Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Digital Communications and Networking (3)
- Computer Sciences (2)
- Information Security (2)
- Physical Sciences and Mathematics (2)
- Social and Behavioral Sciences (2)
-
- American Politics (1)
- Business (1)
- Communication (1)
- Communication Technology and New Media (1)
- Computer Law (1)
- Databases and Information Systems (1)
- E-Commerce (1)
- Emergency and Disaster Management (1)
- Infrastructure (1)
- Intellectual Property Law (1)
- Internet Law (1)
- Law (1)
- Military and Veterans Studies (1)
- Other Political Science (1)
- Political Science (1)
- Public Administration (1)
- Public Affairs, Public Policy and Public Administration (1)
- Public Policy (1)
- Science and Technology Law (1)
- Science and Technology Policy (1)
- Science and Technology Studies (1)
- Software Engineering (1)
- Systems Architecture (1)
- Institution
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Unified Messaging Systems: An Evolutionary Overview, Declan Barber
Unified Messaging Systems: An Evolutionary Overview, Declan Barber
The ITB Journal
Over the last decade, the widespread demand and use of the internet has changed the direction of the telecommunications industry as it was recognised that the internet could be used as an inexpensive way to handle not only data but also voice communications. This convergence of traditional voice and data technologies towards an IP-based open architecture has been paralleled by a convergence of the internet and mobile communications. As a result of these convergences, unified messaging has emerged as a technically viable service. Integrated messaging services that offer partial unification of different message types are already in the marketplace. This …
The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy
The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy
The ITB Journal
Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.
Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain
Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain
Electronic Theses and Dissertations
Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …