831 resultados para The Internet
Resumo:
In recent years, the European Union has come to view cyber security, and in particular, cyber crime as one of the most relevant challenges to the completion of its Area of Freedom, Security and Justice. Given European societies’ increased reliance on borderless and decentralized information technologies, this sector of activity has been identified as an easy target for actors such as organised criminals, hacktivists or terrorist networks. Such analysis has been accompanied by EU calls to step up the fight against unlawful online activities, namely through increased cooperation among law enforcement authorities (both national and extra- communitarian), the approximation of legislations, and public- private partnerships. Although EU initiatives in this field have, so far, been characterized by a lack of interconnection and an integrated strategy, there has been, since the mid- 2000s, an attempt to develop a more cohesive and coordinated policy. An important part of this policy is connected to the activities of Europol, which have come to assume a central role in the coordination of intelligence gathering and analysis of cyber crime. The European Cybercrime Center (EC3), which will become operational within Europol in January 2013, is regarded, in particular, as a focal point of the EU’s fight against this phenomenon. Bearing this background in mind, the present article wishes to understand the role of Europol in the development of a European policy to counter the illegal use of the internet. The article proposes to reach this objective by analyzing, through the theoretical lenses of experimental governance, the evolution of this agency’s activities in the area of cyber crime and cyber security, its positioning as an expert in the field, and the consequences for the way this policy is currently developing and is expected to develop in the near future.
Resumo:
The connectivity of the Internet at the Autonomous System level is influenced by the network operator policies implemented. These in turn impose a direction to the announcement of address advertisements and, consequently, to the paths that can be used to reach back such destinations. We propose to use directed graphs to properly represent how destinations propagate through the Internet and the number of arc-disjoint paths to quantify this network's path diversity. Moreover, in order to understand the effects that policies have on the connectivity of the Internet, numerical analyses of the resulting directed graphs were conducted. Results demonstrate that, even after policies have been applied, there is still path diversity which the Border Gateway Protocol cannot currently exploit.
Resumo:
This paper describes the first study to focus exclusively on the prevalence and impact of cyberstalking. A Web-based questionnaire was used to collect data from a group of respondents who were recruited by snowball sampling via e-mail. A total of 169 respondents completed the questionnaire. The results of the study found that approximately a third of respondents might be considered victims of cyberstalking. Furthermore, when asked to indicate the level of distress felt as a result of their experiences, almost a quarter of respondents chose a value of ten on a ten-point scale. The study also suggests a number of differences between cyberstalking and offline stalking, for instance cyberstalking tends to take place over a shorter period of time than offline stalking and cyberstalking victims are less likely to know the identify of their harassers. These differences add weight to the argument that cyberstalking should be seen as a new form of deviant behaviour that can be distinguished from offline stalking. The work concludes by emphasising a need for further research.
Resumo:
The Internet poses a number of threats to the safety of young people. Using numerous examples, this article discusses a wide range of such threats, including: cyberstalking; the 'grooming' of potential victims of sexual abuse; a new 'wish list' scene (where teenagers encourage contact with potential abusers); the creation and distribution of child pornography; and the emergence of services that create child pornography to order. It is suggested that the latter has provided individuals with the ability to inflict sexual abuse on young people from a distance, an act the authors have termed virtual sex tourism. The final section of the article suggests that paedophiles and pornographers have been quick to adopt new technology as a means of concealing their activities. The article concludes by warning of the danger of overestimating or underestimating the threats described.
Resumo:
The internet's potential impact on supply chain operations is often approached in the literature in a quite generic way due to the complex nature of supply chains and the different levels of operations' integration. Drawing on existing research, this paper proposes an overall framework of supply chain integration and then attempts to provide a categorisation of the internet's role in the supply chain activities, providing insights from various sectors. The purpose of this paper is to describe and present the alternative ways that the internet impacts on the integration of supply chain operations, by comparing four different sectors: the automotive, the computer, the food and the grocery sector. The paper concludes that in the food, grocery and computer sector, internet's impact on supply chain operations has been quite poor, particularly forward integration, while it has been significant, in the backward integration of the automotive sector. Copyright © 2007 Inderscience Enterprises Ltd.
Resumo:
In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.
Resumo:
This article considers the Internet/Intranet information systems as the tool for distance learning. Author considers the model of the 3-tier WEB based information system, the idea of the language for implementing and customized solution, which includes the original language and processor for fast prototyping and implementing small and middle sized Internet/Intranet information systems.
Resumo:
The paper deals with methods of choice in the INTERNET of natural-language textual fragments relevant to a given theme. Relevancy is estimated on the basis of semantic analysis of sentences. Recognition of syntactic and semantic connections between words of the text is carried out by the analysis of combinations of inflections and prepositions, without use of categories and rules of traditional grammar. Choice in the INTERNET of the thematic information is organized cyclically with automatic forming of the new key at every cycle when addressing to the INTERNET.
Resumo:
In studies of complex heterogeneous networks, particularly of the Internet, significant attention was paid to analysing network failures caused by hardware faults or overload. There network reaction was modelled as rerouting of traffic away from failed or congested elements. Here we model network reaction to congestion on much shorter time scales when the input traffic rate through congested routes is reduced. As an example we consider the Internet where local mismatch between demand and capacity results in traffic losses. We describe the onset of congestion as a phase transition characterised by strong, albeit relatively short-lived, fluctuations of losses caused by noise in input traffic and exacerbated by the heterogeneous nature of the network manifested in a power-law load distribution. The fluctuations may result in the network strongly overreacting to the first signs of congestion by significantly reducing input traffic along the communication paths where congestion is utterly negligible. © 2013 IEEE.
Resumo:
This editorial provides an overview of the themes of network governance and content regulation that are expanded upon in the subsequent articles, identifying key issues and concerns that are prevalent in the literature in this field. In particular, this text considers governance not as an Internet-specific phenomenon, but as a global phenomenon, identifying and discussing literature pertaining to governance both online and offline, and providing examples of theories that seek to explain these forms of governance. Focusing on the interaction between public and private actors in content regulation, this editorial highlights that content regulation is a complex and contested issue that cannot be separated from its social and cultural contexts, and provides an overview of the articles contained.
Resumo:
A new framework to perform routing at the autonomous system (AS) level is proposed here. This mechanism, called chain routing framework (CRF), uses complete orders as its main topological unit. Since complete orders are acyclic digraphs that possess a known topology, it is possible to use these acyclic structures to route consistently packets between a group of ASs. The adoption of complete orders also allows easy identification and avoidance of persistent route oscillations, eliminates the possibility of developing transient loops in paths and provides a structure that facilitates the implementation of traffic engineering. Moreover, by combining CRF with other mechanisms that implement complete orders in time, the authors propose that it is possible to design a new routing protocol, which can be more reliable and stable than the border gateway protocol. © 2011 The Institution of Engineering and Technology.
Resumo:
The traditional way of understanding television content consumption and viewer reactions may be simply summarised: information about the program, viewing at airing time, and interpersonal discussion after the program. In our digital media environment due to crossmedia consumption and platform shifts, the actual trend in audiovisual, and traditionally television content consumption is changing, the viewer’s journey is different across contents and platforms. Content is becoming independent from the platform and the medium is increasingly in the hands of technologically empowered viewers. Our objective is to uncover how traditional content expressly manufactured for television (series, reality shows, sports) can now be consumed via other platforms, and how and to what extent audiovisual content consumption is complemented or replaced by other forms (text, audio). In our exploratory research we identify the typical patterns of interaction and synergies of consumption across classical media content. In this study we used a multimethodology qualitative research design with three research phases including focus groups, online content analysis, and viewers’ narratives. Overall, the Video Star stays alive, but has to deal with immediate reactions and has to change according to his or her audiences’ wishes
Resumo:
The purpose of this dissertation was to investigate cross-cultural differences in the use of the Internet. Hofstede's model of national culture was employed as the theoretical foundation for the analysis of cross-cultural differences. Davis's technology acceptance model was employed as the theoretical foundation for the analysis of Internet use. ^ Secondary data from an on-line survey of Internet users in 22 countries conducted in April 1997 by the Georgia Tech Research Corporation measured the dependent variables of Internet use and the independent variables of attitudes toward technology. Hofstede's stream of research measured the independent variables of the five dimensions of national culture. ^ Contrary to expectations, regression analyses at the country level of analysis did not detect cultural differences. As expected, regression analyses at the individual level of analysis did detect cultural differences. The results indicated that perceived usefulness was related to the frequency of Internet shopping in the Germanic and Anglo clusters, where masculinity was high. Perceived ease of use was related to the frequency of Internet shopping in the Latin cluster, where uncertainty avoidance was high. Neither perceived usefulness nor perceived ease of use was related to the frequency of Internet shopping in the Nordic cluster, where masculinity and uncertainty avoidance were low. ^ As expected, analysis of variance at the cluster level of analysis indicated that censorship was a greater concern in Germany and Anglo countries, where masculinity was high. Government regulation of the Internet was less preferred in Germany, where power distance was low. Contrary to expectations, concern for transaction security. was lower in the Latin cluster, where uncertainty avoidance was high. Concern for privacy issues was lower in the U.S., where individualism was high. ^ In conclusion, results suggested that Internet users represented a multicultural community, not a standardized virtual community. Based on the findings, specific guidance was provided on how international managers and marketers could develop culturally sensitive strategies for training and promoting Internet services. ^