The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The basic methods of innerlinking are analyzed in the article and variants of structure construction of Internet resources depending on the types of requests, by means of which the popularization is performed, are provided. The process of calculating the link weight is described and algorithm of weight transfer between pages of Internet resources is developed. Analysis and proper implementtation of...
Although the Internet offers numerous advantages, it raises many information security risks, especially against young people and children, who are today amongst the largest user groups of mobile and online technologies all around the world. Therefore, to empower and protect Internet users, it is necessary to develop proper strategies and tools to encapsulate their needs, and identify and prevent all...
Today almost everyone is using internet for daily activities. Whether it's for social, academic, work or business. But only a few of us are aware that internet generally we access only a small part of the overall of internet access. The Internet or the world wide web is divided into several levels, such as web surfaces, deep web or dark web. Accessing internet into deep or dark web is a dangerous...
The primary goal of this research is to explore differences in visual search behaviour, performance and subjective satisfaction between English, Arabic and Chinese speaking users of a Search Engine Result Page (SERP) in order to provide design insights for international web designers and developers. The research uses eye tracking to examine whether differences in visual behaviour and eye movement...
The aim of this paper is to present a heuristic study about the level of usability of 24 universities Web portals using data mining techniques. For experimenting in this work, we used a System for Evaluation of Usability of Web sites (SIRIUS) which contains a tool to generate usability valuations of Web sites called Prometheus and integrates 10 heuristics to do the process. The assessments collected...
Electronic commerce has been grown rapidly in the last decade with the support of the Internet. Consequently, it requires retailers to improve their ability to fulfill the needs of their customers to gain satisfaction. Due to the close connection with the customer satisfaction, service quality is considered as a critical factor for the success of the service providers. This study tried to assess the...
Online shopping is an easy and comfortable way of shopping from a large range of products. There are innumerable advantages of online shopping. Customers can save a lot of time which they normally need to physically go to the retail shop and buy the products that customers want. We have set up a fully functional e-commerce website that has the capacity to be extended to a smarter model by incorporating...
Advertising fraud, particularly click fraud, is a growing concern for the online advertising industry. The use of click bots, malware that automatically clicks on ads to generate fraudulent traffic, has steadily increased over the last years. While the security industry has focused on detecting and removing malicious binaries associated with click bots, a better understanding of how fraudsters operate...
In the last years, governmental bodies have been futilely trying to fight against dark web marketplaces. Shortly after the closing of "The Silk Road" by the FBI and Europol in 2013, new successors have been established. Through the combination of cryptocurrencies and nonstandard communication protocols and tools, agents can anonymously trade in a marketplace for illegal items without leaving...
A number of communications in the work of the informative sites of leading scientific organizations of the Russian Federation, including in the structure of the Russian Academy of Sciences and Federal Agency of Scientific Organizations is researched.
This research aims to mitigate the inhibiting factors that prevent faculty and students from excelling in their roles in engineering education. The approach focuses on the identification and subsequent usage of “prior knowledge” one accumulates perpetually with the passage of time. The approach is expected to help students and faculty alike to share their under-utilized knowledge bank in a structured...
Online marketing is identified as one of the key drivers of European digital economy. Recent studies have shown that advertising is not adding direct value for the advertisers only, but it creates significant additional indirect value and jobs while boosting innovation and creativity. In Europe online advertising has grown dramatically. It is expected that online advertising revenues will surpass...
Nowadays, the internet is playing a major role in everyday life, becoming the first choice for sharing information. In the last sixteen years the number of websites increased from three million to almost one billion. An important contribution to this number was brought by the content management systems which provided an easy approach for any user to create its own website without having advanced programming...
Online shopping through social media becomes popular in Indonesia. It was a challenge for e-commerce sites, especially online marketplace, which is in the last five years present in the e-commerce industry in Indonesia. In order to gain customer attention, e-commerce marketplace sites in Indonesia spent billions of rupiah for advertising expenditure in television. However, the key challenge for e-commerce...
The rich resources of the Internet increasingly call writing faculty to incorporate digital research strategies into source-based writing. Yet, research shows that some students do not have basic competency to use the Internet for academic research. Composition classes can help students to be information literate and know how to effectively find, evaluate, use, communicate and manage both traditional...
The use of computers and the internet to improve information and communication as a conduit for improving pain control was discussed in the first edition of the Handbook of Pain Relief in Older Adults. Since that time, there have been few changes that have standardized electronic health records to allow for adequate handling of pain issues. The literature continues to be devoid of meaningful discussions...
Content Delivery Networks (CDN) act as trusted overlay networks that offer high-performance delivery of common Web objects, static data and rich multimedia content by distributing content load among edge servers which are close to the clients. And the interconnection of different CDNs (called CDNi) could provide more advantages and benefits to both content provider and client than a single CDN during...
Although some studies have examined the effects of information sources and audience characteristics on credibility of Web information, few studies have investigated the effects of audience characteristics such as gender and age, which are clearly very crucial for a comprehensive understanding of the mechanisms underlying the credibility of Web information. In addition, some prior studies are correlational,...
The roll over from traditional/classroom to E-Learning has been seen as a new dimension promoting information technology skills. Now relatively all institutions or organisations provide some form of Internet access as almost all have websites. E-Learning has established improved teaching and learning resources, which tend to be the centre of attraction for most educational institutions and organisations...
Decoy routing is a powerful circumvention mechanism intended to provide secure communications that cannot be monitored, detected, or disrupted by a third party who controls the user's network infrastructure. Current decoy routing protocols have weaknesses, however: they either make the unrealistic assumption that routes through the network are symmetric (i.e., the router implementing the decoy routing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.