935 resultados para internet service provider liability


Relevância:

100.00% 100.00%

Publicador:

Resumo:

En España existe una amplia oferta de empresas proveedoras de Internet (ISP). Con este panorama resulta extremadamente difícil para los clientes elegir el proveedor. Por tanto, este trabajo trata de analizar los factores que contribuyen a la elección de proveedor de servicios de Internet por parte de los clientes. Para ello, se ha utilizado una muestra de jóvenes universitarios a los que se han analizado sus preferencias. Los jóvenes universitarios generalmente constituyen un grupo representativo de las tendencias en este sector. Además, para analizar el comportamiento de los clientes se utiliza por primera vez el análisis conjunto. Nuestros resultados muestran que el precio y la posibilidad de obtener un terminal móvil son los dos atributos más valorados. Por el contrario, otros atributos como la permanencia o el número de megas no son muy tenidos en cuenta por los jóvenes a la hora de seleccionar al proveedor de Internet. Estos resultados proporcionan una información muy valiosa tanto para los usuarios como para las empresas del sector ISP.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In what is being billed as iiNet versus Hollywood, the Australian internet service provider has come out an apparent winner after the High Court dismissed a copyright infringement case brought by industry movie studios. The case was a final appeal by the industry in its attempts to crack down on internet users infringing copyright by using BitTorrent to download movies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In November 2010, tension between Internet infrastructure companies boiled over in a dispute between content distribution network (CDN) Level 3 and Internet service provider (ISP) Comcast. Level 3, a distribution partner of Netflix, accused Comcast of violating the principles of net neutrality when the ISP increased distribution fees for carrying high bandwidth services. Comcast justified its actions by stating that the price increase was standard practice and argued Level 3 was trying to avoid paying its fair share. The dispute exemplifies the growing concern over the rising costs of streaming media services. The companies facing these inflated infrastructure costs are CDNs (Level 3, Equinix, Limelight, Akamai, and Voxel), companies that host streaming media content on server farms and distribute the content to a variety of carriers, and ISPs (Comcast, Time Warner, Cox, and AT&T), the cable and phone companies that provide “last mile” service to paying customers. Both CDNs and ISPs are lobbying government regulators to keep their costs at a minimum. The outcome of these disputes will influence the cost, quality, and legal status of streaming media.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The makers of Dallas Buyers Club have been dealt a blow in their attempt to extract payment from people alleged to have downloaded illegal copies of the movie. Voltage Pictures, which owns Dallas Buyers Club, has been trying to identify over 4,700 iiNet subscribers who it alleges downloaded illicit copies of the movie. Earlier this year, the Federal Court agreed that iiNet should hand over subscriber details, but warned that any letter sent to account holders must first be approved by the court to protect consumers from abuse of the legal system. In a win for consumer protection, the Federal Court has now rejected Voltage’s draft letters, criticising Voltage’s attempts to avoid explaining what fee it would demand.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In many cases, a mobile user has the option of connecting to one of several IEEE 802.11 access points (APs),each using an independent channel. User throughput in each AP is determined by the number of other users as well as the frame size and physical rate being used. We consider the scenario where users could multihome, i.e., split their traffic amongst all the available APs, based on the throughput they obtain and the price charged. Thus, they are involved in a non-cooperative game with each other. We convert the problem into a fluid model and show that under a pricing scheme, which we call the cost price mechanism, the total system throughput is maximized,i.e., the system suffers no loss of efficiency due to selfish dynamics. We also study the case where the Internet Service Provider (ISP) could charge prices greater than that of the cost price mechanism. We show that even in this case multihoming outperforms unihoming, both in terms of throughput as well as profit to the ISP.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper studies the impact of exclusive contracts between a content provider (CP) and an internet service provider (ISP) in a nonneutral network. We consider a simple linear demand function for the CPs. We studywhen an exclusive contract is benefcial to the colluding pair and evaluate its impact on the noncolluding players at equilibrium. For the case of two CPs and one ISP we show that collusion may not always be benefcial. We derive an explicit condition in terms of the advertisement revenues of the CPs that tells when a collusion is proftable to the colluding entities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We propose Trade & Cap (T&C), an economics-inspired mechanism that incentivizes users to voluntarily coordinate their consumption of the bandwidth of a shared resource (e.g., a DSLAM link) so as to converge on what they perceive to be an equitable allocation, while ensuring efficient resource utilization. Under T&C, rather than acting as an arbiter, an Internet Service Provider (ISP) acts as an enforcer of what the community of rational users sharing the resource decides is a fair allocation of that resource. Our T&C mechanism proceeds in two phases. In the first, software agents acting on behalf of users engage in a strategic trading game in which each user agent selfishly chooses bandwidth slots to reserve in support of primary, interactive network usage activities. In the second phase, each user is allowed to acquire additional bandwidth slots in support of presumed open-ended need for fluid bandwidth, catering to secondary applications. The acquisition of this fluid bandwidth is subject to the remaining "buying power" of each user and by prevalent "market prices" – both of which are determined by the results of the trading phase and a desirable aggregate cap on link utilization. We present analytical results that establish the underpinnings of our T&C mechanism, including game-theoretic results pertaining to the trading phase, and pricing of fluid bandwidth allocation pertaining to the capping phase. Using real network traces, we present extensive experimental results that demonstrate the benefits of our scheme, which we also show to be practical by highlighting the salient features of an efficient implementation architecture.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Energy-efficient communication has recently become a key challenge for both researchers and industries. In this paper, we propose a new model in which a Content Provider and an Internet Service Provider cooperate to reduce the total power consumption. We solve the problem optimally and compare it with a classic formulation, whose aim is to minimize user delay. Results, although preliminary, show that power savings can be huge: up to 71% on real ISP topologies. We also show how the degree of cooperation impacts overall power consumption. Finally, we consider the impact of the Content Provider location on the total power savings.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Data identification is a key task for any Internet Service Provider (ISP) or network administrator. As port fluctuation and encryption become more common in P2P traffic wishing to avoid identification, new strategies must be developed to detect and classify such flows. This paper introduces a new method of separating P2P and standard web traffic that can be applied as part of a data mining process, based on the activity of the hosts on the network. Unlike other research, our method is aimed at classifying individual flows rather than just identifying P2P hosts or ports. Heuristics are analysed and a classification system proposed. The accuracy of the system is then tested using real network traffic from a core internet router showing over 99% accuracy in some cases. We expand on this proposed strategy to investigate its application to real-time, early classification problems. New proposals are made and the results of real-time experiments compared to those obtained in the data mining research. To the best of our knowledge this is the first research to use host based flow identification to determine a flows application within the early stages of the connection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The consensus among researchers is that loyalty is a very complex construct (Javalgi & Moberg 1997). Various typologies have been developed to measure the loyalty construct (e.g., Curassi and Kennedy 2002; Hoare 2000; Knox 1998; Zeithaml, Parasuraman & Berry 1996). Zeithaml, Berry & Parasuraman (1996) developed a service loyalty framework comprising 13 items across five dimensions: “loyalty”, “switch”, “pay more”, “external responses”, and “internal responses”. This framework was criticised by Bloemer, de Ruyter & Wetzels (1999) for having conceptual and empirical limitations. Upon re-examination of the same 13 items, they concluded that the loyalty construct comprised only four factors: “word-of-mouth”, “purchase intentions”, “price sensitivity”, and “complaining behaviour”. Questions remain as to the precise dimensionality of the service loyalty construct as proposed by Zeithaml, Parasuraman & Berry (1996), and its stability or robustness generically, i.e., to what extent is there an invariant factor structure across the range of marketing contexts to which the battery may be applied? This paper reports on the testing of the goodness-of-fit of the five and fourfactor models to data collected in a study of consumer reaction to the service supplied by an Australian Internet Service Provider (ISP), through a series of hypothetical scenarios. In addition, comparisons were conducted with the results of exploratory factor analyses of the eight scenarios. The results suggested that factor structures are unstable across the data subsets, thereby limiting the generalisability and utility of the proposed models.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

When the average number of spam messages received is continually increasing exponentially, both the Internet service provider and the end user suffer. The lack of an efficient solution may threaten the usability of the email as a communication means. In this paper we present a filtering mechanism applying the idea of preference ranking. This filtering mechanism will distinguish spam emails from other email on the Internet. The preference ranking gives the similarity values for nominated emails and spam emails specified by users, so that the ISP/end users can deal with spam emails at filtering points. We designed three filtering points to classify nominated emails into spam email, unsure email and legitimate email. This filtering mechanism can be applied on both middleware and at the client-side. The experiments show that high precision, recall and TCR (total cost ratio) of spam emails can be predicted for the preference based filtering mechanisms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A community network often operates with the same Internet service provider domain or the virtual network of different entities who are cooperating with each other. In such a federated network environment, routers can work closely to raise early warning of DDoS attacks to void catastrophic damages. However, the attackers simulate the normal network behaviors, e.g. pumping the attack packages as poisson distribution, to disable detection algorithms. It is an open question: how to discriminate DDoS attacks from surge legitimate accessing. We noticed that the attackers use the same mathematical functions to control the speed of attack package pumping to the victim. Based on this observation, the different attack flows of a DDoS attack share the same regularities, which is different from the real surging accessing in a short time period. We apply information theory parameter, entropy rate, to discriminate the DDoS attack from the surge legitimate accessing. We proved the effectiveness of our method in theory, and the simulations are the work in the near future. We also point out the future directions that worth to explore in the future.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Estudo dos desafios e novas perspectivas estratégicas que se apresentam com o estudo de caso do UOL - Universo On Line - provedor de acesso e portal líder no Brasil, baseado em fatos e estatísticas do mercado e entrevista com o UOL.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Internet Service Providers’ liability for copyright infringement is a debated issue in France and Belgium, particularly with respect to intermediaries such as providers of hyperlinks and location tool services for which the e-commerce directive does not set explicitly any exemption from liability. Thus, the question arises among other things whether the safe harbour provisions provided for in respect of caching and hosting also could apply to search engines. French and Belgian Courts had recently to decide on this issue in several cases concerning Google’s complementary tools such as Google Videos, Google Images, Google Suggest and Google News. This article seeks to give a summary of and to assess this recent case law.