Internet Service Provider Research Papers (original) (raw)
2025
Avvocato e Ricercatore di Diritto privato SINTESI a) Avvento di internet e crisi del diritto Con l'avvento dell'informatica di rete (anche detta telematica), e di internet in particolare, sono emerse nuove dimensioni spazio/temporali ed e... more
Avvocato e Ricercatore di Diritto privato SINTESI a) Avvento di internet e crisi del diritto Con l'avvento dell'informatica di rete (anche detta telematica), e di internet in particolare, sono emerse nuove dimensioni spazio/temporali ed e `cambiato radicalmente il modo in cui l'uomo si relaziona con i prodotti, con le informazioni, con i suoi simili e con se ´stesso; il che ha determinato una vera e propria ''crisi'' dell'ordinamento giuridico. ''Tecnica'' e ''crisi'' del diritto privato
2025, Journal of Global Research in Computer …
The stuff of internet users increasing with the every moment of time, due to this huge lead of traffic grows on the wide area networks. Some users have crime category behavior and have attitudes of criminals like hacking the site,... more
The stuff of internet users increasing with the every moment of time, due to this huge lead of traffic grows on the wide area networks. Some users have crime category behavior and have attitudes of criminals like hacking the site, blocking the mail, chatting unauthorized users etc. Every service provider wants to increase his traffic share and way, which creates the competition among the providers. Simulation study is performing to analysis the better proportion of traffic by the users.
2025, Journal of Global Research in Computer Sciences
The stuff of internet users increasing with the every moment of time, due to this huge lead of traffic grows on the wide area networks. Some users have crime category behavior and have attitudes of criminals like hacking the site,... more
The stuff of internet users increasing with the every moment of time, due to this huge lead of traffic grows on the wide area networks. Some users have crime category behavior and have attitudes of criminals like hacking the site, blocking the mail, chatting unauthorized users etc. Every service provider wants to increase his traffic share and way, which creates the competition among the providers. Simulation study is performing to analysis the better proportion of traffic by the users.
2025
Naldi (2002) presented a Markov chain model based analysis for the user's behaviour in a simple scenario of two competitors. The model is applied to predict influence of both parameters (blocking probability and initial preference) on... more
Naldi (2002) presented a Markov chain model based analysis for the user's behaviour in a simple scenario of two competitors. The model is applied to predict influence of both parameters (blocking probability and initial preference) on the traffic distribution between the operators. It is also shown that smaller blocking competitors can be benefited from call-by-call basis assumption. In this paper this criteria of Call-by-call attempt is converted into two call attempts and new mathematical results are derived. A comparative study between call-attempts is made with Naldi (2002) expressions. It is found that, by two-call attempt model, the operator gains more traffic than one-call attempt.
2025, Int. J. of Advanced Networking …
Naldi presented a Markov chain model based analysis for the user's behaviour in a simple scenario of two competitors. The model is applied to predict influence of both parameters (blocking probability and initial preference) on the... more
Naldi presented a Markov chain model based analysis for the user's behaviour in a simple scenario of two competitors. The model is applied to predict influence of both parameters (blocking probability and initial preference) on the traffic distribution between the operators. It is also shown that smaller blocking competitors can be benefited from call-by-call basis assumption. In this paper this criteria of Call-by-call attempt is converted into two call attempts and new mathematical results are derived. A comparative study between call-attempts is made with Naldi [1] expressions. It is found that, by twocall attempt model, the operator gains more traffic than one-call attempt.
2025, El Profesional de la Informacion
Resumen: Se muestra la evolución experimentada por los primeros buscadores, índices y proveedores de servicios internet hacia su conversión en portales, los cuales se pueden clasificar en portales generales, verticales y corporativos. Se... more
Resumen: Se muestra la evolución experimentada por los primeros buscadores, índices y proveedores de servicios internet hacia su conversión en portales, los cuales se pueden clasificar en portales generales, verticales y corporativos. Se analizan algunas de sus características diferenciadoras y la razón de su presencia en internet, así como los principales elementos que favorecen su éxito, entre los que destaca la generación de contenidos, creación de comunidades virtuales, la potenciación de la fidelización del usuario y el desarrollo del comercio electrónico.
2025, Keçeci Layout
Keçeci Layout is a deterministic node layout algorithm designed for graph visualization in Python. Its primary purpose is to position the nodes of a graph in a predefined, sequential, and repeatable manner. The algorithm processes nodes... more
Keçeci Layout is a deterministic node layout algorithm designed for graph visualization in Python. Its primary purpose is to position the nodes of a graph in a predefined, sequential, and repeatable manner. The algorithm processes nodes sequentially, placing them along a user-defined primary axis (e.g., top-down or left-to-right) while applying an offset on the secondary axis in a zigzag pattern. This zigzag pattern helps prevent node overlaps while maintaining an orderly structure. The function is designed to be compatible with popular Python graph libraries, including NetworkX, Rustworkx, igraph, Networkit, and Graphillion (via GraphSet objects). It takes a graph object from one of these libraries as input, processes the nodes (usually by sorting their IDs), and returns a Python dictionary mapping each node's identifier (in the library-specific format) to its calculated (x, y) coordinates. Users can customize the node spacing along the primary and secondary axes (`primary_spacing`, `secondary_spacing`), the main direction of the layout (`primary_direction`), and the starting side of the zigzag pattern (`secondary_start`) through parameters. This regular and predictable structure is useful, particularly when the order of nodes is significant or when a simple, aesthetically pleasing, and easily traceable graph visualization is desired. Keçeci Layout is a deterministic node layout algorithm designed for graph visualization in Python. Its primary purpose is to position the nodes of a graph in a predefined, sequential, and repeatable manner. The algorithm processes nodes sequentially, placing them along a user-defined primary axis (e.g., top-down or left-to-right) while applying an offset on the secondary axis in a zigzag pattern. This zigzag pattern helps prevent node overlaps while maintaining an orderly structure. The function is designed to be compatible with popular Python graph libraries, including NetworkX, Rustworkx, igraph, Networkit, and Graphillion (via GraphSet objects). It takes a graph object from one of these libraries as input, processes the nodes (usually by sorting their IDs), and returns a Python dictionary mapping each node's identifier (in the library-specific format) to its calculated (x, y) coordinates. Users can customize the node spacing along the primary and secondary axes (`primary_spacing`, `secondary_spacing`), the main direction of the layout (`primary_direction`), and the starting side of the zigzag pattern (`secondary_start`) through parameters. This regular and predictable structure is useful, particularly when the order of nodes is significant or when a simple, aesthetically pleasing, and easily traceable graph visualization is desired.
2025, Revista Universitária Brasileira - RUB
Com o advento do Marco Civil da Internet (MCI), houve um inegável avanço na regulamentação de temas relacionados ao ambiente digital, sobretudo no que tange ao estabelecimento de regras voltadas à proteção do direito à privacidade do... more
Com o advento do Marco Civil da Internet (MCI), houve um inegável avanço na regulamentação de temas relacionados ao ambiente digital, sobretudo no que tange ao estabelecimento de regras voltadas à proteção do direito à privacidade do usuário de internet. Com o objetivo então de privilegiar a liberdade de expressão, o MCI adotou como regra o modelo de judicial notice and takedown, que impõe a responsabilização civil das plataformas digitais somente após o descumprimento de notificação judicial determinando a remoção do conteúdo reputado ilícito, em contraposição ao sistema de notice and takedown, que vinha sendo aplicado pela jurisprudência brasileira. Essa inovação legislativa suscitou críticas, já que a exigência de ordem judicial prévia torna o processo de retirada de conteúdos ofensivos mais lento e burocrático, comprometendo a rápida proteção dos direitos fundamentais das vítimas. Tal controvérsia chegou, assim, ao Supremo Tribunal Federal (STF) por meio do Recurso Extraordinário (RE) nº 1.037.396/SP, Tema 987 da repercussão geral, cujo julgamento, ainda pendente, terá um papel crucial na definição dos limites da responsabilidade civil das plataformas digitais no Brasil. Nesse contexto, este artigo se propõe a analisar a (in)constitucionalidade do artigo 19 da Lei nº 12.965/2014, que condiciona a responsabilização civil dos provedores de aplicações ao descumprimento de ordem judicial específica. A pesquisa segue uma abordagem qualitativa, fundamentada em revisão bibliográfica e no exame do voto já disponível, eletronicamente, do Ministro Dias Toffoli, relator do caso no STF.
2025
The eBusiness environment has been undergoing constant transformation in the last decade, creating new opportunities for all kinds of business to be carried out. The IST project VISP (Virtual ISP) is developing a software platform to... more
The eBusiness environment has been undergoing constant transformation in the last decade, creating new opportunities for all kinds of business to be carried out. The IST project VISP (Virtual ISP) is developing a software platform to support the collaboration of small companies in a cluster of Internet Service Providers (ISPs) so that they can provide tailored niche services over the Internet in competition with larger telecommunication companies. This paper investigates the relevant business process management and workflow standards that may be used in the implementation of this software platform. The standards are evaluated and their applicability for VISP discussed.
2025
En España existe una amplia oferta de empresas proveedoras de Internet (ISP). Con este panorama resulta extremadamente difícil para los clientes elegir el proveedor. Por tanto, este trabajo trata de analizar los factores que contribuyen a... more
En España existe una amplia oferta de empresas proveedoras de Internet (ISP). Con este panorama resulta extremadamente difícil para los clientes elegir el proveedor. Por tanto, este trabajo trata de analizar los factores que contribuyen a la elección de proveedor de servicios de Internet por parte de los clientes. Para ello, se ha utilizado una muestra de jóvenes universitarios a los que se han analizado sus preferencias. Los jóvenes universitarios generalmente constituyen un grupo representativo de las tendencias en este sector. Además, para analizar el comportamiento de los clientes se utiliza por primera vez el análisis conjunto. Nuestros resultados muestran que el precio y la posibilidad de obtener un terminal móvil son los dos atributos más valorados. Por el contrario, otros atributos como la permanencia o el número de megas no son muy tenidos en cuenta por los jóvenes a la hora de seleccionar al proveedor de Internet. Estos resultados proporcionan una información muy valiosa tanto para los usuarios como para las empresas del sector ISP. [EN] In Spain, there is a wide range of Internet Service Providers (ISP). Within this context, it is extremely difficult for consumers to determine which ISP is the most beneficial for them. Therefore, this article aims to identify the factors that most influence consumers' choice of ISP companies. The analysis of these factors is based the opinions of a sample of university students, who are generally considered to be representative of the trends taking place in the ISP sector. In addition, conjoint analysis is used for the first time to analyse consumers' preferences on the choice of ISP companies. Our results show that price and the inclusion of a mobile phone in the package are the two most valuable attributes for university students. Meanwhile, other attributes like the requirement to sign a fixed-term contract and data allowance in offer are not taken into account as much by university students when choosing an ISP. Therefore, our results may be highly valuable for both users and ISP brands.
2025
This paper provides an in-depth analysis of the evolving legal framework governing online copyright infringement within the European Union, while drawing comparative insights from the United Kingdom and the United States. It examines the... more
2025, arXiv (Cornell University)
VISP (Virtual Internet Service Provider) is an IST-STREP project, which is conducting research in the field of these new technologies, targeted to telecom/ISP companies. One of the first tasks of the VISP project is to identify the most... more
VISP (Virtual Internet Service Provider) is an IST-STREP project, which is conducting research in the field of these new technologies, targeted to telecom/ISP companies. One of the first tasks of the VISP project is to identify the most appropriate technologies in order to construct the VISP platform. This paper presents the most significant results in the field of choreography and orchestration, two key domains that must accompany process modeling in the construction of a workflow environment.
2025, Telecommunications Policy
Customer churn remains a significant area of concern in the telecommunications sector due to its high prevalence. As Fixed Wireless Access (FWA) gains traction, the field is witnessing heightened competition, especially with the... more
Customer churn remains a significant area of concern in the telecommunications sector due to its high prevalence. As Fixed Wireless Access (FWA) gains traction, the field is witnessing heightened competition, especially with the integration of 5G technology, which serves dual purposes for cellular communications and FWA. This research delves into a comprehensive analysis of risk factors that impact churn via Random Survival Forests, the Cox regression model, and Kaplan-Meier Survival Plots. Our results indicate that fiber, sales zone (i.e., brand presence), age, speed, and discounts are some of the more important variables with regard to the cumulative hazard ratio. Although discounts were effective in many sales zones, their impact was diminished for more expensive internet services. The insights garnered provide a foundational basis for telecom providers to devise robust strategies to curtail customer churn over time, ensuring sustained growth and customer satisfaction in the burgeoning FWA market.
2025
Kar amacli tuzel kisi olan sirketler gerek uluslararasi gerekse de ulusal duzeyde insan haklarinin sagladigi guvencelerden gittikce artan bir sekilde yararlanmaya calismaktadirlar. Şirketlerin, sozlesme ozgurlugu, adil yargilanma ve... more
Kar amacli tuzel kisi olan sirketler gerek uluslararasi gerekse de ulusal duzeyde insan haklarinin sagladigi guvencelerden gittikce artan bir sekilde yararlanmaya calismaktadirlar. Şirketlerin, sozlesme ozgurlugu, adil yargilanma ve mulkiyet gibi haklardan yararlanirken, son yillarda ozel hayatin korunmasi ve din ozgurlugu gibi geleneksel olarak onlarla ozdeslesmeyen alanlarda da hak oznesi olma iddialarinda bulunduklarini gormekteyiz. Bu calisma, sirketlerin “insan” haklarinin oznesi olup olmayacaklari tartismasindan hareketle Avrupa Insan Haklari Mahkemesi, Amerikan Yuksek Mahkemesi ve Turk Anayasa Mahkemesinin sirketlerin hak ihlali iddialari karsisindaki tutumlarini incelemektedir. Calismada, sirketlerin korunmasi gereken haklari olmakla beraber bunlarin insan haklari baglaminda genisletilmesinin insan haklarinin korunmasi ve gelistirilmesine cok fazla katki yapmayacagi sonucuna ulasilmistir.
2025, Technology in Society
Faced with the challenge of distributing digital product in the digital realm, the American film industry is acutely aware of its increasing vulnerability to piracy and is currently considering two solutions to protect its copyrights-a... more
Faced with the challenge of distributing digital product in the digital realm, the American film industry is acutely aware of its increasing vulnerability to piracy and is currently considering two solutions to protect its copyrights-a legislative solution (e.g., the Digital Millennium Copyright Act of 1998) and a technical solution (e.g., digital watermarking). We suggest that a better way of dealing with piracy is an economic solution, such as neutralizing piracy by reengineering the supply chain across all three sectors of the motion picture industry: distribution, exhibition, production. In distribution, the industry can make legitimate downloading of high-quality movie files easier and cheaper (than pirating) by strategically locating ''e-Blockbusters'' (i.e., digital movie libraries) at or near Internet service provider (ISP) sites and making them attractive through feasible pricing schemes. In exhibition, innovative digital theaters could offer virtual reality viewing experiences and flexible windowing systems that maximize revenue for each feature film. In production, work would be done primarily or entirely in the digital domain. Digital film reservoirs would provide universal naming and indexing functions for easy access, reuse, and extension, and the industry would achieve a new diversity of quality and quantity. In addition, dynamic cross-media convergence can be expected as a function of the complementarities created by content digitization. To prosper in the new digital economy, the motion picture industry must closely collaborate with the information industry to achieve a new supply chain rather than competing with it to the detriment of both.
2025, PRJ Publication
This report examines the automation of critical IT operations through the use of shell scripting, aimed at improving system monitoring, resource management, and issue resolution. As a seasoned IT professional with expertise in network... more
This report examines the automation of critical IT operations through the use of shell scripting, aimed at improving system monitoring, resource management, and issue resolution. As a seasoned IT professional with expertise in network infrastructure and cloud solutions, I discuss how automation was leveraged to address key challenges such as monitoring critical alarms for 3G/4G devices, streamlining manual IP management, managing file system issues, preventing database user deletions, and mitigating downtime through cloud migration. By implementing custom shell scripts, significant time savings were achieved, resulting in increased operational efficiency and reduced system outages. Additionally, the migration of on-premises applications to the Azure cloud platform resolved ongoing infrastructure challenges, further enhancing system reliability and scalability. This report provides insights into how automation and cloud migration are revolutionizing modern IT management, offering organizations the ability to significantly reduce manual efforts, downtime, and operational costs while improving the overall performance and stability of their systems.
2025, Proceedings of the 2004 ACM workshop on Next-generation residential broadband challenges
This paper presents a characterization of broadband user behavior from an Internet Service Provider standpoint. Users are broken into two major categories: residential and Small-Office/Home-Office (SOHO). For each user category, the... more
This paper presents a characterization of broadband user behavior from an Internet Service Provider standpoint. Users are broken into two major categories: residential and Small-Office/Home-Office (SOHO). For each user category, the characterization is performed along four criteria: (i) session arrival process, (ii) session duration, (iii) number of bytes transferred within a session and (iv) user request patterns. Our results show that both residential and SOHO session inter-arrival times are exponentially distributed. Whereas residential session arrival rates remain relatively high during the day, SOHO session arrival rates vary much more significantly during the day. On the other hand, a typical SOHO user session is longer and transfers a larger volume of data. Furthermore, our analysis uncovers two main groups of session request patterns within each user category. The first group consists of user sessions that use traditional Internet services, such as e-mail, instant messenger and, mostly, www services. On the other hand, sessions from the second group, a smaller group, use typically peer-to-peer file sharing applications, remain active for longer periods and transfer a large amount of data. Looking further into the e-business services most commonly accessed, we found that subscription-based and advertising services account for the vast majority of user HTTP requests in both residential and SOHO workloads. Understanding these user behavior patterns is important to the development of more efficient applications for broadband users.
2025, Computer Networks
There is a growing need for large-scale distribution of realtime multicast data such as Inter-29 net TV channels and scientific and financial data. Internet Service Providers (ISPs) face an 30 urgent challenge in supporting these... more
There is a growing need for large-scale distribution of realtime multicast data such as Inter-29 net TV channels and scientific and financial data. Internet Service Providers (ISPs) face an 30 urgent challenge in supporting these services; they need to design multicast routing paths 31 that are reliable, cost-effective, and scalable. To meet the realtime constraint, the routing 32 paths need to be robust against a single IP router or link failure, as well as multiple such 33 failures due to sharing fiber spans (SRLGs). Several algorithms have been proposed to solve 34 this problem in the past. However, they are not suitable for today's large networks, because 35 either they do not find a feasible solution at all or if they do, they take a significant amount 36 of time to arrive at high-quality solutions. In this paper, we present a new Integer Linear Programming (ILP) model for designing a 38 cost-effective and robust multicast infrastructure. Our ILP model is extremely efficient and 39 can be extended to produce quality-guaranteed network paths. We develop two heuristic 40 algorithms for solving the ILP. Our algorithms can guarantee to find high-quality, feasible 41 solutions even for very large networks. We evaluate the proposed algorithms using topol-42 ogies of four operational backbones and demonstrate their scalability. We also compare the 43 capital expenditure of the resulting multicast designs with existing approaches. The eval-44 uation not only confirms the efficacy of our algorithms, but also shows that they outper-45 form existing schemes significantly. 46
2025
Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal... more
Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.
2025, Journal of Engineering and Sustainable Development
The performance and reliability of the internet depend in large part on properties of routing techniques. IP routing protocols nowadays compute paths based on the network configuration parameters and topology, missing view to the current... more
The performance and reliability of the internet depend in large part on properties of routing techniques. IP routing protocols nowadays compute paths based on the network configuration parameters and topology, missing view to the current traffic load on the routers and links. This paper discusses routing optimization using Genetic Algorithm (GA) then studies and analyzes the problems in order to increase routing performance in median networks. A genetic algorithm will be proposed in a detail to advise the performance of Open Shortest Path First (OSPF) routing Protocol. The simulated results show that the probability of convergence to shortest path has been superior via momentary using GA in OSPF protocol.
2025, African Journal of Legal Studies
This paper examines the role of Internet Service Providers as bridges and intermediaries between private persons, organisations and even government arms and the internet and the liabilities placed on them by the law with regard to... more
This paper examines the role of Internet Service Providers as bridges and intermediaries between private persons, organisations and even government arms and the internet and the liabilities placed on them by the law with regard to wrongful acts of their subscribers or clients under the laws of Nigeria. It is common knowledge that actions against ISPs are commonest with defamation and infringement of copyright. The legal framework in the US and the UK are examined to determine if there are lessons to learn for Nigeria. The Nigerian legal framework also places some responsibilities on ISPs with regard to crime prevention and prosecution. This is because private rights are not yet much of an issue in the Nigerian cyberspace. The paper points out that much of the regulation governing ISPs liability in respect of civil matters do not have legislative power but are mere guidelines and suggests that the US and UK patterns have a lot to offer Nigeria.
2025, African Journal of Legal Studies
This paper examines the role of Internet Service Providers as bridges and intermediaries between private persons, organizations even government arms and the Internet and the liabilities placed on them by the law with regard to wrongful... more
This paper examines the role of Internet Service Providers as bridges and intermediaries between private persons, organizations even government arms and the Internet and the liabilities placed on them by the law with regard to wrongful acts of their subscribers or clients under the laws of Nigeria. It is common knowledge that actions againstISPs are commonest with defamation and infringement of copyright. The legal framework in theUSand the UKare examined to determine if there are lessons to learn for Nigeria. The Nigerian legal framework also places some responsibilities on ISPs with regard to crime prevention and prosecution. This is because private rights are not yet much of an issue in the Nigerian cyberspace. The paper points out that much of the regulation governingISPs liability in respect of civil matters do not have legislative power but are mere guidelines and suggests that theUSand UKpatterns have a lot to offer Nigeria.
2025
La Collana editoriale "Studi per le Scienze Politiche" ('Collana Discipol') è stata istituita con lo scopo di valorizzare le attività di studio e ricerca che caratterizzano le aree scientifiche afferenti al Dipartimento di Scienze... more
La Collana editoriale "Studi per le Scienze Politiche" ('Collana Discipol') è stata istituita con lo scopo di valorizzare le attività di studio e ricerca che caratterizzano le aree scientifiche afferenti al Dipartimento di Scienze Politiche. Con questa Collana si intende, inoltre, condividere e sostenere scientificamente il progetto di Roma TrE-Press, che si propone di promuovere la cultura incentivando la ricerca e diffondendo la conoscenza mediante l'uso del formato digitale in open access.
2025
O presente artigo analisa o quadro atual do direito à imagem diante da sociedade da informação. Distingue entre a responsabilidade por ato próprio e por ato de terceiro no que toca à colocação de conteúdo indevido na internet. Destaca que... more
O presente artigo analisa o quadro atual do direito à imagem diante da sociedade da informação. Distingue entre a responsabilidade por ato próprio e por ato de terceiro no que toca à colocação de conteúdo indevido na internet. Destaca que existem várias espécies de provedores de internet, existindo, igualmente, distinções no que toca à responsabilidade civil dos diversos provedores de internet: provedor de backbone, provedor de acesso, provedor de hospedagem, provedor de conteúdo, provedor de busca ou pesquisa e provedor de correio eletrônico. O texto estuda a responsabilidade civil dos provedores antes e depois da Lei 12.965/2014, incluindo as exceções feitas pela Lei 12.965/2014 ao regime geral de responsabilização dos provedores, ou seja, os direitos autorais e a pornografia de vingança. -chave: Direito à imagem. Direitos da personalidade. Responsabilidade civil. Internet. Provedores. 1 CHINELLATO, Silmara Juny de Abreu. Direitos da personalidade: o art. 20 do Código Civil e a biografia de pessoas notórias. In: CASSETTARI, Christiano (coord.). 10 anos de vigência do Código Civil brasileiro de 2002: estudos em homenagem ao professor Carlos
2025
Resumo: O presente artigo analisa o quadro atual do direito à imagem diante da sociedade da informação. Distingue entre a responsabilidade por ato próprio e por ato de terceiro no que toca à colocação de conteúdo indevido na internet.... more
Resumo: O presente artigo analisa o quadro atual do direito à imagem diante da sociedade da informação. Distingue entre a responsabilidade por ato próprio e por ato de terceiro no que toca à colocação de conteúdo indevido na internet. Destaca que existem várias espécies de provedores de internet, existindo, igualmente, distinções no que toca à responsabilidade civil dos diversos provedores de internet: provedor de backbone, provedor de acesso, provedor de hospedagem, provedor de conteúdo, provedor de busca ou pesquisa e provedor de correio eletrônico. O texto estuda a responsabilidade civil dos provedores antes e depois da Lei 12.965/2014, incluindo as exceções feitas pela Lei 12.965/2014 ao regime geral de responsabilização dos provedores, ou seja, os direitos autorais e a pornografia de vingança.
2025
Cloud computing is a rapidly developing information technology concept. Within a few years, cloud computing has become the fastest emerging technology. It is internet based computing software and resources are shared and information is... more
Cloud computing is a rapidly developing information technology concept. Within a few years, cloud computing has become the fastest emerging technology. It is internet based computing software and resources are shared and information is provided to computers on demand. It is a low cost computing entity that uses the advanced business or service models such as SaaS(Software as Service), PaaS (Platform as Service), IaaS (Infrastructure as Service) and deployment models such as Public, Private , Hybrid and Community cloud to distribute the powerful computing capability to end user. This paper highlights the emergence of cloud computing from a style of computing to a on demand full fledged service model. Comparative study of various service and deployment models for cloud computing is also presented.
2025, Information & Management
Relationship quality -based on Commitment-Trust theory -can explain and predict the success of a relationship between an ISP and its customers, measured in terms of loyalty. We proposed a model to express the relationship and included... more
Relationship quality -based on Commitment-Trust theory -can explain and predict the success of a relationship between an ISP and its customers, measured in terms of loyalty. We proposed a model to express the relationship and included gender as a moderator in the relationship. We then developed a questionnaire to test the model empirically and used a sample in Spain to check its validity and reliability. Analysis provided strong support for our hypotheses that gender exerted a significant moderating role on our model relationships. The influence of trust on commitment and of commitment on loyalty was significantly stronger for females than males, while the effects of satisfaction on commitment and of trust on loyalty were significantly stronger for males. Implications were drawn for practitioners.
2025, Rechtsgeleerd Magazijn Themis
2025
— A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. A server... more
— A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. A server is anything that has some resource that can be shared. A server process is said to “listen ” to a port until a client connects to it. A “port ” is a numbered socket on a particular machine. Proxy servers are commonly used to create an access point to the Internet that can be shared by all users. In this paper we present a new method of caching HTTP Proxy servers which takes lower bandwidth by maintaining a cache of Internet objects like html files, image files, etc. which are obtained via HTTP in local machine. The size of cache is dynamic and automatically determined time to time. When the local system memory is not enough to store the internet objects then paging system is implemented automatically without interference of users. Once an internet o...
2025, RePEc: Research Papers in Economics
In this paper we study concentration in the European Internet upstream access market. The possibility of measuring market concentration depends on a correct definition of the market itself; however, this is not always possible, since, as... more
In this paper we study concentration in the European Internet upstream access market. The possibility of measuring market concentration depends on a correct definition of the market itself; however, this is not always possible, since, as it is the case of the Internet industry, very often Antitrust authorities lack reliable pricing and traffic data. This difficulty motivates our paper. We present an alternative approach based on the inference of the Internet Operators interconnection policies using micro-data sourced from their Border Gateway Protocol tables. We assess market concentration following a two step process: firstly we propose a price-independent algorithm for defining both the vertical and geographical relevant market boundaries, then we calculate market concentration indexes using two novel metrics. These assess, for each undertaking, both its role in terms of essential network facility and of wholesale market dominance. The results, applied to four leading Internet Exchange Points in London, Amsterdam, Frankfurt and Milan, show that some vertical segments of these markets are highly concentrated, while others are extremely competitive. According to the Merger Guidelines some of the estimated market concentration values would immediately fall within the special attention category.
2025, International Symposium on Software Testing and Analysis
This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting... more
This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the-first version of RMP with limited functionality to handle only nominal requirements of data delivery. This initial version did not handle off-nominal cases such as network partitions or site failures. Meanwhile, the V&V team concurrently developed a formal model of the requirements using a variant of SCR-based state tables. Based on these requirements tables, the V&V team developed test cases to exercise the implementation. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or off-nominal behaviors predicted by the current model. If the execution of a test in the model and implementation agreed, then the test either found a potential problem or verified a required behavior. However, if the execution of a test was different in the model and implementation, then the differences helped identify inconsistencies between the model and implementation. In either case, the dialogue between both teams drove the co-evolution of the model and implementation. We have found that this interactive, iterative approach to development allows software designers to focus on delivery of nominal functionality while the V&V team can focus on analysis of offnominal cases. Testing serves as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; "and (2) three example problems found during the development of RMP. Although RMP has provided our research effort with a rich set of test cases, it also has practical applications within NASA. For example, RMP is being considered for use in the NASA EOSDIS project due to its significant performance benefits in applications that need to replicate large amounts of data to many network sites. The RMP source code and documentation are currently available on the WWW via .
2025, OSIPTEL
En el contexto de la creciente demanda en el acceso a internet en el Perú, aún existen desafíos para mejorar la calidad y disponibilidad de este servicio. Uno de ellos es la falta o asimetría de información sobre la ruta de conectividad... more
En el contexto de la creciente demanda en el acceso a internet en el Perú, aún existen desafíos para mejorar la calidad y disponibilidad de este servicio. Uno de ellos es la falta o asimetría de información sobre la ruta de conectividad que posee nuestro país, los niveles de conexión y los agentes que integran el ecosistema. La transparencia de esta información permite una mejor toma de decisiones por parte de los agentes, con el objetivo de optimizar la provisión de los servicios de acceso a internet. Este documento aborda esa brecha informativa al ofrecer una descripción integral del esquema de interconexión de la ruta de conectividad peruana, haciendo un análisis descriptivo de la conectividad internacional y la interconexión local, proporcionando una visión del estado actual y una prospectiva de indicadores clave del ecosistema al 2025. Asimismo, considerando el fuerte despliegue de redes de fibra óptica al hogar que experimenta nuestro mercado, se presentan los resultados del cuestionario “Panorama del despliegue de infraestructura de fibra óptica al hogar (FTTH)”, dirigido a los proveedores de servicios de internet (ISP) que operan en el mercado peruano, recogiendo sus apreciaciones sobre las problemáticas que enfrentan para el despliegue de sus redes a nivel nacional. Sobre la base de la información trabajada, se derivan conclusiones orientadas a promover un ecosistema de Internet más desarrollado, basado en el conocimiento de toda la ruta de conectividad peruana; y acciones para mejorar las condiciones del despliegue de las redes FTTH en nuestro mercado, coadyuvando así con el avance y la eficiencia en el sector de telecomunicaciones.
2024, SPIE Proceedings
Free Space Optics (FSO) has become a viable, high-bandwidth wireless alternative to fiber optic cabling. The primary advantages of FSO over fiber are its rapid deployment time and significant cost savings. The disadvantage of FSO over... more
Free Space Optics (FSO) has become a viable, high-bandwidth wireless alternative to fiber optic cabling. The primary advantages of FSO over fiber are its rapid deployment time and significant cost savings. The disadvantage of FSO over fiber is that laser power attenuation through the atmosphere is variable and difficult to predict, since it is weather dependent. This factor limits the distance at which FSO should be deployed. Using historical weather data collected at airports, the link availability as a function of distance can be predicted for any FSO system. These availability curves provide a good indication of the reasonable link distances for FSO systems in a particular geographical area. FSO link distances can vary greatly from desert areas like Las Vegas to heavy-fog cities like St. Johns NF. Another factor in determining FSO distance limitations is the link availability expectation of the application. For enterprise applications, link availability requirements are generally greater than 99%. This allows for longer FSO link ranges, based on the availability curves. The enterprise market is where the majority of FSO systems have been deployed. The carriers and ISPs are another potential large user of FSO systems, especially for "last-mile" metro access applications. If FSO systems are to be used in telecommunication applications, they will need to meet much higher availability requirements. Carrier-class availability is generally considered to be 99.999% ("5 nines"). An analysis of link budgets and visibility-limiting weather conditions indicates that to meet carrier-class availability, FSO links should normally be less than 140 m (there are cities like Phoenix and Las Vegas where this 99.999% distance limitation increases significantly). This calculation is based on a 53 dB link budget. This concept is extended to the "best possible" FSO system, which would have a 10 W transmitter and a photocounting detector with a sensitivity of 1 nW. This FSO system would have a 100 dB link margin, which would only increase the 99.999% link distance to 286 m. A more practical solution to extending the high availability range would be to back-up the FSO link with a lower data rate radio frequency (RF) link. This hybrid FSO/RF system would extend the 99.999% link range to longer distances and open up a much larger metro/access market to the carriers. It is important to realize that as the link range increases, there will be a slight decrease in overall bandwidth. To show the geographical dependence of FSO performance, the first map of FSO availabilities contoured over North America is presented. This map is the first step to developing an attenuation map for predicting FSO performance, which could be used in a similar fashion to the International Telecommunication Union (ITU)/Crane maps for predicting microwave performance.
2024, jurid
Em 18.12.2024, o Plenário do Supremo Tribunal Federal retomou o julgamento que discute a constitucionalidade do artigo 19 do Marco Civil da Internet (MCI) e a possibilidade de as plataformas digitais serem responsabilizadas por conteúdo... more
Em 18.12.2024, o Plenário do Supremo Tribunal Federal retomou o julgamento que discute a constitucionalidade do artigo 19 do Marco Civil da Internet (MCI) e a possibilidade de as plataformas digitais serem responsabilizadas por conteúdo de usuários.
O atual presidente do STF, o Ministro Luís Roberto Barroso foi o terceiro a votar e divergiu parcialmente dos votos já apresentados pelos Ministros Toffoli e Fux, relatores de dois casos julgados pelo STF.
2024, SSRN Electronic Journal
Network neutrality is a policy proposal that would regulate how network providers manage and price the use of their networks. Congress has introduced several bills on network neutrality. Proposed legislation generally would mandate that... more
Network neutrality is a policy proposal that would regulate how network providers manage and price the use of their networks. Congress has introduced several bills on network neutrality. Proposed legislation generally would mandate that Internet service providers exercise no control over the content that flows over their lines and would bar providers from charging more for preferentially faster access to the Internet. These proposals must be considered carefully in light of the underlying economics. Our basic concern is that most proposals aimed at implementing net neutrality are likely to do more harm than good.
2024, 2012 Proceedings IEEE INFOCOM Workshops
We propose a novel distributed approach to exploit sleep mode capabilities of links in an Internet Service Provider network. Differently from other works, neither a central controller, nor the knowledge of the current traffic matrix is... more
We propose a novel distributed approach to exploit sleep mode capabilities of links in an Internet Service Provider network. Differently from other works, neither a central controller, nor the knowledge of the current traffic matrix is assumed, favoring a major step towards making sleep mode enabled networks practical in the current Internet architecture. Our algorithms are able to automatically adapt the state of network links to the actual traffic in the network. Moreover, the required input parameters are intuitive and easy to set. Extensive simulations that consider a real network and traffic demand prove that our algorithms are able to follow the daily variation of traffic, reducing energy consumption up to 70% during off peak time, with little overheads and while guaranteeing Quality of Service constraints.
2024, ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology
In this era of digitalization, the number of users of social networking sites, especially females, is increasing significantly in Bangladesh. Social networking sites see users as a great platform for expressing their ideologies, thoughts... more
In this era of digitalization, the number of users of social networking sites, especially females, is increasing significantly in Bangladesh. Social networking sites see users as a great platform for expressing their ideologies, thoughts and feelings with others. Women users share their personal problems, emotional needs and also use as stress reliever in social networking websites like Facebook, Instragram, Twitter, Viber, Google, Imo, Messenger and so on. Cyber bulling, pornography, hacking, virtual rape, blackmailing are common nature of online victimization to face by young women more likely than men that is sexual and violent in social networking sites. This study is made with an aim to present the actual causes of women victimization in social networking sites and tends to explore the current nature and its impact on women in their daily lives. This study demonstrates that social networking sites have opened up a new platform of socialization. Women user seems to be greater tendency to share their private information and activities with unknown person targeted as potential victims by the criminals. Lack of awareness, improper security setting, insufficient knowledge, moral devaluation, ignorance and negligence of policy guidelines increases victimization such experiences create insecurity, depression, isolation, damage relations and to a very large extent suicide. Cyber victimization relatively new phenomenon it becomes a major challenges for cyber security world. Greater awareness, proper privacy setting, legal laws and regulation, raise voice against cybercrime, immediate actions taken by the SNWs authority can overcome this problem.
2024
The traditional global (i.e., submarine + terrestrial) network architecture needs to be revamped to meet contemporary needs. This paper deals with the validation of new global network concepts through a Test Bed, jointly provided by... more
The traditional global (i.e., submarine + terrestrial) network architecture needs to be revamped to meet contemporary needs. This paper deals with the validation of new global network concepts through a Test Bed, jointly provided by KDD-SCS and Lucent Technologies. This Test Bed consists of the latest products and technologies from the two companies, and is a unique and innovative collaboration between them.
2024, Demokratie & Europa
Der Klimawandel verändert bereits jetzt unseren Alltag. Oft sind diese Veränderungen beinahe unmerklich. Es beginnt mit vermeintlich harmlosen Wetterkapriolen, die für die entsprechende Jahreszeit untypisch sind: Die Frühlingsblumen... more
Der Klimawandel verändert bereits jetzt unseren Alltag. Oft sind diese Veränderungen beinahe unmerklich. Es beginnt mit vermeintlich harmlosen Wetterkapriolen, die für die entsprechende Jahreszeit untypisch sind: Die Frühlingsblumen sprießen schon im Januar; es regnet ungewöhnlich viel, mitten im Sommer. Weniger harmlos sind strukturelle Veränderungen, die sich ebenfalls bereits abzeichnen: Die Hitze in den Städten nimmt zu, Ernteausfälle werden vermeldet, neue Tier-und Pflanzenarten breiten sich aus. Am Comer See muss man sich nun Sorgen wegen möglicher Infizierungen mit dem Dengue-Fieber machen. Und am Ende des Spektrums sind wir mit "Extremwettereignissen" konfrontiert, die, wie im Ahrtal geschehen, apokalyptische Bilder produzieren, Menschenleben fordern und Existenzen vernichten. Dass mit diesen Entwicklungen auch unsere Demokratie unter Druck steht, dürfte wenig überraschend sein. Wenn sich so vieles ändert, wie könnte, wie sollte dann die Demokratie unverändert bleiben? Selbstverständlich erleben wir auch eine Transformation der Demokratie.
2024, Herat University
The aim of this research is to investigate the impact of CRM on customer retention in Afghanistan electronic banking. Recently, Afghani banks have used CRM in order to make their customers satisfier and retain them in their bank. However,... more
The aim of this research is to investigate the impact of CRM on customer retention in
Afghanistan electronic banking. Recently, Afghani banks have used CRM in order to
make their customers satisfier and retain them in their bank. However, there are not
available studies that investigated the impact of CRM in these banks especially in
electronic environment.
This study first reviews and analyzes the previous researches that investigate the
relationship between CRM and firm performance and customer retention which is one
of the main goals of CRM. Then, we suggest a process oriented framework based on
two important factors which affect the outcomes of CRM in an organization and links
CRM to customer retention. Resource-based-view and process-oriented approach are
two factors that are considered as main drivers of a successful CRM in customer
retention. In order to be able to appropriately measure the extent of the usage of each
of the research variables across organization, suitable dimensions for each of the
research variables are defined based on the literature. In this regard, CRM resources are
measured with five dimensions which are operational CRM technologies, collaborative
CRM technologies, analytical CRM technologies, organizational, and human CRM
resources. The gathered data have been analyzed using quantitative and qualitative
methods based on a survey strategy.
The results of data analysis show that Azipay CRM had not have positive impact on
customer retention in this bank. And this is because of the direct effect of all CRM
resources including technological and infrastructural resources on CRM processes and
also the direct effect of CRM processes on customer retention programs of CRM which
themselves have direct effect on customer retention.
Keywords: Customer Relationship Management; CRM; customer retention; electronic
banking; Afghanistan
2024, E. Battelli (ed.), Diritto private digitale, Giappichelli
2024
The paper studies the impact of the introduction of pipeline forwarding on the network of a large Internet Service Provider trying to provide a detailed analysis of the trade-offs between costs and benefits. The network of Telecom Italia... more
The paper studies the impact of the introduction of pipeline forwarding on the network of a large Internet Service Provider trying to provide a detailed analysis of the trade-offs between costs and benefits. The network of Telecom Italia is considered as a case study.
2024, Revista Electrónica de Direito. RED
Net neutrality debate has been gaining momentum over the years, particularly, since the beginning of this decade. As a result, policymakers have taken over this matter in very different approaches. As for today, United States of America... more
Net neutrality debate has been gaining momentum over the years, particularly, since the beginning of this decade. As a result, policymakers have taken over this matter in very different approaches. As for today, United States of America has opted for a non-neutral internet, while European Union, India, and some South American countries (mainly Chile in 2011 and Brazil in 2014) are enforcing net neutrality by law. The digital revolution and the development of the internet, now crucial of our society, economy, and daily lives, has been raised in its natural context of neutrality. This paper gives an overall review of its relevance and how it unfolds some of the classic fundamental rights in the digital world, with an examination of the main concepts in the light of the Regulation (EU) 2015/2120 of the European Parliament and of the Council of 25 November 2015 laying down measures concerning open internet access. We will follow the Guidelines elaborated by The Body of European Regulators for Electronic Communications (BEREC), for a standardized application of the Regulation through all European State Members. Finally, we will point out some concerns regarding the forthcoming review, expected for the 30th April 2019, as stated in Article 9 of the Regulation.
2024, ACM SIGCOMM Computer Communication Review
The Network Neutrality (NN) debate refers to the battle over the design of a regulatory framework for preserving the Internet as a public network and open innovation platform. Fueled by concerns that broadband access service providers... more
The Network Neutrality (NN) debate refers to the battle over the design of a regulatory framework for preserving the Internet as a public network and open innovation platform. Fueled by concerns that broadband access service providers might abuse network management to discriminate against third party providers (e.g., content or application providers), policymakers have struggled with designing rules that would protect the Internet from unreasonable network management practices. In this article, we provide an overview of the history of the debate in the U.S. and the EU and highlight the challenges that will confront network engineers designing and operating networks as the debate continues to evolve.
2024, TELKOMNIKA Telecommunication Computing Electronics and Control
In the highly competitive landscape of Malaysian internet service providers (ISPs), users seek efficient ways to assess service quality. While various websites allow visual comparisons of fiber ISPs, a direct side-by-side evaluation... more
In the highly competitive landscape of Malaysian internet service providers (ISPs), users seek efficient ways to assess service quality. While various websites allow visual comparisons of fiber ISPs, a direct side-by-side evaluation remains elusive. A survey of 101 respondents revealed that 92.1% found researching a company’s reputation time-consuming. Additionally, relying on English-centric online ratings may lead to skewed outcomes, disregarding reviews in diverse languages. In response, we developed a webbased dashboard utilizing Twitter sentiment analysis (SA) and the naïve Bayes (NB) algorithm to classify Malaysia’s best fiber ISPs. The SA focused on four key factors: package price, internet speed, coverage area, and customer service, simplifying the comparison process. The system’s usability and functionality tests showed that both the English and Malay models could classify scraped Twitter data with an accuracy of 80%. The system’s remarkable usability score of 94.58% on the system usability scale (SUS) confirms its acceptability and excellent performance in achieving research goals.
2024, Journal of Emerging Technologies and Innovative Research
Abstract-- Cloud computing is a recent development in the world of Information Technology offering IT capabilities as services. It involves parallel computing, distributed computing, grid computing, and virtualization technologies. In... more
Abstract-- Cloud computing is a recent development in the world of Information Technology offering IT capabilities as services. It involves parallel computing, distributed computing, grid computing, and virtualization technologies. In this research paper, the concepts of cloud architecture and platforms. The various applications of cloud computing and their unique characteristics are differentiated on how they work on different platforms. Like any other technology with shortcomings, the challenges of using cloud interoperability and cloud computing adoption perspectives are also highlighted. Issues of security, compliance, reliability, legal issues and privacy that present a primary barrier to users are also discussed.
2024, Proche-Orient Études en management
L'économie du début de notre siècle est bien digitale et bénéficie d'un formidable potentiel de croissance et de création de valeur. Elle est aujourd'hui infiltrée dans la majorité de nos activités économiques, transformant en profondeur... more
L'économie du début de notre siècle est bien digitale et bénéficie d'un formidable potentiel de croissance et de création de valeur. Elle est aujourd'hui infiltrée dans la majorité de nos activités économiques, transformant en profondeur nos sociétés. En effet, en quelques années, l'internet et ses dérivés ont révolutionné notre quotidien et sont devenus indispensables à la majorité d'entre nous, faisant partie intégrante de notre vie. En 2017, nous avons franchi une nouvelle étape dans le monde digital : plus de la moitié de la population mondiale utilise l'internet, plus du tiers le fait pour accéder aux réseaux sociaux et presque les deux tiers utilisent le mobile 1 . Chaque jour, des millions de millions de millions de données sont créées. Selon un récent rapport d'IBM de Jack Loechner 2 , intitulé « 10 tendances clés du marketing pour 2017 », 90% des données dans le monde d'aujourd'hui ont été créées au cours des deux dernières années, à raison de 2,5 quintiles d'octets de données par jour ! Et, avec les nouveaux dispositifs, les capteurs de l'Internet des Objets et les nouvelles technologies émergentes, le taux de croissance des données continue à augmenter exponentiellement. Cette évolution technologique a été un facteur clé pour améliorer le mode de vie des gens, en offrant toute une gamme d'avantages sociaux et économiques dans tous les secteurs, tels que la cybersanté, l'e-éducation, l'e-business, les réseaux intelligents, les villes intelligentes, le gouvernement électronique, pour n'en citer que quelques-uns. L'économie numérique occupe désormais une place primordiale dans tous les marchés, et le phénomène n'est pas seulement observé dans le monde développé, mais c'est aussi le cas, de plus en plus, dans les pays émergents et les pays en voie de développement. 1. État des lieux 2017 : l'usage d'Internet, des réseaux sociaux, des messageries et du mobile -Thomas Coëffé, le 24 janvier 2017 2. Jack Loechner chercheur éditeur pour Media Research
2024
The advent of the Internet has posed unprecedented challenges on enforcing copyright. Online copyright infringements are pervasive, while it is not easy to impose liability on direct infringers, i.e., Internet users. This leads to a... more
The advent of the Internet has posed unprecedented challenges on enforcing copyright. Online copyright infringements are pervasive, while it is not easy to impose liability on direct infringers, i.e., Internet users. This leads to a debate over whether online platforms or online intermediaries, which are often named “Internet Service Providers” (ISPs), should be held liable for these infringing activities or not, and if so, how to balance between Internet freedom, technological innovation and the need for effective copyright enforcement in the digital era. The aim of this paper is to provide answers to these questions by analyzing ISP’s liability from different international approaches such as the United States, the European Union, and China; hence, some experience for Vietnam could be drawn. Finally, the authors make recommendations to address the shortcomings in Vietnam’s intellectual property law with respect to ISP’s liability. This research is perfectly timing, given that Vietn...