Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Journal

Internet

Discipline
Institution
Publication Year
Publication

Articles 1 - 25 of 25

Full-Text Articles in Computer Engineering

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami Nov 2021

The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami

Future Computing and Informatics Journal

It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …


Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier Oct 2020

Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier

Dickinson Law Review (2017-Present)

In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …


Voting Booths And Interactive Art Installations: The Diebold Accuvote Ts In Context, Mike Richison Nov 2019

Voting Booths And Interactive Art Installations: The Diebold Accuvote Ts In Context, Mike Richison

Journal of Network Music and Arts

In 2016, I created an interactive installation called Video Voto Matic. This project was a mashup between the Votomatic voting system and a Roland TR-808 drum machine. To coincide with the 2020 election season, I am currently working on an update of the project that will include a touch screen voting interface and multiple networked stations that also produce audio and video output. The interface will be housed in the same voting booths that once housed the Diebold Accuvote TS. The Diebold Accuvote TS is a screen-based voting machine that does not utilize paper as a backup. Researchers have examined …


Considering Telematic Tools For Conferences, Scott Deal, Rodney Smith, Chuiyuan Meng, Matt Vice Nov 2019

Considering Telematic Tools For Conferences, Scott Deal, Rodney Smith, Chuiyuan Meng, Matt Vice

Journal of Network Music and Arts

Participation in conferences is an elemental component of professional life throughout the world. Two problems offset the social synergy gained from attending a far-away gathering of like-minded people. The first is the highly pronounced carbon footprint from air travel, and the second is the expense involved to participate in a conference which may be on another continent. These factors prevent many from participating who could otherwise benefit as well as contribute. As videoconferencing becomes more common and more sophisticated, it will serve as an alternative that not only benefits constituencies, but will expand the reach of a conference to more …


Understanding The Telematic Apparatus, Patrick Muller, Benjamin Burger, Joel De Giovanni, Matthias Ziegler Nov 2019

Understanding The Telematic Apparatus, Patrick Muller, Benjamin Burger, Joel De Giovanni, Matthias Ziegler

Journal of Network Music and Arts

Under the conditions of its geographic distribution, the “telematic performance” can be regarded as a remediation of traditional concert, theater or dance formats. Conversely, and as this paper argues, the telematic performance can also be understood as an artistic format of its own right, one which then can serve as a trope for social interaction under the conditions of critical posthumanism. To gain a wider perspective, this paper analyzes Alan Turing’s “Imitation Game” from his seminal article Computing Machinery and Intelligence, 1950, proposing it as an early conceptualization of a telematic performance. This against-the-grain reading of Turing’s text reveals certain …


Sensing Place And Presence In An Intimal Long-Distance Improvisation, Ximena Alarcon Diaz, Paul Boddie, Cagri Erdem, Eigil Aandahl, Elias Sukken Andersen, Eirik Dahl, Mari Lesteberg, Alexander Refsum Jensenius Nov 2019

Sensing Place And Presence In An Intimal Long-Distance Improvisation, Ximena Alarcon Diaz, Paul Boddie, Cagri Erdem, Eigil Aandahl, Elias Sukken Andersen, Eirik Dahl, Mari Lesteberg, Alexander Refsum Jensenius

Journal of Network Music and Arts

INTIMAL is an interactive system for relational listening, which integrates physical-virtual interfaces for people to sonically improvise between distant locations. The aim is to embrace two key aspects in the context of human migration: the sense of place and the sense of presence. This paper reflects on the use of INTIMAL in a long-distance improvisation between the cities of Oslo, Barcelona and London in May 2019. This improvisation was performed by nine Colombian migrant women, who had been involved in a research process using the Deep Listening® practice developed by Pauline Oliveros. Here we describe the performance setting and the …


Telematic Music Vs. Networked Music: Distinguishing Between Cybernetic Aspirations And Technological Music-Making, Eric C. Lemmon Nov 2019

Telematic Music Vs. Networked Music: Distinguishing Between Cybernetic Aspirations And Technological Music-Making, Eric C. Lemmon

Journal of Network Music and Arts

No abstract provided.


Editorial, Sarah Weaver Nov 2019

Editorial, Sarah Weaver

Journal of Network Music and Arts

Welcome to the Journal of Network Music and Arts (JONMA). JONMA is a peer-reviewed open access digital research journal published by Stony Brook University. Network Music and Arts utilize the Internet and related technologies as an artistic medium for works created for this platform. JONMA will publish research by artists, technologists, educators, and related scholars. The journal content will include articles, audio and video documentation, and reviews for books and recordings.


A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa Jul 2019

A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa

Journal of International Technology and Information Management

World Economic Forum publishes the Networked Readiness Index (NRI) annually, to reflect the Information and Communication Technology (ICT) status of different countries. The NRI is developed by aggregating 53 indicators. The study identifies the most critical indicators to focus on, to improve the NRI status of countries at different stages of economic development. It uses data from 117 countries and analyzes the changes in the indicators along with their impacts between the years 2012 and 2016. The study explores the differences between countries by grouping them into four groups based on their NRI status. The analysis identifies six indicators with …


Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond May 2019

Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond

Journal of International Technology and Information Management

There are currently two versions of Internet Protocol (IP) in use today, IP version 4 (IPv4) and IP version 6 (IPv6). The original version, IPv4, was standardized in the early 1980s as part of the Defense Advanced Research Project Agency Internet program and became the official Internet protocol in 1983 (Kleinrock, 2010). IPv6 was standardized in 1995 as its successor to provide enhanced capabilities and address IPv4 technological limitations, most notable of which was the anticipated exhaustion of address space (Deering & Hinden, 1995). While the two protocols have some functional similarities, they are distinct and not backward compatible; IPv4-only …


Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj Feb 2019

Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj

International Journal of Business and Technology

With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols).

In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol …


Me2b Jul 2018

Me2b

SIGNED: The Magazine of The Hong Kong Design Institute

Fixing the internet's biggest flaw


How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman Jan 2017

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman

Journal of International Technology and Information Management

There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …


The Ipv6 Internet: An Assessment Of Adoption And Quality Of Services, John Pickard, John Southworth, Dale Drummond Jan 2017

The Ipv6 Internet: An Assessment Of Adoption And Quality Of Services, John Pickard, John Southworth, Dale Drummond

Journal of International Technology and Information Management

The goal of this study is to deliver both an in-depth comprehensive analysis of the current state of IPv6 adoption and an assessment of the quality of services over the IPv6 Internet. Our assessment comprises an examination of eight data sets used to produce a comprehensive picture of IPv6 adoption across 12 metrics. We assessed the quality of services over the IPv6 Internet using eight globally distributed monitoring agents to compare the HTTP load times to targeted websites over IPv6 and IPv4. The results of our analysis confirm the findings of previous studies showing that IPv6 is in an accelerating …


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …


Unified Messaging Systems: An Evolutionary Overview, Declan Barber Nov 2015

Unified Messaging Systems: An Evolutionary Overview, Declan Barber

The ITB Journal

Over the last decade, the widespread demand and use of the internet has changed the direction of the telecommunications industry as it was recognised that the internet could be used as an inexpensive way to handle not only data but also voice communications. This convergence of traditional voice and data technologies towards an IP-based open architecture has been paralleled by a convergence of the internet and mobile communications. As a result of these convergences, unified messaging has emerged as a technically viable service. Integrated messaging services that offer partial unification of different message types are already in the marketplace. This …


The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy Nov 2015

The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy

The ITB Journal

Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.


New Challenges For The Archiving Of Digital Writing, Heiko Zimmermann Dec 2014

New Challenges For The Archiving Of Digital Writing, Heiko Zimmermann

CLCWeb: Comparative Literature and Culture

In his article "New Challenges for the Archiving of Digital Writing" Heiko Zimmermann discusses the challenges of the preservation of digital texts. In addition to the problems already at the focus of attention of digital archivists, there are elements in digital literature which need to be taken into consideration when trying to archive them. Zimmermann analyses two works of digital literature, the collaborative writing project A Million Penguins (2006-2007) and Renée Tuner's She… (2008) and shows how the ontology of these texts is bound to elements of performance, to direct social interaction of writers and readers to the uniquely subjective …


Discrete Event Simulation-Based Performance Evaluation Of Internet Routing Protocols, Fati̇h Çeli̇k, Ahmet Zengi̇n, Bülent Çobanoğlu Jan 2013

Discrete Event Simulation-Based Performance Evaluation Of Internet Routing Protocols, Fati̇h Çeli̇k, Ahmet Zengi̇n, Bülent Çobanoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a discrete event system specification (DEVS)-based comparative performance analysis between the open shortest path first (OSPF) protocol and the routing information protocol (RIP), together with the border gateway protocol (BGP), using DEVS-Suite. In order to evaluate the OSPF and RIP's scalability performance, several network models are designed and configured with the OSPF and RIP, in combination with the BGP. Evaluations of the proposed routing protocols are performed based on the metrics, such as the execution time, convergence time, turnaround time, throughput, and efficiency across an increasing size and complexity through the simulated network models. The evaluation results …


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …


The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney Jan 2007

The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney

Journal of Digital Forensics, Security and Law

Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …


What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley Sep 2006

What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley

The University of New Hampshire Law Review

Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most …


The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox Jan 2006

The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox

Journal of Digital Forensics, Security and Law

The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception. By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet …


Cyberpsychology And Virtual Reality: Is An Update Necessary, Ibpp Editor Feb 2001

Cyberpsychology And Virtual Reality: Is An Update Necessary, Ibpp Editor

International Bulletin of Political Psychology

This article explores the notion that something called "human nature" may be changing in an era of significant information technology developments.