The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


918 INDEX

Internet-based accounting,V2: 725
Internet-based EDI,V1:615, 617–618,
620, 622
Internet-based software projects, risk
management in,V3:229–236
Internet-based technologies, international
trade and,V2: 234
Internet-based virtual enterprises,
V3:575–577
Internet benchmarking,V1:57, 61–63
methodological problems with,
V1:66 –68
standardized,V1:62–63, 63–66
Internet Bridge,V1: 86
Internet business models,V1:603–604,
611, 804
B2B,V1:120 –128
business-to-consumer,V1:129–137
Internet censorship,V2:264 –273
governance issues and,V2: 265
intellectual property and,V2:268–270
international,V2: 268
privacy and,V2:270 –271
Internet communications, forms of,
V2:302.See alsoUsability testing
Internet connectivity projects,V1: 471
Internet content,V2:265–266
evaluation of,V3:208–210
legal issues related to,V2:266 –268
Internet Control Message Protocol
(ICMP),V2:259;V3:431.See also
Certificate Management Protocol
(CMP)
security with,V2: 327
Internet Corporation for Assigned Names
and Numbers (ICANN),V1:339, 351,
441;V2:287;V3:454.See alsoICANN
dispute resolution
domain name dispute process of,V3: 456
Internet costs, in developing nations,
V1: 435
Internet crime,V2:450 – 452
Internet data centers,V1: 545
Internet development, developing nation
barriers to,V1: 437
Internet diffusion.SeeGlobal Internet
diffusion
Internet documents.See alsoExtensible
Markup Language (XML)
XML in,V3:863–868
Internet economy,V1: 106
Internet-enabled databases,V1:375, 382
Internet Engineering Task Force (IETF),
V3:321, 336
webcasting standards of,V3:680 –681
Internet etiquette (netiquette),
V2:274 –285
chat and instant messaging,V2:280 –281
e-mail,V2:276 –279
enforcing,V2:283–284
FTP,V2:281–282
group,V2:279–280
international considerations related to,
V2: 283
Web communication,V2:282–283
Internet ExchangeNext.com,V1: 678
Internet Explorer (IE),V1:759–760
Pocket,V2: 637
Internet Explorer 3 (IE3),V1:448– 450
Internet Explorer 4 (IE4),V1: 450

Internet Fibre Channel Protocol (iFCP),
V3: 335
Internet Fraud Complaint Center (IFCC),
V1:326.See alsoInternet investment
fraud
Internet-free countries,V2:44–45
Internet GIS (I-GIS),V2:23, 31–32
future of,V2:33–35
versus desktop GIS,V2:31–32
versus intranet GIS,V2:32–33
Internet Group Management Protocol
(IGMP),V2:258;V3: 325
Internet host benchmarks,V1:65–66,
67–68
Internet identity theft,V1:332–333
Internet Information Server (IIS),V1:1,
10, 31
Internet infrastructure,V2: 298
Internet interactions development,
V2:142–143
Internet investment fraud,V1: 333
Internet Key Exchange Protocol (IKE),
V1: 55
Internet law, global,V1:807–808
Internet layer,V1:181, 183
adding security at,V2:324 –325
Internet Library of Early Journals,V1: 514
Internet literacy,V1:229–230;
V2:286 –297
domain name systems and,V2:287–288
electronic commerce and,V2:289–290
extranets,V2:292–293
intranets,V2:290 –292
navigational tools and,V2:288–289
Internet Map Servers (IMSs),V2:28, 33
Internet marketing mix, global,
V1:812–815
Internet Message Access Protocol (IMAP),
V1:664, 669.See alsoIMAP
Internet navigation,V2:298–310
Internet networking connections,
dedicated,V2:541–542
Internet objects, naming,V2: 251
Internet privacy bills,V1: 323
Internet Protocol (IP),V1:181;V2:246;
V3:426 – 429, 817–818.See alsoIP
entries
security with,V2:326 –327
Internet protocols,V1:92;V3:325–326
Internet Protocol Security (IPsec),
V1:54 –55, 290, 292;V2: 259
standards for,V1:529;V2: 324
Internet Protocol (IP) service,V2:244 –249
Internet protocol stack,V1:200, 202
Internet Public Library,V1:507, 514, 515,
521, 524
Internet query tools,V1: 421
Internet reference service,V3: 207
Internet regulations,V2:57.See also
International cyberlaw; Law(s);
Legislation
Internet relationships,V2: 105
Internet Relay Chat (IRC),V1:334, 666;
V2:289, 303, 311–319.See alsoIRC
entries
future of,V2: 318
history of,V2:311–312
instant messaging via,V1: 669
security and legal issues related to,
V2:316 –318

social factors related to,V2:314 –316
structure and operation of,V2:312–314
Internets, multiple,V2: 332
Internet SCSI (iSCSI),V3: 335
Internet Security Association Key
Management Protocol (ISAKMP),
V1: 55
Internet security standards,V2:320 –333.
See alsoInternet Protocol Security
(IPsec); Security
security threats and defenses and,
V2:320 –326
state of,V2:332–333
vulnerabilities and,V2:326 –331
Internet Service Providers (ISPs),V1:44,
134 –135, 137, 199, 334.
See alsoOnline service providers
efforts to stop attacks,V2:331–332
performance indicators and service levels
for,V1: 45
Web content and,V2: 266
Internet services,V2:301–309
Internet site design, incorporating human
factors and ergonomics into,
V2:147–148
Internet Society (ISOC),V3: 321
Internet standardization groups,
V3:321–322
Internet standards, adding security to,
V2:326 –327
Internet surveys, NUA,V1: 65
Internet Tax Freedom Act of 1998,
V3:153, 418
Internet tax moratorium,V3:418– 419
Internet technologies,V3: 223
leveraging,V1: 208
Internet telephony,V2:290;
V3:317–318
Internet transport protocols,V2:250.See
alsoFile Transfer Protocol (FTP)
“Internet time,” software development on,
V3: 137
Internet TV,V1: 704
Internet usage:
benchmarking and,V1:66 –67
gender and,V2:12–22
geographic location and,V1:469– 470
skills related to,V1: 471
Internetworking:
connections,V2: 540
e-commerce and,V3:262–265
models,V3: 324
Internet Worm of 1988,V1:251, 256
Interoperability:
backups and,V1: 542
chat-system,V1: 667
vendor testing of,V3: 249
Interorganizational Information Systems
(IOISs),V1:618, 622
Interpreted programming languages,
V1: 165
Interprocess Communication (IPC),
V3:47– 49
Interstate Information Sharing and
Analysis Center (ISAC),V1: 366
Intersymbol interference,V1:459, 463
Inter-Web service modeling,
V3:757–758
“In the wild” viral programs,V1: 259
Intranet GIS,V2:31–32, 32–33
Free download pdf