WorldWideScience

Sample records for internet addressable lightswitch

  1. Final Report on Internet Addressable Lightswitch; TOPICAL

    International Nuclear Information System (INIS)

    Rubinstein, Francis; Pettler, Peter

    2001-01-01

    This report describes the work performed to develop and test a new switching system and communications network that is useful for economically switching lighting circuits in existing commercial buildings. The first section of the report provides the general background of the IBECS (Integrated Building Environmental Communications System) research and development work as well as the context for the development of the new switching system. The research and development effort that went into producing the first proof-of-concept (the IBECS Addressable Power Switch or APS) and the physical prototype of that concept is detailed in the second section. In the third section of the report, we detail the refined Powerline Carrier Based IBECS Title 24 Wall Switch system that evolved from the APS prototype. The refined system provided a path for installing IBECS switching technology in existing buildings that may not be already wired for light level switching control. The final section of the report describes the performance of the IBECS Title 24 Switch system as applied to a small demonstration in two offices at LBNL's Building 90. We learned that the new Powerline Carrier control systems (A-10 technology) that have evolved from the early X-10 systems have solved most of the noise problems that dogged the successful application of X-10 technologies in commercial buildings. We found that the new A-10 powerline carrier control technology can be reliable and effective for switching lighting circuits even in electrically noisy office environments like LBNL. Thus we successfully completed the task objectives by designing, building and demonstrating a new switching system that can provide multiple levels of light which can be triggered either from specially designed wall switches or from a digital communications network. By applying commercially available powerline carrier based technologies that communicate over the in-place lighting wiring system, this type of control can be

  2. Beginning Microsoft Visual Studio LightSwitch Development

    CERN Document Server

    Novák, István

    2011-01-01

    Learn how LightSwitch can accelerate and simplify application development As Microsoft's newest offering for simplifying application development, LightSwitch opens the development door to creating applications without writing code. This introductory, full-color book shows you how to quickly create, modify, and distribute information for your business with LightSwitch. Packed with simple example programs, this beginner-level resource guides you through a complete small business application using LightSwitch to demonstrate the capabilities of this exciting new tool. You'll explore the most commo

  3. Enter your email-address: how German internet users manage their email addresses

    NARCIS (Netherlands)

    Utz, S.

    2004-01-01

    Writing E-mail is the most popular Internet activity. Meanwhile, many people have more than one E-mail address. The question how people manage their E-mail addresses, more specifically, whether they use them deliberately for different purposes, is the central question of this paper. E-mail addresses

  4. Addressing the "Epidemic" of Overweight Children by Using the Internet

    Science.gov (United States)

    Coleman, Mick; Wallinga, Charlotte; Bales, Diane

    2009-01-01

    The Internet can be of great assistance to early childhood teachers in planning educational activities for the classroom and with families. This article explores how early childhood teachers can use resources online to address what has been called an "epidemic" of overweight children. Guidelines for using online resources are presented. (Contains…

  5. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    OpenAIRE

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...

  6. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Directory of Open Access Journals (Sweden)

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  7. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    Science.gov (United States)

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  8. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Science.gov (United States)

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  9. Change of Address Applications filed via the Internet - FY 2016 (53rd week)

    Data.gov (United States)

    Social Security Administration — This dataset provides monthly volumes at the national level from federal fiscal year 2016 for Internet Change of Address. This dataset includes data from the extra...

  10. Lightswitch 2002 : a model for electric lighting and blind usage in single offices

    Energy Technology Data Exchange (ETDEWEB)

    Reinhart, C.F. [National Research Council of Canada, Ottawa, ON (Canada). Inst. for Research in Construction

    2003-04-03

    This report presents the Lightswitch 2002 model which predicts the electric lighting energy demand in private offices with manually and automatically controlled lighting and blind systems. Some basic behaviour patterns that define occupant interaction with lighting and blind controls were also identified and incorporated into the simulation tool called Lightswitch Wizard. This study studied integrated lighting control systems in 20 offices with a SSW orientation. Integrated lighting control systems coordinate the control of automated electric lights and blind systems with conventional building energy management systems. The benefits include a gain in occupant comfort and energy performance. It was concluded that Lightswitch 2002 has an advantage over former models in that each manual switching decision has a probability function assigned to it and a random process decides whether a switching event takes place or not. It was shown that the annual electric lighting energy demand for a manually controlled lighting and blind system can vary between 10 and 39 kWh/m{sup 2} per year for different user types. The model has some technical limitations concerning intermediate switch-off, thermal consideration, privacy issues, seating orientation and the location of controls. It was suggested that the model should be integrated with a thermal and lighting simulation tool in order to assess overall energy performance of different lighting and blind control strategies. refs., tabs., figs.

  11. The Standardization Method of Address Information for POIs from Internet Based on Positional Relation

    Directory of Open Access Journals (Sweden)

    WANG Yong

    2016-05-01

    Full Text Available As points of interest (POIon the internet, exists widely incomplete addresses and inconsistent literal expressions, a fast standardization processing method of network POIs address information based on spatial constraints was proposed. Based on the model of the extensible address expression, first of all, address information of POI was segmented and extracted. Address elements are updated by means of matching with the address tree layer by layer. Then, by defining four types of positional relations, corresponding set are selected from standard POI library as candidate for enrichment and amendment of non-standard address. At last, the fast standardized processing of POI address information was achieved with the help of backtracking address elements with minimum granularity. Experiments in this paper proved that the standardization processing of an address can be realized by means of this method with higher accuracy in order to build the address database.

  12. Integration between WSNs and Internet based on Address Internetworking for Web

    OpenAIRE

    Jeong Hee Kim; Do Hyeun Kim; Ho Young Kwak; Yung Cheol Byun

    2012-01-01

    There has been an increasing interest in wireless sensor networks as a new technology to realize ubiquitous computing, and demands for internetworking technology between the wireless sensor networks and the Internet which is based on IP address. For this purpose, this paper proposes and implements the internetworking scheme which assigns IP addresses to the sensor nodes and internetworks based on the gateway-based integration for internetworking between the wireless sensor networks and the In...

  13. Internet and mobile technologies: addressing the mental health of trauma survivors in less resourced communities.

    Science.gov (United States)

    Ruzek, J I; Yeager, C M

    2017-01-01

    Internet and mobile technologies offer potentially critical ways of delivering mental health support in low-resource settings. Much evidence indicates an enormous negative impact of mental health problems in low- and middle-income countries (LMICs), and many of these problems are caused, or worsened, by exposure to wars, conflicts, natural and human-caused disasters, and other traumatic events. Though specific mental health treatments have been found to be efficacious and cost-effective for low-resource settings, most individuals living in these areas do not have access to them. Low-intensity task-sharing interventions will help, but there is a limit to the scalability and sustainability of human resources in these settings. To address the needs of trauma survivors, it will be important to develop and implement Internet and mobile technology resources to help reduce the scarcity, inequity, and inefficiency of current mental health services in LMICs. Mobile and Internet resources are experiencing a rapid growth in LMICs and can help address time, stigma, and cost barriers and connect those who have been socially isolated by traumatic events. This review discusses current research in technological interventions in low-resource settings and outlines key issues and future challenges and opportunities. Though formidable challenges exist for large-scale deployment of mobile and Internet mental health technologies, work to date indicates that these technologies are indeed feasible to develop, evaluate, and deliver to those in need of mental health services, and that they can be effective.

  14. Applying Blooms Digital Taxonomy to Address Creativity and Second Order Digital Divide in Internet Skills

    DEFF Research Database (Denmark)

    Purushothaman, Aparna

    2016-01-01

    Internet technologies play a significant role to enhance creativity of the students in learning environments. Internet literacy is vital to effectively use the Internet tools to enhance creative learning environments. In the developing countries Internet literacy is still an unfulfilled dream...... for students coming from underprivileged backgrounds thus bringing a digital divide in skills. The chapter draws upon an empirical study done in India on how an intervention comprised of Internet training designed on Bloom’s Digital Taxonomy and action research workshops based on the learning domains...... of the digital taxonomy was an effective approach for empowering women students through learning to use the Internet. The chapter puts forward the argument that an intervention for learning to use the Internet can be effective where focus is on the reflective and conceptual skills in using the Internet than...

  15. The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism

    Directory of Open Access Journals (Sweden)

    Murdoch Watney

    2007-06-01

    Full Text Available Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which results in an unjustifiable infringement of civil rights. Since countries worldwide are focusing attention on the control of information on the Internet, the debate in respect of state control and the consequences of state control is relevant on a global level as it impacts on all Internet-connected countries.

  16. Addresses

    Data.gov (United States)

    Town of Chapel Hill, North Carolina — Point features representing locations of all street addresses in Orange County, NC including Chapel Hill, NC. Data maintained by Orange County, the Town of Chapel...

  17. Norman-based Isolated Data Systems allows users to surf the Internet with no traceable IP address

    CERN Multimedia

    2004-01-01

    "Patented by Norman-based Isolated Data Systems, John Doe is an anonymous proxy server that allows users to surf the Internet exactly as before, with one exception - they are identifiable only as John Doe, with no traceable IP address, which means no tracking, no identification and no profile building" ( 1/2 page)

  18. Internet

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  19. How Dynamic is the ISPs Address Space? Towards Internet-Wide DHCP Churn Estimation

    NARCIS (Netherlands)

    Moreira Moura, G.C.; Ganan, C.H.G.; Lone, Q.B.; Poursaied, P.; Asghari, H.; Van Eeten, M.J.G.

    2015-01-01

    IP address counts are typically used as a surrogate metric for the number of hosts in a network, as in the case of ISP rankings based on botnet infected addresses. However, due to effects of dynamic IP address allocation, such counts tend to overestimate the number of hosts, sometimes by an order of

  20. E-health use in african american internet users: can new tools address old disparities?

    Science.gov (United States)

    Chisolm, Deena J; Sarkar, Madhurima

    2015-03-01

    Web-based health information may be of particular value among the African American population due to its potential to reduce communication inequalities and empower minority groups. This study explores predictors of e-health behaviors and activities for African American Internet users. We used the 2010 Pew Internet and American Life Health Tracking Survey to examine sociodemographic and health status predictors of e-health use behaviors among African Americans. E-health use behaviors included searching for e-health information, conducting interactive health-related activities, and tracking health information online. In the African American subsample, 55% (n=395) were at least "occasional" Internet users. Our model suggests that searching for health information online was positively associated with being helped/knowing someone helped by online information (odds ratio [OR]=5.169) and negatively associated with lower income (OR=0.312). Interactive health activities were associated with having a college education (OR=3.264), being 65 years of age or older (OR=0.188), having a family member living with chronic conditions (OR=2.191), having a recent medical crisis (OR=2.863), and being helped/knowing someone helped by online information (OR=8.335). E-tracking behaviors were significantly stronger among African Americans who had health insurance (OR=3.907), were helped/knowing someone helped by online information (OR=4.931), and were social media users (OR=4.799). Findings suggest significant differences in e-health information-seeking behaviors among African American Internet users-these differences are mostly related to personal and family health concerns and experiences. Targeted online e-health resources and interventions can educate and empower a significant subset of the population.

  1. Internet treatment addressing either insomnia or depression, for patients with both diagnoses: a randomized trial.

    Science.gov (United States)

    Blom, Kerstin; Jernelöv, Susanna; Kraepelien, Martin; Bergdahl, Malin Olséni; Jungmarker, Kristina; Ankartjärn, Linda; Lindefors, Nils; Kaldo, Viktor

    2015-02-01

    To compare treatment effects when patients with insomnia and depression receive treatment for either insomnia or depression. A 9-w randomized controlled trial with 6- and 12-mo follow-up. Internet Psychiatry Clinic, Stockholm, Sweden. Forty-three adults in whom comorbid insomnia and depression were diagnosed, recruited via media and assessed by psychiatrists. Guided Internet-delivered cognitive behavior therapy (ICBT) for either insomnia or depression. Primary outcome measures were symptom self-rating scales (Insomnia Severity Index [ISI] and the Montgomery Åsberg Depression Rating Scale [MADRS-S]), assessed before and after treatment with follow-up after 6 and 12 mo. The participants' use of sleep medication and need for further treatment after completion of ICBT was also investigated. The insomnia treatment was more effective than the depression treatment in reducing insomnia severity during treatment (P = 0.05), and equally effective in reducing depression severity. Group differences in insomnia severity were maintained during the 12-mo follow-up period. Post treatment, participants receiving treatment for insomnia had significantly less self-rated need for further insomnia treatment (P treatment for depression. The need for depression treatment was similar in both groups. In this study, Internet-delivered treatment with cognitive behavior therapy (ICBT) for insomnia was more effective than ICBT for depression for patients with both diagnoses. This indicates, in line with previous research, that insomnia when comorbid with depression is not merely a symptom of depression, but needs specific treatment. The trial was registered at Clinicaltrials.gov, registration ID: NCT01256099. © 2015 Associated Professional Sleep Societies, LLC.

  2. Using innovation from block chain technology to address privacy and security problems of Internet of Things

    OpenAIRE

    Manocha, Jitendra

    2017-01-01

    Internet of things (IoT) is growing at a phenomenal speed and outpacing all the technological revolutions that occurred in the past. Together with window of opportunity it also poses quite a few challenges. One of the most important and unresolved challenge is vulnerability in security and privacy in IoT. This is mainly due to lack of a global decentralized standard even though characteristically IoT is based on distributed systems. Due to lack of standard IoT has interoperability issue betwe...

  3. NOVEL CONTEXT-AWARE CLUSTERING WITH HIERARCHICAL ADDRESSING (CCHA) FOR THE INTERNET OF THINGS (IoT)

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2013-01-01

    As computing technology becomes more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism becomes more stringent, less flexible and intrusive. Scalability issue in the IoT makes Identity Management (IdM) of ubiquitous things more challenging. Forming ad......-hoc network, interaction between these nomadic devices to provide seamless service extend the need of new identi-ties to the things, addressing and IdM in the IoT. New identities and identifier format to alleviate the perfor-mance issue is introduced in this paper. This paper pre-sents novel Context......-aware Clustering with Hierarchical Addressing (CCHA) scheme for the things with new identifier format. Simulation results shows that CCHA achieves better performance with less energy expendi-ture, less end-to-end delay and more throughput. Results also show that CCHA significantly reduces the failure probability...

  4. www.kernenergie.de - nuclear power has a German Internet address

    International Nuclear Information System (INIS)

    Anon.

    2000-01-01

    www.kernenergie.de is the address on the worldwide web under which the German nuclear organizations, Deutsches Atomforum (DAtF), Informationskreis Kernenergie (IK), and Kerntechnische Gesellschaft (KTG) as well as atw - internationale Zeitschrift fuer Kernenergie, and INFORUM can be reached. Extensive sources of information, discussions, on-line dictionaries, computer codes, dynamic web pages, digital documents and multimedia offerings can be called up via the portal under the individual web sites. In this way, www.kernenergie.de provides a comprehensive and up-to-date background of information about nuclear power and adjacent topics in the digital worldwide web. (orig.) [de

  5. Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  6. A versatile light-switchable nanorod memory: Wurtzite ZnO on perovskite SrTiO3

    KAUST Repository

    Kumar, Anup Bera

    2013-04-25

    Integrating materials with distinct lattice symmetries and dimensions is an effective design strategy toward realizing novel devices with unprecedented functionalities, but many challenges remain in synthesis and device design. Here, a heterojunction memory made of wurtzite ZnO nanorods grown on perovskite Nb-doped SrTiO3 (NSTO) is reported, the electronic properties of which can be drastically reconfigured by applying a voltage and light. Despite of the distinct lattice structures of ZnO and NSTO, a consistent nature of single crystallinity is achieved in the heterojunctions via the low-temperature solution-based hydrothermal growth. In addition to a high and persistent photoconductivity, the ZnO/NSTO heterojunction diode can be turned into a versatile light-switchable resistive switching memory with highly tunable ON and OFF states. The reversible modification of the effective interfacial energy barrier in the concurrent electronic and ionic processes most likely gives rise to the high susceptibility of the ZnO/NSTO heterojunction to external electric and optical stimuli. Furthermore, this facile synthesis route is promising to be generalized to other novel functional nanodevices integrating materials with diverse structures and properties. Copyright © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Addressing the question of disorder-specific risk factors of internet addiction: a comparison of personality traits in patients with addictive behaviors and comorbid internet addiction.

    Science.gov (United States)

    Müller, K W; Koch, A; Dickenhorst, U; Beutel, M E; Duven, E; Wölfling, K

    2013-01-01

    Uncontrolled use of the internet has been reported to affect the lives of some users in a negative way. According to epidemiological studies, about 1% of the general population is showing signs of internet addiction. Since internet addiction is becoming a growing health concern, research on potential risk factors is becoming more important in order to develop strategies for prevention and to adopt therapeutic treatment. Although there are some studies investigating personality traits in internet addiction, most of these studies are based on samples of healthy subjects. In this research project, we compared personality profiles of a sample of patients in different rehabilitation centers. 70 patients with an addiction disorder that additionally met the criteria for internet addiction were compared to 48 patients suffering from alcohol dependence. Besides Big Five personality traits, we also assessed depressive symptoms. It was shown that patients with comorbid internet addiction can be discriminated from other patients by higher neuroticism and lower extraversion as well as lower conscientiousness. After controlling for depressive symptoms, lower conscientiousness especially turned out to be a disorder-specific risk factor. As internet addiction is related to unique patterns of personality traits and can be discriminated from alcohol dependence, treatment approaches are needed that meet the specific requirements of patients with internet addiction.

  8. Addressing the Question of Disorder-Specific Risk Factors of Internet Addiction: A Comparison of Personality Traits in Patients with Addictive Behaviors and Comorbid Internet Addiction

    Directory of Open Access Journals (Sweden)

    K. W. Müller

    2013-01-01

    Full Text Available Uncontrolled use of the internet has been reported to affect the lives of some users in a negative way. According to epidemiological studies, about 1% of the general population is showing signs of internet addiction. Since internet addiction is becoming a growing health concern, research on potential risk factors is becoming more important in order to develop strategies for prevention and to adopt therapeutic treatment. Although there are some studies investigating personality traits in internet addiction, most of these studies are based on samples of healthy subjects. In this research project, we compared personality profiles of a sample of patients in different rehabilitation centers. 70 patients with an addiction disorder that additionally met the criteria for internet addiction were compared to 48 patients suffering from alcohol dependence. Besides Big Five personality traits, we also assessed depressive symptoms. It was shown that patients with comorbid internet addiction can be discriminated from other patients by higher neuroticism and lower extraversion as well as lower conscientiousness. After controlling for depressive symptoms, lower conscientiousness especially turned out to be a disorder-specific risk factor. As internet addiction is related to unique patterns of personality traits and can be discriminated from alcohol dependence, treatment approaches are needed that meet the specific requirements of patients with internet addiction.

  9. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  10. Observations of Chat Room Conversations on the Internet: Implications for Educators Addressing the Needs of Female Adolescents

    Science.gov (United States)

    Sanger, Dixie; Ritzman, Mitzi; LaCost, Barbara; Stofer, Keri; Long, Amie; Grady, Marilyn

    2005-01-01

    This qualitative study explored the meanings of chat room conversations through observations of teenagers using the Internet. Adolescent girls were a focus because of their shaky sense of self. Participants in ten chat rooms included 534 individuals. Six themes, emerging from analyzing 2526 utterances [descriptive statements], included (a)…

  11. Breakingtheice: a protocol for a randomised controlled trial of an internet-based intervention addressing amphetamine-type stimulant use.

    Science.gov (United States)

    Tait, Robert J; McKetin, Rebecca; Kay-Lambkin, Frances; Bennett, Kylie; Tam, Ada; Bennett, Anthony; Geddes, Jenny; Garrick, Adam; Christensen, Helen; Griffiths, Kathleen M

    2012-06-25

    The prevalence of amphetamine-type stimulant use is greater than that of opioids and cocaine combined. Currently, there are no approved pharmacotherapy treatments for amphetamine-type stimulant problems, but some face-to-face psychotherapies are of demonstrated effectiveness. However, most treatment services focus on alcohol or opioid disorders, have limited reach and may not appeal to users of amphetamine-type stimulants. Internet interventions have proven to be effective for some substance use problems but none has specifically targeted users of amphetamine-type stimulants. The study will use a randomized controlled trial design to evaluate the effect of an internet intervention for amphetamine-type stimulant problems compared with a waitlist control group. The primary outcome will be assessed as amphetamine-type stimulant use (baseline, 3 and 6 months). Other outcomes measures will include 'readiness to change', quality of life, psychological distress (K-10 score), days out of role, poly-drug use, help-seeking intention and help-seeking behavior. The intervention consists of three modules requiring an estimated total completion time of 90 minutes. The content of the modules was adapted from face-to-face clinical techniques based on cognitive behavior therapy and motivation enhancement. The target sample is 160 men and women aged 18 and over who have used amphetamine-type stimulants in the last 3 months. To our knowledge this will be the first randomized controlled trial of an internet intervention specifically developed for users of amphetamine-type stimulants. If successful, the intervention will offer greater reach than conventional therapies and may engage clients who do not generally seek treatment from existing service providers. Australian and New Zealand Clinical Trials Registry (http://www.anzctr.org.au/) ACTRN12611000947909.

  12. Breakingtheice: A protocol for a randomised controlled trial of an internet-based intervention addressing amphetamine-type stimulant use

    Directory of Open Access Journals (Sweden)

    Tait Robert J

    2012-06-01

    Full Text Available Abstract Background The prevalence of amphetamine-type stimulant use is greater than that of opioids and cocaine combined. Currently, there are no approved pharmacotherapy treatments for amphetamine-type stimulant problems, but some face-to-face psychotherapies are of demonstrated effectiveness. However, most treatment services focus on alcohol or opioid disorders, have limited reach and may not appeal to users of amphetamine-type stimulants. Internet interventions have proven to be effective for some substance use problems but none has specifically targeted users of amphetamine-type stimulants. Design/method The study will use a randomized controlled trial design to evaluate the effect of an internet intervention for amphetamine-type stimulant problems compared with a waitlist control group. The primary outcome will be assessed as amphetamine-type stimulant use (baseline, 3 and 6 months. Other outcomes measures will include ‘readiness to change’, quality of life, psychological distress (K-10 score, days out of role, poly-drug use, help-seeking intention and help-seeking behavior. The intervention consists of three modules requiring an estimated total completion time of 90 minutes. The content of the modules was adapted from face-to-face clinical techniques based on cognitive behavior therapy and motivation enhancement. The target sample is 160 men and women aged 18 and over who have used amphetamine-type stimulants in the last 3 months. Discussion To our knowledge this will be the first randomized controlled trial of an internet intervention specifically developed for users of amphetamine-type stimulants. If successful, the intervention will offer greater reach than conventional therapies and may engage clients who do not generally seek treatment from existing service providers. Trial registration Australian and New Zealand Clinical Trials Registry (http://www.anzctr.org.au/ ACTRN12611000947909

  13. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  14. A systematic review of recent smartphone, Internet and Web 2.0 interventions to address the HIV continuum of care.

    Science.gov (United States)

    Muessig, Kathryn E; Nekkanti, Manali; Bauermeister, Jose; Bull, Sheana; Hightow-Weidman, Lisa B

    2015-03-01

    eHealth, mHealth and "Web 2.0" social media strategies can effectively reach and engage key populations in HIV prevention across the testing, treatment, and care continuum. To assess how these tools are currently being used within the field of HIV prevention and care, we systematically reviewed recent (2013-2014) published literature, conference abstracts, and funded research. Our searches identified 23 published intervention studies and 32 funded projects underway. In this synthesis we describe the technology modes applied and the stages of the HIV care cascade addressed, including both primary and secondary prevention activities. Overall trends include use of new tools including social networking sites, provision of real-time assessment and feedback, gamification and virtual reality. While there has been increasing attention to use of technology to address the care continuum, gaps remain around linkage to care, retention in care, and initiation of antiretroviral therapy.

  15. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  16. Network Function Virtualization (NFV) based architecture to address connectivity, interoperability and manageability challenges in Internet of Things (IoT)

    Science.gov (United States)

    Haseeb, Shariq; Hashim, Aisha Hassan A.; Khalifa, Othman O.; Faris Ismail, Ahmad

    2017-11-01

    IoT aims to interconnect sensors and actuators built into devices (also known as Things) in order for them to share data and control each other to improve existing processes for making people’s life better. IoT aims to connect between all physical devices like fridges, cars, utilities, buildings and cities so that they can take advantage of small pieces of information collected by each one of these devices and derive more complex decisions. However, these devices are heterogeneous in nature because of various vendor support, connectivity options and protocol suit. Heterogeneity of such devices makes it difficult for them to leverage on each other’s capabilities in the traditional IoT architecture. This paper highlights the effects of heterogeneity challenges on connectivity, interoperability, management in greater details. It also surveys some of the existing solutions adopted in the core network to solve the challenges of massive IoT deployments. Finally, the paper proposes a new architecture based on NFV to address the problems.

  17. Internet Economics IV

    Science.gov (United States)

    2004-08-01

    edts.): Internet Economics IV Technical Report No. 2004-04, August 2004 Information Systems Laboratory IIS, Departement of Computer Science University of...level agreements (SLA), Information technology (IT), Internet address, Internet service provider 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... technology and its economic impacts in the Internet world today. The second talk addresses the area of AAA protocol, summarizing authentication

  18. Internet enlightens

    International Nuclear Information System (INIS)

    Anon.

    2010-01-01

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  19. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  20. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  1. Internet printing

    Science.gov (United States)

    Rahgozar, M. Armon; Hastings, Tom; McCue, Daniel L.

    1997-04-01

    The Internet is rapidly changing the traditional means of creation, distribution and retrieval of information. Today, information publishers leverage the capabilities provided by Internet technologies to rapidly communicate information to a much wider audience in unique customized ways. As a result, the volume of published content has been astronomically increasing. This, in addition to the ease of distribution afforded by the Internet has resulted in more and more documents being printed. This paper introduces several axes along which Internet printing may be examined and addresses some of the technological challenges that lay ahead. Some of these axes include: (1) submission--the use of the Internet protocols for selecting printers and submitting documents for print, (2) administration--the management and monitoring of printing engines and other print resources via Web pages, and (3) formats--printing document formats whose spectrum now includes HTML documents with simple text, layout-enhanced documents with Style Sheets, documents that contain audio, graphics and other active objects as well as the existing desktop and PDL formats. The format axis of the Internet Printing becomes even more exciting when one considers that the Web documents are inherently compound and the traversal into the various pieces may uncover various formats. The paper also examines some imaging specific issues that are paramount to Internet Printing. These include formats and structures for representing raster documents and images, compression, fonts rendering and color spaces.

  2. Internet Research: The Question of Method - A Keynote Address from the YouTube and the 2008 Election Cycle in the United States Conference

    NARCIS (Netherlands)

    Rogers, R.

    2010-01-01

    Digital studies on culture may be distinguished from cultural studies of the digital, at least in terms of method. This lecture takes up the question of the distinctiveness of "digital methods" for researching Internet cultures. It asks, initially, should the methods of study change, however

  3. Impact of the Internet.

    Science.gov (United States)

    Balajthy, Ernest

    1997-01-01

    Discusses the impact and the potential of the Internet on education. Suggests that educators and parents need to deal with the lack of quality assurance of the Internet. Addresses readability and appropriateness for children. Notes that successful use of the Internet by children requires that teachers provide instruction in multiple sources and…

  4. Internet Geo-Location

    Science.gov (United States)

    2017-12-01

    INTERNET GEO-LOCATION DUKE UNIVERSITY DECEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR...REPORT TYPE FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) MAY 2014 – MAY 2017 4. TITLE AND SUBTITLE INTERNET GEO-LOCATION 5a. CONTRACT...of SpeedTest servers that are used by end users to measure the speed of their Internet connection. The servers log the IP address and the location

  5. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  6. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Societe Francaise de Radioprotection, 75 - Paris (France)

    2008-04-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  7. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  8. Rumors and Internet

    Directory of Open Access Journals (Sweden)

    RENARD, Jean-Bruno

    2011-12-01

    Full Text Available This paper will address the rumors and the Internet in two ways: rumors as the subject of the Internet and the Internet as a channel of dissemination of rumors. We define rumors in a broadly way as an unverified information circulating within a social group. In a strict sense, rumors can be understand as false information that people believe. A rumor is an urban myth, a legend, a hoax, or a contemporary narrative, a tale of everyday life, false or dubious, but in which we believed because it is likely, and it conveys a moral message.

  9. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  10. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  11. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  12. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  13. Internet marketing

    OpenAIRE

    Zelený, Martin

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  14. Internet accounting

    NARCIS (Netherlands)

    Pras, Aiko; van Beijnum, Bernhard J.F.; Sprenkels, Ron; Parhonyi, R.

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  15. Internet addiction in young people.

    Science.gov (United States)

    Ong, Say How; Tan, Yi Ren

    2014-07-01

    In our technology-savvy population, mental health professionals are seeing an increasing trend of excessive Internet use or Internet addiction. Researchers in China, Taiwan and Korea have done extensive research in the field of Internet addiction. Screening instruments are available to identify the presence of Internet addiction and its extent. Internet addiction is frequently associated with mental illnesses such as anxiety, depression, conduct disorder and attention deficit hyperactivity disorder (ADHD). Treatment modalities include individual and group therapies, cognitive behavioural therapy (CBT), family therapy and psychotropic medications. A significant proportion of Singapore adolescents engaging in excessive Internet use are also diagnosed to have concomitant Internet addiction. Despite the presence of a variety of treatment options, future research in this area is needed to address its growing trend and to minimise its negative psychological and social impact on the individuals and their families.

  16. Convocation address.

    Science.gov (United States)

    Swaminathan, M S

    1998-07-01

    This address delivered to the 40th convocation of the International Institute for Population Sciences in India in 1998 opens by noting that a shortage of jobs for youth is India's most urgent problem but that the problems that attend the increasing numbers of elderly also require serious attention. The address then notes that the Earth's population is growing at an unsustainable rate while economic inequities among countries are increasing, so that, while intellectual property is becoming the most important asset in developed countries, nutritional anemia among pregnant women causes their offspring to be unable to achieve their full intellectual potential from birth. Next, the address uses a discussion of the 18th-century work on population of the Marquis de Condorcet and of Thomas Malthus to lead into a consideration of estimated increased needs of countries like India and China to import food grains in the near future. Next, the progress of demographic transition in Indian states is covered and applied to Mahbub ul Haq's measure of human deprivation developed for and applied to the region of the South Asian Association for Regional Cooperation (India, Pakistan, Bangladesh, Nepal, Sri Lanka, Bhutan, and the Maldives). The address continues by reiterating some of the major recommendations forwarded by a government of India committee charged in 1995 with drafting a national population policy. Finally, the address suggests specific actions that could be important components of the Hunger-Free India Programme and concludes that all success rests on the successful implementation of appropriate population policies.

  17. The Internet of Hackable Things

    OpenAIRE

    Giaretta, Alberto; Mazzara, Manuel; Dragoni, Nicola

    2017-01-01

    The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order to tackle this issue, we need to address a new challenge in security: education.

  18. Bad Neighborhoods on the Internet

    NARCIS (Netherlands)

    Moreira Moura, G.C.; Sadre, R.; Pras, A.

    2014-01-01

    Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated in certain networks instead of being evenly distributed. In this article, we formally define and frame such areas as Internet Bad Neighborhoods. By extending the reputation of malicious IP addresses

  19. inaugral address

    African Journals Online (AJOL)

    While political reorientation and economic redress were of immediate concern, ... South African context, where widespread changes have been proposed for education at all ... education at school and other levels and needs to be addressed so as to ..... the major national curriculum intervention in environmental education.

  20. Internet piracy

    OpenAIRE

    Fiala, Jiří

    2012-01-01

    The main objective of this thesis is to describe the Internet piracy phenomenon and to define responsibility of individuals for copyright violations on the Internet from the view of valid Czech legislation. In order to prevent Internet piracy, countries are pushed to swiftly react on continuous development of new technologies used by pirates - these efforts of individual countries are described in several chapters of this thesis that are exploring the most significant court rulings. These rul...

  1. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  2. Opening address

    International Nuclear Information System (INIS)

    Ianko, L.

    1993-01-01

    This short talk was the opening remarks to the attendees at this conference, presented by the Scientific Secretary, IWG-LMNPP, of the IAEA. This meeting is an effort to aid research on problems related to the general area of nuclear plant aging and life management. In particular it addresses fracture properties of reactor materials and components, both as installed, and at end of service condition. A major concern is relating measurements made on laboratory samples to properties displayed by actual reactor components

  3. Convocation address.

    Science.gov (United States)

    Zakaria, R

    1996-07-01

    By means of this graduation address at the International Institute for Population Sciences (IIPS) in Bombay, the Chancellor of Urdu University voiced his concerns about overpopulation in India. During the speaker's tenure as Health Minister of Maharashtra, he implemented a sterilization incentive program that resulted in the state's having the best family planning (FP) statistics in India for almost 10 years. The incentive program, however, was misused by overenthusiastic officials in other states, with the result that the FP program was renamed the Family Welfare Programme. Population is growing in India because of improvements in health care, but the population education necessary to change fertility will require more time than the seriousness of the population problem allows. In the longterm, poverty and illiteracy must be addressed to control population. In the meanwhile, the graduate program at the IIPS should be expanded to include an undergraduate program, marriage age laws should be enforced, and misconceptions about religious objections to FP must be addressed. India can not afford to use the measures forwarded by developed countries to control population growth. India must integrate population control efforts with the provision of health care because if population continues to grow in the face of reduced infant mortality and longer life expectancy, future generations will be forced to live in a state of poverty and economic degradation.

  4. Implementation of a Network Address Translation Mechanism Over IPv6

    National Research Council Canada - National Science Library

    Baumgartner, Trevor

    2004-01-01

    ...; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet - IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing...

  5. Keynote address

    International Nuclear Information System (INIS)

    Herzog, R.

    1985-01-01

    This paper addresses various aspects of the bases underlying the nuclear third party liability regime, and also analyses the distinction between danger and risk and the manner in which damage caused by flood, mass unemployment (economic damage mainly) and certain diseases is dealt with in the absence of liability provisions similar to those applicable to nuclear incidents. It also is suggested that the State because of its duty under the Basic Law to ensure adequate energy supplies, should be co-responsible for liability questions along with the nuclear operator. (NEA) [fr

  6. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  7. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire - IRSN, 92 - Clamart (France)

    2011-01-15

    This section gathers a selection of Internet links to online articles dealing with radiation protection issues. Below are the titles of the papers with their web site source: 1 - A mission of the European Commission verifies the proper enforcement by France of the EURATOM treaty dispositions relative to the control of radioactivity in the vicinity of uranium mines (http://www.asn.fr); 2 - tritium contamination at Saint-Maur-des-Fosses: new results from measurements performed by IRSN in the environment; 3 - status of radioactivity monitoring in French Polynesia in 2009 (http://www.irsn.fr); 4 - study of mortality and cancers impact near the Aube facility for low- and medium-activity waste storage (http://www.invs.sante.fr); 5 - Marcel Jurien de la Graviere appointed president of the guidance committee of the defense nuclear expertise of the Institute of radiation protection and nuclear safety (IRSN) (http://www.legifrance.gouv.fr); 6 - radiation protection 163: 'Childhood Leukaemia - Mechanisms and Causes'; 7- Radiation Protection 164: Radioactive effluents from nuclear power stations and nuclear fuel reprocessing sites in the European Union, 2004-08; 8 - Radiation Protection 165: Medical Effectiveness of Iodine Prophylaxis in a Nuclear Reactor Emergency Situation and Overview of European Practices Protection (http://ec.europa.eu); 9 - Report RIFE 15: Radioactivity in Food and the Environment - RIFE (SEPA - Scottish Environment Protection Agency, http://www.sepa.org.uk); 10 - HPA response statement: Advisory Group on Ionising Radiation's report on circulatory disease risk (HPA - Health Protection Agency, http://www.hpa.org.uk); 11 - launching of the national database for the voluntary registering of (quasi) incidents (AFCN - Federal agency of nuclear control, http://www.fanc.fgov.be); 12 - Radiation dose optimization in nuclear medicine (IAEA RPOP - Radiation Protection Of Patients, http://rpop.iaea.org); 13 - The government of Canada finances

  8. Internet resource pricing models

    CERN Document Server

    Xu, Ke; He, Huan

    2013-01-01

    This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mechanisms which can ensure pricing implementation and resource allocation. The authors discuss utility optimization of network pricing methods in economics and underline two classes of pricing methods including system optimization and entities' strategic optimization. The brief closes with two examples of the newly proposed pricing strategy helping to solve the profit distribution problem brought by P2P

  9. [Internet addiction].

    Science.gov (United States)

    Dannon, Pinhas Nadim; Iancu, Iulian

    2007-07-01

    The Internet provides inexpensive, interesting and comfortable recreation, but sometimes users get hooked. Thus, the computer-internet addiction concept has been proposed as an explanation for uncontrollable and damaging use. Symptoms of addiction could be compared to other addictive behaviors such as pathological gambling, kleptomania, trichotillomania, sex addiction and pyromania. Although criteria to diagnose this addiction have been proposed, methods of assessing excessive computer-internet use are limited. Early diagnosis could help the patient that suffers from this addiction before developing additional psychiatric diagnoses. A review of the proposed etiologies in the literature is summarized, together with recommendations for physicians and mental health officials.

  10. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  11. Keynote address

    International Nuclear Information System (INIS)

    Farlinger, W.

    1997-01-01

    In this second keynote address of the conference Mr. Farlinger, Chairman of Ontario Hydro, attempted to respond to some of the criticisms levelled at the Corporation in the course of the Macdonald Committee process. He appeared to be particularly vexed by the criticism of IPPSO, saying that in effect, they are' beating up on their only customer', at a time when Hydro is being pulled in several different directions, and was facing pressure from jurisdictional dispute with municipal utilities, (MEUs). Nevertheless, he agreed with the need for restructuring. He defended Hydro by saying that the Macdonald Report in fact represented a vindication of the position Ontario Hydro had taken, particularly on such issues as open competition, customer choice, rationalization of the distribution system, and termination of Hydro's monopoly position. At the same time, he objected to the Report's assertion that dismantling the generation system into smaller units would be in the best interest of the people of Ontario. He suggested that there would be several large US utility companies willing and able to fill the vacuum if there was no large company with its head office in Ontario to stake its claim to the provincial market

  12. Opening address

    International Nuclear Information System (INIS)

    Boening, K.

    2003-01-01

    The program of this 9th Meeting of the International Group on Research Reactors IGORR includes are quite a number of fascinating new research reactor projects in France, Germany, Russia, Canada, China, Thailand, and in Australia. In addition to the session about New Facilities there are interesting sessions on the Upgrades and on the Optimization of Operation and Utilization of existing research reactors, on Secondary Neutron Sources, on Neutron Scattering applications, and on the aspects of Safety, Licensing and Decommissioning. Two particular projects of new research reactors are mentioned specially: the TRR-II project in Taiwan, has unfortunately been terminated last year because of a change to anti-nuclear of the ruling parties in the government - and the new FRM-II in Munich, Germany, which will hopefully survive such a political change and receive its green light for nuclear start up in the very near future. The charter of IGORR and its objectives are part of this address: The International Group on Research Reactors IGORR was formed to facilitate the sharing of knowledge and experience among those institutions and individuals who are actively working to design, build, and promote new research reactors or to make significant upgrades to existing facilities. The main IGORR objectives are to promote contacts between its members, to identify and discuss problems of common interest, to distribute newsletters about once or twice every year and to organize meetings about once every one-and-a-half years

  13. Opening Address

    Science.gov (United States)

    Yamada, T.

    2014-12-01

    Ladies and Gentlemen, it is my great honor and pleasure to present an opening address of the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3). On the behalf of the organizing committee, I certainly welcome all your visits to KGU Kannai Media Center belonging to Kanto Gakuin University, and stay in Yokohama. In particular, to whom come from abroad more than 17 countries, I would appreciate your participations after long long trips from your homeland to Yokohama. The first international workshop on "State of the Art in Nuclear Cluster Physics", called SOTANCP, was held in Strasbourg, France, in 2008, and the second one was held in Brussels, Belgium, in 2010. Then the third workshop is now held in Yokohama. In this period, we had the traditional 10th cluster conference in Debrecen, Hungary, in 2012. Thus we have the traditional cluster conference and SOTANCP, one after another, every two years. This obviously shows our field of nuclear cluster physics is very active and flourishing. It is for the first time in about 10 years to hold the international workshop on nuclear cluster physics in Japan, because the last cluster conference held in Japan was in Nara in 2003, about 10 years ago. The president in Nara conference was Prof. K. Ikeda, and the chairpersons were Prof. H. Horiuchi and Prof. I. Tanihata. I think, quite a lot of persons in this room had participated at the Nara conference. Since then, about ten years passed. So, this workshop has profound significance for our Japanese colleagues. The subjects of this workshop are to discuss "the state of the art in nuclear cluster physics" and also discuss the prospect of this field. In a couple of years, we saw significant progresses of this field both in theory and in experiment, which have brought better and new understandings on the clustering aspects in stable and unstable nuclei. I think, the concept of clustering has been more important than ever. This is true also in the

  14. Keynote address

    International Nuclear Information System (INIS)

    Davis, J.M.

    1991-01-01

    DOE biomass R ampersand D programs have the potential to provide America with both plentiful, clean-burning domestic transportation fuels and cost-competitive industrial and utility fuels, benefiting energy security in the United States. Biofuels developed under our programs will also help improve air quality, reduce greenhouse gases, reduce the large daily quantities of waste we produce, and revitalize rural America. These research motivations have been documented in the National Energy Strategy. DOE looks forward to expanding its biofuels research program and to forging a partnership with private sector for cost-shared commercialization of new fuels and vehicle technologies. Many alternative fuels (e.g., ethanol, methanol, compressed natural gas, propane, or electricity) are candidates for gaining market share. Indeed, there may be significant regional variation in the future fuel mix. Alcohol fuels from biomass, particularly ethanol, have the potential to make a major contribution. Currently, ethanol in the United States is almost entirely made from corn; and the limitations of that process are well known (e.g., costly feedstock, end product requiring subsidy to be competitive, use of fossil fuels in renewable feedstock production and processing, and potential adverse impact of corn ethanol production on the price of food). To address these concerns, the DOE biofuels program is pursuing an ambitious research program to develop the technologies needed to convert these crops into alternative transportation fuels, primarily cellulose-based ethanol and methanol. Program R ampersand D has reduced the estimated cost per gallon of cellulose-based ethanol from $3.60 in 1980 to the current $1.35, with a program goal of $0.60 by the year 2000. DOE is also investigating the thermochemical conversion of biomass to methanol. The program goal is to achieve commercial production of methanol (like ethanol) at the gasoline equivalent of $0.90 per gallon by the year 2000. 4 figs

  15. Internet culture

    CERN Document Server

    Porter, David

    2013-01-01

    The internet has recently grown from a fringe cultural phenomenon to a significant site of cultural production and transformation. Internet Culture maps this new domain of language, politics and identity, locating it within the histories of communication and the public sphere. Internet Culture offers a critical interrogation of the sustaining myths of the virtual world and of the implications of the current mass migration onto the electronic frontier. Among the topics discussed in Internet Culture are the virtual spaces and places created by the citizens of the Net and their claims to the hotly contested notion of "virtual community"; the virtual bodies that occupy such spaces; and the desires that animate these bodies. The contributors also examine the communication medium behind theworlds of the Net, analyzing the rhetorical conventions governing online discussion, literary antecedents,and potential pedagogical applications.

  16. Internet Connectivity

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet Connectivity. BSNL, SIFY, HCL in Guwahati; only BSNL elsewhere in NE (local player in Shillong). Service poor; All vendors lease BW from BSNL.

  17. Internet enlightens

    International Nuclear Information System (INIS)

    Figueiredo, S.

    2008-01-01

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  18. Internet Censorship

    Science.gov (United States)

    Jyotsna; Kapil; Aayush

    2012-09-01

    Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.

  19. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    addressing, new generation internet. 2. ... required the creation of the next generation of Internet ... IPv6 standards have defined the following Extension headers ..... addresses are represented as x:x:x:x:x:x:x:x, where each x is the hexadecimal ...

  20. Welcome Address

    Science.gov (United States)

    Kiku, H.

    2014-12-01

    Ladies and Gentlemen, It is an honor for me to present my welcome address in the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3), as the president of Kanto Gakuin University. Particularly to those from abroad more than 17 countries, I am very grateful for your participation after long long trips from your home to Yokohama. On the behalf of the Kanto Gakuin University, we certainly welcome your visit to our university and stay in Yokohama. First I would like to introduce Kanto Gakuin University briefly. Kanto Gakuin University, which is called KGU, traces its roots back to the Yokohama Baptist Seminary founded in 1884 in Yamate, Yokohama. The seminary's founder was Albert Arnold Bennett, alumnus of Brown University, who came to Japan from the United States to establish a theological seminary for cultivating and training Japanese missionaries. Now KGU is a major member of the Kanto Gakuin School Corporation, which is composed of two kindergartens, two primary schools, two junior high schools, two senior high schools as well as KGU. In this university, we have eight faculties with graduate school including Humanities, Economics, Law, Sciences and Engineering, Architecture and Environmental Design, Human and Environmental Studies, Nursing, and Law School. Over eleven thousands students are currently learning in our university. By the way, my major is the geotechnical engineering, and I belong to the faculty of Sciences and Engineering in my university. Prof. T. Yamada, here, is my colleague in the same faculty. I know that the nuclear physics is one of the most active academic fields in the world. In fact, about half of the participants, namely, more than 50 scientists, come from abroad in this conference. Moreover, I know that the nuclear physics is related to not only the other fundamental physics such as the elementary particle physics and astrophysics but also chemistry, medical sciences, medical cares, and radiation metrology

  1. PENGEMBANGAN PERANGKAT LUNAK MANAJEMEN KONEKSI INTERNET UNTUK SOHO

    Directory of Open Access Journals (Sweden)

    Muchammad Husni

    2002-07-01

    Full Text Available Untuk bisa mengakses Internet, komputer harus terhubung ke Internet melalui Internet Service Provider dan menggunakan IP address Internet. Jumlah IP address Internet saat ini (IPv4 sangat terbatas, oleh karena itu penggunaannya dibatasi dan diatur dengan sistem sewa yang cukup mahal. Alternatif koneksi Internet yang paling murah dan umum digunakan adalah Dial-up, komputer client akan otomatis menggunakan IP address dynamic yang disewakan selama kita terkoneksi. Apabila pada Local Area Network terdapat beberapa komputer yang ingin menggunakan Internet secara bersamaan apakah harus dilakukan Dial-up untuk tiap komputer ? Tidak, terdapat 2 alternativ Internet-Sharing yakni Masquerading dan Proxy. Saat ini terdapat beberapa software yang menyediakan solusi Internet-Sharing dengan Masquerading atau Proxy yang berbasis sistem operasi Windows. Permasalahannya software tersebut tidak handal (lambat dan sering hang dan tidak aman karena banyaknya celah keamanan pada sistem operasi Windows seperti Denial-of-Service dan Trojan. Penggunaan Internet yang tidak terkontrol pada suatu perusahaan dapat menyebabkan efek yang kontraproduktiv pada karyawan, oleh karena itu diperlukan manajemen akses Internet yang efektiv, efisien dan mudah digunakan. Pada makalah ini dikembangkan solusi Internet-Sharing dan Manajemen Koneksi Internet yang handal, aman, fleksibel dan mudah digunakan. Untuk Internet-Sharing menggunakan fasilitas Masquerading yang terdapat pada kernel Linux 2.2 yang terbukti handal dan aman. Sistem manajemen koneksi dan konfigurasi didesain berbasis Web agar mudah digunakan oleh network administrator dan karyawan. Sistem ini juga cocok diaplikasikan pada Internet Café/Warung Internet. Kata kunci : Internet, SOHO, IP, dial-up.

  2. Student Empowerment Through Internet Usage

    DEFF Research Database (Denmark)

    Purushothaman, Aparna

    2011-01-01

    in a University in Southern India to empower the female students through Internet usage. The study was done to find out the problems the woman students faced in gaining access and using Internet and how they can be empowered through Internet usage. Future workshop was conducted to find out the problems...... and reflecting. The paper will explore the various cultural issues and explicate how the social context plays a major role in the use of Internet even if there is sufficient access. These issues will be addressed from an empowerment perspective. The paper ends by recommending the methods to be adopted for more......Information and Communication Technology (ICT) has been widely recognized as a tool for human development (UNDP 2001). The rate at which ICT are growing is changing the way knowledge is developed, acquired and delivered. (Tongia, et al. 2005) Internet is one of the Information & Communication...

  3. Medical imaging and the Internet

    International Nuclear Information System (INIS)

    Jones, D.N.; Carr, P.

    1995-01-01

    A brief introduction to the INTERNET and its benefits for those involved in nuclear medical imaging is given. In Australia, depending on the type of institution/department involved, connection to the INTERNET may be obtained via the Australian Academic and Research Network or through a commercial provider. The recent proliferation of WWW servers has also resulted in multiple medical imaging databases and teaching resources becoming available to the user. Some Newsgroups and WWW addresses related to radiology are provided. 3 refs

  4. The Internet And Gray Marketing

    OpenAIRE

    Soumava Bandyopadhyay

    2010-01-01

    The purpose of this conceptual paper is to investigate the nature, extent, and outcomes of gray marketing on the Internet.  We examined the current state of Internet-based gray marketing in several product categories and found the phenomenon to be on the rise.  Next, we developed a series of propositions to address evolving trends in online gray marketing, regarding actions of intermediaries and manufacturers, response by consumers, and outcomes on marketing strategy.

  5. Everyone's Internet

    Institute of Scientific and Technical Information of China (English)

    YAO BIN

    2010-01-01

    @@ After more than 20 years, the Internet in China has become a big success. The country has the world's largest Intemet population that topped 420 million at the end of June. In the first six months of this year, China's Internet market reached 74.3 billion yuan ($10.9 billion), the equivalent of 2009's total. Local businesses have risen to leaders on the Chinese market, as Chinese language search, instant messaging and online auction service providers have overwhelming advantages over foreign rivals.

  6. Internet Sexualities

    Science.gov (United States)

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  7. Internet bullying.

    Science.gov (United States)

    Donnerstein, Ed

    2012-06-01

    There is substantial literature on the impact of the mass media on children's and adolescents' health and development. The question of what role new technology plays in the media's influence is now a subject of both review and discussion, particularly regarding health risks and intervention. This article takes a brief look at online usage and the theoretical mechanisms that might make Internet access more problematic in terms of risks, compared with more traditional media such as television and film. One of these risks, known today as cyberbullying or Internet harassment, is scrutinized in detail. Copyright © 2012 Elsevier Inc. All rights reserved.

  8. Internet Policy

    Science.gov (United States)

    1999-11-17

    equipment, including information technology , includes, but is not limited to, personal computers and related peripheral equipment and software, office...classified or Sensitive Unclassified Information through the Internet unless the Designated Approving Authority has approved the method of transmission in...writing. 2. Government office equipment, including Information Technology (IT), shall only be used for official purposes, except as specifically

  9. Internet Shopping

    Institute of Scientific and Technical Information of China (English)

    刘洪毓

    2004-01-01

    Nowadays you no longer need to walk round hundreds of shops looking for the items you need. You can shop for just about anything from your armchair. All you need is a computer and access(进入) to the Internet.

  10. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  11. Internet tomography an introduction to concepts, techniques, tools and applications

    CERN Document Server

    Moloisane, Abia; O’Droma, Máirtín

    2013-01-01

    Internet tomography, introduced from basic principles through to techniques, tools and applications, is the subject of this book. The design of Internet Tomography Measurement Systems (ITMS) aimed at mapping the Internet performance profile spatially and temporally over paths between probing stations is a particular focus.The Internet Tomography Measurement System design criteria addressed include:Minimally-invasive, independent and autonomous, active or passive measurement;Flexibility and scalability;Capability of targeting local, regional and global Internet paths and underlying IP networks;

  12. Playing with the internet through world wide web

    International Nuclear Information System (INIS)

    Kim, Seon Tae; Jang, Jin Seok

    1995-07-01

    This book describes how to use the internet with world wide web. It is divided into six chapters, which are Let's go to the internet ocean, the internet in information superhighway are, connecting the world with a telephone wire such as link with the internet cable and telephone modem, internet service providers, text mode connection, Domain and IP address, the principle and use of world wide web ; business, music, fashion, movie and photo, internet news and e-mail, making internet map with web language, and from installation to application of base program such as TCP/IP, SLIP/PPP 3270 Emulator, Finger and NCSA Mosaic.

  13. Internet Alternatifs

    OpenAIRE

    Dulong de Rosnay , Melanie; Musiani , Francesca

    2015-01-01

    International audience; L'Internet est constitué de différents éléments et couches, qui peuvent être développés, façonnés et organisés de plusieurs manières : le réseau, l'hébergement, les applications, la connexion locale, les contenus. Si le concept de décentralisation est en quelque sorte inscrit dans le principe même de l'Internet – et notamment dans l'organisation de la circulation des flux – son urbanisme actuel semble n'intégrer ce principe que de manière limitée, et certains des risqu...

  14. INTERNET ADVERTISING: A PRIMER

    OpenAIRE

    Matthew N. O. Sadiku*, Shumon Alam, Sarhan M. Musa

    2017-01-01

    Internet advertising (IA) is using the Internet to market products and services to a large audience. In the current era of Internet commerce, companies have chosen to use Internet advertising and the trend is irreversible. The goal of Internet advertising is to drive customers to your website. Understanding some key concepts of Internet advertising is crucial to creating a strategy that will suit one’s business. This paper provides a brief introduction to Internet or online advertising.

  15. Internet Telephony

    OpenAIRE

    Perri, Richard.

    1999-01-01

    During the mid 90s, data and voice began to merge, propelled by advances in compression technology. The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the deployment of Voice over IP (VoIP). One advantage of VoIP technologies is that they leverage existing network resources and dramatically reduce, or major eliminate telephone costs. If there is an existing Wide Area Network (WAN) then VoIP could be employed over the ...

  16. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  17. Internet Job Search and Unemployment Durations

    OpenAIRE

    Kuhn, Peter; Skuterud, Mikal Skuterud

    2002-01-01

    After decades of stability, the technologies used by workers to locate new jobs began to change rapidly with the diffusion of internet access in the late 1990’s. Which types of persons incorporated the internet into their job search strategy, and did searching for work on line help these workers find new jobs faster? We address these questions using measures of internet job search derived from the December 1998 and August 2000 CPS Computer and Internet Supplements, matched with job search o...

  18. Internet dynamics

    Science.gov (United States)

    Lukose, Rajan Mathew

    The World Wide Web and the Internet are rapidly expanding spaces, of great economic and social significance, which offer an opportunity to study many phenomena, often previously inaccessible, on an unprecedented scale and resolution with relative ease. These phenomena are measurable on the scale of tens of millions of users and hundreds of millions of pages. By virtue of nearly complete electronic mediation, it is possible in principle to observe the time and ``spatial'' evolution of nearly all choices and interactions. This cyber-space therefore provides a view into a number of traditional research questions (from many academic disciplines) and creates its own new phenomena accessible for study. Despite its largely self-organized and dynamic nature, a number of robust quantitative regularities are found in the aggregate statistics of interesting and useful quantities. These regularities can be understood with the help of models that draw on ideas from statistical physics as well as other fields such as economics, psychology and decision theory. This thesis develops models that can account for regularities found in the statistics of Internet congestion and user surfing patterns and discusses some practical consequences. practical consequences.

  19. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  20. Compulsive internet use among adolescents: bidirectional parent-child relationships

    NARCIS (Netherlands)

    van den Eijnden, R.J.J.M.; Spijkerman, R.; Vermulst, A.A.; Rooij, T.J; Engels, R.C.M.E.

    2010-01-01

    Although parents experience growing concerns about their children’s excessive internet use, little is known about the role parents can play to prevent their children from developing Compulsive Internet Use (CIU). The present study addresses associations between internet-specific parenting practices

  1. Compulsive Internet Use among Adolescents: Bidirectional Parent-Child Relationships

    Science.gov (United States)

    van den Eijnden, Regina J. J. M.; Spijkerman, Renske; Vermulst, Ad A.; van Rooij, Tony J.; Engels, Rutger C. M. E.

    2010-01-01

    Although parents experience growing concerns about their children's excessive internet use, little is known about the role parents can play to prevent their children from developing Compulsive Internet Use (CIU). The present study addresses associations between internet-specific parenting practices and CIU among adolescents, as well as the…

  2. Poultry Internet

    Science.gov (United States)

    Cheok, Adrian David

    Poultry are one of the most badly treated animals in the modern world. It has been shown that they have high levels of both cognition and feelings, and as a result there has been a recent trend of promoting poultry welfare. There is also a tradition of keeping poultry as pets in some parts of the world. However, in modern cities and societies, it is often difficult to maintain contact with pets, particularly for office workers. We propose and describe a novel cybernetics system to use mobile and Internet technology to improve human-pet interaction. It can also be used for people who are allergic to touching animals and thus cannot stroke them directly. This interaction encompasses both visualization and tactile sensation of real objects.

  3. Internet Astrometry

    Science.gov (United States)

    Caballero, Rafael; Argyle, R. W.

    Amateur astronomers can carry out scientific research in many different ways. Some activities require expensive telescopes, cameras, and often access to dark skies. But those who live in highly polluted areas, or do not have access to very specialized equipment, still have many possibilities; amongst which is using the online resources available from the internet. In this chapter we explore Aladin, Simbad, and VizieR, three resources created and maintained by the Centre de Données astronomiques de Strasbourg (CDS). Although these applications are intended for professional astronomers, they are also freely available for amateurs. They allow us to find and measure old neglected difficult pairs, discover new double stars, and in general have a better understanding of those tiny pairs of points of light that we love to observe, photograph and measure.

  4. Integrated Marketing Communication to Enhance Active User of Internet Banking Service: Case Study Bank XYZ

    OpenAIRE

    Prawitasari, Larasati; Hudrasyah, Herry

    2012-01-01

    Internet banking is a form of self-service technology. In the global banking business, Internet banking has a big role for doing the business. In developing country, Internet banking received relatively little attention although has been deployed for years. Only 3% of customer Bank XYZ in Indonesia using Internet banking service actively, although has been 9 years Bank XYZ introduced Internet banking service. This study addressed what factor that drives and influences Internet banking accepta...

  5. Enhancing the use of internet banking in an emerging market

    Directory of Open Access Journals (Sweden)

    Jacques Nel

    2014-11-01

    Full Text Available Electronic banking services such as internet banking offer bank clients substantial benefits over traditional banking channels. Although internet banking has been around for many years, increasing the use of the service by bank clients remains a priority for many managers of internet banking services. To address this managerial concern, the study investigates the factors that contribute to the enhanced use of internet banking by bank clients. Based on a literature review, internet-banking factors that could influence bank clients’ actual use of internet banking were identified. Data were collected from 1 156 users of internet banking. The results of the study showed that two factors influence internet banking usage, namely internet banking facilitating conditions and internet banking risk beliefs. The more favourable internet banking facilitating conditions are perceived to be, the more likely bank clients are to increase their use of internet banking. On the other hand, the greater the perceived risks associated with internet banking, the less the chances are that clients will do their banking through the internet. On the basis of these results, recommendations are provided to enhance the use of internet banking.

  6. 43 CFR Appendix B to Part 2 - Internet Addresses

    Science.gov (United States)

    2010-10-01

    ... Page: http://www.doi.gov 2. DOI FOIA Home Page: http://www.doi.gov/foia/ 3. DOI Reference Guide for Obtaining Information: http://www.doi.gov/foia/foitabl.htm 4. List of DOI Public Affairs Offices: http://www.doi.gov/foia/list.html 5. DOI FOIA Contacts: http://www.doi.gov/foia/contacts.html 6. DOI FOIA...

  7. INTERNET & INTRANET

    Institute of Scientific and Technical Information of China (English)

    刘硬

    1999-01-01

    <正> 一、什么是INTERNET,INTRANET 说起INTERNET大家都知道它是我们平时接触最多的国际互联网。而INTRANET是最近两年才发展起来的新事物,被企业界称为企业内部网。 INTERNET是一组全球范围内信息资源的名字。这些资源非常巨大,不是一般人所能想象的。它于20世纪70年代创建。他们从一称为ARPANET的网络开始,是由美国国防部发起的用于军事情报的调查与军队之间的联络。原来的ARPANET早已被扩展与替代了,今天它已成为我们所说的INTERNET的全球主干网。

  8. Analyzing the Messages of the State of the Union Address

    Science.gov (United States)

    Kissling, Mark T.; Martell, Christopher C.

    2014-01-01

    In the era of smartphones and 24-hour news networks, the State of the Union address is a major event. All national media outlets--in print, on television, on the Internet--report on the address, some almost exclusively in the days leading up to and after the speech. In this article, considering their experiences teaching about the address, and…

  9. Internet addiction or excessive internet use.

    Science.gov (United States)

    Weinstein, Aviv; Lejoyeux, Michel

    2010-09-01

    Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Review of published literature between 2000-2009 in Medline and PubMed using the term "internet addiction. Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Cross-sectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.

  10. Adaptive Reactive Rich Internet Applications

    Science.gov (United States)

    Schmidt, Kay-Uwe; Stühmer, Roland; Dörflinger, Jörg; Rahmani, Tirdad; Thomas, Susan; Stojanovic, Ljiljana

    Rich Internet Applications significantly raise the user experience compared with legacy page-based Web applications because of their highly responsive user interfaces. Although this is a tremendous advance, it does not solve the problem of the one-size-fits-all approach1 of current Web applications. So although Rich Internet Applications put the user in a position to interact seamlessly with the Web application, they do not adapt to the context in which the user is currently working. In this paper we address the on-the-fly personalization of Rich Internet Applications. We introduce the concept of ARRIAs: Adaptive Reactive Rich Internet Applications and elaborate on how they are able to adapt to the current working context the user is engaged in. An architecture for the ad hoc adaptation of Rich Internet Applications is presented as well as a holistic framework and tools for the realization of our on-the-fly personalization approach. We divided both the architecture and the framework into two levels: offline/design-time and online/run-time. For design-time we explain how to use ontologies in order to annotate Rich Internet Applications and how to use these annotations for conceptual Web usage mining. Furthermore, we describe how to create client-side executable rules from the semantic data mining results. We present our declarative lightweight rule language tailored to the needs of being executed directly on the client. Because of the event-driven nature of the user interfaces of Rich Internet Applications, we designed a lightweight rule language based on the event-condition-action paradigm.2 At run-time the interactions of a user are tracked directly on the client and in real-time a user model is built up. The user model then acts as input to and is evaluated by our client-side complex event processing and rule engine.

  11. Responsible Internet Use.

    Science.gov (United States)

    Truett, Carol; And Others

    1997-01-01

    Provides advice for making school Internet-use guidelines. Outlines responsible proactive use of the Internet for educators and librarians, discusses strengths and weaknesses of Internet blocking software and rating systems, and describes acceptable-use policies (AUP). Lists resources for creating your own AUP, Internet filtering software, and…

  12. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  13. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  14. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  15. Prevalence and Correlates of Internet Addiction in Undergraduate Students as Assessed by Two Different Measures

    Science.gov (United States)

    Schoenfeld, Daniel

    2011-01-01

    The current study addressed some of the methodological shortcomings of previous studies on internet addiction. The main purpose of the study was to determine if two different internet addiction assessments would identify the same individuals as addicted to the internet. A total of 224 undergraduate internet users were surveyed using a stratified…

  16. Allegheny County Addressing Landmarks

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset contains address points which represent physical address locations assigned by the Allegheny County addressing authority. Data is updated by County...

  17. Allegheny County Address Points

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset contains address points which represent physical address locations assigned by the Allegheny County addressing authority. Data is updated by County...

  18. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  19. Tierless Programming for the Internet of Things

    Energy Technology Data Exchange (ETDEWEB)

    Decker, Brett [Brown Univ., Providence, RI (United States)

    2015-02-01

    The Internet of Things (IoT) is about Internet-addressability and connectivity for everyday devices. The goal of this project was to create a framework to allow developers to more easily control IoT devices and turn their interactions into meaningful applications. We leveraged a tierless approach for Software Defined Networking (SDN) to build this framework. We expanded Flowlog, a tierless programming language for SDN controllers, to support IoT devices developed by Spark IO to build this framework.

  20. User Empowerment in the Internet of Things

    OpenAIRE

    Munjin, Dejan

    2013-01-01

    A key concern in the Internet of Things (IoT) has been the integration of mundane objects in the Internet. Although increasingly interconnected, the IoT ecosystem is largely industry-centered. This leads to the creation of limited and incompatible services disempowering users by hampering their participation. In this thesis, we address this issue by empowering users to create, personalize, and distribute services in the IoT ecosystem. We define a general framework for user empowerment relying...

  1. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  2. Preference-based Internet of Things dynamic service selection for smart campus

    CSIR Research Space (South Africa)

    Manqele, L

    2015-09-01

    Full Text Available The usage of the Internet of Things technology across different service provisioning environments has increased the challenges associated with service discovery and selection. Users cannot always remember the Internet Protocol (IP) address for every...

  3. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  4. Internet flash of lightning

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    Seven Internet sites are given relative to European Research and IAEA; Three sites in relation with optimization of radiation protection and environment, Google scolar, medicine, radioecology, finally seventeen Internet sites are detailed in this article. (N.C.)

  5. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  6. Internet Addiction and Antisocial Internet Behavior of Adolescents

    OpenAIRE

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued ...

  7. IP Connected Low Power Wireless Personal Area Networks in the Future Internet

    DEFF Research Database (Denmark)

    Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian

    2012-01-01

    The Internet of Things is a key concept of the Future Internet. The Internet of Things potentially interconnects billions of small devices in a large ubiquitous infrastructure based on the Internet Protocol (IP). Typically, these devices will be limited in computational capacity, memory......WPANs). The authors address the key mechanisms from network aspects down to device design aspects and discuss how technologies interplay to make real application deployment practical for the Internet of Things....

  8. Communicating via Internet and Intranet

    International Nuclear Information System (INIS)

    Jamard, Michel-H.

    2001-01-01

    Full text: Not so long ago, the simple existence of a company's web site could be seen as a way on its own to promote an image of modernism and openness. Today, the use of internet has become so commonplace and the number of sites related to any given industry so huge that companies must build a specific internet communication strategy should they want to ensure a minimum of efficiency to their 'cyber communication'. This is especially true for the nuclear industry: in its case, the challenge is to provide relevant and dated up information to a broad and demanding audience when at the same time responding to attacks from opponents who master 'cyber-activism' with a great deal of skill. Starting from this background, the proposed contribution will address the following topics: - Maintaining visibility among some 1,000 web sites registered under the name 'nuclear'; - Communicating in real time through internet (and intranet internally); Ensuring synergy between internet and other communication tools. (author)

  9. License Address List

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Address list generated from National Saltwater Angler Registry. Used in conjunction with an address-based sample as per survey design.

  10. Reach Address Database (RAD)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Reach Address Database (RAD) stores the reach address of each Water Program feature that has been linked to the underlying surface water features (streams,...

  11. The internet for radiologists

    International Nuclear Information System (INIS)

    Caramella, D.; Pavone, P.

    1999-01-01

    This book provides information on all aspects of the Internet of interest to radiologists. It also provides non-experts with all the information necessary to profit from the Internet and to explore the different possibilities offered by the www. Its use should be recommended to all radiologists who use the Internet. (orig.)

  12. Advertising on the Internet.

    Science.gov (United States)

    Jugenheimer, Donald W.

    1996-01-01

    States that although many advertisers have intentions of utilizing the Internet for advertising, which can provide specific audience targeting and buyer/seller interactivity, few have been successful. Explains advantages and disadvantages of using the Internet for advertising purposes. Cites special problems with Internet advertising and successes…

  13. Internet Bad Neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it

  14. Internet Addiction in Adolescents

    Science.gov (United States)

    Rebisz, Slawomir; Sikora, Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the…

  15. Konsep Pemasaran Melalui Internet

    OpenAIRE

    Nurbasari, Anny

    2002-01-01

    Tulisan ini mencoba membuka wawasan kita untuk mengenal dan mendalami paradigma baru dalam manajemen pemasaran, yang berkaitan dengan kemajuan teknologi pemasaran khususnya pemasaran internet (internet marketing).Pemasaran lewat internet sebagai media komunikasi baru makin lazim dilakukan dan makin berpengaruh karena efisiensinya (lengkap, detail, akurat, cepat, mudah, hemat, murah, dan berjangkauan luas). Secara otomatis ini meningkatkan customer intimacy dan customer satisfaction.

  16. The Sensing Internet

    DEFF Research Database (Denmark)

    Heller, Alfred

    2015-01-01

    . Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...

  17. Internet from Above.

    Science.gov (United States)

    Sullivan, Laura

    1998-01-01

    Explains how fast and reliable Internet access can be obtained by using satellite communications based on experiences at a high school in Mississippi. Discusses Internet communications; how it was implemented in the media center; local area networks; the need for Ethernet-based connection to the Internet; and price. (LRW)

  18. Measuring the internet

    NARCIS (Netherlands)

    Zhou, X.

    2006-01-01

    The Internet is a collection of networks that use the TCP/IP suite of protocols. It has a huge impact on human activity. There are currently hundreds of millions of computers connected to the Internet, generating several petabytes traffic a day. Internet is still growing rapidly. However, the

  19. Internet Addiction and Psychopathology

    Science.gov (United States)

    Koc, Mustafa

    2011-01-01

    This study examined the relationships between university students' internet addiction and psychopathology in Turkey. The study was based on data drawn from a national survey of university students in Turkey. 174 university students completed the SCL-90-R scale and Addicted Internet Users Inventory. Results show that students who use internet six…

  20. Internet firewalls: questions and answers

    Science.gov (United States)

    Ker, Keith

    1996-03-01

    As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.

  1. Empirical analysis of the effects and the mitigation of IPv4 address exhaustion

    OpenAIRE

    Richter, Philipp

    2017-01-01

    IP addresses are essential resources for communication over the Internet. In IP version 4, an address is represented by 32 bits in the IPv4 header; hence there is a finite pool of roughly 4B addresses available. The Internet now faces a fundamental resource scarcity problem: The exhaustion of the available IPv4 address space. In 2011, the Internet Assigned Numbers Authority (IANA) depleted its pool of available IPv4 addresses. IPv4 scarcity is now reality. In the subsequent years, IPv4 a...

  2. The Internet & Regional Australia: How Rural Communities Can Address the Impact of the Internet.

    Science.gov (United States)

    Simpson, Rosie

    In the last decade, a technological revolution has touched all aspects of business and society in Australia, the Western world, and to a lesser extent, the developing world. This revolution has occurred against a backdrop of long-term fundamental changes in rural Australian communities. The decline in traditional agriculture's terms of trade and…

  3. Neuroscience of Internet Pornography Addiction: A Review and Update

    Directory of Open Access Journals (Sweden)

    Todd Love

    2015-09-01

    Full Text Available Many recognize that several behaviors potentially affecting the reward circuitry in human brains lead to a loss of control and other symptoms of addiction in at least some individuals. Regarding Internet addiction, neuroscientific research supports the assumption that underlying neural processes are similar to substance addiction. The American Psychiatric Association (APA has recognized one such Internet related behavior, Internet gaming, as a potential addictive disorder warranting further study, in the 2013 revision of their Diagnostic and Statistical Manual. Other Internet related behaviors, e.g., Internet pornography use, were not covered. Within this review, we give a summary of the concepts proposed underlying addiction and give an overview about neuroscientific studies on Internet addiction and Internet gaming disorder. Moreover, we reviewed available neuroscientific literature on Internet pornography addiction and connect the results to the addiction model. The review leads to the conclusion that Internet pornography addiction fits into the addiction framework and shares similar basic mechanisms with substance addiction. Together with studies on Internet addiction and Internet Gaming Disorder we see strong evidence for considering addictive Internet behaviors as behavioral addiction. Future research needs to address whether or not there are specific differences between substance and behavioral addiction.

  4. Neuroscience of Internet Pornography Addiction: A Review and Update

    Science.gov (United States)

    Love, Todd; Laier, Christian; Brand, Matthias; Hatch, Linda; Hajela, Raju

    2015-01-01

    Many recognize that several behaviors potentially affecting the reward circuitry in human brains lead to a loss of control and other symptoms of addiction in at least some individuals. Regarding Internet addiction, neuroscientific research supports the assumption that underlying neural processes are similar to substance addiction. The American Psychiatric Association (APA) has recognized one such Internet related behavior, Internet gaming, as a potential addictive disorder warranting further study, in the 2013 revision of their Diagnostic and Statistical Manual. Other Internet related behaviors, e.g., Internet pornography use, were not covered. Within this review, we give a summary of the concepts proposed underlying addiction and give an overview about neuroscientific studies on Internet addiction and Internet gaming disorder. Moreover, we reviewed available neuroscientific literature on Internet pornography addiction and connect the results to the addiction model. The review leads to the conclusion that Internet pornography addiction fits into the addiction framework and shares similar basic mechanisms with substance addiction. Together with studies on Internet addiction and Internet Gaming Disorder we see strong evidence for considering addictive Internet behaviors as behavioral addiction. Future research needs to address whether or not there are specific differences between substance and behavioral addiction. PMID:26393658

  5. Neuroscience of Internet Pornography Addiction: A Review and Update.

    Science.gov (United States)

    Love, Todd; Laier, Christian; Brand, Matthias; Hatch, Linda; Hajela, Raju

    2015-09-18

    Many recognize that several behaviors potentially affecting the reward circuitry in human brains lead to a loss of control and other symptoms of addiction in at least some individuals. Regarding Internet addiction, neuroscientific research supports the assumption that underlying neural processes are similar to substance addiction. The American Psychiatric Association (APA) has recognized one such Internet related behavior, Internet gaming, as a potential addictive disorder warranting further study, in the 2013 revision of their Diagnostic and Statistical Manual. Other Internet related behaviors, e.g., Internet pornography use, were not covered. Within this review, we give a summary of the concepts proposed underlying addiction and give an overview about neuroscientific studies on Internet addiction and Internet gaming disorder. Moreover, we reviewed available neuroscientific literature on Internet pornography addiction and connect the results to the addiction model. The review leads to the conclusion that Internet pornography addiction fits into the addiction framework and shares similar basic mechanisms with substance addiction. Together with studies on Internet addiction and Internet Gaming Disorder we see strong evidence for considering addictive Internet behaviors as behavioral addiction. Future research needs to address whether or not there are specific differences between substance and behavioral addiction.

  6. System collaboration and Information Sharing through Internet of Things

    OpenAIRE

    Grubisic, Maja; Marsic, Tina

    2015-01-01

    The focus of this thesis is realization of system collaboration and information sharing between devices through Internet of Things. Internet of Things is a network of things, where a thing can be any device capable of acquiring an IP address. Internet of Things has been discussed in many domains. Companies are exploring the full potential of it, with the purpose of automating their services and optimizing their productivity. In this thesis we have conducted a systematic research review to inv...

  7. Digital Labour in Chinese Internet Industries

    Directory of Open Access Journals (Sweden)

    Bingqing Xia

    2014-09-01

    Full Text Available Digital labour has been the subject of considerable research in recent years (Van Dijck 2009, Manzerolle 2010, Dyer-Witheford 2010. But relatively little research has considered professional workers in digital media. This research addresses this gap by focusing on professional workers in the Chinese Internet industries. This paper asks: How are these digital labourers involved in the digital media production? To what extent should we criticise this involvement? Based on detailed empirical research in China, I argue that the rapid growth of the Internet industries depends on exploiting these Internet workers, such as the workers in Chinese Internet industries—the new ‘sweatshop’ of the digital era. Chinese Internet workers have been subsumed in the global capitalist system as the new ‘sweatshop workers’. This paper shows that Chinese Internet workers suffer very poor working conditions, and argues that these working conditions are the result of exploitation, a concept explored via using Eric Olin Wright’s schema. This paper also argues that most of the Chinese Internet workers are in the lower middle-class class position, in which they are exploited by the upper classes. Their working conditions have seriously deteriorated and they are victims of inequality and injustice—although they also are able to exercise agency and resistance. This paper therefore calls urgent attention to the working conditions of these digital labourers.

  8. Complex Geography of the Internet Network

    International Nuclear Information System (INIS)

    Kallus, Z.; Haga, P.; Matray, P.; Vattay, G.; Laki, S.

    2011-01-01

    The geographic layout of the physical Internet inherently determines important network properties. In this paper, we analyze the spatial properties of the Internet topology. In particular, the distribution of the lengths of Internet links is presented - which was possible through spatial embedding of a representative set of IP addresses by applying a novel IP geolocalization service, called Spotter. The dataset is a result of a geographically dispersed topological discovery campaign. After showing the spatial likelihood of Internet nodes we present two approaches to describe the length distribution of the links. The resulting characterization reveals that the distribution can be separated into three characteristic distance ranges which can be mapped to the regional, transcontinental and intercontinental connections. These regimes follow a power-law function with different exponents. (author)

  9. [Internet research methods: advantages and challenges].

    Science.gov (United States)

    Liu, Yi; Tien, Yueh-Hsuan

    2009-12-01

    Compared to traditional research methods, using the Internet to conduct research offers a number of advantages to the researcher, which include increased access to sensitive issues and vulnerable / hidden populations; decreased data entry time requirements; and enhanced data accuracy. However, Internet research also presents certain challenges to the researcher. In this article, the advantages and challenges of Internet research methods are discussed in four principle issue areas: (a) recruitment, (b) data quality, (c) practicality, and (d) ethics. Nursing researchers can overcome problems related to sampling bias and data truthfulness using creative methods; resolve technical problems through collaboration with other disciplines; and protect participant's privacy, confidentiality and data security by maintaining a high level of vigilance. Once such issues have been satisfactorily addressed, the Internet should open a new window for Taiwan nursing research.

  10. Methods for Intelligent Mapping of the IPV6 Address Space

    Science.gov (United States)

    2015-03-01

    the " Internet of Things " ( IoT ). (2013, Jan. 7). Forbes. [Online]. Available: http://www.forbes.com/sites/quora/2013/01/07/ how-many- things -are...currently-connected-to-the- internet -of- things - iot / 57 [13] G. Huston, “IPv4 address report,” Mar 2015. [Online]. Available: http://www.potaroo.net/tools/ipv4...distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Due to the rapid growth of the Internet , the available pool of unique

  11. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  12. Discovery of IPV6 Router Interface Addresses via Heuristic Methods

    Science.gov (United States)

    2015-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DISCOVERY OF IPV6 ROUTER INTERFACE ADDRESSES VIA HEURISTIC METHODS by Matthew D. Gray September...AND SUBTITLE DISCOVERY OF IPV6 ROUTER INTERFACE ADDRESSES VIA HEURISTIC METHODS 5. FUNDING NUMBERS CNS-1111445 6. AUTHOR(S) Matthew D. Gray 7...Internet Assigned Numbers Authority, there is continued pressure for widespread IPv6 adoption. Because the IPv6 address space is orders of magnitude

  13. Plunkett's E-Commerce & Internet Business Almanac 2012 E-Commerce & Internet Business Industry Market Research, Statistics, Trends & Leading Companies

    CERN Document Server

    Plunkett, Jack W

    2012-01-01

    Market research guide to the e-commerce and Internet business-a tool for strategic planning, competitive intelligence, employment searches or financial research. Contains trends analysis, globalization, trade, statistical tables and an industry glossary. Includes our profiles of nearly 450 top e-commerce and internet industry firms, featuring addresses, phone numbers and executive names.

  14. Security in the internet; Sicherheitsaspekte im Internet

    Energy Technology Data Exchange (ETDEWEB)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P. [Witten-Herdecke Univ., Witten (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie

    2000-04-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [German] Ziele der Studie und Analyse: Es sollten die Fragen beantwortet werden, ob es moeglich ist, das Internet als sicheres Uebermittlungsmedium fuer Telemedizin zu nutzen und welche Sicherheitsrisiken bestehen. Dazu wurden die gaengigen Sicherheitsmethoden analysiert. Telemedizin im Internet ist mit Sicherheitsrisiken behaftet, die durch die Oeffnung eines Intranets mit der Moeglichkeit zur unberechtigten Manipulation von aussen bedingt sind. Schlussfolgerung: Diese Sicherheitsrisiken koennen durch eine Firewall weitgehend unterbunden werden. Chipkarten wie die Health professional card ermoeglichen eine hohe Sicherheit bei digitaler Signatur und sicherer Authentifikation der Sender und Empfaenger von Daten im Internet. Auch Standards wie Pretty good privacy sind inzwischen fuer sichere e-mails einfach einzusetzen. Wichtige Voraussetzung fuer die Reduktion von Sicherheitsrisiken ist unter Beruecksichtigung der gesetzlichen Vorgaben die exakte Planung aller Aktivitaeten im Internet, bei denen medizinische Patientendaten versandt werden sollen, in einem Team aus Aerzten und Informatikern. (orig.)

  15. Internet marketing global features

    Directory of Open Access Journals (Sweden)

    Rakita Branko

    2005-01-01

    Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.

  16. Buying energy over the Internet

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2000-10-01

    It is said that e-commerce is beginning to show explosive growth in the gas and electricity markets and the growth will probably be accelerated even further through several internet tools designed to help with the purchase of energy. So far, in the United Kingdom, the schemes have been aimed at the corporate energy buyers but some are aimed at householders. The bases of some of the schemes (under the sub-headings of (i) commercial and industrial market and (ii) domestic sector) are discussed and their web site addresses given.

  17. Buying energy over the Internet

    International Nuclear Information System (INIS)

    Anon.

    2000-01-01

    It is said that e-commerce is beginning to show explosive growth in the gas and electricity markets and the growth will probably be accelerated even further through several internet tools designed to help with the purchase of energy. So far, in the United Kingdom, the schemes have been aimed at the corporate energy buyers but some are aimed at householders. The bases of some of the schemes (under the sub-headings of (i) commercial and industrial market and (ii) domestic sector) are discussed and their web site addresses given

  18. The Internet of Playful Things

    DEFF Research Database (Denmark)

    Wyeth, Peta; Brereton, Margot; Roe, Paul

    2015-01-01

    This one-day workshop brings together researchers and practitioners to share knowledge and practices on how people can connect and interact with the Internet of Things in a playful way. Open to participants with a diverse range of interests and expertise, and by exploring novel ways to playfully...... will be a road map to support the development of a Model of Playful Connectedness, focusing on how best to design and make playful networks of things, identifying the challenges that need to be addressed in order to do so....

  19. Towards validation of the Internet Census 2012

    NARCIS (Netherlands)

    Maan, Dirk; Cardoso de Santanna, José Jair; Sperotto, Anna; de Boer, Pieter-Tjerk; Kermarrec, Yvon

    2014-01-01

    The reliability of the ``Internet Census 2012'' (IC), an anonymously published scan of the entire IPv4 address space, is not a priori clear. As a step towards validation of this dataset, we compare it to logged reference data on a /16 network, and present an approach to systematically handle

  20. Stratospheric Transparency: Perspectives on Internet Privacy

    Science.gov (United States)

    Hauck, Rita M.

    2009-01-01

    As a parent of teenagers in the 1980s, I recall a concern of the intrusion by MTV into our home. After futile attempts to block the program, my spouse and I set out to convince our sons of its intrusion. Our challenge was miniscule when compared to the Internet privacy issues of today. This paper addresses such challenges and proposes some…

  1. First Things First: Internet Relay Chat Openings.

    Science.gov (United States)

    Rintel, E. Sean; Mulholland, Joan; Pittam, Jeffery

    2001-01-01

    Argues that Internet Relay Chat (IRC) research needs to systematically address links between interaction structures, technological mediation and the instantiation and development of interpersonal relationships. Finds that openings that occur directly following user's entries into public IRC channels are often ambiguous, can disrupt relationship…

  2. INTERNET AND SENIORS

    OpenAIRE

    Rain, Tomáš; Ivana Švarcová

    2010-01-01

    The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize...

  3. International Mathematical Internet Olympiad

    Directory of Open Access Journals (Sweden)

    Alexander Domoshnitsky

    2012-10-01

    Full Text Available Modern Internet technologies open new possibilities in wide spectrum of traditional methods used in mathematical education. One of the areas, where these technologies can be efficiently used, is an organization of mathematical competitions. Contestants can stay at their schools or universities and try to solve as many mathematical problems as possible and then submit their solutions through Internet. Simple Internet technologies supply audio and video connection between participants and organizers.

  4. Everyone’s Internet

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    After more than 20 years,the Internet in China has become a big success.The country has the world’s largest Internet population that topped 420 million at the end of June.In the first six months of this year,China’s Internet market reached 74.3 billion yuan($10.9 billion),the equivalent of 2009’s total.Local businesses have risen to

  5. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  6. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  7. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  8. Internet Addiction in Adolescents

    OpenAIRE

    Rębisz Sławomir; Sikora Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known...

  9. Characteristics of internet addiction/pathological internet use in U.S. university students: a qualitative-method investigation.

    Science.gov (United States)

    Li, Wen; O'Brien, Jennifer E; Snyder, Susan M; Howard, Matthew O

    2015-01-01

    Studies have identified high rates and severe consequences of Internet Addiction/Pathological Internet Use (IA/PIU) in university students. However, most research concerning IA/PIU in U.S. university students has been conducted within a quantitative research paradigm, and frequently fails to contextualize the problem of IA/PIU. To address this gap, we conducted an exploratory qualitative study using the focus group approach and examined 27 U.S. university students who self-identified as intensive Internet users, spent more than 25 hours/week on the Internet for non-school or non-work-related activities and who reported Internet-associated health and/or psychosocial problems. Students completed two IA/PIU measures (Young's Diagnostic Questionnaire and the Compulsive Internet Use Scale) and participated in focus groups exploring the natural history of their Internet use; preferred online activities; emotional, interpersonal, and situational triggers for intensive Internet use; and health and/or psychosocial consequences of their Internet overuse. Students' self-reports of Internet overuse problems were consistent with results of standardized measures. Students first accessed the Internet at an average age of 9 (SD = 2.7), and first had a problem with Internet overuse at an average age of 16 (SD = 4.3). Sadness and depression, boredom, and stress were common triggers of intensive Internet use. Social media use was nearly universal and pervasive in participants' lives. Sleep deprivation, academic under-achievement, failure to exercise and to engage in face-to-face social activities, negative affective states, and decreased ability to concentrate were frequently reported consequences of intensive Internet use/Internet overuse. IA/PIU may be an underappreciated problem among U.S. university students and warrants additional research.

  10. Characteristics of internet addiction/pathological internet use in U.S. university students: a qualitative-method investigation.

    Directory of Open Access Journals (Sweden)

    Wen Li

    Full Text Available Studies have identified high rates and severe consequences of Internet Addiction/Pathological Internet Use (IA/PIU in university students. However, most research concerning IA/PIU in U.S. university students has been conducted within a quantitative research paradigm, and frequently fails to contextualize the problem of IA/PIU. To address this gap, we conducted an exploratory qualitative study using the focus group approach and examined 27 U.S. university students who self-identified as intensive Internet users, spent more than 25 hours/week on the Internet for non-school or non-work-related activities and who reported Internet-associated health and/or psychosocial problems. Students completed two IA/PIU measures (Young's Diagnostic Questionnaire and the Compulsive Internet Use Scale and participated in focus groups exploring the natural history of their Internet use; preferred online activities; emotional, interpersonal, and situational triggers for intensive Internet use; and health and/or psychosocial consequences of their Internet overuse. Students' self-reports of Internet overuse problems were consistent with results of standardized measures. Students first accessed the Internet at an average age of 9 (SD = 2.7, and first had a problem with Internet overuse at an average age of 16 (SD = 4.3. Sadness and depression, boredom, and stress were common triggers of intensive Internet use. Social media use was nearly universal and pervasive in participants' lives. Sleep deprivation, academic under-achievement, failure to exercise and to engage in face-to-face social activities, negative affective states, and decreased ability to concentrate were frequently reported consequences of intensive Internet use/Internet overuse. IA/PIU may be an underappreciated problem among U.S. university students and warrants additional research.

  11. Characteristics of Internet Addiction/Pathological Internet Use in U.S. University Students: A Qualitative-Method Investigation

    Science.gov (United States)

    Li, Wen; O’Brien, Jennifer E.; Snyder, Susan M.; Howard, Matthew O.

    2015-01-01

    Studies have identified high rates and severe consequences of Internet Addiction/Pathological Internet Use (IA/PIU) in university students. However, most research concerning IA/PIU in U.S. university students has been conducted within a quantitative research paradigm, and frequently fails to contextualize the problem of IA/PIU. To address this gap, we conducted an exploratory qualitative study using the focus group approach and examined 27 U.S. university students who self-identified as intensive Internet users, spent more than 25 hours/week on the Internet for non-school or non-work-related activities and who reported Internet-associated health and/or psychosocial problems. Students completed two IA/PIU measures (Young’s Diagnostic Questionnaire and the Compulsive Internet Use Scale) and participated in focus groups exploring the natural history of their Internet use; preferred online activities; emotional, interpersonal, and situational triggers for intensive Internet use; and health and/or psychosocial consequences of their Internet overuse. Students’ self-reports of Internet overuse problems were consistent with results of standardized measures. Students first accessed the Internet at an average age of 9 (SD = 2.7), and first had a problem with Internet overuse at an average age of 16 (SD = 4.3). Sadness and depression, boredom, and stress were common triggers of intensive Internet use. Social media use was nearly universal and pervasive in participants’ lives. Sleep deprivation, academic under-achievement, failure to exercise and to engage in face-to-face social activities, negative affective states, and decreased ability to concentrate were frequently reported consequences of intensive Internet use/Internet overuse. IA/PIU may be an underappreciated problem among U.S. university students and warrants additional research. PMID:25647224

  12. INTERNET AND SENIORS

    Directory of Open Access Journals (Sweden)

    Rain, Tomáš

    2010-12-01

    Full Text Available The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize ways of using internet for helping seniors to better life. The authors describe terms e-senior. The authors suggest methodological approach to exercising user’s skills.

  13. Internet dalam Konteks Perpustakaan

    Directory of Open Access Journals (Sweden)

    Roni Rodhin

    2017-02-01

    Full Text Available The presence of internet would bring a variaty of effects in all areas of human life. The impac of bias could be both a positive and negative. On the other side for libraries it would bring a disparate impact, engaged  in the service and information. In the contect of libraries, the internet is very helpfull to disseminate information that is available in it. It means internet becomes a partner in the dissemination of information. Therefore, the existence of internet is very important for the library.

  14. Modeling the Internet.

    Energy Technology Data Exchange (ETDEWEB)

    Kelic, Andjelka; Mitchell, Michael David; Shirah, Donald N.

    2017-12-01

    The National Infrastructure Simulations and Analysis Center (NISAC) has developed a nationwide model of the Internet to study the potential impact of the loss of physical facilities on the network and on other infrastructures that depend on the Internet for services. The model looks at the Internet from the perspective of Internet Service Providers (ISPs) and their connectivity and can be used to determine how the network connectivity could be modified to assist in mitigating an event. In addition the model could be used to explore how portions of the network could be made more resilient to disruptive events.

  15. Addressing Ozone Layer Depletion

    Science.gov (United States)

    Access information on EPA's efforts to address ozone layer depletion through regulations, collaborations with stakeholders, international treaties, partnerships with the private sector, and enforcement actions under Title VI of the Clean Air Act.

  16. IP- -: A Reduced Internet Protocol for Optical Packet Networking

    Science.gov (United States)

    Ohta, Masataka; Fujikawa, Kenji

    IP- - is proposed as an Internet Protocol suitable for optical packet networking. As optical routers require much faster control than electric ones and lack of optical buffers other than those by fiber delay lines requires fixed time control, Internet Protocols must be at least as simple as IPv4 and much simpler than IPv6. IP- - also addresses issues of IP address space exhaustion and IP routing table explosion.

  17. Internet-based instruction in college teaching

    Science.gov (United States)

    Flickinger, Kathleen Anne

    a whole, these three approaches to understanding the phenomenon of Internet science instruction reveal that the experience of learning science on the Internet can be a viable alternative for diverse learners. Students can learn science on-line at an achievement level that is equal to or better than students in a traditional course. Moreover, such courses may stimulate increased student interest in science and on-line learning. The results of this research indicate that Internet-based courses change the nature of instructional tasks. Instructors spend more time preparing for Internet-based courses than traditional courses; however, the majority of course preparation is associated with technical issues. These technical issues and changes in the nature of instructional tasks will have to be addressed by higher educational institutions.

  18. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  19. Differential psychological impact of internet exposure on Internet addicts.

    Science.gov (United States)

    Romano, Michela; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  20. Differential Psychological Impact of Internet Exposure on Internet Addicts

    OpenAIRE

    Romano, Michela; Osborne, Lisa A.; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and aut...

  1. Piecing together the Internet

    CERN Multimedia

    Rae-Dupree, J

    2002-01-01

    No one group or person can take credit for inventing the Internet. Key ideas came from both military and academic researchers, DOE money got it up and running. Article giving a chronological timeline of the development of the internet from the 1960s to the present day (2 PC screens).

  2. Interlinguistics and the Internet.

    Science.gov (United States)

    Fettes, Mark

    1997-01-01

    Argues that the Internet offers new opportunities for the development, use, and study of planned languages. Notes that while most Web pages on "constructed" languages are the work of individual hobbyists, a few projects have small communities of users. The paper concludes that the use of Esperanto on the Internet reflects increased socialization…

  3. Creating Pupils' Internet Magazine

    Science.gov (United States)

    Bognar, Branko; Šimic, Vesna

    2014-01-01

    This article presents an action research, which aimed to improve pupils' literary creativity and enable them to use computers connected to the internet. The study was conducted in a small district village school in Croatia. Creating a pupils' internet magazine appeared to be an excellent way for achieving the educational aims of almost all…

  4. The Internet Erlang Formula

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk

    2012-01-01

    This paper presents a robust and efficient algorithm for evaluating multi-service multi-rate queueing systems, including finite buffer systems and loss systems. Vint Cerf listed in 2007 seven research problems concerning the Internet. This paper responds to the second problem: an Internet Erlang...

  5. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  6. Teaching on the Internet.

    Science.gov (United States)

    Kubala, Tom

    1998-01-01

    Discusses Internet graduate teaching experiences at the University of Central Florida and explores the pros and cons of online instruction. Describes Internet courses as asynchronous, allowing students to participate at any time and place. States that faculty must be excellent teachers, able to translate their styles into effective,…

  7. The Internet Debate.

    Science.gov (United States)

    Wampler, Angela Mallicote

    1996-01-01

    Examines whether the Internet will be an equalizer or will increase social stratification, whether the Internet will be a boon to rural areas, and how it can be made more appealing or acceptable to rural areas. Discusses the "missionary movement" model of economic change and rural issues related to access to infrastructure, censorship,…

  8. Internet Bad Neighborhoods Aggregation

    NARCIS (Netherlands)

    Moreira Moura, Giovane; Sadre, R.; Sperotto, Anna; Pras, Aiko; Paschoal Gaspary, L.; De Turk, Filip

    Internet Bad Neighborhoods have proven to be an innovative approach for fighting spam. They have also helped to understand how spammers are distributed on the Internet. In our previous works, the size of each bad neighborhood was fixed to a /24 subnetwork. In this paper, however, we investigate if

  9. Ethics and Internet Measurements

    NARCIS (Netherlands)

    van der Ham, Jeroen; van Rijswijk, Roland M.

    2017-01-01

    Over the past decade the Internet has changed from a helpful tool to an important part of our daily lives for most of the world’s population. Where in the past the Internet mostly served to look up and exchange information, it is now used to stay in touch with friends, perform financial transactions

  10. Internet accounting dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro; Mourier, Lise

    2005-01-01

    An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...

  11. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  12. LIFE ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The fast development of the Internet has not only changed people’s lifestyles but also had a deep impact on social structure the rapidly growing Internet has not only changed ways of collecting and using information,but also exerted a farreaching influence on social

  13. Internet and information

    Institute of Scientific and Technical Information of China (English)

    王文龙

    2001-01-01

    As the society develops, information becomesmore important than ever before. Computers willgradually be familiar to more and more people andbe used in more and more ways. Internet makes theworld integrated(合并) as a whole. So, it is important to learn how to make use of the Internet.

  14. Measuring internet skills

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2010-01-01

    Research that considers Internet skills often lacks theoretical justifications and does not go beyond basic button knowledge. There is a strong need for a measurement framework that can guide future research. In this article, operational definitions for measuring Internet skills are proposed,

  15. Banking on the Internet.

    Science.gov (United States)

    Internet Research, 1996

    1996-01-01

    Electronic ground was broken in 1995 with the development of the completely Internet-based bank Security First Network Bank. This article discusses the need for developing online services, outlines the reasons for the formation of an Internet-based bank and argues that to remain competitive financial services providers must provide easier customer…

  16. Remote Thermal Analysis Through the Internet

    Science.gov (United States)

    Malroy, Eric T.

    2002-07-01

    The Heater of the Hypersonic Tunnel Facility (HTF) was modeled using SINDA/FLUINT thermal software. A description of the model is given. The project presented the opportunity of interfacing the thermal model with the Internet and was a demonstration that complex analysis is possible through the Internet. Some of the issues that need to be addressed related to interfacing software with the Internet are the following: justification for using the Internet, selection of the web server, choice of the CGI language, security of the system, communication among the parties, maintenance of state between web pages, and simultaneous users on the Internet system. The opportunities available for using the Internet for analysis are many and can present a significant jump in technology. This paper presents a vision how interfacing with the Internet could develop in the future. Using a separate Optical Internet (OI) for analysis, coupled with virtual reality analysis rooms (VRAR), could provide a synergistic environment to couple together engineering analysis within industry, academia, and government. The process of analysis could be broken down into sub-components so that specialization could occur resulting in superior quality, minimized cost and reduced time for engineering analysis and manufacturing. Some possible subcomponents of the system are solver routines, databases, Graphical User Interfaces, engineering design software, VRARs, computer processing, CAD systems, manufacturing, and a plethora of other options only limited by ones imagination. On a larger scope, the specialization of companies on the optical network would allow companies to rapidly construct and reconstruct their infrastructure based on changing economic conditions. This could transform business.

  17. Australian internet policy

    Directory of Open Access Journals (Sweden)

    Angela Daly

    2017-03-01

    Full Text Available This special issue focussing on internet policy in Australia provides a snapshot of developments on various topics (access, privacy, censorship as a means of understanding better the state of play in Australia, and also how this compares to internet policy in other parts of the world, especially Europe and North America. Given changing geopolitics, the influence of internet policy in the rest of the Asia Pacific through vehicles such as the Regional Comprehensive Economic Partnership (RCEP may become increasingly important in Australia in the coming years. This leaves Australia, and its internet policy, at a crossroads, which may reflect broader dynamics in internet policy internationally, and makes this an interesting time in which to explore what is happening in this particular country.

  18. The Internet drag race

    CERN Document Server

    Fitchard, Kevin

    2004-01-01

    The Internet2 consortium members from California Institute of Technology and CERN developed effective fiber optic network, sending data upto 11,000 kilometers between Caltech's LA laboratories and CERN's campus in Geneva at a rate of 6.25 Gb/s. The 68,431 terabit- meters per second data transfer was accomplished using the IPv4 protocols that power the public Internet. Network run by Internet2, called Abilene maintains the highest capacities in the world, connecting dozens of GigaPOP's with OC-192c 10 Gb/s Ip backbone. The member institutions of Internet2 keep Abilene 10% to 15% full, but the researchers also use the network as a base for the latest Internet technologies and experiments, which include development of IPv6. (Edited abstract).

  19. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  20. Internet Use for Health Information

    Science.gov (United States)

    ... Health Services Utilization > Internet use for Health Information Internet use for Health Information Narrative Due in part ... adults in the United States who use the Internet has increased substantially, from 47 percent in 2000 ...

  1. Causes of Internet Addiction Disorder

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The Internet Addiction Disorder diagnostic manual approved by psychologists on November 8 divides Internet addiction into five categories,which are addiction to online games,pornography,social networking,Internet information and Internetshopping.

  2. Addressing the nuclear misconception

    International Nuclear Information System (INIS)

    Taylor, J.J.

    1998-01-01

    There is a perception, fostered and encouraged by the anti-nuclear groups, that the nuclear industry generates large quantities of waste with no idea how to deal with it, that it is unsafe, uneconomic, and environmentally damaging. The task is to change these perceptions, by demonstrating that the industry is not a problem in itself, but in fact provides solutions to problems. This paper, while primarily concerned with waste, addresses all of these issues as each has a bearing on the perception of the industry and therefore must be considered when addressing the issue of waste. The paper concludes that evidence exists to support the industry view, but that the mission of the industry should be to change the perception of the industry, by influencing and working together with its stake holders to address their concerns, rather than merely presenting more and more facts. (author)

  3. Unit and ubiquitous Internet of Things

    CERN Document Server

    Ning, Huansheng

    2013-01-01

    Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts. Answering fundamental questions about IoT architectures and models, Unit and Ubiquitous Internet of Things introduces essential IoT concepts from the perspectives of mapping and interaction between the physical world and the cyber world. It addresses key issues such as strategy and education, particularly around unit and ubiquitous IoT technologies. Supplying a new pers

  4. Internet Addiction in Adolescents

    Directory of Open Access Journals (Sweden)

    Rębisz Sławomir

    2016-08-01

    Full Text Available The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known as Adolescent Internet Addiction. Compulsive use of the Internet is a complex phenomenon, its effects being visible in almost all aspects of a young person’s social life. It is manifested in a variety of pathological behaviors and emotional states grouped into several major psycho-physical and social effects that may appear simultaneously, e.g. anger, depression, loneliness or anxiety associated with the lack of access to the network, the weakening of social ties, withdrawal from real life, lack of educational achievement, chronic fatigue or deteriorating health. The authors of this study aim to assess the level of Internet addiction among adolescents in Poland and indicate its main behavioral manifestations, in the students surveyed, which influence their pathological use of the Internet. Our study involved a total of 505 students from three high schools located in Rzeszow (N = 505 and was carried out by questionnaires, including, among others, The Problematic Use of the Internet (PUI which is the Polish adaptation of Kimberly Young’s Internet Addiction Test (IAT (Cronbach’s α = 0.89. Statistical analysis of responses from the PUI test allowed us to determine (1 the level of Internet addiction among these adolescents, whereas the univariate (ANOVA analysis enabled us (2 to verify the hypothesis of the existence of differences in the level of Internet addiction among the investigated groups as far as gender, place of residence or grade are concerned

  5. Addressing Sexual Harassment

    Science.gov (United States)

    Young, Ellie L.; Ashbaker, Betty Y.

    2008-01-01

    This article discusses ways on how to address the problem of sexual harassment in schools. Sexual harassment--simply defined as any unwanted and unwelcome sexual behavior--is a sensitive topic. Merely providing students, parents, and staff members with information about the school's sexual harassment policy is insufficient; schools must take…

  6. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  7. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466

  8. Measuring and Comparing the Stability of Internet Paths over IPv4 & IPv6

    OpenAIRE

    Golkar, Forough

    2014-01-01

    Enormous Internet growth is an obvious trend nowadays while Internet protocol version 4 address space exhaustion led into the invention of Internet protocol version 6 and subsequently raised the transitioning challenges from one protocol to the other one. As the Internet protocol version 6 have not been around for a long time, thus there is a limitation knowledge in topology, routing change and performance of IPv6. Several studies are going on in order to getting the information about IPv6 wh...

  9. Duplicate Address Detection Table in IPv6 Mobile Networks

    Science.gov (United States)

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  10. Towards Marxian Internet Studies

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2012-05-01

    Full Text Available This article gives an overview of example approaches of Critical Internet Studies and points out key concepts of this field. Critical Cyberculture Studies and Critical Political Economy/Critical Theory of the Internet are identified as two approaches in Critical Internet Studies. The paper also discusses the role of 11 Marxian concepts for Critical Internet Studies. Marxian concepts that have been reflected in Critical Internet Studies include: dialectics, capitalism, commodification, surplus value/exploitation/alienation/class, globalization, ideology, class struggle, commons, public sphere, communism, and aesthetics. The paper points out the importance of explicitly acknowledging the importance of Karl Marx’s thinking in Critical Internet Studies. Marx’s concepts are today frequently used implicitly, without acknowledging and engaging with their roots. A critique of the approach of “Critical” Cyberculture Studies is advanced. This approach is compared to the approaches of Critical Theory and Critical Political Economy of the Internet. The difference between these two approaches reflects the debate about class exploitation and non-class domination between Cultural Studies and Critical Political Economy in Media and Communication Studies.

  11. SEGMENTASI LAYANAN INTERNET BANKING

    Directory of Open Access Journals (Sweden)

    Ellen Theresia Sihotang

    2017-04-01

    Full Text Available The purpose of this study is to analyze internet banking�s users based on their experiences. It can be used to set marketing program of internet banking that appropriate with customers needs, in order to anticipate tight competition. This research methods starts with focus group discussion and clustering analysis to classify 312 respondents of internet banking users based on demographic, benefit and behavioral segmentation. The sampling method uses purposive sampling and snowball sampling. K-Means Clustering method�s produces four optimal clusters. The benefit orientation of the first cluster in on time saving. Second cluster, concern on the ease of getting and operating internet banking so this cluster does not need auxiliary features such as video guide to use internet banking. The third cluster�s orientation is on the modern lifestyle and the ease of getting and operating internet banking service with detailed daily mutation transaction The fourth cluster, concerns on the detailed daily mutation transaction but they are not sure with the security of personal data via internet banking. �

  12. Safety in the Internet

    Directory of Open Access Journals (Sweden)

    Semenko T.V.

    2016-11-01

    Full Text Available the modern world is the world of computer technology, and the children living in this world feel comfortable in it, they master the computer, mobile devices, new-fangled gadgets easily and use them skillfully. However, their knowledge of the safety in the Internet lags behind their ability to develop new devices. The number of the Internet users is increased every year, so the problem of children safety in the Internet is very urgent. It is necessary for parents, educators and teachers to conduct explanatory conversations and activities for explanation and consolidation the rules of “The Safe Internet”.

  13. Are internet prices sticky?

    OpenAIRE

    Lünnemann, Patrick; Wintr, Ladislav

    2006-01-01

    This paper studies the behaviour of Internet prices. It compares price rigidities on the Internet and in traditional brick-and-mortar stores and provides a cross-country perspective. The data set covers a broad range of items typically sold over the Internet. It includes more than 5 million daily price quotes downloaded from price comparison web sites in France, Germany, Italy, the UK and the US. The following results emerge from our analysis. First, and contrary to the recent findings for co...

  14. Internet plan and planning

    Directory of Open Access Journals (Sweden)

    Kahriman Emina

    2008-01-01

    Full Text Available Paper discuss specific features of internet plan as well as planning as management process in general in the contemporary environment. No need to stress out that marketing plan and marketing planning is core activity in approaching to market. At the same time, there are a lot specific c request in preparing marketing plan comparing to business planning due to marketing plan is an essential part. The importance of internet plan and planning rely on specific features of the internet network but as a part of general corporate as well as marketing strategy.

  15. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  16. INTERNET AND PIRACY

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Internet has penetrated into all the aspects of our life and work.We can study and work by it;we can find a job by it;we can communicate by it;we can entertain by it;we can buy and sell by it.We can do almost everything on the Internet,and almost anywhere anytime. However,at the same time Internet provides services for us,it is inevitably invading our privacy to some degree.The services on most websites require our registering. If we want to enjoy these services,we have to provide much private informa-

  17. Towards the Tactile Internet

    DEFF Research Database (Denmark)

    Szabó, Dávid; Gulyás, András; Fitzek, Frank

    2015-01-01

    5G communication networks enable the steering and control of Internet of Things and therefore require extreme low latency communication referred to as the tactile Internet. In this paper we show that the massive use of network coding throughout the network significantly improves latency and reduce...... the frequency of packet re-transmission, so an architecture built around network coding may be a feasible road towards realizing the tactile internet vision. Our contribution is threefold: (i) we show how network coding improves latency and reduces packet re-transmission with respect to other coding schemes...

  18. Privacidad en internet

    OpenAIRE

    Rodríguez Gómez, José Luis

    2010-01-01

    Análisis de la privacidad en internet, y, en particular, en las redes sociales y la blogosfera. Se parte del concepto jurídico de privacidad y se analizan los riesgos crecientes que la acosan. Anàlisi de la privacitat a Internet, i, en particular, en les xarxes socials i la blogosfera. Es parteix del concepte jurídic de privacitat i s'analitzen els riscos creixents que l'assetgen. Analysis of Internet privacy, and in particular, social networks and the blogosphere. It begins with legal ...

  19. Cryptography and the Internet: lessons and challenges

    Energy Technology Data Exchange (ETDEWEB)

    McCurley, K.S.

    1996-12-31

    The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising new questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.

  20. Identity Management Framework for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.

    -configuring capability and is termed as Internet of Things (IoT). The vision of IoT is to connect every object with computing, communication and sensing ability to the Internet. IoT contains varied range of devices from RFID tags, sensor nodes to the even shoes. Thus, IoT enable nomadic collaboration and communication...... between users and devices, between devices themselves and devices to services. Due to rapid technological advancements in the wireless communications, information coming from uncountable applications and services converged on user devices, communication infrastructure and the Internet are integral part...... that are public can be part of the personal space of multiple users at the same time. Secure interaction in and with IoT, secure data management and exchange, authentication, distributed access control and IdM of the devices are the main challenges. The work carried out in the scope of this thesis addresses...

  1. Isoliertechnik.de. Successful internet pages; Isoliertechnik.de. Erfolgreich im Internet

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2002-06-28

    www.isoliertechnik.de is one of the most interesting websites in our field of industry which also contains addresses for tender. [German] Kein Informationsmedium hat sich in letzter Zeit so rasant entwickelt wie das Internet. Eine der bemerkenswertesten Websites unserer Branche ist www.isoliertechnik.de. Adressen fuer Ausschreibungen werden ebenfalls vorgestellt. (orig.)

  2. Grid to supersede internet

    CERN Multimedia

    Goodard, A

    2000-01-01

    British scientists are developing a successor to the internet that will not only give researchers access to information but also raw computing power via seamless connections to the rest of the world (1 page).

  3. Race to replace internet

    CERN Multimedia

    Ahuja, A

    2000-01-01

    British scientists are urging the Government to support a project to build a computing 'Grid' to succeed the Internet. They believe that fortunes await the countries and companies who commit themselves from the very beginning (1 page).

  4. Scientists planning new internet

    CERN Multimedia

    Cookson, C

    2000-01-01

    British scientists are preparing to build the next generation internet - 'The Grid'. The government is expected to announce about 100 million pounds of funding for the project, to be done in collaboration with CERN (1/2 p).

  5. Internet research in psychology.

    Science.gov (United States)

    Gosling, Samuel D; Mason, Winter

    2015-01-03

    Today the Internet plays a role in the lives of nearly 40% of the world's population, and it is becoming increasingly entwined in daily life. This growing presence is transforming psychological science in terms of the topics studied and the methods used. We provide an overview of the literature, considering three broad domains of research: translational (implementing traditional methods online; e.g., surveys), phenomenological (topics spawned or mediated by the Internet; e.g., cyberbullying), and novel (new ways to study existing topics; e.g., rumors). We discuss issues (e.g., sampling, ethics) that arise when doing research online and point to emerging opportunities (e.g., smartphone sensing). Psychological research on the Internet comes with new challenges, but the opportunities far outweigh the costs. By integrating the Internet, psychological research has the ability to reach large, diverse samples and collect data on actual behaviors, which will ultimately increase the impact of psychological research on society.

  6. Nasionalisme di Era Internet

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2015-04-01

    Full Text Available Nationalism and nationality of a country life are moving into the new phase. Internet has become a new medium that opens up so many opportunities to create a sense of nationalism for the country. This paper contains a review of nationalism in the age of the Internet. This paper begins with understanding nationalism, the character of the Internet, social media and nationalism in the era of the Internet. Research method used in this paper is literature study, continued with reflective data analysis. With reflective analysis method, the authors analyzed data from the data collection has been carried out for comparison between the existing literature by circumstances or phenomena that occur, so that the conclusions of rational and scientific data can be obtained. 

  7. Countering Internet Extremism

    National Research Council Canada - National Science Library

    Thomas, Timothy L

    2009-01-01

    ... that. Extremists' use of the Internet has developed rapidly since the Chechen-Russian conflict. Now they are more creative, and more importantly, more persuasive in their methods to recruit members, gain financial support, and provide proof of success...

  8. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  9. Traditional versus internet bullying in junior high school students.

    Science.gov (United States)

    Gofin, Rosa; Avitzour, Malka

    2012-11-01

    To examine the prevalence of traditional and Internet bullying and the personal, family, and school environment characteristics of perpetrators and victims. Students (12-14 years old) in 35 junior high schools were randomly selected from the Jerusalem Hebrew (secular and religious) and Arab educational system (n = 2,610). Students answered an anonymous questionnaire, addressing personal, family, and school characteristics. Traditional bullying and Internet bullying for perpetrators and victims were categorized as either occurring at least sometimes during the school year or not occurring. Twenty-eight percent and 8.9 % of students were perpetrators of traditional and Internet bullying, respectively. The respective proportions of victims were 44.9 and 14.4 %. Traditional bullies presented higher Odds Ratios (ORs) for boys, for students with poor social skills (those who had difficulty in making friends, were influenced by peers in their behavior, or were bored), and for those who had poor communication with their parents. Boys and girls were equally likely to be Internet bullies and to use the Internet for communication and making friends. The OR for Internet bullying victims to be Internet bullying perpetrators was 3.70 (95 % confidence interval 2.47-5.55). Victims of traditional bullying felt helpless, and victims of traditional and Internet bullying find school to be a frightening place. There was a higher OR of Internet victimization with reports of loneliness. Traditional bully perpetrators present distinctive characteristics, while Internet perpetrators do not. Victims of traditional and Internet bullying feel fear in school. Tailored interventions are needed to address both types of bullying.

  10. Learning Internet of Things

    CERN Document Server

    Waher, Peter

    2015-01-01

    If you're a developer or electronics engineer who is curious about Internet of Things, then this is the book for you. With only a rudimentary understanding of electronics, Raspberry Pi, or similar credit-card sized computers, and some programming experience using managed code such as C# or Java, you will be taught to develop state-of-the-art solutions for Internet of Things in an instant.

  11. Internet of things

    OpenAIRE

    Salazar Soler, Jorge; Silvestre Bergés, Santiago

    2015-01-01

    This is an introductory course to the IoT (Internet of things). In the early chapters the basics about the IoT are introduced. Then basics of IPv6 internet protocol that is the most used in IoT environment as well as main applications, the current state of the market and the technologies that enable the existence of the IoT are described. Finally the future challenges that are considered most important are discussed. Peer Reviewed

  12. Saving the internet.

    Science.gov (United States)

    Zittrain, Jonathan

    2007-06-01

    The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.

  13. Internet and computer crimes

    OpenAIRE

    Janýšková, Zuzana

    2010-01-01

    INTERNET AND COMPUTER CRIME (SUMMARY) The purpose of this thesis is to provide an introduction to the basic problems of Internet and computer crime (furthermore also "cyber crime"), which is a type of crime that is still relatively new, but fast developing in a similar pace as the information technologies. The thesis contains seven substantial chapters. First chapter is an introduction of this thesis, which focuses on its structure and summary of the content. Second chapter presents the most ...

  14. Acne and the Internet.

    Science.gov (United States)

    Zeichner, Joshua A; Del Rosso, James Q

    2016-04-01

    The Internet provides both education and miseducation for acne patients. Although some sites provide disease background information and objective treatment guidance, support networks, and research findings, others may seem to be objective on the surface, but are in reality run by untrained, self-proclaimed experts or are promotional in nature. Providers must be aware of the potential benefits and pitfalls the Internet provides for those suffering with acne. Copyright © 2016 Elsevier Inc. All rights reserved.

  15. Disclosure on the Internet

    International Nuclear Information System (INIS)

    Kratz, M.P.J.

    1998-01-01

    The key issues surrounding regulatory enforcement of Internet disclosure in the petroleum industry were discussed under three headings, i.e. (1) content problems, such as intellectual property, trademarks, copyright, licence limitations, accuracy of promotional and other information; (2) disclosure problems, including web site information, employee disclosure, electronic mail, and third party disclosures; and (3) regulatory issues that range from the Internet as the vehicle for stock manipulation, to transnational aspects, lack of editorial oversight, and multi-jurisdictional enforcement issues

  16. Strategy and the Internet.

    Science.gov (United States)

    Porter, M E

    2001-03-01

    Many of the pioneers of Internet business, both dot-coms and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way--and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it often makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.

  17. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  18. Internet Use among Retired Teachers

    Science.gov (United States)

    Demiray, Emine; Candemir, Özden

    2017-01-01

    Internet access tools and devices are developing with the prevalence of the Internet, which is considered revolutionary in information and communications technology. Beside the widespread use of the Internet among young people, statistics show that the number of older people that use the Internet is also on the rise. The purpose of the study is to…

  19. Hospital marketing and the Internet: the adoption of an innovation.

    Science.gov (United States)

    Shepherd, C David; Fell, Daniel

    2003-01-01

    Given the manner in which the Internet permeates today's society, it is easy to forget that the Internet as we know it is only about a decade old. Due to its newness, the Internet has provided an opportunity to view the manner in which marketers move to adopt such an innovation. To that end, since 1995 a series of studies has tracked the adoption and use of the Internet by hospital marketers. In addition to simply investigating the number of hospitals that utilize the Internet in their marketing efforts, the studies have addressed such questions as: How are hospitals using the Internet to market themselves?, What roadblocks have held hospitals back from adopting the Internet as a marketing tool?, and How happy are hospitals with their Internet investment? This manuscript details the most recent in this series of research studies. In addition, the authors compare the results of this study, conducted in the fall of 2002, with the results from the previous studies. As a result, this study provides a unique opportunity to observe the actual adoption of an innovation, the Internet, by hospital marketing professionals.

  20. Canadian Public Library Users are Unaware of Their Information Literacy Deficiencies as Related to Internet Use and Public Libraries are Challenged to Address These Needs. A Review of: Julien, Heidi and Cameron Hoffman. “Information Literacy Training in Canada’s Public Libraries.” Library Quarterly 78.1 (2008: 19‐41.

    Directory of Open Access Journals (Sweden)

    Martha Ingrid Preddie

    2009-12-01

    Full Text Available Objective – To examine the role of Canada’s public libraries in information literacy skills training, and to ascertain the perspectives of public library Internet users with regard to their experiences of information literacy.Design – Qualitative research using semi‐structured interviews and observations.Setting – Five public libraries in Canada.Subjects – Twenty‐eight public library staff members and twenty‐five customers. Methods – This study constituted the second phase of a detailed examination of information literacy (IL training in Canadian public libraries. Five public libraries located throughout Canada were selected for participation. These comprised a large central branch of a public library located in a town with a population of approximately two million, a main branch of a public library in an urban city of about one million people, a public library in a town with a population of about 75,000, a library in a town of 900 people and a public library located in the community center of a Canadian First Nations reserve that housed a population of less than 100 persons. After notifying customers via signage posted in the vicinity of computers and Internet access areas, the researchers observed each patron as they accessed the Internet via library computers. Observations focused on the general physical environment of the Internet access stations, customer activities and use of the Internet, as well as the nature and degree of customer interactions with each other and with staff. Photographs were also taken and observations were recorded via field notes. The former were analyzed via qualitative content analysis while quantitative analysis was applied to the observations. Additionally, each observed participant was interviewed immediately following Internet use. Interview questions focused on a range of issues including the reasons why customers used the Internet in public libraries, customers’ perceptions about their

  1. Development of an Internet Security Policy for health care establishments.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  2. Internet pharmacy: issues of access, quality, costs, and regulation.

    Science.gov (United States)

    Crawford, Stephanie Y

    2003-02-01

    Internet pharmacy has been the focus of heightened interest over the past 3 years since the first major Web site was introduced in the United States. This paper addresses issues pertaining to Internet pharmacies that sell prescriptions and other products to consumers at the retail level. The Internet pharmacy industry has shifted rapidly in the short time span. This paper begins with a summary of historical considerations and the shifting organization of Internet pharmacy. The advantages and disadvantages of online pharmacy practice are listed. Issues of access, quality, and cost are described. The challenges in regulation at the state and federal levels are presented. Advice to consumers is offered regarding the use of Internet pharmacy sites for purchasing prescription drug products.

  3. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  4. Digital Labour in Chinese Internet Industries

    OpenAIRE

    Bingqing Xia

    2014-01-01

    Digital labour has been the subject of considerable research in recent years (Van Dijck 2009, Manzerolle 2010, Dyer-Witheford 2010). But relatively little research has considered professional workers in digital media. This research addresses this gap by focusing on professional workers in the Chinese Internet industries. This paper asks: How are these digital labourers involved in the digital media production? To what extent should we criticise this involvement? Based on detailed empirica...

  5. Internet Technology on Spacecraft

    Science.gov (United States)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project has shown that Internet technology works in space missions through a demonstration using the UoSAT-12 spacecraft. An Internet Protocol (IP) stack was installed on the orbiting UoSAT-12 spacecraft and tests were run to demonstrate Internet connectivity and measure performance. This also forms the basis for demonstrating subsequent scenarios. This approach provides capabilities heretofore either too expensive or simply not feasible such as reconfiguration on orbit. The OMNI project recognized the need to reduce the risk perceived by mission managers and did this with a multi-phase strategy. In the initial phase, the concepts were implemented in a prototype system that includes space similar components communicating over the TDRS (space network) and the terrestrial Internet. The demonstration system includes a simulated spacecraft with sample instruments. Over 25 demonstrations have been given to mission and project managers, National Aeronautics and Space Administration (NASA), Department of Defense (DoD), contractor technologists and other decisions makers, This initial phase reached a high point with an OMNI demonstration given from a booth at the Johnson Space Center (JSC) Inspection Day 99 exhibition. The proof to mission managers is provided during this second phase with year 2000 accomplishments: testing the use of Internet technologies onboard an actual spacecraft. This was done with a series of tests performed using the UoSAT-12 spacecraft. This spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 6 months! On board software was modified to add an IP stack to support basic IP communications. Also added was support for ping, traceroute and network timing protocol (NTP) tests. These tests show that basic Internet functionality can be used onboard spacecraft. The performance of data was measured to show no degradation from current

  6. So you've got IPv6 address space. Can you defend it?

    OpenAIRE

    Sande, Mikal

    2014-01-01

    Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes to network operations, and new network security concerns. In this thesis we examine IPv6 from a security perspective. The security of IPv6 is important to all protocols that use IPv6 on the Internet. The goal of this thesis is to introduce the reader to existing IPv6 secur...

  7. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  8. World tour through the internet

    International Nuclear Information System (INIS)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-01

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  9. World tour through the internet

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-15

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  10. Diagnostic Criteria for Problematic Internet Use among U.S. University Students: A Mixed-Methods Evaluation

    Science.gov (United States)

    Li, Wen; O’Brien, Jennifer E.; Snyder, Susan M.; Howard, Matthew O.

    2016-01-01

    Empirical studies have identified increasing rates of problematic Internet use worldwide and a host of related negative consequences. However, researchers disagree as to whether problematic Internet use is a subtype of behavioral addiction. Thus, there are not yet widely accepted and validated diagnostic criteria for problematic Internet use. To address this gap, we used mixed-methods to examine the extent to which signs and symptoms of problematic Internet use mirror DSM-5 diagnostic criteria for substance use disorder, gambling disorder, and Internet gaming disorder. A total of 27 university students, who self-identified as intensive Internet users and who reported Internet-use-associated health and/or psychosocial problems were recruited. Students completed two measures that assess problematic Internet use (Young’s Diagnostic Questionnaire and the Compulsive Internet Use Scale) and participated in focus groups exploring their experiences with problematic Internet use. Results of standardized measures and focus group discussions indicated substantial overlap between students’ experiences of problematic Internet use and the signs and symptoms reflected in the DSM-5 criteria for substance use disorder, gambling disorder, and Internet gaming disorder. These signs and symptoms included: a) use Internet longer than intended, b) preoccupation with the Internet, c) withdrawal symptoms when unable to access the Internet, d) unsuccessful attempts to stop or reduce Internet use, e) craving, f) loss of interest in hobbies or activities other than the Internet, g) excessive Internet use despite the knowledge of related problems, g) use of the Internet to escape or relieve a negative mood, and h) lying about Internet use. Tolerance, withdrawal symptoms, and recurrent Internet use in hazardous situations were uniquely manifested in the context of problematic Internet use. Implications for research and practice are discussed. PMID:26751569

  11. Diagnostic Criteria for Problematic Internet Use among U.S. University Students: A Mixed-Methods Evaluation.

    Directory of Open Access Journals (Sweden)

    Wen Li

    Full Text Available Empirical studies have identified increasing rates of problematic Internet use worldwide and a host of related negative consequences. However, researchers disagree as to whether problematic Internet use is a subtype of behavioral addiction. Thus, there are not yet widely accepted and validated diagnostic criteria for problematic Internet use. To address this gap, we used mixed-methods to examine the extent to which signs and symptoms of problematic Internet use mirror DSM-5 diagnostic criteria for substance use disorder, gambling disorder, and Internet gaming disorder. A total of 27 university students, who self-identified as intensive Internet users and who reported Internet-use-associated health and/or psychosocial problems were recruited. Students completed two measures that assess problematic Internet use (Young's Diagnostic Questionnaire and the Compulsive Internet Use Scale and participated in focus groups exploring their experiences with problematic Internet use. Results of standardized measures and focus group discussions indicated substantial overlap between students' experiences of problematic Internet use and the signs and symptoms reflected in the DSM-5 criteria for substance use disorder, gambling disorder, and Internet gaming disorder. These signs and symptoms included: a use Internet longer than intended, b preoccupation with the Internet, c withdrawal symptoms when unable to access the Internet, d unsuccessful attempts to stop or reduce Internet use, e craving, f loss of interest in hobbies or activities other than the Internet, g excessive Internet use despite the knowledge of related problems, g use of the Internet to escape or relieve a negative mood, and h lying about Internet use. Tolerance, withdrawal symptoms, and recurrent Internet use in hazardous situations were uniquely manifested in the context of problematic Internet use. Implications for research and practice are discussed.

  12. Evaluation of device-independent internet spatial location

    OpenAIRE

    Komosný, Dan; Pang, Paul; Mehic, Miralem; Vozňák, Miroslav

    2017-01-01

    Device-independent Internet spatial location is needed for many purposes, such as data personalisation and social behaviour analysis. Internet spatial databases provide such locations based the IP address of a device. The free to use databases are natively included into many UNIX and Linux operating systems. These systems are predominantly used for e-shops, social networks, and cloud data storage. Using a constructed ground truth dataset, we comprehensively evaluate these databases for null r...

  13. The shortcomings of globalised internet technology in Southern Africa

    CSIR Research Space (South Africa)

    Johnson, David L

    2016-12-01

    Full Text Available , and Maurice Tchuente, editors, Fourth International IEEE EAI Conference on eInfrastructure and eServices for Developing Countries (Africomm 2012), Berlin, Heidelberg, 2012. Springer. 10. Elizabeth M Belding, David L Johnson, Lisa Parks, Veljko Pejovic, Gertjan... Stam settings in provisioning of access to the internet. These targets mostly address issues of connectivity, bandwidth and affordability [3, 4]. Subsequently, several countries have set goals for internet access in their national laws, e.g. South...

  14. Managing the Internet of Things based on its Social Structure

    OpenAIRE

    Nitti, Michele

    2014-01-01

    Society is moving towards an “always connected” paradigm, where the Internet user is shifting from persons to things, leading to the so called Internet of Things (IoT) scenario. The IoT vision integrates a large number of technologies and foresees to embody a variety of smart objects around us (such as sensors, actuators, smartphones, RFID, etc.) that, through unique addressing schemes and standard communication protocols, are able to interact with each Others and cooperate with their neighbo...

  15. CUSTOMER SATISFACTION WITH INTERNET BANKING IN PUBLIC AND PRIVATE BANK

    OpenAIRE

    Inder Pal Singh S/o Roop singh*, Dr. Payal Bassi

    2017-01-01

    E- Banking is about using the infrastructure for digital age to create opportunities, both local & global. IT enables the dramatic lowering of transaction cost and the creation of new types of banking opportunities that address the barriers of time and distance. Banking opportunities are local, global and immediate in e-banking. Internet banking has many advantages over other traditional banking delivery methods. Internet banking provides banks with an increased customer base, cost savings, m...

  16. Internet uses for health information seeking: A literature review.

    Science.gov (United States)

    Renahy, E; Chauvin, P

    2006-06-01

    With the widespread dissemination of the Internet throughout the world of health, it would be relevant to report on current knowledge about health information search on the Internet from the consumers' standpoint. We conducted a bibliographical research over the past five years and distinguished between international and French studies. For a long time, the (mostly US) studies have been merely descriptive. The studies highlight that the factors associated with health searches on the Internet are similar to the factors underlying the digital divide. Consumer searches are deemed efficient although search skills are comparatively below standard. Attempts are underway to set up tools, circulate them widely, and ensure better quality information on the Internet. However, comprehension and literacy are still issues in some social groups. Regarding the impact on consumer health per se, a (positive) effect of the Internet seems to emerge but research should be continued. Many of the behaviors, uses or limits addressed in this paper pertain to any information search on the Internet but other problems or differences also occur in the specific area of health. Longitudinal investigations are needed, specifically to gain deeper insight into the impacts we have addressed, while rolling out a comprehensive approach to the temporal evolution of user practices and experiences. Specifically, the central issue is still to determine how (and for whom) the Internet alters information search behaviors and, in fine, to what extent this affects health behaviors and the recourse to healthcare.

  17. Internet Congestion Control System

    Directory of Open Access Journals (Sweden)

    Pranoto Rusmin

    2010-10-01

    Full Text Available Internet congestion occurs when resource demands exceeds the network capacity. But, it is not the only reason. Congestion can happen on some users because some others user has higher sending rate. Then some users with lower sending rate will experience congestion. This partial congestion is caused by inexactly feedback. At this moment congestion are solved by the involvement of two controlling mechanisms. These mechanisms are flow/congestion control in the TCP source and Active Queue Management (AQM in the router. AQM will provide feedback to the source a kind of indication for the occurrence of the congestion in the router, whereas the source will adapt the sending rate appropriate with the feedback. These mechanisms are not enough to solve internet congestion problem completely. Therefore, this paper will explain internet congestion causes, weakness, and congestion control technique that researchers have been developed. To describe congestion system mechanisms and responses, the system will be simulated by Matlab.

  18. Trust in Internet Election

    DEFF Research Database (Denmark)

    Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten

    2014-01-01

    This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...

  19. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  20. Internet Performance to Africa

    Energy Technology Data Exchange (ETDEWEB)

    Cottrell, L

    2003-10-01

    We report the first results ever for real-time Internet performance to Africa using the PingER methodology. Multiple monitoring hosts were used to enable comparisons with performance from different parts of the world. From these preliminary measurements, we have found that Internet packet losses to some African sites in recent months range from very poor to bad (> 12%), some getting better, others are holding steady or getting worse. This, together with the average monthly Round Trip Times, imply end-to-end maximum TCP throughputs that are order of magnitudes different between countries in the region. Africa is shown to be far from the Internet performance in industrialized nations due to the poor infrastructure in place today. These monitoring efforts can provide valuable information to analyze the relative rates of future improvement and today they help us to quantify the digital divide and can provide quantitative information to policy makers.

  1. The internet and you getting on-line

    International Nuclear Information System (INIS)

    Anon.

    1995-01-01

    For anyone who hasn't seen a TV or newspaper in the last couple of years, the Internet is here. Those of us with even moderate exposure to the news have probably been flooded with hype, buzzwords, and references to the open-quotes Information Superhighway.close quotes But there's more than hype to the Internet, with inexpensive and almost instantaneous communication all over the world at your fingertips. This article is a summary of presently available Internet/Worldwide Web addresses for a numer of organizations, including: (1) US Department of Commerce, (2) US DOE, (3) US NRC, (4) Thomas, (5) CAPWEB, and (6) Fedworld

  2. The Internet and hospital marketing strategy: a survey.

    Science.gov (United States)

    Lin, B; James, K; Vassar, J; Martin, C

    2001-01-01

    This project, which was conducted in the U.S. using a large number of healthcare organizations, is an attempt to discover if we can find any evidence of the impact of marketing theories on the real world of healthcare organizations. This paper addresses three major themes: Do healthcare organizations have an Internet strategy? Are they using the Internet in a strategic fashion? Can we identify any difference among the sectors concerning the strategic use of the Internet? Finally, implications for further research and health care practices are highlighted as well.

  3. Internet Addiction: A Current Review

    Directory of Open Access Journals (Sweden)

    Hasan Bozkurt

    2016-09-01

    Full Text Available Internet addiction, which has become a global social issue, can be broadly conceptualized as an inability to control ones use of the Internet which leads to negative consequences in daily life. Only Internet Gaming Disorder has been included in the appendix of the diagnostic and statistical manual of mental disorders fifth edition (DSM-5, but it has already been argued that Internet addiction could also comprise problematic use of other Internet applications developing an addictive behavior. This paper aims to give a current review of the gradually evolving body of literature on Internet addiction. [J Contemp Med 2016; 6(3.000: 235-247

  4. Interpretation of Internet technology

    DEFF Research Database (Denmark)

    Madsen, Charlotte Øland

    2001-01-01

    Research scope: The topic of the research project is to investigate how new internet technologies such as e-trade and customer relation marketing and management are implemented in Danish food processing companies. The aim is to use Weick's (1995) sensemaking concept to analyse the strategic...... processes leading to the use of internet marketing technologies and to investigate how these new technologies are interpreted into the organisation. Investigating the organisational socio-cognitive processes underlying the decision making processes will give further insight into the socio...

  5. Kids rules the internet

    DEFF Research Database (Denmark)

    Sørensen, Birgitte Holm

    2006-01-01

    ?Power users? are children who explore the cutting edge of new media and develop their competencies at a level where few adults can follow. Adults concerns over children?s and adolescents? activities on the Internet can often be ascribed to the fact that the children master the new media faster...... than their parents and their teachers. Adults who take the time to familiarise themselves with common practice on the Internet will usually abandon their concerns in favour of a more positive and supportive attitude....

  6. Counting addressing method: Command addressable element and extinguishing module

    Directory of Open Access Journals (Sweden)

    Ristić Jovan D.

    2009-01-01

    Full Text Available The specific requirements that appear in addressable fire detection and alarm systems and the shortcomings of the existing addressing methods were discussed. A new method of addressing of detectors was proposed. The basic principles of addressing and responding of a called element are stated. Extinguishing module is specific subsystem in classic fire detection and alarm systems. Appearing of addressable fire detection and alarm systems didn't caused essential change in the concept of extinguishing module because of long calling period of such systems. Addressable fire security system based on counting addressing method reaches high calling rates and enables integrating of the extinguishing module in addressable system. Solutions for command addressable element and integrated extinguishing module are given in this paper. The counting addressing method was developed for specific requirements in fire detection and alarm systems, yet its speed and reliability justifies its use in the acquisition of data on slowly variable parameters under industrial conditions. .

  7. Internet addiction among Iranian adolescents: a nationwide study.

    Directory of Open Access Journals (Sweden)

    Khodabakhsh Ahmadi

    2014-06-01

    Full Text Available Problematic use of the Internet by children and adolescents is a newly emerging disorder that has alerted health authorities throughout the world. In Iran, despite the very high speed rate of Internet spread, there is not enough data on the rate of Internet addiction among the adolescents. This study is the first nationwide study that addresses this issue. Overall 4500 students of high school or pre-college schools were recruited from 13/31 provinces of Iran by a cluster sampling method and 4342 (96% participated. Two self-rated questionnaires (one demographics and one Young's Internet addiction scale were filled b the participants. Data were analyzed by SPSS software. 962 (22.2% of the study participants were labeled as having "internet addiction." Males were significantly more likely to be an internet addict (P<0.001. Students whose father and/or mother had a doctorate degree were most likely to have Internet addiction (P<0.001 for both. Job engagement of mothers was significantly associated with students' internet addiction, and the least rate of addiction was observed when the mother was a housewife (P<0.001; having no exercise was associated with the highest rate of Internet addiction (P<0.001. Stepwise logistic regression models showed gender (male, older age, mother's occupation, family's financial status (either very high or very low, low quality of family relationship, and students' lower levels of religious devotion were significantly associated with having Internet addiction. This study showed that Internet addiction in Iranian adolescents is prevalent, and has several independent factors, from which, family relations is most likely to be modifiable. Improvements in family relations and more strict parental supervision, especially when mothers have active job employment, are recommended.

  8. Internet skills, sources of support, and benefiting from internet use

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; Courtois, Cédric; van Dijk, Johannes A.G.M.

    2014-01-01

    This study added communication Internet skills to an existing skill framework of operational, formal, information, and strategic skills. The study investigated how people deal with inadequate skill levels by identifying support sources. Furthermore, we investigated which of the Internet skills

  9. The Internet and Ethiopia's IP Law, Internet Governance and Legal ...

    African Journals Online (AJOL)

    KM_Yilma & HH_Abraha

    3 Ian Lloyd (2014), Information Technology Law, 7th Edition, Oxford ..... private sector, in the global Internet governance forums has indeed been quite .... Ethiopian government is completely absent from the global internet governance.

  10. Characteristics of Internet Addiction/Pathological Internet Use in U.S. University Students: A Qualitative-Method Investigation

    OpenAIRE

    Li, Wen; O?Brien, Jennifer E.; Snyder, Susan M.; Howard, Matthew O.

    2015-01-01

    Studies have identified high rates and severe consequences of Internet Addiction/Pathological Internet Use (IA/PIU) in university students. However, most research concerning IA/PIU in U.S. university students has been conducted within a quantitative research paradigm, and frequently fails to contextualize the problem of IA/PIU. To address this gap, we conducted an exploratory qualitative study using the focus group approach and examined 27 U.S. university students who self-identified as inten...

  11. Research of future network with multi-layer IP address

    Science.gov (United States)

    Li, Guoling; Long, Zhaohua; Wei, Ziqiang

    2018-04-01

    The shortage of IP addresses and the scalability of routing systems [1] are challenges for the Internet. The idea of dividing existing IP addresses between identities and locations is one of the important research directions. This paper proposed a new decimal network architecture based on IPv9 [11], and decimal network IP address from E.164 principle of traditional telecommunication network, the IP address level, which helps to achieve separation and identification and location of IP address, IP address form a multilayer network structure, routing scalability problem in remission at the same time, to solve the problem of IPv4 address depletion. On the basis of IPv9, a new decimal network architecture is proposed, and the IP address of the decimal network draws on the E.164 principle of the traditional telecommunication network, and the IP addresses are hierarchically divided, which helps to realize the identification and location separation of IP addresses, the formation of multi-layer IP address network structure, while easing the scalability of the routing system to find a way out of IPv4 address exhausted. In addition to modifying DNS [10] simply and adding the function of digital domain, a DDNS [12] is formed. At the same time, a gateway device is added, that is, IPV9 gateway. The original backbone network and user network are unchanged.

  12. MULTIFUNCTION OF INTERNET IN TRANSLATION

    Directory of Open Access Journals (Sweden)

    Bayu Budiharjo

    2017-04-01

    Full Text Available Technology affects almost all areas, including translation. Many products of technology have made translational works easier, one of which is internet. Despite the wide use of internet, the potentials it has are sometimes unnoticed. While web-based dictionaries or thesaurus often serve as translators’ assistants and online Machine Translation issues become topics of many researches, other uses of internet related to translation may not be known by many. Internet can help disseminate newborn ideas, theories and findings worldwide to enhance translation theories. Besides, the contact between internet and translation generates new areas to examine. Internet also provides helping hand in the area of translation research. Researcher or anyone conducting research in the field of translation can find a range of research gaps as well as reference. Those who need group discussions to collect required data from informants, or researchers of the same interest coming from all over the world can meet and conduct Focus Group Discussion (FGD on virtual world. Furthermore, internet offers various forms of assistance for translation practitioners. The commonly used internet assistance consists of dictionaries, thesaurus and Machine Translations available on the internet. Other forms of aid provided by internet take form of parallel texts, images, and videos, which can be very helpful. Internet provides many things which can be utilized for the purpose of translation. Internet keeps on providing more as it develops from time to time in line with the development of technology. Internet awaits utilization of theorists, researchers, practitioners and those having concern on translation.

  13. Internet Abuse and Internet Addiction in the Workplace

    Science.gov (United States)

    Griffiths, Mark

    2010-01-01

    Purpose: This paper seeks to overview the issues, concerns and challenges relating to internet abuse and internet addiction in the workplace. Design/methodology/approach: Using psychological literature, the paper outlines a number of important and inter-related areas including brief overviews of internet abuse, and the most extreme form of…

  14. Internet-kriminalitet

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Tranberg, Charlotte Bagger

    2008-01-01

     Kapitlet om internet-kriminalitet rummer, udover en kort indføring i strafferettens almindelige del, bl.a. beskrivelser af de nye værnetingsregler for internetkriminalitet, reglerne om hacking, virusangreb, Denial-of-service, uretmæssig anvendelse af PIN-koder m.v. og identitetstyveri. Bogen er en...

  15. Internet-kriminalitet

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Tranberg, Charlotte Bagger

    2012-01-01

    Kapitlet om internet-kriminalitet rummer, udover en kort indføring i strafferettens almindelige del, bl.a. beskrivelser af de nye værnetingsregler for internetkriminalitet, reglerne om hacking, virusangreb, Denial-of-service, uretmæssig anvendelse af PIN-koder m.v. og identitetstyveri. Bogen er en...

  16. Modeling Internet Topology Dynamics

    NARCIS (Netherlands)

    Haddadi, H.; Uhlig, S.; Moore, A.; Mortier, R.; Rio, M.

    Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. While recent findings have illustrated the inaccuracies in maps inferred from BGP peering and traceroute measurements,

  17. Internet censorship in Turkey

    Directory of Open Access Journals (Sweden)

    Mustafa Akgül

    2015-06-01

    Full Text Available Turkey passed an internet censorship law in 2007 with the declared objective of protecting families and minors (Akdeniz, 2010. It established a unit within the regulator BTK (Information and Communication Technologies Authority responsible for imposing bans and blocks on websites based on nine catalogue crimes defined by other national laws (Akgül 2008, 2009a, 2009b. As of May 2015, 80,000 websites were banned based on civil code related complaints and intellectual property rights violations, reports the independent website Engelliweb. Blocking decisions rendered by penal courts are enforced even when they are based on grounds other that the nine catalogue crimes - such as terrorism, organised crime and crime against the state. Passed in parliament while ignoring the pleas of NGOs and of the internet sector, the Internet Law No. 5651 has since been used to temporarily ban popular platforms such as Blogger, Last.fm, Vimeo, Wordpress and YouTube. At the same time, some blocking decisions by the courts (e.g., Google and Facebook were not enforced by the authorities. Since its introduction, the European Court of Human Rights has ruled that Law No. 5651 (Council of Europe, 2011 is against the European Convention on Human Rights (ECHR, 2013. This article provides an overview of internet censorship and its social background in Turkey.

  18. China on the Internet

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    The big news on the Web in 2009 No more mobile porn The problem of cellphone pornography has been on the rise with more and more mobile phones that are equipped to surf the Internet coming into the market. Online sites accessible only through mobile phones are becoming a popular new method for distributing porn,

  19. Internet based benchmarking

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Nielsen, Kurt

    2005-01-01

    We discuss the design of interactive, internet based benchmarking using parametric (statistical) as well as nonparametric (DEA) models. The user receives benchmarks and improvement potentials. The user is also given the possibility to search different efficiency frontiers and hereby to explore...

  20. The Global Internet Pandemic

    Science.gov (United States)

    Carter, Deborah Joy

    2009-01-01

    The global rise of Internet-based education is discussed in relation to models drawn from social studies and epidemiology. Experiential and data density models are highlighted, also the capacity for technological change, and phenomena observed in the spread of disease. The lesson of these illustrations is that even apparently permanent phenomena…

  1. Internet Search Engines

    OpenAIRE

    Fatmaa El Zahraa Mohamed Abdou

    2004-01-01

    A general study about the internet search engines, the study deals main 7 points; the differance between search engines and search directories, components of search engines, the percentage of sites covered by search engines, cataloging of sites, the needed time for sites appearance in search engines, search capabilities, and types of search engines.

  2. Internet flash of lightning

    International Nuclear Information System (INIS)

    Anon.

    2004-01-01

    Five internet sites are given relative to European Research and IAEA in relation with the I.D.E.A.S. project, intercomparison exercise about the internal dose from individual measurements of radioactive contamination surveillance; European Research in oncology; Electromagnetic fields and human health and a site about the use of lead 210 to determine the date of a death. (N.C.)

  3. Internet, Cybersex and Infidelity

    Directory of Open Access Journals (Sweden)

    Verda Tuzer

    2011-03-01

    Full Text Available Increasing use of internet has numerous reflections on relationships. Within the range of chatroom friendship and flirting to shared sexuality, cybersex addiction and criminal behaviours are among the most intriguing. Searching for sexual satisfaction on internet may have a number of functions such as decreasing anxiety and distress; expressing emotions such as loneliness, depression, anger and disappointment; or providing support to not being able to judge the level of intimacy in a realtionship. The incredible ease with which one obtains sexual content on the internet, at home, at the work place or even through mobile phones is one of the most important reason for its widespread prevalence. Another important allure of the cybersex is its anonimity, the relative ease to disguise normally disturbing characteristics and its being mostly ignored by others. It is also low-cost. On the other hand it causes increased social isolation, damages trust in relationships, and causes the individual to seek for help due to dramatic consequences following a period of virtual mirroring, when the feeling of finding a soulmate causes mutual adoration and idealization. This review examines the definition of infidelity in the context of internet use, its characteristics, types and various aspects; its negative consequences on relationships; its effects on couples and families; and treatment alternatives. The problems caused by increasing compulsivity of cybersex are also highlighted.

  4. STUDYING ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    正Nowadays the Internet is more and more popular.I think it is a good way of learning. First,the Intemet enables people to study whenever and wherever it is convenient. They can also choose to study whatever they are interested in.However,a traditional school doesn't provide such great freedom.Students have to study given sub-

  5. Internet of Things

    Science.gov (United States)

    Ritz, John; Knaack, Zane

    2017-01-01

    In the 21st century, electronic connectivity is a major component of everyday life. One expects to have mobile phone coverage and to have access to log a computer or tablet onto the internet. This connectivity enables users to keep track of personal affairs and conduct work from remote locations. Designers and manufacturers are also connecting…

  6. Internet of Things

    DEFF Research Database (Denmark)

    Shim, J. P.; Avital, Michel; Dennis, Alan R.

    2017-01-01

    Recent research reports illustrate that Internet of things (IoT) is projected to be a multi-trillion dollar opportunity by 2020, with 50 billion devices connected by then. The IoT is a leading-edge topic in Information Systems (IS). In a hyperconnected economy, IoT can transform a business...

  7. The Future of the Internet

    National Research Council Canada - National Science Library

    Komaroff, Mitchell

    2008-01-01

    .... While the DoD no longer controls Internet decision making, its unique perspective deriving from its multiple roles as Internet user, operator, and research center is important to the development and protection of U.S. national interests...

  8. Internet Journal of Medical Update

    African Journals Online (AJOL)

    admin

    Internet Journal of Medical Update 2010 July;5(2):8-14. Internet Journal ... hospitalizations. This study of Nigerian patients with diabetes examined the adequacy of ..... Physicians need .... relationship between patient education and glycaemic ...

  9. Legal aspects of some internet marketing instruments

    Directory of Open Access Journals (Sweden)

    Hana Kelblová

    2012-01-01

    Full Text Available The development of the Internet and sophisticated search engines such as e.g. Google together with the spread of social networks have introduced new marketing possibilities of addressing potential clients with offer of goods and services. Unlike most traditional marketing procedures, these instruments allow for targeting the business information directly at concrete individuals, taking into consideration their age, sex, education, hobbies. All this is based on their choice of words keyed into the search engines. This is the targeted advertising where consumer response can be accurately measured, e.i. the so called context advertising.The purpose of this paper is to analyse the legal aspects of some of the above mentioned internet marketing instruments, as even in this sphere legal regulation clearly lags behind the dynamically developing possibilities of the Internet as a means of communication. These marketing methods being viewed from the perspective of valid laws, several problem areas may be detected, which concern the right of privacy protection of natural person, intellectual property, or legal regulation of implied or unsolicited advertising.This paper concentrates on the summary of rules of law which regulate internet users privacy protection with respect to the Czech and Community laws, assessment of their efficiency and de lege ferenda discretion.

  10. Adopting Internet Banking in Ghana

    OpenAIRE

    G.O. Ofori-Dwumfuo; Betty A. Dankwah

    2013-01-01

    This study looks at the benefits, challenges and barriers in adopting Internet banking at a major bank in Ghana. The development of the Internet is changing the way financial services are provided in Ghana. The Internet banking facility has resulted in new ways of delivering banking services. The research is a case study based on the staffs that has worked with the bank for more than three years. In evaluating benefits, challenges and barriers to the bank in adopting Internet banking, intervi...

  11. Pemanfaatan Teknologi Internet Dalam Pendidikan

    OpenAIRE

    Aziz, Nurazzmi

    2013-01-01

    Internet technology keeps on developing and touching various aspects of human daily life. Starting from the very simple utilization of internet, such as the use of email for communication purposes, browsing varied information, up to the relatively advanced one, such as designing and developing homepage or the use of internet for shopping purposes (e-shopping). Some initiatives, either individually or in collaboration, to utilize internet for learning has been conducted by some Secondary Schoo...

  12. Gender, internet experience, Internet identification, and internet anxiety: a ten-year followup.

    Science.gov (United States)

    Joiner, Richard; Gavin, Jeff; Brosnan, Mark; Cromby, John; Gregory, Helen; Guiller, Jane; Maras, Pam; Moon, Amy

    2012-07-01

    In 2002, we found gender differences in the use of the Internet. Since then, however, the Internet has changed considerably. We therefore conducted a follow-up study in 2012. The study involved 501 students (389 females and 100 males, 12 participants unspecified gender) and we measured Internet use, Internet anxiety, and Internet identification. We found that males had a greater breadth of Internet use; they used the Internet more for games and entertainment than females. The differentiation between males and females in terms of Internet use is evident, and in some ways is even more distinct than 10 years ago. In our previous research we had found no gender differences in the use of the Internet for communication, whereas in the current study we have found that females use the Internet for communication than males and were using social network sites more than males. We also found, consistent with our previous study, that Internet identification and Internet anxiety were related to Internet use.

  13. Reports on internet traffic statistics

    NARCIS (Netherlands)

    Hoogesteger, Martijn; de Oliveira Schmidt, R.; Sperotto, Anna; Pras, Aiko

    2013-01-01

    Internet traffic statistics can provide valuable information to network analysts and researchers about the way nowadays networks are used. In the past, such information was provided by Internet2 in a public website called Internet2 NetFlow: Weekly Reports. The website reported traffic statistics

  14. Some Aspects Regarding Internet Advertising

    Directory of Open Access Journals (Sweden)

    Chiţu I.

    2009-12-01

    Full Text Available The aim of this paper is to examine internet advertising, to understand its strengths and weaknesses, to compare the content and potential of traditional media with Web sites and to describe the specific types of internet advertising. The paper also tries to present some facts and figures regarding internet advertising.

  15. Internet Advertising: Ethics and Etiquette.

    Science.gov (United States)

    Machovec, George S.

    1994-01-01

    Discusses the growth of the Internet and the attitudes of users toward advertising, provides examples of kinds of advertising used on electronic networks, and lists several companies that help advertisers use the Internet. Fifteen guidelines are suggested to help advertisers use the Internet in a reasonable and appropriate way. (Contains 11…

  16. Internet applications in radiation safety

    International Nuclear Information System (INIS)

    Hill, P.; Geisse, C.; Wuest, E.

    1998-01-01

    As a means of effective communication the Internet is presently becoming more and more important in German speaking countries, too. Its possibilities to exchange and to obtain information efficiently and rapidly are excellent. Internet and email access are available now in most institutions for professional use. Internet services of importance to radiation safety professionals are described. (orig.) [de

  17. ITSA: Internet Traffic Statistics Archive

    NARCIS (Netherlands)

    Hoogesteger, Martijn; de Oliveira Schmidt, R.; Pras, Aiko

    Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA). Since 2013, ITSA concentrates reports on high-level statistics of Internet traffic worldwide. Examples of

  18. On analyzing poblems of distributed systems and current internet in front of the future internet architectures

    Directory of Open Access Journals (Sweden)

    Antonio Marcos Alberti

    2016-11-01

    Full Text Available Nowadays, there are hundreds of underway worldwide projects to redesign both com- munication protocols and architecture of the Internet. These initiatives are collectively called “future Internet” research. Most of these initiatives rely on existing distributed systems, which often limit or even prevent the development of “clean slate” solutions. The main reason is that the great majority of distributed systems are tightly-linked with the TCP/IP protocol stack. In this article, we provide a first glance discussion on the relationships between future Internet and distributed systems research, focusing on dependencies and similar requirements among these areas. From this analysis, it beco- mes evident that many of the future Internet requirements (and open challenges are repeated in the distributed systems landscape. Although there are many studies on both research fronts individually, the study of the key challenges of future Internet when addressing distributed systems requirements is a topic yet not explored in our contemporary research. This paper aims at determining the gaps and requirements future Internet must fulfill in order to support future distributed systems. To support this objective, a set of design metrics are identified and a convergent design space is proposed.

  19. Forms of address in Isizulu

    OpenAIRE

    2014-01-01

    M.A. (African Studies) The study deals with forms of address in isiZulu. Therefore, the various aspects of speech that play roles when addressing a person, the factors affecting forms of address in isiZulu and the effect of languages such as English, Afrikaans and other African languages on the forms of address in isiZulu are of interest. Research was conducted on forms of address in isiZulu in parts of Soweto and it was discovered that form of address are determined by different factors i...

  20. Narcissism and Internet pornography use.

    Science.gov (United States)

    Kasper, Thomas Edward; Short, Mary Beth; Milam, Alex Clinton

    2015-01-01

    This study examined the relation between Internet pornography use and narcissism. Participants (N=257) completed an online survey that included questions on Internet pornography use and 3 narcissism measures (i.e., Narcissistic Personality Inventory, Pathological Narcissistic Inventory, and the Index of Sexual Narcissism). The hours spent viewing Internet pornography was positively correlated to participants' narcissism level. In addition, those who have ever used Internet pornography endorsed higher levels of all 3 measures of narcissism than did those who have never used Internet pornography.

  1. How internet agendas are influencing research on mobile devices: A case study of mobile internet risks to children

    DEFF Research Database (Denmark)

    Mascheroni, Giovanna; Stald, Gitte Bang

    This paper examines the emergence of a new research agenda in the study of mobile phones and mobile media. This is an example of issues and concerns migrating from one research field – namely internet studies in general, and studies of children’s internet safety more specifically – to another....... It also shows how policy, academic, and public agendas converge and form the discursive environment in which smartphones are being domesticated. Finally, it addresses the issue of how this new set of research questions can be and are addressed, and what the epistemological implications of the convergence...

  2. La Zoología en Internet

    Directory of Open Access Journals (Sweden)

    Esteban, M.

    1997-12-01

    Full Text Available The main goal of this paper is to facilitate the access of the zoologist to the information online in Internet (mainly through World Wide Web pages. After a presentation of the principal search engines, a number of server address are given for the diferent zoological specialities, from zoological software, data bases, etc. We hope to promote the use of this wealth of information.

    Se presenta un conjunto de direcciones en Internet (principalmente de páginas World Wide Web, para la búsqueda de documentos y servidores dedicados a la Zoología. Además se hace una referencia exhaustiva a servidores zoológicos por categorías, desde los puramente metodológicos, teóricos, bases de datos, etc. El objetivo es facilitar el uso de esta información online.

  3. Internet de las cosas

    OpenAIRE

    Salazar Soler, Jorge; Silvestre Bergés, Santiago

    2016-01-01

    Este es un curso de introducción a la IoT (Internet de las cosas). En los capítulos primeros capítulos se introducen los conceptos básicos sobre la IoT. Seguidamente se presentan nociones básicas sobre el protocolo de internet IPv6 que es el más utilizado en el entorno de la IoT y se describen las principales aplicaciones, el estado actual del mercado y las tecnologías que permiten la existencia de la IoT. Finalmente se analizan los retos de futuro que se consideran más importa...

  4. Internet and Advertisement.

    Science.gov (United States)

    Moustafa, Khaled

    2016-02-01

    The Internet has revolutionized the way knowledge is currently produced, stored and disseminated. A few finger clicks on a keyboard can save time and many hours of search in libraries or shopping in stores. Online trademarks with an (e-) prefix such as e-library, e-business, e-health etc., are increasingly part of our daily professional vocabularies. However, the Internet has also produced multiple negative side effects, ranging from an unhealthy dependency to a dehumanization of human relationships. Fraudulent, unethical and scam practices are also flourishing through for example misleading online advertising methods. Some social and professional networks gather users' profiles for selling and advertising purposes, sometimes by making it technically difficult to unsubscribe. Here, I discuss some of these unethical aspects and propose some potential solutions to reduce them.

  5. Mujeres en Internet

    Directory of Open Access Journals (Sweden)

    Sally Burch

    2015-01-01

    Full Text Available El potencial democratizador de las redes electrónicas dependerá de cómo se desarrollen y usen en un contexto social específico. El aparecimiento y fortalecimiento de espacios en Internet contribuirá a concretar ese potencial, si ello sucede como resultado de necesarias convergencias se logrará un mayor impacto. Así, el reto que presenta el ciberespacio es grande para las organizaciones de mujeres que quieren impulsar nuevas formas de comunicación de género. A las mujeres en la actualidad se les presenta un reto, buscar formas de incidir en la configuración de espacios en Internet para introducir un enfoque de género tanto en los contenidos como en los códigos y las estructuras

  6. Instability and internet design

    Directory of Open Access Journals (Sweden)

    Sandra Braman

    2016-09-01

    Full Text Available Instability - unpredictable but constant change in one’s environment and the means with which one deals with it - has replaced convergence as the focal problem for telecommunications policy in general and internet policy in particular. Those who designed what we now call the internet during the first decade of the effort (1969-1979, who in essence served simultaneously as its policy-makers, developed techniques for coping with instability of value for network designers today and for those involved with any kind of large-scale sociotechnical infrastructure. Analysis of the technical document series that was medium for and record of that design process reveals coping techniques that began with defining the problem and went on to include conceptual labour, social practices, and technical approaches.

  7. Internet en service pack

    Directory of Open Access Journals (Sweden)

    Máximo Lameiro

    2004-04-01

    Full Text Available En contra de los sueños románticos que, no hace tantos años, muchos albergamos, Internet se ha convertido en un inmenso mercado en el cual es cada vez más difícil encontrar alguna cosa genuina y del que es cada vez más improbable salir ileso. La Internet de hoy es tan distinta de lo que fue que poca gente recuerda cómo se gestó y cual era su 'espíritu' en los comienzos. La Red de redes fue el resultado de un proceso, no previsto, que empezó como red militar, siguió como red universitaria, luego alcanzó nivel intercontinental y finalmente se globalizó tanto como el mundo al que ella misma contribuyó a unificar.

  8. Internet use among Turkish adolescents.

    Science.gov (United States)

    Tahiroglu, Aysegul Yolga; Celik, Gonca G; Uzel, Mehtap; Ozcan, Neslihan; Avci, Ayse

    2008-10-01

    The aim of this study was to investigate Internet use habits and problematic Internet use (PIU) in Turkish adolescents. Participants were 3,975 undergraduate students, 7.6% of whom used the Internet for more than 12 hours weekly. The Online Cognition Scale (OCS) was used. The most common purpose for using the Internet was playing games, followed by general information search. Female users mostly preferred searching for general information; male users preferred playing games (p game was violent games. While preference for strategy and fantasy role-play (FRP) games increased with age, preference for other games decreased (p games, followed by FRP, strategy, and sports and motor racing games. Computers and the Internet are useful, important inventions, but like other inventions, if used improperly, they may be harmful. Risk of harm raises concerns about who should use the Internet and computers, and where, when, and why the Internet and computers should be used.

  9. Internet addiction: A case report

    Directory of Open Access Journals (Sweden)

    Pejović-Milovančević Milica

    2009-01-01

    Full Text Available Some addictions cannot be connected with substance abuse (pathological gambling, video games playing, binge eating, compulsive physical activity, emotional relationship addiction, TV addiction. Since 1995, Internet addiction has been accepted as a clinical entity with profound negative effect on social, familial, educational and economical personal functioning. The diagnosis of Internet addiction could be established if the person spends more than 38 hours per week on the Internet exempting online professional needs. Basic symptoms are the increased number of hours spent in front of the computer along with the Internet use, development of abstinent syndrome if the Internet access is prohibited, sleep inversion, neglect of basic social requirements and personal hygiene, many somatic symptoms developed due to prolonged sitting or monitor watching, dissocial behavior. In this paper, data about the Internet addiction are presented and a case report of an adolescent with developed Internet addiction.

  10. Internet Addiction and Its Treatment

    Directory of Open Access Journals (Sweden)

    Ozden Arisoy

    2009-07-01

    Full Text Available With the introduction of new technologies, computer and internet use have become an unavoidable necessity in our daily lives. Internet was originally designed to facilitate communication and research. However the dramatic increase in use of internet in recent years has led to its pathologic use. Turkey, as a developing country with an increasing rate of internet access and computer use is at high risk for this disorder. In our country, this disorder is especially seen in young people who are more skilled in internet and computer use. And because their excessive internet use has led to negative consequences in their academic, social and family lives, patients and their families began search of treatment for this disorder. So clinicians must be aware of this newly emerging disorder and they should be able to apply the appropriate therapeutic interventions. This paper aims to summarize the pharmacological and cognitive-behavioral treatment of internet addiction.

  11. Internet - a resource for nuclear utilities

    International Nuclear Information System (INIS)

    Slone, B.J. III; Richardson, C.E.

    1993-01-01

    Internet is the name of the largest computer network in the world. It is actually a collection of many networks all running the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, connected through gateways and sharing common names and address spaces. Its purpose is to facilitate sharing of resources at participating organizations, which include government agencies, educational institutions, and private corporations. The Internet roots begin with the creation of the Advanced Research Projects Agency (ARPA) within the U.S. Department of Defense (DOD) in 1958. In 1969, the DOD formed a computer network for ARPA and gave it the name ARPANET. It was designed to help government scientists communicate and share information by allowing remote computer log-in and program execution, but it quickly became a tool for sharing information through file transfer, electronic mail, and interest-group mailing lists. In 1970, ARPA became the Defense Advanced Research Projects Agency (DARPA) and ARPANET became DARPANET. By 1980, the DARPANET had grown in size, and other connecting networks were being developed. To support system growth and performance, it was recognized that a new communication protocol was required. In 1983, DARPANET split into DARPANET and MILNET (Military Network), and the Internet was formed when the Defense Communications Agency, which managed both networks, mandated the use of TCP/IP for connected hosts. In 1986, the National Science Foundation (NSF) joined Internet. The NSF created NSFNET to link several national supercomputer centers to support scholarly research. It now comprises 17 networks, connecting to 23 midlevel wide-area networks across the continent. In turn, the midlevel networks link computers in more than 1000 university, government, and commercial research organizations throughout the world

  12. Patient portals and broadband internet inequality.

    Science.gov (United States)

    Perzynski, Adam T; Roach, Mary Joan; Shick, Sarah; Callahan, Bill; Gunzler, Douglas; Cebul, Randall; Kaelber, David C; Huml, Anne; Thornton, John Daryl; Einstadter, Douglas

    2017-09-01

    Patient portals have shown potential for increasing health care quality and efficiency. Internet access and other factors influencing patient portal use could worsen health disparities. Observational study of adults with 1 or more visits to the outpatient clinics of an urban public health care system from 2012 to 2015. We used mixed effects logistic regression to evaluate the association between broadband internet access and (1) patient portal initiation (whether a patient logged in at least 1 time) and (2) messaging, controlling for demographic and neighborhood characteristics. There were 243 248 adults with 1 or more visits during 2012-2015 and 70 835 (29.1%) initiated portal use. Portal initiation was 34.1% for whites, 23.4% for blacks, and 23.8% for Hispanics, and was lower for Medicaid (26.5%), Medicare (23.4%), and uninsured patients (17.4%) than commercially insured patients (39.3%). In multivariate analysis, both initiation of portal use (odds ratio [OR] = 1.24 per quintile, 95% confidence interval [CI], 1.23-1.24, P  internet access. The majority of adults with outpatient visits to a large urban health care system did not use the patient portal, and initiation of use was lower for racial and ethnic minorities, persons of lower socioeconomic status, and those without neighborhood broadband internet access. These results suggest the emergence of a digital divide in patient portal use. Given the scale of investment in patient portals and other internet-dependent health information technologies, efforts are urgently needed to address this growing inequality. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  13. Business Location and Success: The Case of Internet Café Business in Indonesia

    OpenAIRE

    Nurul Indarti

    2004-01-01

    This research aims to examine the relationship between business location decision and business success. The case is Internet café business in Indonesia. This research is addressed to answer these main questions: (1) what factors do underlie location decision for an Internet café business?; and (2) does location decision determine success of Internet café business? A field research is conducted to answer these questions. Factor analysis applied to 17 location factors reveals five underlying...

  14. Nuclear wastes: vitrification and long term behaviour. Information available on Internet sites

    International Nuclear Information System (INIS)

    Macias, R.M.

    2004-01-01

    This document reports an information search on the long-term behaviour of vitrified nuclear wastes. This search has been performed on the Internet and this report presents 21 forms corresponding to the 21 relevant Internet web sites. These forms contain the name of the organization, its country, its Internet address, its language, a brief description of the available information, the concerned public (general public, scholars and students, scientific community)

  15. An Internet of Cars

    OpenAIRE

    Speed, Chris; Shingleton, D; Cherrett, T

    2013-01-01

    Despite describing the transport infrastructure as a ‘network’, most road and transport users see little similarity between the ‘transport network’ and the internet. This paper suggests that overcoming this difference is key to a new paradigm of transport in which connections, flow and sharing are synonymous with both social networking and travel behaviour.In order to demonstrate the potentials, this paper presents an experimental platform that combines data gathered from Automatic Number Pla...

  16. Internet quality management

    International Nuclear Information System (INIS)

    Park, Yeong Taek; Song, Hae Geun

    2000-09-01

    This book guides the useful application of internet quality management. It mentions understanding of modern quality management, which includes basics of quality management, six sigma quality innovation, best system, search way of quality information, consideration for effective information search, establishment of quality information center using bookmark, sites related quality by fields, journal sites related quality, sites related quality award,and web sites of the highest business.

  17. From Internet to Posthuman

    Directory of Open Access Journals (Sweden)

    Alberto Giovanni Biuso

    2015-04-01

    Full Text Available The social-interactive nature of the human being has produced different political, ethical, and technological structures. The Internet is one of them. A thorough understanding of the World Wide Web’s role, potentiality and risks surely requires sound sociological, psychological and cognitive paradigms but it always and above all requires a radical theoretical look at human and posthuman exists and acts on the web and its devices.

  18. Unified Internet Messaging

    OpenAIRE

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  19. Internet: alternativa educativa

    Directory of Open Access Journals (Sweden)

    José Francisco Amador Montaño

    2015-02-01

    Full Text Available RESUMEN Este artículo presenta una propuesta sobre la utilización de las potencialidades de Internet en la educación. Es una reflexión sobre el qué hacer y la responsabilidad d elas instituciones educativas y de los docentes frente a los retos cotnemporáneos que ofrece la tecnología y la ciencia.

  20. Prevalence and Correlates of Internet Gaming Problem among Internet Users: Results from an Internet Survey.

    Science.gov (United States)

    Subramaniam, Mythily; Chua, Boon Yiang; Abdin, Edimansyah; Pang, Shirlene; Satghare, Pratika; Vaingankar, Janhavi A; Verma, Swapna; Ong, Say How; Picco, Louisa; Chong, Siow Ann

    2016-05-01

    The current study aimed to establish the prevalence of internet gaming disorder (IGD) and its association with demographic characteristics, game genre, game use (time spent on gaming), as well as psychological distress, social phobia and well-being among current online gamers in Singapore. A total of 1251 participants aged 13 to 40 years completed the study which was administered as a web survey. The online questionnaire was designed using QuestionPro, and consisted of 8 sections and 105 questions. The 9-item Internet Gaming Disorder Questionnaire was used to establish the prevalence of IGD in the study. A series of logistic regression models were used to examine the associations between IGD, demographic characteristics and game genre, as well as IGD and psychological distress, social phobia and well-being. The prevalence of IGD established using a cutoff of 5 among those who were current online gamers was 17.7%. Multiple logistic regressions revealed that those meeting criteria of IGD were more likely to be older, reported an earlier age of onset of playing online games, had primary and secondary education versus tertiary education, were currently students versus being currently employed and played massively multiplayer online role-playing games. Distress and social anxiety were higher while satisfaction with life was significantly lower among those who met criteria for IGD than those who did not meet the criteria. The prevalence of IGD and its negative consequences in our sample of current online gamers was significant and point towards the need for further clinical studies and innovative interventions to address the problem.

  1. The Internet of Things

    CERN Document Server

    Greengard, Samuel

    2015-01-01

    We turn on the lights in our house from a desk in an office miles away. Our refrigerator alerts us to buy milk on the way home. A package of cookies on the supermarket shelf suggests that we buy it, based on past purchases. The cookies themselves are on the shelf because of a "smart" supply chain. When we get home, the thermostat has already adjusted the temperature so that it's toasty or bracing, whichever we prefer. This is the Internet of Things -- a networked world of connected devices, objects, and people. In this book, Samuel Greengard offers a guided tour through this emerging world and how it will change the way we live and work. Greengard explains that the Internet of Things (IoT) is still in its early stages. Smart phones, cloud computing, RFID (radio-frequency identification) technology, sensors, and miniaturization are converging to make possible a new generation of embedded and immersive technology. Greengard traces the origins of the IoT from the early days of personal computers and the Internet...

  2. The International Criticality Safety Benchmark Evaluation Project on the Internet

    International Nuclear Information System (INIS)

    Briggs, J.B.; Brennan, S.A.; Scott, L.

    2000-01-01

    The International Criticality Safety Benchmark Evaluation Project (ICSBEP) was initiated in October 1992 by the US Department of Energy's (DOE's) defense programs and is documented in the Transactions of numerous American Nuclear Society and International Criticality Safety Conferences. The work of the ICSBEP is documented as an Organization for Economic Cooperation and Development (OECD) handbook, International Handbook of Evaluated Criticality Safety Benchmark Experiments. The ICSBEP Internet site was established in 1996 and its address is http://icsbep.inel.gov/icsbep. A copy of the ICSBEP home page is shown in Fig. 1. The ICSBEP Internet site contains the five primary links. Internal sublinks to other relevant sites are also provided within the ICSBEP Internet site. A brief description of each of the five primary ICSBEP Internet site links is given

  3. Cognitive Maps, AI Agents and Personalized Virtual Environments in Internet Learning Experiences.

    Science.gov (United States)

    Maule, R. William

    1998-01-01

    Develops frameworks to help Internet media designers address end-user information presentation preferences by advancing structures for assessing metadata design variables which are then linked to user cognitive styles. An underlying theme is that artificial intelligence (AI) methodologies may be used to help automate the Internet media design…

  4. Searching for Educational Content in the For-Profit Internet: Case Study and Analysis.

    Science.gov (United States)

    Fabos, Bettina

    This case study investigates the commercialized nature of Internet content and the ways educators and students negotiate and talk about such content. In factoring in the economic and historical context of educational Internet content, this case study also addresses educators' evolving attitudes towards commercialism in the classroom. A survey was…

  5. The internet of lights : an open reference architecture and implementation for intelligent solid state lighting systems

    NARCIS (Netherlands)

    Mathews, E.; Guclu, S.S.; Liu, Qingzhi; Ozcelebi, T.; Lukkien, J.J.

    2017-01-01

    The Internet of Things (IoT) is opening up new services and is stimulating changes in industries. The lighting industry is also embracing this change by establishing an Internet of Lights (IoL). This article highlights the main benefits and the challenges to face while going towards IoL. To address

  6. Writing and Pseudo-Writing from Internet-Based Sources: Implications for Learning and Assessment

    Science.gov (United States)

    Skaar, Håvard

    2015-01-01

    In recent years, plagiarism has been on the increase across the Western world. This article identifies Internet access as a contributory cause of this trend and addresses the implications of readily available Internet sources for the teaching and assessment of writing in schools. The basis for the article is a previous study showing a wide…

  7. Cyberbullying: who are the victims? A comparison of victimization in internet chatrooms and victimization in school

    NARCIS (Netherlands)

    Katzer, C.; Fetchenhauer, D.; Belschak, F.

    2009-01-01

    Bullying is not a phenomenon exclusive to the school environment. Pupils also become victims of verbal aggression (teasing, threats, insults, or harassment) in the context of internet chatrooms. The present study addresses the following questions: (1) How often does bullying occur in internet

  8. Insights into Motivating Internet Users towards Internet Banking

    OpenAIRE

    J. Ramola Premalatha

    2016-01-01

    Internet banking has evolved from helping customers meet their basic banking needs to meeting their sophisticated needs. In recent years, the number of internet banking users has been increasing exponentially. As customers get more and more educated, getting insight about internet banking has become a primary area of concern for all leading banks in India. Hence, the study is made to analyse the perception of customers specifically who are computer literate, in a semi-urban area about interne...

  9. The Internet Engineering Task Force and The Future of Internet

    OpenAIRE

    Baccelli , Emmanuel; Clausen , Thomas Heide; Jacquet , Philippe

    2009-01-01

    International audience; If one wants to identify where ideas and initiatives regarding the Internet are being confronted, the Internet Engineering Task Force (IETF) is unavoidable. Created in 1986 by US government agencies (DoD, Department of Energy, NASA, NSF) to supervise the design and deployment of Internet protocols, it was initially open only for US government funded researchers. Early 1987 saw a dozen of industry representatives invited, and in a matter of months, the IETF was opened t...

  10. Internet Freedom in Asia: Case of Internet Censorship in China

    OpenAIRE

    MONGGILO, ZAINUDDIN MUDA

    2016-01-01

    Internet can develop the communication and information freedom on society but unfortunately in some nations, especially in Asia, it cannot be fully accessed because of government censorship. This report explains the relationship between the practice of Internet censorship imposed by the Chinese government and the freedom of its citizens (in the internet surfing experience) as the realization of human rights in the freedom of expression and opinion (seek, receive-use, and communicate informati...

  11. The Internet and the medical radiation science practitioner

    Energy Technology Data Exchange (ETDEWEB)

    Shanahan, Madeleine [School of Medical Science, RMIT University, Bundoora, Victoria 3083 (Australia)], E-mail: mshanahan@rmit.edu.au; Herrington, Anthony; Herrington, Jan [Faculty of Education, University of Wollongong, New South Wales (Australia)

    2009-08-15

    profession on the professional use of the Internet by MRS practitioners and issues limiting the accessibility of information available through the Internet to MRS practitioners. These issues must be addressed by organisations such as professional societies, registration bodies and workplaces that currently recognise or mandate that MRS practitioners must stay up-to-date with the changing knowledge base of their profession.

  12. The Internet and the medical radiation science practitioner

    International Nuclear Information System (INIS)

    Shanahan, Madeleine; Herrington, Anthony; Herrington, Jan

    2009-01-01

    profession on the professional use of the Internet by MRS practitioners and issues limiting the accessibility of information available through the Internet to MRS practitioners. These issues must be addressed by organisations such as professional societies, registration bodies and workplaces that currently recognise or mandate that MRS practitioners must stay up-to-date with the changing knowledge base of their profession.

  13. Internet gambling is a predictive factor of Internet addictive behavior.

    Science.gov (United States)

    Critselis, Elena; Janikian, Mari; Paleomilitou, Noni; Oikonomou, Despoina; Kassinopoulos, Marios; Kormas, George; Tsitsika, Artemis

    2013-12-01

    Adolescent Internet gambling is associated with concomitant addictive behaviors. This study aimed to assess the prevalence of Internet gambling practices, its impact upon psychosocial development and to evaluate the association between gambling practices and Internet addictive behavior among Cypriot adolescents. A cross-sectional study was conducted in a convenience sample (n = 805) of adolescents attending selected public schools (9th and 10th grades) in Cyprus. Anonymous self-completed questionnaires were used including the Internet Addiction Test and the Strengths and Difficulties Questionnaire. Among the study population (n = 805), approximately one third (n = 28; 34.9%) reported Internet gambling. Internet gamblers were twice as likely to utilize Internet café portals (adjusted odds ratio for gender and age, AOR: 2.13; 95% confidence interval, 95% CI: 1.56-2.91) for interactive game-playing (AOR: 6.84; 95% CI: 4.23-11.07), chat-rooms (AOR: 2.57; 95% CI: 1.31-4.85), and retrieval of sexual information (AOR: 1.99; 95% CI: 1.42-2.81). Among Internet gamblers 26.0% (n = 73) reported borderline addictive Internet use and 4.3% (n = 12) addictive behavior. Internet gamblers more often had comprehensive psychosocial and emotional maladjustment (AOR: 4.00; 95% CI: 1.97-8.13), including Abnormal Conduct Problems (AOR: 3.26; 95% CI: 2.00-5.32), Emotional Symptoms (AOR: 1.78; 95% CI: 1.02-3.11), and Peer Problems (AOR: 2.44; 95% CI: 1.08-5.48) scores. The multivariate regression analyses indicated that the single independent predictor associated with Internet addictive behavior was Internet gambling (AOR: 5.66; 95% CI: 1.45-22.15). Internet gambling is associated with addictive Internet use, as well as emotional maladjustment and behavioral problems, among Cypriot adolescents. Longitudinal studies are needed to elucidate whether Internet gambling constitutes a risk factor for the development of Internet addictive behavior among adolescents.

  14. [Interrelations Between Adolescent Problematic Internet Use and Parental Internet Mediation].

    Science.gov (United States)

    Kammerl, Rudolf; Wartberg, Lutz

    2018-02-01

    Interrelations Between Adolescent Problematic Internet Use and Parental Internet Mediation Everyday life of adolescents and their parents is increasingly characterized by digital media usage (also referred to as "process of mediatization"). In the current study, associations between problematic Internet use of the adolescents (as a possible consequence of the process of mediatization) and parental media education were explored. For this purpose, throughout Germany 1,095 family dyads (an adolescent and a related parent) were investigated with a standardized questionnaire measuring different aspects of parental media education and adolescent problematic Internet use. We conducted two multiple linear regression analyses (dimensional approach) with adolescent problematic Internet use based on self-ratings (model 1, corrected R 2 = 0.18) and parental assessment (model 2, corrected R 2 = 0.24) as response variables. Consistently for self- and parental ratings, adolescent problematic Internet use was statistically significant related to male gender (of the adolescent), a more frequent inconsistent media education (adolescents' and parents' perspective) and a stronger monitoring (parents' perspective). Additionally, we observed associations between the parental rating of adolescent problematic Internet use and a less frequent active and restrictive Internet Mediation (parents' perspective). The findings of the present study show the importance of parental media education for problematic Internet use in adolescence and especially, the role of inconsistent media education should be investigated again in further studies.

  15. Internet services for planning embedded generation connections

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-12-15

    The required publication by distributed network operators (DNOs) of details of the current state of their network systems and future planned developments in the form of Long Term Development Statements (LTDS) are discussed. This project aims to increase the usefulness of the information in the LTDS by making it available on the internet, by transforming LTDSs into electronic format, and integrating LTDS information with geographical information in a single database. Services developed provide for data loading, data visualisation, initial assessment of connection opportunities, and reporting. The benefits of the services, and the demonstrated feasibility of publishing information concerning UK renewable generation sites are considered. The web address of the site is given.

  16. Beyond the Internet of Things everything interconnected

    CERN Document Server

    Mastorakis, George; Mavromoustakis, Constandinos; Pallis, Evangelos

    2017-01-01

    The major subjects of the book cover modeling, analysis and efficient management of information in Internet of Everything (IoE) applications and architectures. As the first book of its kind, it addresses the major new technological developments in the field and will reflect current research trends, as well as industry needs. It comprises of a good balance between theoretical and practical issues, covering case studies, experience and evaluation reports and best practices in utilizing IoE applications. It also provides technical/scientific information about various aspects of IoE technologies, ranging from basic concepts to research grade material, including future directions.

  17. Threat modeling and circumvention of Internet censorship

    OpenAIRE

    Fifield, David

    2017-01-01

    Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities—such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations.My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model ...

  18. Markkinointisuunnitelma - Internet startup

    OpenAIRE

    Koivu, Sami; Kantonen, Erno

    2011-01-01

    Tämän toiminnallisen opinnäytetyön aiheena oli luoda markkinointisuunnitelma kehitteillä olevalle Internet-palvelulle, joka on digitaalisesti toimiva yhteisöllinen musiikkipalvelu. Palvelun mahdolliset liiketoimintamahdollisuudet perustuvat lähes täysin suureen käyttäjämäärään. Siksi työn tarkoituksena oli selvittää, miten palvelulle saavutetaan mahdollisimman paljon käyttäjiä, ja miten nämä käyttäjät aktivoidaan tuottamaan lisäarvoa palvelulle. Työn lopullisena tavoitteena oli markkinointisu...

  19. Towards a quantum internet

    Science.gov (United States)

    Dür, Wolfgang; Lamprecht, Raphael; Heusler, Stefan

    2017-07-01

    A long-range quantum communication network is among the most promising applications of emerging quantum technologies. We discuss the potential of such a quantum internet for the secure transmission of classical and quantum information, as well as theoretical and experimental approaches and recent advances to realize them. We illustrate the involved concepts such as error correction, teleportation or quantum repeaters and consider an approach to this topic based on catchy visualizations as a context-based, modern treatment of quantum theory at high school.

  20. Internet congestion control

    CERN Document Server

    Varma, Subir

    2015-01-01

    Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of applic

  1. The Internet Pollution

    Institute of Scientific and Technical Information of China (English)

    唐宁宁

    2005-01-01

    Life today has brought new problems. As we know, there are fourterrible pollutions in the world: water pollution, noise pollution, air pol-lution and rubbish pollution. Water pollution kills our fish and pollutesour drinking water. Noise pollution makes us talk louder and become angry more easily. Air pollution makes us hold our breath longer and be badto all living things in the world. Rubbish pollution often makes our livingenvironment much dirtier. But I think that the Internet pollution is anothernew pollution in the world.

  2. Internet conferences in glycobiology.

    Science.gov (United States)

    Hardy, B J; Doughty, S W; Parretti, M F; Tennison, J; Wilson, I

    1997-09-01

    In this article we describe recent activities in the use of electronic conferencing in glycobiology focusing on our experiences with the organization and development of the Second Electronic Glycoscience Conference (EGC-2), which was held on the Internet and World Wide Web in September 1996. EGC-2 involved the presentation and discussion of scientific research results in a virtual conferencing environment which incorporated virtual replicas of many activities usually observed at a physical conference in addition to features unique to the electronic medium. Highlights of the scientific program and technical developments in the design and use of these facilities are briefly described. EGC-3 will be held in October 1997.

  3. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  4. Campaigning on the Internet: 2008 Presidential General Election Candidate Webpage

    OpenAIRE

    William L. Benoit; Mark Glant; Leslie Rill

    2016-01-01

    The Internet is becoming an increasingly important component of political campaigns. This study employed content analysis to apply Functional Theory and Issue Ownership Theory to Obama’s and McCain’s presidential candidate webpages in the 2008 campaign. Acclaims (92%) were more common than attacks (98%); defenses did not occur in this sample. Policy (82%) was addressed more than character (18%). When discussing policy, these candidates addressed future plans most frequently, followed by gener...

  5. The Blackwell Handbook of Internet Studies

    DEFF Research Database (Denmark)

    The Handbook of Internet Studies brings together scholars from a variety of fields to explore the profound shift that has occurred in how we communicate and experience our world as we have moved from the industrial era into the age of digital media. Original essays address issues within topics...

  6. Consumer Cost Differences for Traditional and Internet Markets.

    Science.gov (United States)

    Shaw, Michael J.; Strader, Troy J.

    1999-01-01

    Addresses research issues related to the economics of electronic, Internet-based markets. Discusses consumer cost-based differences for traditional and electronic markets; revenue implications for sellers and transaction intermediaries; and results of an empirical, survey-based study of an electronic market in the sports trading-card industry.…

  7. Finding and Analyzing Evil Cities on the Internet

    NARCIS (Netherlands)

    van Polen, Matthijs G.T.; Moreira Moura, Giovane; Pras, Aiko; Chrisment, Isabelle; Couch, Alva; Badonnel, Rémi; Waldburger, Martin

    2011-01-01

    IP Geolocation is used to determine the geographical location of Internet users based on their IP addresses. When it comes to security, most of the traditional geolocation analysis is performed at country level. Since countries usually have many cities/towns of different sizes, it is expected that

  8. Consumer groups call for ban on internet pharmacies.

    Science.gov (United States)

    Garmaise, David

    2004-08-01

    A number of consumer groups have called on the Canadian government to ban internet pharmacies, claiming that the industry is putting the health of Canadians at risk. The groups say that the impact will escalate if the problem is not addressed.

  9. Security Techniques for Sensor Systems and the Internet of Things

    Science.gov (United States)

    Midi, Daniele

    2016-01-01

    Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We…

  10. Film Scenes in Interdisciplinary Education: Teaching the Internet of Things

    Science.gov (United States)

    Hwang, Young-mee; Kim, Kwang-sun; Im, Tami

    2017-01-01

    The Internet of Things (IoT) is gaining importance in education owing to its rapid development. This study addresses the importance of interdisciplinary education between technology and the humanities. The use of films as a teaching resource is suitable for interdisciplinary education because films represent creative forecasts and predictions on…

  11. PENGGUNAAN TEKNOLOGI INTERNET DALAM BISNIS

    OpenAIRE

    Oviliani Yuliana

    2000-01-01

    The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of in...

  12. Penggunaan Teknologi Internet Dalam Bisnis

    OpenAIRE

    Yuliana, Oviliani

    2000-01-01

    The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of in...

  13. Reports on internet traffic statistics

    OpenAIRE

    Hoogesteger, Martijn; de Oliveira Schmidt, R.; Sperotto, Anna; Pras, Aiko

    2013-01-01

    Internet traffic statistics can provide valuable information to network analysts and researchers about the way nowadays networks are used. In the past, such information was provided by Internet2 in a public website called Internet2 NetFlow: Weekly Reports. The website reported traffic statistics from the Abilene network on a weekly basis. At that time, the network connected 230 research institutes with a 10Gb/s link. Although these reports were limited to the behavior of the Albeline's users,...

  14. Internet technologies and information services

    CERN Document Server

    Miller, Joseph

    2014-01-01

    Internet Technologies and Information Services: Second Edition is a vital asset to students preparing for careers in library and information science and provides expanded coverage to important new developments while still covering Internet foundations. In addition to networking, the Internet, HTML, web design, web programming, XML, and web searching, this new edition covers additional topics such as cloud computing, content management systems, eBook technologies, mobile technologies and applications, relational database management systems (RDMS), open source software, and virtual priva

  15. Internet ware cloud computing :Challenges

    OpenAIRE

    Qamar, S; Lal, Niranjan; Singh, Mrityunjay

    2010-01-01

    After decades of engineering development and infrastructural investment, Internet connections have become commodity product in many countries, and Internet scale “cloud computing” has started to compete with traditional software business through its technological advantages and economy of scale. Cloud computing is a promising enabling technology of Internet ware Cloud Computing is termed as the next big thing in the modern corporate world. Apart from the present day software and technologies,...

  16. Young children as Internet users

    OpenAIRE

    Daramola, O. (Oladipo)

    2015-01-01

    Abstract In the current available research concerning the real usage of the internet among the young children, most researchers particularly emphases on the risk and opportunities regarding the active use of the internet. Limited experimental research emphases on the role-based and impact of the parent guidelines in the context. In the current studies, internet parenting methods are well-defined and operationalized to study...

  17. Security in Internet of Things

    DEFF Research Database (Denmark)

    Kidmose, Egon; Pedersen, Jens Myrup

    2017-01-01

    2016 was a year when the discussions about Internet of Things and security gained significant grounds. Not only was it yet another year where the challenges of cybercrime became visible to the general public, maybe the presumable Russian hacking of Hillary Clinton's emails as the most prominent...... example, but at the end of the year the Mirai Botnet used Internet of Things devices to perform successful attacks on several Internet infrastructure points....

  18. Internet advertising effectiveness measurement model

    OpenAIRE

    Marcinkevičiūtė, Milda

    2007-01-01

    The research object of the master thesis is internet advertising effectiveness measurement. The goal of the work is after making theoretical studies of internet advertising effectiveness measurement (theoretical articles, practical researches and cetera), formulate the conceptual IAEM model and examine it empirically. The main tasks of the work are: to analyze internet advertising, it’s features, purposes, spread formats, functions, advantages and disadvantages; present the effectiveness of i...

  19. Untangling the Relationship between Internet Anxiety and Internet Identification in Students: The Role of Internet Self-Efficacy

    Science.gov (United States)

    Hsiao, Bo; Zhu, Yu-Qian; Chen, Li-Yueh

    2017-01-01

    Introduction: Previous research has identified Internet anxiety and Internet identification as two important factors that predict usage and experience on the Internet. However, little is known about the relationship between them. This research aimed to untangle the relationship between Internet anxiety and Internet identification, and to…

  20. Reclaiming unused IPv4 addresses

    CERN Multimedia

    IT Department

    2016-01-01

    As many people might know, the number of IPv4 addresses is limited and almost all have been allocated (see here and here for more information).   Although CERN has been allocated some 340,000 addresses, the way these are allocated across the site is not as efficient as we would like. As we face an increasing demand for IPv4 addresses with the growth in virtual machines, the IT Department’s Communication Systems Group will be reorganising address allocation during 2016 to make more efficient use of the IPv4 address ranges that have been allocated to CERN. We aim, wherever possible, to avoid giving out fixed IP addresses, and have all devices connected to the campus network obtain an address dynamically each time they connect. As a first stage, starting in February, IP addresses that have not been used for more than 9 months will be reclaimed. No information about the devices concerned will be deleted from LANDB, but a new IP address will have to be requested if they are ever reconnected to t...

  1. Port virtual addressing for PC

    International Nuclear Information System (INIS)

    Bolanos, L.; Arista, E.; Osorio Deliz, J.F.

    1997-01-01

    Instruments for nuclear signal measurements based on add-on card for a personal computer (PC) are designed often. Then one faces the problem of the addressing of data input/output devices which show an integration level or intelligence that makes the use of several port address indispensable, and these are limited in the PC. The virtual addressing offers the advantage of the occupation of few addresses to accede to many of these devices. The principles of this technique and the appliances of a solution in radiometric in a radiometric card based on programmed logic are discussed in this paper

  2. Supply, Demand, and the Internet--Economic Lessons for Microeconomic Principles Courses.

    Science.gov (United States)

    Englander, Fred; Moy, Ronald L.

    2003-01-01

    Addresses issues related to the ways in which the Internet is affecting supply and demand, competition, property rights, information costs, and economies of scale. Suggests ways to incorporate these topics into the study of microeconomics. (Contains 19 references.) (SK)

  3. Towards an internet of things tangible program environment supported by indigenous African artefacts

    CSIR Research Space (South Africa)

    Smith, Andrew C

    2016-11-01

    Full Text Available According to its advocates, the Internet of Things holds great promise. Great strides have been made to address its security and standardise communication protocols for data exchange in this potentially unlimited network of connected things. However...

  4. Towards the internet of services

    CERN Document Server

    Wahlster, Wolfgang; Wess, Stefan; Friedrich, Hermann; Widenka, Thomas

    2014-01-01

    The Internet of Services and the Internet of Things are major building blocks of the Future Internet. The digital enterprise of the future is based not only on mobile, social, and cloud technologies, but also on se­mantic technologies and the future Internet of Everything. Semantic technologies now enable mass cus­tomization for the delivery of goods and services that meet individual customer needs and tastes with near mass production efficiency and reliability. This is creating a competitive advantage in the industrial econ­omy, the service economy, and the emerging data economy, leading to

  5. Internet Civil Defense: Feasibility Study

    National Research Council Canada - National Science Library

    LaPorte, Ron

    2002-01-01

    ... (and ultimately, international) system of information sharing, education and analysis via the Internet to connect the general public, community networked cells, emergency responders, local and national investigative authorities...

  6. Library resources on the Internet

    Science.gov (United States)

    Buchanan, Nancy L.

    1995-07-01

    Library resources are prevalent on the Internet. Library catalogs, electronic books, electronic periodicals, periodical indexes, reference sources, and U.S. Government documents are available by telnet, Gopher, World Wide Web, and FTP. Comparatively few copyrighted library resources are available freely on the Internet. Internet implementations of library resources can add useful features, such as full-text searching. There are discussion lists, Gophers, and World Wide Web pages to help users keep up with new resources and changes to existing ones. The future will bring more library resources, more types of library resources, and more integrated implementations of such resources to the Internet.

  7. Ethical Design in the Internet of Things.

    Science.gov (United States)

    Baldini, Gianmarco; Botterman, Maarten; Neisse, Ricardo; Tallacchini, Mariachiara

    2018-06-01

    Even though public awareness about privacy risks in the Internet is increasing, in the evolution of the Internet to the Internet of Things (IoT) these risks are likely to become more relevant due to the large amount of data collected and processed by the "Things". The business drivers for exploring ways to monetize such data are one of the challenges identified in this paper for the protection of Privacy in the IoT. Beyond the protection of privacy, this paper highlights the need for new approaches, which grant a more active role to the users of the IoT and which address other potential issues such as the Digital Divide or safety risks. A key facet in ethical design is the transparency of the technology and services in how that technology handles data, as well as providing choice for the user. This paper presents a new approach for users' interaction with the IoT, which is based on the concept of Ethical Design implemented through a policy-based framework. In the proposed framework, users are provided with wider controls over personal data or the IoT services by selecting specific sets of policies, which can be tailored according to users' capabilities and to the contexts where they operate. The potential deployment of the framework in a typical IoT context is described with the identification of the main stakeholders and the processes that should be put in place.

  8. RPL LOAD BALANCING IN INTERNET OF THINGS

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Parsaei

    2017-12-01

    Full Text Available ABSTRACT:  The wide address space provided by Internet Protocol version 6 (IPv6 lets any thing to be identified uniquely. consistency of the modified version of IPv6 protocol stack with smart objects, facilitated the Internet interconnection of the networks of smart objects and introduced Internet of things. A smart object is a small micro-electronic device that consists of a communication device, a small microprocessor and a sensor or an actuator. A network made of such devices is called low-power and lossy network. RPL routing protocol that is consistent to IPv6, is designed to be used in these kinds of networks. Load balancing is not considered in the RPL design process. Whenever RPL is used in large scale low-power and lossy networks some nodes will suffer from congestion and this problem severely degrades network performance. In this paper, we consider solutions provided to tackle RPL load balancing problems. Load balancing algorithms and protoclos are evaluated through simulation. We evaluate IETF RPL implementation and LB-RPL method with Contiki OS Java (COOJA simulator. They are assessed comprehensively through metrics such as Packet delivery Ratio, Average End to End delay, and Gateway Throughput. LB-RPL improves RPL in terms of Packet delivery Ratio and throughput but increases Average End to End delay. Simulations results show that RPL load balancing needs extensive works to be performed yet.

  9. EDITORIAL: The Internet and physics

    Science.gov (United States)

    Burton, Paul

    1998-05-01

    Feature Issue Editor The World Wide Web has been described as a `distributed heterogeneous collaborative multimedia information system'. It began as a networked information project at CERN, where Tim Berners-Lee, now Director of the World Wide Web Consortium [W3C], developed a vision of the project. The Web has a body of software and a set of protocols and conventions. Through the use of hypertext and multimedia techniques, the Web is easy for anyone to roam, browse and contribute to. It was developed by physicists at CERN to fulfil a communication need, and is one of the fastest growing resources worldwide. The number of available sites increases hourly, the ability to find information becomes easier, and contacting anyone with an e-mail address is as easy as picking up the telephone and talking to them. A pupil researching a project on say `alternative energy' simply launches a web browser with the relevant search criteria. Some 13 500 references later they cut and paste sections together and, hey presto, they have their article. The teacher, on the other hand, has to discern what input to this work the pupil has made! What credit should be given for such an attempt? I believe we are going to have to teach how to value a site, by comparing it with other similar sites and exercising some judgement on what we find. Using a search with `physics' as my only keyword found more than 3.5 million references! Clearly the researcher has to become discerning, being judge and jury as it were. Will the Internet catch on? I fear so, is the simple answer. However, I am concerned that with so much information available the ability to discern quality sites from inferior ones and fact from fiction will become a major issue for educationalists. Pupils are going to have to be taught how to assess a site, how to judge its validity and learn to give correct references in their reports. Because Internet sites are ephemeral, a reference given today may not be active next week. Indeed

  10. Treatment Considerations in Internet and Video Game Addiction: A Qualitative Discussion.

    Science.gov (United States)

    Greenfield, David N

    2018-04-01

    Internet and video game addiction has been a steadily developing consequence of modern living. Behavioral and process addictions and particularly Internet and video game addiction require specialized treatment protocols and techniques. Recent advances in addiction medicine have improved our understanding of the neurobiology of substance and behavioral addictions. Novel research has expanded the ways we understand and apply well-established addiction treatments as well as newer therapies specific to Internet and video game addiction. This article reviews the etiology, psychology, and neurobiology of Internet and video game addiction and presents treatment strategies and protocols for addressing this growing problem. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Internet Uses and Gratifications: Understanding Motivations for Using the Internet.

    Science.gov (United States)

    Ko, Hanjun

    In this study, the uses and gratifications theory was applied to investigate the Internet users' motivations and their relationship with attitudes toward the Internet as well as types of Web site visited by users. Subjects were 185 college students who completed a self-report questionnaire. Four motivations and five types of Web sites were…

  12. Gender differences in Internet identification and Internet anxiety ...

    African Journals Online (AJOL)

    This exploratory study investigated gender differences in Internet identification and Internet anxiety. A sample of 231 students (138 females and 93 males) from four different schools participated in the study. A structured interview schedule was used to collect data. Factor analysis was carried out to test for construct validity.

  13. INTERNET5: Shaping an Internet for women's empowerment | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-12-08

    Dec 8, 2017 ... Poor women, girls, and other marginalized communities in the developing ... INTERNET5 — an Internet that helps achieve SDG 5 on gender equality — aims to support ... To ensure that the benefits of broadband are more evenly ... The project seeks to provide an effective and low-cost educational model ...

  14. Older Adolescent's Perceptions of Personal Internet Use

    Science.gov (United States)

    Koff, Rosalind N.; Moreno, Megan A.

    2013-01-01

    Internet use is widespread among the older adolescent population. Given the pervasiveness and frequency of internet use, concerns have been raised regarding the impact of excess internet use on adolescent health. In order to understand the impact of internet use on health, we must have accurate and reliable measures of internet use. This study…

  15. Current evaluation of the information about Radiological Protection in Internet

    International Nuclear Information System (INIS)

    Ruiz-Cruces, R.; Marco, M.; Villanueva, I.

    2003-01-01

    To analyze the current situation about the pedagogic information on radiological protection training which could be found in Internet. More than 756 web-pages have been visited in Internet about Radiological Protection in the nuclear and medical fields, providing information mainly focusing on information to the members of the public. In this search were used internet Searching Appliance (as Copernicus, Google and Scirus), using key words related with this subject (as Radiological Protection and Health Safety), getting the internet address of organizations, societies and investigation groups. Only a low percentage (less than 5 per cent) of these addresses content information on Radiological Protection for the members of the public, including information about the regulator Organizations, and which are the objectives for protection of the members of the public against ionization radiation (from the point of view of the use of the ionization radiation in the medical and nuclear field). This work attempts to propose the use of internet as a tool for informing the members of the public in matter of radiological protection, as first link in the chain of the training and education. (Author)

  16. On Internet Symmetry and its Impact on Society

    Science.gov (United States)

    Wolff, S. S.

    2014-12-01

    The end-to-end principle, enunciated by Clark and Saltzer in 1981 enabled an Internet implementation in which there was a symmetry among the network nodes in the sense that no node was architecturally distinguished. Each interface to the network had a unique and accessible address and could communicate on equal terms with any other interface or collection of interfaces. In this egalitarian implementation there was in consequence no architectural distinction between providers and consumers of content - any network node could play either role. As the Internet spread to university campuses, incoming students found 10 megabit Ethernet in the dorm - while their parents at home were still stuck with 56 kilobit dialup. In the two decades bisected by the millenium, this combination of speed and symmetry on campus and beyond led to a panoply of transformational Internet applications such as Internet video conferencing and billion dollar industries like Google, Yahoo!, and Facebook. This talk places early Internet history in a social context, elaborates on the social and economic outcomes, defines"middlebox friction", discusses its erosive consequences, and suggests a solution to restore symmetry to the Internet-at-large.

  17. The Internet and Increased Citizen Participation in Government

    Directory of Open Access Journals (Sweden)

    Michael E. Milakovich

    2010-04-01

    Full Text Available What roles do communication systems, information technologies and the internet play in fostering citizen participation and influencing the electoral and administrative decisions of government? The internet is simultaneously a world-wide broadcasting network, a mechanism for information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic boundaries or time zones. This article describes the origins of participatory democracy, discusses how modern concepts of democracy link to citizen participation, and describes the ways that newly-created spaces on the internet referred to as “polispheres” are being used by political activists and candidates to facilitate wider collaboration and citizen participation. The following questions are addressed: What role does the internet play in fostering and aiding citizen participation in government? Does increased involvement lead to greater trust and confidence in government? What role did the internet play in apparently reversing downward trends in citizen apathy and drawing 8 million new voters to the United States 2008 presidential election? The article suggests that information technology facilitates broader citizen participation and identifies the challenges facing governments in adopting internet-based ICT strategies.

  18. Should Internet Researchers Use Ill-Gotten Information?

    Science.gov (United States)

    Douglas, David M

    2017-06-26

    This paper describes how the ethical problems raised by scientific data obtained through harmful and immoral conduct (which, following Stan Godlovitch, is called ill-gotten information) may also emerge in cases where data is collected from the Internet. It describes the major arguments for and against using ill-gotten information in research, and shows how they may be applied to research that either collects information about the Internet itself or which uses data from questionable or unknown sources on the Internet. Three examples (the Internet Census 2012, the PharmaLeaks study, and research into keylogger dropzones) demonstrate how researchers address the ethical issues raised by the sources of data that they use and how the existing arguments concerning the use of ill-gotten information apply to Internet research. The problems faced by researchers who collect or use data from the Internet are shown to be the same problems faced by researchers in other fields who may obtain or use ill-gotten information.

  19. Health issues in adolescents' Internet use - benefits and risks.

    Science.gov (United States)

    Hardoff, D

    2013-09-01

    The Internet has turned during the past decade into a major information resource in various domains of life and a communication venue among adolescents who seek health information via the net. The increasing availability of computers in homes, as well as wireless Internet access, means that adolescents today can go online anywhere, at any time. The media are not the leading cause of any major health problem, but they do contribute significantly to a variety of adolescent health problems, including aggressive behavior, sexual activity, drug use, obesity, sleep disorders, eating disorders, depression, suicide and self harm. This paper focuses on 3 major health issues in adolescents' Internet use: Body image and eating behaviors; sexuality and reproductive health behaviors; and self harm and suicidal behavior. This paper also demonstrates Internet venues where reliable health information is provided to young people by health professionals. Health professionals need to recognize the hazards of adolescents Internet use, and to address potential Internet abuse when encountering adolescents in clinical settings.

  20. Extensive Internet Involvement—Addiction or Emerging Lifestyle?

    Directory of Open Access Journals (Sweden)

    Karin Helmersson Bergmark

    2011-12-01

    Full Text Available In the discussions for the future DSM-5, the Substance-Related Disorders Work Group has been addressing “addiction-like” behavioral disorders such as “Internet addiction” to possibly be considered as potential additions for the diagnostic system. Most research aiming to specify and define the concept of Internet addiction (or: Excessive/Compulsive/Problematic Internet Use—PIU, takes its point of departure in conventional terminology for addiction, based in established DSM indicators. Still, it is obvious that the divide between characteristics of addiction and dimensions of new lifestyles built on technological progress is problematic and far from unambiguous. Some of these research areas are developing from the neurobiological doctrine of addiction as not being tied to specific substances. The concept of “behavioral addictions”, based on biological mechanisms such as the reward systems of the brain, has been launched. The problems connected to this development are in this study discussed and reflected with data from a Swedish survey on Internet use (n = 1,147. Most Swedes (85% do use the Internet to some degree. The prevalence of excessive use parallels other similar countries. Respondents in our study spend (mean value 9.8 hours per week online at home, only 5 percent spend more than 30 hours per week. There are both positive and negative social effects at hand. Many respondents have more social contacts due to the use of Internet, but there is a decline in face-to-face contacts. About 40% of the respondents indicate some experience of at least one problem related to Internet use, but only 1.8% marked the presence of all problems addressed. Most significant predictors for problem indicators, except for age, relate to “time” and time consuming activities such as gaming, other activities online or computer skills.

  1. Extensive Internet Involvement—Addiction or Emerging Lifestyle?

    Science.gov (United States)

    Bergmark, Karin Helmersson; Bergmark, Anders; Findahl, Olle

    2011-01-01

    In the discussions for the future DSM-5, the Substance-Related Disorders Work Group has been addressing “addiction-like” behavioral disorders such as “Internet addiction” to possibly be considered as potential additions for the diagnostic system. Most research aiming to specify and define the concept of Internet addiction (or: Excessive/Compulsive/Problematic Internet Use—PIU), takes its point of departure in conventional terminology for addiction, based in established DSM indicators. Still, it is obvious that the divide between characteristics of addiction and dimensions of new lifestyles built on technological progress is problematic and far from unambiguous. Some of these research areas are developing from the neurobiological doctrine of addiction as not being tied to specific substances. The concept of “behavioral addictions”, based on biological mechanisms such as the reward systems of the brain, has been launched. The problems connected to this development are in this study discussed and reflected with data from a Swedish survey on Internet use (n = 1,147). Most Swedes (85%) do use the Internet to some degree. The prevalence of excessive use parallels other similar countries. Respondents in our study spend (mean value) 9.8 hours per week online at home, only 5 percent spend more than 30 hours per week. There are both positive and negative social effects at hand. Many respondents have more social contacts due to the use of Internet, but there is a decline in face-to-face contacts. About 40% of the respondents indicate some experience of at least one problem related to Internet use, but only 1.8% marked the presence of all problems addressed. Most significant predictors for problem indicators, except for age, relate to “time” and time consuming activities such as gaming, other activities online or computer skills. PMID:22408585

  2. Extensive internet involvement--addiction or emerging lifestyle?

    Science.gov (United States)

    Bergmark, Karin Helmersson; Bergmark, Anders; Findahl, Olle

    2011-12-01

    In the discussions for the future DSM-5, the Substance-Related Disorders Work Group has been addressing "addiction-like" behavioral disorders such as "Internet addiction" to possibly be considered as potential additions for the diagnostic system. Most research aiming to specify and define the concept of Internet addiction (or: Excessive/Compulsive/Problematic Internet Use--PIU), takes its point of departure in conventional terminology for addiction, based in established DSM indicators. Still, it is obvious that the divide between characteristics of addiction and dimensions of new lifestyles built on technological progress is problematic and far from unambiguous. Some of these research areas are developing from the neurobiological doctrine of addiction as not being tied to specific substances. The concept of "behavioral addictions", based on biological mechanisms such as the reward systems of the brain, has been launched. The problems connected to this development are in this study discussed and reflected with data from a Swedish survey on Internet use (n = 1,147). Most Swedes (85%) do use the Internet to some degree. The prevalence of excessive use parallels other similar countries. Respondents in our study spend (mean value) 9.8 hours per week online at home, only 5 percent spend more than 30 hours per week. There are both positive and negative social effects at hand. Many respondents have more social contacts due to the use of Internet, but there is a decline in face-to-face contacts. About 40% of the respondents indicate some experience of at least one problem related to Internet use, but only 1.8% marked the presence of all problems addressed. Most significant predictors for problem indicators, except for age, relate to "time" and time consuming activities such as gaming, other activities online or computer skills.

  3. Does the Internet Reduce Corruption?

    DEFF Research Database (Denmark)

    Andersen, Thomas Barnebeck; Bentzen, Jeanet Sinding; Dalgaard, Carl-Johan Lars

    2011-01-01

    of Internet diffusion. A natural phenomenon causing power disruptions is lightning activity, which makes lightning a viable instrument for Internet diffusion. Using ground-based lightning detection censors as well as global satellite data, we construct lightning density data for the contiguous U.S. states...

  4. Rocket Science for the Internet

    Science.gov (United States)

    2000-01-01

    Rainfinity, a company resulting from the commercialization of Reliable Array of Independent Nodes (RAIN), produces the product, Rainwall. Rainwall runs a cluster of computer workstations, creating a distributed Internet gateway. When Rainwall detects a failure in software or hardware, traffic is shifted to a healthy gateway without interruptions to Internet service. It more evenly distributes workload across servers, providing less down time.

  5. Internet Governance and National Security

    Science.gov (United States)

    2012-01-01

    by the International Orga­ nization of Standards for the Open Systems Interconnection ( OSI ) model as the basis of Internet networking. A brief...or “ride on top” of the Internet. A corporate LAN , such as “.company–name” for internal company use, is an example of the first. When a group wishes

  6. The Internet of Hackable Things

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Giaretta, Alberto; Mazzara, Manuel

    2017-01-01

    The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order...

  7. Russian Initiatives in Internet Governance

    Directory of Open Access Journals (Sweden)

    Sergey Sergeevich Shirin

    2014-01-01

    Full Text Available The article is devoted to the research of Russian initiatives concerning its participation in international system of Internet governance. In the research, conceptual and theoretic basis for participation of state governments in Internet governance is given, academic discourse of this issue is assessed, the review of main Russian initiatives made from 2005 (since the second stage of the World Summit on Information Society till the present day is carried out. The conclusion is made that the most successful Internet governance initiative of Russia is the implementation of cyrillic top level domains. Much less successful are Russian attempts to reconstruct existing organizational structure of Internet governance. Russian policy is assessed as a policy of preferring loud statements and PR rather than real influence on development of Internet technologies. Russia consideres Internet as political resource and tries to increase its influence on decision making process on a political, not operational level of Internet governance. The author states that federal government of the United States of America has fully lost the control on the domain name systems. These functions are going to be given to the private sector, while ICANN, which was established according to the Memorandum of Understanding/Joint Project Agreement with U.S. Department of Commerce, is becoming a truly independent international organization. Considering this, the author comes to the conclusion that political transformations for the sake of Russia are already made. He also forecast that next initiatives of Russia will be directed to the segmentation of the Internet.

  8. Internet Research: Implications for The Future of Health Care

    Science.gov (United States)

    Shortliffe, Ted

    1999-01-01

    The phenomenal growth in Internet usage, largely due to the success of the World Wide Web, has stressed the international networking infrastructure in ways that were never contemplated when the early ARPAnet emerged from research laboratories in the 1970s. Some of the challenges are logistical and legal, and have to do with management of domain names, intellectual-property agreements, and international business activities. Others are technical, resulting both because we are envisioning applications that the current Internet cannot support, and because the existing infrastructure cannot scale to a world in which a huge portion of the world's population is online and individual homes and businesses may have IP addresses for tens of electronic devices, such as appliances, heating systems, or security alarms. In this presentation, I will discuss some of the US research and testbed activities that are currently underway in an effort to respond to the technical challenges. These include the Internet-2 testbed created by a consortium of academic institutions, and the federal government's Next Generation Internet research initiative. I will explain the difference between these two programs and identify some of the technical requirements other than a simple increase in bandwidth that have been identified for the evolving Internet. This will lead to a discussion of the limitations of the current Internet that have constrained its use in health care and that accordingly help to define the networking research agenda that is of greatest importance to the biomedical community. Policy and regulatory issues that arise because of health care's use of the Internet will also be discussed, as will those technical requirements that may be unique to biomedical applications. One goal of the discussion will be to motivate an international discussion of the ways in which the medical informatics community should be engaged in both basic and applied research in the area of networking and the

  9. Internet and Cross Media Productions

    DEFF Research Database (Denmark)

    Petersen, Anja Bechmann

    2006-01-01

    , the Internet continues to play a minor role when compared to older media. The content of the cross media concepts and organizations' history are crucial elements in deciding the priority and use of platforms. Methodologically, the article approaches cross media and the roles of the Internet on a micro......Convergence is one of the hot topics in Internet studies. Recently, however, media organizations have turned their focus to cross media communication. Media organizations are interested in optimizing communication across platforms such as TV, radio, websites, mobile telephones and newspapers....... The aim of this article is to examine the roles of the Internet when emphasis is put on cross media rather than convergence. This article proposes not one unidirectional convergent tendency but manifold roles of the Internet in cross media communication. Inside the media organizations, however...

  10. 76 FR 60754 - Preserving the Open Internet

    Science.gov (United States)

    2011-09-30

    ...-201] Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION: Final rule..., 2011, a document establishing rules to preserve the open Internet. Inadvertently the wrong paragraph... alleging violations of the open Internet rules. Federal Communications Commission. Matt Warner, Attorney...

  11. Internet marketing 101.

    Science.gov (United States)

    Miller, Ryan J

    2010-11-01

    In an era when social media sites like YouTube, Facebook, and Twitter dominate the popular press, many surgeons overlook the foundational tactics and strategies necessary for long-term practice development and lead generation on the Internet. This article analyzes common errors made by surgeons during the development and implementation of Web site projects, focusing on the areas of strategy development; domain name identification; site plan creation; design considerations; content development; vendor selection; and launch, promotion, and staff training. The article emphasizes that, because the Web site remains the foundation of a surgeon's branding message, minimizing errors during development and construction is critical, particularly in highly competitive or saturated markets, for today's facial plastic surgery practice. Copyright © 2010 Elsevier Inc. All rights reserved.

  12. DFX via the Internet

    Science.gov (United States)

    Wagner, Rick; Castanotto, Giuseppe; Goldberg, Kenneth A.

    1995-11-01

    The Internet offers tremendous potential for rapid development of mechanical products to meet global competition. In the past several years, a number of geometric algorithms have been developed to evaluate manufacturing properties such as feedability, fixturability, assemblability, etc. This class of algorithms is sometimes termed `DFX: Design for X'. One problem is that most of these algorithms are tailored to a particular CAD system and format and so have not been widely tested by industry. the World Wide Web may offer a solution: its simple interface language may become a de facto standard for the exchange of geometric data. In this preliminary paper we describe one model for remote analysis of CAD models that we believe holds promise for use in industry (e.g. during the design cycle) and in research (e.g. to encourage verification of results).

  13. A cultura da internet

    OpenAIRE

    Cádima, Francisco Rui

    2017-01-01

    O novo ambiente digital é cada vez mais perturbante na sua dimensão ‘visível’ e está, em boa parte, incontrolável nessa área ainda algo desconhecida da Internet negra, conhecida por deep web ou dark net, convoca-nos para uma reflexão profunda de largo espectro, que não se pode vincular apenas às questões de mercado, tecnológicas e de redes, mas que nos vem alertar sobretudo para a ordem do político e da cidadania, do ‘desconhecido’ e do conhecimento e, enfim, do acesso à rede, quer no que is...

  14. Transparency through the Internet

    Energy Technology Data Exchange (ETDEWEB)

    Haginoya, Tohru [Inst. of Nuclear Materials Management, Japan Chapter, Tokyo (Japan)

    1998-07-01

    Many countries, especially developed countries have their 'Home Pages' and disclose their activities openly including nuclear activities. These information give, to some extent, the transparency of countries. The annual report of the IAEA can be found in its home page, reports describe its safeguards activities including facilities under its safeguards together with the status of 'subsidiary arrangements'. The Atomic Energy White Papers of the STA home pages show its nuclear activities and nuclear material. Details of safeguards related information are obtained by analyzing these home pages and find some information inconsistent each other. In connection with Strengthened Safeguards system' , non-nuclear items such as zirconium, heavy water or their manufacturing organizations which are subject to the safeguards system would be retrieved by using 'search engines' through the internet. (author)

  15. Transparency through the Internet

    International Nuclear Information System (INIS)

    Haginoya, Tohru

    1998-01-01

    Many countries, especially developed countries have their 'Home Pages' and disclose their activities openly including nuclear activities. These information give, to some extent, the transparency of countries. The annual report of the IAEA can be found in its home page, reports describe its safeguards activities including facilities under its safeguards together with the status of 'subsidiary arrangements'. The Atomic Energy White Papers of the STA home pages show its nuclear activities and nuclear material. Details of safeguards related information are obtained by analyzing these home pages and find some information inconsistent each other. In connection with Strengthened Safeguards system' , non-nuclear items such as zirconium, heavy water or their manufacturing organizations which are subject to the safeguards system would be retrieved by using 'search engines' through the internet. (author)

  16. Internet's impact on publishing

    Science.gov (United States)

    Beretta, Giordano B.

    1997-04-01

    In 1990, the first monochrome print-on-demand (POD) systems wee successfully brought to market. Subsequent color versions have been less successful, in my view mostly because they require a different workflow than traditional systems and the highly skilled specialists have not been trained. This hypothesis is based on the observation that direct-to-plate systems for short run printing, which do not require a new workflow, are quite successful in the market place. The internet and the World Wide Web are the enabling technologies that are fostering a new print model that is very likely to replace color POD before the latter can establish itself. In this model the consumers locate the material they desire from a contents provider, pay through a digital cash clearinghouse, and print the material at their own cost on their local printer. All the basic technologies for this model are in place; the main challenge is to make the workflow sufficiently robust for individual use.

  17. Radikalisme di Internet

    Directory of Open Access Journals (Sweden)

    Imam Fauzi Ghifari

    2017-10-01

    Full Text Available This article  to discuss the radical groups that exploit it through social media,  this matter take a very large role in providing information to the public,  especially young people will be radical ideology.  Given the fact that the recruitment of youth into radical organizations mostly done by using the internet.   Social media plays an important role in providing information to the public on the issues so that the public terpropaganda radicalism towards radical issues in spread through the media.  This fact is evidenced by a number of terrorist groups that use social media to media propaganda and build a special site as a medium to coordinate all activities related to the execution of terrorist acts.

  18. Internet security technologies

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  19. Internet Freedom in Asia: Case of Internet Censorship in China

    Directory of Open Access Journals (Sweden)

    ZAINUDDIN MUDA Z. MONGGILO

    2016-02-01

    Full Text Available Internet can develop the communication and information freedom on society but unfortunately in some nations, especially in Asia, it cannot be fully accessed because of government censorship. This report explains the relationship between the practice of Internet censorship imposed by the Chinese government and the freedom of its citizens (in the internet surfing experience as the realization of human rights in the freedom of expression and opinion (seek, receive-use, and communicate information which is traced through the relevant literature study. China is a unique case since the internet censorship regulation contributes to its status as the country with the least internet freedom yet at the same time it is credited as having the most internet users globally. In addition, China known as the communist country that began opening up to globalization and information of technology, but the government’s control over it is still so tight and binding, not only in the press, or the traditional media, but also in new media with the internet censorship. The control over this information may have a clear objective to maintain a climate of information in the community, but on the other hand, such control is tantamount to restricting the right of citizens to make, use, and distribute information, and more fatal as a violation of human rights.

  20. Internet research and ethics: transformative issues in nursing education research.

    Science.gov (United States)

    Mahon, Pamela Young

    2014-01-01

    As practice in the educational and clinical settings seeks to be evidence based, faculty are increasingly required to conduct research and publish the results to advance the science of our profession. The purpose of this article is to discuss transformative research ethics because Internet use is an increasing component of current research studies. How nurse educators can engage in research-utilizing methodologies inclusive of technology while adhering to ethical standards developed before the advance of the Internet is reviewed. Recommendations are cited to address the new questions that arise at institutional review board meetings resulting from potential ethical implications of using students or research participants in cyber space. © 2014.

  1. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  2. 77 FR 38630 - Open Internet Advisory Committee

    Science.gov (United States)

    2012-06-28

    ... Committee will observe market developments regarding the freedom and openness of the Internet and will focus..., Technology Policy and Internet Governance, Cisco Systems Charles Slocum, Assistant Executive Director...

  3. Oncology information on the Internet.

    Science.gov (United States)

    Goto, Yasushi; Nagase, Takahide

    2012-05-01

    Owing to new developments in Internet technologies, the amount of available oncology information is growing. Both patients and caregivers are increasingly using the Internet to obtain medical information. However, while it is easy to provide information, ensuring its quality is always a concern. Thus, many instruments for evaluating the quality of health information have been created, each with its own advantages and disadvantages. The increasing importance of online search engines such as Google warrants the examination of the correlation between their rankings and medical quality. The Internet also mediates the exchange of information from one individual to another. Mailing lists of advocate groups and social networking sites help spread information to patients and caregivers. While text messages are still the main medium of communication, audio and video messages are also increasing rapidly, accelerating the communication on the Internet. Future health information developments on the Internet include merging patients' personal information on the Internet with their traditional health records and facilitating the interaction among patients, caregivers and health-care providers. Through these developments, the Internet is expected to strengthen the mutually beneficial relationships among all stakeholders in the field of medicine.

  4. Internet Forums for Suicide Bereavement.

    Science.gov (United States)

    Bailey, Eleanor; Krysinska, Karolina; O'Dea, Bridianne; Robinson, Jo

    2017-11-01

    Bereavement by suicide is associated with a number of consequences including poor mental health outcomes and increased suicide risk. Despite this, the bereaved by suicide may be reluctant to seek help from friends, family, and professionals. Internet forums and social networking sites are a popular avenue of support for the bereaved, but to date there is a lack of research into their use and efficacy. To survey users of suicide bereavement Internet forums and Facebook groups regarding their help-seeking behaviors, use of forums, and perceived benefits and limitations of such use. This study employed a cross-sectional design in which users of suicide bereavement Internet forums and Facebook groups completed an anonymous online survey. Participants were 222 users of suicide bereavement Internet forums. Most participants (93.2%) had sought face-to-face help from sources other than Internet forums, but were more likely to seek help in the near future from informal rather than formal sources. Forums were perceived as highly beneficial and there were few limitations. The generalizability of these results to other internet forums may be limited. Additionally, we were not able to examine differences between forums in terms of quality or user-reported efficacy. Finally, the data reflects the subjective views of forum users, which may differ from the views of moderators or experts. Internet forums, including Facebook groups, appear to be a useful adjunct to face-to-face help-seeking for supporting those who have been bereaved by suicide.

  5. Internet gaming addiction: current perspectives

    Science.gov (United States)

    Kuss, Daria J

    2013-01-01

    In the 2000s, online games became popular, while studies of Internet gaming addiction emerged, outlining the negative consequences of excessive gaming, its prevalence, and associated risk factors. The establishment of specialized treatment centers in South-East Asia, the US, and Europe reflects the growing need for professional help. It is argued that only by understanding the appeal of Internet gaming, its context, and neurobiologic correlates can the phenomenon of Internet gaming addiction be understood comprehensively. The aim of this review is to provide an insight into current perspectives on Internet gaming addiction using a holistic approach, taking into consideration the mass appeal of online games, the context of Internet gaming addiction, and associated neuroimaging findings, as well as the current diagnostic framework adopted by the American Psychiatric Association. The cited research indicates that the individual’s context is a significant factor that marks the dividing line between excessive gaming and gaming addiction, and the game context can gain particular importance for players, depending on their life situation and gaming preferences. Moreover, the cultural context is significant because it embeds the gamer in a community with shared beliefs and practices, endowing their gaming with particular meaning. The cited neuroimaging studies indicate that Internet gaming addiction shares similarities with other addictions, including substance dependence, at the molecular, neurocircuitry, and behavioral levels. The findings provide support for the current perspective of understanding Internet gaming addiction from a disease framework. The benefits of an Internet gaming addiction diagnosis include reliability across research, destigmatization of individuals, development of efficacious treatments, and the creation of an incentive for public health care and insurance providers. The holistic approach adopted here not only highlights empirical research that

  6. Internet gaming addiction: current perspectives.

    Science.gov (United States)

    Kuss, Daria J

    2013-01-01

    In the 2000s, online games became popular, while studies of Internet gaming addiction emerged, outlining the negative consequences of excessive gaming, its prevalence, and associated risk factors. The establishment of specialized treatment centers in South-East Asia, the US, and Europe reflects the growing need for professional help. It is argued that only by understanding the appeal of Internet gaming, its context, and neurobiologic correlates can the phenomenon of Internet gaming addiction be understood comprehensively. The aim of this review is to provide an insight into current perspectives on Internet gaming addiction using a holistic approach, taking into consideration the mass appeal of online games, the context of Internet gaming addiction, and associated neuroimaging findings, as well as the current diagnostic framework adopted by the American Psychiatric Association. The cited research indicates that the individual's context is a significant factor that marks the dividing line between excessive gaming and gaming addiction, and the game context can gain particular importance for players, depending on their life situation and gaming preferences. Moreover, the cultural context is significant because it embeds the gamer in a community with shared beliefs and practices, endowing their gaming with particular meaning. The cited neuroimaging studies indicate that Internet gaming addiction shares similarities with other addictions, including substance dependence, at the molecular, neurocircuitry, and behavioral levels. The findings provide support for the current perspective of understanding Internet gaming addiction from a disease framework. The benefits of an Internet gaming addiction diagnosis include reliability across research, destigmatization of individuals, development of efficacious treatments, and the creation of an incentive for public health care and insurance providers. The holistic approach adopted here not only highlights empirical research that

  7. PENGGUNAAN TEKNOLOGI INTERNET DALAM BISNIS

    Directory of Open Access Journals (Sweden)

    Oviliani Yuliana

    2000-01-01

    Full Text Available The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of internet in business strategy are global and interactive communication, information supply; consumer based service; increased cooperation; possibility to open new marketplace, product or services; and integrated the activity on-line. There are 2 applications in electronic commerce, which are business-to-business and business-to-consumer commerce. Electronic commerce payment transaction is arranged by Electronic Funds Transfer system, whereas the data security is governed by Secure Socket Layer, which then be developed to Secure Electronic Transaction. Abstract in Bahasa Indonesia : Internet dalam bisnis digunakan untuk pertukaran informasi, katalog produk, media promosi, surat elektronik, bulletin boards, kuesioner elektronik, dan mailing list. Internet juga bisa digunakan untuk berdialog, berdiskusi, dan konsultasi dengan konsumen secara on-line, sehingga konsumen dapat dilibatkan secara proaktif dan interaktif dalam perancangan, pengembangan, pemasaran, dan penjualan produk. Pemasaran lewat internet ada 2 metode, yaitu push dan pull marketing. Keunggulan strategi bisnis yang dapat diperoleh dari internet adalah komunikasi global dan interaktif; menyediakan informasi dan pelayanan sesuai dengan kebutuhan konsumen; meningkatkan kerja sama; memungkinkan untuk membuka pasar, produk, atau pelayanan baru; serta mengintegrasikan aktivitas secara on-line. Aplikasi Electronic Commerce ada 2, yaitu: Business-to-Consumer dan Business-to-Business Commerce. Pembayaran

  8. Energy and future Internet; Energia e futura internet

    Energy Technology Data Exchange (ETDEWEB)

    Lovasz, Gergoe; Niedermeier, Florian; Beri, Andreas; Meers, Hermann de [Universidade de Passau (Germany)

    2012-06-15

    One of the main concern related with future of Internet as far the elevated energy consumption of the infrastructure, which includes the energy supply for the servers and equipment need to refrigerate the necessary hardware.

  9. INTERNET5: Shaping an Internet for women's empowerment | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-12-08

    Dec 8, 2017 ... Young women learn computer skills, Hyderabad, Pakistan ... works in building social, political, and economic empowerment for women and girls. ... to the Internet and to explore how digital and networking tools can best be ...

  10. Consumer protection and internet shopping

    OpenAIRE

    Blažková, Lenka

    2010-01-01

    The diploma thesis is devoted to the issue of online shopping. Its aim is to analyze internet shopping and see the rights and obligations of consumers and sellers, which are based on current legislation. The thesis is divided into two parts. The theoretical part deals with purchase over the internet and its regulations. There are explained the concepts internet, e-business and e-commerce and indicate the types of e-business and is mentioned certification of online stores. The practical part i...

  11. Impact of the Internet on Globalization : Industrial Internet

    OpenAIRE

    Jukics, Márk

    2016-01-01

    The thesis consists of two main parts. The first part is the theoretical framework, the second part is about assisting in a project of Centria University of Applied Sciences. The theoretical part of the thesis expounds the evolution and the benefits of the industrial internet. It explains the roots of globalization, internet, and industries. Lean manufacturing and management is also involved in the theory, as this way of management is successfully spreading by the help of globalization. I...

  12. The digital divide in Internet-based patient education materials.

    Science.gov (United States)

    Sun, Gordon H

    2012-11-01

    The ubiquity of the Internet has led to the widespread availability of health-related information to the public, and the subsequent empowerment of patients has fundamentally altered the patient-physician relationship. Among several concerns of physicians is the possibility that patients may be misinformed by information obtained from the Internet. One opportunity for health care providers to address this problem exists within Internet-based patient education materials (IPEMs). According to recent research in Otolaryngology-Head and Neck Surgery, IPEMs found within professional otolaryngology websites are written at the 8th- to 18th-grade reading comprehension level, essentially unchanged over the past 3 years. This greatly exceeds the fourth- to sixth-grade reading level recommended by the National Institutes of Health. Benefits, strategies, and challenges to improving the readability of IPEMs are discussed.

  13. Cellular 5G Access for Massive Internet of Things

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Pratas, Nuno; Stefanovic, Cedomir

    2017-01-01

    The Internet of Things (IoT) refers to the paradigm of physical and virtual “things” that communicate and collaborate over the Internet, with minimal or no human intervention. There are multiple ways in which an IoT device can be connected to the Internet. Cellular technologies are seen as viable...... candidates in this respect, due to their maturity, worldwide availability and the use of reserved spectrum. However, current cellular systems are not well-equipped to efficiently and reliably support IoT traffic, particularly in the radio access part, as they are designed for low number of high......-rate connections and not for high number of low-rate IoT connections. In this chapter we outline the main features of the IoT traffic types, review operation of the current cellular access and provide some guidelines how to address its shortcomings and evolve it in order to support IoT services. However...

  14. Addressing problems of employee performance.

    Science.gov (United States)

    McConnell, Charles R

    2011-01-01

    Employee performance problems are essentially of 2 kinds: those that are motivational in origin and those resulting from skill deficiencies. Both kinds of problems are the province of the department manager. Performance problems differ from problems of conduct in that traditional disciplinary processes ordinarily do not apply. Rather, performance problems are addressed through educational and remedial processes. The manager has a basic responsibility in ensuring that everything reasonable is done to help each employee succeed. There are a number of steps the manager can take to address employee performance problems.

  15. The impact of Internet-based specific activities on the perceptions of Internet addiction, quality of life, and excessive usage: A cross-sectional study

    OpenAIRE

    Halley M. Pontes; Attila Szabo; Mark D. Griffiths

    2015-01-01

    Introduction: Recent research has examined the context in which preference for specific online activities arises, leading researchers to suggest that excessive Internet users are engaged in specific activities rather than ‘generalized’ Internet use. The present study aimed to partially replicate and expand these findings by addressing four research questions regarding (i) participants' preferred online activities, (ii) possible expected changes in online behavior in light of hypothetical scen...

  16. The Future Internet

    Directory of Open Access Journals (Sweden)

    Andrew Hudson-Smith

    2009-07-01

    Full Text Available In 1995 technology analyst Gartner [1] developed a hype cycle model for the adoption of technology. The cycle comprises five stages from the initial technology trigger through to a final plateau of productivity along a with a peak of inflated expectations, a tough of disillusionment and the slope of enlightenment. The hype cycle is notable technique for plotting and identifying waves of innovation and hype in technology and digital communications. Yet, from where we stand, we can see the waves of innovation becoming increasingly shorter, the troughs less deep and the peaks of expectations higher. The read-write revolution, that is arguably known as Web 2.0, has transformed our experience of using the Internet from a source of information to a means of communication and participation. It has introduced mirror worlds, the cloud, wikitecture, social shaping, connected places, folksonomies and many other terms that I am sure many of us have used in recent grant applications and papers. This is the here and now, all of these technologies are past the technology trigger point and rising up the peak of inflated expectations with a few already heading towards the trough before becoming mainstream and approaching mass adoption. [...

  17. SAVAH: Source Address Validation with Host Identity Protocol

    Science.gov (United States)

    Kuptsov, Dmitriy; Gurtov, Andrei

    Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.

  18. Digital Citizenship: Addressing Appropriate Technology Behavior

    Science.gov (United States)

    Ribble, Mike S.; Bailey, Gerald D.; Ross, Tweed W.

    2004-01-01

    Recently, the popular press has pointed to increasing evidence of misuse and abuse of emerging technologies in U.S. schools. Some examples include using Web sites to intimidate or threaten students, downloading music illegally from the Internet, plagiarizing information using the Internet, using cellular phones during class time, and playing games…

  19. Energy utilities and the Internet

    International Nuclear Information System (INIS)

    2000-01-01

    The chances for energy utilities in the Netherlands to present themselves on the Internet are briefly outlined. It appears that other businesses are ahead of the Dutch utilities in offering electronic services with respect to energy

  20. Internet ja emakeel / Indrek Tart

    Index Scriptorium Estoniae

    Tart, Indrek

    2003-01-01

    Internet on või(s)tlustanner, kus tähendusrikkalt toimimiseks erinevad kultuurid pingutusi teevad. Efektiivne ja paratamatu on omakeelse-emakeelse vahendkonna loomine veebis tegutsemiseks, sest selleta arenenud kirjakultuuriga riike on raske ette kujutada

  1. An Overview of Internet biosurveillance

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, David M.; Nelson, Noele P.; Arthur, Ray; Barboza, P.; Collier, Nigel; Lightfoot, Nigel; Linge, J. P.; van der Goot, E.; Mawudeku, A.; Madoff, Lawrence; Vaillant, L.; Walters, Ronald A.; Yangarber, Roman; Mantero, Jas; Corley, Courtney D.; Brownstein, John S.

    2013-06-21

    Internet biosurveillance utilizes unstructured data from diverse Web-based sources to provide early warning and situational awareness of public health threats. The scope of source coverage ranges from local based media in the vernacular to international media in widely read languages. Internet biosurveillance is a timely modality available to government and public health officials, health care workers, and the public and private sector, serving as a real-time complementary approach to traditional indicator-based public health disease surveillance methods. Internet biosurveillance also supports the broader activity of epidemic intelligence. This review covers the current state of the field of Internet biosurveillance and provides a perspective on the future of the field.

  2. Zone memories and pseudorandom addressing

    International Nuclear Information System (INIS)

    Marino, D.; Mirizzi, N.; Stella, R.; Visaggio, G.

    1975-01-01

    A quantitative comparison between zone memories, pseudorandom addressed memories and an alternative special purpose memory (spread zone memory) in which the distance between any two transformed descriptors, at first adjacent, is independent of the descriptors pair and results the maximum one is presented. This memory has not been particularly considered at present in spite of its efficiency and its simple implementation

  3. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  4. Internet gaming addiction: current perspectives

    Directory of Open Access Journals (Sweden)

    Kuss DJ

    2013-11-01

    Full Text Available Daria J KussPsychology Research and Behavior Management, Birmingham City University, Birmingham, UKAbstract: In the 2000s, online games became popular, while studies of Internet gaming addiction emerged, outlining the negative consequences of excessive gaming, its prevalence, and associated risk factors. The establishment of specialized treatment centers in South-East Asia, the US, and Europe reflects the growing need for professional help. It is argued that only by understanding the appeal of Internet gaming, its context, and neurobiologic correlates can the phenomenon of Internet gaming addiction be understood comprehensively. The aim of this review is to provide an insight into current perspectives on Internet gaming addiction using a holistic approach, taking into consideration the mass appeal of online games, the context of Internet gaming addiction, and associated neuroimaging findings, as well as the current diagnostic framework adopted by the American Psychiatric Association. The cited research indicates that the individual's context is a significant factor that marks the dividing line between excessive gaming and gaming addiction, and the game context can gain particular importance for players, depending on their life situation and gaming preferences. Moreover, the cultural context is significant because it embeds the gamer in a community with shared beliefs and practices, endowing their gaming with particular meaning. The cited neuroimaging studies indicate that Internet gaming addiction shares similarities with other addictions, including substance dependence, at the molecular, neurocircuitry, and behavioral levels. The findings provide support for the current perspective of understanding Internet gaming addiction from a disease framework. The benefits of an Internet gaming addiction diagnosis include reliability across research, destigmatization of individuals, development of efficacious treatments, and the creation of an incentive

  5. [Patients, doctors and the internet].

    Science.gov (United States)

    Jeannot, Jean Gabriel; Bischoff, Thomas

    2015-05-13

    The majority of the Swiss population uses the internet to seek information about health. The objective is to be better informed, before or after the consultation. Doctors can advise their information-seeking patients about high quality websites, be it medical portals or websites dedicated to a specific pathology. Doctors should not see the internet as a threat but rather as an opportunity to strengthen the doctor-patient relationship.

  6. Router for internet of things

    OpenAIRE

    Čižius, Ovidijus

    2016-01-01

    The Internet of Things (IoT) is a globally growing technology based on internet information architecture is designed to facilitate the exchange of goods and services to manage the home devices more convenient way. IoT is the development of information technology infrastructure to ensure the safe and reliable transfer of data between objects. IoT - daily-used items, such as cars, refrigerators, air conditioners, umbrellas and others. There are not necessary a high technology to produce mention...

  7. Security in Internet of Things

    OpenAIRE

    Mohar, Matej

    2017-01-01

    The Internet of Things (IoT) is emerging the Internet and other networks with wireless technologies to make physical objects interact online. The IoT has developed to become a promising technology and receives significant research attention in recent years because of the development of wireless communications and micro-electronics.  Like other immature technological inventions, although IoT will promise their users a better life in the near future, it is a security risk, especially today the ...

  8. Internet in Continuous Health Care

    Czech Academy of Sciences Publication Activity Database

    Zvárová, Jana; Hanzlíček, Petr

    2005-01-01

    Roč. 13, č. 5 (2005), s. 451-452 ISSN 0928-7329. [MedNet 2005. World Congress on the Internet in Medicine /10./. 04.12.2005-07.12.2005, Prague] R&D Projects: GA AV ČR 1ET200300413 Institutional research plan: CEZ:AV0Z10300504 Keywords : Internet * health care * technology Subject RIV: BD - Theory of Information

  9. Using Gopher on the Internet

    Energy Technology Data Exchange (ETDEWEB)

    Davidoff, G.

    1994-04-01

    This report is a complication of vugraphs with respect to the use of Gopher on Internet. There are viewgraphs on using Gopher at the University of California at Santa Cruz. Examples of other Internet Gopher servers around the world are given. Also discussed is the Library of Congress Gopher and JUGHEAD which is an acronym for Jonzy`s Universal Gopher Hierarchy Excavation And Display.

  10. Desvelando a Internet das Coisas

    Directory of Open Access Journals (Sweden)

    Lucia Santaella

    2013-12-01

    Full Text Available O presente artigo pretende relatar as origens da Internet das Coisas, seu estado de arte e evidenciar seus principais vetores. Para tal, o estudo percorrerá as eras midiáticas de Santaella (2007, p. 179-189, a par da discussão das máquinas de Turing, da arquitetura Von Neumann até chegar à Internet e seu estado atual, implementada nas coisas.

  11. Problematic Internet use: an overview

    OpenAIRE

    ABOUJAOUDE, ELIAS

    2010-01-01

    There is wide agreement that the Internet can serve as a tool that enhances well-being. It is more difficult, however, to find consensus around the issue of problematic Internet use. That may be in part because scientific investigation has lagged far behind technological advances and media attention. The diagnostic schemas that have been proposed since 1996, and the screening tools that have been developed, stress similarities with substance use, impulse control disorders, a...

  12. Broadband Internet and Income Inequality

    OpenAIRE

    HOUNGBONON , Georges Vivien; Liang , Julienne

    2017-01-01

    Policy makers are aiming for a large coverage of high-speed broadband Internet. However , there is still a lack of evidence about its effects on income distribution. In this paper, we investigate the effects of fixed broadband Internet on mean income and income inequality using a unique town-level data on broadband adoption and quality in France. We find that broadband adoption and quality raise mean income and lower income inequality. These results are robust to initial conditions, and yield...

  13. COMPULSORY AUTHORIZATION IN THE INTERNET

    Directory of Open Access Journals (Sweden)

    A. S. Oharkov

    2010-08-01

    Full Text Available The article describes a promising idea of solving more and more pressing problem of personality authentication in the Internet. Growing popularity of the Internet carries with itself the problem of man anonymity in a network. The article suggests inculcating a new identification method, which at all strictness of information clarification from passport and biometric data of a man, is democratic enough and gives possibility for user to decide how to dispose this information.

  14. Prevalence of problematic internet use in Slovenia

    Directory of Open Access Journals (Sweden)

    Macur Mirna

    2016-09-01

    Full Text Available Internet use is an integral part of our everyday activities; however, Internet use may become problematic and harmful in a minority of cases. The majority of reported prevalence rates of problematic Internet use refer to adolescent samples, whereas epidemiological studies on representative adult populations are lacking. This study aimed to reveal the prevalence and characteristics of problematic Internet use in Slovenia.

  15. Self-Disclosure and Internet Addiction

    Science.gov (United States)

    Arslan, Nihan; Kiper, Aydin

    2018-01-01

    The aim of study is to investigate the relationship between self-disclosure and internet addiction. Self-Disclosure Scale and Internet Addiction Scale were applied to students. Results indicated a negative correlation between self-disclosure and internet addiction. Self-disclosure was negative predicted by internet addiction in the structural…

  16. What is the next innovation after the internet of things?

    OpenAIRE

    Cao, Hung

    2017-01-01

    The world had witnessed several generations of the Internet. Starting with the Fixed Internet, then the Mobile Internet, scientists now focus on many types of research related to the "Thing" Internet (or Internet of Things). The question is "what is the next Internet generation after the Thing Internet?" This paper envisions about the Tactile Internet which could be the next Internet generation in the near future. The paper will introduce what is the tactile internet, why it could be the next...

  17. Internet-Based Interventions for Addictive Behaviours: A Systematic Review.

    Science.gov (United States)

    Chebli, Jaymee-Lee; Blaszczynski, Alexander; Gainsbury, Sally M

    2016-12-01

    Internet-based interventions have emerged as a new treatment and intervention modality for psychological disorders. Given their features of treatment flexibility, anonymity and confidentiality, this modality may be well suited in the management of addictive behaviours. A systematic literature review of the effectiveness and treatment outcomes of Internet-based interventions for smoking cessation, problematic alcohol use, substance abuse and gambling was performed. Studies were included if they met the following criteria: clients received a structured therapeutic Internet-based intervention for a problematic and addictive behaviour; included more than five clients; effectiveness was based on at least one outcome; outcome variables were measured before and immediately following the interventions; had a follow-up period; and involved at least minimal therapist contact over the course of the program. Sixteen relevant studies were found; nine addressed the effects of Internet-based interventions on smoking cessation, four on gambling, two on alcohol and one on opioid dependence. All studies demonstrated positive treatment outcomes for their respective addictive behaviours. The current review concluded that Internet-based interventions are effective in achieving positive behavioural change through reducing problematic behaviours. This mode of therapy has been found to have the capacity to provide effective and practical services for those who might have remained untreated, subsequently reducing the barriers for help-seekers. This in turn provides imperative information to treatment providers, policy makers, and academic researchers.

  18. Internet Use in Latin America

    Directory of Open Access Journals (Sweden)

    Ryan Salzman

    2011-01-01

    Full Text Available Este documento analiza el desarrollo del uso de Internet en América Latina. Los análisis exploran las expectativas y realidades macro y micro sociales del uso de Internet en la región. Mientras se conjetura tanto acerca de la penetración de Internet en América Latina, este documento establece las tasas reales de penetración, e intenta comprender qué ha fomentado su crecimiento en la región. Diferentes niveles de desarrollo económico, tecnológico y gubernamental impulsan la expansión de la penetración de Internet en la región. Al observar el consumo en un nivel micro, esta investigación emplea datos de encuestas de varios años del Proyecto de Opinión Pública de América Latina (Latin American Public Opinion Project y ofrece un análisis inicial de los factores determinantes del uso de Internet. En comparación con otras formas de consumo de medios de comunicación, los usuarios de Internet son más jóvenes y más escépticos a los medios de prensa locales.

  19. The Internet and the Nigerian Woman: A Case of Female Undergraduates

    Directory of Open Access Journals (Sweden)

    Joseph Wilson

    2015-06-01

    Full Text Available The Internet has drastically changed information and knowledge sharing processes globally. It is a widely accepted medium for transformation and empowerment. Individuals, groups, communities and nations, including women in their quest for a gender sensitive society have adopted the Internet as a viable tool. However, despite the countless benefits of this important tool of communication, research, entertainment, publishing, and business, there are challenges that affect Internet access and use among female students at the University of Maiduguri, Nigeria. This paper examines Internet access and use among female undergraduates at a Nigerian University. Selected female undergraduates completed questionnaires. The findings shows that the university computer centre (University Cyber Café is the major Internet access point among the respondents. Research (information searches and learning ranked first in the uses of the Internet among respondents, with financial constraints as the major challenge to access and use of the Internet. Respondents found women-related websites useful. They derive a certain gratification from these sites. However, most respondents do not post or contribute material or information on the web. Their interaction with the web involves mostly downloading. The study concludes that Internet access and use status among female students at the University of Maiduguri and women in general would be greatly enhanced if women organizations concentrated on addressing the challenges identified in this study. Attention should be paid to this category of women (university students who have the educational capabilities and Internet potential to impact women empowerment efforts.

  20. Young adults' internet addiction: Prediction by the interaction of parental marital conflict and respiratory sinus arrhythmia.

    Science.gov (United States)

    Zhang, Hui; Spinrad, Tracy L; Eisenberg, Nancy; Luo, Yun; Wang, Zhenhong

    2017-10-01

    The aim of the current study was to address the potential moderating roles of respiratory sinus arrhythmia (RSA; baseline and suppression) and participant sex in the relation between parents' marital conflict and young adults' internet addiction. Participants included 105 (65 men) Chinese young adults who reported on their internet addiction and their parents' marital conflict. Marital conflict interacted with RSA suppression to predict internet addiction. Specifically, high RSA suppression was associated with low internet addiction, regardless of parental marital conflict; however, for participants with low RSA suppression, a positive relation between marital conflict and internet addiction was found. Internet addiction also was predicted by a significant three-way interaction among baseline RSA, marital conflict, and participant sex. Specifically, for men, marital conflict positively predicted internet addiction under conditions of low (but not high) baseline RSA. For women, marital conflict positively predicted internet addiction under conditions of high (but not low) baseline RSA. Findings highlight the importance of simultaneous consideration of physiological factors, in conjunction with family factors, in the prediction of young adults' internet addiction. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. La ética en internet

    OpenAIRE

    Issa Luna Pla

    2015-01-01

    En América Latina el INTERNET es un medio con muchas limitaciones. Solo el 10 ó 15 por ciento de la población total, residente en Argentina, México y Brasil tiene acceso. Trata sobre el Comercio en Internet, la regulación y la ética, las nuevas formas de aplicar reglas, el Internet como espacio público, las comunidades de Internet, los parámetros de ética y responsabilidad social en Internet, los menores y la libertad de expresión, los contenidos informativos en Internet, el Internet corporat...

  2. Contingent approach to Internet-based supply network integration

    Science.gov (United States)

    Ho, Jessica; Boughton, Nick; Kehoe, Dennis; Michaelides, Zenon

    2001-10-01

    The Internet is playing an increasingly important role in enhancing the operations of supply networks as many organizations begin to recognize the benefits of Internet- enabled supply arrangements. However, the developments and applications to-date do not extend significantly beyond the dyadic model, whereas the real advantages are to be made with the external and network models to support a coordinated and collaborative based approach. The DOMAIN research group at the University of Liverpool is currently defining new Internet- enabled approaches to enable greater collaboration across supply chains. Different e-business models and tools are focusing on different applications. Using inappropriate e- business models, tools or techniques will bring negative results instead of benefits to all the tiers in the supply network. Thus there are a number of issues to be considered before addressing Internet based supply network integration, in particular an understanding of supply chain management, the emergent business models and evaluating the effects of deploying e-business to the supply network or a particular tier. It is important to utilize a contingent approach to selecting the right e-business model to meet the specific supply chain requirements. This paper addresses the issues and provides a case study on the indirect materials supply networks.

  3. Internet Usage In The Fresh Produce Supply Chainin China

    Science.gov (United States)

    Xu, Xiaoxiao; Duan, Yanqing; Fu, Zetian; Liu, Xue

    Although effective implementation of the Internet technologies has a great potential for improving efficiency and reducing wastage within the fresh produce supply chain. the situation of the Internet usage by SMEs (small and medium sized enterprises) in the fresh produce supply chain is still unclear in China. As the main players, SMEs haven't been given enough attention from both academics and governments. Therefore, this research attempts to address this issue by, first, investigating the current usage of the Internet and related software by Chinese SMEs in the fresh produce supply chain, and then, by identifying enablers and barriers faced by SMEs to call government's attention. As a part of an EU-Asia IT&C funded project, a survey was carried out with SMEs in this industry from five major cities in China. The results reveal that in the relatively developed areas of China, SMEs in the fresh produce supply chain are rapidly adopting the Internet and software packages, but the level of adoption varies greatly and there is a significant lack of integration among the supply chain partners. Chinese SMEs are keen to embrace emerging technologies and have acted to adopt new software and tools. Given that cost of implementation is not a barrier, their concern over legal protection and online security must be addressed for further development.

  4. Heritability of compulsive Internet use in adolescents

    OpenAIRE

    Vink, Jacqueline M.; van Beijsterveldt, Toos C. E. M.; Huppertz, Charlotte; Bartels, Meike; Boomsma, Dorret I.

    2015-01-01

    Abstract Over the past decades, Internet use has grown substantially, and it now serves people as a supportive tool that is used regularly and?in large parts of the world?inevitably. Some people develop problematic Internet use, which may lead to addictive behavior and it is becoming important to explore the risk factors for compulsive Internet use. Data were analyzed on compulsive Internet use [with the Compulsive Internet Use Scale (CIUS)] from 5247 monozygotic (MZ) and dizygotic (DZ) adole...

  5. Heritability of compulsive Internet use in adolescents

    OpenAIRE

    Vink, J.M.; van Beijsterveldt, C.E.M.; Huppertz, C.; Bartels, M.; Boomsma, D.I.

    2016-01-01

    Over the past decades, Internet use has grown substantially, and it now serves people as a supportive tool that is used regularly and - in large parts of the world - inevitably. Some people develop problematic Internet use, which may lead to addictive behavior and it is becoming important to explore the risk factors for compulsive Internet use. Data were analyzed on compulsive Internet use [with the Compulsive Internet Use Scale (CIUS)] from 5247 monozygotic (MZ) and dizygotic (DZ) adolescent...

  6. Cyber Security: Rule of Use Internet Safely?

    OpenAIRE

    -, Maskun

    2013-01-01

    International Journal Cyber security plays on important role to guarantee and protect people who use internet in their daily life. Some cases take place around the world that people get inconvenience condition when they access and use internet. Misuse of internet becomes a current issue which some cases take place including a university. Advantages of using internet in the university of course assist the student to get some information in internet. However, they have to be protected in ord...

  7. Prevalence of problematic internet use in Slovenia

    OpenAIRE

    Macur, Mirna; Kir?ly, Orsolya; Maraz, Aniko; Nagygy?rgy, Katalin; Demetrovics, Zsolt

    2016-01-01

    Abstract Background Internet use is an integral part of our everyday activities; however, Internet use may become problematic and harmful in a minority of cases. The majority of reported prevalence rates of problematic Internet use refer to adolescent samples, whereas epidemiological studies on representative adult populations are lacking. This study aimed to reveal the prevalence and characteristics of problematic Internet use in Slovenia. Methods Problematic Internet Use Questionnaire (PIUQ...

  8. The Internet, Political Participation, and E-Government in Comparative Perspective

    Science.gov (United States)

    Sharma, Mukul

    2010-01-01

    This dissertation addresses three important questions, together with optimistic and pessimistic views, about people's access/use of the Internet, its ability to promote their participation in politics, and its role in government provision of information and public services. Chapter Two addresses the question of the determinants of people's access…

  9. Internet of Thing Context Awareness Model

    Directory of Open Access Journals (Sweden)

    Derrick Ntalasha

    2016-02-01

    Full Text Available This paper aims to address key concept of context awareness in the Internet of Things (IoT domain by providing a model that proactively monitors behaviour of devices and services. This concept represents context into two types of information representation, namely set based and mark-up based ontology for the purpose of defining a context awareness model that accurately represent context in IoT. The context model is defined using Resources, Actors, Ambients and Policies. The model adds value to the next stage of IoT evolution by using context ambients to bring about predictive and proactive modelling in understanding context and context awareness. IoT context is represented using the hierarchical hybrid context model. This model provides a method of representing contexts based on context quality and availability in an entity relation hierarchy form. The model is exemplified using the context management application based on agents. Experimental results indicate that context awareness in the Internet of Things can be enhanced by the proposed model.

  10. Internet Infidelity: Exploration of Attitudes towards Partners Internet Behaviors

    Directory of Open Access Journals (Sweden)

    Mohammad R. Abdi

    2012-09-01

    Full Text Available Background: Today, the Internet has become a part of our everyday life and online communications have made it easy for people to develop interpersonal relationships. However, certain problems and difficulties have arisen from this issue. One of these problems, which have been prevalent among couples and families, is extramarital internet relationships or internet infidelity. The present research has been done to study people's attitudes towards this phenomenon. Materials and Methods: A 43-item Internet Infidelity Questionnaire (IIQ was presented on a website designed for this purpose. 481 Iranian users who were members of Farsi language forums and chat rooms were selected through available community sampling and enrolled in the study. To analyze research data, descriptive statistics and the t-test were used.Results: The results showed that either women or men considered online sexual activities of their partners as traitorous compared with friendly and emotional activities in cyberspace. In addition, women in comparison with men had a more negative attitude towards their partners’ internet activity (especially online sexual activities.Conclusion: This study expanded our understanding of the traditional concept of infidelity that had merely limited it to face-to-face sexual and emotional behavior. The results also showed that women had more negative attitudes towards such activities compared to men.

  11. Campaigning on the Internet: 2008 Presidential General Election Candidate Webpage

    Directory of Open Access Journals (Sweden)

    William L. Benoit

    2016-12-01

    Full Text Available The Internet is becoming an increasingly important component of political campaigns. This study employed content analysis to apply Functional Theory and Issue Ownership Theory to Obama’s and McCain’s presidential candidate webpages in the 2008 campaign. Acclaims (92% were more common than attacks (98%; defenses did not occur in this sample. Policy (82% was addressed more than character (18%. When discussing policy, these candidates addressed future plans most frequently, followed by general goals and then past deeds; on character, candidates discussed ideals, then personal qualities, and then leadership ability. This study shows that as candidates use the Internet to reach voters, their webpages conform to theoretical expectations.

  12. Internet Addiction: A Brief Summary of Research and Practice

    Science.gov (United States)

    Cash, Hilarie; Rae, Cosette D; Steel, Ann H; Winkler, Alexander

    2012-01-01

    Problematic computer use is a growing social issue which is being debated worldwide. Internet Addiction Disorder (IAD) ruins lives by causing neurological complications, psychological disturbances, and social problems. Surveys in the United States and Europe have indicated alarming prevalence rates between 1.5 and 8.2% [1]. There are several reviews addressing the definition, classification, assessment, epidemiology, and co-morbidity of IAD [2-5], and some reviews [6-8] addressing the treatment of IAD. The aim of this paper is to give a preferably brief overview of research on IAD and theoretical considerations from a practical perspective based on years of daily work with clients suffering from Internet addiction. Furthermore, with this paper we intend to bring in practical experience in the debate about the eventual inclusion of IAD in the next version of the Diagnostic and Statistical Manual of Mental Disorders (DSM). PMID:23125561

  13. Substance abuse precedes Internet addiction.

    Science.gov (United States)

    Lee, Young Sik; Han, Doug Hyun; Kim, Sun Mi; Renshaw, Perry F

    2013-04-01

    The purpose of the current study was to evaluate possible overlapping substance abuse and internet addiction in a large, uniformly sampled population, ranging in age from 13 to 18 years. Participants (N=73,238) in the current study were drawn from the 6th Korea Youth Risk Behavior Web-based Survey (KYRBWS-V) for students from 400 middle schools and 400 high schools in 16 cities within South Korea. Of adolescent internet users, 85.2% were general users (GU), 11.9% were users with potential risk for internet addiction (PR), and 3.0% were users with high risk for internet addiction (HR). There was a difference in the number of students with alcohol drinking among the GU, PR, and HR groups (20.8% vs 23.1% vs 27.4%). There was a difference in the number of students who smoked among the GS, PR, and HR groups (11.7% vs 13.5% vs 20.4%). There was a difference in the number of students with drug use among the GU, PR, and HR groups (1.7% vs 2.0% vs 6.5%). After adjusting for sex, age, stress, depressed mood, and suicidal ideation, smoking may predict a high risk for internet addiction (OR=1.203, p=0.004). In addition, drug use may predict a high risk for internet addiction (OR=2.591, paddiction have vulnerability for addictive behaviors, co-morbid substance abuse should be evaluated and, if found, treated in adolescents with internet addiction. Copyright © 2013 Elsevier Ltd. All rights reserved.

  14. The impact of shyness on problematic internet use: the role of loneliness.

    Science.gov (United States)

    Huan, Vivien S; Ang, Rebecca P; Chong, Wan Har; Chye, Stefanie

    2014-01-01

    In recent years, research indicated that the problematic effects of Internet use must be examined together with individual differences present in its users with which such effects are contingent. This study examined loneliness in adolescents as a mediator of the relationship between shyness and their generalized problematic Internet use (PIU). A total of 1469 adolescents (48.5% male, 51.5% female) from Grade 8 and Grade 9 classes participated in this study. Using the Social Reticence Scale (SRS), the revised UCLA Loneliness scale and the Generalized Problematic Internet Use scale, initial findings indicated significant correlations among the three variables. Results from the study further revealed that loneliness completely mediated the relationship between shyness and generalized problematic Internet use. Implications for intervention work addressing both loneliness and shyness issues facing adolescents who are problematic users of the Internet were discussed.

  15. Older Adults' Internet Use for Health Information: Digital Divide by Race/Ethnicity and Socioeconomic Status.

    Science.gov (United States)

    Yoon, Hyunwoo; Jang, Yuri; Vaughan, Phillip W; Garcia, Michael

    2018-04-01

    Building upon literature suggesting low Internet use among racial/ethnic minorities and socioeconomically disadvantaged groups, this study examined how race/ethnicity and socioeconomic status (SES) influence the Internet use for health information, addressing both independent and interactive effects. Using data from 17,704 older adults in the California Health Interview Survey, logistic regression models were estimated with race/ethnicity (Whites, African Americans, Latinos, and Asians), SES index, and the interaction between race/ethnicity and SES index. Overall, approximately 40% of participants were Internet-users for health information. Direct effects of race/ethnicity and SES-and their interactions-were all found to be significant. Minority status combined with the lowest levels of SES substantially reduced the odds of using Internet for health information. Findings suggest the combination of racial/ethnic minority status and low SES as a source of digital divide, and provide implications for Internet technology training for the target population.

  16. Model-based security engineering for the internet of things

    OpenAIRE

    NEISSE RICARDO; STERI GARY; NAI FOVINO Igor; BALDINI Gianmarco; VAN HOESEL Lodewijk

    2015-01-01

    We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the control and protection of user data in the deployment of the Internet of Things (IoT). This toolkit takes a more general approach for security engineering including risk analysis, establishment of aspect-specific trust relationships, and enforceable security policies. We describe the integrated metamodels used in the toolkit and the accompanying security engineering methodology for IoT systems...

  17. Contemporary problems with the GATS and internet gambling

    OpenAIRE

    Turksen, U.; Holder, R.

    2015-01-01

    This article focuses on the issue of enforcement of the WTO rules on international cross-border trade in services. It is argued that the examination of the GATS jurisprudence and state practice reveal that the GATS does not address the needs of the developing countries in general and the prospects of internet gambling services in the Caribbean Community in particular. First, the article discusses the extent of service-producing activities within the GATS provisions and outlines the main princ...

  18. Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles

    OpenAIRE

    Wan, Jiafu; Liu, Jianqi; Shao, Zehui; Vasilakos, Athanasios V.; Imran, Muhammad; Zhou, Keliang

    2016-01-01

    The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and Io...

  19. Smart Building Management Systems and Internet of Things

    Directory of Open Access Journals (Sweden)

    Jean Yves Astier

    2017-07-01

    Full Text Available After a brief historical reminder on SCADA systems, we will present the new challenges regarding modern building technical management (BTM systems. We identify the technological evolutions, which allow us to address these new issues, and describe the software and hardware architectures of our Building Management Internet of Things (BMIoT solution. We end by comparing with other older solutions and by a short description of the new business models, our solution allows.

  20. Assessing internet addiction using the parsimonious internet addiction components model—A preliminary study.

    NARCIS (Netherlands)

    Kuss, D.J.; Shorter, G.W.; Rooij, A.J. van; Griffiths, M.D.; Schoenmakers, T.M.

    2014-01-01

    Internet usage has grown exponentially over the last decade. Research indicates that excessive Internet use can lead to symptoms associated with addiction. To date, assessment of potential Internet addiction has varied regarding populations studied and instruments used, making reliable prevalence

  1. Modeling traditional literacy, internet skills and internet usage: an empirical study

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2016-01-01

    This paper focuses on the relationships among traditional literacy (reading, writing and understanding text), medium-related Internet skills (consisting of operational and formal skills), content-related Internet skills (consisting of information and strategic skills) and Internet usage types

  2. [The Internet and its security].

    Science.gov (United States)

    Masić, Izet; Ahmetović, Ademir; Jakupović, Safet; Masić, Zlatan; Zunić, Lejla

    2002-01-01

    Internet, is the greatest world net by by means of which nowadays the planet communicates, rapidly goes forward. The last years of the university in USA the commonly develop the more progressive concept of the net (Internet 2), thanks to the constant growing technologies, with the goal to answer the needs of the scientific and the educational institutions, but also the commercial institutions and the organizations. Almost the there is no more significant institution in the world which has not developed their web pages and data bases with the most actual contents available to the wider circle of the users. In this paper we have given the section of the most actual web pages. However, Internet is not immune to those users who are not benevolent and who have developed the different tools in the goal of the destroying or unabling of the normal use of all the Internet conveniences. The authors is considering the protection problem and the data security which get distributed by Internet.

  3. New Paradigms in Internet Computing

    CERN Document Server

    Tripathy, Piyu; Naik, Sagar

    2013-01-01

    The renaissance of internet has reached the mainstream that is named as Web 2.0. People are now using the web to build things they have never thought of earlier. Experts take a step forward to what we contribute, and extend it and give back to the society, i.e. really the boon of internet computing. It has revolutionized the current business environment, not as a mere computing tool, but offers versatile services and increase the productive flow of information. It is a new dimension in computing systems by which companies can curtail their operating expenses, by hosting and operating through the internet. Now the users can access the required information by means of any device connected with an internet. The challenge ahead for implementing this versatile system is that the software and technology has to be developed and deployed simultaneously vis-a-vis safeguarding the security and privacy of information.             This book encompasses various research and developments in Internet technology a...

  4. Addressing the workforce pipeline challenge

    Energy Technology Data Exchange (ETDEWEB)

    Leonard Bond; Kevin Kostelnik; Richard Holman

    2006-11-01

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

  5. A comparative study of uses of the Internet among college students with and without Internet addiction.

    Science.gov (United States)

    Kesici, Sahin; Sahin, Ismail

    2009-12-01

    The current study examined uses of the Internet among college students classified as addicted to the Internet or not. Data were gathered from 384 college students. Students classified as Internet Addicted used the Internet more for social functions, leisure functions, and virtual emotional functions, when compared to students considered as Internet Nonaddicted. Effect sizes were large, indicating important group differences in uses of the Internet.

  6. The impact of Internet-based specific activities on the perceptions of Internet addiction, quality of life, and excessive usage: A cross-sectional study.

    Science.gov (United States)

    Pontes, Halley M; Szabo, Attila; Griffiths, Mark D

    2015-06-01

    Recent research has examined the context in which preference for specific online activities arises, leading researchers to suggest that excessive Internet users are engaged in specific activities rather than 'generalized' Internet use. The present study aimed to partially replicate and expand these findings by addressing four research questions regarding (i) participants' preferred online activities, (i) possible expected changes in online behavior in light of hypothetical scenarios, (iii) perceived quality of life when access to Internet was not possible, and (iv) how participants with self-diagnosed Internet addiction relate to intensity and frequency of Internet use. A cross-sectional design was adopted using convenience and snowball sampling to recruit participants. A total of 1057 Internet users with ages ranging from 16 to 70 years (M age  = 30 years, SD = 10.84) were recruited online via several English-speaking online forums. Most participants indicated that their preferred activities were (i) accessing general information and news, (ii) social networking, and (iii) using e-mail and/or online chatting. Participants also reported that there would be a significant decrease of their Internet use if access to their preferred activities was restricted. The study also found that 51% of the total sample perceived themselves as being addicted to the Internet, while 14.1% reported that without the Internet their life would be improved. The context in which the Internet is used appears to determine the intensity and the lengths that individuals will go to use this tool. The implications of these findings are further discussed.

  7. INTERNET ADDICTION – EMPIRICAL VERIFICATION FOR SLOVENIA

    Directory of Open Access Journals (Sweden)

    Mateja Gorenc

    2016-09-01

    Full Text Available The Internet has become an essential part of the day and the working lives of many people. Daily use of the Internet has the potential to become the worrying problem of the moment as some of Internet users begin to neglect their families, abandon hobbies, are late for work and, thus, lose contact with reality only to spend as much time as possible on the Internet. The aim of the research was to explore Internet addiction in Slovenia. We have designed a structural model to study Internet addiction. The research was conducted to collect data on Internet addiction. The sample surveys included employed people in Slovenia. Our results indicate a serious problem with Internet addiction. The predicted model in this study can be used for further research on Internet addiction.

  8. Internet protocol network mapper

    Science.gov (United States)

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  9. A Life’s Addresses

    DEFF Research Database (Denmark)

    Balle, Søren Hattesen

    According to Jonathan Culler’s essay ”Apostrophe”, ”…post-enlightenment poetry seeks to overcome the alienation of subject from object”, and “apostrophe takes the crucial step of constituting the object as another subject with whom the poetic subject might hope to strike up a harmonious relations......According to Jonathan Culler’s essay ”Apostrophe”, ”…post-enlightenment poetry seeks to overcome the alienation of subject from object”, and “apostrophe takes the crucial step of constituting the object as another subject with whom the poetic subject might hope to strike up a harmonious...... to a number of different aspects of Koch’s own life such as marijuana, the Italian language, World War Two, etc. In this way, the book quite conventionally inscribes itself in the tradition of post-enlightenment apostrophic poetry as characterized by Culler, just as all its poems belong to the favourite......, are literally troped as and addressed in the manner of so many acquaintances, personal connections, relatives, friends, lovers, and family members in Koch’s life. My main claim is that Koch’s poetics in New Addresses is one that slightly dislocates the romantic dichotomy between the world of things...

  10. Research on sensor design for internet of things and laser manufacturing

    Science.gov (United States)

    Wang, Tao; Yao, Jianquan; Guo, Ling; Zhang, Yanchun

    2010-12-01

    In this paper, we will introduce the research on sensor design for IOT (Internet of Things) and laser manufacturing, and supporting the establishment of local area IOT. The main contents include studying on the structure designing of silicon micro tilt sensor, data acquisition and processing, addressing implanted and building Local Area IOT with wireless sensor network technology. At last, it is discussed the status and trends of the Internet of Things from the promoters, watchers, pessimists and doers.

  11. A Novel Navigation Information Management System for Food Maritime Logistics Based on Internet of Things

    OpenAIRE

    Wei He; Xiumin Chu

    2014-01-01

    This study focuses on the construction of a new navigation information management system for food maritime logistics. With the vigorous development of Internet technology, the Internet of things technology has been introduced into the food maritime logistics to enhance the efficiency of food production transportation. However, the navigation information management system for food maritime logistics is still a big challenge and very limited work has been done to address safe and effective navi...

  12. Internet Access: How to Design and Test an Internet Use/Management Policy

    National Research Council Canada - National Science Library

    Montgomery, Doris

    2001-01-01

    The Internet is filled with tremendous marketing potential and vulnerabilities, organizations should develop polices that offer both Internet Usage/Management policies that are consisted with their organization...

  13. Internet resources for the anaesthesiologist.

    Science.gov (United States)

    Johnson, Edward

    2012-05-01

    There is considerable useful information about anaesthesia available on the World Wide Web. However, at present, it is very incomplete and scattered around many sites. Many anaesthetists find it difficult to get the right information they need because of the sheer volume of information available on the internet. This article starts with the basics of the Internet, how to utilize the search engine at the maximum and presents a comprehensive list of important websites. These important websites, which are felt to offer high educational value for the anaesthesiologists, have been selected from an extensive search on the Internet. Top-rated anaesthesia websites, web blogs, forums, societies, e-books, e-journals and educational resources are elaborately discussed with relevant URLs.

  14. ¿Libertad e Internet?

    Directory of Open Access Journals (Sweden)

    Fernando Galindo

    2016-06-01

    Full Text Available El trabajo aporta una reflexión sobre los límites que el uso de Internet establece al ejercicio del Derecho de libertad, reconocido en las Constituciones democráticas como la preservación del ejercicio de la autonomía de la voluntad en la vida diaria de los ciudadanos/ personas, que forman parte de una concreta organización social y política, respetando el ejercicio de la suya propia por otra u otras personas o ciudadanos. El trabajo se fija, especialmente, en exponer algunos límites que se producen al respecto en varias prácticas que tienen lugar en Internet, aportando, con ello, argumentos centrados en considerar hasta qué punto se puede, caso de que se pueda, producir uma efectiva/positiva/completa/ absoluta relación entre libertad e Internet.

  15. How Europe Formulates Internet Policy

    DEFF Research Database (Denmark)

    Savin, Andrej

    2014-01-01

    This article discusses the interplay of carrier and content regulatory layers in European internet law, how the 'Single Market' agenda informs and influences these layers and whether the proposed EU Connected Continent Regulation may solve some of the difficulties. The article starts with a brief...... overview of EU policy making in the area of telecommunications, moves on to explain the 'Single Market' background of EU internet regulation and looks at present telecommunications policy in its potential for the future. The main claim is that the origins of EU telecommunications policy can help understand...... and explain more general limitations of internet regulation and its more recent transformations. One of the main conclusions is that the 'Single Market' paradigm as understood in the 1990s or 2000s may not be best suited for the dynamic digital world of today....

  16. [Security aspects on the Internet].

    Science.gov (United States)

    Seibel, R M; Kocher, K; Landsberg, P

    2000-04-01

    Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.

  17. Navigating the Internet of Things

    DEFF Research Database (Denmark)

    Rassia, Stamatina; Steiner, Henriette

    2017-01-01

    Navigating the Internet of Things is an exploration of interconnected objects, functions, and situations in networks created to ease and manage our daily lives. The Internet of Things represents semi-automated interconnections of different objects in a network based on different information...... technologies. Some examples of this are presented here in order to better understand, explain, and discuss the elements that compose the Internet of Things. In this chapter, we provide a theoretical and practical perspective on both the micro- and macro-scales of ‘things’ (objects), small and large (e.......g. computers or interactive maps), that suggest new topographic relationships and challenge our understanding of users’ involvement with a given technology against the semi-automated workings of these systems. We navigate from a philosophical enquiry into the ‘thingness of things’ dating from the 1950s...

  18. Not good enough? Further comments to the wording, meaning, and the conceptualization of Internet Gaming Disorder.

    Science.gov (United States)

    Krossbakken, Elfrid; Pallesen, Ståle; Molde, Helge; Mentzoni, Rune Aune; Finserås, Turi Reiten

    2017-06-01

    In their commentary, Kuss, Griffiths, and Pontes (2016) criticize the use of the term "Internet" in the recently proposed diagnosis for Internet Gaming Disorder (IGD) and its use as one of the included diagnostic criteria. We agree with the exclusion of the term "Internet" in the diagnosis, but have some considerations to the comments regarding the nine criteria for IGD. Specifically, we discuss the meaning, the wording, and the importance of the criteria, as well as the importance of distress or functional impairment in the proposed diagnosis. We also address the possibility of categorizing IGD as a subtype of a general behavioral addiction diagnosis.

  19. Migrating Servers, Elusive Users: Reconfigurations of the Russian Internet in the Post-Snowden Era

    Directory of Open Access Journals (Sweden)

    Ksenia Ermoshina

    2017-03-01

    Full Text Available In response to the growing censorship of their national Internet, Russian users, content producers and service providers have developed several resistance tactics. This paper analyzes these tactics with particular attention paid to their materiality. It first addresses the different levels of Internet “governance by infrastructure” in Russia, then focuses on the different tactics of individual and collective resistance and concludes by discussing how forms of control enacted at different levels of infrastructure are reconfiguring the geopolitics of the Russian Internet.

  20. Internet-ordered viagra (sildenafil citrate) is rarely genuine.

    Science.gov (United States)

    Campbell, Neil; Clark, John P; Stecher, Vera J; Goldstein, Irwin

    2012-11-01

    Counterfeit medication is a growing problem. This study assessed the requirement for prescription, cost, origin, and content of medications sold via the Internet and purporting to be the phosphodiesterase type 5 inhibitor Viagra (sildenafil citrate). Pfizer monitored top search results for the query "buy Viagra" on the two leading Internet search engines in March 2011. Orders were placed from 22 unique Web sites claiming to sell Viagra manufactured by Pfizer. Tablets received were assessed for chemical composition. No Web site examined required a prescription for purchase or a health screening survey; 90% offered illegal "generic Viagra." Cost per tablet ranged from $3.28-$33.00. Shipment origins of purchases were Hong Kong (N = 11), the United States (N = 6), and the United Kingdom (N = 2) as well as Canada, China, and India (N = 1 each). Notably, the four Internet pharmacies claiming to be Canadian did not ship medication from a Canadian address. Of 22 sample tablets examined, 17 (77%) were counterfeit, 4 (18%) were authentic, and 1 (5%) was an illegal generic. Counterfeit tablets were analyzed for sildenafil citrate, the active pharmaceutical ingredient (API) of Viagra, and contents varied between 30% and 50% of the label claim. Counterfeits lacked product information leaflets, including appropriate safety warnings, and genuine Viagra formulations. Internet sites claiming to sell authentic Viagra shipped counterfeit medication 77% of the time; counterfeits usually came from non-U.S. addresses and had 30% to 50% of the labeled API claim. Caution is warranted when purchasing Viagra via the Internet. © 2012 International Society for Sexual Medicine.

  1. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  2. The myth of the decentralised internet

    Directory of Open Access Journals (Sweden)

    Ashwin J. Mathew

    2016-09-01

    Full Text Available In popular culture, and in policy discussions, the internet is often conceived of as a decentralised technology, which cannot be controlled. Drawing from research into internet infrastructure, focusing on the Border Gateway Protocol, I show that the internet has never been, and never can be, decentralised. I argue that the internet is better viewed as being distributed, both in terms of technologies and governance arrangements. The shift in perspective, from decentralised to distributed, is essential to understand the past and present internet, and to imagine possible future internets which preserve and support the public good.

  3. PERFORMANCE ANALYSIS OF IPv4 AND IPv6 INTERNET TRAFFIC

    Directory of Open Access Journals (Sweden)

    Rupesh Jaiswal

    2015-12-01

    Full Text Available The gigantic growth of the internet communication technology has illustrated its value and benefits to private businesses, government organizations, worldwide professionals, academic institutes and individuals over the past few years. The size and range of computing devices connected to the internet, substantially increased because of IPv6 and offers the potential to establish a much more powerful internet compared to the IPv4. IPV6 developed by the IETF to deal with a shortage of IP addresses under IPv4. New features of IPv6 enhance packet processing speeds over routers, switches and end systems. These improved features will have different traffic characteristics than IPv4. The internet traffic which was earlier assumed as Poisson is now shown to have fractal characteristics as; heavy tailedness, self-similarity and long range dependency. Internet traffic showing above characteristics are found to have burstiness at multiple timescales. This behavior impacts network performance and degrades it substantially. It also increases complexity for network design and create difficulties to maintain desired QoS. IPv4 traffic has been well established as self-similar traffic. Nowadays, IPv6 forming a larger share of the internet traffic and it is pivotal to asses IPv6 with regards to fractal behavior. This will enable network designers to do necessary changes in the existing network to reconcile with IPv6. In this paper we compared IPv4 and IPv6 with respect to fractal behavioral characteristics. It is found that IPv6 shows higher degree of heavy tailedness, higher values of Hurst parameter values, higher fractal dimension values i.e. it is more self-similar, greater autocorrelation achieved even at larger lag and thus showing more burstiness.

  4. Customer loyalty in Internet banking

    OpenAIRE

    Eriksson, M.; Schuster, C.

    2008-01-01

    In the recent years the way to do banking has changed. Internet banking has grown and a lot of niche banks working mainly with the Internet as a medium has entered the Swedish bank market. How to keep the customer loyal online in a very competitive environment has become a main question for the banks. The aim of this dissertation is to test what factors impact bank customer loyalty in an online environment. A positivistic research philosophy, a deductive research approach, an explanatory pur...

  5. PEMANFAATAN INTERNET SEBAGAI SUMBER BELAJAR

    Directory of Open Access Journals (Sweden)

    Rediana Setiyani

    2010-12-01

    Full Text Available This study has objectives to know (1 the ways / patterns of Internet usage by accounting students of Economics Faculty, Unnes in the academic year of 2009/2010, (2 the benefits of Internet to support the studying of accounting students of Economics Faculty, Unnes in the academic year of 2009/2010 (3 the difference of internet usage as a learning resource among accounting students in 4th semester, 1st and 3rd semester of Economics Faculty at Unnes III in the academic year of 2009/2010. The populations of the study are all accounting program students of Economics Faculty, Unnes. The sampling technique used was stratified random sampling. Method of data collection was questionnaire. Technique of data analysis was descriptive analysis and One Way ANOVA test. The results of this study showed that students who used wifi / hotspot for internet were 57%, students who used the internet cafe were 29.7%, and 13.3% students via modem. Benefit of Internet in supporting their studying was in good categorization, it means that students were sure when they got more information; it would improve their achievement also. There are differences in Internet usage as a learning source by students in II semester and IV semester, students in II semester and  VI semester, students in IV semester and VI semester, students in IV semester  and VIII semester, students in VI semester and VIII semester. On the other hand, students in II semester and VIII semester were not different. From the results above, the suggestions are: 1 the hotspot area should be increased on the campus; so students can easily access anywhere, 2 the speed of internet access is also added, so students can quickly download information related to their studying, 3 students can take the advantages of hotspot areas in the campus as much as possible so they can get more information and 4 Students should not rely on textbooks only, but also should look for other information that supports their studying.

  6. PEMANFAATAN INTERNET SEBAGAI SUMBER BELAJAR

    Directory of Open Access Journals (Sweden)

    Rediana Setiyani

    2016-01-01

    Full Text Available This study has objectives to know (1 the ways / patterns of Internet usage by accounting students of Economics Faculty, Unnes in the academic year of 2009/2010, (2 the benefits of Internet to support the studying of accounting students of Economics Faculty, Unnes in the academic year of 2009/2010 (3 the difference of internet usage as a learning resource among accounting students in 4th semester, 1st and 3rd semester of Economics Faculty at Unnes III in the academic year of 2009/2010. The populations of the study are all accounting program students of Economics Faculty, Unnes. The sampling technique used was stratified random sampling. Method of data collection was questionnaire. Technique of data analysis was descriptive analysis and One Way ANOVA test. The results of this study showed that students who used wifi / hotspot for internet were 57%, students who used the internet cafe were 29.7%, and 13.3% students via modem. Benefit of Internet in supporting their studying was in good categorization, it means that students were sure when they got more information; it would improve their achievement also. There are differences in Internet usage as a learning source by students in II semester and IV semester, students in II semester and  VI semester, students in IV semester and VI semester, students in IV semester  and VIII semester, students in VI semester and VIII semester. On the other hand, students in II semester and VIII semester were not different. From the results above, the suggestions are: 1 the hotspot area should be increased on the campus; so students can easily access anywhere, 2 the speed of internet access is also added, so students can quickly download information related to their studying, 3 students can take the advantages of hotspot areas in the campus as much as possible so they can get more information and 4 Students should not rely on textbooks only, but also should look for other information that supports their studying.

  7. Internet Performance and Reliability Measurements

    International Nuclear Information System (INIS)

    Cottrell, Les

    2003-01-01

    Collaborative HEP research is dependent on good Internet connectivity. Although most local- and wide-area networks are carefully watched, there is little monitoring of connections that cross many networks. This paper describes work in progress at several sites to monitor Internet end-to-end performance between hundreds of HEP sites worldwide. At each collection site, ICMP ping packets are automatically sent periodically to sites of interest. The data is recorded and made available to analysis nodes, which collect the data from multiple collection sites and provide analysis and graphing. Future work includes improving the efficiency and accuracy of ping data collection

  8. Internet, la xarxa de xarxes

    OpenAIRE

    Climent Serrano, Salvador

    1989-01-01

    Història d'Internet on es realitza una descripció de la transmissió de les dades per TCP / IP i s'explica el nombre IP. S'estudien els serveis d'Internet com, Correu electrònic (e-mail), Transferència de fitxers (ftp), World wide wed (la teranyina mundial), Navegadors, URL (Uniform Resource Locator), 4.5 Notícies (news), Xats (IRC ), Webphone, Archie, Gopher, Wais, Comerç electrònic els seus components.

  9. The Industrial Internet of Things

    OpenAIRE

    Albano, Michele; Silva, José Bruno; Lino Ferreira, Luis

    2017-01-01

    Demo in 22º Seminário da Rede Temática de Comunicações Móveis (RTCM 2017). 18, Jan, 2017, Session III. Lisboa. The application of the Internet of Things to manufacturing is the driving force of the new industrial revolution (Industrie 4.0). In fact, most activities in the manufacturing industry can benefit from the data collected in the context of the industrial process. The Industrial Internet of Things (IIoT), whose pillars are the usage of IP communication between the devices and making...

  10. The Internet of Things Security

    OpenAIRE

    Đekić Milica D.

    2017-01-01

    The Internet of Things (IoT) is a quite new concept covering on digital systems being correlated with each other. The first role of the Internet was to connect people, while this new paradigm serves in terms of connecting devices. Those solutions could get connected to each other using a standard web signal or applying another sort of communication channels. It's estimated that the IoT has included around 4.9 billion devices by the end of 2015, while it's expected that there would be 25 billi...

  11. Why Internet-based Education?

    Directory of Open Access Journals (Sweden)

    Morton Ann Gernsbacher

    2015-01-01

    Full Text Available This essay illustrates five ways that Internet-based higher education can capitalize on fundamental principles of learning. Internet-based education can enable better mastery through distributed (shorter, more frequent practice rather than massed (longer, less frequent practice; it can optimize performance because it allows students to learn at their peak time of their day; it can deepen memory because it requires cheat-proof assignments and tests; it can promote critical thinking because it necessitates intellectual winnowing and sifting; and it can enhance writing skills by requiring students to write frequently and for a broad audience.

  12. [Health information on the internet].

    Science.gov (United States)

    Ködmön, József

    2018-06-01

    We live in an information society, we search and gather on the internet almost everything we want to know. More and more often we are also looking for information about health issues on the world wide web. The real world is reflected by the internet: more and more false and misleading information can be found. From what home page and how to choose health information that is reliable and professionally correct? If we find relevant, useful information, can we fully understand it? These questions will be answered by this publication. Orv Hetil. 2018; 159(22): 855-862.

  13. Why internet-based education?

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    This essay illustrates five ways that Internet-based higher education can capitalize on fundamental principles of learning. Internet-based education can enable better mastery through distributed (shorter, more frequent) practice rather than massed (longer, less frequent) practice; it can optimize performance because it allows students to learn at their peak time of their day; it can deepen memory because it requires cheat-proof assignments and tests; it can promote critical thinking because it necessitates intellectual winnowing and sifting; and it can enhance writing skills by requiring students to write frequently and for a broad audience.

  14. Internet pathfinder SAMCRA for irritation-free internet phoning

    NARCIS (Netherlands)

    Van Mieghem, P.; Kuipers, F.; Van Wayenburg, B.

    2004-01-01

    The growth of the Internet is going to grind to a halt unless fundamental changes are made in its organisation, predicts Piet Van Mieghem, Professor of Telecommunication Networks at TU Delft. Routing, the information highways traffic control system, is already a cause for concern. And, as in the

  15. A Case Study: To Internet or Not To Internet.

    Science.gov (United States)

    Carman, Jared; Boynton, Doug

    1997-01-01

    Interactive multimedia training can be delivered via CD-ROM, hard drive, local area networks (LAN), wide area networks (WAN), Intranet, Internet and hybrid systems. This article presents a case study of how two companies (Los Angeles Times and Allen Communication) evaluated alternative delivery systems, chose one, and implemented multimedia…

  16. A Comparison of Internet-Based Participant Recruitment Methods: Engaging the Hidden Population of Cannabis Users in Research

    Directory of Open Access Journals (Sweden)

    Elizabeth Clare Temple

    2011-01-01

    Full Text Available While a growing number of researchers are embracing Internet-based data collection methods, the adoption of Internet-based recruitment methods has been relatively slow. This may be because little is known regarding the relative strengths and weaknesses of different methods of Internet-based participant recruitment, nor how these different recruitment strategies impact on the data collected. These issues are addressed in this article with reference to a study comparing the effectiveness of three Internet-based strategies in recruiting cannabis users for an online study. Consideration of the recruitment data leads us to recommend that researchers use multipronged Internet-based recruitment campaigns with appropriately detailed recruitment messages tailored to the population of interest and located carefully to ensure they reach the intended audience. Further, we suggest that building rapport directly with potential participants, or utilising derived rapport and implicit endorsements, is an important aspect of successful Internet-based participant recruitment strategies.

  17. Internet of Things in agriculture

    NARCIS (Netherlands)

    Verdouw, C.N.; Wolfert, Jacques; Tekinerdogan, B.

    2016-01-01

    This literature review on Internet of Things (IoT) in agriculture and food, provides an overview of existing applications, enabling technologies and main challenges ahead. The results of the review show that this subject received attention by the scientific community from 2010 on and the number of

  18. RIES: Internet voting in action

    NARCIS (Netherlands)

    Hubbers, E.M.G.M.; Jacobs, B.P.F.; Pieters, Wolter

    2004-01-01

    RIES stands for Rijnland Internet Election System. It is an online voting system that was developed by one of the Dutch local authorities on water management. The system has been used twice in the fall of 2004 for in total approximately two million potential voters. In this paper we describe how

  19. RIES: Internet voting in action

    NARCIS (Netherlands)

    Hubbers, E.M.G.M.; Jacobs, B.P.F.; Pieters, Wolter

    2005-01-01

    RIES stands for Rijnland Internet Election System. It is an online voting system that has been used twice in the fall of 2004 for in total over two million potential voters. In this paper we describe how this system works. Furthermore we describe how the system allowed us to independently verify the

  20. Internet innovation in PR management

    Directory of Open Access Journals (Sweden)

    Ćalasan Veljko B.

    2014-01-01

    Full Text Available PR Management in the last decade has evolved to unimaginable limits . Its rapid 'evolution ' is directly linked to the development and innovation, above all, of internet communications - Cyber 'world'. Although the genesis of PR management was announced in a way, the changes of the modern PR management have led to a change in the general attitude towards this particular activity. It has become an indispensable factor for the success of every business or social enterprise. In the general run for internet contents with better quality, as an indispensable tool of PR management , for better use of cyberspace , a new generation of PR manager is created, who has almost no resemblance to the earlier managers before two decades. For these reasons, we believe that Internet innovation through the implementation of PR management, changed the world economy and society. Adjusting speed to this, virtual , yet very real world , is proportional to the speed of development of an economic system as a whole, or any company at the micro level , and society in general .Internet is not an important innovation itself to be sufficient to meet the form and define the essence of economic relations. Only its proper exploitation with the constant use of tested and more intense innovation is the only way to the overall success . The absence of the above, in our opinion, is a sure path to failure.