To see the other types of publications on this topic, follow the link: Internet service providers.

Dissertations / Theses on the topic 'Internet service providers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Internet service providers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Richards, Tanya Krystine. "Legal regulations of internet services providers." Thesis, Queensland University of Technology, 2001. https://eprints.qut.edu.au/36871/1/36871_Richards_2001.pdf.

Full text
Abstract:
The objective of this thesis work is to establish the legal regulations of Internet service providers and establish that there is in fact a body of regulations in existence now for their regulation. While at this time there is feeling in the marketplace that there is insufficient legal regulation of Internet service providers, this thesis has uncovered an existing statutory regime of regulations and obligations. In addition to this existing statutory regime there is further emerging regulations and obligations currently in progress and it can be expected that it will continue to emerge with the industry emergency. Form a commercial perspective it has been shown that the telecommunications, information technology, communications and entertainment industries are converging with the Internet as a mutual channel for delivery of their existing services. This emergence of a merged industry places the Internet service provider in an interesting position from a regulatory perspective. The Internet service provider is in fact regulated not only by a number of legislative pieces, but also by a number oflegislative bodies. The term Internet service provider is not an easily defined term. The legal definition is found in the legislation based upon the commercial decisions that the Internet service provider makes, and the term itself is only used in the Broadcasting Services Act. The definition from a layperson point of view is less defined and in many instances does not contain significant correlation with the laypersons expectation of the definition of the term. The life span of the term Internet service provider is questionable. It is difficult to ascertain how long the term will be in common use with the rapid emergence of technology, and if it is still in common usage, if it will have the same meaning as it does at the time of this thesis.
APA, Harvard, Vancouver, ISO, and other styles
2

FREITAS, MIGUEL DE ANDRADE. "QUALITY OF SERVICE ON INTERNET SERVICE PROVIDERS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2004. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=5031@1.

Full text
Abstract:
O desenvolvimento de arquiteturas de Qualidade de Serviço (QoS) para a Internet é um problema que tem recebido bastante atenção ultimamente. Diversos motivos têm impedido a implementação destas arquiteturas em larga escala como, por exemplo, a dificuldade de estabelecimento de contratos e políticas de QoS entre usuários, provedores e operadoras e a ausência de mecanismos na rede para solicitar serviços com garantia de qualidade. Apesar de não terem acesso a um serviço que garanta certos níveis de desempenho para cada tipo de aplicação, os usuários de Internet têm se mostrado cada vez mais exigentes na qualidade do acesso à rede. Isto se confirma com a migração crescente de muitos destes usuários para o acesso à Internet em banda larga. Os provedores de acesso à Internet, principalmente os de banda larga, devem adotar políticas de gerenciamento de seus recursos para atender às expectativas de qualidade dos usuários e se manter competitivos no mercado. Neste trabalho, foram identificados problemas nos processos adotados em um provedor de acesso em banda larga sem fio, a MLS Wireless. No sistema antigo, ocorriam situações que causavam a indisponibilidade de serviços por causa da limitação de conexões simultâneas na rede ou ainda uma degradação na banda e aumento na latência do acesso devido a falta de justiça no compartilhamento de recursos. O trabalho sugere soluções para as deficiências encontradas, implementando-as e analisando a eficácia das mesmas. Para resolver o problema de indisponibilidade, sugere-se o estabelecimento de limites por usuário, para que a capacidade total do sistema não seja esgotada. Para resolver o problema de injustiça e dar maior eqüidade na distribuição de recursos entre os usuários, é implementado um novo mecanismo de compartilhamento baseado em uma disciplina de fila SFQ (Stochastic Fairness Queueing). Os resultados mostraram que as modificações propostas foram efetivas. O tempo de acesso à serviços de WWW e e-mail durante períodos de congestionamento foi drasticamente reduzido, em alguns casos, de cerca de 1 minuto para menos de 10 segundos.
The development of Quality of Service (QoS) architectures for the Internet is a problem that has received significative attention recently. The large scale deployment of such architectures has being blocked by several reasons, such as, the dificulty in establishing Service Level Agreements (SLA) of QoS policies between users, Internet Service Providers (ISP) and operators, and the lack of mechanisms on the network to request services with quality guarantees. Despite of not having access to a service that can guarantee certain levels of performance per aplication, the Internet users are getting more and more concerned about the network quality. That can be confirmed by the number of users that are migrating to the broadband Internet access. The ISP´s, specially the broadband ones, must take measurements to manage their resources to satisfy the users´ expectations of quality and stay competitive on the market. In this work, problems have being identified at the processes used by a broadband ISP, the MLS Wireless. With the old system, certain situations could cause the denial of service due the number of simultaneos connections or degradation and increased latency due the lack of fairness to share the network resources. This work suggests some solutions for these deficiencies, implementing and analyzing their effectiveness. To fix the denial of service, we suggest the limitation of resources per user, so that the total capacity won´t be depleted. To have the resources more fairly distributed among the users, a new mechanism of sharing is implemented, based on a discipline named SFQ (Stochastic Fairness Queueing). The results show that those modifications have being effective. The time to access services like WWW and e-mail during congestion periods was drasticaly reduced, in some cases, from about 1 minute to less than 10 seconds.
APA, Harvard, Vancouver, ISO, and other styles
3

Cheng, Kai-sing Steve. "Internet service provider industry in Hong Kong /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19882002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Beréndique, Betancourt Fernando Javier. "Liability of Internet Service Providers for copyright infringement." Tesis, Universidad de Chile / Universitat Heidelberg (Alemania), 2011. http://www.repositorio.uchile.cl/handle/2250/111849.

Full text
Abstract:
Tesis (Magister en derecho internacional, derecho económico, inversiones, comercio y arbitraje internacional)
Growing and expanding so-called Information Society, the most valuable asset is the intellectual, either in its technological aspect, commercial or authorial. The Information Society has led to controversial issues: one on intellectual property specifically relating to copyright in the network, dealt with different perspectives, different laws and dissimilar trends. Precisely in this research will address the liability of Internet Service Providers (ISP) for unauthorized downloads against copyright. For this study will address the various laws and treaties that have governed the issue, the protection mechanisms and the positions embraced by each country in order to protect the copyright. As you will see there is a single outlet to the problem of unauthorized downloads, will depend on the system hosted by each country, but what if it is conclusive that there is still that all countries in the world to adopt a system of protection for individual good is most valuable as intellectual property.
APA, Harvard, Vancouver, ISO, and other styles
5

He, Jiong. "The protection of the communication right concerning Internet Service Provider's infringement under Chinese Copyright Law." Thesis, Available from the University of Aberdeen Library and Historic Collections Digital Resources. Restricted: no access until June 24, 2012, 2009. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?application=DIGITOOL-3&owner=resourcediscovery&custom_att_2=simple_viewer&pid=53331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Flores, Delgadillo Will Johnny. "IT Service Delivery in Nicaraguan Internet Service Providers : analysis and Assessment." Licentiate thesis, KTH, Data- och systemvetenskap, DSV, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-29560.

Full text
Abstract:
The thesis addresses the research question: How to describe, understand, and explain IT service delivery? Based on the research question, the following research questions were derived:  How to analyse IT service delivery based on ITIL in order to determine its current situation? How to formalize elements of IT service delivery in maturity level that can be used to assess its current status? These research questions are answered by two IT artefacts: an analysis method and a maturity model for IT service delivery. Both of them are constructed by design-science research guidelines. The analysis method is focused on understanding the IT service delivery in organizations; it is founded on the IT service delivery processes of Information Technology Infrastructure Library (ITIL) version 2. The method proposed has been applied through three case studies of Nicaraguan Internet Service Providers (ISPs). The maturity model is oriented to formalize and assess the maturity level of IT service delivery; it is supported by IT service delivery elements that are considered significant for managing IT service delivery by the Nicaraguan ISP sector, by IT service concepts, and by maturity model properties, and complemented by the IT Service Capability Maturity Model. The maturity model provides a mechanism for evaluating the maturity level of IT service delivery through a set of maturity statements and includes a graphical representation; it is also applied to the traceable information of the current status of IT service delivery of one of the Nicaraguan ISPs.
QC 20110209
APA, Harvard, Vancouver, ISO, and other styles
7

Cheng, Kai-sing Steve, and 鄭啓誠. "Internet service provider industry in Hong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31268651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mört, Robert. "Content Based Addressing : The case for multiple Internet service providers." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-107174.

Full text
Abstract:
Today's Internet usage is changing from host-to-host communication to user-to-content interaction which proves a challenge for Internet Service Providers (ISPs). Repeated requests lead to transfers of large amounts of traffic containing the same content often over costly inter-ISP connections. Content Distribution Networks (CDNs) contribute to solving this issue, but do not directly address the problem. This thesis project explores how content based addressing could minimize inter-ISP traffic due to repeated requests for content by caching content within the ISP's network. We implemented CCNx 0.6.0 in a network testbed in order to simulate scenarios with multiple ISPs interconnected to each other. This testbed is used to illustrate how caching of popular content minimizes inter-ISP traffic as well as how content independence minimizes the effect of other network problems such as link failures and congestion. These tests shows that the large overhead of the CCNx implementation due to the additional headers brings a 16% performance reduction compared to Hypertext Transfer Protocol (HTTP) transfers. However, these tests also shows that the cost from the inter-ISP traffic of CCNx transfers are constant regardless of the number of repeated requests, due to content caching in the ISP's network. As soon as there is more than one request for the same content there is a gain in using CCNx rather than HTTP for content transfer.
Dagens användning av internet ändrar form från dator-till-dator kommunikation till användaretill- innehålls interaktion vilket innebär nya utmaningar för internetleverantörer vilka måste överföra stora mängder upprepade förfrågningar av innehåll via kostsamma länkar mellan internetleverantörer. Lösningar som innehållsdistribuerande nätverk (Content Distribution Network) hjälper idag till men addresserar inte kärnan av problemet. Det här examensarbetet undersöker hur innehållsbaserad addressering kan minimera mängden trafik mellan internetleverantörer genom att cachning, att lagra kopior av innehåll, i internetleverantörers nätverket. I det här examensarbetet implementerade vi CCNx 0.6.0 i en testbädd för att simulera scenarion med nätverk mellan internetleverantörer. Denna testbädd används för att illustrera hur cachning av populärt innehåll kan minimera trafik mellan internetleverantörer samt hur innehållets oberoende av plats även hjälper till med andra problem i nätverket såsom länkfel och stockning. Dessa test visar att CCNx implementationen har stor overhead information på grund av ytterligare, extra headers vilket medför en 16% reducering i prestanda jämfört med överföringar som använder Hypertext Transfer Protocol (HTTP). Vidare visar dessa tester även att kostnaden från trafik mellan internetleverantörer är konstant oberoende av antalet upprepade förfrågningar, på grund av cachning av innehåll i internetleverantörens nätverk. Så snart det finns fler än en begäran för samma innehåll finns det en vinst i att använda CCNx istället för HTTP för överföringar av innehåll.
APA, Harvard, Vancouver, ISO, and other styles
9

Avila-Merino, Alfonso S. "Internet service providers, global or local ? : examining Mexico and Spain." Thesis, University of Sussex, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.404760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Møinichen, Jørgen. "The Net Neutrality Debate : Analysis of economic implications of net neutrality on internet service providers, content providers and internet users." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for industriell økonomi og teknologiledelse, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27129.

Full text
Abstract:
This thesis studies the economic implications of a transition from a neutral to a non-neutral network. A mathematical model with an end to end ecosystem is developed, which includes a backbone internet service provider that provides connectivity for the content providers. The model also includes internet users that pay an access internet service provider for connectivity to interact with the content providers, advertisers that pay the content providers, and access internet service providers that charge the internet users for their connectivity. In the non-neutral regime, the content providers can pay the access internet service provider to access specialized services, a priority lane. The model is solved in a non-cooperative two stage game, and where the backbone and access internet service providers maximize their individual profits. Our analysis shows that the non-neutral unregulated regime always improves social welfare, investment and innovation levels, and lowers the congestion levels. We also show that the backbone internet service provider is always better off in the non-neutral regime, and therefore reduce the benefit of the other players. The result for the other players is generally positive in favor of a non-neutral regime, but much more ambiguous, especially for the access internet service providers. We also show that moderate regulation can increase social welfare. However, even moderate regulation might severely impair individual players, and too much regulation may also impair the non-neutral regime so that the overall social welfare is worse than in the neutral regime.
APA, Harvard, Vancouver, ISO, and other styles
11

Leida, Brett A. (Brett Alan) 1968. "A cost model of Internet service providers : implications for Internet telephony and yield management." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/10052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Vanberg, Margit A. "Competition and cooperation among internet service providers a network economic analysis." Baden-Baden Nomos, 2008. http://d-nb.info/991114353/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Fogel, Johan. "IP version 6 in larger city networks and at Internet service providers." Thesis, Mälardalen University, Mälardalen University, Mälardalen University, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7479.

Full text
Abstract:

Since the 90ies a bunch of problems and flaws in the old Internet Protocol version four has occurred.The biggest problem is the extinction of addresses which will come soon, soon in the matter of theclassic “wolf is coming” matter, but as in the fairy tale the wolf will finally come. When this will happenis unknown, but not many believes it won’t. Carl-Henrik Swanberg CEO for Ericsson once said that year2020 there will be 50 billion mobile units connected to internet. Considering there is maximum 4 billionaddresses in IPv4 the needs for more addresses will be significant. The solution of this is the version sixof Internet Protocol released in middle of the 90ies. This thesis mentions a lot of the problems with theold version and tries to make a good explanation of the benefits and possibilities that lies within thenew. It also contains a larger amount of information on the protocols that lies within this, like newversion of OSPF, the extensions of BGPv4 called multiprotocol BGP (MP-BGP) and new things likenetwork discovery protocol (NDP). The later chapter is about the planning of an implementation atMälarenergi City Network and the implementation at the internet service provider MDFnet whichnowadays runs IPv6 in their core and office network.

APA, Harvard, Vancouver, ISO, and other styles
14

Oliveira, Luciana Pereira. "Future internet architecture to structure and to manage dynamic autonomous systems, internet service providers and customers." Universidade Federal de Pernambuco, 2008. https://repositorio.ufpe.br/handle/123456789/1708.

Full text
Abstract:
Made available in DSpace on 2014-06-12T15:51:58Z (GMT). No. of bitstreams: 1 license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2008
Conselho Nacional de Desenvolvimento Científico e Tecnológico
Diversos trabalhos na área de redes dinâmicas têm sido propostos na literatura com o objetivo de prover à arquitetura da Internet o suporte à mobilidade. O problema dessas redes instáveis na Internet consiste em oferecer um conjunto de mecanismo, tais como endereçamento, gerenciamento da informação e encaminhamento da informação, que suportem informação e entidade (Sistema Autônomo, Provedor de Serviços na Internet e Clientes) móveis. Nesse contexto, alguns trabalhos para arquitetura da Internet têm proposto uma maneira de separar a localização (atualmente o IP) e o nome identificador, devido ao forte relacionamento entre o IP e o nome. Em geral, eles propõem uma abordagem de roteamento na camada overlay para separar essas informações. Outros trabalhos acreditam que este desacoplamento não é suficiente para solucionar os problemas de mobilidade, desde que a dinamicidade gera muitas mensagens de controle e atualizações do vínculo entre o IP e o nome. Por essa razão, os pesquisadores também têm proposto novos modelos para gerenciar a camada overlay. Uma das contribuições deste trabalho é a proposta de uma solução para arquitetura da Internet denominada Stable Society que adota a abordagem de papéis. Um papel é uma unidade funcional que é utilizada para organizar a comunicação. Um importante diferencial da proposta é que além de desvincular o nome e a localização, ela também oferece soluções para os problemas relacionados a estruturação e manutenção da camada overlay. Além disso, este trabalho define quatro papéis: o mensageiro encaminha os dados dentro da sociedade; o guarda é a entidade mais estável para encaminhar mensagens entre as sociedades; o operário armazena informações; e o líder estrutura e gerencia a rede overlay. Reduzindo o escopo para a implementação desta dissertação de mestrado, o mensageiro e o guarda foram considerados como a camada de rede sem distinção de estabilidade, desde que o fornecimento de um mecanismo de gerenciamento do overlay de roteamento foi o objetivo do trabalho. Portanto, como prova do conceito apresentado pela proposta, os líderes e operários foram implementados, porque eles agem de maneira independente de tecnologia de acesso e são fundamentais para solucionar o problema da instabilidade nos processos de armazenamento e descoberta da informação. Como resultado, um novo algoritmo denominado Stable Society model over Distributes Hash Table (SSDHT) foi proposto. Além disso, este algoritmo foi comparado com outras soluções DHT (Chord). Os resultados mostraram que o SSDHT é um bom algoritmo, principalmente quando se aumenta a instabilidade (carga do tráfego, grau de mobilidade e tamanho da rede). Por exemplo, a taxa de mensagens entregue com sucesso foi acima de 90% quando a carga de tráfego, o grau de mobilidade e o tamanho da rede foram variados
APA, Harvard, Vancouver, ISO, and other styles
15

Sääf, Alexander. "Cloud Services for Building the Modern Internet of Things : An Examination of IoT Cloud Service Providers." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-162090.

Full text
Abstract:
As the IoT has grown in popularity, modern Cloud Providers have begun offering IoT-specific features. These features could provide IoT developers with a lot of aid, but they are new and relatively unexplored. This study aims to explore these IoT-specific features in order to build a better foundation for developers looking to leverage them to improve their IoT systems or development process. To do this, a literature study combined with a case study was carried out. The literature study gives insight into the current research around IoT and IoT cloud providers, for example with common issues and possible applications. The case study provides a reference of how a simple proof-of-concept system can be developed using two of the available providers: AWS IoT and Azure IoT.
APA, Harvard, Vancouver, ISO, and other styles
16

Chiou, Bo-Yun. "Google takes on China a cross-cultural analysis of internet service design /." Muncie, Ind. : Ball State University, 2009. http://cardinalscholar.bsu.edu/643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

De, Vos Belgraver Cecilia Susan. "The emergence and growth of dial-up internet service providers (ISPs) as a means of access to the internet in South Africa: a case study of M-Web and World Online." Thesis, Rhodes University, 2003. http://hdl.handle.net/10962/d1007811.

Full text
Abstract:
The desire amongst media scholars for the fulfilment of the ideal of a universally accessible public sphere by the media is such that virtually every new communications technology that has emerged over the past 1 ~O-odd years such as radio, television or the Internet has been welcomed with enthusiasm - by some - at the prospect of the newest communications innovation bringing about universal access to information. However, the history of communications media tells of the commercialisation of each new medium, from radio to television, and the imposition of barriers to access, based on cost. Access to communications media is open to those people who can afford to pay for them. 111e emergence of the Internet spawned renewed hoped that the public sphere ideal would be realised. 111is new technology seemed more powerful than anything that had come before it. The Internet offered the means whereby one could access a global repository of information, stored on a worldwide network of computer networks, and available 24 hours a day. With the Internet, it was also possible to communicate with people on the other side of the world within seconds, using electronic mail (e-mail). Here was a medium that permitted one to send text and pictures to colleagues and friends within a fraction of the time taken by traditional means such as fax, telephone or post. To enjoy the convenience of the Internet though, one had to have a means of access. In South Africa, access could be gained through a personal computer linked to the Internet either through a network in the workplace or an academic or research institution, or via a telephone link to an Internet Service Provider (ISP). What were the names of the first ISPs to emerge in South Africa? When did they emerge and how did they develop? Did the number of ISPs grow or decline? What do ISPs give access to, at what cost and to whom? Do they provide universal access to information? This study addresses these questions by examining South Africa's leading providers of home dial-up internet access, M-Web and World Online, and by exploring the histories of their emergence and development, within the context of current media trends of concentration, diversification and globalisation.
APA, Harvard, Vancouver, ISO, and other styles
18

O'Brien, N. D. "The liability of Internet service providers for unlawful content posted by third parties." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1149.

Full text
Abstract:
Internet Service Providers (ISP’s) are crucial to the operation and development of the Internet. However, through the performance of their basic functions, they faced the great risk of civil and criminal liability for unlawful content posted by third parties. As this risk threatened the potential of the Internet, various jurisdictions opted to promulgate legislation that granted ISP’s safe harbours from liability. The South African (RSA) response is Chapter XI of the Electronic Communications and Transactions Act (ECTA). The protection it provides is however not absolute. It is limited to ISP’s that are members of an Industry Representative Body (IRB) and those ISP’s must perform particular functions in relation to third party content in a certain manner to obtain limited liability. Due to the ECTA’s limited application and a lack of authority, the question is raised as to what is the liability of ISP’s for unlawful content posted by third parties? This dissertation pays particular attention to ISP liability for third party defamatory statements, hate speech, and obscene and indecent material. The role and characteristics of ISP’s in the functioning of the Internet is described. It is determined that a wide legal definition would be required to encompass the many roles they perform. The definition provided by the ECTA is wide and many different types of ISP can fall underneath it. This may have unintended consequences as entities may receive protection that the legislature did not intend. The appropriate laws in the United States of America (USA) and the United Kingdom are surveyed and suggestions as to the extent of ISP liability in circumstances where the ECTA does not apply are made. It is established that their position is uncertain due to difficulties in applying the law to the Internet. This could result in the law being applied incorrectly and ISP’s erroneously found liable. The ECTA’s threshold requirements limit the availability of the safe harbor provisions to ISP’s that are members of a recognised IRB. The IRB must comply with an extensive set of requirements to obtain recognition. The purpose of these requirements is to ensure that only responsible ISP’s obtain the protection provided by the act. After an examination of these requirements, their necessity is questioned as their purpose appears to be contrary to the logic of the safe harbours provided by the ECTA. The safe harbours are analysed and comparisons made to similar legislation that exists in the USA and the European Union (EU). It was established that the ECTA is a hybrid of the USA and EU legislation, and to a certain extent improves on them. It was suggested that the extent of ISP liability in relation to certain unlawful content is clearer under the ECTA. However, exceptions may exist in relation to hate speech and obscene and indecent content as a result of legislation that does not properly take the technology of the Internet into account. It was recommended that certain action be taken to correct this position to prevent any negative effects on the Internet industry and conflict with the objectives of the ECTA. The provision of limited liability contained in the ECTA is balanced with a notice and takedown procedure, which provides relief to victims of unlawful content. This procedure is analysed and it appears to be effective in providing relief. However, through an examination of concerns raised in relation to this type of procedure as it exists in the USA and the EU, it is suggested that certain flaws exist. The take-down procedure negatively effects the freedom of expression and the third party’s rights to due process. Further, the threshold requirements result in not all the users of the Internet being provided with the same remedies. It is recommended that certain action be taken to correct these flaws. The solution provided by the ECTA should be favoured over the uncertainty that existed before it promulgation. It may be necessary to correct particular flaws that exist. Certain recommendations are suggested in this regard and the concluding chapter.
APA, Harvard, Vancouver, ISO, and other styles
19

Sookavatana, Pipat Electrical Engineering &amp Telecommunications Faculty of Engineering UNSW. "Service Trading Marketplace Network (STAMP-Net): service discovery and composition for customizable adaptive network." Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2003. http://handle.unsw.edu.au/1959.4/20439.

Full text
Abstract:
This thesis presents a complete alternative service composition model named Service Trading Marketplace Network (STAMP-Net). The primary concept is to improve overall system scalability and introduce a fair business scheme for customers and providers. STAPM-Net focuses on designing an architecture based on both technical and business aspect. In STAMP-NET, users remain the ability to choose their preference service providers from potential-provider lists, and service providers are able to compete for the requested services that they can handle. For these purposes, STAMP-Net introduce a concept of 'Service Trading Marketplace Mechanism' which facilitates a problem of 'conflict of interest'; 'Indirect Service Discovery' which allows service providers to the learn existing of services being offered by other service providers; and 'Service Subcontract System' which allows service providers to subcontract any missing service to other potential service providers. In addition, this thesis also present monitor techniques, which are used to ensure the quality of services.
APA, Harvard, Vancouver, ISO, and other styles
20

Qasim, Muhammad, and Mohammad Asadullah. "The Role of Customer Support Service in Relationship Strengthening : A Case of Swedish Broadband Internet Service Providers." Thesis, Karlstads universitet, Avdelningen för företagsekonomi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-13637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Boateng, Kwasi. "Bringing new media to Ghanaians : the political economy of Internet deployment /." View abstract, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3203331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Spring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Chan, Ka Tat. "Investigation of a company internal workflow for improvement." access abstract and table of contents access full-text, 2006. http://libweb.cityu.edu.hk/cgi-bin/ezdb/dissert.pl?msc-meem-b21417568a.pdf.

Full text
Abstract:
Thesis (M.Sc.)--City University of Hong Kong, 2006.
Title from title screen (viewed on Oct. 5, 2006) "Submitted to Department of Manufacturing Engineering and Engineering Management in partial fulfillment of the requirements for the degree of Master of enterprise technology and management." Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
24

Helmi, Amr Shoukry. "The enforcement of digital copyright in Egypt : the role and liability of internet service providers." Thesis, Brunel University, 2013. http://bura.brunel.ac.uk/handle/2438/12628.

Full text
Abstract:
The thesis examines to what extent copyright holders can enforce the online reproduction and communication rights against online service providers in Egypt. The objective of the thesis is therefore to highlight that the existing Egyptian copyright law 2002/82 is insufficient to impose liability on internet service providers, both substantively and also with regards to enforcement. Various recommendations are thus made to improve the legislative framework in Egypt, all with a view of achieving that a fair balance is struck for all those parties, who/which are involved in digital communications, particularly online end users, so that their rights to online privacy and access to information are preserved. For this purpose, a comparative methodology has been adopted and recourse is made to US and European laws. This comparative approach is further complemented by a critical examination of existing deficiencies within the legislative liability regime for internet service providers in the US and Europe in order to ensure that foreign laws are not merely transplanted, but that the best and most suitable legislative framework is adopted by the Egyptian legislator.
APA, Harvard, Vancouver, ISO, and other styles
25

Fung, Kai-yuen. "Latest development and applications of internet services in Hong Kong : a comparative study to our United States and Singapore counterparts /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19877754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lee, Tae Hee Walden Ruth C. "Revisiting internet service providers' immunity from defamation liability a decade after enactment of the Communications Decency Act." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2006. http://dc.lib.unc.edu/u?/etd,457.

Full text
Abstract:
Thesis (M.A.)--University of North Carolina at Chapel Hill, 2006.
Title from electronic title page (viewed Oct. 10, 2007). "... in partial fulfillment of the requirements for the degree of Master of Arts in the School of Journalism and Mass Communication." Discipline: Journalism and Mass Communication; Department/School: Journalism and Mass Communication, School of.
APA, Harvard, Vancouver, ISO, and other styles
27

Yang, Weilai. "Pricing Network Resources for Differentiated Service Networks." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5227.

Full text
Abstract:
We developed a price-based resource allocation scheme for Differentiated Service (DiffServ) data networks. The DiffServ framework was proposed to provide multiple QoS classes over IP networks. Since the provider supports multiple service classes, we need a differentiated pricing scheme, as supposed to the flat-rate scheme employed by the Internet service providers of today. Charging efficiently is a big issue. The utility of a client correlates to the amount of bandwidth allocated. One difficulty we face is that determining the appropriate amount of bandwidth to provision and allocate is problematic due to different time scales, multiple QoS classes and the unpredictable nature of users. To approach this problem, we designed a pricing strategy for Admission Control and bandwidth assignment. Despite the variety of existing pricing strategies, the common theme is that the appropriate pricing policy rewards users for behaving in ways to improve the overall utilization and performance of the network. Among existing schemes, we chose auction because it is scalable, and efficiently and fairly shares resources. Our pricing model takes the system's availability and each customer's requirements as inputs and outputs the set of clients who are admitted into the network and their allocated resource. Each client proposes a desired bandwidth and a price that they are willing to pay for it. The service provider collects this information and produces parameters for each class of service they provide. This information is used to decide which customers to admit. We proposed an optimal solution to the problem of maximizing the provider's revenue for the special case where there is only one bottleneck link in the network. Then for the generalized network, we resort to a simple but effective heuristic method. We validate both the optimal solution and the heuristic algorithm with simulations driven by a real traffic scenario. Finally, we allow customers to bid on the duration for which the service is needed. Then we study the performance of those heuristic algorithms in this new setting and propose possible improvements.
APA, Harvard, Vancouver, ISO, and other styles
28

GOHARI, MOGHADAM SHERVIN, and THOR ÅHLGREN. "Moving beyond connecting things : What are the factors telecommunication service providers need to consider when developing a Data-as-a-Service offering?" Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279760.

Full text
Abstract:
The Internet of Things and connected devices has been getting more and more recognition in multiple industries the last few years. At the same time, the gathering of data is withholding a more central role for both companies and civilians. One type of Internet of Things is enabled by telecommunication Service Providers(TSP)providing SIMcards in devices, functioning by an advanced telecommunication infrastructure. This study aims to examine how these TSPs can leverage data generated by the communication infrastructure, by providing an additional data-as-a-service (DaaS) to current customers. The study was done at a global TSP within the area of SIM-fleet management/IoT enablement. The number of industries that are starting to connect devices are growing extensively, to get all types of information regarding the devices ranging from electricity-usage & geocoordinates to performance or other useful information. The data that is sent by the SIM-card belongs to the customer, and the TSPs does not access it. However, the telecommunication infrastructure generates data created by the communication of the devices, which is gathered by the TSP. Since a huge amount of data is attained by the TSP offering the infrastructure, the aim for this study is to examine eventual obstacles and opportunities of a DaaSoffering. How the data is to be delivered, customers connectivity-needs and how current insights streams are delivered are examples of subjects the study will examine. The work has its foundation in a theoretical reference frame and a qualitative empirical study. The theoretical reference provides a theoretical overview of the industry's development and earlier research within the area. It was created by conducting a literature study combined with reports provided by trade organizations and other stakeholders. The empirical study contains 6 interviews with employees at a global TSP, with an extensive history of connected devices. The two parts were then compiled in order to compare the result with the theoretical background. It appeared that a lot of the challenges of developing a DaaS from the result agreed with the theoretical reference frame. The customers' differences in connectivity-maturity was shown to pose a great challenge to standardize a DaaS-offering, and the clients analytical needs were dependent on the same premises. Furthermore DaaS is considered to have a great effect on the industry's future development,
Internet of Things och uppkopplade produkter har blivit ett allt vanligare begrepp inom flertalet branscher. Samtidigt har datainsamling blivit en mer central del av alltifrån affärsmodeller till något vanliga konsumenter har i åtanke. En variant av Internet of Things tillhandahålls genom SIM-kort i produkter, som tillhandahålls av operatörer, och funktionerar genom kommunikationsnätverk. Denna studie är en akademisk utredning kring hur dessa operatörer kan utnyttja data genererat från telekommunikations-infrastruktur till en tjänst för nuvarande kunder. Studien är utförd hos en global operatör inom området av SIM-fleet Management/IoT-enablement. Fler och fler industrier går mot att koppla upp produkter för att få information kring alltifrån prestanda, elanvändning hos produkten, geografisk position eller annan information som önskas. Den data som skickas tillhandahålls av kund, vilket operatören inte har någon tillgång till. Dock så genererar kommunikationen i sig data genom kommunikationsnätverket, som operatören samlar in. I och med att mängder av data blir tillgänglig för operatörerna som tillhandahåller infrastrukturen, är syftet med denna rapport att undersöka eventuella hinder och möjligheter att erbjuda kunder ytterligare data som en tjänst i sig. Hur datan ska levereras, kundernas analysbehov och hur nuvarande insikter levereras är några exempel på det studien utreder. Arbetet grundar sig i en litteraturstudie och en kvalitativ empirisk studie. Litteraturstudien ger en bakgrund och teoretisk överblick kring branschens utveckling och litteraturens syn på området. Detta gjordes genom vetenskapliga publikationer samt diverse rapporter från branschorganisationer och intressenter. Den empiriska studien genomfördes genom 6 intervjuer med anställda på en global operatör med lång historisk inom uppkopplade produkter. De två delarna sammanställdes sedan för att jämföra resultatet med den teoretiska bakgrunden. Det visades sig vara mycket i resultat som stämde överens med de teoretiska aspekterna kring utmaningar med att erbjuda Data-as-aService (DaaS). Kundernas olika mognadsgrad i sin uppkoppling visades sig vara en stor utmaning i att standardisera en DaaS, och kundernas analysbehov gick ofta isär på samma premisser. Vidare anses DaaS ha stor påverkan på hur branschen fortsätter utvecklas i framtiden, och konsensus är tjänsten i framtiden kommer bli mer och mer datadriven.
APA, Harvard, Vancouver, ISO, and other styles
29

Blanke, Isabel. "Über die Verantwortlichkeit des Internet-Providers : eine Untersuchung anhand des Teledienstegesetzes sowie nach allgemeinen strafrechtlichen Zurechnungskategorien /." Marburg : Görich & Weiershäuser, 2006. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=015455684&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Vilapakkam, Nagarajan Karthik. "What is it that the application of modelling and simulation can contribute towards understanding and managing service quality data for internet service providers (ISP) in Australia?" School of Information Systems and Technology - Faculty of Informatics, 2008. http://ro.uow.edu.au/theses/121.

Full text
Abstract:
This thesis assesses the appropriateness and effectiveness of discrete event simulation technique to understand and manage service elements in the ISP (Internet Service Provider) context. The baseline for this research involved the secondary data published by ABS (Australian Bureau of Statistics) and TIO (Telecommunications Industry Ombudsman) involving ISP numbers, Internet issues/complaints data. As many relatively new services are being offered, ISPs are finding it difficult to cope with varying customer expectations and their future technology expectancy. Access to infrastructure, avoiding anti—competitive behaviour from large players and service differentiation has become more important than ever for their survival. A number of challenges such as lack of provision of good quality service, lack of ability to cope with increasing (or varying) customer demands and expectations and lack of flexibility in providing services need to be overcome. The service environment in networking has focused heavily on the technical side and very little attention has been given to functional variables such as complaints handling, aligning technical and functional service quality processes and effective service recovery during service failures. Relying fully on the technical side obscures the nature of service. This research identified the fact that end users’ perspective of quality of services need to consider not only the inherent quality of the network, but also the service quality provided by the ISP. Users perceive poor service quality provided by their ISP if they do not get help desk support required from using the ISP services. This can turn a complaint about a problem in to a complaint about the company. The research question is answered by this thesis “What is it that the use of discrete event simulation technique can contribute to the understanding and managing service quality data for different ISP service operations?”The research methodology chosen was discrete event simulation methodology. The discrete event technique involves building up models based on the dynamic behavior of a network system as the time progresses. The appropriateness and effectiveness of this technique was tested by modelling technical service elements (modelling policy based networks using differentiated service schemes, alarm based network management system for effective service level agreement monitoring) and key functional elements that determine ISP non-technical service performance (ISP complaints handling, ISP call centre performance variables). The scenarios led to the development of an integrative simulation framework that addresses both user level service quality issues and network system oriented service quality issues. In the past user level service quality issues have been provided with negligible importance. The framework developed can help ISPs to model service attributes and use the results from such simulation studies to make competitive marketing decisions. The issues raised before and after simulation can be compared for effective service design. To achieve service excellence ISPs have to understand the interrelationship between various service quality dimensions such as tangibles, reliability, responsiveness, assurance and empathy and how these dimensions affect customer perception of ISP service quality. In conclusion the research found that discrete event simulation can be used to understand and manage service quality data by internet service providers involving different ISP service operations.
APA, Harvard, Vancouver, ISO, and other styles
31

Thyagaraj, Arjun, and Krishnakumar Narayanan. "Internet of Things (IoT) adoption in Indian Healthcare Industry-A case study from a hospital." Thesis, Högskolan i Halmstad, Akademin för företagande, innovation och hållbarhet, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45313.

Full text
Abstract:
Purpose: Internet of Things (IoT) is an emerging technology and is a technological paradigm that is revolutionizing the healthcare industry all over the world. The purpose of our thesis is to investigate the phenomenon of IoT adoption in the healthcare industry in the context of a developing country to find out the barriers and how the industry is trying to overcome them. As the second highest population with a landmark of topping the table of developing country list, India has significant potential to bring interest in the IoT adoption in healthcare. Our unit of analysis is a hospital in India. Method: To reach our research, we have chosen a qualitative research approach and systematic combining method as our research strategy, which will facilitate us to narrow down the findings of the phenomenon by using a back and forth process. Semi-structured interviews have been conducted with participants of the case hospital as part of the data collection process. Finding and Analysis: The first part of the empirical finding is analyzed by the thematic analysis tool, which we have used for the data analysis. This enabled us to interpret the themes in our own way going back to data collected and previous literature references. The study helped us identify some of the main factors affecting IoT adoption in the hospital, categorized under three different sections: technological, organizational, and environmental. The findings indicate that IoT adoption barriers in hospital are categorized as per our tentative framework with theoretical frame reference in the literature review part. Adoption challenges were found mainly centred on technological acceptance, complexity, organizational behaviour, lack of expertise and infrastructure, lack of stringent regulations and standard and finally, the security and privacy concerns. They have initiated a well organizational structure with experts, providing rigorous training for key staff and visionary leadership to facilitate the adoption process.
APA, Harvard, Vancouver, ISO, and other styles
32

Harvesf, Cyrus Mehrabaun. "The design and implementation of a robust, cost-conscious peer-to-peer lookup service." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26559.

Full text
Abstract:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.
Committee Chair: Blough, Douglas; Committee Member: Liu, Ling; Committee Member: Owen, Henry; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudhakar. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
33

Riordan, Jaani. "The liability of internet intermediaries." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:a593f15c-583f-4acf-a743-62ff0eca7bfe.

Full text
Abstract:
Internet intermediaries facilitate a wide range of conduct using services supplied over the layered architecture of modern communications networks. Members of this class include search engines, social networks, internet service providers, website operators, hosts, and payment gateways, which together exert a critical and growing influence upon national and global economies, governments and cultures. This research examines who should face legal responsibility when wrongdoers utilise these services tortiously to cause harm to others. It has three parts. Part 1 seeks to understand the nature of an intermediary and how its liability differs from the liability of primary defendants. It classifies intermediaries according to a new layered, functional taxonomy and argues that many instances of secondary liability in English private law reflect shared features and underlying policies, including optimal loss-avoidance and derivative liability premised on an assumption of responsibility. Part 2 analyses intermediaries’ monetary liability for secondary wrongdoing in two areas of English law: defamation and copyright. It traces the historical evolution of these doctrines at successive junctures in communications technology, before identifying and defending limits on that liability which derive from three main sources: (i) in-built limits contained in definitions of secondary wrongdoing; (ii) European safe harbours and general limits on remedies; and (iii) statutory defences and exceptions. Part 3 examines intermediaries’ non-monetary liability, in particular their obligations to disclose information about alleged primary wrongdoers and to cease facilitating wrongdoing where it is necessary and proportionate to do so. It proposes a new suite of non-facilitation remedies designed to restrict access to tortious internet materials, remove such materials from search engines, and reduce the profitability of wrongdoing. It concludes with several recommendations to improve the effectiveness and proportionality of remedies by reference to considerations of architecture, anonymity, efficient procedures, and fundamental rights.
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Sheng. "Future development trends of optical transport network infrastructure an infrastructural framework for metropolitan-based optical transport networks : a field test of a Chinese ISP and a case study of a Chinese electrical power company /." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070822.115714/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Šubr, Zdeněk. "Analýza trhu informačních systémů pro poskytovatele připojení k Internetu." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-163736.

Full text
Abstract:
This thesis deals with specialized information systems for internet service providers. The aim of thesis is to compare specific information system of company Dupeto s.r.o. with an-other external systems. The first part of the thesis deals with the theoretical foundations, which is followed by the analysis of a market of this systems. After making choice of which systems are the propriet ones, the thesis gives a detailed description of these sys-tems. In conclusion there is a recommendation for Dupeto s.r.o. which system is the best for this company. This recommendation was achieved by the means of a multi-criteria de-cision making. This thesis is so helpful mainly for this company but it is helpful for other internet service providers too because it contains the analysis of the systems from various point of views.
APA, Harvard, Vancouver, ISO, and other styles
36

Forsell, Erik. "Internet Telephony : An Internet Service Provider's Perspective." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92287.

Full text
Abstract:
The aim of this Masters Thesis is to propose to SYSteam Nät AB, a local Internet Service Provider (ISP) in Uppsala, Sweden, how to implement IP telephony in their existing ITinfrastructure as a service to their customers. Thus the perspective of the thesis will be that of a local Internet Service Provider. Three general areas are covered in the thesis: Market and Business Model, Technology, and Economics. Important issues for SYSteam Nät AB as an established local broadband Internet Service Provider are to both retain present customers and to attract new customers. Some believe that offering value added services such as IP telephony could do this. Implementation of IP telephony can be done in different ways to fulfil SYSteam Nät’s requirements. The analysis leads to a proposal of how SYSteam Nät could implement IP telephony. This involves many multi-faceted business, technical, and financial issues; each aspect is examined in this thesis.
Avsikten med detta examensarbete är att komma med ett förslag till SYSteam Nät AB, en lokal Internetleverantör i Uppsala, om hur de, som en service till sina kunder, kan implementera IP telefoni i sin existerande IT-infrastruktur. Detta betyder att jag behandlar frågeställningen med en Internetleverantörs perspektiv.Tre huvudområden behandlas i examensarbetet: Marknad och Affärsmodell, Teknik och Ekonomi. Som en etablerad lokal leverantör av Internet via bredband är det viktigt för SYSteam Nät AB att både behålla nuvarande kunder och att attrahera nya kunder. En del tror att man skulle kunna åstadkomma detta genom att erbjuda värdehöjande tjänster som IP telefoni. Implementering av IP telefoni, som svarar mot SYSteam Näts krav, kan utföras på olika sätt. Analysen, som leder till ett förslag hur SYSteam Nät skulle kunna implementera IP telefoni, involverar många mångfasetterade frågeställningar av affärs-, teknisk- och ekonomisk natur. Var och en av dessa aspekter behandlas i rapporten.
APA, Harvard, Vancouver, ISO, and other styles
37

Rotundo, Rafael Pinheiro. "A fenomenologia da sociedade da informação e a responsabilidade civil à luz da Lei n.12.965/14 – Marco Civil da Internet." Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/21381.

Full text
Abstract:
Submitted by Marlene Aparecida de Souza Cardozo (mcardozo@pucsp.br) on 2018-08-27T13:02:40Z No. of bitstreams: 1 Rafael Pinheiro Rotundo.pdf: 1597987 bytes, checksum: 7b8b65232863955c234a658ad3b688de (MD5)
Made available in DSpace on 2018-08-27T13:02:40Z (GMT). No. of bitstreams: 1 Rafael Pinheiro Rotundo.pdf: 1597987 bytes, checksum: 7b8b65232863955c234a658ad3b688de (MD5) Previous issue date: 2018-02-23
The technological advancement provided by the global computer network has revolutionized human activities, communications have become easier, territorial boundaries between countries do not exist in the virtual world, and trade has been driven on a global scale. In this revolutionary network context, problems of high complexity arise that threaten the safety of users and the system itself. The lack of control and anonymity created a false impression that the internet would be an environment without rules, in which the wrong would not be grieved. In this context, civil liability for damages on the Internet is a subject that the law can’t refrain from dealing with, since its dynamism must be careful to protect and protect any offense that causes imbalance. At a first moment the work will address the characteristics of the information society, how the interpersonal relationships were affected by the digital age, and then to address the technical issues of the Internet, its operation, what services are available, its operators and other agencies. In a second moment, it will be approached to the civil responsibility of its evolution in counterpart to the society of the information, developing its study, as well as the elements that integrate it, with the action or omission, damage and causal link. Therefore its repercussions before entering the legal world of the Internet Civil Law, Law 12.965/2014, its interpretation by the STJ and the treatment of the subject in other countries
O avanço tecnológico proporcionado pela rede mundial de computadores revolucionou as atividades desenvolvidas pelo ser humano; as comunicações tornaram-se mais fáceis, as fronteiras territoriais entre os países desapareceram no mundo virtual e o comércio foi impulsionado em escala global. Neste contexto revolucionário de rede, surgiram problemas de alta complexidade que ameaçam a segurança dos usuários e do próprio sistema. A ausência de controle e o anonimato fizeram crescer uma falsa impressão de que a internet seria um ambiente sem regras, em que o ilícito não seria apenado. Nesse contexto, a responsabilidade civil pelo dano na internet é um tema sobre o qual o Direito não pode se abster, pois seu dinamismo deve ficar atento para proteger e resguardar qualquer ofensa que cause desequilíbrio. Em um primeiro momento a pesquisa abordará as características da sociedade de informação, a maneira como os relacionamentos interpessoais foram afetados pela era digital para, em seguida, abordar as questões técnicas da internet, seu funcionamento, serviços disponíveis, operadores e demais órgãos de atuação. Em um segundo momento será abordada a responsabilidade civil tendo em vista sua evolução em contrapartida à sociedade da informação. Serão estudados os elementos que a integram, a ação ou omissão, o dano e o nexo de causalidade. Por conseguinte, e ao final, suas repercussões ante o ingresso no mundo jurídico da Lei n.12.965/14, conhecida como Marco Civil da Internet, sua interpretação pelo Superior Tribunal de Justiça e o tratamento dedicado ao tema por outros países
APA, Harvard, Vancouver, ISO, and other styles
38

Silva, Vítor Manuel de Jesus da. "Service building in dense service provider environments." Doctoral thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/10938.

Full text
Abstract:
Doutoramento em Engenharia Electrotécnica
Genericamente falando, os serviços sobre redes têm vindo a afastar-se de um modelo monolítico para um modelo de criação de serviços que permite ou - como é mais frequente - requer a cooperação entre vários Provedores de Serviço. A Internet, que tem vindo a forçar a convergência de serviços, mostra que começa a ser virtualmente impossível a um único operador fornecer qualquer serviço com um mínimo de interesse para os utilizadores. Esta tese foca-se em serviços de transporte (e.g., connectividade) e discute o impacto das fronteira que as ofertas de serviços têm com o negócio. A questão central é a seguinte: o que muda quando o mesmo serviço é oferecido não apenas por um mas por mais do que um Provedor de Serviço. Por um lado, esta tese cobre, em abs tracto, a noção de Provedor se Serviço, como evoluiu e em que sentido está a evoluir, particularmente num contexto de muitos Provedores de Serviço. Os primeiros capítulos desta tese analizam e propõem arquitecturas para cooperação inter-Provedor-de-Serviço e para serviços comuns tais como multimédia. Por outro lado, oferece-se soluções práticas, com as respectivas avaliações, para alguns problemas, que ainda hoje se mantêm em aberto, tais como encaminhamento inter-domínio, Qualidade-de-Serviço, Mobilidade e distribuição de conteúdos, tais como as contribuições relacionadas com o impacto da noção administrativa de Sistemas Autónomos sobre encaminhamento inter-domínio, uma arquitectura de transporte inter-domínio e o problema que levanta da ineficiência que decorre do planeamento não- cooperativo de Redes de Entrega de Conteúdos.
Broadly speaking, service networks have been departing from a monolithic model to a model of service creation that allows or - most often - requires the cooperation between several Service Providers (SP). The Internet, that has been driving and pushing for service convergence, shows that it is becoming virtually impossible for an operator to provide, alone and by itself, a valuable service to end-users. This thesis focuses on transport services (e.g., connectivity) and discusses the impact of the business boundaries on service offerings. The central question is the following: what changes when the same service is delivered, not by one, but by more than one SP? On one hand, this thesis covers, in abstract, the notion of Service Provider, how it has evolved and where it is evolving to, particularly in the context of many SPs. The first chapters of this thesis analyze and propose architectures for inter-SP cooperation and for well-known services such as multimédia communications. On the other hand, it offers practical and evaluated solutions to some problems that are still open, in the area of Inter-domain routing, Quality-of-Service, Mobility and Content Distribution, such as the presented contributions to the impact of independent the administrative notion of Autonomous Systems on inter-domain routing, an inter-domain transport architecture and the raised problem of inefficiency of uncooperatively provisioned Content-Delivery Networks.
APA, Harvard, Vancouver, ISO, and other styles
39

Chen, Xin. "Energy efficient wired networking." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/7966.

Full text
Abstract:
This research proposes a new dynamic energy management framework for a backbone Internet Protocol over Dense Wavelength Division Multiplexing (IP over DWDM) network. Maintaining the logical IP-layer topology is a key constraint of our architecture whilst saving energy by infrastructure sleeping and virtual router migration. The traffic demand in a Tier 2/3 network typically has a regular diurnal pattern based on people‟s activities, which is high in working hours and much lighter during hours associated with sleep. When the traffic demand is light, virtual router instances can be consolidated to a smaller set of physical platforms and the unneeded physical platforms can be put to sleep to save energy. As the traffic demand increases the sleeping physical platforms can be re-awoken in order to host virtual router instances and so maintain quality of service. Since the IP-layer topology remains unchanged throughout virtual router migration in our framework, there is no network disruption or discontinuities when the physical platforms enter or leave hibernation. However, this migration places extra demands on the optical layer as additional connections are needed to preserve the logical IP-layer topology whilst forwarding traffic to the new virtual router location. Consequently, dynamic optical connection management is needed for the new framework. Two important issues are considered in the framework, i.e. when to trigger the virtual router migration and where to move virtual router instances to? For the first issue, a reactive mechanism is used to trigger the virtual router migration by monitoring the network state. Then, a new evolutionary-based algorithm called VRM_MOEA is proposed for solving the destination physical platform selection problem, which chooses the appropriate location of virtual router instances as traffic demand varies. A novel hybrid simulation platform is developed to measure the performance of new framework, which is able to capture the functionality of the optical layer, the IP layer data-path and the IP/optical control plane. Simulation results show that the performance of network energy saving depends on many factors, such as network topology, quiet and busy thresholds, and traffic load; however, savings of around 30% are possible with typical medium-sized network topologies.
APA, Harvard, Vancouver, ISO, and other styles
40

Knutsen, Morten. "Fighting Botnets in an Internet Service Provider Environment." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9175.

Full text
Abstract:

Botnets are compromised hosts under a common command and control infrastructure. These nets have become very popular because of their potential for various malicious activity. They are frequently used for distributed denial-of-service attacks, spamming, spreading malware and privacy invasion. Manually uncovering and responding to such hosts is difficult and costly. In this thesis a technique for uncovering and reporting botnet activity in an internet service provider environment is presented and tested. Using a list of known botnet controllers, an ISP can proactivly warn customers of likely compromised hosts while at the same time mitigate future ill-effects by severing communications between the compromised host and the controller. A prototype system is developed to route traffic destined for controllers to a sinkhole host, then analyse and drop the traffic. After using the system in a live environment at the norwegian reasearch and education network the technique has proven to be a feasable one, and is used in a incident response test-case, warning two big customers of likely compromised hosts. However, there are challenges in tracking down and following up such hosts, especially ``roaming'' hosts such as laptops. The scope of the problem is found to be serious, with the expected number of new hosts found to be about 75 per day. Considering that the list used represents only part of the actual controllers active on the internet, the need for an automated incident response seems clear.

APA, Harvard, Vancouver, ISO, and other styles
41

Ko, Li-Hsin, and 柯力心. "Internet Service Providers in Taiwan:1994-1998." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/37106252687057901797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

"Interactions between different hierarchies of Internet service providers." Thesis, 2008. http://library.cuhk.edu.hk/record=b6074488.

Full text
Abstract:
The current Internet is a hierarchical architecture comprising heterogeneous entities of privately owned infrastructures, where higher tier Internet service providers (ISPs) supply connectivity to the lower tier ISPs and charge them for the transit service. One of the most challenging problems service providers facing today is how to increase the profitability while maintaining good service qualities as the network scales up. For the higher tier ISPs, the main concern is how to increase the profit by attracting more lower tier ISPs (or traffic), while the lower tier ISPs concern about the connectivity, quality of service as well as the cost of the transit service. In this thesis, we seek to understand the interaction between different hierarchies of ISPs. Note that the lower tier ISPs can transmit traffic to each other, either by purchasing the service from higher tier ISPs, or by setting "private peering links" between themselves. Higher tier ISPs, on the other hand, cannot charge the transit service at will since there is competition among higher tier ISPs. We model the interaction of these ISPs via a game theoretic approach. Under this competitive framework, we study the issues of (a) impact of private peering relationship among the lower tier ISPs, (b) resource allocation of the higher tier ISPs so that resource monopoly can be avoided, (c) under a competitive market, how can the higher tier ISPs perform revenue maximization, and (d) conditions wherein higher tier ISPs are willing to perform network upgrade when we scale up the network size. We divide the above investigation into single higher tier ISP and multiple higher tier ISPs scenarios. In each scenario, firstly, a generalized model is presented to characterize the behaviors of the lower tier and higher tier ISPs, in which their economic interests are reflected. We study how a lower tier ISP can distributively determine its optimal routing strategy. Furthermore, we show how a higher tier ISP is able to utilize the available information to infer its optimal pricing strategy, under which a revenue maximization is achieved. Two distributed algorithms are proposed to help them to provide a fair and efficient bandwidth allocation to lower tier ISPs. Last but not least, we investigate the above issues in a many-ISPs-regime, i.e. we scale up the network size. Our mathematical framework provides insights on the interaction among ISPs and show these ISPs can still gain profits as they upgrade the network infrastructures. Extensive simulations are carried out to quantify and support our theoretical claims.
Lee Cheuk Man.
"February 2008."
Adviser: John C. S. Lui.
Source: Dissertation Abstracts International, Volume: 69-08, Section: B, page: 4849.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2008.
Includes bibliographical references (p. 104-109).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts in English and Chinese.
School code: 1307.
APA, Harvard, Vancouver, ISO, and other styles
43

Chiang, Ko-Chi, and 蔣克齊. "Liability of Internet Service Providers for Trademark Infringement." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/19863928169372210609.

Full text
Abstract:
碩士
世新大學
智慧財產權研究所(含碩專班)
99
Over the last decade, Trademark proprietors filed trademark infringement lawsuit against internet service providers in the United States or in the member state of European Union. They considered that the keyword advertising services or electronic marketplace marketing services which employed proprietors’ trademark would establish actionable trademark infringement. Consequently, internet service providers would face legal exposure of trademark infringement liability. There is still not any trademark infringement lawsuit of internet service providers in Taiwan until this year; however, there would be trademark infringement lawsuit against internet service providers in future. This discussion divided into four parts. In the first part, Chapter Two, author will discuss the function of trademark and two important interests that trademark act protect, including the interest of the consumer and the interest of trademark proprietors, which is also the normative foundation of trademark infringement. Secondly, in the second part, Chapter Three and Four, author will discuss five precedents of the United States and study how circuit judges or commentators to solve this new legal issue? Author will analyze how courts to adapt the prime facie evidence of the direct trademark infringement of the Lanham Act and the indirect trademark infringement tests properly to interpret whether the internet service providers would establish trademark liability by balancing the interest of consumers and trademark proprietors. Thirdly, in the third part, Chapter Five, author will discuss two important legal issues that European Court of justice need to solve when trademark proprietors filed trademark infringement lawsuit against internet service providers in European Union, including analyze how to adapt the statute about trademark infringement of Community Trade Mark Regulation to interpret whether the internet service providers would be considered use the trademark of owner in the course of trade; moreover, whether the internet service providers’ behavior falling with in the scope of Directive on electronic commerce, would be exempted from liability? Finally, in the part four, Chapter Six and Seven, author attempt to study and analyze what legal issues of trademark infringement will happen when trademark owners file trademark infringement lawsuit against internet service providers in Taiwan. And what is the feasible solution of these issues, including how to adapt the element of trademark infringement, including the statutes of use, likelyhood of confusion, infringement liability of Trademark Act and joint and several liability in Civil Act of Taiwan?
APA, Harvard, Vancouver, ISO, and other styles
44

ChANG, WEN-YUAN, and 張文源. "Illegal Internet Service Providers and Tele-communication fraud." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/01386959963639434279.

Full text
Abstract:
碩士
國立臺北大學
犯罪學研究所
104
No matter of fraud victims from Taiwan or China, or other countries, it is the help of illegal Type II telecommunication allowing scam clans travel around the world. The main purpose of this study is to develop the feasible counterplots to avert the crimes to be committed and clear up the terror in public toward fraud. It is also expected to provide references for police department and related governmental agencies to establish fraud prevention policies. With review of related investigation cases, latest official data and documents as well as depth interview with insiders that extremely understand the operation of telecommunication fraud and crime (type II telecommunication offender) and outsiders (investigators and NCC administrative auditors) total in 5 persons, the important findings of the study: (1) “fund” is the basic requirement of founding telecommunication scam clan; (2) among the requirements of founding telecommunication scam clan, the most important one is the help of Type II telecommunication enterprises on platform installation and set up telephone control room . Subsequently, they can “gain huge fraud income”. Finally, the study suggests: (1) Executive Yuan organizes the cross-department anti-fraud project team; (2) grant NCC with broad and effective administrative audit authorization and increase the number of administrative audit specialists to carry out audit duties; (3) review the differences of juridical system across the strait and the issue regarding joint fight against crime; (4) promote and establish information exchange platform regarding global fighting and preventing telecommunication fraud through Asia/Pacific Group on Money Laundering(APG), Egmont Group, ARIN-AP, International Association of Chiefs of Police (IACP) social governmental and private international organizations. Aiming at the globalized telecommunication fraud, only the promotion and cooperation of cross strait governments as well as opening the investigation and rapid exchange of international juridical police toward online telecommunication and financial information may effectively suppress and eliminate the crime and create win-win situation.
APA, Harvard, Vancouver, ISO, and other styles
45

LIN, PING-I., and 林秉毅. "Liability of Internet Service Providers for User Content." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/39hpjq.

Full text
Abstract:
碩士
國立高雄大學
法律學系碩士班
106
With the development of the Internet, we move into the Web2.0 era. Social networking website like Facebook plays a vital role in the Web2.0 era. In the Web2.0 era, user generated content on the Internet. But sometimes user’s action in cyberspace maybe invaded other’s rights. The person of the right which be stricken isn’t easy to find the infringer, and the victim needs to takes a lot of time and money to claim for removal of damage or compensate for damages. On the contrary, the Internet Service Provider can easily remove the infringement of right on it’s platform.   Although the copyright act in Republic of China has standarded the limitations on civil liability for Internet Service Providers, the other laws have not. This article wants to research the law and case of the United States, such as The Communications Decency Act, The Digital Millennium Copyright Act, and Directive on electronic commerce of the European Union, as well as the law and case of the People's Republic of China. Finding and building a set of legal standard related to the limitations on all liability for Internet Service Providers.
APA, Harvard, Vancouver, ISO, and other styles
46

Rehbock, Sascha. "Trustworthy clients : extending TNC for integrity checks in web-based environments : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Science in Computer Science in the University of Canterbury /." 2008. http://hdl.handle.net/10092/2369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Hung, Jen-Feng, and 洪任鋒. "A Study on Network Security Services Selection Models for Internet Service Providers." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/77436647180745419010.

Full text
Abstract:
碩士
世新大學
資訊管理學研究所(含碩專班)
101
With the Tablet PC, smart phones, cloud application services and rapid development of the global Internet and e-commerce applications, the various methods of attack evolving, global enterprise network abnormal flow attack led to the amount of economic and commercial losses, up to tens of millions of dollars a year. Supplier advantages of using the Internet, combined with network security services. The study Internet service provide in the selection of network security services, the decision-making considerations mode, Internet experts and scholars of the relevant decision-making criteria and evaluation factors, and thus defined in the Internet-vendor environment. Internet service provide, the research study, the first analysis through historical documents compiled with experts and scholars explore, define assessment dimensions and factors summarized selection mode structure of bread containing defense capability, cost price, customer service and operational management, and use of the Analytic Hierarchy Process to evaluate the weight values calculated selection model of network security services. Internet service provide in the selection of network security services based on holistic analysis of study results, consideration needs to the stability of the Internet, the future development of technology, crisis management, functional reliability and maintenance costs for priority consideration target. Network security service providers can also take advantage of the research and analysis, statistical data, design services required to comply with Internet service provide of goods. Nor does the ban of this study include marketing strategies, customer Kansai industries combined and the scope of the supply chain considerations.
APA, Harvard, Vancouver, ISO, and other styles
48

Huang, Tsan-tang, and 黃燦堂. "Cybercrime Investigation Procedures and Liabilities of Internet Service Providers." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/03409685000063442580.

Full text
Abstract:
碩士
國立高雄第一科技大學
科技法律研究所
98
Internet is one of symbolic technology in this era. People might feel uncomfortable without surfing the web for even just one second, and even some mental diseases like Internet addiction disorder appears. Since those events happened in reality will also happened in the in the virtual world, problems in the real world are also needed to be discussed when those problems are occurred on the Internet. There are two features with the Internet: anonymity, and easy accessibility. These factors make people to express their opinion or take action on certain topic on the Internet that they would not to do in reality. These actions might include committing crimes. Types of cybercrime are various, but the punishment to these crimes might be controversial in some aspects. For example, Sexual transaction is a more controversial crime than other criminal actions on the Internet. Legislators attempt to define those criminal actions which cause people to involve in the sexual transaction and to convict those involved criminals through ambiguous legal concepts and this idea could be illustrated by the Article 29 of Child and Youth Sexual Transaction Prevention Act. The investigation approaches to sexual transaction on the Internet have been changing along with the different methods prosecutors and police officers adopt. The investigation of Internet crime is also a challenge to the constitutional freedom of speech. Conventional legal approaches might not be effective enough to the process of investigation. On the other hand, some practical methods which might be against Constitution during inspection could be controversial as well. Cybercrime happened in a virtual space; conventional methods of investigation are conducted in reality. Without real space and visible weapon for criminal purposes, it would be problematic for prosecutors and police officers to investigate through conventional skills. Moreover, law enforcement might change theories and territories of crime and then collect evident against the standard procedures because of the limitation and the lack of technology skills. These problems will be illustrated in this paper. Internet service providers are crucial to the Internet users. During inspection, provision of users’ personal information and email records or aid of tracking certain users’ communication statues from Internet service providers are essential for investigation. In other words, these service providers need the reform of law systems which enable them provide information legally. To discuss the investigation of cybercrime and the responsibility of Internet service providers is the main topic of this paper.
APA, Harvard, Vancouver, ISO, and other styles
49

Wu, Hung-Min, and 吳宏敏. "Stretegic Management and Decision Analysis of Internet Service Providers." Thesis, 1997. http://ndltd.ncl.edu.tw/handle/80910137104420423853.

Full text
Abstract:
碩士
國立交通大學
交通運輸研究所
85
Recently, the number of Internet users has been drastically increasing dueto the popularity of the commercial application of Internet. To meet the need of users, a new service - Internet Service Provider (ISP), whose main service is to provide enterprises and the public to use Internet, is developed. Therefore,realizing the characteristics of Internet users and ISP will help the providers to develop proper operation strategies. This research investigates the characteristics of Internet users and the ISP market through a questionnaire survey. The ISP market is then segmented and the strength/ weakness,opportunities/threats for each segmented market are analyzed.Operation strategies for each market are developed using SWOT analysis. Finally, fuzzy AHPis employed to combine the opinions of specialists, scholars and providers to decide the appropriate operation strategies.The result divides ISP into two types: Type I providers have backbone network framework, and the priority of their operation strategies is to enhance the network technology and functions, emphasize both on localization and internationalization,innovate marketing and cooperatewith competitors,etc.Type II providers do not have backbone network framework,so the priority of their operation strategies is to integrate network services, cooperate with relative businesses, agent selling, and organize trade alliances, etc.
APA, Harvard, Vancouver, ISO, and other styles
50

Hung, Chiu-Lin, and 洪萩玲. "Limitations on Copyright Infringement Liability of Internet Service Providers." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/94475337592511192958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography