmis.v16i4.7310.
Full textDissertations / Theses on the topic "Fournisseurs de services Internet – France"
Albrieux, Sandrine. "La responsabilité du fournisseur de moyens de communication électronique." Paris 2, 2004. http://www.theses.fr/2004PA020057.
Full textThe supplier of electronic ways of communication - who is not the author nor the editor of the informations circulating on internet, but the person who offers to the suppliers of contents the instruments permitting or facilitating the diffusion or the localization to the public of the information they have produced - has never been able to evolve in a " no-go area". His activities do not escape the rulings of the law when he supplies intentionally or unwisely the cause of the offence. Apart a few assumptions where he can put forward his irresponsibility or exemption of responsibility, dedicated by law for the trust in digital economy, he must answer for his harmful attitude towards others or affecting society. His responsibility can be committed as conniving when he is part of the criminal offense of the supplier of contents knowlingly and voluntarily, providing that the offense of the principal author receive the qualification of continuous offense. His attitude is reprehensible from then on he has the knowledge or could not ignore the illicitness of the content being transmitted by him, housed, reference of which is facilitated and do not act promptly to withdraw it from the network or to make access impossible, letting in this way continue the harmful action he could prevent or stop. But in a universe transcending the frontiers, the implementation of the judicial answer can be delicate and the debt of the supplier of electronic ways of communication settled abroad stand unfulfilled, because the authority of the French decisions does not have an international value as to impress the foreign authorities
El, Hayek Audine. "La responsabilité des intermédiaires de l'internet." Nantes, 2006. http://www.theses.fr/2006NANT4016.
Full textRichebourg, Aube. "L'internet associatif en France et en Allemagne : sociologie d'une rémanence utopique." Electronic Thesis or Diss., Paris, EHESS, 2024. http://www.theses.fr/2024EHES0134.
Full textOn the fringes of the digital revolution, unknown to the general public, volunteers have been administering and providing non-profit Internet services for thirty years. These associations, some of them very old, are trying to keep alive the organisational utopia that dates back to the beginnings of the network and the values associated with it. But what is it that still drives volunteers to defend this lost cause? What function does their commitment fulfil? And how does it fit into the evolution of the internet over the last thirty years?This thesis offers a sociological analysis of the “utopian practice” and the conditions of its persistence, based on a comparative survey between France and Germany combining ethnography and archival work. Using the perspective of configuration analysis borrowed from Norbert Elias, we will explain how the conservative and adaptive capacity of this associative movement responds to the relative frustrations of those disappointed by the digital revolution, by crossing structural, organisational and individual levels of analysis.The thesis begins by tracing the sociogenesis of the associative Internet in the 1990s, between pioneering practices, economic marginalisation and discreet insertion into local public connection policies. It was in the 2000s that associative activity became ‘utopian’, through the actions of ‘utopian entrepreneurs’, on the fringes of the then emerging activism in defence of digital rights and freedoms. Secondly, the thesis shows, from an organisational point of view, how Internet associations were shaped from the inside by successive waves of volunteers who, according to their own socialisation on the Internet, invested in a sense of the cause and a corresponding organisational model. Finally, on an individual level, thanks to a utopian division of labour that enabled people to practise their profession in a different way, we will explain how involvement in these associations was rewarded for pioneers and later volunteers alike. As a link between the alternative socialisations that make up the relationship to learning, the desire for autonomy, freedom and security, the associations create the conditions for an individual utopia for those who manage to join them, compensating for the power relationships they experience at work.So, while organising the preservation of pre-market practices of collaboration between peers, the associative internet offers its followers avenues of transformation, particularly regarding the individual and collective relationship to activity. The comparison enables us to grasp the contours of a European Internet utopia and what the diversity of utopian practices owes to national power structures, particularly regarding regulation of the telecommunications market. Beyond a normative perspective that sees utopia in society as a factor for unambiguous change, or as a system of ideas opposing conservative fictions and geared towards a better society, this thesis aims to contribute to a sociological understanding of utopian phenomena based on an analysis of their logical practices
Marchet, Nathalie. "La responsabilité civile des intermédiaires techniques de l'Internet." Toulouse 1, 2003. http://www.theses.fr/2003TOU10056.
Full textIn an attempt to solve the delicate issue of responsability for the service providers on the internet, many case laws and new statutes have been published over the last few years. A strongly opinionated discussion has broken out, questioning the future of Storage Service Providers, raising doubts about the amount of responsability taken by other Internet third parties. The United States of America have anticipated this issue as early as 1998 by voting the DMCA based on a general principal of limitation on liability relating to material on line. The EU tried to follow the American way, setting up some common rules for all European countries. France is still far behind after passing a legislation (08/01/00) which was little satisfaying and heavily criticised by the professioals of the Internet industry. However this legislation is presently being looked into and changed accordingly. Our experience within the Expert center CELOG, together with the agency for the Protection of Programs, enabled us to work on the civil responsabilities for the five main categories of service providers which role more or less involve an access to the information available
Biri, Aroua. "Proposition de nouveaux mécanismes de protection contre l'usurpation d'identité pour les fournisseurs de services Internet." Thesis, Evry, Institut national des télécommunications, 2011. http://www.theses.fr/2011TELE0009/document.
Full textMore and more organizations are computerized and more an organization is great, plus it can be the target of Internet attacks. Moreover, some of them have a growing number of electronic equipments that can be connected to the Internet from various locations (home, car, workplace, etc.). These devices form a so-called personal area network that allows the development of new applications centered on users. The ISPs can then expand their service offerings by providing a secure supply of such networks. According to the report of the firm “Arbor Networks”, entitled "Worldwide Infrastructure Security Report ", the most severe threats are related to distributed denial of service. This type of attack aims to make available a service by preventing legitimate users from using it. It uses the technique of identity theft that involves the creation of packages (like IP, ARP, etc.) with a forged source address and that in order to usurp the Identity of the issuer or of the computer system. Thus, the technique of identity theft allows to render a service unavailable, to listen, to corrupt, to block traffic from Internet users or to undermine the legitimate operation of routing protocols and personal networks. Moreover, the technique of identity theft is also used for prohibited activities by "HADOPI" law in France and related to illegal downloading issues. Thus, the ISPs have a duty to protect their customers from attacks based on the technique of identity theft. The mechanisms of protection against spoofing attacks for access networks are crucial for customer adoption of new applications offered by Internet service providers. This part of the doctoral thesis is part of the European project “MAGNET Beyond" whose vision is to put into practice the concept of personal networks, with the ultimate objective to design, develop, prototype and validate the concept. In the context of user equipment’s access to the network of an Internet services provider from a public place, we proposed a cross-layer protocol based on the principles of information theory. This protocol fixes the security hole not addressed by other proposals that is the attack of identity theft that occurs at the beginning of communication and thus protects users against the middle man attacks. We proposed that the person who wants to have secure access to the Internet must be on a specific circle has been called "RED POINT" so that the attacker is not able to be on the same circle at the same time. The proposed cross-layer protocol can be divided into three phases: the phase of checking the position of the user, the extraction phase of the shared secret of the physical layer and the phase of the derivation of the shared key at the MAC layer. We subsequently validated our solution through a formal tool AVISPA and presented the results of its implementation. In a private context, communication between devices convey users' personal data which may be confidential, so we must prevent equipment not belonging to the legitimate user to access its network. Thus, we proposed two mechanisms of protection against attacks based on spoofing so that illegitimate equipment is unable to impersonate legitimate equipment. The first phase will be dedicated to personal networks and the second will be dedicated to the particular case of medical networks. Regarding the mechanism dedicated to personal networks, we have proposed the use of a protocol based on out-of-band channel in order to provide certificates to user equipments. We derive bilateral key for personal network’s equipments of the same site and between equipments at remote sites. Concerning the particular case of medical networks, we proposed to cover their deployment phases and their operational phases. This proposal was submitted to the IEEE 802.15.6 working group that conducts research for the standardization of medical networks […]
Biri, Aroua. "Proposition de nouveaux mécanismes de protection contre l'usurpation d'identité pour les fournisseurs de services Internet." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2011. http://www.theses.fr/2011TELE0009.
Full textMore and more organizations are computerized and more an organization is great, plus it can be the target of Internet attacks. Moreover, some of them have a growing number of electronic equipments that can be connected to the Internet from various locations (home, car, workplace, etc.). These devices form a so-called personal area network that allows the development of new applications centered on users. The ISPs can then expand their service offerings by providing a secure supply of such networks. According to the report of the firm “Arbor Networks”, entitled "Worldwide Infrastructure Security Report ", the most severe threats are related to distributed denial of service. This type of attack aims to make available a service by preventing legitimate users from using it. It uses the technique of identity theft that involves the creation of packages (like IP, ARP, etc.) with a forged source address and that in order to usurp the Identity of the issuer or of the computer system. Thus, the technique of identity theft allows to render a service unavailable, to listen, to corrupt, to block traffic from Internet users or to undermine the legitimate operation of routing protocols and personal networks. Moreover, the technique of identity theft is also used for prohibited activities by "HADOPI" law in France and related to illegal downloading issues. Thus, the ISPs have a duty to protect their customers from attacks based on the technique of identity theft. The mechanisms of protection against spoofing attacks for access networks are crucial for customer adoption of new applications offered by Internet service providers. This part of the doctoral thesis is part of the European project “MAGNET Beyond" whose vision is to put into practice the concept of personal networks, with the ultimate objective to design, develop, prototype and validate the concept. In the context of user equipment’s access to the network of an Internet services provider from a public place, we proposed a cross-layer protocol based on the principles of information theory. This protocol fixes the security hole not addressed by other proposals that is the attack of identity theft that occurs at the beginning of communication and thus protects users against the middle man attacks. We proposed that the person who wants to have secure access to the Internet must be on a specific circle has been called "RED POINT" so that the attacker is not able to be on the same circle at the same time. The proposed cross-layer protocol can be divided into three phases: the phase of checking the position of the user, the extraction phase of the shared secret of the physical layer and the phase of the derivation of the shared key at the MAC layer. We subsequently validated our solution through a formal tool AVISPA and presented the results of its implementation. In a private context, communication between devices convey users' personal data which may be confidential, so we must prevent equipment not belonging to the legitimate user to access its network. Thus, we proposed two mechanisms of protection against attacks based on spoofing so that illegitimate equipment is unable to impersonate legitimate equipment. The first phase will be dedicated to personal networks and the second will be dedicated to the particular case of medical networks. Regarding the mechanism dedicated to personal networks, we have proposed the use of a protocol based on out-of-band channel in order to provide certificates to user equipments. We derive bilateral key for personal network’s equipments of the same site and between equipments at remote sites. Concerning the particular case of medical networks, we proposed to cover their deployment phases and their operational phases. This proposal was submitted to the IEEE 802.15.6 working group that conducts research for the standardization of medical networks […]
Kyeongja, Lee Toguyeni Abdoul Karim Armand Rahmani Ahmed. "Modèle global pour la Qualité de Service dans les réseaux de FAI intégration de DiffServ et de l'ingénierie de trafic basée sur MPLS /." Villeneuve d'Ascq : Université des sciences et technologies de Lille, 2008. https://iris.univ-lille1.fr/dspace/handle/1908/1057.
Full textTexte en anglais. Résumé en français et en anglais. Titre provenant de la page de titre du document numérisé. Bibliogr. p. [131]-140.
Mignard, Jean-Pierre. "Cybercriminalité et cyber-répression entre désordre et harmonisation mondiale." Paris 1, 2004. http://www.theses.fr/2004PA010310.
Full textChahine, Rony. "Services multi-fournisseurs et trans-réseaux : mécanismes pour un plan contrôle global, application à un nouveau paradigme de signalisation et aux médiateurs de signalisation /." Paris : École nationale supérieure des télécommunications, 2007. http://catalogue.bnf.fr/ark:/12148/cb41024516r.
Full textChahine, Rony. "Services multi-fournisseurs et trans-réseaux : mécanismes pour un plan contrôle global : application à un nouveau paradigme de signalisation et aux médiateurs de signalisation." Phd thesis, Télécom ParisTech, 2006. http://pastel.archives-ouvertes.fr/pastel-00002128.
Full textBooks on the topic "Fournisseurs de services Internet – France"
Arnaud, Michel. Les espaces publics d'accès à Internet: Réalités et devenir d'une nouvelle géographie des territoires et des réseaux. Paris: Presses universitaires de France, 2002.
Find full textArnaud, Michel, and Jacques Perriault. Les Espaces publics d'accès à Internet. Presses Universitaires de France - PUF, 2002.
Find full textLessard, Bill, and Steve Baldwin. NetSlaves: True Tales of Working the Web. McGraw-Hill Companies, 2000.
Find full textLessard, Bill, and Steve Baldwin. NetSlaves: True Tales of Working the Web. McGraw-Hill Companies, 2000.
Find full textTelecom Extreme Transformation: The Road to a Digital Service Provider. Taylor & Francis Group, 2021.
Find full textBraun, Harald, Kaveh Hushyar, and Hossein Eslambolchi. Telecom Extreme Transformation: The Road to a Digital Service Provider. Taylor & Francis Group, 2021.
Find full textBraun, Harald, Kaveh Hushyar, and Hossein Eslambolchi. Telecom Extreme Transformation: The Road to a Digital Service Provider. Taylor & Francis Group, 2021.
Find full textService Providers ASPs, ISPs, MSPs, NSPs, and WSPs: A Wiley Tech Brief. John Wiley & Sons, 2001.
Find full textP'ŭllaetp'om cheguk ŭi t'ansaeng kwa pŭraendŭ ŭi mirae: K'up'ang, Neibŏ, Paemin poda mŏnjŏ ch'annŭn pŭraendŭ nŭn muŏt i tarŭn'ga. Sŏul-si: Mirae ŭi Ch'ang, 2021.
Find full textAllen, Jonathan P. Digital Entrepreneurship. Taylor & Francis Group, 2019.
Find full textBook chapters on the topic "Fournisseurs de services Internet – France"
Çag̃layan, Mehmet Ufuk. "AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results." In Communications in Computer and Information Science, 1–12. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_1.
Full textBernier, Gwenaëlle. "France: Invoicing and E-Commerce: What Are the Tax Constraints? Is Electronic Invoicing the Best Solution?" In Global E-Business Law & Taxation, 129–41. Oxford University PressNew York, NY, 2009. http://dx.doi.org/10.1093/oso/9780195367218.003.0008.
Full texti Martinez, Agustí Cerrill. "Accessing Administration's Information via Internet in Spain." In Global Information Technologies, 2558–73. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch186.
Full textKaspar, Christian, Florian Resatsch, and Svenja Hagenhoff. "Basic Concepts of Mobile Radio Technologies." In Networking and Telecommunications, 562–70. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch036.
Full textKaspar, Christian, Florian Resatsch, and Svenja Hagenhoff. "Basic Concepts of Mobile Radio Technologies." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 113–20. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch016.
Full textSaygili, Ebru E., and Tuncay Ercan. "An Overview of International Fintech Instruments Using Innovation Diffusion Theory Adoption Strategies." In Innovative Strategies for Implementing FinTech in Banking, 46–66. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3257-7.ch003.
Full textRahman, Hakikur. "Role of ICT in Establishing E-Government System for Disadvantaged Communities." In Information Communication Technologies, 1482–93. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-949-6.ch101.
Full textConference papers on the topic "Fournisseurs de services Internet – France"
Samkharadze, Sophio, Marika Zurmukhtashvili, Eka Kokhreidze, Elene Kharashvili, and Sesili Beriashvili. "Availability of Dental Services for Medical Students in Georgia." In Socratic Lectures 8. University of Lubljana Press, 2023. http://dx.doi.org/10.55295/psl.2023.ii5.
Full textThi Thien Nhi, Dam, Margarita Chuloy, and Leonhard Glomann. "Environmental Impact of Video Streaming from Users’ Perspectives." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1005098.
Full textLarouk, Omar, and Marina Garanovich. "EVALUATION THE QUALITY OF MOOCS BY REDESIGNING LEARNING SPACES: ERGONOMICS, CREDIBILITY, DENSITY AND INFORMATION RETRIEVAL." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-179.
Full textReports on the topic "Fournisseurs de services Internet – France"
Lefevre, Bruno, and Philippe Bouquillion. Communications, media and internet concentration in France, 2019-2021. Global Media and Internet Concentration Project, Carleton University, 2024. http://dx.doi.org/10.22215/gmicp/2024.2.
Full text