scispace - formally typeset
Search or ask a question

Showing papers on "The Internet published in 2002"


Book
14 May 2002
TL;DR: An ink jet comprises an elastic tubular member characterized by piezoelectric properties that is terminated in an orifice adapted to pass droplets of ink when the chamber formed within the tubular members is reduced in size.
Abstract: The first book to explore the hot new science of networks and their impact on nature, business, medicine, and everyday life. }In the 1980's, James Gleick's Chaos introduced the world to complexity. Now, Albert-Lszl Barabsi's Linked reveals the next major scientific leap: the study of networks. We've long suspected that we live in a small world, where everything is connected to everything else. Indeed, networks are pervasive--from the human brain to the Internet to the economy to our group of friends. These linkages, it turns out, aren't random. All networks, to the great surprise of scientists, have an underlying order and follow simple laws. Understanding the structure and behavior of these networks will help us do some amazing things, from designing the optimal organization of a firm to stopping a disease outbreak before it spreads catastrophically.In Linked, Barabsi, a physicist whose work has revolutionized the study of networks, traces the development of this rapidly unfolding science and introduces us to the scientists carrying out this pioneering work. These "new cartographers" are mapping networks in a wide range of scientific disciplines, proving that social networks, corporations, and cells are more similar than they are different, and providing important new insights into the interconnected world around us. This knowledge, says Barabsi, can shed light on the robustness of the Internet, the spread of fads and viruses, even the future of democracy. Engaging and authoritative, Linked provides an exciting preview of the next century in science, guaranteed to be transformed by these amazing discoveries.From Linked:This book has a simple message: think networks. It is about how networks emerge, what they look like, and how they evolve. It aims to develop a web-based view of nature, society, and technology, providing a unified framework to better understand issues ranging from the vulnerability of the Internet to the spread of diseases. Networks are present everywhere. All we need is an eye for them...We will see the challenges doctors face when they attempt to cure a disease by focusing on a single molecule or gene, disregarding the complex interconnected nature of the living matter. We will see that hackers are not alone in attacking networks: we all play Goliath, firing shots at a fragile ecological network that, without further support, could soon replicate our worst nightmares by turning us into an isolated group of species...Linked is meant to be an eye-opening trip that challenges you to walk across disciplines by stepping out of the box of reductionism. It is an invitation to explore link by link the next scientific revolution: the new science of networks. }

2,625 citations


Book ChapterDOI
09 Jun 2002
TL;DR: In this article, the authors propose a solution based on DAML-S, a DAMLbased language for service description, and show how service capabilities are presented in the Profile section of a DAMl-S description and how a semantic match between advertisements and requests is performed.
Abstract: The Web is moving from being a collection of pages toward a collection of services that interoperate through the Internet. The first step toward this interoperation is the location of other services that can help toward the solution of a problem. In this paper we claim that location of web services should be based on the semantic match between a declarative description of the service being sought, and a description of the service being offered. Furthermore, we claim that this match is outside the representation capabilities of registries such as UDDI and languages such as WSDL.We propose a solution based on DAML-S, a DAML-based language for service description, and we show how service capabilities are presented in the Profile section of a DAML-S description and how a semantic match between advertisements and requests is performed.

2,412 citations


Journal ArticleDOI
TL;DR: Kraut et al. as discussed by the authors reported negative effects of using the Internet on social involvement and psychological well-being among new Internet users in 1995-96 and found that negative effects dissipated.
Abstract: Kraut et al. (1998) reported negative effects of using the Internet on social involvement and psychological well-being among new Internet users in 1995–96. We called the effects a “paradox” because participants used the Internet heavily for communication, which generally has positive effects. A 3-year follow-up of 208 of these respondents found that negative effects dissipated. We also report findings from a longitudinal survey in 1998–99 of 406 new computer and television purchasers. This sample generally experienced positive effects of using the Internet on communication, social involvement, and well-being. However, consistent with a “rich get richer” model, using the Internet predicted better outcomes for extraverts and those with more social support but worse outcomes for introverts and those with less support.

2,064 citations


Patent
26 Mar 2002
TL;DR: In this article, a system and method for delivering customized electronic advertisements in an interactive communication system is presented, where customized advertisements are selected based on consumer profiles and are then integrated with offerings maintained by different content providers.
Abstract: The present invention is a system and method for delivering customized electronic advertisements in an interactive communication system. The customized advertisements are selected based on consumer profiles and are then integrated with offerings maintained by different content providers. The preferred interactive communication system interconnects multiple consumer computers, multiple content provider computers and multiple Internet provider computers with an advertisement provider computer. Whenever a consumer directs one of the consumer computers to access an offering existing in one of the content provider computers, an advertising request is sent to the advertisement provider computer. Upon receiving the advertising request, the advertising provider computer generates a custom advertisement based on the consumer's profile. The custom advertisement is then combined with the offering from the content provider computer and displayed to the consumer. The advertisement provider computer also credits a consumer account, a content provider account and an internet provider account each time a consumer views a custom advertisement. Furthermore, the advertisement provider computer tracks consumer responses to the customized advertisements.

1,911 citations


Journal ArticleDOI
09 Mar 2002-BMJ
TL;DR: Although their search technique was often suboptimal, internet users successfully found health information to answer questions in an average of 5 minutes 42 seconds (median 4 minutes 18 seconds) per question.
Abstract: Objectives: To describe techniques for retrieval and appraisal used by consumers when they search for health information on the internet. Design: Qualitative study using focus groups, naturalistic observation of consumers searching the world wide web in a usability laboratory, and in-depth interviews. Participants: A total of 21 users of the internet participated in three focus group sessions. 17 participants were given a series of health questions and observed in a usability laboratory setting while retrieving health information from the web; this was followed by in-depth interviews. Setting: Heidelberg, Germany. Results: Although their search technique was often suboptimal, internet users successfully found health information to answer questions in an average of 5 minutes 42 seconds (median 4 minutes 18 seconds) per question. Participants in focus groups said that when assessing the credibility of a website they primarily looked for the source, a professional design, a scientific or official touch, language, and ease of use. However, in the observational study, no participants checked any “about us” sections of websites, disclaimers, or disclosure statements. In the post-search interviews, it emerged that very few participants had noticed and remembered which websites they had retrieved information from. Conclusions: Further observational studies are needed to design and evaluate educational and technological innovations for guiding consumers to high quality health information on the web. What is already known on this topic Little is known about how consumers retrieve and assess the quality of health information on the internet Qualitative data are needed to design educational and technological innovations to guide consumers to high quality health information What this study adds Users of the internet explore only the first few links on general search engines when seeking health information Consumers say that when assessing the credibility of a site they primarily look for the source, a professional design, and a variety of other criteria In practice, internet users do not check the “about us” sections of websites, try to find out who authors or owners of the site are, or read disclaimers or disclosure statements Very few internet users later remember from which websites they retrieved information or who stood behind the sites

1,817 citations


Journal ArticleDOI
TL;DR: This research reports on a series of three studies that develop and validate Web site usability, design and performance metrics, including download delay, navigability, site content, interactivity, and responsiveness, which suggest that Web site success is a first-order construct.
Abstract: Web sites provide the key interface for consumer use of the Internet. This research reports on a series of three studies that developand validate Web site usability, design and performance metrics, including download delay, navigability, site content, interactivity, and responsiveness. The performance metric that was developed includes the subconstructs user satisfaction, the likelihood of return, and the frequency of use.Data was collected in 1997, 1999, and 2000 from corporate Web sites via three methods, namely, a jury, third-party ratings, and a software agent. Significant associations between Web site design elements and Web site performance indicate that the constructs demonstrate good nomological validity. Together, the three studies provide a set of measures with acceptable validity and reliability. The findings also suggest lack of significant common methods biases across the jury-collected data, third-party data, and agent-collected data.Results suggest that Web site success is a first-order construct. Moreover, Web site success is significantly associated with Web site download delay (speed of access and display rate within the Web site), navigation (organization, arrangement, layout, and sequencing), content (amount and variety of product information), interactivity (customization and interactivity), and responsiveness (feedback options and FAQs).

1,755 citations


Patent
18 Nov 2002
TL;DR: In this paper, a system for integrating video programming with the vast information resources of the Internet is presented, where the web pages are synchronized to the video content for display in conjunction with a television program being broadcast to the user at that time.
Abstract: A system for integrating video programming with the vast information resources of the Internet. A computer-based system receives a video program with embedded uniform resource locators (URLs). The URLs, the effective addresses of locations or Web sites on the Internet, are interpreted by the system and direct the system to the Web site locations to retrieve related Web pages. Upon receipt of the Web pages by the system, the Web pages are synchronized to the video content for display. The video program signal can be displayed on a video window on a conventional personal computer screen. The actual retrieved Web pages are time stamped to also be displayed, on another portion of the display screen, when predetermined related video content is displayed in the video window. As an alternative, the computer-based system receives the URLs directly through an Internet connection, at times specified by TV broadcasters in advance. The system interprets the URLs and retrieves the appropriate Web pages. The Web pages are synchronized to the video content for display in conjunction with a television program being broadcast to the user at that time. This alternative system allows the URLs to be entered for live transmission to the user.

1,504 citations


Journal ArticleDOI
TL;DR: It is suggested that people search for content in a myriad of ways and there is considerable difference in whether individuals are able to find various types of content on the Web and a large variance in how long it takes to complete online tasks.
Abstract: Much of the existing literature on the digital divide - the differences between the "haves" and "have nots" regarding access to the Internet - limits its scope to a binary classification of technology use by only considering whether someone does or does not use the Internet. To remedy this shortcoming, in this paper I look at the differences in people's online skills. In order to measure online ability, I assigned search tasks to a random sample of Internet users from a suburban county in the United States. My findings suggest that people search for content in a myriad of ways and there is considerable difference in whether individuals are able to find various types of content on the Web and a large variance in how long it takes to complete online tasks. Age is negatively associated with one's level of Internet skill, experience with the technology is positively related to online skill, and differences in gender do little to explain the variance in the ability of different people to find content online.

1,399 citations


Journal ArticleDOI
TL;DR: This article found that people who can better disclose their true self to others on the Internet than in face-to-face settings will be more likely to form close relationships on-line and will tend to bring those virtual relationships into their real lives.
Abstract: We hypothesized that people who can better disclose their “true” or inner self to others on the Internet than in face-to-face settings will be more likely to form close relationships on-line and will tend to bring those virtual relationships into their “real” lives. Study 1, a survey of randomly selected Internet newsgroup posters, showed that those who better express their true self over the Internet were more likely than others to have formed close on-line relationships and moved these friendships to a face-to-face basis. Study 2 revealed that the majority of these close Internet relationships were still intact 2 years later. Finally, a laboratory experiment found that undergraduates liked each other more following an Internet compared to a face-to-face initial meeting.

1,394 citations


Proceedings ArticleDOI
03 Jun 2002
TL;DR: The paper explores an algebraic framework to split the query to minimize the computation at the client site, and explores techniques to execute SQL queries over encrypted data.
Abstract: Rapid advances in networking and Internet technologies have fueled the emergence of the "software as a service" model for enterprise computing. Successful examples of commercially viable software services include rent-a-spreadsheet, electronic mail services, general storage services, disaster protection services. "Database as a Service" model provides users power to create, store, modify, and retrieve data from anywhere in the world, as long as they have access to the Internet. It introduces several challenges, an important issue being data privacy. It is in this context that we specifically address the issue of data privacy.There are two main privacy issues. First, the owner of the data needs to be assured that the data stored on the service-provider site is protected against data thefts from outsiders. Second, data needs to be protected even from the service providers, if the providers themselves cannot be trusted. In this paper, we focus on the second challenge. Specifically, we explore techniques to execute SQL queries over encrypted data. Our strategy is to process as much of the query as possible at the service providers' site, without having to decrypt the data. Decryption and the remainder of the query processing are performed at the client site. The paper explores an algebraic framework to split the query to minimize the computation at the client site. Results of experiments validating our approach are also presented.

1,351 citations


Book
01 Feb 2002
TL;DR: In The Future of Ideas, Lawrence Lessig explains how the Internet revolution has produced a counterrevolution of devastating power and effect, transforming it from an open forum for ideas into nothing more than cable television on speed.
Abstract: From the Publisher: "The Internet revolution has come. Some say it has gone. What was responsible for its birth? Who is responsible for its demise?" "In The Future of Ideas, Lawrence Lessig explains how the Internet revolution has produced a counterrevolution of devastating power and effect. The explosion of innovation we have seen in the environment of the Internet was not conjured from some new, previously unimagined technological magic; instead, it came from an ideal as old as the nation. Creativity flourished there because the Internet protected an innovation commons. The Internet's very design built a neutral platform upon which the widest range of creators could experiment. The legal architecture surrounding it protected this free space so that culture and information - the ideas of our era - could flow freely and inspire an unprecedented breadth of expression. But this structural design is changing - both legally and technically." This shift will destroy the opportunities for creativity and innovation that the Internet originally engendered. The cultural dinosaurs of our recent past are moving to quickly remake cyberspace so that they can better protect their interests against the future. Powerful forces are swiftly using both law and technology to "tame" the internet, transforming it from an open forum for ideas into nothing more than cable television on speed. Innovation, once again, will be directed from the top down, increasingly controlled by owners of the networks, holders of the largest patent portfolios, and, most invidiously, hoarders of copyrights.

Proceedings Article
05 Aug 2002
TL;DR: This work develops and evaluates several new, highly virulent possible techniques: hit-list scanning, permutation scanning, self-coordinating scanning, and use of Internet-sized hit-lists (which creates a flash worm).
Abstract: The ability of attackers to rapidly gain control of vast numbers of Internet hosts poses an immense risk to the overall security of the Internet. Once subverted, these hosts can not only be used to launch massive denial of service floods, but also to steal or corrupt great quantities of sensitive information, and confuse and disrupt use of the network in more subtle ways. We present an analysis of the magnitude of the threat. We begin with a mathematical model derived from empirical data of the spread of Code Red I in July, 2001. We discuss techniques subsequently employed for achieving greater virulence by Code Red II and Nimda. In this context, we develop and evaluate several new, highly virulent possible techniques: hit-list scanning (which creates a Warhol worm), permutation scanning (which enables self-coordinating scanning), and use of Internet-sized hit-lists (which creates a flash worm).

Journal ArticleDOI
TL;DR: This article found that people who feel better able to express their true self in Internet rather than face-to-face interaction settings are more likely to form close relationships with people met on the Internet.
Abstract: Those who feel better able to express their “true selves” in Internet rather than face-to-face interaction settings are more likely to form close relationships with people met on the Internet (McKenna, Green, & Gleason, this issue). Building on these correlational findings from survey data, we conducted three laboratory experiments to directly test the hypothesized causal role of differential self-expression in Internet relationship formation. Experiments 1 and 2, using a reaction time task, found that for university undergraduates, the true-self concept is more accessible in memory during Internet interactions, and the actual self more accessible during face-to-face interactions. Experiment 3 confirmed that people randomly assigned to interact over the Internet (vs. face to face) were better able to express their true-self qualities to their partners.

Proceedings ArticleDOI
07 Nov 2002
TL;DR: This work proposes using coordinates-based mechanisms in a peer-to-peer architecture to predict Internet network distance (i.e. round-trip propagation and transmission delay), and proposes the GNP approach, based on absolute coordinates computed from modeling the Internet as a geometric space.
Abstract: We propose using coordinates-based mechanisms in a peer-to-peer architecture to predict Internet network distance (i.e. round-trip propagation and transmission delay). We study two mechanisms. The first is a previously proposed scheme, called the triangulated heuristic, which is based on relative coordinates that are simply the distances from a host to some special network nodes. We propose the second mechanism, called global network positioning (GNP), which is based on absolute coordinates computed from modeling the Internet as a geometric space. Since end hosts maintain their own coordinates, these approaches allow end hosts to compute their inter-host distances as soon as they discover each other. Moreover, coordinates are very efficient in summarizing inter-host distances, making these approaches very scalable. By performing experiments using measured Internet distance data, we show that both coordinates-based schemes are more accurate than the existing state of the art system IDMaps, and the GNP approach achieves the highest accuracy and robustness among them.

Journal ArticleDOI
TL;DR: Based on a content analysis of city web sites and a survey of web development officials, the authors shows that many cities are already moving toward this new paradigm, and they emphasize external collaboration and networking in the development process rather than technocracy.
Abstract: The Internet provides a powerful tool for reinventing local governments. It encourages transformation from the traditional bureaucratic paradigm, which emphasizes standardization, departmentalization, and operational cost-efficiency, to the “e-government” paradigm, which emphasizes coordinated network building, external collaboration, and customer services. Based on a content analysis of city Web sites and a survey of Web development officials, this article shows that many cities are already moving toward this new paradigm. These cities have adopted “onestop shopping” and customer-oriented principles in Web design, and they emphasize external collaboration and networking in the development process rather than technocracy. The article also analyzes the socioeconomic and organizational factors that are related to cities' progressiveness in Web development and highlights future challenges in reinventing government through Internet technology.

Journal ArticleDOI
TL;DR: The internet and its surrounding technologies hold the promise of reviving the public sphere; however, several aspects of these new technologies simultaneously curtail and augment that potential as discussed by the authors, and it is possible that internet-based technologies will adapt themselves to the current political culture, rather than create a new one.
Abstract: The internet and its surrounding technologies hold the promise of reviving the public sphere; however, several aspects of these new technologies simultaneously curtail and augment that potential. First, the data storage and retrieval capabilities of internet-based technologies infuse political discussion with information otherwise unavailable. At the same time, information access inequalities and new media literacy compromise the representativeness of the virtual sphere. Second, internet-based technologies enable discussion between people on far sides of the globe, but also frequently fragmentize political discourse. Third, given the patterns of global capitalism, it is possible that internet-based technologies will adapt themselves to the current political culture, rather than create a new one. The internet and related technologies have created a new public space for politically oriented conversation; whether this public space transcends to a public sphere is not up to the technology itself.

BookDOI
TL;DR: The Internet in everyday life: An Introduction as mentioned in this paper explores the role of the Internet in the real world and its role in the formation and maintenance of social networks, as well as its effect on social capital and community involvement.
Abstract: List of Figures. List of Tables. Foreword: The Virtual Community in the Real World. (Howard Rheingold). Series Editora s Preface: The Internet and the Network Society . (Manuel Castells). Introduction: The Internet in Everyday Life. (Caroline Haythornthwaite and Barry Wellman). Part I: Moving The Internet Out Of Cyberspace. The internet in Everyday Life: An Introduction. (Caroline Haythornthwaite and Barry Wellman). Part II: The Place Of The Internet In Everyday Life. 1. Days and Nights on the Internet. (Philip Howard, Lee Rainie, and Steve Jones). 2 The Global Villagers: Comparing Internet Users and Uses Around the World. (Wenhong Chen, Jeffrey Boase and Barry Wellman). 3 Syntopia: Access, Civic Involvement and Social Interaction on the Net. (James Katz and Ronald Rice). 4 Digital Living: The Impact (or Otherwise) of the Internet in Everyday British Life. (Ben Anderson and Karina Tracey). 5 The Changing Digital Divide in Germany. (Gert Wagner, Rainer Pischner and John Haisken--DeNew). 6 Doing Social Science Research Online . (Alan Neustadtl, John Robinson and Meyer Kestnbaum). Part III: Finding Time For The Internet. 7 Internet Use, Interpersonal Relations and Sociability: A Time Diary Study. (Norman Nie, D. Sunshine Hillygus and Lutz Erbring). 8 The Internet and Other Uses of Time. (John Robinson, Meyer Kestnbaum, Alan Neustadtl and Anthony Alvarez). 9 Everyday Communication Patterns of Heavy and Light Email Users. (Janell Copher, Alaina Kanfer and Mary Bea Walker). Part IV: The Internet In The Community. 10 Capitalizing on the Net: Social Contact, Civic Engagement and Sense of Community. (Anabel Quan--Haase and Barry Wellman). 11 The Impact of Computer Networks on Social Capital and Community Involvement in Blacksburg. (Andrea Kavanaugh and Scott Patterson). 12 The Not So Global Village of Netville. (Keith Hampton and Barry Wellman). 13 Gender and Personal Relationships in HomeNet. (Bonka Boneva and Robert Kraut). 14 Belonging in Geographic, Ethnic and Internet Spaces. (Sorin Matei and Sandra Ball--Rokeach). Part V: The Internet At School, Work And Home. 15 Bringing the Internet Home: Adult distance learners and their Internet, Home and Work worlds. (Caroline Haythornthwaite and Michelle Kazmer). 16 Where Home is the Office: The New Form of Flexible Work. (Janet Salaff). 17 Kerala Connections: Will the Internet Affect Science in Developing Areas?. (Teresa Davidson, R. Sooryamoorthy and Wesley Shrum). 18 Social Support for Japanese Mothers Online and Offline . (Kakuko Miyata). 19 Shopping Behavior Online. (Robert Lunn and Michael Suman). Index

Journal ArticleDOI
TL;DR: Though all dimensions of a B2C web site seem to have an impact on the online purchase intent of consumers, security and privacy were found to have greater effect on the purchaseintent of consumers.

Journal ArticleDOI
TL;DR: Regression analysis shows that the life content of products, transactions security, price, vendor quality, IT education and Internet usage significantly affect the initial willingness of Singaporeans to e-shop on the Internet.

Journal ArticleDOI
TL;DR: This work shows that the Web self-organizes and its link structure allows efficient identification of communities and is significant because no central authority or process governs the formation and structure of hyperlinks.
Abstract: The vast improvement in information access is not the only advantage resulting from the increasing percentage of hyperlinked human knowledge available on the Web. Additionally, much potential exists for analyzing interests and relationships within science and society. However, the Web's decentralized and unorganized nature hampers content analysis. Millions of individuals operating independently and having a variety of backgrounds, knowledge, goals and cultures author the information on the Web. Despite the Web's decentralized, unorganized, and heterogeneous nature, our work shows that the Web self-organizes and its link structure allows efficient identification of communities. This self-organization is significant because no central authority or process governs the formation and structure of hyperlinks.

Patent
25 Jan 2002
TL;DR: In this paper, a system and method for universal access to voice-based documents containing information formatted using MIME and HTML standards using customized extensions for voice information access and navigation is presented.
Abstract: A system and method provides universal access to voice-based documents containing information formatted using MIME and HTML standards using customized extensions for voice information access and navigation. These voice documents are linked using HTML hyper-links that are accessible to subscribers using voice commands, touch-tone inputs and other selection means. These voice documents and components in them are addressable using HTML anchors embedding HTML universal resource locators (URLs) rendering them universally accessible over the Internet. This collection of connected documents forms a voice web. The voice web includes subscriber-specific documents including speech training files for speaker dependent speech recognition, voice print files for authenticating the identity of a user and personal preference and attribute files for customizing other aspects of the system in accordance with a specific subscriber.

Journal Article
TL;DR: The Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide as discussed by the authors examines theories of technological diffusion and points out that the American response to the Internet is more akin to the rapid spread of televisions and VCRs than the slower adoption of telephones and radios.
Abstract: Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide. Pippa Norris. New York: Cambridge University Press, 2002. 303 pp. $60 hbk., $20 pbk. Forecasts that the Internet heralds a world of more democracy and less poverty seem as inflated as dot.com stocks. This rosy view has electronic voting, political chat rooms, and email access re-engaging apathetic publics in politics. Digital technologies redress economic disparities, and the benefits of the Internet percolate down to transform poor societies. Equally exaggerated is the gloom of naysayers. The Internet Age has done little to narrow the gap between rich and poor countries, the information haves and havenots, cyber-skeptics contend. Indeed, digital technologies could create new inequalities and reinforce the dominance of power elites. In her new book, Digital Divide, Pippa Norris, associate director of the Joan Shorenstein Center on the Press, Politics and Public Policy at Harvard University, steps into this fusillade of cyber-hyperbole, lowers the decibel with a well-written and thoughtful examination of Internet use and access in 179 countries and dissects the claims and counter-claims. Her research and findings place her on middle ground, somewhere between current reality and optimism. The Internet era seems to be changing "politics as usual" in a number of countries, expanding and loosening information about governments and politics, allowing the entrance of new political players, and fostering international movements on the environment, women's rights, and other issues across borders. The disappointment is that digital technologies are activating the already politically active and passing up the disengaged and uninterested. A major challenge to digital democracy is the gulf between the United States, Scandinavia, and other early Internet adopters and the rest of the world. That gap is now so wide that at the turn of the century, more than three-quarters of the online community lived in the developed world. Internet use tracks the path of economic and technological development. But that situation could begin to change, Norris says. The Internet is in its technological adolescence. Costs of access are falling. And governments can make a difference if policymakers take the initiative. We have the historical patterns of other communication technologies to study. Norris examines theories of technological diffusion and points out that the American response to the Internet is more akin to the rapid spread of televisions and VCRs than the slower adoption of telephones and radios. American dominance could recede as Internet access grows worldwide. Contrary to what officials of the Bush Administration contend, Norris finds that the digital divide between rich and poor within the United States remains substantial. Europe mirrors that trend. In the long run, the Internet could become more accessible to the excluded: lower income families, minorities, and women. …

Journal ArticleDOI
TL;DR: Primary care providers should recognize that patients are using the World Wide Web as a source of medical and health information and should be prepared to offer suggestions for Web-based health resources and to assist patients in evaluating the quality of medical information available on the Internet.
Abstract: The use of the Internet as a source of medical information has become increasingly popular as more patients “go online.” According to a recent United States survey, 52 million adults have used the World Wide Web to obtain health or medical information.1 By 2005, an estimated 88.5 million adults will use the Internet to research health information and/or health-related products and to communicate with providers.2 Access to large amounts of medical information is available through an estimated 20,000 to 100,000 health-related Web sites.2,3 Patient-provider relationships will probably change, and medical providers will face new challenges as patients obtain health information from the Internet, share only some of this with their physicians, or potentially turn to the Internet instead of consulting a health care provider.4 Although information is available on the use of the Internet for health information, few studies have specifically examined Internet use among patient populations,4–7 and no previous reports have focused on a primary care patient population. The goals of this study were to 1) determine the percentage of patients from an internal medicine private practice who use the Internet to obtain healthcare information, 2) describe the types of information sought, 3) evaluate patients' perceptions of the quality of information available on the Internet compared to their medical providers, and 4) determine if patients who use the Internet for health information discuss this information with their doctors.

Journal Article
TL;DR: The application of a new version of WebQual to Internet bookstores: Amazon, BOL, and the Internet Bookshop is reported on.
Abstract: WebQual is a method for assessing the quality of Web sites. The method has been developed iteratively through application in various domains, including Internet bookstores and Internet auction sites. In this paper we report on the application of a new version of WebQual to Internet bookstores: Amazon, BOL, and the Internet Bookshop. WebQual draws on previous work in three areas: Web site usability, information quality, and service interaction quality to provide a rounded framework for assessing e-commerce offerings. Although WebQual is grounded in the subjective impressions of Web site users, the data collected lends itself to quantitative analysis and the production of e-commerce metrics such as the WebQual Index. The reliability of the instrument is examined and core constructs of Web site quality identified using factor analysis. The role of WebQual in assessing an organization’s e-commerce capability is discussed.

Proceedings ArticleDOI
07 Nov 2002
TL;DR: In this paper, the authors present a binning scheme whereby nodes partition themselves into bins such that nodes that fall within a given bin are relatively close to one another in terms of network latency.
Abstract: A number of large-scale distributed Internet applications could potentially benefit from some level of knowledge about the relative proximity between its participating host nodes. For example, the performance of large overlay networks could be improved if the application-level connectivity between the nodes in these networks is congruent with the underlying IP-level topology. Similarly, in the case of replicated Web content, client nodes could use topological information in selecting one of multiple available servers. For such applications, one need not find the optimal solution in order to achieve significant practical benefits. Thus, these applications, and presumably others like them, do not require exact topological information and can instead use sufficiently informative hints about the relative positions of Internet hosts. In this paper, we present a binning scheme whereby nodes partition themselves into bins such that nodes that fall within a given bin are relatively close to one another in terms of network latency. Our binning strategy is simple (requiring minimal support from any measurement infrastructure), scalable (requiring no form of global knowledge, each node only needs knowledge of a small number of well-known landmark nodes) and completely distributed (requiring no communication or cooperation between the nodes being binned). We apply this binning strategy to the two applications mentioned above: overlay network construction and server selection. We test our binning strategy and its application using simulation and Internet measurement traces. Our results indicate that the performance of these applications can be significantly improved by even the rather coarse-grained knowledge of topology offered by our binning scheme.

Journal ArticleDOI
Bomil Suh1, Ingoo Han1
TL;DR: This study introduces trust as another belief that has an impact on the acceptance of Internet banking and collects cases on the Web to survey users’ behavior towards Internet banks.

Proceedings ArticleDOI
07 Aug 2002
TL;DR: DBXplorer, a system that enables keyword-based searches in relational databases using a commercial relational database and Web server and allows users to interact via a browser front-end is discussed.
Abstract: Internet search engines have popularized the keyword-based search paradigm. While traditional database management systems offer powerful query languages, they do not allow keyword-based search. In this paper, we discuss DBXplorer, a system that enables keyword-based searches in relational databases. DBXplorer has been implemented using a commercial relational database and Web server and allows users to interact via a browser front-end. We outline the challenges and discuss the implementation of our system, including results of extensive experimental evaluation.

Book
01 Aug 2002
TL;DR: In this paper, the authors present a business model and strategies for valuing companies' Internet efforts, and present a framework that allows users to make more informed theory-based arguments as to how successful an Internet-based firm is likely to be, how much it might be worth, and the relative merits of formulating and implementing an Internet strategy for an established firm.
Abstract: From the Publisher: Despite the Internet's phenomenal impact on business and its reach across all sectors,no model has emerged for thoughtfully valuing companies' Internet efforts. In addition,strategies for effectively competing in this environment are just beginning to materialize. This book addresses both of these critical aspects of the Internet and offers business models and strategies for better understanding this important phenomenon. In the words of the authors,"The framework (presented here) allows users of the text to make more informed theory-based arguments as to how successful an Internet-based firm is likely to be,how much it might be worth,and the relative merits of formulating and implementing an Internet strategy for an established firm. "

Journal ArticleDOI
TL;DR: This work studied the topology and protocols of the public Gnutella network to evaluate costs and benefits of the peer-to-peer (P2P) approach and to investigate possible improvements that would allow better scaling and increased reliability in Gnutsella and similar networks.
Abstract: We studied the topology and protocols of the public Gnutella network. Its substantial user base and open architecture make it a good large-scale, if uncontrolled, testbed. We captured the network's topology, generated traffic, and dynamic behavior to determine its connectivity structure and how well (if at all) Gnutella's overlay network topology maps to the physical Internet infrastructure. Our analysis of the network allowed us to evaluate costs and benefits of the peer-to-peer (P2P) approach and to investigate possible improvements that would allow better scaling and increased reliability in Gnutella and similar networks. A mismatch between Gnutella's overlay network topology and the Internet infrastructure has critical performance implications.

15 Sep 2002
TL;DR: Use of the Internet is a part of college students’ daily routine, in part because they have grown up with computers, and has become a technology as ordinary as the telephone or television.
Abstract: Summary of Findings College students are early adopters and heavy users of the Internet College students are heavy users of the Internet compared to the general population. Use of the Internet is a part of college students’ daily routine, in part because they have grown up with computers. It is integrated into their daily communication habits and has become a technology as ordinary as the telephone or television. One-fifth (20%) of today’s college students began using computers between the ages of 5 and 8. By the time they were 16 to 18 years old all of today’s current college students had begun using computers – and the Internet was a commonplace in the world in which they lived. Eighty-six percent of college students have gone online, compared with 59% of the general population. College students are frequently looking for email, with 72% checking email at least once a day. About half (49%) first began using the Internet in college; half (47%) first began using it at home before they arrived at college. The great majority (85%) of college students own their own computer, and two-thirds (66%) use at least two email addresses. Seventy-eight percent of college Internet users say that at one time or another they have gone online just to browse for fun, compared to 64% of all Internet users. College Internet users are twice as likely to have ever downloaded music files when compared to all Internet users: 60% of college Internet users have done so compared to 28% of the overall population. College Internet users are twice as likely to use instant messaging on any given day compared to the average Internet user. On a typical day, 26% of college students use IM; 12% of other Internet users are using IM on an average day.