{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:07Z","timestamp":1754157667458,"version":"3.41.2"},"reference-count":7,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[1998,3,1]],"date-time":"1998-03-01T00:00:00Z","timestamp":888710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,3,1]]},"abstract":"<jats:p>An intranet puts a new layer into a client\/server (C\/S) architecture, the Web server, which acts as the gateway to the application logic and data. It is three\u2010tier computing, where these functions are performed on separate servers. The servers store everything and perform the bulk of the querying and the data presentation. Although there is great potential using an intranet to develop applications, there are certain challenges, including: security, privacy, currency, and performance. There is progress with security but performance with high volume transaction processing is still unproved. There have been a lot of mistakes with C\/S and the danger here is to go down the same road with the intranet. To avoid this, this study explores the managerial and technical issues involved in developing a corporate intranet. Inspired with the success of Internet, intranet is proved to be an extension of and an enhancement to C\/S. Client\/server is not dead just as the mainframe is not dead; but the C\/S model is being changed by the intranet.<\/jats:p>","DOI":"10.1108\/09685229810207407","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"15-20","source":"Crossref","is-referenced-by-count":2,"title":["From client\/server to intranet"],"prefix":"10.1108","volume":"6","author":[{"given":"H. Joseph","family":"Wen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2022022019445857100_b1","unstructured":"Bucatinsky, J. (1996, \u201cTechnology in small businesses\u201d, The CPA Journal, Vol. 66 No. 11, p. 36."},{"key":"key2022022019445857100_b2","unstructured":"Linthicum, D.S. (1996, \u201cApp dev tackles the intranet\u201d, Datamation, Vol. 42 No. 15, p. 113."},{"key":"key2022022019445857100_b3","unstructured":"McDonald, C. and Kaplan, J. (1996, \u201cIntranet wealth\u201d, Printed Circuit Design, Vol. 13 No. 12, p. 46."},{"key":"key2022022019445857100_b4","unstructured":"Millikin, M. (1996, \u201cPractical advice for implementing corporate intranets\u201d, Telecommunications, Vol. 30 No. 4, p. 34."},{"key":"key2022022019445857100_b5","unstructured":"Sarna, D. and Febish, G. (1996, \u201cIntranets on the runway\u201d, Datamation, Vol. 42 No. 11, p. 21."},{"key":"key2022022019445857100_b6","doi-asserted-by":"crossref","unstructured":"Taylor, M. (1997, \u201cIntranets \u2010 a new technology changes all the rules\u201d, Telecommunications, Vol. 31 No. 1, p. 39.","DOI":"10.1524\/itit.1997.39.6.27"},{"key":"key2022022019445857100_b7","unstructured":"Trowbridge, D. (1996, \u201cDeveloping intranets: practical issues for implementation and design\u201d, Telecommunications, Vol. 30 No. 6, p. 51."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229810207407","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810207407\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810207407\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:47Z","timestamp":1753402187000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/6\/1\/15-20\/174301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,3,1]]},"references-count":7,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1998,3,1]]}},"alternative-id":["10.1108\/09685229810207407"],"URL":"https:\/\/doi.org\/10.1108\/09685229810207407","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1998,3,1]]}}}