scispace - formally typeset
Search or ask a question

Showing papers on "The Internet published in 2010"


Journal ArticleDOI
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.

12,539 citations


Book
25 Mar 2010
TL;DR: This book brings together for the first time the most important breakthroughs in each of these fields and presents them in a coherent fashion, highlighting the strong interconnections between work in different areas.
Abstract: The scientific study of networks, including computer networks, social networks, and biological networks, has received an enormous amount of interest in the last few years. The rise of the Internet and the wide availability of inexpensive computers have made it possible to gather and analyze network data on a large scale, and the development of a variety of new theoretical tools has allowed us to extract new knowledge from many different kinds of networks.The study of networks is broadly interdisciplinary and important developments have occurred in many fields, including mathematics, physics, computer and information sciences, biology, and the social sciences. This book brings together for the first time the most important breakthroughs in each of these fields and presents them in a coherent fashion, highlighting the strong interconnections between work in different areas. Subjects covered include the measurement and structure of networks in many branches of science, methods for analyzing network data, including methods developed in physics, statistics, and sociology, the fundamentals of graph theory, computer algorithms, and spectral methods, mathematical models of networks, including random graph models and generative models, and theories of dynamical processes taking place on networks.

10,567 citations


Journal ArticleDOI
15 Apr 2010-Nature
TL;DR: In this paper, the authors develop a framework for understanding the robustness of interacting networks subject to cascading failures and present exact analytical solutions for the critical fraction of nodes that, on removal, will lead to a failure cascade and to a complete fragmentation of two interdependent networks.
Abstract: Complex networks have been studied intensively for a decade, but research still focuses on the limited case of a single, non-interacting network. Modern systems are coupled together and therefore should be modelled as interdependent networks. A fundamental property of interdependent networks is that failure of nodes in one network may lead to failure of dependent nodes in other networks. This may happen recursively and can lead to a cascade of failures. In fact, a failure of a very small fraction of nodes in one network may lead to the complete fragmentation of a system of several interdependent networks. A dramatic real-world example of a cascade of failures ('concurrent malfunction') is the electrical blackout that affected much of Italy on 28 September 2003: the shutdown of power stations directly led to the failure of nodes in the Internet communication network, which in turn caused further breakdown of power stations. Here we develop a framework for understanding the robustness of interacting networks subject to such cascading failures. We present exact analytical solutions for the critical fraction of nodes that, on removal, will lead to a failure cascade and to a complete fragmentation of two interdependent networks. Surprisingly, a broader degree distribution increases the vulnerability of interdependent networks to random failure, which is opposite to how a single network behaves. Our findings highlight the need to consider interdependent network properties in designing robust networks.

3,651 citations


Journal ArticleDOI
TL;DR: Galaxy Pages are interactive, web-based documents that provide users with a medium to communicate a complete computational analysis and provide support for capturing the context and intent of computational methods.
Abstract: Increased reliance on computational approaches in the life sciences has revealed grave concerns about how accessible and reproducible computation-reliant results truly are. Galaxy http://usegalaxy.org, an open web-based platform for genomic research, addresses these problems. Galaxy automatically tracks and manages data provenance and provides support for capturing the context and intent of computational methods. Galaxy Pages are interactive, web-based documents that provide users with a medium to communicate a complete computational analysis.

3,576 citations


Journal ArticleDOI
TL;DR: The Tailored Design Method as mentioned in this paper aims to achieve high-quantity and high-quality survey response by minimizing four sources of survey error (coverage, sampling, nonresponse, and measurement) and motivating respondents using features informed by scientiÞc evidence.
Abstract: Dillman, Smyth, and Christian offer in the third edition a practical guide to survey research across content areas. The Tailored Design Method aims to achieve high-quantity and high-quality survey response by minimizing 4 sources of survey error (coverage, sampling, nonresponse, andmeasurement) and motivating respondents using features informed by scientiÞc evidence. This new edition updates the previous edition by articulating the current climate of survey research and integrating Web-based survey design throughout the book alongside the discussion of longstanding traditional mail, in-person, and telephone modes of data collection. After a brief history of survey research, the second chapter explores tailored design as a conceptual framework for survey design based on the unique situation and target population and focused on improving accuracy and completion rates of respondents. Coverage and sampling considerations and processes are reviewed in Chapter 3. The next 3 chapters introduce evidence-based guidelines for (1) writing highquality questions with tips ranging from word choice to visual presentation, (2) constructing openand closed-ended

2,747 citations


Book
19 Jul 2010
TL;DR: In this article, an introductory undergraduate textbook takes an interdisciplinary look at economics, sociology, computing and information science, and applied mathematics to understand networks and behavior, addressing fundamental questions about how the social, economic, and technological worlds are connected.
Abstract: Over the past decade there has been a growing public fascination with the complex connectedness of modern society. This connectedness is found in many incarnations: in the rapid growth of the Internet, in the ease with which global communication takes place, and in the ability of news and information as well as epidemics and financial crises to spread with surprising speed and intensity. These are phenomena that involve networks, incentives, and the aggregate behavior of groups of people; they are based on the links that connect us and the ways in which our decisions can have subtle consequences for others. This introductory undergraduate textbook takes an interdisciplinary look at economics, sociology, computing and information science, and applied mathematics to understand networks and behavior. It describes the emerging field of study that is growing at the interface of these areas, addressing fundamental questions about how the social, economic, and technological worlds are connected.

2,650 citations


Journal ArticleDOI
TL;DR: The present review provides a framework for the development of a science of Internet-based interventions and provides a rationale for investing in more intensive theory- based interventions that incorporate multiple behavior change techniques and modes of delivery.
Abstract: Background: The Internet is increasingly used as a medium for the delivery of interventions designed to promote health behavior change. However, reviews of these interventions to date have not systematically identified intervention characteristics and linked these to effectiveness. Objectives: The present review sought to capitalize on recently published coding frames for assessing use of theory and behavior change techniques to investigate which characteristics of Internet-based interventions best promote health behavior change. In addition, we wanted to develop a novel coding scheme for assessing mode of delivery in Internet-based interventions and also to link different modes to effect sizes. Methods: We conducted a computerized search of the databases indexed by ISI Web of Knowledge (including BIOSIS Previews and Medline) between 2000 and 2008. Studies were included if (1) the primary components of the intervention were delivered via the Internet, (2) participants were randomly assigned to conditions, and (3) a measure of behavior related to health was taken after the intervention. Results: We found 85 studies that satisfied the inclusion criteria, providing a total sample size of 43,236 participants. On average, interventions had a statistically small but significant effect on health-related behavior (d+ = 0.16, 95% CI 0.09-0.23). More extensive use of theory was associated with increases in effect size (P = .049), and, in particular, interventions based on the theory of planned behavior tended to have substantial effects on behavior (d+ = 0.36, 95% CI 0.15-0.56). Interventions that incorporated more behavior change techniques also tended to have larger effects compared to interventions that incorporated fewer techniques (P < .001). Finally, the effectiveness of Internet-based interventions was enhanced by the use of additional methods of communicating with participants, especially the use of short message service (SMS), or text, messages. Conclusions: The review provides a framework for the development of a science of Internet-based interventions, and our findings provide a rationale for investing in more intensive theory-based interventions that incorporate multiple behavior change techniques and modes of delivery. [J Med Internet Res 2010;12(1):e4]

2,224 citations


03 Feb 2010
TL;DR: Pew Research Center report series that looks at the values, attitudes and experiences of America's next generation: the Millennials as mentioned in this paper found that since 2006, blogging has dropped among teens and young adults while simultaneously rising among older adults.
Abstract: This publication is part of a Pew Research Center report series that looks at the values, attitudes and experiences of America's next generation: the Millennials. Find out how today's teens and twentysomethings are reshaping the nation at: Since 2006, blogging has dropped among teens and young adults while simultaneously rising among older adults. As the tools and technology embedded in social networking sites change, and use of the sites continues to grow, youth may be exchanging 'macro‐blogging' for microblogging with status updates. Blogging has declined in popularity among both teens and young adults since 2006. Blog commenting has also dropped among teens.  14% of online teens now say they blog, down from 28% of teen internet users in 2006.  This decline is also reflected in the lower incidence of teen commenting on blogs within social networking websites; 52% of teen social network users report commenting on friends' blogs, down from the 76% who did so in 2006.  By comparison, the prevalence of blogging within the overall adult internet population has remained steady in recent years. Pew Internet surveys since 2005 have consistently found that roughly one in ten online adults maintain a personal online journal or blog. While blogging among adults as a whole has remained steady, the prevalence of blogging within specific age groups has changed dramatically in recent years. Specifically, a sharp decline in blogging by young adults has been tempered by a corresponding increase in blogging among older adults.  In December 2007, 24% of online 18‐29 year olds reported blogging, compared with 7% of those thirty and older.  By 2009, just 15% of internet users ages 18‐29 maintain a blog—a nine percentage point drop in two years. However, 11% of internet users ages thirty and older now maintain a personal blog. Both teen and adult use of social networking sites has risen significantly, yet there are shifts and some drops in the proportion of teens using several social networking site features.  73% of wired American teens now use social networking websites, a significant increase from previous surveys. Just over half of online teens (55%) used social networking sites in November 2006 and 65% did so in February 2008.  As the teen social networking population has increased, the popularity of some sites' features has shifted. Compared with SNS activity in February 2008, a smaller proportion of teens in mid‐ 2009 were …

1,849 citations


Proceedings ArticleDOI
13 Jun 2010
TL;DR: The design, construction and verification of cyber-physical systems pose a multitude of technical challenges that must be addressed by a cross-disciplinary community of researchers and educators.
Abstract: Cyber-physical systems (CPS) are physical and engineered systems whose operations are monitored, coordinated, controlled and integrated by a computing and communication core. Just as the internet transformed how humans interact with one another, cyber-physical systems will transform how we interact with the physical world around us. Many grand challenges await in the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defense, aerospace and buildings. The design, construction and verification of cyber-physical systems pose a multitude of technical challenges that must be addressed by a cross-disciplinary community of researchers and educators.

1,692 citations


Proceedings ArticleDOI
26 Feb 2010
TL;DR: The time is right for the members of the emerging cloud computing community to come together around the notion of an open cloud, and these core principles are rooted in the belief that cloud computing should be as open as all other IT technologies.
Abstract: As with any new trend in the IT world, enterprises must figure out the benefits and risks of cloud computing and the best way to use this technology. The buzz around cloud computing has reached a fever pitch. Some believe it is a disruptive trend representing the next stage in the evolution of the internet. Others believe it is hype, as it uses long established computing technologies. One thing is clear: The industry needs an objective, straightforward conversation about how this new computing paradigm will impact organizations, how it can be used with existing technologies, and the potential pitfalls of proprietary technologies that can lead to lock-in and limited choice. This document is intended to initiate a conversation that will bring together the emerging cloud computing community (both cloud users and cloud vendors) around a core set of principles. We believe that these core principles are rooted in the belief that cloud computing should be as open as all other IT technologies. This document does not intend to define a final taxonomy of cloud computing or to charter a new standards effort. Nor does it try to be an exhaustive thesis on cloud architecture and design. Rather, this document speaks to CIOs and other business leaders who intend to use cloud computing and to establish a set of core principles for cloud vendors. Cloud computing is still in its early stages, with much to learn and more experimentation to come. However, the time is right for the members of the emerging cloud computing community to come together around the notion of an open cloud.

1,541 citations


Journal ArticleDOI
TL;DR: The cloud heralds a new era of computing where application services are provided through the Internet, but is it the ultimate solution for extending such systems' battery lifetimes?
Abstract: The cloud heralds a new era of computing where application services are provided through the Internet. Cloud computing can enhance the computing capability of mobile systems, but is it the ultimate solution for extending such systems' battery lifetimes?

Journal ArticleDOI
TL;DR: The authors introduce a hierarchy of architectures with increasing levels of real-world awareness and interactivity for smart objects, describing activity-, policy-, and process-aware smart objects and demonstrating how the respective architectural abstractions support increasingly complex application.
Abstract: The combination of the Internet and emerging technologies such as nearfield communications, real-time localization, and embedded sensors lets us transform everyday objects into smart objects that can understand and react to their environment. Such objects are building blocks for the Internet of Things and enable novel computing applications. As a step toward design and architectural principles for smart objects, the authors introduce a hierarchy of architectures with increasing levels of real-world awareness and interactivity. In particular, they describe activity-, policy-, and process-aware smart objects and demonstrate how the respective architectural abstractions support increasingly complex application.

Journal ArticleDOI
TL;DR: Results show that Facebook(R) users reported having lower GPAs and spend fewer hours per week studying than nonusers, and its relation to academic performance as measured by self-reported Grade Point Average (GPA) and hours spent studying per week.

Proceedings ArticleDOI
20 Apr 2010
TL;DR: This paper first discusses two related computing paradigms - Service-Oriented Computing and Grid computing, and their relationships with Cloud computing, then identifies several challenges from the Cloud computing adoption perspective.
Abstract: Many believe that Cloud will reshape the entire ICT industry as a revolution. In this paper, we aim to pinpoint the challenges and issues of Cloud computing. We first discuss two related computing paradigms - Service-Oriented Computing and Grid computing, and their relationships with Cloud computing We then identify several challenges from the Cloud computing adoption perspective. Last, we will highlight the Cloud interoperability issue that deserves substantial further research and development.

Journal ArticleDOI
TL;DR: The existing technologies and a wide array of past and state-of-the-art projects on network virtualization are surveyed followed by a discussion of major challenges in this area.

Journal ArticleDOI
01 Jan 2010
TL;DR: An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector according to specific needs and thereby becomes easily adjustable.
Abstract: The Internet of Things, an emerging global Internet-based technical architecture facilitating the exchange of goods and services in global supply chain networks has an impact on the security and privacy of the involved stakeholders. Measures ensuring the architecture's resilience to attacks, data authentication, access control and client privacy need to be established. An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector according to specific needs and thereby becomes easily adjustable. The contents of the respective legislation must encompass the right to information, provisions prohibiting or restricting the use of mechanisms of the Internet of Things, rules on IT-security-legislation, provisions supporting the use of mechanisms of the Internet of Things and the establishment of a task force doing research on the legal challenges of the IoT.

Journal ArticleDOI
TL;DR: In this article, the authors draw on unique data with information about a diverse group of young adults' Internet uses and skills to suggest that even when controlling for Internet access and experiences, people differ in their online abilities and activities.
Abstract: People who have grown up with digital media are often assumed to be universally savvy with information and communication technologies. Such assumptions are rarely grounded in empirical evidence, however. This article draws on unique data with information about a diverse group of young adults’ Internet uses and skills to suggest that even when controlling for Internet access and experiences, people differ in their online abilities and activities. Additionally, findings suggest that Internet know-how is not randomly distributed among the population, rather, higher levels of parental education, being a male, and being white or Asian American are associated with higher levels of Web-use skill. These user characteristics are also related to the extent to which young adults engage in diverse types of online activities. Moreover, skill itself is positively associated with types of uses. Overall, these findings suggest that even when controlling for basic Internet access, among a group of young adults, socioeconomic status is an important predictor of how people are incorporating the Web into their everyday lives with those from more privileged backgrounds using it in more informed ways for a larger number of activities.

Patent
12 Jan 2010
TL;DR: In this paper, a packet-based, hierarchical communication system, arranged in a spanning tree configuration, is described in which wired and wireless communication networks exhibiting substantially different characteristics are employed in an overall scheme to link portable or mobile computing devices.
Abstract: A packet-based, hierarchical communication system, arranged in a spanning tree configuration, is described in which wired and wireless communication networks exhibiting substantially different characteristics are employed in an overall scheme to link portable or mobile computing devices. The network accommodates real time voice transmission both through dedicated, scheduled bandwidth and through a packet-based routing within the confines and constraints of a data network. Conversion and call processing circuitry is also disclosed which enables access devices and personal computers to adapt voice information between analog voice stream and digital voice packet formats as proves necessary. Routing pathways include wireless spanning tree networks, wide area networks, telephone switching networks, internet, etc., in a manner virtually transparent to the user. A voice session and associate call setup simulates that of conventional telephone switching network, providing well-understood functionality common to any mobile, remote or stationary terminal, phone, computer, etc.

Journal ArticleDOI
TL;DR: In this article, the authors argue that it is possible for adults to become digital natives, especially in the area of learning, by acquiring skills and experience in interacting with information and communication technologies, and that if such a gap does exist, it is definitely possible to close it.
Abstract: Generational differences are seen as the cause of wide shifts in our ability to engage with technologies and the concept of the digital native has gained popularity in certain areas of policy and practice. This paper provides evidence, through the analysis of a nationally representative survey in the UK, that generation is only one of the predictors of advanced interaction with the Internet. Breadth of use, experience, gender and educational levels are also important, indeed in some cases more important than generational differences, in explaining the extent to which people can be defined as a digital native. The evidence provided suggests that it is possible for adults to become digital natives, especially in the area of learning, by acquiring skills and experience in interacting with information and communication technologies. This paper argues that we often erroneously presume a gap between educators and students and that if such a gap does exist, it is definitely possible to close it.

Journal ArticleDOI
TL;DR: It is argued in this article that cloud computing is likely to be one of those opportunities sought by the cash-strapped educational establishments in these difficult times and could prove to be of immense benefit (and empowering in some situations) to them due to its flexibility and pay-as-you-go cost structure.

Book ChapterDOI
01 Jan 2010
TL;DR: The World Wide Web Consortium (W3C) pursues four main objectives: Web for everyone; Web on everything; advanced data searching and sharing; and trust and confidence.
Abstract: The World Wide Web Consortium (W3C) was founded as an industry consortium in 1994, five years after the establishment of the World Wide Web (WWW). After the first International WWW Conference in May 1994, the formal establishment of the W3C followed on 1 October 1994, founded by Berners-Lee in collaboration with CERN at the MIT Laboratory for Computer Science (MIT/LCS). W3C members enjoy the right to elect a seat on the Advisory Committee. Moreover, they have access to member-only information and are involved in the member submission process. W3C possesses an advisory entity in the form of its Advisory Board, which is generally appointed by the W3C Team. W3C is financially self-supporting. W3C is constantly challenged by the quick evolution of Internet technology. The W3C pursues four main objectives: Web for everyone; Web on everything; advanced data searching and sharing; and trust and confidence. Keywords: International WWW Conference; internet technology; World Wide Web (WWW); World Wide Web Consortium (W3C)

Journal ArticleDOI
TL;DR: This paper introduces a new algorithm specifically to address the challenge of diversity and shows how it can be used to resolve this apparent dilemma when combined in an elegant hybrid with an accuracy-focused algorithm.
Abstract: Recommender systems use data on past user preferences to predict possible future likes and interests. A key challenge is that while the most useful individual recommendations are to be found among diverse niche objects, the most reliably accurate results are obtained by methods that recommend objects based on user or object similarity. In this paper we introduce a new algorithm specifically to address the challenge of diversity and show how it can be used to resolve this apparent dilemma when combined in an elegant hybrid with an accuracy-focused algorithm. By tuning the hybrid appropriately we are able to obtain, without relying on any semantic or context-specific information, simultaneous gains in both accuracy and diversity of recommendations.

Journal ArticleDOI
Anna Kata1
17 Feb 2010-Vaccine
TL;DR: Arguments around the themes of safety and effectiveness, alternative medicine, civil liberties, conspiracy theories, and morality were found on the majority of websites analyzed; misinformation was also prevalent.

Patent
30 Jun 2010
TL;DR: In this article, a system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network is described, where a computer is provided having a database that relates Uniform Product Code (UPC) numbers to Internet network addresses (or URLs).
Abstract: A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code (“UPC”) numbers to Internet network addresses (or “URLs”). To access an Internet resource relating to a particular product, a user enters the product's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information is then used to access the desired resource.

Proceedings ArticleDOI
20 Sep 2010
TL;DR: This paper aims to show a skeleton of the Internet of Things and tries to address some essential issues of the internet of Things like its architecture and the interoperability, etc.
Abstract: Nowadays, the main communication form on the Internet is human-human. But it is foreseeable that in a near soon that any object will have a unique way of identification and can be addressed so that every object can be connected. The Internet will become to the Internet of Things. The communicate forms will expand from human-human to human-human, human-thing and thing-thing (also called M2M).This will bring a new ubiquitous computing and communication era and change people's life extremely. Radio Frequency Identification techniques (RFID) and related identification technologies will be the cornerstones of the upcoming Internet of Things (IOT).This paper aims to show a skeleton of the Internet of Things and we try to address some essential issues of the Internet of Things like its architecture and the interoperability, etc. At the beginning we describe an overview of the Internet of Things. Then we give our architecture design proposal of the Internet of Things and then we design a specific the Internet of Things application model which can apply to automatic facilities management in the smart campus. At last, we discuss some open questions about the Internet of Things.

Proceedings ArticleDOI
13 Jun 2010
TL;DR: An approach for enabling existing multi-view stereo methods to operate on extremely large unstructured photo collections to decompose the collection into a set of overlapping sets of photos that can be processed in parallel, and to merge the resulting reconstructions.
Abstract: This paper introduces an approach for enabling existing multi-view stereo methods to operate on extremely large unstructured photo collections. The main idea is to decompose the collection into a set of overlapping sets of photos that can be processed in parallel, and to merge the resulting reconstructions. This overlapping clustering problem is formulated as a constrained optimization and solved iteratively. The merging algorithm, designed to be parallel and out-of-core, incorporates robust filtering steps to eliminate low-quality reconstructions and enforce global visibility constraints. The approach has been tested on several large datasets downloaded from Flickr.com, including one with over ten thousand images, yielding a 3D reconstruction with nearly thirty million points.

Journal ArticleDOI
TL;DR: Results suggest that a 2-3% penetration of cell phones in the driver population is enough to provide accurate measurements of the velocity of the traffic flow, demonstrating the feasibility of the proposed system for real-time traffic monitoring.
Abstract: The growing need of the driving public for accurate traffic information has spurred the deployment of large scale dedicated monitoring infrastructure systems, which mainly consist in the use of inductive loop detectors and video cameras On-board electronic devices have been proposed as an alternative traffic sensing infrastructure, as they usually provide a cost-effective way to collect traffic data, leveraging existing communication infrastructure such as the cellular phone network A traffic monitoring system based on GPS-enabled smartphones exploits the extensive coverage provided by the cellular network, the high accuracy in position and velocity measurements provided by GPS devices, and the existing infrastructure of the communication network This article presents a field experiment nicknamed Mobile Century, which was conceived as a proof of concept of such a system Mobile Century included 100 vehicles carrying a GPS-enabled Nokia N95 phone driving loops on a 10-mile stretch of I-880 near Union City, California, for 8 hours Data were collected using virtual trip lines, which are geographical markers stored in the handset that probabilistically trigger position and speed updates when the handset crosses them The proposed prototype system provided sufficient data for traffic monitoring purposes while managing the privacy of participants The data obtained in the experiment were processed in real-time and successfully broadcast on the internet, demonstrating the feasibility of the proposed system for real-time traffic monitoring Results suggest that a 2-3% penetration of cell phones in the driver population is enough to provide accurate measurements of the velocity of the traffic flow

Journal ArticleDOI
TL;DR: An overview of the components and capabilities of the Akamai platform is given, and some insight into its architecture, design principles, operation, and management is offered.
Abstract: Comprising more than 61,000 servers located across nearly 1,000 networks in 70 countries worldwide, the Akamai platform delivers hundreds of billions of Internet interactions daily, helping thousands of enterprises boost the performance and reliability of their Internet applications. In this paper, we give an overview of the components and capabilities of this large-scale distributed computing platform, and offer some insight into its architecture, design principles, operation, and management.

Journal ArticleDOI
TL;DR: Results indicated that a preference for online social interaction and use of the Internet for mood regulation, predict deficient self-regulation of Internet use (i.e., compulsive Internet use and a cognitive preoccupation with the Internet).

Journal ArticleDOI
TL;DR: Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction, and it is currently impossible to recommend any evidence-based treatment of Internet addiction.
Abstract: Background: Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). Objective: To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Methods: Review of published literature between 2000–2009 in Medline and PubMed using the term “internet addiction.Results: Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Crosssectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Conclusions and Scientific Significance: Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.