Social and P2P Networks on the Internet

Author(s):  
Milica Stojmenovic

This article studies social networks on the Internet created by popular applications such as e-mails, Web, chat, file sharing via peer-to-peer interaction, and online gaming. The Internet has its roots in military and academia. Connections are available around the world at academic institutions, military installations, government agencies, commercial enterprises, commercial information providers (AOL, CompuServe, and MSN), and Internet service providers. The Internet offers the following services: sending and receiving e-mail (electronic mail), transferring files between computers, participating in discussion groups through newsgroups and mailing lists, searching and retrieving information, chat, Internet relay chat, instant messaging, Internet telephony (voice chat), and on-line shopping. Newsgroups contain databases of messages on topics. They are similar to mailing lists, except that e-mail messages are posted to newsgroup sites. Bulletin boards and discussion groups offer similar services. People “surf the net” to find information and download files and connect directly to other computers. Web pages are used to communicate with customers and suppliers, describe organizations and products, tender documents, and provide services (banking, stocks, and software).

2010 ◽  
Vol 1 (1) ◽  
pp. 73-87 ◽  
Author(s):  
Andrea Calderaro

The Internet has largely been greeted as a technology able to create new spaces of political debate. In order to investigate the issue, scholars have paid attention to how transnational social movements use new information technologies. This has been done mainly exploring the use of the World Wide Web (WWW). However, new political spaces do not take place just on the WWW, and by consequence, research in this field cannot solely carry out Web analysis to explore the role played by the Internet in creating political debate. In looking at other areas of the Internet to understand the creation of new political space, other analytical approaches need to be adopted. The Internet also includes tools other than the WWW, such as E-Mailing Lists, collaborative on-line software, Peer-to-Peer Networks, Instant Messaging tools, and so forth. This paper explores the role that E-Mailing Lists play in creating new political spaces. To explore if and how this happens, I illustrate this crucial point with an analysis of the use of E-Mailing Lists by social movements. The case I will use is that of the organization of the protest during the G8 Summit held in Genoa in July 2001.


Author(s):  
Stephanie Austria

 Spoofing is one of the newest forms of cyber-attack, a technological methodology adapted to mask the identity of spammers who have faced hostile reaction in response to bulk, unsolicited, electronic mail messages.[1] Sending Spam, however, is no longer the only reason for deception, as crackers have taken pleasure in the challenge of manipulating computer systems and, additionally, find recreational enjoyment in doing so. In this legal Note, the author’s intent is to show that criminal, rather than civil liability is the best way to effectively deter and punish the spoofer. The injury that results when a computer system’s technological safety measures fail to adequately safeguard the system affects not only the owner of the hijacked e-mail address, but also the Internet Service Provider, and the Network as a whole. Current Anti-Spam Legislation is arguably ineffective at targeting these particular types of malicious attacks, and a different legal approach is suggested.


HortScience ◽  
1995 ◽  
Vol 30 (4) ◽  
pp. 904C-904
Author(s):  
W.P. Cowgill ◽  
R. VanVranken

Electronic discussion groups provide a forum in which to enhance the exchange of information between university researchers, extension agents and specialists, students, and their clientele; farmers, wholesalers/brokers, retailers and direct marketers as well as other colleagues in the same field. Three electronic discussion groups; Apple-Crop-Mg, Veg-Prod-Mg, and Direct-Mkt have been implemented and have been extremely effective in providing a unique forum for the sharing of knowledge. Over 400 subscribers are on-line with these groups from more than 30 states, four Canadian Provinces and three other countries. Participant surveys cite the ease of use, the timeliness of replies (often within 24 h), the ability to glean timely information for files and newsletters. These groups have been a valuable communication tool reaching a broad audience rapidly and cost effectively.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Author(s):  
Edwin I. Achugbue

The chapter focuses on the history of the internet system of e-mail; e-mail security; threat to e-mail security, usefulness of e-mail address and country codes, how e-mails can be secured by the individual and electronic mail policy. The future of e-mail security is also described.


2011 ◽  
pp. 2159-2163 ◽  
Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.


1994 ◽  
Vol 87 (8) ◽  
pp. 650-651
Author(s):  
Michelle A. Manes

The whole world is going digital! As a teacher, I have used my home computer to prepare materials, to keep track of grades, and to type final reports. But my computer holds so much more potential. As an active member of what I like to call “the on-line culture,” I have planned entire vacations from my desk, including purchasing plane tickets and requesting vegetarian meals, making hotel reservations, and budgeting the cost; I have used electronic mail to keep in touch with my family and friends; and I have learned how to clean the bearings and rotate the wheels of my in-line skates thanks to Usenet newsgroups. These newsgroups are like worldwide electronic bulletin boards. People use their computers to post questions, answers, opinions, ideas, and tirades to be read by anyone anywhere. Groups exist for every professional and personal interest imaginable.


Humaniora ◽  
2015 ◽  
Vol 6 (4) ◽  
pp. 470
Author(s):  
Gracia Rachmi Adiarsi ◽  
Yolanda Stellarosa ◽  
Martha Warta Silaban

This study aims to find out to what extent the Internet users in line with media literacy. According to Indonesia Internet Service Provider Association (APJII) and BPS Statistic Indonesia, it was found that Internet users in Indonesia have grown since three years ago up to 13% or become 71.19 million people until the end of 2013. According to research survey MarkPlus Insight, “netizen” or Internet users who spend more than three hours per day on Internet. Moreover, they are increasing from 24,2 Million people in 2012 and become 31,7 million people in 2013. This research used qualitative method by gathering the data through Focus Group Discussion (FGD) to private university students who spent for Internet 5 hours per day and less than 5 hours per day. The theory used in this research was media literacy. The result of this research stated that students who accessed the Internet below 5 hours per day were already busy with work and not too intense in using the Internet either via smartphone or a computer. Different findings came up from the students who accessed the Internet over 5 hours per day. Most of the time, they used the Internet for social media and instant messaging (instant messenger) through smartphones. Critical attitude towards the media message depends on the informants’ interest toward the information. 


Author(s):  
Louis Leung

The advent of new media technologies, such as e-mail, blogs, MSN, online games, mobile phones, iPods, MP3, PS3, NDS, video on demand (VOD), and DVDs, to name a few, has dramatically changed both the nature and number of social compensation and mood management devices available to most youngsters. Although previous research has examined how the Internet has become an important resource for information and entertainment, little research has focused on the ways in which individuals use the Internet for social communication and support. In particular, how personality traits, such as perception of aloneness and age identity gratifications, together with motives for Internet use impact Internet habits and perceived social support are much-neglected areas of research. This chapter investigates how differences in these constructs among adolescents and children influence their online social behavior (such as use of instant messaging, online games, and participating in forums).


Author(s):  
Gianluigi Me

Internet child pornography (CP) is one of the most rapidly growing problems on the Net. In particular, pedophilia has been largely facilitated by the Internet, because it has enabled like-minded people to meet and fuel their sexual interests in children. In addition, the diffusion of pedophile material mainly occurs in almost-public fields like the World Wide Web, mailing lists, newsgroups, and bulletin boards, where anonymity and confidentiality obscure most of the communication parties and content causing difficulties for investigative analysis.


Sign in / Sign up

Export Citation Format

Share Document