scholarly journals Washington Hotline: The Next Generation Internet: Government policy and the future of the Internet

1998 ◽  
Vol 59 (4) ◽  
pp. 253-258
Author(s):  
Rick Weingarten
2019 ◽  
Vol 52 (5-6) ◽  
pp. 338-353 ◽  
Author(s):  
Murat Aydos ◽  
Yılmaz Vural ◽  
Adem Tekerek

Internet of Things is the next-generation Internet network created by intelligent objects with software and sensors, employed in a wide range of fields such as automotive, construction, health, textile, education and transportation. With the advent of Industry 4.0, Internet of Things has been started to be used and it has led to the emergence of innovative business models. The processing and production capabilities of Internet of Things objects in hidden and critical data provide great advantages for the next generation of Internet. However, the integrated features of Internet of Things objects cause vulnerabilities in terms of security, making them the target of cyber threats. In this study, a security model which offers an integrated risk-based Internet of Things security approach for the Internet of Things vulnerabilities while providing detailed information about Internet of Things and the types of attacks targeting Internet of Things is proposed. In addition, in this study, the vulnerabilities of Internet of Things were explained by classifying attack types threatening the physical layer, network layer, data processing layer and application layer. Moreover, the risk-based security model has been proposed by examining the vulnerabilities and threats of smart objects that generate the Internet of Things. The proposed Internet of Things model is a holistic security model that separately evaluates the Internet of Things layers against vulnerabilities and threats based on the risk-level approach.


Author(s):  
Liguo Yu

This chapter describes e-commerce, a trading business built on top of the internet. Different e-commerce models, such as B2B, B2C, C2C, and their major players are described. E-commerce companies like Amazon and Alibaba are used to explain the effect of e-commerce on the economy, society, and beyond. GMV, MAU, market capitalization, and other business data are presented and analyzed. Influential factors, such as user retention, government policy, payment method, and logistics, are also discussed. Finally, the emerging e-commerce model, emerging e-commerce market, and the future of e-commerce are illustrated.


Author(s):  
Liguo Yu

This chapter describes e-commerce, a trading business built on top of the Internet. Different e-commerce models, such as B2B, B2C, C2C, and their major players are described. E-commerce companies like Amazon and Alibaba, are used to explain the effect of e-commerce on our economy, society, and beyond. GMV, MAU, market capitalization, and other business data are presented and analyzed. Influential factors, such as user retention, government policy, payment method, and logistics are also discussed. Finally, the emerging e-commerce model, emerging e-commerce market, and the future of e-commerce are illustrated.


Author(s):  
Ying Liu ◽  
Jianping Wu ◽  
Qian Wu ◽  
Ke Xu

The Internet has become a major part of the global communications infrastructure supporting modern-day socio-economic development, social progress and technological innovation. Invented 30 years ago, today the Internet is facing severe challenges. Many countries have funded research projects on the new-generation Internet, such as GENI, FIND, FIRE and CNGI, in an effort to solve these challenges. In addition, over the past few years, the networking research community has engaged in an ongoing conversation about how to move the Internet forward, and there are now two different approaches towards Internet research. The first approach is based on using the existing Internet architecture to solve the major technical challenges—this is called ‘evolutionary’ research. The other, which is called the ‘clean slate’, involves the design of an entirely new Internet architecture. In the first part of this paper, the basic features of the next generation Internet and its principal contradictions are analysed. Then a survey of recent progress in the study of the next generation Internet in China is discussed. Finally, the focus and direction for the next step in research are presented as based on fundamental research into the international next generation Internet architecture, and the many new innovative demands placed on Internet architecture in recent years.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1174
Author(s):  
Yousaf Bin Zikria ◽  
Rashid Ali ◽  
Muhammad Khalil Afzal ◽  
Sung Won Kim

It is predicted that by 2025, all devices will be connected to the Internet, subsequently causing the number of devices connected with the Internet to rise [...]


Author(s):  
Wen-Lung Shiau ◽  
Chen-Yao Chung ◽  
Ping-Yu Hsu

The growing popularity of the Internet has resulted in attracting many enterprises to do business transactions over the Internet. The current Internet protocol version 4 (IPv4) has been used for over 20 years. Even though IPv4 applications have been quite successful, it faces a problem of shortage in IP addresses, ineffective security mechanisms, and a lack of service quality management, etc. Scientists and engineers have devoted considerable effort to the development of next generation Internet protocol version 6 (IPv6), which is the core component of Next Generation Internet (NGI) to meet the future requirements of the Internet. Even though NGI is technically superior to the traditional Internet and is being established worldwide, few people have transmitted data through it. According to the Innovation Development Process in the Diffusion of Innovation theory, IPv6 is currently in a stage of technological diffusion. The research studies whether educating potential customers with more IPv6 knowledge created in the innovation process can increase their preference for the technology. With surveys collected from 596 undergraduate students, the results show that knowledge of the commercial applications of IPv6 in mobile communications and information appliances significantly contributes to a preference for the IPv6 technology.


Author(s):  
Yunus Topsakal ◽  
Mehmet Bahar ◽  
Nedim Yüzbaşıoğlu

Next-generation technologies such as robotics, the internet of things, artificial intelligence, sensors, cognitive technologies, nanotechnology, quantum computing, wearable technologies, augmented reality, intelligent signaling, and intelligent robots have led the fourth industrial revolution, often referred to as Industry 4.0. With the rapid advance of technology, most people today rely heavily on the internet to get information while traveling anywhere, because the use of technology has deeply penetrated daily life. The internet also makes travel easier and more convenient. For instance, it is possible to plan travel using smartphones and applications and at the same time meet instant travel needs as they arise. Therefore, the aim of this study is to examine tourism guidance within the scope of the super-smart tourists of the future, to determine the usage areas of next-generation technologies in the field of tourism guidance, and to give recommendations for tourism guidance in this regard.


2021 ◽  
Vol 51 (1) ◽  
pp. 32-38
Author(s):  
Nikolaos Laoutaris ◽  
Costas Iordanou

What if instead of having to implement controversial user tracking techniques, Internet advertising & marketing companies asked explicitly to be granted access to user data by name and category, such as Alice→Mobility→05-11-2020? The technology for implementing this already exists, and is none other than the Information Centric Networks (ICN), developed for over a decade in the framework of Next Generation Internet (NGI) initiatives. Beyond named access to personal data, ICN's in-network storage capability can be used as a substrate for retrieving aggregated, anonymized data, or even for executing complex analytics within the network, with no personal data leaking outside. In this opinion article we discuss how ICNs combined with trusted execution environments and digital watermarking, can be combined to build a personal data overlay inter-network in which users will be able to control who gets access to their personal data, know where each copy of said data is, negotiate payments in exchange for data, and even claim ownership, and establish accountability for data leakages due to malfunctions or malice. Of course, coming up with concrete designs about how to achieve all the above will require a huge effort from a dedicated community willing to change how personal data are handled on the Internet. Our hope is that this opinion article can plant some initial seeds towards this direction.


Sign in / Sign up

Export Citation Format

Share Document