8,438 results on '"INTERNET service providers"'
Search Results
2. Working with a robot in hospital and long-term care homes: staff experience.
- Author
-
Ren, Lily Haopu, Wong, Karen Lok Yi, Wong, Joey, Kleiss, Sarah, Berndt, Annette, Mann, Jim, Hussein, Ali, Hu, Grace, Wong, Lily, Khong, Ruth, Fu, Jason, Ahmed, Nazia, Nolte, Julia, and Hung, Lillian
- Subjects
- *
SENILE dementia treatment , *WORK , *NURSES , *TEAMS in the workplace , *PATIENTS' families , *RESEARCH funding , *FOCUS groups , *SOCIAL workers , *INSTITUTIONAL care , *QUALITATIVE research , *PERSONNEL management , *MEDICAL personnel , *AUTONOMY (Psychology) , *WIRELESS communications , *INTERVIEWING , *FIELD notes (Science) , *LEADERSHIP , *HOSPITALS , *SERVICES for caregivers , *JUDGMENT sampling , *GOAL (Psychology) , *TELEMEDICINE , *NURSING care facilities , *THEMATIC analysis , *SOUND recordings , *ATTITUDES of medical personnel , *ROBOTICS , *RESEARCH methodology , *TECHNOLOGY , *PATIENT-professional relations , *HEALTH facilities , *INTERNET service providers , *EXPERIENTIAL learning - Abstract
Although there is a growing literature on the use of telepresence robots in institutional dementia care settings, limited research focused on the perspectives of frontline staff members who deliver dementia care. Our objective was to understand staff perspectives on using telepresence robots to support residents with dementia and their families. Guided by the Consolidated Framework for Implementation Research, we conducted four focus groups and 11 semi-structured interviews across four long-term care (LTC) homes and one hospital in Canada. We included 22 interdisciplinary staff members (e.g., registered nurses, social workers, occupational therapists, recreational therapists) to understand their experiences with telepresence robots. Thematic analysis identified three key themes: 1) Staff Training and Support; 2) Robot Features; 3) Environmental dynamics for Implementation. Our results underscore the imperative of structural support at micro-, meso- and macro-levels for staff in dementia care settings to effectively implement technology. This study contributes to future research and practice by elucidating factors facilitating staff involvement in technology research, integrating staff voices into technology implementation planning, and devising strategies to provide structural support to staff, care teams, and care homes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. A mixed-methods pilot examination of Montana, North Dakota nurse practitioner telepresence behaviors through web-camera eye-tracking and qualitative descriptive interviews.
- Author
-
Johnson, Elizabeth A. and Strauch, Kimberly A.
- Subjects
- *
WORK , *NURSE-patient relationships , *CONTINUING education units , *DIGITAL technology , *PROMPTS (Psychology) , *MENTAL health , *OCCUPATIONAL adaptation , *PATIENT safety , *MEDICAL quality control , *PILOT projects , *INTERVIEWING , *DESCRIPTIVE statistics , *NURSING , *PSYCHIATRIC nurses , *THEMATIC analysis , *SOCIAL learning theory , *WORKFLOW , *NURSES' attitudes , *RESEARCH methodology , *CONCEPTUAL structures , *ANALYSIS of variance , *SIMULATED patients , *PSYCHIATRIC nursing , *TELENURSING , *VISUAL perception , *AUDITORY perception , *BODY movement , *DATA analysis software , *QUALITY assurance , *INTERNET service providers , *EXPERIENTIAL learning , *EYE movements , *FACIAL expression , *VIDEO recording - Abstract
Background: The use of telehealth for mental health--related encounters has increased exponentially since the COVID-19 pandemic. However, little is known how nurse practitioners (NPs) in rural areas establish connection and presence with patients through telehealth. Purpose: To leverage web-camera eye-tracking technology coupled with qualitative interviews to better understand rural NPs' perceptions, beliefs, experiences, and visual cues of connection and presence during mental health-- related telehealth encounters. Methods: This mixed-methods study employed web-camera eye-tracking technology to measure eye contact, facial/body movements with microexpressions, and auditory expressions during a simulated mental health--related telehealth visit. A qualitative descriptive methodology was used to conduct semistructured interviews with participants regarding utilization of telehealth in rural mental health care delivery. Sticky software, R, and STATA were used for the quantitative eye-tracking and demographic data analyses. Qualitative findings were analyzed using inductive thematic analysis. Results: Ten NPs participated in the eye-tracking aspect of the study; among them, three completed semistructured interviews. Eye-tracking areas of interest were significant for the number of fixations (p = .005); number of visits (p < .001); time until notice (p < .001); and time viewed (p < .001). The category Workflow had the greatest number of thematic units (n = 21) derived from semistructured interviews. Conclusions: Although an accessible means of obtaining data, web-camera eye tracking poses challenges with data usability. This prompts further attention to research, optimizing the telehealth milieu to lessen patient and provider frustrations with technological or environmental issues. Implications: Nurse practitioners provide a key voice in the design and deployment of telehealth platforms congruent with the comprehensive assessment and presence of remote care delivery. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Driver-Passenger matching problem on online transportation using goal programming.
- Author
-
Handojo, Andreas, Pujawan, Nyoman, Santosa, Budi, and Singgih, Moses Laksono
- Subjects
- *
GOAL programming , *INTERNET service providers , *PUBLIC transit , *SATISFACTION , *CHOICE of transportation - Abstract
Currently, online transportation is one of the choices for public transportation. The uniqueness of this online transportation business is that both passengers and drivers can appear anywhere and anytime. This creates difficulties for online transportation service providers in matching drivers and passengers in order to continue to increase service user satisfaction. The service provider must consider factors such as the duration of the pickup, the distance of the pickup, and the rating of the driver. This study aims to include these various factors in the decision-making process to match drivers and passengers using the goal programming method. The test was carried out by comparing the maximum distance limitation of the pick-up duration to 10 and 15 minutes. From the test results, it was found that the number of matches obtained increased by 11.6%, but with the consequence that the average pickup duration increased by 58.8%, and the average pick-up distance increased by 81.8%. Meanwhile, the driver rating obtained decreased by 5%. This needs to be considered because the greater the duration, the longer the passengers wait for pickup. The farther the distance traveled, the greater the costs incurred by the driver in picking him up. This will affect the loyalty of passengers and drivers to the service. It can be concluded that the goal programming method is capable of carrying out the matching process between drivers and passengers by considering various factors. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Considerations for paediatric student‐led telepractice in speech‐language therapy: A pilot observational study from South Africa.
- Author
-
Watermeyer, Jennifer, Nattrass, Rhona, Beukes, Johanna, Madonsela, Sonto, and Scott, Megan
- Subjects
- *
SPEECH therapists , *QUALITATIVE research , *OCCUPATIONAL adaptation , *MEDICAL technology , *RESEARCH funding , *HEALTH occupations students , *PILOT projects , *SCIENTIFIC observation , *UNIVERSITIES & colleges , *DIGITAL divide , *SOCIAL role , *DESCRIPTIVE statistics , *PEDIATRICS , *STUDENTS , *TELEMEDICINE , *THEMATIC analysis , *CLIENT relations , *INFORMATION literacy , *RESEARCH , *RESOURCE-limited settings , *SOCIAL support , *INTERNET service providers , *SPEECH therapy , *VIDEO recording - Abstract
Background: COVID‐19 necessitated emergency telepractice for student‐led speech‐language therapy clinical practicals in training institutions, with limited preparation and evidence‐based guidelines. Beyond the pandemic, practitioners and university training sites are likely to continue to offer telepractice necessitating thorough preparation for telepractice services underpinned by a comprehensive understanding of the complexities involved in online therapy. Aims: Adopting realist evaluation principles, our aim in this paper was to explore broadly what works and does not work in a set of student‐led telepractice sessions in a diverse, resource‐limited context. The broader goal of this project was to provide evidence‐based support to enhance the efficiency and success of telepractice sessions in student clinical training contexts. Methods & Procedures: We used qualitative observational methods with reflexive thematic analysis to analyse 28 video recordings and 61 observation notes of student‐led paediatric telepractice sessions from a South African university clinic as part of a pilot study. Outcomes & Results: We identified four overarching considerations for student‐led telepractice: (1) additional, specific preparation is required, (2) with greater management of technology and adaptation of tasks, especially during times of poor connectivity; (3) telepractice relies heavily on caregiver input and collaboration; and (4) promoting engagement online, holding a client's attention, building rapport and offering reinforcement are critical skills that are complicated by the lack of face‐to‐face contact. Conclusions & Implications: Our findings indicate that telepractice pedagogy needs to be explicitly taught and students require practical assistance as they learn how to use this service delivery approach effectively. There are some aspects peculiar to telepractice that require unique consideration and planning, especially in contexts where service providers and users may be unfamiliar with this form of service provision. The findings of this pilot study can be used by clinical educators and student clinicians to enhance clinical training opportunities involving telepractice. WHAT THIS PAPER ADDS: What is already known on this subject: Many speech‐language therapy (SLT) student clinicians had to transition quickly to telepractice service provision during COVID‐19 with limited existing guidelines and support, especially in contexts where teletherapy is typically non‐existent or difficult to access. Although there is some literature available on experiences of telepractice, there is very little evidence‐based research which explores the mechanics of such sessions in real‐time and which offers practical support to student clinicians and clinical educators engaging in this mode of service delivery. What this study adds: This pilot study examined video‐recorded, student‐led, paediatric, speech‐language teletherapy sessions to understand challenges and considerations involved in using telepractice as a clinical training tool. Findings show that additional preparation for telepractice sessions is required, particularly in contexts of poor digital literacy; students must learn to manage technology, especially when connectivity poses a challenge, and adapt therapy tasks for online work with clients; telepractice relies heavily on caregiver input and collaboration, more so than in in‐person consultations, and this relationship requires careful management; and promoting engagement online, holding a client's attention, building rapport and offering reinforcement are critical yet challenging skills in telepractice. What are the potential or actual clinical implications of this work?: Our findings highlight a need to teach telepractice pedagogy explicitly and support students practically in learning how to provide therapy effectively via this mode of service delivery. Observational methods for studying practices in recorded telepractice sessions can be used as part of a reflective approach to clinical training. Using already available data allowed us to unpack the 'messy reality' of clinical training using telepractice. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Defending medical facilities from cyber attacks: critical issues with the principle of due diligence in international law.
- Author
-
Katagiri, Nori
- Subjects
- *
CYBERTERRORISM , *HEALTH facilities , *DUE diligence , *INTERNET service providers , *INTERNATIONAL law , *COMPUTER hacking , *INTERNET security - Abstract
I explore reasons why existing defense has failed to prevent cyber attacks on medical facilities. I look into one of the least studied notions of cyberspace behavior known as the principle of due diligence. The principle posits that states should do their best not to allow their territory to be used for cyber operations that produce adverse consequences for other states. I point out three reasons why the principle has failed to protect medical facilities. First, the principle of due diligence suffers from flaws with its enforcement mechanism and applicability to nonstate hackers. Second, the principle suffers from the lack of specificity in that it has never clarified what potential targets are supposed to be spared. Finally, the principle is prone to fail to mobilize states enmeshed with providers of network infrastructure – internet service providers (ISPs) – to practice due diligence. In sum, my analysis shows that factors that are external to the principle are as critical as internal ones in shaping the principle's ineffectiveness. While the principle is not the only cause of failure to prevent attacks on medical facilities, it is one of the reasons for the failure. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Access and Use of Digital Information Resources by Students with Vision Impairment: Challenges, Prospects and Expected Role of Libraries.
- Author
-
Akbar, Azeem, Jabbar, Abdul, Saleem, Qurat UI Ain, and Ashiq, Murtaza
- Subjects
- *
PSYCHOLOGY of librarians , *CELL phones , *DATABASES , *COMPUTER software , *RESEARCH , *TEACHER-student relationships , *DIGITAL libraries , *TEACHING , *DIGITAL technology , *INFORMATION services , *ACADEMIC libraries , *RESEARCH methodology , *TIME , *MOBILE apps , *INTERVIEWING , *INTERNET access , *STUDENTS with disabilities , *QUALITATIVE research , *PHENOMENOLOGY , *LIBRARY public services , *LEARNING , *ACCESS to information , *INFORMATION resources , *PSYCHOSOCIAL factors , *UNIVERSITIES & colleges , *GOVERNMENT agencies , *MASTERS programs (Higher education) , *SOUND recordings , *SEARCH engines , *DECISION making , *VISION disorders , *INFORMATION needs , *NEEDS assessment , *DATA analysis software , *MANAGEMENT , *GRADUATE students , *INTERNET service providers , *PORTABLE computers , *READING - Abstract
The use of information and communication technologies (ICTs) has considerably increased among students, including students with vision impairment (SVI). There has been limited work on the information and digital needs of people with disabilities, particularly SVI who were studying for their masters or MPhil and were involved in research activities in Pakistan. This study is an effort to explore various obstacles, expected services and support for SVIs from their universities, libraries, and Higher Education Commission (HEC) Pakistan. This study is qualitative in nature, and an interview guide was used to collect data from the participants in Lahore, Pakistan. The results of this study showed that students with vision impairment use a variety of digital information resources. However, very few use the higher education commission of Pakistan subscribed databases due to restricted access and complex interfaces. The hindrances include lack of university support, limited training opportunities, non-availability of digital library services, and others. The participants highlighted a variety of needed library services and support from their departmental as well as central libraries. It is assumed that the results of this study will help the relevant authorities to make friendly policies and improve library services to facilitate the SVI. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. PaaS platform security enhancement using fuzzy based access control and trust based signature.
- Author
-
Pathakamuri, Srinivasulu, Reddy, B. V. Ramana, and Kumar, A. P. Siva
- Subjects
- *
COMPUTING platforms , *INTERNET service providers , *ACCESS control , *PUBLIC safety , *CLOUD computing - Abstract
Platform‐as‐a‐Service (PaaS) is one of the cloud computing services which will be offered to the clients through the virtualization platform. The problem is constructed in the PaaS platform effectively excluding internet service suppliers which do not meet highly secure standards, and so security issues can be a significant a hurdle to online computation. To address the aforementioned issues, the suggested method primarily concentrated proceeding the safety of PaaS infrastructure by using a novel fuzzy based access control technique, in which the information source is realized by using CDO security feature. To further enhance the security, security using trust based signature has been used in which the class and packet filter for each specified authorization were mapped to our class by modifying the security feature code. This public key will be utilized for authenticate that transaction relevant signature if the identity provider (IdP) has provided public safety data about this same two major components represents this little token on whose trusted trademark components are built put, that is, the entire item or even the claims contained. The suggested technique outperforms other current methods in terms of several performance parameters, with a high throughput of 14, CPU utilization of 12.5, and a low execution time of 5.2 s. The proposed 'PaaS platform security enhancement with the use of fuzzy and trust‐based signatures' provides high throughput and low execution time. This research work proposes a novel approach to enhancing the security of PaaS infrastructure, which is offered to clients through the virtualization platform in cloud computing. The current problem with PaaS is that it excludes internet service providers that do not meet high‐security standards, which poses a significant challenge to online computation. The suggested approach focuses on improving the safety of the PaaS platform by employing a fuzzy‐based access control technique, using the connectionless data objects security feature as the information source. To further strengthen security, the approach utilizes a trust‐based signature technique where the class and packet filter for each authorization are mapped to the class of the proposed method by modifying the security feature code. The proposed public key is then used to authenticate the transaction relevant signature, provided the IdP has given public safety data about these two components of the token on which Trusted Trademark components are built, that is, the entire item or even the claims contained within it. The proposed approach outperforms current methods in terms of several performance parameters, such as a high throughput of 14, a high CPU utilization of 12.5, and a low execution time of 5.2 s. In summary, the proposed PaaS platform security enhancement using fuzzy and trust‐based signatures provides an effective way to achieve high throughput and low execution time while ensuring platform security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. A FINANCIAL FEASIBILITY STUDY OF FIBER OPTIC INFRASTRUCTURE IN REGION A -- WEST JAVA PT XYZ -- A CASE STUDY.
- Author
-
Gustinov, Roberto and Murtaqi, Isrochmani
- Subjects
- *
INFRASTRUCTURE (Economics) , *FIBER optic cables , *FEASIBILITY studies , *INTERNET service providers , *QUALITATIVE research - Abstract
PT XYZ is a provider of high-quality internet service via fiber optic cables. The company plans to develop a new 500 kilometer fiber optic network in Region A -West Java to serve customer segments business to business (B2B), business to government (B2G), and business to consumer (B2C). This article intends to conduct a financial feasibility study in connection with the development of the project. This research method is qualitative with a case study type. The nature of this research is descriptive. This research was conducted in 2023 at PT XYZ. The types of data used in this research are primary data and secondary data. Primary data collection techniques use in-depth interview techniques; while the secondary data collection technique uses the study-desk method. The data analysis method in this article uses a financial feasibility study, with five financial analysis tools, namely NPV, IRR, DPP, PI, and WACC. The research results show that the development of fiber optic infrastructure in Region A by PT XYZ is feasible based on NPV, IRR, DPP, PI and WACC calculations. The implication of this research is, for the management of PT XYZ, to make it even more feasible, steps should be taken in accordance with controlling action, both controlling revenue and controlling expenditure. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Towards adding digital forensics capabilities in software defined networking based moving target defense.
- Author
-
Hyder, Muhammad Faraz, Fatima, Tasbiha, and Arshad, Saadia
- Subjects
- *
DIGITAL forensics , *SOFTWARE-defined networking , *FORENSIC sciences , *TRAVEL regulations , *INTERNET service providers , *DENIAL of service attacks - Abstract
Moving Target Defense (MTD) is a security technique for Software Defined Networks (SDN) to change the attack surface constantly. Although MTD is an effective technique, it makes the digital forensics procedure challenging due to high transitions in the system state. There is an ever-increasing requirement for SDN forensics due to the increasing number of cyberattacks and the adoption of SDN by large-scale cloud service providers, telecommunication operators, and internet service providers. In this paper, we have proposed a digital forensics scheme for MTD-based SDN to record every movement of the MTD for collecting attack-related evidence, especially the attacker (attack source), to augment the forensics investigation. The proposed technique consists of a three-level logging mechanism. The first one is the native logging technique of ONOS. The second is a Java-based logging application called "Java ONOS Logs Collector (JOLC)", developed to capture MTD-based SDN logs. Lastly, we utilized the Fluentd unified logging tool to dig out evidential data from MTD logs. The experimental testbed comprises an ONOS SDN controller, Mininet, and an event-based MTD application running over SDN using JSON FlowRule scripts on the ONOS controller while using sflow-rt to detect the level of attack/number of packets sent by the attacker. The native ONOS logging mechanism provides initial-level artifacts. The developed JOLC application creates separate files for ONOS and Mininet/host machine logs stored with the current timestamp. Fluentd generates a single file for the SDN controller, Mininet, and host machine logs, along with the flow rule entry into the SDN controller. Experimental results confirmed that our proposed multi-level forensics technique successfully collected all the relevant records. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Lifetime maximization energy‐aware routing protocol for route optimization to improve quality of service in wireless sensor networks.
- Author
-
R, Vinod Kumar, G, Kavithaa, and D, Jayanthi
- Subjects
- *
WIRELESS sensor networks , *QUALITY of service , *INTERNET service providers , *RANGE management , *ROUTING systems - Abstract
Wireless sensor networks (WSNs) are part of the short‐term networks, including sensitivity, computation, and Wi‐Fi connectivity capability. Many routing, range management, and log transfer protocols are specifically designed for WSN. The previous method showed less efficiency in routing management. The proposed lifetime maximization energy‐aware routing protocol (LTMEARP) protocol is known for its high routing efficiency, giving a higher lifetime and throughput performance. The requirement for a routing system approach is advanced with Internet service provider's protocols by recalculating the routing table after the link stage's substitution worldwide, leading to responses and connection failures by sharing important data after traffic. LTMEARP routing protocol has assured high availability routing performances during traffic conditions. LTMEARP support sends homogeneous and expanded nodes. Analyze a new approach to routing‐based selection algorithms for homogeneous node WSNs. The number of connections is limited and must be adjusted using separate paths and header packets to meet the user's network access location. The results show that the LTMEARP has achieved quality without introducing excessive network access program overhead, which deals with the study of communication and the benefits and problems with the performance of each routing technology. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Almost priceless: how internet access impacts U.S. farmer leaders' precision agriculture technology perceptions.
- Author
-
Greig, Jamie, Nelson, Hannah, Clardy, Grace, and Douglas, Mika
- Subjects
- *
AGRICULTURAL technology , *PRECISION farming , *INTERNET access , *DIFFUSION of innovations theory , *AGRICULTURE , *INTERNET service providers , *DIGITAL divide - Abstract
Despite a recent narrowing of the digital divide, there remains a lag in adopting Precision Agriculture Technology (PAT). Based on structuration theory and diffusion of innovations theory, the present study uses semi-structured interviews with forty board members from two U.S. national agricultural boards to determine how internet access impacts farming leaders' knowledge and perceptions of farming PAT innovations. Farming leaders' responses suggest a lack of competition among internet service providers within areas, a reliance on cellular data to complete farming operations, limits to available internet infrastructure, and low perceived technology knowledge. Farming leaders, especially those with high perceived knowledge, noted using various farming technologies that assisted with business operations, entertainment, and social communications. Overall, many participants were willing to adopt more farming technology if they had better internet services and more technological knowledge. Farming PAT diffusion is limited by a lack of access to resources, such as knowledge, workforce, and infrastructure, even among those who tend to be more resource-rich, like farming leaders. These findings highlight how a lack of resources limits a farmer's ability to express agency over the technology they adopt and, by extension, their business operations. These findings have implications for policymakers and stakeholders. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. A system modeling approach to simulate post-COVID-19 student intention to use online learning platforms.
- Author
-
Vatsa, Ruchika and Bhatnagar, Purnima
- Subjects
- *
ONLINE education , *INTERNET access , *COVID-19 pandemic , *INTERNET service providers , *INTENTION - Abstract
Purpose: The purpose of this paper is to apply systems modeling to explore the usability of the online learning platform in the future compared to its usefulness during the pandemic era. Design/methodology/approach: The applied systems research methodology has been used to develop a stock-flow model encompassing enablers and constraints for learning platform usage from the primary data collected through a survey of 163 respondents. Findings: The model simulation observed promising trends over one year for online learning platforms provided the challenges are reduced in seven to eight months. Challenges linked to the Internet and interaction need must be removed for future usage. Research limitations/implications: The results of the survey and model simulation suggest actions for product planning and development of online learning platforms based on customer insights. Product customization and feature enhancement will be required for the continued usability of online learning products. Actions for Internet service providers are to capture the online learner market by removing issues of Internet access bandwidth, and quality of content. Also, there should be sufficient teacher–student interaction in the online learning mode. Originality/value: This is an original study using systems modeling to evaluate factors contributing to students' intention to use online learning conducted at Dayalbagh Educational Institute (Deemed to be University) Dayalbagh Agra, UP, India, 282005. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Closing Our Digital Divides: Seeking a more efficient path to improved broadband Internet access.
- Author
-
Narechania, Tejas N.
- Subjects
- *
DIGITAL divide , *INTERNET access , *INTERNET service providers , *FEDERAL government , *INFORMATION superhighway - Abstract
This article examines affordability and availability of broadband internet with an overall theme of the digital divide. While United States President Joseph Biden argues broadband internet cost should be lowered, internet serviced providers (ISPs) cite geographic differences as affecting broadband infrastructure and thus cost. Topics include economic competition between ISPs, the role of racism in internet access in the US, and the government’s plan to improve broadband infrastructure.
- Published
- 2023
- Full Text
- View/download PDF
15. RWA for multi-domain optical network using OBGP.
- Author
-
Anusha, Ch. Devi and Raju, K. Govinda
- Subjects
- *
BGP (Computer network protocol) , *WAVELENGTH assignment , *NEXT generation networks , *INTERNET service providers - Abstract
The Next Generation Networks (NGN) means All-Optic-Networks needed seamless connectivity between heterogeneous (multi-domain) networks maintained by different Internet Service Providers (ISP). Routing and Wavelength Assignment (RWA) certainly be required for packet routing from source to destination in this All-Optic multi-domain network. To route in a single Autonomous System (AS) Open Shortest Path First (OSPF) lonely can perform, but for a Network with multiple Autonomous Systems (multi-domain) may require an algorithm that satisfies Wavelength Continuity Constraint (WCC) for RWA and also need to maintain communication with Border Gateways. Optical Border Gateway Protocol (OBGP) with OSPF and WCC can meet the requirements. The proposed algorithm is simulated in various scenarios like SISO, SIMO, MISO, and MIMO. Few metrics like best shortest path, the wavelength available for packet routing, path length and latency are identified for mentioned scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. Measuring Library Broadband Networks to Address Knowledge Gaps and Data Caps.
- Author
-
Ritzo, Chris, Rhinesmith, Colin, and Jie Jiang
- Subjects
- *
DIGITAL libraries , *FOCUS groups , *DIGITAL divide , *RURAL conditions , *DIGITAL technology , *LIBRARY technical services , *QUANTITATIVE research , *INTERVIEWING , *RACE , *QUALITATIVE research , *CONCEPTUAL structures , *SURVEYS , *INTERNET access , *QUALITY assurance , *RESEARCH funding , *ACCESS to information , *METROPOLITAN areas , *ETHNIC groups , *PUBLIC libraries , *INTERNET service providers , *LONGITUDINAL method , *INFORMATION technology - Abstract
In this paper, we present findings from a three-year research project funded by the US Institute of Museum and Library Services that examined how advanced broadband measurement capabilities can support the infrastructure and services needed to respond to the digital demands of public library users across the US. Previous studies have identified the ongoing broadband challenges of public libraries while also highlighting the increasing digital expectations of their patrons. However, few large-scale research efforts have collected automated, longitudinal measurement data on library broadband speeds and quality of service at a local, granular level inside public libraries over time, including when buildings are closed. This research seeks to address this gap in the literature through the following research question: How can public libraries utilize broadband measurement tools to develop a better understanding of the broadband speeds and quality of service that public libraries receive? In response, quantitative measurement data were gathered from an open-source broadband measurement system that was both developed for the research and deployed at 30 public libraries across the US. Findings from our analysis of the data revealed that Ookla measurements over time can confirm when the library's internet connection matches expected service levels and when they do not. When measurements are not consistent with expected service levels, libraries can observe the differences and correlate this with additional local information about the causes. Ongoing measurements conducted by the library enable local control and monitoring of this vital service and support critique and interrogation of the differences between internet measurement platforms. In addition, we learned that speed tests are useful for examining these trends but are only a small part of assessing an internet connection and how well it can be used for specific purposes. These findings have implications for state library agencies and federal policymakers interested in having access to data on observed versus advertised speeds and quality of service of public library broadband connections nationwide. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
17. Changes in consumer behavior PT. Telkomsel during the COVID-19 pandemic.
- Author
-
Effendie, Muhammad Dwi Sakti and Rachmawati, Indira
- Subjects
- *
COVID-19 pandemic , *CONSUMER behavior , *INTERNET service providers , *INTERNET access , *SOCIAL media , *JUDGMENT sampling - Published
- 2023
- Full Text
- View/download PDF
18. Trust evaluation model of power terminal based on equipment portrait.
- Author
-
Erxia Li, Zilong Han, Chaoqun Kang, Tao Yu, and Yupeng Huang
- Subjects
- *
ELECTRIC power systems , *COMPUTER network traffic , *ANOMALY detection (Computer security) , *INTERNET service providers , *SMART power grids - Abstract
As the number of power terminals continues to increase and their usage becomes more widespread, the security of power systems is under great threat. In response to the lack of effective trust evaluation methods for terminals, we propose a trust evaluation model based on equipment portraits for power terminals. First, we propose an exception evaluation method based on the network flow order and evaluate anomalous terminals by monitoring the external characteristics of network traffic. Second, we propose an exception evaluation method based on syntax and semantics. The key fields of each message are extracted, and the frequency of keywords in the message is statistically analyzed to obtain the keyword frequency and time-slot threshold for evaluating the status of the terminal. Thus, by combining the network flow order, syntax, and semantic analysis, an equipment portrait can be constructed to guarantee security of the power network terminals. We then propose a trust evaluation method based on an equipment portrait to calculate the trust values in real time. Finally, the experimental results of terminal anomaly detection show that the proposed model has a higher detection rate and lower false detection rate, as well as a higher real-time performance, which is more suitable for power terminals. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. LSAV: Lightweight source address validation in SDN to counteract IP spoofing-based DDoS attacks.
- Author
-
KARAKOÇ, Ali and ALAGÖZ, Fatih
- Subjects
- *
DENIAL of service attacks , *SOFTWARE-defined networking , *INTERNET service providers , *SYSTEMS availability , *CUSTOMER services , *BLOCK ciphers - Abstract
In this paper, we propose a design to detect and prevent IP spoofing-based distributed denial of service (DDoS) attacks on software-defined networks (SDNs). DDoS attacks are still one of the significant problems for internet service providers (ISPs) and individual users. These attacks can disrupt customer services by targeting the availability of the system, and in some cases, they can completely shut down the target infrastructure. Protecting the system against DDoS attacks is therefore crucial for ensuring the reliability and availability of internet services. To address this problem, we propose a lightweight source address validation (LSAV) framework that leverages the flexibility of SDN architecture in ISP networks and employs a lightweight filtering mechanism that considers the cost of operation to maintain high performance. Our setup for the proposed mechanism reflects client–server communication through an ISP SDN, and we use the entry points to eliminate malicious user requests targeting the systems. We then propose a novel algorithm on top of this setup to introduce a new and more efficient approach to existing mitigation methodologies. In addition to filtering the traffic against IP spoofing-based DDoS attacks, LSAV also prioritizes low resource consumption and high performance in terms of delay and bandwidth. With this approach, we believe that ISPs can effectively defend against IP spoofing-based DDoS attacks while still preserving low resource consumption for the infrastructure and high-quality internet services for their customers. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. Maximize The Use of Internet To Improve Sales of Small Businesses: Evidence from Indonesia.
- Author
-
Ruswandi, Isferianto and Ahmadi, R. A. Khaeru
- Subjects
- *
SMALL business , *DIGITAL technology , *INTERNET service providers , *ELECTRONIC commerce , *INTERNET marketing - Abstract
In today's digital era, businesses must harness the internet's full potential to improve their sales and remain competitive. Unfortunately, not all small businesses in Indonesia can improve their sales on internet. An official survey by APJII (Indonesia Internet Service Provider Association) found that estimates of sales growth of small businesses using the internet are not maximal, and some of them haven't grown in sales. On the other side, case studies showcasing successful internet-driven sales technique implementations. Therefore, this study analyzes how small businesses can maximize internet use to optimize their sales performance and explores strategies and best practices. A comprehensive analysis of literature, secondary data, usage and user behavior of the internet in Indonesia was used. By understanding and applying the insights presented in this research, small businesses have the ability to take advantage of the internet and achieve considerable increases in their sales figures. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. E-Banking Convergence and the Adopter's Behavior Changing Across EU Countries.
- Author
-
Grigorescu, Adriana, Oprisan, Oana, Lincaru, Cristina, and Pirciog, Camelia Speranta
- Subjects
- *
ONLINE banking , *BEHAVIOR modification , *INTERNET service providers , *DIGITAL technology - Abstract
The concepts of internet banking and mobile banking have led to changes in people's financial behavior in terms of earning, consuming, and saving. This new concept, which entered the market quite recently, was used at the beginning of the new digital technology in various types of activities, banking operations, and nowadays these services are used by all people who want to save through banks or create new sources of income, as well as to make quick currency exchanges without going to credit institutions. The main purpose of this paper is to analyze people's behavior toward new digital technologies, e-banking adoption, and non-banking financial institutions internet services. The objectives pursued are: whether e-banking users are homogeneous in their characteristics in the EU 27 and which users have the most convergent or divergent behavior in the EU 27. Statistical data taken from Eurostat 2023 was used for the Sigma convergence analysis, the time series taken into consideration being from 2004 to 2022. The results showed that the changes in the procedural-fiscal-financial sphere are the ones that fully reflect the two principles underlying the tax evolution: digitization and simplification. These results confirm that people are adopting the new digital technology and change their behavior from consumer to prosumer. The study shows that all most categories adopted e-banking using new digital technologies when it comes to consumption and saving, with few exceptions that should be carefully supported. Plain Language Summary: E-Banking convergence and the adopter's behaviour within the EU Countries The concepts of internet banking and mobile banking have led to changes in people's financial behavior in terms of earning, consuming, and saving. This new concept, which entered the market quite recently, was used at the beginning of the new digital technology in various types of activities, banking operations, and nowadays these services are used by all people who want to save through banks or create new sources of income, as well as to make quick currency exchanges without going to credit institutions. The main purpose of this paper is to analyze people's behavior towards new digital technologies, e-banking adoption, and non-banking financial institutions internet services. The objectives pursued are: whether e-banking users are homogeneous in their characteristics in the EU 27 and which users have the most convergent or divergent behavior in the EU 27. Statistical data taken from Eurostat 2023 was used for the Sigma convergence analysis, the time series taken into consideration being from 2004 to 2022. The results showed that the changes in the procedural-fiscal-financial sphere are the ones that fully reflect the two principles underlying the tax evolution: digitization and simplification. These results confirm that people are adopting the new digital technology and change their behavior from consumer to prosumer. The study shows that all most categories adopted e-banking using new digital technologies when it comes to consumption and saving, with few exceptions that should be carefully supported. Digital transformation is not just about buying new, modern equipment, or retrieving data quickly and securely, but also about the technical implementation of state-of-the-art IT systems. It should be noted that digitization has had important effects on both public and private organizations and people, which can be translated as follows: time saved in people's interaction with public and private organizations; efficiency in administrative processes; transparency in their work. The economic environment becomes much more attractive and leads to investment and innovation in all areas. The digitization of all public or private services would also strengthen the administrative capacity of the whole population. Through studies, research, and future studies, it is essential to analyze and demonstrate that new digital technologies and their use could lead to the elimination of tax fraud, increased public confidence in local or central government and confidence in business. Finally, we can say that it is essential that new research in the field of digitization and e-banking use strengthens the literature reviews and explains at a higher level the answers to all research questions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
22. Technical Foundation, External Environment, and Government Internet Service Capability: Evidence From China.
- Author
-
Jin, Tian and Dong, Cheng
- Subjects
- *
LOCAL government , *INTERNET in public administration , *DATA analysis , *INTERNET service providers , *ROBUST statistics - Abstract
This study examines the influencing factors of the local government's Internet service capability construction in China. The research framework for this study was the "technology-organization-environment" (TOE) framework. A total of 277 local governments were collected from Chinese cities and used for the data analysis. The data analysis was conducted with Stata. The results of this research demonstrated that there is a significant positive correlation between information technology talents, peer pressure, leader attachment, sustainable competitiveness, data open platform, and the government's Internet service capability. Surprisingly, there is a negative correlation between per capita budget expenditure and the government's Internet service capability. The aforementioned conclusions hold even after the robustness test. Discussion is held regarding how these conclusions may affect the development of the government's Internet service capability. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
23. Long-term Traffic Forecasting in Optical Networks Using Machine Learning.
- Author
-
Walkowiak, Krzysztof, Szostak, Daniel, Włodarczyk, Adam, and Kasprzak, Andrzej
- Subjects
- *
INTERNET traffic , *FORECASTING , *MACHINE learning , *ALGORITHMS , *INTERNET exchange points , *INTERNET service providers - Abstract
Knowledge about future traffic in backbone optical networks may greatly improve a range of tasks that Communications Service Providers (CSPs) have to face. This work proposes a procedure for long-term traffic forecasting in optical networks. We formulate a long-terT traffic forecasting problem as an ordinal classification task. Due to the optical networks' (and other network technologies') characteristics, traffic forecasting has been realized by predicting future traffic levels rather than the exact traffic volume. We examine different machine learning (ML) algorithms and compare them with time series algorithms methods. To evaluate the developed ML models, we use a quality metric, which considers the network resource usage. Datasets used during research are based on real traffic patterns presented by Internet Exchange Point in Seattle. Our study shows that ML algorithms employed for long-term traffic forecasting problem obtain high values of quality metrics. Additionally, the final choice of the ML algorithm for the forecasting task should depend on CSPs expectations. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. Recursive DNS with privacy features.
- Author
-
Adityan, Balu and Jain, Kurunandan
- Subjects
- *
LOCAL area networks , *COMPUTER network traffic , *CONTROL (Psychology) , *PRIVACY , *INTERNET domain naming system , *INTERNET service providers , *HOME computer networks - Abstract
Privacy of home networks is often at a toss with internet service providers (ISP) and third-party companies selling the browsing data. A recursive DNS (RDNS) is developed in this work, whereby a primary DNS server is setup in a home network in recursive mode. The server has features that will improve the privacy of the home network. Based on the blacklisted sites and ad-list provided by the user, the server blocks the unnecessary traffic into the home network. The server is also equipped with a firewall and parental control features. A custom configured standalone linux server in a local area network can thus function as a DNS server and a privacy preserving and security ensuring utility. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
25. Building customer loyalty through social media marketing strategy for internet service providers in Malaysia.
- Author
-
Kew, Kai Li, Huam, Hon Tat, Beh, Kok Hooi, and Thoo, Ai Chin
- Subjects
- *
SOCIAL media in marketing , *CUSTOMER loyalty , *INTERNET service providers , *MARKETING strategy , *INTERNET marketing , *SOCIAL media - Abstract
Consumer behaviour has been changed since year 2020 as people spending more time at home due to the COVID-19 pandemic. The new normal life-style in pandemic results in the exploration of Internet usage. Retention of Internet users can be challenging with the advent of social media. Thus, the present study adopted the S-O-R model as the underpinning theory to develop a conceptual framework on building customer loyalty through social media marketing strategy. Three independent variables from social media marketing strategy were identified as environmental stimuli (S) including social media presence, social media informativeness, and social media interactivity; the mediating variable, customer satisfaction was identified as emotional reaction (O); and the dependent variable, customer loyalty, was identified as the consumers' behavioural responses (R). A structured survey questionnaire was employed for data collection and 392 usable data were collected through online survey method from Internet and social media users in Malaysia. The quantitative data was analysed quantitatively by using descriptive analysis, reliability analysis, regression analysis and mediation analysis. The results concluded that social media marketing strategy has positive impact on customer loyalty, and the social media marketing strategy-customer loyalty relationship was partially mediated by customer satisfaction. Thus, it is recommended that Internet service providers establish an effective social media marketing strategy to improve customer satisfaction in order to develop customer loyalty from Internet users. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
26. Mathematical modelling on information service provider based independent goods utility function.
- Author
-
Puspita, Fitri Maya, Novesda, Grasiela, Yuliza, Evi, Octarina, Sisca, Zayanti, Des Alwine, and Tanjung, Ayu Luviyanti
- Subjects
- *
INFORMATION services , *UTILITY functions , *BIPARTITE graphs , *CLIENT/SERVER computing equipment , *MATHEMATICAL models , *INTERNET service providers , *CONSUMERS - Abstract
This research analysis the internet pricing scheme model to maximize profits for ISPs (Internet Service Providers) by considering the utility function of Independent Goods. This study analyzes the types of flat-fee, usage-based, and two-part tariff pricing schemes for homogeneous consumers and heterogeneous consumers (high-end and low-end) and heterogeneous consumers (high-demand and low-demand). The pricing scheme model is then solved differentially by being applied to the local server data, SISFO traffic data. The results obtained are that ISPs will get maximum profit by implementing flat-fee, usage-based, and two-part tariff pricing schemes for homogeneous consumers. For high-end and low-end heterogeneous consumer types and high-demand and low-demand heterogeneous consumer types, the ISP will get maximum profit on the application of flat-fee, usage-based, and two-part tariff pricing schemes. However, ISPs will get the highest profit on homogeneous consumer types compared to the application of high-end and low-end heterogeneous consumer types and high-demand and low-demand heterogeneous consumers. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
27. From community networks to shared networks: the paths of Latin-Centric Indigenous networks to a pluriversal internet.
- Author
-
Rosa, Fernanda R.
- Subjects
- *
NETWORK governance , *INTERNET governance , *INTERNET service providers , *INTERNET , *RADIO antennas , *ELECTROMAGNETIC spectrum , *COMMUNITIES - Abstract
This article examines, with ethnographic lenses, the emergence of shared networks in the Tseltal and Zapoteco communities in Chiapas and Oaxaca (Mexico). 'Shared networks' are first-mile signal-sharing practices that articulate interconnection infrastructure and values of coexistence to, in the cases studied, extend the internet to areas where the services of existing larger internet service providers are unsatisfactory or unavailable. It argues that by infrastructuring their own local networks and interconnecting to the global internet, Tseltal and Zapoteco people are effectively internet codesigners, building Latin-Centric Indigenous networks and shaping internet governance from below. When comunalidad values, supported by unlicensed frequencies of the electromagnetic spectrum, towers, radio antennas, houses' rooftops, routers, and cables, intersect with the values of the internet service providers and their policies, hybrids emerge. Shared networks are a result of what these hybrids enact and constrain, as well as evidence of the vivid struggles for a more inclusive and pluriversal internet. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
28. Experimental investigation of the vapor-compression cooling system in a data center: energy and exergy analysis.
- Author
-
Baghsheikhi, Mostafa and Mohammadi, Majid
- Subjects
- *
SERVER farms (Computer network management) , *COOLING systems , *EXERGY , *INTERNET service providers , *INTERNET in public administration , *MATHEMATICAL optimization - Abstract
The growth of the electronic government and the increase in the number of internet service providers has led to the development of data centers. A major piece of equipment used in these centers is the cooling system, which is responsible for the continuous exhaust of heat generated by the equipment in the data center. Given the high energy consumption of these systems, their optimization is of great importance. Due to the significance of identifying the sources of energy inefficiency in system optimization, in the present study, first, a sample in-row data center cooling system (was manufactured by authors) is placed inside the deigned setup test room, and its performance is investigated. Subsequently, it undergoes thermodynamic and exergy analyses using a model created in EES software. The effects of changes in the evaporator and condenser temperatures, the superheat (∆Tsuperheat) and sub-cooled (∆Tsub-cooled) temperature differences, and the ambient temperature on the energetic and exergetic performance of the cycle are evaluated. Under the temperature conditions specified in this research, the COP and exergy efficiency of the system were obtained 3.47 and 19.5%, respectively. Moreover, it was determined that a rise in the evaporator temperature increases the COP and decreases the exergy efficiency of the system, while a decrease in the condenser temperature improves both. A 30° reduction in the operator's temperature in all different condenser temperatures led to a 10% increase in the system's exergy efficiency. Additionally, lowering the condenser temperature from 323 to 313 K resulted in approximately a 10% increase in the system's exergy efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
29. A Tale of Three Datasets: Characterizing Mobile Broadband Access in the U.S.
- Author
-
MANGLA, TARUN, SHOWALTER, ESTHER, ADARSH, VIVEK, JONES, KIPP, VIGIL-HAYES, MORGAN, BELDING, ELIZABETH, and ZEGURA, ELLEN
- Subjects
- *
LONG-Term Evolution (Telecommunications) , *WIRELESS Internet , *INTERNET service providers , *BROADBAND communication systems , *RURAL-urban differences - Abstract
Three datasets describing access to Long-Term Evolution mobile broadband internet access in New Mexico are presented. Coverage from internet service providers including Verizon and Sprint is mapped, the reliability of the Skyhook crowdsourced dataset is compared with data gathered by the Federal Communications Commission, and information is provided on rural-urban disparities in internet access across census blocks.
- Published
- 2022
- Full Text
- View/download PDF
30. Identification of consumer preferences online transportation users using contjoint analysis.
- Author
-
Kurniawati, R., Nurjaman, T. I., Ikhwana, A., Mauluddin, Y., and Hakim, B. L.
- Subjects
- *
CONSUMER preferences , *CONSUMER behavior , *INTERNET traffic , *INTERNET service providers , *MOTORCYCLES , *CONJOINT analysis - Abstract
Technological developments have changed all aspects of life, including changes from conventional transportation systems to online transportation systems. This change has influenced the people's decision to choose online transportation supported by various facilities and advantages compared to traditional transportation systems. The purpose of this research is to be able to identify changes in consumer behavior in choosing online transportation so that online transportation service providers can find out the preferences that make consumers prefer online traffic compared to conventional transit. This study uses a quantitative approach that is supported by the conjoint analysis method and involves 100 respondents, namely consumers who use online transportation services. Based on the results of the study, that found that the most preferred combination by all consumers of online transportation services, especially on motorcycle online transportation services are the rates and speed of picking up service attributes. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. The edge of tomorrow.
- Subjects
- *
CLOUD computing , *INTERNET users , *INTERNET service providers , *INFORMATION storage & retrieval systems , *COMPUTER graphics - Published
- 2024
32. Identification of consumer preferences online transportation users using contjoint analysis.
- Author
-
Kurniawati, R., Nurjaman, T. I., Ikhwana, A., Mauluddin, Y., and Hakim, B. L.
- Subjects
- *
CONSUMER preferences , *CONSUMER behavior , *INTERNET traffic , *INTERNET service providers , *MOTORCYCLES , *CONJOINT analysis - Abstract
Technological developments have changed all aspects of life, including changes from conventional transportation systems to online transportation systems. This change has influenced the people's decision to choose online transportation supported by various facilities and advantages compared to traditional transportation systems. The purpose of this research is to be able to identify changes in consumer behavior in choosing online transportation so that online transportation service providers can find out the preferences that make consumers prefer online traffic compared to conventional transit. This study uses a quantitative approach that is supported by the conjoint analysis method and involves 100 respondents, namely consumers who use online transportation services. Based on the results of the study, that found that the most preferred combination by all consumers of online transportation services, especially on motorcycle online transportation services are the rates and speed of picking up service attributes. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. Modelling the buying behavior factors of internet service provider.
- Author
-
Rukmi, Hendang Setyo, Lestari, Nada Rizki, and Afifah, Alif Ulfa
- Subjects
- *
INTERNET service providers , *CONSUMER behavior , *QUALITY of service , *CONSUMER preferences , *CUSTOMER satisfaction , *STRUCTURAL equation modeling - Abstract
Consumer preferences in the selection of internet service providers can be influenced by several attributes that might have interdependencies. This research was attempted to model the factors of consumer buying behaviour in selecting Internet Service providers in Indonesia. Several attributes, namely service quality, price, customer perceived value, customer satisfaction, and brand image, were examined for their influence on consumer buying behaviour. Employing the purposive sampling method, this study selected 180 respondents that were surveyed using online questionnaires. The data were processed using the Structural Equation Modeling (SEM) with LISREL 8.8 software. The results showed that the attributes that had a significant positive effect on customer buying behaviour were customer perceived value, customer satisfaction, and brand image. Meanwhile, service quality and price did not have a significant effect on customer buying behaviour. However, these two attributes have a positive effect on customer perceived value. Other findings in this study are customer perceived value and brand image positively affect customer satisfaction. This result might be useful for the internet service provider as the consideration in developing a marketing strategy. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. ELON MUSK'S SHADOW RULE.
- Author
-
FARROW, RONAN
- Subjects
- *
INTERNET service providers , *RUSSIAN invasion of Ukraine, 2022- , *NATIONAL security - Abstract
The article discusses how the U.S. government has increasingly relied on tech billionaire Elon Musk, leading to challenges in reigning in his influence. Topics include Musk's involvement in providing Internet access to aid Ukraine during its conflict with Russia, his influence in various fields, and the unique challenges his role poses to government decision making and national security.
- Published
- 2023
35. Seeking Solace in Gambling: The Cycle of Gambling and Intimate Partner Violence Against Women Who Gamble.
- Author
-
Hing, Nerilee, Mainey, Lydia, O'Mullan, Catherine, Nuske, Elaine, Greer, Nancy, Thomas, Anna, and Breen, Helen
- Subjects
- *
INTIMATE partner violence , *COMPULSIVE gambling , *VIOLENCE against women , *GAMBLING , *CONTROL (Psychology) , *CONSOLATION , *INTERNET service providers - Abstract
This study explored women's gambling in response to male intimate partner violence (IPV). Twenty-four women were recruited through service providers and online advertising. All women had been victimised by IPV and all experienced problems relating to the gambling on electronic gaming machines (EGMs). Thematic analysis of their in-depth interviews identified three major themes. The main pattern of gambling and IPV (Theme 1) was where ongoing coercive control preceded the woman's gambling. Situational violence in response to gambling was also observed. Regardless of temporal sequence, a self-perpetuating cycle of gambling and IPV victimisation was typically apparent, with both issues escalating over time. Reflecting severe traumatic violence, push factors from IPV that motivated the women's gambling (Theme 2) included physical escape, psychological escape, hope of regaining control over their lives, and gambling to cope with the legacy of abuse. Pull factors attracting these women to gambling venues (Theme 3) appeared to have heightened appeal to these victims of IPV. These included venues' social, geographic and temporal accessibility, allowance for uninterrupted play on EGMs, and the addictive nature of EGMs. These push and pull factors led to these women's prolonged and harmful gambling while exacerbating their partner's violence. Concerted efforts are needed to assist women in this cycle of IPV and gambling, prevent violence against women, and reduce harmful gambling products and environments. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. Library Services and Information Management: The Role of Academic Librarians in the 21st Century Nigeria.
- Author
-
Imam, Abayomi and Ilori, Maria E.
- Subjects
- *
OCCUPATIONAL roles , *ACADEMIC libraries , *INFORMATION resources management , *LIBRARY public services , *ABILITY , *TRAINING , *ACCESS to information , *LIBRARIANS , *WORLD Wide Web , *INTERNET service providers , *INFORMATION technology - Abstract
This column describes the nature of library services and information management's role in this 21st century and examines the role of academic librarians in Nigeria. The development brought about by technology has drastically improved and facilitated the dissemination of information to users and has mandated librarians to add new roles to their mode of service to move with the trend of time and be relevant to society. The role of academic librarians in this 21st century now involves advocates, pace-setters/image makers, knowledge resources management, information technology development, user services, human resource management, resource sharing, and networking. The column concludes that academic librarians in Nigeria are now compelled to create innovative library services that will make them relevant and fit into the information management roles. Hence the column recommends that librarians need to keep abreast with the trend of the digital era by always acquiring new skills that will enable them to function effectively and efficiently. Library management should make policies and provide opportunities that will enable academic librarians to always acquire new training that will enhance library services to meet with the trends of time. Librarians are to upgrade themselves with the managerial role. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
37. Artificial Intelligence-Aided SLA Planning via Reverse Engineering the QoE/QoS Relations.
- Author
-
Rineh, A. S. Mousavi, Kazemitabar, J., and Zadeh, A.
- Subjects
- *
REVERSE engineering , *SERVICE level agreements , *INTERNET service providers , *TELECOMMUNICATION systems , *QUALITY of service - Abstract
Along with the growth of the Internet comes a competitive environment among Internet service providers. In this regard, quality of service (QoS) and customer's quality of experience (QoE) are introduced as the two main criteria of satisfaction for network users/regulators. In this paper, we evaluate these two criteria for one of the largest Internet service communication networks in Iran. By providing a predictive model, we propose a solution to improve the quality of the communication. Our model predicts the quality of experience from the quality-of-service parameters with an accuracy of roughly 90%. Next, we reverse-engineer the relationship between the quality of experience and quality of service to develop a service level agreement (SLA) contract. The relationship between quality of experience and quality of service is then compiled into a set of if-then rules. By using a decision tree classifier, we were able to set the quality-of-service parameter thresholds for the gold, silver, and bronze SLAs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. A survey of speech pathologists' opinions about the prospective acceptability of an online implementation platform for aphasia services.
- Author
-
Trebilcock, Megan, Shrubsole, Kirstine, Worrall, Linda, and Ryan, Brooke
- Subjects
- *
TELEREHABILITATION , *SPEECH therapy , *ATTITUDES of medical personnel , *INTERNET , *RESEARCH methodology , *MEDICAL care , *CONCEPTUAL structures , *SELF-efficacy , *REHABILITATION of aphasic persons , *QUESTIONNAIRES , *DESCRIPTIVE statistics , *SPEECH therapists , *INTERNET service providers - Abstract
Background: Online knowledge translation (KT) approaches are becoming increasingly prevalent within healthcare due to their accessibility and facilitation of international support networks. Online platforms enable timely and far‐reaching dissemination of current evidence and best‐practice recommendations. Although there is potential to improve the uptake of rehabilitation guidelines, it is essential to consider the acceptability of online approaches to healthcare professionals to ensure their successful integration within everyday clinical settings. Aims: To establish the prospective acceptability of a theoretically informed online intervention for speech pathologists, Aphasia Nexus: Connecting Evidence to Practice, that aims to facilitate the implementation of aphasia best practice. Methods & Procedures: A mixed‐methods multinational electronic survey based on the Theoretical Framework of Acceptability (TFA) completed by aphasia researchers and clinicians. Outcomes & Results: A total of 43 participants completed the survey with 91% (n = 39) indicating that they would use Aphasia Nexus. Understanding the intervention and how it works (intervention coherence as per the TFA) was the key factor influencing the likelihood of integration within everyday clinical practice. Participants identified potential areas where the intervention could influence service change and also recommended further design and content changes to improve the intervention. Conclusions & Implications: Aphasia Nexus is an acceptable platform for further feasibility testing in the form of a pilot trial within an Australian‐based health service. The study progresses the theory of TFA as it was a valuable framework facilitating the identification of prominent factors influencing acceptability. The study also informs further intervention refinements in preparation for the next stage of research. WHAT THIS PAPER ADDS: What is already known on the subject: Online strategies have the potential to enhance KT and promote the uptake of rehabilitation guidelines. An online intervention, however, can only be effective if implemented well. For this reason, it is essential to establish the acceptability of online interventions to the intended recipients and therefore increase the likelihood of successful implementation. What this paper adds to existing knowledge: This study used a theoretically based framework to establish the acceptability of an online implementation intervention, Aphasia Nexus, to multinational aphasia clinicians and researchers. It demonstrated the value in identifying the prominent factors influencing acceptability to inform further intervention refinements and warrant continuing research. What are the potential or actual clinical implications of this work?: Speech pathologists should use online platforms to drive the implementation of best practice on an international scale. It is important for clinicians to have an in‐depth understanding of online interventions and how they work to enhance their successful uptake into routine clinical practice. Aphasia Nexus is an acceptable online platform for implementing best practice in aphasia. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. Content-filtering AI systems–limitations, challenges and regulatory approaches.
- Author
-
Marsoof, Althaf, Luco, Andrés, Tan, Harry, and Joty, Shafiq
- Subjects
- *
CONTENT filters (Computer science) , *ARTIFICIAL intelligence , *INTERNET content moderation , *INTERNET censorship , *INTERNET service providers - Abstract
Online service providers, and even governments, have increasingly relied on Artificial Intelligence ('AI') to regulate content on the internet. In some jurisdictions, the law has incentivised, if not obligated, service providers to adopt measures to detect, track, and remove objectionable content such as terrorist propaganda. Consequently, service providers are being pushed to use AI to moderate online content. However, content-filtering AI systems are subject to limitations that affect their accuracy and transparency. These limitations open the possibility for legitimate content to be removed and objectionable content to remain online. Such an outcome could endanger human well-being and the exercise of our human rights. In view of these challenges, we argue that the design and use of content-filtering AI systems should be regulated. AI ethics principles such as transparency, explainability, fairness, and human-centricity should guide such regulatory efforts. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. Rethinking Dating and SEXUAL Violence Prevention for Youth During the Pandemic: Examining Program Feasibility and Acceptability.
- Author
-
Segura, Anna, Henkhaus, Michelle, Banyard, Victoria, Obara, Lena M., and Jefferson, Gena C.
- Subjects
- *
SEX crime prevention , *ONLINE education , *PILOT projects , *SEXUAL orientation , *EVALUATION of human services programs , *CLINICAL trials , *RESEARCH methodology , *DATING violence , *CONSUMER attitudes , *INTERVIEWING , *SMARTPHONES , *SATISFACTION , *COMPARATIVE studies , *EXPERIENCE , *SEX crimes , *SCALE analysis (Psychology) , *INTERPERSONAL relations , *QUESTIONNAIRES , *DESCRIPTIVE statistics , *RESEARCH funding , *METROPOLITAN areas , *JUDGMENT sampling , *DATA analysis software , *COVID-19 pandemic , *REFLECTION (Philosophy) , *INTERNET service providers , *TRUST , *ADULTS , *ADOLESCENCE ,RESEARCH evaluation - Abstract
Sexual and dating violence (SDV) is a social and health but preventable public issue. Most evidence-based prevention programs have been evaluated using an in-person delivery mechanism. Project Dream, Own and Tell (DOT) is a 13- to 18-week SDV prevention program targeting youth from traditionally underserved communities in New York City that shifted from in-person to online delivery in response to social distancing requirements during the COVID-19 pandemic. The aim of the current study was to understand how youth perceive learning SDV prevention in an online environment (acceptability and feasibility of the online DOT program). A mixed methods triangulation design was used including responses to Ecological Momentary Assessments (n = 25), a brief post survey with Likert-scale items (n = 18), and semi-structured interviews with 12 participants. The sample comprised Latinx/Hispanic, Asian American, Arab American, and African American youth between the ages of 15 and 21 from urban communities. Youth indicated both strengths and challenges of the online format. Strengths included ease of fitting the program into their schedules, avoiding long commutes, and the potential to create a safe online space for participants to engage in sexual violence prevention discussions and thus, feel less exposed. Challenges included internet connectivity issues, difficulties in building trustworthy relationships with other participants when not sharing the same physical space, some characteristics of the program's activities, and the lack of adequate space from which to attend the program (i.e., shared spaces). Findings suggest that synchronous online prevention program delivery is a feasible and acceptable strategy for engaging adolescents in relationship violence prevention. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. Inference in an incomplete information entry game with an incumbent and with beliefs conditioned on unobservable market characteristics.
- Author
-
Aradillas-Lopez, Andres
- Subjects
- *
INCUMBENCY (Public officers) , *INTERNET service providers , *NASH equilibrium , *MARKET share - Abstract
We consider a static entry game played between an incumbent and a collection of potential entrants. Entry decisions are made with incomplete information and beliefs are conditioned, at least partially, on a market characteristic that is unobserved by the econometrician. We describe conditions under which, even though the unobserved market characteristic cannot be identified, a subset of parameters of the model can still be identified, including all the strategic-interaction effects. We also characterize testable implications for strategic behavior by the incumbent when this player is able to shift the unobserved market characteristic to deter entry. We present results under Bayesian Nash equilibrium (BNE) and under the weaker behavioral model of iterated elimination of nonrationalizable strategies. Our empirical example analyzes geographic entry decisions in the Mexican internet service provider (ISP) industry. This industry has an incumbent, América Móvil (AMX), which established a widespread geographic presence as a monopolist following the privatization of Telmex in 1990. Our results show significant strategic interaction effects between AMX and its competitors, as well as evidence of strategic behavior by AMX to deter entry and maximize its market share. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
42. Challenges and acceptance of e-teaching among medical professionals during the COVID-19 pandemic.
- Author
-
Arthanareeswaran, Arvinth and Ezhilarasan, Suganya
- Subjects
- *
DIGITAL technology , *MEDICAL education , *COMPUTERS , *QUESTIONNAIRES , *TEACHING methods , *DESCRIPTIVE statistics , *ONLINE education , *ATTITUDES of medical personnel , *ABILITY , *INTERNET service providers , *COVID-19 pandemic , *TRAINING - Abstract
Background: Previously resistant to change, medical professionals have now embraced e-teaching as a modern technology and the COVID-19 pandemic has compelled the entire world to accept it as a fundamental tool for education. This study aimed to evaluate the challenges and acceptance of E-teaching by medical professionals during the COVID-19 pandemic. Methods: An electronic form questionnaire was designed and validated according to the Technology Acceptance Model (TAM) to find out the factors that affect the acceptance and use of E-teaching by medical professionals. Results: Most of the participants (88%) agreed that the technological skills of giving online courses increase the educational value and experience of teaching medical professionals. The highest barrier to E-teaching was unsteady internet connectivity (56%), inadequate internet data(48%), lack of computers/ laptops (16.5%), and technical problems (73%). The rate of participant agreement on perceived usefulness, perceived ease of use, and acceptance of E-teaching was (83.1%, 81.4%, and 88.6% respectively). Conclusion: In our current study, most of the participants strongly agreed with the perceived usefulness, perceived ease of use, and acceptance of E-teaching. It is evident that online teaching will persist, and education will increasingly adopt a hybrid model. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. Virtual Fracture Clinic Model in India: A Technological Innovation.
- Author
-
Iyengar, Karthikeyan P., Jain, Vijay Kumar, Nallakumarasamy, Arulkumar, and Jeyaraman, Madhan
- Subjects
- *
MEDICAL protocols , *INTERDISCIPLINARY education , *PATIENT safety , *TELEMEDICINE , *ORTHOPEDICS , *MEDICAL consultation , *PATIENT-centered care , *MATHEMATICAL models , *THEORY , *QUALITY assurance , *INTERNET service providers , *MEDICAL care costs - Abstract
Background: Virtual Fracture Clinics (VFCs) are an alternative to the conventional model of fracture and minor injuries care. It is a new, evolving service designed to speed up patient access to orthopaedic care introduced in the United Kingdom in 2011 and has been increasingly used in the management of certain musculoskeletal injuries. Methods: This observational, pilot study evaluates the possibility of combining telemedicine technology and a virtual fracture clinical assessment pathway to remotely assess patients supported by radiology imaging in India. Results: Piloting and developing a virtual fracture clinical assessment pathway model in India is faced with many challenges including regulations, internet, and data connectivity issues, and concerns of medico-legal implications. Conclusion: Recent studies have reported Virtual Fracture Clinics (VFCs) to be able to provide a safe, cost-effective model of patient care in a subset of musculoskeletal injuries. Limitations and shortcomings of Virtual Fracture Clinics (VFCs) in India can be mitigated with effective communication, enhanced documentation, appropriate training, and information governance. This pathway is not a replacement for conventional 'face-to-face' evaluation but a credible option to complement the delivery of trauma and orthopaedic care in the future in India. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. Measuring Internet Speed Current Challenges and Future Recommendations.
- Author
-
FEAMSTER, NICK and LIVINGOOD, JASON
- Subjects
- *
INTERNET speed , *BROADBAND communication systems , *GOVERNMENT policy , *INTERNET service providers - Abstract
The article discusses how internet speed of Internet Service Providers (ISPs) is tested. According to the article, various governmental agencies rely upon such testing to assess different programs and broadband infrastructure, yet often use outdated technology. The article examines the limitations of speed testing tools and recommends better options in order to improve technological innovations and policy outcomes.
- Published
- 2020
- Full Text
- View/download PDF
45. Ignoring Encrypted Protocols: Cross-layer Prediction of Video Streaming QoE Metrics.
- Author
-
Chen, Junxin, Mai, Weimin, Lian, Xiaoqin, Yang, Mingyu, Sun, Qi, Gao, Chao, Zhang, Cong, and Chen, Xiang
- Subjects
- *
STREAMING video & television , *VIDEO monitors , *4G networks , *INTERNET service providers , *FORECASTING - Abstract
Nowadays, the widely used end-to-end encryptions have prevented the Deep Packet Inspect (DPI) method applied in Quality of Experience (QoE) prediction and optimization. Thus, for the Internet Service Providers (ISPs), it has become more difficult to monitor and improve user QoE when users are watching videos or using other video application services. To overcome the above problem, a Cross-layer Predicting framework of Video Streaming QoE (CPVS) is proposed to monitor and predict video indicators that affect user QoE, such as startup delay, stalling rate and stalling events. The most prominent advantage of the CPVS is that it can predict the video QoE indicators without the prior information of transmission protocols, whether it is encrypted or not. Furthermore, the general framework, CPVS, shows high predicting accuracy both in a time granularity as small as one second and in video-session prediction, even can perform well with only 6 features. For the session-based prediction, the best weighted f1 score achieves 85.71% about the startup delay prediction, and achieves 84.64% about the stalling rate classification. For the real-time prediction, the best weighted f1 score can achieve 79.25%. Besides, by exploring the 4G network features, we find out the 6 most critical ones that not only make the CPVS retain high accuracy but also save 35.02% running time to improve the real-time prediction performance. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
46. HACKING COPYRIGHT: HOLDING COPS ACCOUNTABLE FOR ABUSING YOUTUBE'S COPYRIGHT FILTER SYSTEM.
- Author
-
Bloom, Tyler
- Subjects
- *
COPYRIGHT misuse , *INTERNET service providers , *POLICE - Abstract
The article explore the issue of "copyright hacking" by police officers. It proposes two possible solutions to address this issue requiring online service providers (OSPs) to register their copyright filtering systems with the copyright office and considering the recording of public police activity as protected speech under the First Amendment. It discusses two incidents in which police officers used copyrighted music to trigger YouTube's copyright filter system.
- Published
- 2022
47. Beanstandung einer Internetbewertung eines Arztes.
- Subjects
- *
COMPLAINTS & complaining , *FALSE testimony , *PHYSICIANS , *DISTRICT courts , *WEB portals , *FEDERAL courts , *INTERNET service providers , *DISMISSAL & nonsuit , *INTERNET , *REPUTATION - Abstract
The article focuses on complaint about an Internet review against a host provider was based on a deliberately false presentation of facts as this complaint does not trigger any obligation on the part of the host provider to check. Topics include examines a host provider is not required to further clarify the facts of the matter when examining whether an evaluation of a doctor published on his Internet portal is illegal if he has different descriptions from the doctor.
- Published
- 2022
- Full Text
- View/download PDF
48. The State's access to data and internet intermediary response – an assessment of India's attempt to reallocate the legal framework to ensure national security.
- Author
-
Annappa, Nagarathna
- Subjects
- *
INTERNET service providers , *INTERNET intermediary liability , *INTERNET security laws , *NATIONAL security , *CYBERSPACE , *INTERNET traffic , *FREEDOM of speech - Abstract
Safeguarding national security requires ensuring cyber security of a nation. While India has a wider law framework to ensure national security as against wrongs committed in real world, it is yet to match this framework to suit to the regulatory framework essential to address concerns raised due to the abuse of cyber technology. Though Indian laws including substantive legal provisions empowers the State to regulate acts affecting national as well as cyber security, its procedural rules suffers from being outdated and thereby irrelevant in addressing the concerns specific to cyber space. Ensuring national security requires access to data, both personal as well as non-personal data. While recent legal developments have been focusing on extending wider protection to privacy including data privacy, the State agencies strive to access data, which at times are crucial to the enforcement of laws in general and to ensure national security in specific. Jurisdictional issues further complicates the matter. As a result, the law enforcement agencies expect proactive coordination from internet intermediary in facilitating access to data, e-surveillance, decryption, internet traffic data monitoring, etc. Intermediaries on the other hand are also legally mandated to ensure data privacy, freedom of speech and other rights of internet users. This often has led to the conflicting concerns requiring new legal response. This paper will overview the existing laws as well as assess the changes Indian law is currently undergoing in these regard. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
49. Online exploitation of children and the role of intermediaries: an Indian legislative and policy perspective.
- Author
-
Prakash, G. Aswathy, Sundaram, Asha, and Sreeya, B.
- Subjects
- *
INTERNET intermediary liability , *INTERNET service providers , *CHILD sexual abuse , *CYBERSPACE , *INTERNET & children - Abstract
The Intermediary landscape in India is extensive and regulating; it is often laborious considering the expanding market and ensuing policy changes. The advent of globalization heralds the inrush of entities that operate transnationally, which often beget legal uncertainties in outlining the intermediary liabilities conundrum. Many jurisdictions oscillated from the notions of liability to safe harbor in fixing the intermediary liabilities. Children are often an easy target of online abuse and Child Sexual Abuse Materials (CSAM) is the most circulated object in the cyberspace. This paper has adopted both empirical and doctrinal research methods. The paper primarily addresses the accountability and response on the part of intermediaries for abusive content against children transmitted in their platform and is an attempt to provide an insight into the reasons behind the online exploitation of children in India. The study analyses the public opinion on the online exploitation of children based on a survey conducted among 270 respondents aged from 14 to 50 years. The findings gave support to the suggestions that the exploitation and abuse of children frequently transpire online, and the public perception regarding the gender of child victims varies between girls and boys. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
50. Digital Inclusion for Farmworkers in a Pandemic: The North Carolina Farmworker Health Program Internet Connectivity Project, 2020‒2021.
- Author
-
Cofie, Leslie E., Rivera, Natalie D., Santillán-Deras, Jocelyn R., Knox, Glenn, and Lee, Joseph G. L.
- Subjects
- *
EVALUATION of human services programs , *DIGITAL divide , *PSYCHOLOGY of agricultural laborers , *DIGITAL technology , *RURAL conditions , *INTERNET access , *HUMAN services programs , *HEALTH , *INFORMATION resources , *FAMILY relations , *COVID-19 pandemic , *INTERNET service providers , *INFORMATION technology , *TELEMEDICINE - Abstract
The North Carolina Farmworker Health Program (NCFHP) implemented an emergency program in response to North Carolina migrant and seasonal farmworkers' urgent need for Internet access for health information, family connections, and telehealth services during COVID-19 isolation and quarantine. This article describes the NCFHP Internet Connectivity Project implementation and evaluation from June 2020 to December 2021. The project placed 448 devices across the state and provided Internet access to more than 3184 farmworkers during the 2021 peak farming season. (Am J Public Health. 2022;112(11):1551–1555. https://doi.org/10.2105/AJPH.2022.307017) [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.