نتایج جستجو برای: internet law

تعداد نتایج: 336363  

Journal: :مجله مطالعات حقوق تطبیقی 0
همایون مافی دانشیار دانشگاه علوم قضایی و خدمات اداری سودابه اسدیان دانشجوی دکتری حقوق خصوصی دانشگاه مازندران

the emergence of the internet severely affected the social life. cyberspace, regardless of geographical constraints, has provided the possiblity of fast and affordable communication for all people around the world. the increase of international electronic contracts has caused the courts to confront the challenge of determining jurisdiction in cases involving such contracts. traditional rules of...

1999
Christopher Ting Tiang Hwee Ong Yong Tai Tan Pek Yong Ng

In this article, we propose a framework to accelerate the ubiquitous capitalization of Internet as a vehicle to merchandise goods and services. The motivation for proposing this framework derives from the fact that many consumers and small-to-medium-sized companies are still hesitant to use Internet to shop, trade and disclose sensitive information such as credit card numbers. While IT security...

2006
Raúl J. Mondragón

The Internet topology at the Autonomous Systems level (AS graph) has a power– law degree distribution and a tier structure. In this paper, we introduce the Interactive Growth (IG) model based on the joint growth of new nodes and new links. This simple and dynamic model compares favorable with other Internet power–law topology generators because it not only closely resembles the degree distribut...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2002
William J Reed Barry D Hughes

We present a simple explanation for the occurrence of power-law tails in statistical distributions by showing that if stochastic processes with exponential growth in expectation are killed (or observed) randomly, the distribution of the killed or observed state exhibits power-law behavior in one or both tails. This simple mechanism can explain power-law tails in the distributions of the sizes o...

Journal: :JGIM 2007
Jaymeen R. Shah Garry L. White James R. Cook

abstract Privacy laws for the Internet are difficult to develop and implement domestically and internationally. A clear problem is how such laws are limited to national jurisdictions. What is legal in one country may be illegal in another. Due to differences in cultures and values, and government types, it may not be possible to establish global standards and legislations to ensure privacy. Due...

2014
Gerd Teepe

Microelectronics is the dominant industrial technology of today. Its rate of innovation, spelled out by Moore’s Law, is exceptional by any commercial metric, especially, as it has been on this trajectory for almost 40 years. It is not surprising, that other industrial sectors are taking advantage of the innovation engine of the semiconductors for its own product innovation: Cars are safer and m...

2007
Leszek Lilien Bharat Bhargava

The need for privacy is broadly recognized by individuals, businesses, the government, the computer industry, and academic researchers. Examples are shown in Figure 1. The growing recognition of the importance of privacy is motivated not only by users’ sensitivity about their personal data. Other factors include business losses due to privacy violations, and enactments of federal and state priv...

Journal: :IEICE Transactions 2004
Masaki Aida Keisuke Ishibashi Hiroyoshi Miwa Chisa Takano

The number of customers of a service for Internet access from cellular phones in Japan has been explosively increasing for some time. We analyze the relation between the number of customers and the volume of traffic, with a view to finding clues to the structure of human relations among the very large set of potential customers of the service. The traffic data reveals that this structure is a s...

2006
Steven Bellovin

For many people, Voice over Internet Protocol (VoIP) looks like a nimble way of using a computer to make phone calls. Download the software, pick an identifier and then wherever there is an Internet connection, you can make a phone call. From this perspective, it makes perfect sense that anything that can be done with the telephone system — such as E911 and the graceful accommodation of wiretap...

Journal: :Child abuse & neglect 2014
Janis Wolak Marc Liberatore Brian Neil Levine

We used data gathered via investigative "RoundUp" software to measure a year of online child pornography (CP) trafficking activity by U.S. computers on the Gnutella peer-to-peer network. The data include millions of observations of Internet Protocol addresses sharing known CP files, identified as such in previous law enforcement investigations. We found that 244,920 U.S. computers shared 120,41...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید