Collaborative Working in an ISP Environment

Author(s):  
Sathya Rao ◽  
Eric Mannie-Corbisier ◽  
Leszek Siwik

The way of life has changed with the introduction of information and communication technologies (ICT) in every one’s day to day activities and the business. As ICT technologies are constantly evolving, many people attribute the success of enterprises to the ways they deploy and take advantage of new technologies, not only to make their operations more efficient but most importantly to refine and adopt new effective and adaptive business models. Since the advent of the Internet and the very first Internet service providers (ISP) in operation, the traditional ISP market has been in constant evolution due to the gradual globalisation and commoditisation of ISP services. Deregulation and ICT policies have fostered competition (e.g., unbundling of the local loop and so forth) as well. The Internet is as an important channel of interaction inside and/or outside enterprises. The essence of the Internet is conducting business and running of business processes over data communication networks based on nonproprietary standards (Porter, 2001). The World Wide Web as a portal represents a major electronic business (e-business) platform accessed through communication channels provisioned by network and service providers (such as ISDN, DSL, WLAN, UMTS, etc.). There are many challenging aspects of the e-Business that must be considered for a sustainable business of an ISP (Petrie et al., 2004).

Author(s):  
Tung-Hsiang Chou ◽  
Ching-Chang Lee ◽  
Chin-Wen Lin

The Internet has come a long way over the past twenty years, and many Internet-era enterprises have had to face daunting challenges while trying to create innovative business models. Many types of Internet interactions can facilitate networking (e.g., The Web, Web services). Since the advent of the Internet, service requesters and service providers have generated diverse electronic services (e-services), and since 2003, many experts have proposed the concept of Web 2.0. People rely on Internet e-services to execute activities and meet requirements; however, e-services lack a standardization method for constructing and managing them. The current study presents a framework design and a comprehensive interface for e-service providers and requesters. The study adopts the concept of Web 2.0 by using Web services with related standards for developing the framework design. Specifically, the study uses semantic Web technologies to complete the construction of e-services. After that, Internet users can quickly and conveniently access the framework to obtain suitable e-services.


Author(s):  
Maria Löblich

Internet neutrality—usually net(work) neutrality—encompasses the idea that all data packets that circulate on the Internet should be treated equally, without discriminating between users, types of content, platforms, sites, applications, equipment, or modes of communication. The debate about this normative principle revolves around the Internet as a set of distribution channels and how and by whom these channels can be used to control communication. The controversy was spurred by advancements in technology, the increased usage of bandwidth-intensive services, and changing economic interests of Internet service providers. Internet service providers are not only important technical but also central economic actors in the management of the Internet’s architecture. They seek to increase revenue, to recover sizable infrastructure upgrades, and expand their business model. This has consequences for the net neutrality principle, for individual users and corporate content providers. In the case of Internet service providers becoming content providers themselves, net neutrality proponents fear that providers may exclude competitor content, distribute it poorly and more slowly, and require competitors to pay for using high-speed networks. Net neutrality is not only a debate on infrastructure business models that is carried out in economic expert circles. On the contrary, and despite its technical character, it has become an issue in the public debate and an issue that is framed not only in economic but also in political and social terms. The main dividing line in the debate is whether net neutrality regulation is necessary or not and what scope net neutrality obligations should have. The Federal Communications Commission (FCC) in the United States passed new net neutrality rules in 2015 and strengthened its legal underpinning regarding the regulation of Internet service providers (ISPs). With the Telecoms Single Market Regulation, for the first time there will be a European Union–wide legislation for net neutrality, but not recent dilution of requirements. From a communication studies perspective, Internet neutrality is an issue because it relates to a number of topics addressed in communication research, including communication rights, diversity of media ownership, media distribution, user control, and consumer protection. The connection between legal and economic bodies of research, dominating net neutrality literature, and communication studies is largely underexplored. The study of net neutrality would benefit from such a linkage.


2021 ◽  
Author(s):  
Fenwick Robert McKelvey

This dissertation develops the concept of transmissive control to explore the consequences of changes in Internet routing for communication online. Where transmission often denotes an act of exchanging information between sender and receiver, transmissive control theorizes transmission as the production and assignment of common times or temporalities between components of a communication system. Transmissive control functions both operationally according to how computational algorithms route Internet data (known as packets) and systematically according to how patterns in these operations express temporalities of coordination and control. Transmissive control questions how algorithms transmit packets and how transmission expresses valuable temporalities within the Internet. The concept of transmissive control developed as a response to advanced Internet routing algorithms that have greater awareness of packets and more capacity to intervene during transmission. The temporality of the Internet is changing due to these algorithms. Where transmissive control has been made possible by the Internet’s core asynchronous design that allows for many diferent temporalities to be simultaneous (such as real-time networks or time-sharing networks), this diversity has taxed the resources of the Internet infrastructure as well as the business models of most Internet Service Providers (ISPs). To bring the temporality of the Internet back under control, ISPs and other network administrators have turned to transmissive control to better manage their resources. Their activities shift the Internet from an asynchronous temporality to a poly-chronous temporality where network administrators set and manage the times of the Internet. Where this turn to traffic management has often been framed as a debate over the neutrality of the Internet, the dissertation re-orientates the debate around transmissive control. Tactics by the anti-copyright Pirate Bay and Internet transparency projects illustrate potential political and policy responses to transmissive control. The former seeks to elude its control where the latter seeks to expose its operation. These components as well as the operation of transmissive control will be developed through a series of metaphors from the film Inception, the demons of Pandemonium, the novel Moby-Dick and the film Stalker. Each metaphor cooperate to provide a comprehensive discussion of transmissive control.


2021 ◽  
Author(s):  
Fenwick Robert McKelvey

This dissertation develops the concept of transmissive control to explore the consequences of changes in Internet routing for communication online. Where transmission often denotes an act of exchanging information between sender and receiver, transmissive control theorizes transmission as the production and assignment of common times or temporalities between components of a communication system. Transmissive control functions both operationally according to how computational algorithms route Internet data (known as packets) and systematically according to how patterns in these operations express temporalities of coordination and control. Transmissive control questions how algorithms transmit packets and how transmission expresses valuable temporalities within the Internet. The concept of transmissive control developed as a response to advanced Internet routing algorithms that have greater awareness of packets and more capacity to intervene during transmission. The temporality of the Internet is changing due to these algorithms. Where transmissive control has been made possible by the Internet’s core asynchronous design that allows for many diferent temporalities to be simultaneous (such as real-time networks or time-sharing networks), this diversity has taxed the resources of the Internet infrastructure as well as the business models of most Internet Service Providers (ISPs). To bring the temporality of the Internet back under control, ISPs and other network administrators have turned to transmissive control to better manage their resources. Their activities shift the Internet from an asynchronous temporality to a poly-chronous temporality where network administrators set and manage the times of the Internet. Where this turn to traffic management has often been framed as a debate over the neutrality of the Internet, the dissertation re-orientates the debate around transmissive control. Tactics by the anti-copyright Pirate Bay and Internet transparency projects illustrate potential political and policy responses to transmissive control. The former seeks to elude its control where the latter seeks to expose its operation. These components as well as the operation of transmissive control will be developed through a series of metaphors from the film Inception, the demons of Pandemonium, the novel Moby-Dick and the film Stalker. Each metaphor cooperate to provide a comprehensive discussion of transmissive control.


2015 ◽  
Vol 11 (2) ◽  
pp. 65-89 ◽  
Author(s):  
Tung-Hsiang Chou ◽  
Ching-Chang Lee ◽  
Chin-Wen Lin

The Internet has come a long way over the past twenty years, and many Internet-era enterprises have had to face daunting challenges while trying to create innovative business models. Many types of Internet interactions can facilitate networking (e.g., The Web, Web services). Since the advent of the Internet, service requesters and service providers have generated diverse electronic services (e-services), and since 2003, many experts have proposed the concept of Web 2.0. People rely on Internet e-services to execute activities and meet requirements; however, e-services lack a standardization method for constructing and managing them. The current study presents a framework design and a comprehensive interface for e-service providers and requesters. The study adopts the concept of Web 2.0 by using Web services with related standards for developing the framework design. Specifically, the study uses semantic Web technologies to complete the construction of e-services. After that, Internet users can quickly and conveniently access the framework to obtain suitable e-services.


2008 ◽  
Vol 2 (1) ◽  
pp. 175-188
Author(s):  
Lauri Rantakari

This article seeks to illustrate current policies over the so-called network neutrality in the United States and in the European Union. In short, network neutrality, which lacks any exact definition and is under constantdebate, consists of principles that allow public information networks to treat all content, sites and platforms equally. In practice, hindrance or exclusion of certain types of lawful Internet traffic or content by the Internet service providers would be contrary to these principles. Due to the US-centric nature of the Internet, the US stance over network neutrality will also affect the Internet policies of the European Union as well. Thus, the aim of this article is to stimulate academic discussion about network neutrality in Finland. The focus of this descriptive article is on exemplifying network neutrality’s impact on technological development, the evolution of business models in the Internet space, and especially, potential antitrust issues. Finally, this article asks how network neutrality will be legislated in the future and whether it will survive as a network design principle.


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


Author(s):  
Bangaly Kaba

The purpose of this study is to understand the difference between Internet users' continuing use behavior in the context of digital inequality. Data were collected through a survey of Internet users in the Ivory Coast. The structural equation modeling technique was used to test the research hypothesis. This study showed empirically that concern over information and communication technologies (ICT) access as an explanation for digital inequality should be toned down. This research suggests emphasizing alternative factors to explain Internet sustained use intention by underprivileged individuals, including normative beliefs. The results will help internet service providers, governments, and international aid agencies to better understand users' behaviors or reactions to ICT available to them. This understanding provides a foundational platform upon which viable and effective information technology-enabled solutions and policies can be conceptualized and implemented. This study is one of the few that integrate three salient beliefs to differentiate ICT use continuance intention in the context of digital inequality.


2018 ◽  
Vol 2018 ◽  
pp. 1-9
Author(s):  
Elissar Khloussy ◽  
Yuming Jiang

The net neutrality principle states that users should have equal access to all Internet content and that Internet Service Providers (ISPs) should not practice differentiated treatment on any of the Internet traffic. While net neutrality aims to restrain any kind of discrimination, it also grants exemption to a certain category of traffic known as specialized services (SS), by allowing the ISP to dedicate part of the resources for the latter. In this work, we consider a heterogeneous LTE/WiFi wireless network and we investigate revenue-maximizing Radio Access Technology (RAT) selection strategies that are net neutrality-compliant, with exemption granted to SS traffic. Our objective is to find out how the bandwidth reservation for SS traffic would be made in a way that allows maximizing the revenue while being in compliance with net neutrality and how the choice of the ratio of reserved bandwidth would affect the revenue. The results show that reserving bandwidth for SS traffic in one RAT (LTE) can achieve higher revenue. On the other hand, when the capacity is reserved across both LTE and WiFi, higher social benefit in terms of number of admitted users can be realized, as well as lower blocking probability for the Internet access traffic.


2020 ◽  
Vol 45 (4) ◽  
pp. 115-123
Author(s):  
A. Igibayeva ◽  
◽  
D. Erbolatuly ◽  
G. Turarova ◽  
◽  
...  

The development of the modern world is very complex and rapid, and the process is characterized by high rates of development of information and communication technologies. The Internet space is a means of searching and obtaining information, as well as a medium for communication, virtual interaction, and has a significant impact on the formation of stereotypes of behavior of the young generation, as well as ideals, spiritual values, personal and social worldview. The article identifies the positive aspects of the development of cyberspace by young people, and also notes the threats and barriers to cyber socialization for modern youth. The necessity of conducting psychological and pedagogical research on cyber socialization is actualized, a conclusion is made about the use of new technologies for the purpose of positive cyber socialization of the younger generation.


Sign in / Sign up

Export Citation Format

Share Document