User's Requirements in Internet Access Sharing

被引:0
|
作者
Tavares, Conceicao [1 ]
Santos, Henrique [1 ]
机构
[1] Univ Minho, Ctr Algoritmi, P-4719 Braga, Portugal
关键词
Broadband connection sharing; Internet access; security;
D O I
10.1007/978-3-642-36981-0_86
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays consumers dispose of Internet connections with increasing capacity in such a way that those connections are frequently underused. Sharing connections seems like an obvious attractive response, and it has being explored through several initiatives, e.g. OpenSpark, FON, with relative success although inherent risks. The related studies made so far concerning security, incentives, legality, etc., did not allow inferring a global model upon what some analysis and evaluation of this technology could be done. This is partially because there are several entities playing crucial roles in the realization of this model, e.g. users, service suppliers and authorities and aspects from several dimensions, e.g. technical, regulatory and business that must be considered. Aiming to design such a model, it was carried out an inquiry to potential users, in both perspectives of using and providing a shared Internet access. The preliminary study results are presented here.
引用
收藏
页码:923 / 929
页数:7
相关论文
共 50 条
  • [21] Predictive caching based on user access patterns in Wireless Internet
    Zunder, L
    Gopalakrishna, V
    2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 233 - 236
  • [22] User behavior and internet access network performance in a broadband environment
    Ritthisoonthorn, P.
    Ahmed, Kazi M.
    Krairit, D.
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1331 - +
  • [23] User Interactive Internet of Things Privacy Preserved Access Control
    Huang, Xin
    Fu, Rong
    Chen, Bangdao
    Zhang, Tingting
    Roscoe, A. W.
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 597 - 602
  • [24] The influence of user mobility on vehicular Internet access via IEEE 802.11 access points
    Kraaier, Jan
    Killat, Ulrich
    WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 335 - +
  • [25] User Generated Content and Internet User's Brand Engagement
    Quoquab, Farzana
    Salem, Zarina Abdul
    Zeinali, Morteza
    ADVANCED SCIENCE LETTERS, 2015, 21 (10) : 3318 - 3320
  • [26] Access Control Mechanism for Multi User Data Sharing in Social Networks
    Ramteke, Ashwajit
    Talmale, Girish
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 578 - 582
  • [27] Interactive Design of Free Sharing APP Based on Mobile User Requirements Analysis
    Wei, Chen
    Kai, Bu Qing
    PROCEEDINGS OF THE 2017 2ND JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING CONFERENCE (JIMEC 2017), 2017, 62 : 648 - 651
  • [28] Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces
    Martiny, Karsten
    St John, Mark
    Denker, Grit
    Korkos, Christopher
    Briesemeister, Linda
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST (HCI-CPT 2021), 2021, 12788 : 194 - 211
  • [29] Solution for each particular user's requirements
    1600, Technische Mitteilungen PTT, Bern, Switzerland (73):
  • [30] Drivers of Active and Passive Information Sharing Behavior on the Internet: The Role of Internet Usage Patterns and User Demographics
    Madlberger, Maria
    VISION 2020: INNOVATION MANAGEMENT, DEVELOPMENT SUSTAINABILITY, AND COMPETITIVE ECONOMIC GROWTH, 2016, VOLS I - VII, 2016, : 1917 - 1927