Journal articles on the topic 'Internet addresses'

To see the other types of publications on this topic, follow the link: Internet addresses.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet addresses.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

&NA;. "INTERNET ADDRESSES." Gastroenterology Nursing 33, Supplement (April 2010): 70–71. http://dx.doi.org/10.1097/sga.0b013e3181da8c6f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Collinson, Helen. "Summit addresses growth, security issues for internet." Computers & Security 14, no. 3 (January 1995): 218. http://dx.doi.org/10.1016/0167-4048(95)90375-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huston, Geoff. "Metadata Retention and the Internet." Australian Journal of Telecommunications and the Digital Economy 3, no. 1 (April 27, 2015): 31. http://dx.doi.org/10.18080/ajtde.v3n1.4.

Full text
Abstract:
The Metadata Retention measures being considered in Australia make some sweeping assumptions about the semantics of IP addresses and their association with individual subscribers to the Internet. But are these assumptions warranted? The exhaustion of the free pool of IPv4 addresses has prompted a new generation of Internet services that treat IP addresses as ephemeral shared conversation tokens, and retaining address use metadata in such an environment is an exercise in futility. The regulatory environment persists in treating the Internet in the same manner as the telephone network, and as a network-centric service utility, while the revolutionary change that the Internet bought to the communications environment was to reverse the roles of network and attached device, and form a device-centric model of communications. Unless our regulators can grasp the implications of this essential architectural change we will continue to see misplaced and ultimately futile regulatory measures imposed on the Internet, to the ultimate cost of the consumer.
APA, Harvard, Vancouver, ISO, and other styles
4

Huston, Geoff. "Metadata Retention and the Internet." Journal of Telecommunications and the Digital Economy 3, no. 1 (April 27, 2015): 31–44. http://dx.doi.org/10.18080/jtde.v3n1.4.

Full text
Abstract:
The Metadata Retention measures being considered in Australia make some sweeping assumptions about the semantics of IP addresses and their association with individual subscribers to the Internet. But are these assumptions warranted? The exhaustion of the free pool of IPv4 addresses has prompted a new generation of Internet services that treat IP addresses as ephemeral shared conversation tokens, and retaining address use metadata in such an environment is an exercise in futility. The regulatory environment persists in treating the Internet in the same manner as the telephone network, and as a network-centric service utility, while the revolutionary change that the Internet bought to the communications environment was to reverse the roles of network and attached device, and form a device-centric model of communications. Unless our regulators can grasp the implications of this essential architectural change we will continue to see misplaced and ultimately futile regulatory measures imposed on the Internet, to the ultimate cost of the consumer.
APA, Harvard, Vancouver, ISO, and other styles
5

Prokhvatilova, Olga A. "ON THE EXTERNAL DIALOGUENESS OF ORTHODOX INTERNET PREACHING." RSUH/RGGU Bulletin. "Literary Theory. Linguistics. Cultural Studies" Series, no. 9 (2023): 172–82. http://dx.doi.org/10.28995/2686-7249-2023-9-172-182.

Full text
Abstract:
The article is dealing with the Internet sermon, an important and dynamically developing genre of the modern Orthodox tradition. The paper reveals the specifics of dialogueness as an essential feature of Orthodox preaching. It is proved that external dialogueness is a type of dialogueness of the genre of religious style and it also updates the addressing of the utterance. The specifics of the external dialogueness of Internet sermons are investigated on the material of the video blog “Batushka will answer”. It establishes the linguistic means by which the orientation of the Internet sermon to the addressee is realized. It is demonstrated that, along with the consistent rendition of constitutive language markers of external dialogueness for the genre, it is possible to modify individual means, in particular addresses and greetings, as well as to attract new ways of dialogization. It is proved that the use of classical means of external dialogueness in Internet preaching makes it possible to indicate the presence of a second participant in communication, to stimulate active perception of information, to convey the coexistence of hierarchy and symmetry inherent in the genre in the relationship of the addresser and the addressee. The author reveals that the use of new methods in organizing a priest’s dialogue with his audience weakens the semantics of motivation, levels the solemnly elevated register of communication familiar to this genre, adds intimacy to the linguistic space of religious communication and reduces its stylistic quality.
APA, Harvard, Vancouver, ISO, and other styles
6

Kalenyuk, Svitlana. "THE STYLISTIC FUNCTIONS OF ADDRESSES IN INTERNET COMMUNICATION." Naukovì zapiski Nacìonalʹnogo unìversitetu «Ostrozʹka akademìâ». Serìâ «Fìlologìâ» 1, no. 3(71) (October 25, 2018): 85–87. http://dx.doi.org/10.25264/2519-2558-2018-3(71)-85-87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Salamatian, Loqman, Todd Arnold, Ítalo Cunha, Jiangchen Zhu, Yunfan Zhang, Ethan Katz-Bassett, and Matt Calder. "Who Squats IPv4 Addresses?" ACM SIGCOMM Computer Communication Review 53, no. 1 (January 2023): 48–72. http://dx.doi.org/10.1145/3594255.3594260.

Full text
Abstract:
To mitigate IPv4 exhaustion, IPv6 provides expanded address space, and NAT allows a single public IPv4 address to suffice for many devices assigned private IPv4 address space. Even though NAT has greatly extended the shelf-life of IPv4, some networks need more private IPv4 space than what is officially allocated by IANA due to their size and/or network management practices. Some of these networks resort to using squat space , a term the network operations community uses for large public IPv4 address blocks allocated to organizations but historically never announced to the Internet. While squatting of IP addresses is an open secret, it introduces ethical, legal, and technical problems. In this work we examine billions of traceroutes to identify thousands of organizations squatting. We examine how they are using it and what happened when the US Department of Defense suddenly started announcing what had traditionally been squat space. In addition to shining light on a dirty secret of operational practices, our paper shows that squatting distorts common Internet measurement methodologies, which we argue have to be re-examined to account for squat space.
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Kuo Hsien, Chang Fan Wang, and Chien Chung Wang. "IPv4 and IPv6 Coexist in Unified Threat Management." Applied Mechanics and Materials 121-126 (October 2011): 923–27. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.923.

Full text
Abstract:
IP is the primary protocol that establishes the Internet; it is responsible for routing packets across network. IPv4 is the first version of the protocol to be widely deployed. IPv4 uses 4 bytes addresses, which limits the address space to more than 4 billion possible unique addresses. All of network devices construct on the IPv4. While the Internet widely deployed and used. IP addresses are being incrementally delegated to end users, an IPv4 address shortage has been developing. IPv4 addresses were insufficient for the Internet. IPv6 provide 2128 address and provide sufficient IPs for the Internet. But now the software and devices are only supporting IPv4. In this paper, we developed a new UTM appliance. The proposed system considers the integration of IPv4 network and IPv6 network in the Internet.
APA, Harvard, Vancouver, ISO, and other styles
9

Król, Karol. "Internet domains promoting agrotourist farms." Turyzm/Tourism 27, no. 1 (June 30, 2017): 23–29. http://dx.doi.org/10.18778/0867-5856.27.1.11.

Full text
Abstract:
Many agrotourist farms use the potential of websites to distinguish their offer from others to attract as many guests as possible. However, maintaining a website is connected with a range of costs, e.g. registering the domain and the hosting package. Searching for cost savings, the owners of agrotourist farms often face the dilemma of choosing between a payable website and its free equivalent. The aim of this article is to analyse internet addresses as regards their type and potential, both informative and marketing. The surveys were carried out on a set of 1,121 websites. The analysis included domain names (main names) as well as domain extensions, paying special attention to type and indicating sub-domains at the same time. Division into payable and free was looked for as well. In conclusion, it is shown that the owners of agrotourist farms mostly use national domains, choosing addresses in functional, regional or European domains less frequently. Moreover, they relatively rarely use addresses created on free services. In their place, they choose free sub-domains often created in the domain of the provider hosting a regional (informative) portal or another.
APA, Harvard, Vancouver, ISO, and other styles
10

Król, Karol. "INTERNET DOMAINS PROMOTING AGROTOURIST FARMS." Turyzm 27, no. 1 (January 26, 2017): 23–29. http://dx.doi.org/10.1515/tour-2017-0003.

Full text
Abstract:
Abstract Many agrotourist farms use the potential of websites to distinguish their offer from others to attract as many guests as possible. However, maintaining a website is connected with a range of costs, e.g. registering the domain and the hosting package. Searching for cost savings, the owners of agrotourist farms often face the dilemma of choosing between a payable website and its free equivalent. The aim of this article is to analyse internet addresses as regards their type and potential, both informative and marketing. The surveys were carried out on a set of 1,121 websites. The analysis included domain names (main names) as well as domain extensions, paying special attention to type and indicating sub-domains at the same time. Division into payable and free was looked for as well. In conclusion, it is shown that the owners of agrotourist farms mostly use national domains, choosing addresses in functional, regional or European domains less frequently. Moreover, they relatively rarely use addresses created on free services. In their place, they choose free sub-domains often created in the domain of the provider hosting a regional (informative) portal or another.
APA, Harvard, Vancouver, ISO, and other styles
11

Utz, Sonja. "Enter Your E-mail Address: How German Internet Users Manage their E-mail Addresses." CyberPsychology & Behavior 7, no. 2 (April 2004): 241–46. http://dx.doi.org/10.1089/109493104323024492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Komosny, Dan. "Retrospective IP Address Geolocation for Geography-Aware Internet Services." Sensors 21, no. 15 (July 22, 2021): 4975. http://dx.doi.org/10.3390/s21154975.

Full text
Abstract:
The paper deals with the locations of IP addresses that were used in the past. This retrospective geolocation suffers from continuous changes in the Internet space and a limited availability of past IP location databases. I analyse the retrospective geolocation of IPv4 and IPv6 addresses over five years. An approach is also introduced to handle missing past IP geolocation databases. The results show that it is safe to retrospectively locate IP addresses by a couple of years, but there are differences between IPv4 and IPv6. The described parametric model of location lifetime allows us to estimate the time when the address location changed in the past. The retrospective geolocation of IP addresses has a broad range of applications, including social studies, system analyses, and security investigations. Two longitudinal use cases with the applied results are discussed. The first deals with geotargeted online content. The second deals with identity theft prevention in e-commerce.
APA, Harvard, Vancouver, ISO, and other styles
13

L., J. F. "DOES PROGRESS DEMAND THAT SCIENTISTS NOW PUT INTERNET ADDRESSES ON ALL COMMUNICATIONS?" Pediatrics 95, no. 4 (April 1, 1995): 583. http://dx.doi.org/10.1542/peds.95.4.583.

Full text
Abstract:
Each of us eventually will have a unique Internet address. We owe it to ourselves and the science community to use it—as well as our mailing addresses, AIP codes, fax numbers, and phone numbers—on all correspondence, whether print or electronic. As far as "clutter" is concerned, most Internet addresses are brief enough— not much longer than an international telephone number. ...For starters, you can buy a rubber stamp or sticker to update your letterheads to include your street addresses, your phone and fax numbers, and your E-mail addresses.
APA, Harvard, Vancouver, ISO, and other styles
14

Delgado, Rosa M. "Without IPv6, there is no digital transformation for healthcare." Technology and Health Care 30, no. 2 (March 11, 2022): 505–8. http://dx.doi.org/10.3233/thc-213571.

Full text
Abstract:
BACKGROUND: Originally, digital healthcare was created to support underserved and rural patients gain access to health services. Phones, devices, and computers need IP (Internet Protocol) addresses to connect to the Internet. OBJECTIVE: This paper aims to study the close relationship between the Internet and the transformation of healthcare services. METHODS: The current protocol in use is the Internet Protocol version 4 (IPv4), whose number of Internet addresses has been globally exhausted. The Internet Protocol version 6 (IPv6) with 47 octillion unique addresses for every person on the planet has become the only option for sustainable growth and innovation. However, most of the worldwide industry is still in IPv4. In the era of Artificial Intelligence, Internet of Things, Fifth Generation of Cellular Technology (5G), and Blockchain, there will be a massive need of IP addresses. For 2025, experts predict over 1.5 billion new IPv6 users which will continue to grow exponentially. RESULTS: Nations need to tackle the increasing industry requirements for IPv6 and telehealth adoption to benefit from the full IPv6 connectivity which is the key strategic advantage for the healthcare industry. CONCLUSION: The strategic potential that telehealth brings to the healthcare industry is widely appreciated. However, what are the implications of its expansion around the world? How can we prioritize the poorest and most vulnerable in society without new technologies?
APA, Harvard, Vancouver, ISO, and other styles
15

Piraux, Maxime, Tom Barbette, Nicolas Rybowski, Louis Navarre, Thomas Alfroy, Cristel Pelsser, François Michel, and Olivier Bonaventure. "The multiple roles that IPv6 addresses can play in today's internet." ACM SIGCOMM Computer Communication Review 52, no. 3 (July 30, 2022): 10–18. http://dx.doi.org/10.1145/3561954.3561957.

Full text
Abstract:
The Internet use IP addresses to identify and locate network interfaces of connected devices. IPv4 was introduced more than 40 years ago and specifies 32-bit addresses. As the Internet grew, available IPv4 addresses eventually became exhausted more than ten years ago. The IETF designed IPv6 with a much larger addressing space consisting of 128-bit addresses, pushing back the exhaustion problem much further in the future. In this paper, we argue that this large addressing space allows reconsidering how IP addresses are used and enables improving, simplifying and scaling the Internet. By revisiting the IPv6 addressing paradigm, we demonstrate that it opens up several research opportunities that can be investigated today. Hosts can benefit from several IPv6 addresses to improve their privacy, defeat network scanning, improve the use of several mobile access network and their mobility as well as to increase the performance of multicore servers. Network operators can solve the multihoming problem more efficiently and without putting a burden on the BGP RIB, implement Function Chaining with Segment Routing, differentiate routing inside and outside a domain given particular network metrics and offer more fine-grained multicast services.
APA, Harvard, Vancouver, ISO, and other styles
16

Berdnikova, T. V. "Dialogicality of the Extremism Discourse." Theory and Practice of Forensic Science 15, no. 4 (December 27, 2020): 27–31. http://dx.doi.org/10.30764/1819-2785-2020-4-27-31.

Full text
Abstract:
The article addresses the possibility of isolating extremism discourse as a specific kind of discourse. As criteria for such determination are proposed: a common subject, quantitative parameter (sufficient quantities of such texts), presence of a genre variety of texts of this discourse. The study material is the texts of the dialogue and monologue speech: correspondence on the Internet of interpersonal and public nature, articles. The linguistic analysis methods (lexical-semantic, stylistic, semantic, communicative-pragmatic analysis) were used to study the material. The main feature of extremism discourse is dialogicality, which is the relation of different semantic positions, consideration of the addressee’s position, consideration of the opponents, and implementation in the author’s dialogue. Forms of representation of dialogicality in texts and genres of the extremism discourse are considered. The study revealed the following features of the extremism discourse: significant roles of a addresser and addressee, the use of the strategies of self-presentation and discrimination by the communicants, the juxtaposition of “friends” and “strangers” groups, updating of the “friends” and “strangers” concepts.
APA, Harvard, Vancouver, ISO, and other styles
17

Król, Karol. "THE INTERNET ADDRESSES OF AGROTOURISTIC FARMS AND THEIR INFORMATIVE VALUE." Folia Turistica 45 (December 31, 2017): 81–93. http://dx.doi.org/10.5604/01.3001.0012.0508.

Full text
Abstract:
Purpose. The analysis of information available in the Domain Name Registry and the digital archive on selected internet domains of agrotouristic farms. The answer to the question whether this information can be helpful in choosing a specific offer. Method. The analysis of the domain’s history – digital copies of websites of chosen agrotouristic farms recorded in the Wayback Machine web archive. The analysis of data available in the WHOIS database. Findings. The analysis of data available in the Research and Academic Computer Network (NASK) does not allow to clearly assess a counterparty’s credibility. Tracking the domain’s history enables to record how artwork, contents and technique of performing agrotouristic farm websites have changed and also how their business type has evolved. Irregularities connected, among others, to the operator being the domain’s customer were noticed in the set of analysed websites. Research and conclusion limitations. 10 addresses of agrotouristic farm websites accessed on 19 December 2016 from the first tab of searching results in one of public website catalogues were examined. As the Wayback Machine web archive collects copies of archival websites regardless of the domain where they are available, the WHOIS database only contains information about national domains of the highest level (.pl). Practical implications. Survey methods used in the paper are universal – they can be helpful in evaluation of credibility of any subject promoting services on the website within a national domain of the highest level. They can be also used to verify history of any web domain which can be helpful before its registration. Originality. The concept of using the Wayback Machine digital archive to evaluate a counterparty’s credibility and potential value of an internet domain. The concept of using the WHOIS registry to estimate credibility of an agrotouristic offer. Type of paper. The paper presents the results of empirical surveys. A case study.
APA, Harvard, Vancouver, ISO, and other styles
18

Nicoll, Leslie H. "An Intro to the Internet Part II: Addresses and Resources." JONA: The Journal of Nursing Administration 24, no. 5 (May 1994): 11–13. http://dx.doi.org/10.1097/00005110-199405000-00003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Dangat, Prof M. T. "Industrial Internet of Things (IIOT)." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (March 31, 2024): 2721–26. http://dx.doi.org/10.22214/ijraset.2024.59103.

Full text
Abstract:
Abstract: Industrial Internet of Things (IOT) is a part of IOT (Internet of Things) technology that has provided an opportunity to build powerful industrial system and applications by using different I0T devices like sensors, actuators, Resistance Temperature Detectors, pH analyzers, Level Transmitters, RFIDs, wireless and mobile devices. High-speed internet has given a new hike in development of IOT devices, as it makes remote access facility at ease. Various IOT applications and systems have been developed and deployed in recent years. To understand the development of IOТ technology, this study addresses IIOT concepts through a systematic review of various white papers, research papers and online database.Abstract: Industrial Internet of Things (IOT) is a part of IOT (Internet of Things) technology that has provided an opportunity to build powerful industrial system and applications by using different I0T devices like sensors, actuators, Resistance Temperature Detectors, pH analyzers, Level Transmitters, RFIDs, wireless and mobile devices. High-speed internet has given a new hike in development of IOT devices, as it makes remote access facility at ease. Various IOT applications and systems have been developed and deployed in recent years. To understand the development of IOТ technology, this study addresses IIOT concepts through a systematic review of various white papers, research papers and online database.
APA, Harvard, Vancouver, ISO, and other styles
20

Elidjen, Elidjen, Shellyana Tanun, Budi Santoso, and Cipto Citronegoro. "Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling." ComTech: Computer, Mathematics and Engineering Applications 1, no. 2 (December 1, 2010): 711. http://dx.doi.org/10.21512/comtech.v1i2.2571.

Full text
Abstract:
Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF) has issued a new standard of Internet protocol called IPv6 to anticipate this problem. PD. Pumas Jaya, which started in 1996 in the field of marine products in particular marinated seafood, such as salted fish, rebon shrimp, cuttlefish, anchovies and other marine products to anticipate the need for this in its network. However, IPv6 can not simply be used to replace IPv4 as the existing network infrastructure with IPv4. This research discussed IPv6 simulation tunneling with manual methods so that an IPv6 site can communicate with other IPv6 site even if separated by an infrastructure that supports only IPv4.
APA, Harvard, Vancouver, ISO, and other styles
21

CLARK, KEITH, PETER J. ROBINSON, and RICHARD HAGEN. "Multi-threading and message communication in Qu-Prolog." Theory and Practice of Logic Programming 1, no. 3 (May 2001): 283–301. http://dx.doi.org/10.1017/s147106840100120x.

Full text
Abstract:
This paper presents the multi-threading and internet message communication capabilities of Qu-Prolog. Message addresses are symbolic and the communications package provides high-level support that completely hides details of IP addresses and port numbers as well as the underlying TCP/IP transport layer. The combination of the multi-threads and the high level inter-thread message communications provide simple, powerful support for implementing internet distributed intelligent applications.
APA, Harvard, Vancouver, ISO, and other styles
22

Kumar, Gyanendra, and Parul Tomar. "A Survey of IPv6 Addressing Schemes for Internet of Things." International Journal of Hyperconnectivity and the Internet of Things 2, no. 2 (July 2018): 43–57. http://dx.doi.org/10.4018/ijhiot.2018070104.

Full text
Abstract:
As IPv4 addresses are already exhausted before the beginning of Internet of Thing (IoT), IPv6 is widely used to assign unique identity to IoT nodes. In this article, the analysis of different components required in assigning IPv6 addresses to IoT nodes, a survey of IPv6 address assignment schemes and an examination of the different kinds of IPv6 addresses are presented. This article highlights the architectural complexity of IoT technologies, protocol stacks, limitations of IoT nodes, renumbering, multihoming, the merging of IoT network and other challenges towards assigning of IPv6 address to IoT nodes. A comprehensive survey on recent addressing schemes with classification based on allocation tables and spatial information are presented. This survey describes the address allocation mechanism, performance on different metrics, the area of applicability, and the merits and demerits of different addressing schemes. It also describes the future research options addressing IoT.
APA, Harvard, Vancouver, ISO, and other styles
23

Prathivi, Rastri, and Vensy Vydia. "ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK." Jurnal Transformatika 14, no. 2 (January 30, 2017): 77. http://dx.doi.org/10.26623/transformatika.v14i2.440.

Full text
Abstract:
<p>Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet connection is slow. Detecting worms and trojan on the Internet network, especially new variants of worms and trojans and worms and trojans hidden is still a challenging problem. Worm and trojan attacks generally occur in computer networks or the Internet which has a low level of security and vulnerable to infection. The detection and analysis of the worm and trojan attacks in the Internet network can be done by looking at the anomalies in Internet traffic and internet protocol addresses are accessed.<br />This research used experimental research applying C4.5 and Bayesian Network methods to accurately classify anomalies in network traffic internet. Analysis of classification is applied to an internet address, internet protocol and internet bandwidth that allegedly attacked and trojan worm attacks.<br />The results of this research is a result of analysis and classification of internet addresses, internet protocol and internet bandwidth to get the attack worms and trojans.</p>
APA, Harvard, Vancouver, ISO, and other styles
24

Uerpmann-Wittzack, Robert. "Principles of International Internet Law." German Law Journal 11, no. 11 (November 2010): 1245–63. http://dx.doi.org/10.1017/s2071832200020204.

Full text
Abstract:
AbstractLegal principles are an essential element of jurisprudence. They help to systemize, to comprehend and to further develop a legal order. Although International Internet Law is quite a new legal subject, some principles begin to evolve. The article addresses five emerging core principles of International Internet Law: (1) The principle of internet freedom, (2) the principle of privacy, (3) a modified principle of territorial jurisdiction adapted to cyberspace, (4) the principle of interstate cooperation, and (5) the principle of multi-stakeholder cooperation.
APA, Harvard, Vancouver, ISO, and other styles
25

Korablyov, M. M., O. O. Fomichev, and D. V. Vasyuk. "Finding operability proxy addresses using a neural network approach." Bionics of Intelligence 1, no. 98 (December 30, 2022): 29–34. http://dx.doi.org/10.30837/bi.2022.1(98).03.

Full text
Abstract:
Proxyservers can be used to connect the user to the Internet, which provides different levels of functionality, security, and privacy,and can be configured as web filters or firewalls that protect the computer from Internet threats Under the health of proxyaddresses, we mean the ability to send requests to various resources or services and receive responses. If the request was sentand no response was received, it can be concluded that the proxy address is not working. If a response is received, it can beconcluded that the proxy address is operational. Factors that can influence, sending a request and receiving a response froma resource are considered. An analysis of the considered factors showed that it is impossible to unambiguously conclude theperformance of a proxy address if we take into account only the fact of the presence or absence of a response from the resource.The conditions for confirming or refuting the performance of a proxy address are identified, which are taken as input data ofthe model proposed for assessing the performance of a proxy address. As a model, a neural network in the form of a threelayerperceptron was used, the training of which is performed by the method of error backpropagation. The created modelwas tested to determine the health status of proxy addresses using test datasets. Based on the results of research and experiments,an application was created that searches the Internet for resources with proxy addresses and checks their performance.
APA, Harvard, Vancouver, ISO, and other styles
26

Shah, Junaid Latief, Heena Farooq Bhat, and Asif Iqbal Khan. "Towards IPv6 Migration and Challenges." International Journal of Technology Diffusion 10, no. 2 (April 2019): 83–96. http://dx.doi.org/10.4018/ijtd.2019040105.

Full text
Abstract:
The Internet, since its genesis in 1970's, has already become a global broadcasting potential for information dissemination and a channel for information collaboration and an interface between disparate users and their systems, separated by large geographical locations. The rate of growth of interconnected devices has been on exponential scale from the last decade. As of now, more than 5 billion devices are accessing the Internet. The Internet Protocol Version 4 (IPv4) which is a three decade old standard internetworking protocol using 32-bit address, fails to cater such a large number of hosts. In February 2011, the Internet Assigned Numbers Authority (IANA), the nodal agency for IP address allocation exhausted the central pool of IPv4 addresses completely. This rapid depletion of IP addresses was inevitable as a large number of devices are getting connected to internet. Also, inefficient utilization and remiss planning of IP address space acted as catalyst in the process of depletion. NAT, CIDR and Subnetting only serve as short interim solutions provided by IPv4. Moreover, IPv4 fails to scale up and bridge the security enhancements required by the modern Internet today. The only feasible option lies in unabridged transition to IPv6. Internet Protocol Version 6 (IPv6) provides an address space of 2128 i.e. trillions of addresses, making the IP address space potentially inexhaustible. Thus, adopting IPv6 makes a paragon choice of replacement for IPv4. This article reviews the next generation internet protocol IPv6 and explicates the discussion over the need for migrating to IPv6. The article also presents technical as well as non-technical challenges related to migration and presents overall statistics regarding IPv6 adoption around the world.
APA, Harvard, Vancouver, ISO, and other styles
27

Li, Pengkun, Jinshu Su, Xiaofeng Wang, and Qianqian Xing. "DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability." Security and Communication Networks 2021 (July 19, 2021): 1–17. http://dx.doi.org/10.1155/2021/1974493.

Full text
Abstract:
The Internet lacking accountability suffers from IP address spoofing, prefix hijacking, and DDoS attacks. Global PKI-based accountable network involves harmful centralized authority abuse and complex certificate management. The inherently accountable network with self-certifying addresses is incompatible with the current Internet and faces the difficulty of revoking and updating keys. This study presents DIIA, a blockchain-based decentralized infrastructure to provide accountability for the current Internet. Specifically, DIIA designs a public-permissioned blockchain called TIPchain to act as a decentralized trust anchor, allowing cryptographic authentication of IP addresses without any global trusted authority. DIIA also proposes the revocable trustworthy IP address bound to the cryptographic key, which supports automatic key renewal and efficient key revocation and eliminates complexity certificate management. We present several security mechanisms based on DIIA to show how DIIA can help to enhance network layer security. We also implement a prototype system and experiment with real-world data. The results demonstrate the feasibility and suitability of our work in practice.
APA, Harvard, Vancouver, ISO, and other styles
28

Kutsenko, Ekaterina. "SOME FEATURES OF IMPLEMENTATION IN PROSECUTOR’S OFFICES REGULATIONS OF THE LAW ON THE PRESENTATION OF INFORMATION ABOUT THE ADDRESSES OF SITES AND (OR) PAGES OF SITES IN THE INFORMATION AND TELECOMMUNICATION NETWORK «INTERNET»." Scientific Notes of V. I. Vernadsky Crimean Federal University. Juridical science 7, no. 4 (February 20, 2023): 159–64. http://dx.doi.org/10.29039/2413-1733-2021-7-4-159-164.

Full text
Abstract:
The work is devoted to the study of the problems of presenting information about the addresses of sites and (or) pages of sites on the Internet. The current legislation obliges federal government civil servants and citizens applying for such positions to submit information about the addresses of sites and (or) pages of sites in the information and telecommunications network «Internet», where they posted publicly available information. The possible procedure and algorithms for the implementation of such checks, the appropriate identification and disciplinary proceedings against the perpetrators have been analyzed.
APA, Harvard, Vancouver, ISO, and other styles
29

Rhodus, Tim. "Horticultural Teaching Resources on the Internet." HortScience 32, no. 3 (June 1997): 528A—528. http://dx.doi.org/10.21273/hortsci.32.3.528a.

Full text
Abstract:
Horticulture Teaching Resources is a web site at The Ohio State Univ. designed to provide high school and higher education horticulture educators free-access to curriculum resource materials. The information has been structured to facilitate the instruction of basic concepts in plant biology, propagation, nutrition, and plant materials. A searchable database interface is used to access color photos, lab exercises, and test questions. Users of the system can also provide URL addresses to their own resources for inclusion in the database. (http://hortwww-2.ag.ohio-state.edu/hvp/htr/htr.html)
APA, Harvard, Vancouver, ISO, and other styles
30

Faris Agil Putra and Alif Subardono. "Analisis Kinerja Per Connection Classifier dan Failover pada Multiple Gateway Internet Networks." Jurnal Nasional Teknik Elektro dan Teknologi Informasi 10, no. 4 (November 29, 2021): 319–28. http://dx.doi.org/10.22146/jnteti.v10i4.2065.

Full text
Abstract:
Perancangan jaringan yang baik diperlukan untuk menghasilkan jaringan yang optimal karena kebutuhan akses internet yang terus meningkat. Permasalahan yang biasa terjadi adalah terkait ketersediaan jaringan. Solusi untuk meminimalkan permasalahan tersebut yaitu dengan menerapkan Failover dan Load Balancing. Konsep yang digunakan adalah Failover dan Load Balancing dengan metode Per Connection Classifier (PCC). Load Balancing adalah teknik untuk pendistribusian traffic dengan dua jalur gateway atau lebih sehingga traffic dapat berjalan lebih optimal. Metode yang digunakan adalah Per Connection Classifier yang dapat mengelompokkan koneksi menjadi beberapa kelompok. Selanjutnya, teknik Failover juga diterapkan untuk fungsi redundancy link. Selanjutnya dilakukan pengujian pendistribusian beban traffic, pengujian Failover dan analisis perbandingan QoS dengan parameter jitter, packet loss, throughput, dan delay terhadap kinerja Load Balancing metode PCC berdasarkan Classifier Both Addresses, Both Ports, dan Both Addresses and Ports. Hasil menunjukkan bahwa sistem dapat mendistribusikan beban traffic dan dapat memberikan fungsi redundancy, sedangkan untuk pengujian QoS secara keseluruhan, Classifier Both Addresses mendapatkan hasil kinerja yang lebih bagus dibandingkan classifier lainnya.
APA, Harvard, Vancouver, ISO, and other styles
31

Srećković, Jovan. "Internet fraud." Pravo - teorija i praksa 40, no. 3 (2023): 115–33. http://dx.doi.org/10.5937/ptp2303115s.

Full text
Abstract:
Internet law represents one of the youngest branches of law, which emerged from the need to expand the existing and create a new regulatory framework that would regulate the internet and introduce the necessary legal security and protection for its users. Internet Law or Cyber Law is largely intertwined with the Law on Information and Communication Technology, as a legal field which encompasses the regulation of contractual relations established by means of information technology, the right to privacy and data protection, freedom of speech and intellectual property, internet security, copyright on computer program codes and databases, criminal offenses arising from actions on the internet, as well as the tax aspects of online goods and services exchange. In contrast to the broader scope of IT law, Internet law refers to a narrower segment of this legal field related to the internet, regulation of internet management at all levels, management of internet domain names and IP addresses, etc. Internet law (or Cyber law), in a broader sense, encompasses those parts of the legal system and legal domains that are related to the internet and provide protection to its users. To address the issue of domain name registrant liability and determining their identity, it is necessary first to explain the governance structure of the internet and the informational and legal nature of internet domains. Although the internet is often said to be free and belonging to everyone, this complex system does not operate entirely on its own, which means that it is not perfect to the extent that its structure is fully automated. Addressing the topic of internet fraud and educating colleagues and the general public are aimed at preventing fraud. The lack of awareness about how internet scams operate continually leads to new victims, and insufficient knowledge of legal provisions and potential penalties can create potential perpetrators of this crime. When complex topics are explained in simple terms, it represents a significant step in educating individuals, both in the legal and technological aspects from a legal perspective. Such academic work should not deter people from using the Internet, nor should it present an obstacle to progress and the digitization of difficult and time-consuming paperwork obligations. Instead, the objective is to timely educate individuals so that the utilization of the digital world can be integrated into all segments of society as quickly as possible. This will facilitate the functioning of daily life, including business operations, while still remaining within the bounds of legal regulations. Therefore, it is extremely important to educate people on how to avoid internet fraud.
APA, Harvard, Vancouver, ISO, and other styles
32

Bahama, Nazrulazhar, Anton Satria Prabuwono, and Teddy Mantoro. "Reconnaissance Attack on IPv6 to IPv4 Tunneling." International Journal of Mobile Computing and Multimedia Communications 5, no. 1 (January 2013): 1–9. http://dx.doi.org/10.4018/jmcmc.2013010101.

Full text
Abstract:
Internet Protocol version 6 (IPv6) is created to occupy the insufficient current Internet addresses. Consequently this significant contribution offers huge number of Internet addresses. Besides, the security also has been improved to challenge today threats in competent on IPv6 network. As alternative, an automatic tunneling was introduced along with other transition mechanisms to ensure smooth implementation on existing network. However, it’s believed that the implementation of automatic tunneling has altered the form of the IPv4 threats. Then the gained information from this mechanism is exploited to attempt the target network. As a concern, this paper thoroughly describes on potential of reconnaissance attack reach through automatic tunneling named 6to4 Tunneling. The preference development tools and networking defense mechanism suite, is setup to conduct proposed attack method under 6to4 tunnel testbed environment. As a result, the attacking method is feasible to attempt and 6to4 tunnel showed their influence on the achievement of DoS attack in current internet.
APA, Harvard, Vancouver, ISO, and other styles
33

Wu, Lang, Weijian Ruan, Jinhui Hu, and Yaobin He. "A Survey on Blockchain-Based Federated Learning." Future Internet 15, no. 12 (December 12, 2023): 400. http://dx.doi.org/10.3390/fi15120400.

Full text
Abstract:
Federated learning (FL) and blockchains exhibit significant commonality, complementarity, and alignment in various aspects, such as application domains, architectural features, and privacy protection mechanisms. In recent years, there have been notable advancements in combining these two technologies, particularly in data privacy protection, data sharing incentives, and computational performance. Although there are some surveys on blockchain-based federated learning (BFL), these surveys predominantly focus on the BFL framework and its classifications, yet lack in-depth analyses of the pivotal issues addressed by BFL. This work aims to assist researchers in understanding the latest research achievements and development directions in the integration of FL with blockchains. Firstly, we introduced the relevant research in FL and blockchain technology and highlighted the existing shortcomings of FL. Next, we conducted a comparative analysis of existing BFL frameworks, delving into the significant problems in the realm of FL that the combination of blockchain and FL addresses. Finally, we summarized the application prospects of BFL technology in various domains such as the Internet of Things, Industrial Internet of Things, Internet of Vehicles, and healthcare services, as well as the challenges that need to be addressed and future research directions.
APA, Harvard, Vancouver, ISO, and other styles
34

Pajdak, W. "Why not benefit from Internet resources: a list of useful WWW addresses." Acta Biochimica Polonica 44, no. 2 (June 30, 1997): 363–64. http://dx.doi.org/10.18388/abp.1997_4433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Moiny, Jean-Philippe. "Are Internet protocol addresses personal data? The fight against online copyright infringement." Computer Law & Security Review 27, no. 4 (August 2011): 348–61. http://dx.doi.org/10.1016/j.clsr.2011.05.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Hardin, Steve. "Genevieve Bell Addresses the Future of the Internet as a Cultural Institution." Bulletin of the American Society for Information Science and Technology 35, no. 3 (February 2009): 17–21. http://dx.doi.org/10.1002/bult.2009.1720350305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Pfister, Roger. "On the Utility Side of the Internet for African Studies and Africa: A Researcher's Experiences." A Current Bibliography on African Affairs 28, no. 1 (September 1996): 5–19. http://dx.doi.org/10.1177/001132559702800103.

Full text
Abstract:
This article is based on my recently published Internet for Africanists and Others Interested in Africa: An Introduction to the Internet and a Comprehensive Compilation of Relevant Addresses, Basel/Bern: Basler Afrika Bibliographien/Swiss Society of African Studies, 1996. 140 pp., ISBN 3-905141-67-1.
APA, Harvard, Vancouver, ISO, and other styles
38

Viji Amutha Mary, A., Konduru Sandeep Kumar, and Kesa Pavan Sri Sai. "An Automatic Approach to Extracting Geographic Information from Internet." Journal of Computational and Theoretical Nanoscience 16, no. 8 (August 1, 2019): 3216–18. http://dx.doi.org/10.1166/jctn.2019.8164.

Full text
Abstract:
An automatic approach to extract Geographic information especially represented by Points of Interest (POIs), is critical for identifying locations and provides the basis for various location-based services. Currently, geospatial data of POI are available through some open map services (e.g., Google Maps, OpenStreetMap, etc.). However, the data supporting these services are either collected through the expensive commercial purchasing and company investment or gathered by the volunteered contribution of high uncertainty. With the rapid geospatial data growing on the Web, we propose an automatic approach of extracting geographic information for building up POI resources based on the results obtained by the web search engines to mitigate the negative effect from the traditional means. According to the approach, we firstly put the types of POIs extracted from Google Maps and the street names obtained from OpenStreetMap into the Google search engine, and then retrieve the potential addresses of POIs through parsing the search results. Secondly, the Google search engine is employed again with the retrieved addresses of POIs to extract the potential place names. Finally, the Google search engine is employed for a third time with learning both the place names and the corresponding addresses to verify whether the place names are correct. The contributed output of the work is a place-name dataset. We respectively select 20 blocks in Chicago and Houston in U.S. to execute our approach for verifying the research contribution. In the experiments, we choose Google Map that is of high data quality as the reference and compare the results with those from OpenStreet Map and Wikimapia. The final results indicate that the proposed approach could effectively produce the place-name datasets on a par with Google Maps and outperform OpenStreet Map and Wikimapia.
APA, Harvard, Vancouver, ISO, and other styles
39

Muñoz, E. "Desafíos de los jóvenes y las redes sociales en la pospandemia. Hacia un aprendizaje consciente, resiliente, ético y saludable en las Ciudades MIL." Слово в науке, no. 1(2) (April 1, 2021): 212–23. http://dx.doi.org/10.53362/k4248-0063-1571-o.

Full text
Abstract:
The 2020 pandemic has created great global changes, both in the increased use of media and information, the creation of new digital applications, and new online jobs. At the same time, various types of violence have increased on the Internet, higher levels of discouragement, depression, and loneliness have been detected in both young people and adults. This article addresses six post­pandemic issues, realities, and challenges that must be addressed with youth alongside MIL competencies. Topics that have been developed in an educational project for leadership work in the face of changes in technological advances, Internet safety, fake news, hate speech, and the impact on emotions. In building MIL communities and cities, it is important to prepare new stakeholders to be more critical, aware, resilient, and healthy in the face of current digital challenges and difficulties.
APA, Harvard, Vancouver, ISO, and other styles
40

Antón Antón, Álvaro, Álvaro Jesús Del Blanco García, Irma Mosquera Valderrama, José-Andrés Rozas, and Marina Serrat Romaní. "THE INTERNET OF THINGS IN TAX LAW." Revista Crónica Tributaria 182, no. 1 (March 2022): 151–205. http://dx.doi.org/10.47092/ct.22.1.5.

Full text
Abstract:
Internet of Things (IoT) is currently a technology in expansion, which is used for multiple purposes. This article explores how Tax Law and Administrations could use it to improve the level of tax compliance and enforcement without overrunning the limits of taxpayers’ rights, through five Sections: Tax Proof; Taxpayers’ Rights; VAT & Customs; Fiscal Incentives; Energy taxation. Since is a very novel disruptive technology, this paper addresses common taxation topics, from a tax policy perspective, that can be related to any national or supranational regulations.
APA, Harvard, Vancouver, ISO, and other styles
41

Ding, Haifeng, Chengsu Zhang, and Wan Xiong. "Associations between Mobile Internet Use and Self-Rated and Mental Health of the Chinese Population: Evidence from China Family Panel Studies 2020." Behavioral Sciences 12, no. 7 (July 1, 2022): 221. http://dx.doi.org/10.3390/bs12070221.

Full text
Abstract:
With societal and technological developments, mobile Internet has become the most popular and widespread means to use the Internet in China. Thus, exploring the relationship between mobile Internet use and the self-rated health and mental health of the Chinese population is of great importance. This study empirically examined the impact of mobile Internet use on residents’ health using data from the China Family Panel Studies 2020 and conducted a heterogeneity analysis. The results revealed a significant negative association between mobile Internet use and the self-rated health of the population, but a significant positive association was found relative to their mental health. The results of this analysis passed a robustness test. The results of the heterogeneity analysis showed that mobile Internet use had a more significant association with the health of residents with secondary school education and university education compared to those with primary school education or below and graduate education. Furthermore, this study addresses the endogeneity problem using the propensity-score matching model, which is shown to be better at eliminating sample selectivity bias. If endogeneity is not addressed, the negative association with mobile Internet use on residents’ self-rated health will be underestimated and its positive association with their mental health will be overestimated. The Chinese government should issue guidelines on the duration of Internet use, strictly regulate exaggerated and harmful content on mobile network platforms, and strengthen people’s online skills through training to improve their digital literacy, especially for rural populations.
APA, Harvard, Vancouver, ISO, and other styles
42

Ezzat, Mostafa Ahmed, Mohamed A. Abd El Ghany, Sultan Almotairi, and Mohammed A. M. Salem. "Horizontal Review on Video Surveillance for Smart Cities: Edge Devices, Applications, Datasets, and Future Trends." Sensors 21, no. 9 (May 6, 2021): 3222. http://dx.doi.org/10.3390/s21093222.

Full text
Abstract:
The automation strategy of today’s smart cities relies on large IoT (internet of Things) systems that collect big data analytics to gain insights. Although there have been recent reviews in this field, there is a remarkable gap that addresses four sides of the problem. Namely, the application of video surveillance in smart cities, algorithms, datasets, and embedded systems. In this paper, we discuss the latest datasets used, the algorithms used, and the recent advances in embedded systems to form edge vision computing are introduced. Moreover, future trends and challenges are addressed.
APA, Harvard, Vancouver, ISO, and other styles
43

Malashenkova, Elena N. "Speech genre of wishes in youth Internet discourse: Innovations and linguistic creativity." International Journal “Speech Genres” 19, no. 2 (42) (May 22, 2024): 183–94. http://dx.doi.org/10.18500/2311-0740-2024-19-2-42-183-194.

Full text
Abstract:
This paper analyses the use of the wishing genre among Russian young people. One of the features of youth speech is a shift from stereotypes, searching for new creative ways of expressing various intentions, such as evaluation, compliment, congratulation and wishing. The purpose of the study is to analyze the texts of wishes from the point of manifesting the linguistic creativity of the addressers; to identify the means and ways of destroying stereotypes. The research material is youth wishes, predominantly students’ wishes (more than 700 text fragments). The analysis of the content of the wishing texts enabled the author to classify all wishes into stereotypical, individual and combined. Empirical material shows that in the communication of friends most wishes refer to individual ones (64%), whereas combined and stereotypical wishes make up 25% and 11%, respectively. The analysis of the texts of wishes identified the ways and means of demonstrating the linguistic creativity of the addressee. These ways and means include the tactics of compliment, appeal, advice, switching the addressee to a humorous tone and some other tactics that are not discussed in this paper. All of them allow to make wishes less stereotypical. The material showed that addressers in wishes aim to supplement the universal components of the wishes with individualized elements, including in the text the utilitarian details of the addressee’s life. Most often, wishes contain references to the addressee’s profession or hobbies. Linguistic creativity of the addressers is manifested at all linguistic levels. First of all, addressees actively use tropes, such as epithets, metaphors, and comparisons. Addressers look for unusual objects for comparison in the linguistic repertoires; they often use hyperbolization. At the level of word-formation, we observe the use of affixes with an augmentative meaning, diminutives (predominantly in wishes to female addressees); speech innovations and occasional word formation. In wishes of young people, a shift from stereotypes reflects in reduplicating letters and symbols, changing letter case, breaking words into syllables and placing a hyphen between syllables; using a wide range of emojis and stickers; playing with colorful highlighting. Precedent texts play an important role in moving away from stereotypes. The author concludes that all the considered methods and means of linguistic creativity that are regularly used by authors when creating wishes make it possible to enhance the expressiveness and impact degree of the texts. They function to avoid stereotypes, achieve a perlocutionary effect, and contribute to the self-presentation of the addresser.
APA, Harvard, Vancouver, ISO, and other styles
44

Lal, Karu, Upendar Rao Thaduri, and Sreekanth Dekkati. "Internet of Things and Blockchain Revolutionary Integration in the Business and Financial Sector." Asian Business Review 12, no. 3 (December 31, 2022): 81–88. http://dx.doi.org/10.18034/abr.v12i3.664.

Full text
Abstract:
Many applications of the Internet of Things have been developed, and these applications are causing people's lifestyles to shift. The Internet of Things (IoT) finance refers to the various applications of the Internet of Things that have the potential to extend financial services throughout the entirety of the IoT commodities transaction, subvert traditional finance & Internet finance services, and make the financial business processes more intelligent, transparent, and accurate. This article presents the design and implementation of a financial management platform based on combining blockchain technology with supply chain logistics. Supply chain finance is integrated using blockchain technology to synchronize the system of bank account payments, achieve the automatic flow of funds, process supervision, and automatically settle account periods based on smart contracts. Therefore, this research paper aims to discuss the function of blockchain technology within the Internet of Things (IoT) and financial applications. These two domains stand to benefit the most from its implementation. In addition, this study investigates the concerns regarding privacy and security associated with it and offers some thoughts regarding how these issues can be addressed. In the final step of this process, the public perception of blockchain technology addresses how various parts of society view blockchain technology.
APA, Harvard, Vancouver, ISO, and other styles
45

Lehr, William, David Clark, Steve Bauer, Arthur Berger, and Philipp Richter. "Whither the Public Internet?" Journal of Information Policy 9, no. 1 (December 1, 2019): 1–42. http://dx.doi.org/10.5325/jinfopoli.9.1.0001.

Full text
Abstract:
Abstract This article addresses the question of what should be meant by the phrase the Internet, or equivalently, the public Internet. Since its origins in the 1960s, the Internet has changed significantly in terms of the networks and technologies, services that are supported, and industry players who participate in the Internet ecosystem, growing in global economic and social importance. This article discusses the changing role of the network operators and service providers that support the public Internet, and the relationship between what might be considered the public Internet and other elements of the global infrastructure. Herein, we explain why the quest for a single definition for the Internet is likely a fool’s errand, while recognizing that there remains a need to understand what the concept means in light of its growing importance as a topic of policy concern. Instead of a definition, we propose a three-lens framework through which to evaluate technical and market trends that are changing the Internet and assist in determining whether those changes are or are not consistent with what we view as worth preserving in that which we refer to as the Internet.
APA, Harvard, Vancouver, ISO, and other styles
46

Santos, J. Freitas. "Promoting Wine on the Internet." International Journal of Online Marketing 1, no. 4 (October 2011): 48–63. http://dx.doi.org/10.4018/ijom.2011100104.

Full text
Abstract:
This study examines the content of Portuguese wine blogs and addresses two main questions: (i) which content and design elements of Portuguese wine blogs have more impact on the promotion of wine, and (ii) how can the content and design quality of wine blogs be assessed and improved. To answer these questions, a number of features of wine blogs are examined, and an initial attempt is made to describe the profile, uses and practices of Portuguese wine bloggers. Strong correlations were found between performance measures (posts, comments and traffic). In addition, it was found that one of the main marketing features that bloggers can offer was in rating wines. On the other hand, presentation features were found to account for very little regarding the performance of the blog. Finally, accessibility features, such as cross-references and RSS/Feeds that tend to increase blog traffic, are only used by a minority of Portuguese bloggers.
APA, Harvard, Vancouver, ISO, and other styles
47

McMullan, John L., and Aunshul Rege. "Online crime and internet gambling." Journal of Gambling Issues, no. 24 (July 1, 2010): 54. http://dx.doi.org/10.4309/jgi.2010.24.5.

Full text
Abstract:
The spread of Internet gambling has raised several issues concerning motivations to gamble, consumer behaviour online, problem gambling, security of Web sites, and fairness and integrity of the games. Rather surprisingly, however, there has been little in the way of research regarding online crime and Internet gambling even though it is an urgent priority. This article addresses this absence by investigating the types, techniques, and organizational dynamics of online crime at the portals of Internet gambling sites. Our approach is qualitative in nature and explores, using document analysis, the activities of cybernomads, dot.con teams, and criminal networks. We demonstrate that there are different levels of criminal organization, distinguished by their complexity of division of labour; coordination of roles; purposefulness of association between criminals; and ability to avoid, evade, or neutralize security systems and law enforcement. We conclude by arguing that conventional understandings of real-world gambling-related criminal relationships have been altered by the digital environment of the Internet.
APA, Harvard, Vancouver, ISO, and other styles
48

Tiwari, Mayank Kumar, Rahul Pal, Riya Singh, Ankur Kumar Singh, Vijay Kumar, Swati Sharma, and Naheeda Zaib. "The Comprehensive Review: Internet Protocol (IP) Address a Primer for Digital Connectivity." Asian Journal of Research in Computer Science 17, no. 7 (July 16, 2024): 178–89. http://dx.doi.org/10.9734/ajrcos/2024/v17i7488.

Full text
Abstract:
The Internet Protocol (IP) is the rule book that governs how data is addressed and routed across networks on the internet. Think of it as the postal system for the digital world. This addressing system allows routers, the digital mail carriers, to efficiently transfer packets between devices and networks until they reach their destination. It ensures data reaches the right place by assigning addresses and enabling efficient routing. IP also encompasses various protocols and services, such as ICMP (Internet Control Message Protocol) for error reporting and diagnostics, and DHCP (Dynamic Host Configuration Protocol) for automatic IP address assignment. Additionally, IP can be configured to support different transmission modes, including uni-cast, multicast, and broadcast, catering to diverse communication requirements. Adopting technology that has been researched and developed commercially offers the military a cost-effective method of implementation. IP systems enable the forces to share a common network that supports voice, video, and data sharing. This systematic review article initially highlighted the basics on IP and lastly the brief discussion regards data gram format, NAT, IPv4, IPV6 IP fragmentation, CIDR, TCP and UDP individually.
APA, Harvard, Vancouver, ISO, and other styles
49

Kerr, K. Austin. "Revisiting Business Historians and the Internet." Enterprise & Society 1, no. 1 (March 2000): 179–81. http://dx.doi.org/10.1017/s1467222700015639.

Full text
Abstract:
During the 1996 annual meeting of the Business History Conference, a session on the World Wide Web attracted considerable attention from curious members (see Business and Economic History 25 [Fall 1996]: 46—54). The Internet was then somewhat of an infant, and most of us, just becoming accustomed to the speed and convenience of electronic mail, were barely aware of the opportunities afforded by the then-new graphical interface known as the Web. No more! At least not in the United States, where advertisers bombard us with their Internet addresses and news accounts inform us of vast fortunes made in new Internet ventures that have not yet turned a profit. There is, in short, a “dot.com” revolution occurring in American business. It is also happening, albeit more slowly, in scholarly and educational circles.
APA, Harvard, Vancouver, ISO, and other styles
50

Sullivan, Jonathan, and Lei Xie. "Environmental Activism, Social Networks and the Internet." China Quarterly 198 (June 2009): 422–32. http://dx.doi.org/10.1017/s0305741009000381.

Full text
Abstract:
AbstractSocial networks and the internet both have a substantial individual effect on environmental activism in China. In this article, we speculate that social linking patterns between environmental actors, which often facilitate activism on the ground, may also exist in cyberspace in the form of an online network. The article addresses the following empirical questions. Does such an online network exist? If so, who are the constituent actors? Are these the same actors observed on the ground? In addressing these questions the article aims to contribute to the growing debate on the implications of the internet for the potential emergence of social movements in China.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography