Search results

1 – 10 of 260
Open Access
Book part
Publication date: 9 May 2023

Volker Stocker, William Lehr and Georgios Smaragdakis

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that…

Abstract

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that offers a wealth of natural experiments and produced new data about broadband, clouds, and the Internet in times of crisis. In this chapter, we characterise and evaluate the evolving impact of the global COVID-19 crisis on traffic patterns and loads and the impact of those on Internet performance from multiple perspectives. While we place a particular focus on deriving insights into how we can better respond to crises and better plan for the post-COVID-19 ‘new normal’, we analyse the impact on and the responses by different actors of the Internet ecosystem across different jurisdictions. With a focus on the USA and Europe, we examine the responses of both public and private actors, with the latter including content and cloud providers, content delivery networks, and Internet service providers (ISPs). This chapter makes two contributions: first, we derive lessons learned for a future post-COVID-19 world to inform non-networking spheres and policy-making; second, the insights gained assist the networking community in better planning for the future.

Details

Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications and the Internet
Type: Book
ISBN: 978-1-80262-050-4

Keywords

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 17 August 2021

Mike Hynes

Abstract

Details

The Social, Cultural and Environmental Costs of Hyper-Connectivity: Sleeping Through the Revolution
Type: Book
ISBN: 978-1-83909-976-2

Open Access
Book part
Publication date: 17 August 2021

Mike Hynes

Abstract

Details

The Social, Cultural and Environmental Costs of Hyper-Connectivity: Sleeping Through the Revolution
Type: Book
ISBN: 978-1-83909-976-2

Open Access
Book part
Publication date: 4 June 2021

Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…

Abstract

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 18 July 2022

Fabian Akkerman, Eduardo Lalla-Ruiz, Martijn Mes and Taco Spitters

Cross-docking is a supply chain distribution and logistics strategy for which less-than-truckload shipments are consolidated into full-truckload shipments. Goods are stored up to…

Abstract

Cross-docking is a supply chain distribution and logistics strategy for which less-than-truckload shipments are consolidated into full-truckload shipments. Goods are stored up to a maximum of 24 hours in a cross-docking terminal. In this chapter, we build on the literature review by Ladier and Alpan (2016), who reviewed cross-docking research and conducted interviews with cross-docking managers to find research gaps and provide recommendations for future research. We conduct a systematic literature review, following the framework by Ladier and Alpan (2016), on cross-docking literature from 2015 up to 2020. We focus on papers that consider the intersection of research and industry, e.g., case studies or studies presenting real-world data. We investigate whether the research has changed according to the recommendations of Ladier and Alpan (2016). Additionally, we examine the adoption of Industry 4.0 practices in cross-docking research, e.g., related to features of the physical internet, the Internet of Things and cyber-physical systems in cross-docking methodologies or case studies. We conclude that only small adaptations have been done based on the recommendations of Ladier and Alpan (2016), but we see growing attention for Industry 4.0 concepts in cross-docking, especially for physical internet hubs.

Open Access
Book part
Publication date: 4 May 2018

Dedi Satria, Syaifuddin Yana, Rizal Munadi and Saumi Syahreza

Purpose – The purpose of this paper is to develop prototype of the information system of the flood monitoring based internet of things (IoT). This prototype serves to assist users…

Abstract

Purpose – The purpose of this paper is to develop prototype of the information system of the flood monitoring based internet of things (IoT). This prototype serves to assist users in accessing flood levels through water levels and rainy weather conditions.

Design/Methodology/Approach – This paper presents the design of information system of flood monitoring based internet of things (IoT). This prototype study acquires water level and rainfall data using ultrasonic sensors HC-SR04 and rain sensor. Data of flood height and rain levels detected by sensors are processed using Arduino Uno Microcontroller to produce output data in HTML format. Flood altitude information system and rainy weather from the microcontroller are distributed using ethernet module as web server integrated with Wireless N Router TL-MR3020 as a gateway path to the user.

Findings – This research produces a prototype of web-based flood monitoring information system that has been able to distribute data of flood height and rainy weather in real time.

Research Limitations/Implications – In the implementation of measurement, the information system only accesses one flood detector or one flooded location.

Practical Implications – This research produces a prototype of web-based flood monitoring information system that has been able to distribute data of flood height and rainy weather in real time.

Originality/Value – System prototype is the first development that uses internet of things (IoTs) method in real time web-based flood measurement with information in the form of flood hazard information in the form of water level and rainy weather conditions.

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 May 2018

Sri Safrina Dewi, Dedi Satria, Elin Yusibani and Didik Sugiyanto

Purpose – The purpose of this paper is to develop prototype of the web-based home fire early warning system using Wiznet W5500 Ethernet module. This system protocol helps users in…

Abstract

Purpose – The purpose of this paper is to develop prototype of the web-based home fire early warning system using Wiznet W5500 Ethernet module. This system protocol helps users in sending information of fire through the internet with the internet of things (IoT) method using Wiznet Ethernet module as communication media to the user.

Design/Methodology/Approach – This paper presents the design of web-based home fire early warning system using Wiznet W5500 Ethernet module. The system prototype is built using flame sensors, MQ-02 smoke sensors, and LM35 temperature sensors as input components. While on the processor side using Arduino Uno microcontroller as sensor data processing. Processed data is sent to the Ethernet module as a web server resulting in a web-based early warning information system with an alarm notification on the browser along with home location status information and sensor data.

Findings – This research produces a prototype of the web-based home fire early warning system using Wiznet W5500 Ethernet module that has been able to provide notification to the security officer housing.

Research Limitations/Implications – In the implementation of measurement, the information system only accesses one house detector or one fire location.

Practical Implications – This research produces a prototype of the web-based home fire early warning system using Wiznet W5500 Ethernet module that has been able to distribute data of temperature, smoke, and fire.

Originality/Value – The development of fire monitoring systems using flame sensors, smoke sensors and integrated temperature sensors in internet-based communication systems of things via the Internet W5500 does not appear to have been published yet.

Open Access
Book part
Publication date: 17 August 2021

Mike Hynes

Abstract

Details

The Social, Cultural and Environmental Costs of Hyper-Connectivity: Sleeping Through the Revolution
Type: Book
ISBN: 978-1-83909-976-2

1 – 10 of 260