The evolutinn of network service usage can be oonsidered as being in three -stages, constltuti,ng a u'So.ge IHe cycle. The firsıl: stage (inoaption) is that of initial Imv .Ievel ltsorg,e. The second (expanBjon) 'is ohCliracterized by mpid growth in usage and is often unstable and uncontroIled. The third sto.ge (stobility) is a reaetion to the Becond stage and 'imposes order on usage. Decision making, data collection, and measurement considereHonıs are exomined for this framework.The usage of computer network and commercial-time sharing systems has grown raıpidly in recent years (see for example [2], [5], [17] ). Ooincident with this grO'VV1lh has been o ,rise in c'oncarns expressed about selection and usage of applica-tions ro.n networK services. Soouritv, ,privacy. and sooial problemshave been cited by En:srow [8]. [9]. Eoonomic issues for tıhe user's point of view has bflgun to be examined (e.g.. Lientz [13] ). A number of papers have oddressed security issues (see for exomples. Lientz and Weiss [10], [1'5J ). Selectlron and evaiua'tion has been considered in Lienıtz and Amo!d [141. Very Iittle resea,rch ho'S been direetepatterns of U'ser behavior with respect to network usage. It has been cited. however.O's o ma,jor are·a of inquiry [1], [5] ).
The evolutinn of network service usage can be oonsidered as being in three -stages, constltuti,ng a u'So.ge IHe cycle. The firsıl: stage (inoaption) is that of initial Imv .Ievel ltsorg,e. The second (expanBjon) 'is ohCliracterized by mpid growth in usage and is often unstable and uncontroIled. The third sto.ge (stobility) is a reaetion to the Becond stage and 'imposes order on usage. Decision making, data collection, and measurement considereHonıs are exomined for this framework.The usage of computer network and commercial-time sharing systems has grown raıpidly in recent years (see for example [2], [5], [17] ). Ooincident with this grO'VV1lh has been o ,rise in c'oncarns expressed about selection and usage of applica-tions ro.n networK services. Soouritv, ,privacy. and sooial problemshave been cited by En:srow [8]. [9]. Eoonomic issues for tıhe user's point of view has bflgun to be examined (e.g.. Lientz [13] ). A number of papers have oddressed security issues (see for exomples. Lientz and Weiss [10], [1'5J ). Selectlron and evaiua'tion has been considered in Lienıtz and Amo!d [141. Very Iittle resea,rch ho'S been direetepatterns of U'ser behavior with respect to network usage. It has been cited. however.O's o ma,jor are·a of inquiry [1], [5] ).
Primary Language | English |
---|---|
Journal Section | Makaleler |
Authors | |
Publication Date | August 12, 2010 |
Published in Issue | Year 1977 Volume: 2 Issue: 4 |