{"id":"https://openalex.org/W2073078363","doi":"https://doi.org/10.1108/09685229810207407","title":"From client/server to intranet","display_name":"From client/server to intranet","publication_year":1998,"publication_date":"1998-03-01","ids":{"openalex":"https://openalex.org/W2073078363","doi":"https://doi.org/10.1108/09685229810207407","mag":"2073078363"},"language":"en","primary_location":{"id":"doi:10.1108/09685229810207407","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685229810207407","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103421999","display_name":"H. Joseph Wen","orcid":null},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"H. Joseph Wen","raw_affiliation_strings":["School of Management, New Jersey Institute of Technology, Newark, New Jersey, USA","School of Management , New Jersey Institute of Technology , Newark , New Jersey , USA"],"affiliations":[{"raw_affiliation_string":"School of Management, New Jersey Institute of Technology, Newark, New Jersey, USA","institution_ids":["https://openalex.org/I118118575"]},{"raw_affiliation_string":"School of Management , New Jersey Institute of Technology , Newark , New Jersey , USA","institution_ids":["https://openalex.org/I118118575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5103421999"],"corresponding_institution_ids":["https://openalex.org/I118118575"],"apc_list":null,"apc_paid":null,"fwci":0.7958,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83486622,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"1","first_page":"15","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.7267000079154968,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.7267000079154968,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intranet","display_name":"Intranet","score":0.9477120637893677},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7373757362365723},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6637436747550964},{"id":"https://openalex.org/keywords/client\u2013server-model","display_name":"Client\u2013server model","score":0.5699464082717896},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5099798440933228},{"id":"https://openalex.org/keywords/gateway","display_name":"Gateway (web page)","score":0.5097758173942566},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5086517930030823},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46255674958229065},{"id":"https://openalex.org/keywords/application-server","display_name":"Application server","score":0.4290356934070587}],"concepts":[{"id":"https://openalex.org/C2778059363","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Intranet","level":3,"score":0.9477120637893677},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7373757362365723},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6637436747550964},{"id":"https://openalex.org/C152880691","wikidata":"https://www.wikidata.org/wiki/Q146813","display_name":"Client\u2013server model","level":3,"score":0.5699464082717896},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5099798440933228},{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.5097758173942566},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5086517930030823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46255674958229065},{"id":"https://openalex.org/C164554305","wikidata":"https://www.wikidata.org/wiki/Q71550","display_name":"Application server","level":2,"score":0.4290356934070587}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/09685229810207407","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685229810207407","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W222856962","https://openalex.org/W2090417336"],"related_works":["https://openalex.org/W1524078913","https://openalex.org/W2153323073","https://openalex.org/W839362709","https://openalex.org/W96515423","https://openalex.org/W2041650491","https://openalex.org/W2033483503","https://openalex.org/W2099084456","https://openalex.org/W2350495522","https://openalex.org/W2073078363","https://openalex.org/W205360658"],"abstract_inverted_index":{"An":[0],"intranet":[1,59,134],"puts":[2],"a":[3,7,91,125],"new":[4],"layer":[5],"into":[6],"client/server":[8],"(C/S)":[9],"architecture,":[10],"the":[11,17,20,43,46,49,98,105,109,117,130,153,159,166],"Web":[12],"server,":[13],"which":[14],"acts":[15],"as":[16,152],"gateway":[18],"to":[19,60,102,137,145],"application":[21],"logic":[22],"and":[23,41,48,71,97,119,142],"data.":[24],"It":[25],"is":[26,54,74,85,101,135,148,155,162],"three\u2010tier":[27],"computing,":[28],"where":[29],"these":[30],"functions":[31],"are":[32,64],"performed":[33],"on":[34],"separate":[35],"servers.":[36],"The":[37],"servers":[38],"store":[39],"everything":[40],"perform":[42],"bulk":[44],"of":[45,93,132,141],"querying":[47],"data":[50],"presentation.":[51],"Although":[52],"there":[53,63],"great":[55],"potential":[56],"using":[57],"an":[58,139,143],"develop":[61],"applications,":[62],"certain":[65],"challenges,":[66],"including:":[67],"security,":[68],"privacy,":[69],"currency,":[70],"performance.":[72],"There":[73,88],"progress":[75],"with":[76,80,95,108,129],"security":[77],"but":[78,158],"performance":[79],"high":[81],"volume":[82],"transaction":[83],"processing":[84],"still":[86],"unproved.":[87],"have":[89],"been":[90],"lot":[92],"mistakes":[94],"C/S":[96,160],"danger":[99],"here":[100],"go":[103],"down":[104],"same":[106],"road":[107],"intranet.":[110,127,167],"To":[111],"avoid":[112],"this,":[113],"this":[114],"study":[115],"explores":[116],"managerial":[118],"technical":[120],"issues":[121],"involved":[122],"in":[123],"developing":[124],"corporate":[126],"Inspired":[128],"success":[131],"Internet,":[133],"proved":[136],"be":[138],"extension":[140],"enhancement":[144],"C/S.":[146],"Client/server":[147],"not":[149,156],"dead":[150],"just":[151],"mainframe":[154],"dead;":[157],"model":[161],"being":[163],"changed":[164],"by":[165]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
