Search results

1 – 10 of over 16000
Article
Publication date: 1 February 2005

David C. Chou, David C. Yen and Amy Y. Chou

To identify the content of virtual private network, the suitability of virtual private network for e‐commerce transactions, and the economics issue of virtual private network.

3186

Abstract

Purpose

To identify the content of virtual private network, the suitability of virtual private network for e‐commerce transactions, and the economics issue of virtual private network.

Design/methodology/approach

A range of virtual private network concepts and technologies are identified and compared. The capability, suitability, and pros and cons of adopting virtual private network for electronic commerce are discussed. An economic analysis is used to compare the cost and benefit of adopting virtual private network in organizations.

Findings

This paper provides information about virtual private network technology. It also indicates the advantages and disadvantages of adopting virtual private network for electronic commerce practices. The economic analysis provides a real example of technology adoption decision making. Strategic implications of adopting virtual private network are detected.

Practical implications

The economic analysis on adopting virtual private network provides an example of information technology selection decision for the electronic commerce community.

Originality/value

This paper provides an economic approach to analyzing the decision process for information technology adoption. It suggests that the integration of virtual private network into electronic commerce architecture would perform secure and inexpensive online transactions for adopters of this new technology.

Details

Industrial Management & Data Systems, vol. 105 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

Open Access
Book part
Publication date: 9 May 2023

Volker Stocker, William Lehr and Georgios Smaragdakis

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that…

Abstract

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that offers a wealth of natural experiments and produced new data about broadband, clouds, and the Internet in times of crisis. In this chapter, we characterise and evaluate the evolving impact of the global COVID-19 crisis on traffic patterns and loads and the impact of those on Internet performance from multiple perspectives. While we place a particular focus on deriving insights into how we can better respond to crises and better plan for the post-COVID-19 ‘new normal’, we analyse the impact on and the responses by different actors of the Internet ecosystem across different jurisdictions. With a focus on the USA and Europe, we examine the responses of both public and private actors, with the latter including content and cloud providers, content delivery networks, and Internet service providers (ISPs). This chapter makes two contributions: first, we derive lessons learned for a future post-COVID-19 world to inform non-networking spheres and policy-making; second, the insights gained assist the networking community in better planning for the future.

Details

Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications and the Internet
Type: Book
ISBN: 978-1-80262-050-4

Keywords

Article
Publication date: 1 August 2000

Steve Hawkins, David C. Yen and David C. Chou

Internet security is an important issue today. Corporate data are at risk when they are exposed to the Internet. Current technologies provide a number of ways to secure data…

10726

Abstract

Internet security is an important issue today. Corporate data are at risk when they are exposed to the Internet. Current technologies provide a number of ways to secure data transmission and storage, including encryption, firewalls, and private networks. This article discusses the awareness of Internet security and challenges faced in both the public and the private sectors.

Details

Information Management & Computer Security, vol. 8 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 4 September 2007

Karri Huhtanen, Bilhanan Silverajan and Jarmo Harju

The number of home networks, as well as the number of services and hosts in them, is increasing. Often home users cannot get public IPv4 network allocations from service providers…

Abstract

Purpose

The number of home networks, as well as the number of services and hosts in them, is increasing. Often home users cannot get public IPv4 network allocations from service providers and are forced to use network address translation (NAT) and port forwarding to solve connectivity issues to the different home services. This paper seeks to introduce a secure connectivity solution utilising both IPv6 and IPv6 transition mechanisms in cooperation with existing virtual private network (VPN) solutions.

Design/methodology/approach

The proposed solution to avoid route conflicts and other problems with private IPv4 address space collisions is to utilise 6to4, an IPv6 transition mechanism, to obtain routable IPv6 network addresses first for the home network and services and then, to utilise the same IPv6 network for connectivity by bridging it over a VPN connection to the mobile terminal.

Findings

The paper finds that the adoption of this solution and these technologies will depend on how useful they are seen by vendors or service providers and included in their products. Regular vendors and service providers probably want to wait until there is a greater customer need. On the other hand, customers do not know about the possibilities before they are shown to them in practice. The best approach to this challenge is to find a cooperating vendor, or even better, a service provider willing to develop the concept further and to integrate it into the devices and services they are already offering.

Originality/value

The technologies for enhancing home service connectivity are already available. In the proof‐of‐concept implementation the paper has shown that all these components can be integrated and utilised to build home routers for present and future home networks. The technical disadvantages and challenges are solvable with further work and the whole concept is ready to be turned into products and services. As indicated in the paper, one of the issues for further work is to find and convince a vendor or service provider to integrate the proposed solution in their home router.

Details

Campus-Wide Information Systems, vol. 24 no. 4
Type: Research Article
ISSN: 1065-0741

Keywords

Book part
Publication date: 22 November 2012

Denise M. Pheils

Virtualization is the simulation or emulation of computer resources to the user (Grauer, n.d.; Simpson, 2008). This chapter discusses virtualization as a viable classroom…

Abstract

Virtualization is the simulation or emulation of computer resources to the user (Grauer, n.d.; Simpson, 2008). This chapter discusses virtualization as a viable classroom methodology for providing students with course relevant hands-on experience (Simpson, 2008) while synchronizing course specific content in traditional on-ground and online courses (Pheils, 2010). More specifically, this chapter provides an overview of virtualization, detailing several open source tools, and offering possible applications for incorporation into other courses including free resources for sample content. Proof-of-concept is established through examples of successful usage at two colleges. The adoption of virtualization within course development may provide a solution that spans disciplines and offers students the ability to practice and further their studies beyond the classroom.

Details

Increasing Student Engagement and Retention Using Immersive Interfaces: Virtual Worlds, Gaming, and Simulation
Type: Book
ISBN: 978-1-78190-241-7

Article
Publication date: 1 February 1988

Larry L. Learn

This article provides a broad overview of telecommunications and network‐related technologies. Topics covered include identification and review of network elements, analog and…

214

Abstract

This article provides a broad overview of telecommunications and network‐related technologies. Topics covered include identification and review of network elements, analog and digital signals, synchronous and asynchronous transmission formats, transmission media and equipment, transmission techniques and characteristics, multiplexing, network types, access technologies, network architectures and topologies, local‐area network technologies and attributes, protocols and protocol issues, gateways, internetworking, local networking alternatives, equipment certification, and various aspects of network management. It is intended to provide the practicing professional in the field of library and information science with a broad, up‐to‐date technical review that might serve to support and facilitate further investigation of current developments in networks and networking. Although the broad range of topics is not treated in depth, numerous references are provided for further investigation.

Details

Library Hi Tech, vol. 6 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 23 October 2007

Eduard Grasa, Sergi Figuerola, Albert López, Gabriel Junyent, Michel Savoie, Bill St Arnaud and Mathieu Lemay

Purpose – The purpose of this paper is to illustrate the advantages of using the UCLP software for network operators, advanced and regular end users in the research networking

5006

Abstract

Purpose – The purpose of this paper is to illustrate the advantages of using the UCLP software for network operators, advanced and regular end users in the research networking community. Design/methodology/approach – This paper provides an example of the deployment of UCLP in the GÉANT2/National Research and Education Networks (NRENs) scenario, and compares how network operators, advanced users and regular end users would do their work, with and without UCLP. Findings – The paper provides high‐level technical information about UCLP as well as depicting the drivers for its use in the European research networking community. Research limitations/implications – This paper does not explain the details of the deployment of the software in the GÉANT2/National Research and Education Networks (NRENs) scenario, it just explains the benefits that the deployment of the software would provide. If the deployment was to be done today, some improvements to UCLP should be done, as well as support for more equipment vendors should be added. Practical implications – UCLP could provide more flexibility to the e‐science community if it was deployed over the European research networking infrastructure, because it would isolate network users from each other while providing them an unprecedented degree of control over the network. Originality/value – Nowadays, several control/management solutions for networks exist, but none that is capable of partitioning a physical network into slices and handoff its management to the users, like UCLP does. This is the first UCLP paper that studies a hypothetical deployment of UCLP in the European research networking scenario, and evaluates the drivers and implications of such a deployment.

Details

Internet Research, vol. 17 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 4 April 2008

Giuseppe Portelli, Giovanni Malnati and Fabio Forno

Home networks enable, potentially, an increased level of integration among appliances present in the house, enabling an ubiquitous control of devices and simplifying man/machine…

Abstract

Purpose

Home networks enable, potentially, an increased level of integration among appliances present in the house, enabling an ubiquitous control of devices and simplifying man/machine interactions. This paper aims to present the home network interoperability (HoNeY) platform.

Design/methodology/approach

Home networks and their challenges are analyzed, then the technology that constitutes the base for the present implementation is briefly revised. The HoNeY platform is presented, in terms of its architecture, implementation, and constraints.

Findings

The HoNeY platform is an multimedia home platform (MHP)‐based, low‐complex, cost‐effective architecture for automatic discovery, configuration, and dynamic access to distributed services in home environments.

Originality/value

This paper describes HoNeY, a mechanism of service discovery and code mobility designed for interoperability of devices connected to home networks, compatible with the MHP standard.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 August 1994

Graham P. Bell and David Kavanagh

If you understand the fundamental objectives of your organization andhow your telecommunication network assists you to achieve theseobjectives you will have a sound basis for the…

892

Abstract

If you understand the fundamental objectives of your organization and how your telecommunication network assists you to achieve these objectives you will have a sound basis for the development of network security. The types of potential interruption must also be understood remembering that small, intermittent failures can be worse than complete collapse. Risk exposures can be prioritized and contingency plans established. Duplicated carrier communications, private network triangulation, and virtual private networks are considered as well as ISDN and switched backup services. The consolidation of discrete services to make switching to alternative sites much easier is also suggested.

Details

Information Management & Computer Security, vol. 2 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Book part
Publication date: 11 October 2023

Javier Peña Capobianco

The objective of this chapter is to identify the key characteristics of Global Services businesses that will thrive and achieve success in the future. These factors are integrated…

Abstract

The objective of this chapter is to identify the key characteristics of Global Services businesses that will thrive and achieve success in the future. These factors are integrated into three main pillars, which we refer to as the Triple-Win. The first and most obvious pillar is technology as a tool. The second pillar is the design and sustainability of the business model, without which the previous factor would be merely a cost and not an investment. And last but not the least, there is the purpose which gives meaning to the proposal, focusing on the human being and their environment. The DIDPAGA business model sits at the intersection of these three elements.

Details

The New Era of Global Services: A Framework for Successful Enterprises in Business Services and IT
Type: Book
ISBN: 978-1-83753-627-6

Keywords

1 – 10 of over 16000