25 resultados para Internet services.

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Governments have traditionally censored drug-related information, both in traditional media and, in recent years, in online media. We explore Internet content regulation from a drug-policy perspective by describing the likely impacts of censoring drug websites and the parallel growth in hidden Internet services. Australia proposes a compulsory Internet filtering regime that would block websites that ‘depict, express or otherwise deal with matters of… drug misuse or addiction’ and/or ‘promote, incite or instruct in matters of crime’. In this article, we present findings from a mixed-methods study of online drug discussion. Our research found that websites dealing with drugs, that would likely be blocked by the filter, in fact contributed positively to harm reduction. Such sites helped people access more comprehensive and relevant information than was available elsewhere. Blocking these websites would likely drive drug discussion underground at a time when corporate-controlled ‘walled gardens’ (e.g. Facebook) and proprietary operating systems on mobile devices may also limit open drug discussion. At the same time, hidden Internet services, such as Silk Road, have emerged that are not affected by Internet filtering. The inability for any government to regulate Tor websites and the crypto-currency Bitcoin poses a unique challenge to drug prohibition policies.
Read More: http://informahealthcare.com/doi/full/10.3109/09687637.2012.745828

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Anycast and multicast are two important Internet services. Combining the two protocols can provide new and practical services. In this paper we propose a new Internet service, Minicast: in the scenario of n replicated or similar servers, deliver a message to at least m members, 1 m n. Such a service has potential applications in information retrieval, parallel computing, cache queries, etc. The service can provide the same Internet service with an optimal cost, reducing bandwidth consumption, network delay, and so on. We design a multi-core tree based architecture for the Minicast service and present the criteria for calculating the subcores among a subset of Minicast members. Simulation shows that the proposed architecture can even the Minicast traffic, and the Minicast application can save the consumptions of network resource.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

With internet services to the end users becoming more homogenous, thus providing high bandwidth for all users, multimedia services such as IPTV to the public as a whole will finally become a reality, but even given the more abundant resources, IPTV architecture is far from being highly available due to technical limitations, we aim to provide a meaningful optimization in the P2P distribution model, which is currently based on a random structure bounded by high delays and low performance, by using channel probability, user's habits studies and users' similarity, in order to optimize one of the key aspects of IPTV which is the peers management, which directly reflects on resources and user's Quality of Experience.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

DDoS attacks are one of the major threats to Internet services. Sophisticated hackers are mimicking the features of legitimate network events, such as flash crowds, to fly under the radar. This poses great challenges to detect DDoS attacks. In this paper, we propose an attack feature independent DDoS flooding attack detection method at local area networks. We employ flow entropy on local area network routers to supervise the network traffic and raise potential DDoS flooding attack alarms when the flow entropy drops significantly in a short period of time. Furthermore, information distance is employed to differentiate DDoS attacks from flash crowds. In general, the attack traffic of one DDoS flooding attack session is generated by many bots from one botnet, and all of these bots are executing the same attack program. As a result, the similarity among attack traffic should higher than that among flash crowds, which are generated by many random users. Mathematical models have been established for the proposed detection strategies. Analysis based on the models indicates that the proposed methods can raise the alarm for potential DDoS flooding attacks and can differentiate DDoS flooding attacks from flash crowds with conditions. The extensive experiments and simulations confirmed the effectiveness of our proposed detection strategies.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The emergence of Web 2.0 has brought about new Web applications being developed. Represented chiefly by Web applications such as YouTube, MySpace, blogs and Google applications, these community-based technologies are changing the way we use the Internet. One interesting result of these innovations is the extensibility of these applications. For example, YouTubepsilas content can be displayed on other Websites and hence, are popularly dasiaextendedpsila to be displayed on individual blogs and other organization Websites. In this paper, we discussed two applications that were a result of extending Google Earth and Google Maps. These two applications illustrate how new solutions can be quickly built from these extensible applications thus suggesting the future of application development, one that is built upon applications rather than object-oriented components.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This thesis presents a new framework allowing cloud services to be stateful, cloud resource state and characteristics to be published, and brokering for easy cloud resource discovery and selection to be offered. Using the framework, new technology developed significantly simplifies the discovery, selection and use of clusters on the Internet.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Today, Cloud Computing and the Internet of things are two "major forces" that drive the development of new Information Technology (IT) solutions. Many Internet of things (IoT) based large-scale applications rely on a cloud platform for data processing and storage. However, big data generated or collected by large-scale geo-distributed devices needs to be transferred to the cloud, often becoming a bottleneck for the system. In this paper, we propose a framework that integrates popular cloud services with a network of loT devices. In the framework, novel methods have been designed for reliable and efficient data transportation. This framework provides a convergence of cloud services and devices that will ease the development of loT based, cloud-enabled applications. We have implemented a prototype of the framework to demonstrate the convergence of popular cloud services and IoT technologies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper reports key findings from an interpretive study of Australian banking consumer experiences with the adoption of internet banking. The paper provides an understanding of how and why specific factors affect the consumer decision whether or not to bank on the internet, in the Australian context. A theoretical framework is provided that conceptualizes and links consumer-oriented issues influencing adoption of internet banking. The paper also provides a set of recommendations for Australian banks. Specifically, the findings suggest that convenience is the main motivator for consumers to bank on the internet, while there is a range of other influential factors that may be modulated by banks. The findings also highlight increasing risk acceptance by consumers in regard to internet-based services and the growing importance of offering deep levels of consumer support for such services. Gender differences are also highlighted. Finally, the paper suggests that banks will be better able to manage consumer experiences with moving to internet banking if they understand that such experiences involve a process of adjustment and learning over time, and not merely the adoption of a new technology.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There have been many standards and guides written for the implementation of computer security and information security concentrating on appropriate implementation of procedures for effective information security management. Such guides are limited when dealing with e-business and its implementation by Small and Medium Business Enterprises (SMEs). In Australia the National Office for the Information Economy (NOIE) has released a small business guide for e-security for performing such services while fulfilling the necessary security requirements. This paper presents an overview of this current small business guide to e-security with special reference to deriving a common set of criteria for implementing security measures in the SME e-business environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper reports a case study of end-user control in delivery of Web-based electronic services. The case study concentrates the adoption of a Web-based electronic system being implemented in processing student’s admission applications on a Web site. The end-user’s control interface provides information on the detail existing in the Web-based electronic service. This insight into end-user synthesis in developing effective control in Web service environment relates to ease of use in doing the task. To assume the leverage of end-user control strictly on the basis of the Web service usage would limit the purpose of understanding. Rather it is suggested that it would be better to develop an approach to study the end-user ease of use interface in doing the task with the user’s perception towards Web-based interactivity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The consensus among researchers is that loyalty is a very complex construct (Javalgi & Moberg 1997). Various typologies have been developed to measure the loyalty construct (e.g., Curassi and Kennedy 2002; Hoare 2000; Knox 1998; Zeithaml, Parasuraman & Berry 1996). Zeithaml, Berry & Parasuraman (1996) developed a service loyalty framework comprising 13 items across five dimensions: “loyalty”, “switch”, “pay more”, “external responses”, and “internal responses”. This framework was criticised by Bloemer, de Ruyter & Wetzels (1999) for having conceptual and empirical limitations. Upon re-examination of the same 13 items, they concluded that the loyalty construct comprised only four factors: “word-of-mouth”, “purchase intentions”, “price sensitivity”, and “complaining behaviour”. Questions remain as to the precise dimensionality of the service loyalty construct as proposed by Zeithaml, Parasuraman & Berry (1996), and its stability or robustness generically, i.e., to what extent is there an invariant factor structure across the range of marketing contexts to which the battery may be applied? This paper reports on the testing of the goodness-of-fit of the five and fourfactor models to data collected in a study of consumer reaction to the service supplied by an Australian Internet Service Provider (ISP), through a series of hypothetical scenarios. In addition, comparisons were conducted with the results of exploratory factor analyses of the eight scenarios. The results suggested that factor structures are unstable across the data subsets, thereby limiting the generalisability and utility of the proposed models.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The provision of Human Resource (HR), especially payroll, is a core function in every organization. Previously, providers of HR/payroll have offered their services to their clients via conventional modes of communication, such as telephones, facsimile, and courier services. In recent years, with the advent of the Internet and the emergence of web-based electronic commerce, there has been a rise in the adoption of web-based technology and information
systems by service providers, thereby enabling them to interact with their clients through this medium. This development necessitates the use of web-based user interfaces as workspaces between the HR/payroll providers and their clients, and thus, raises certain concerns that determine the effectiveness of web-based workflow systems. These concerns, related to the use of web interfaces, form the basis of the patterns discussed in this paper

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Web services are becoming popular and widely accepted on the Internet. UDDI is the standard for publishing and discovery of web services. In this paper, we investigate semantics description of web services based on domain ontology; based on this language, we propose an architecture for invoking agents to consume services within the UDDI registry. The semantics service description language together with agent creation
architecture provides a new way to discover and utilise published web services. This method is flexible and extendable to accomplish complex web service requests.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents findings from an empirical study of banking customer experiences with the adoption of Internet banking. Using a qualitative, interpretive grounded theory approach and single and group interviews, the study explores customer perceptions and experiences and provides an understanding of how and why specific factors affect their decision whether or not to bank on the Internet in the current era. The findings are used to develop a theoretical framework which conceptualizes and links consumer issues influencing the adoption of this application, and we also provide a set of recommendations for banks. Specifically, the findings suggest that convenience – in particular, time savings – is the major motivator to bank on the Internet, while there are a range of other influential factors which could be modulated by banks. The results also highlight increasing online risk acceptance by customers and the growing importance of deep levels of customer support for online services. Key gender differences in attitudes to Internet banking are highlighted. This study suggests that organizations will improve their management of customer attitudes to new Internet service applications by understanding the need to proactively address customer fears and misconceptions about the technologies involved.