Browse Definitions :

Internet map

An Internet map is any kind of map that attempts to portray all or some aspect of the Internet. Since the Internet began developing about 25 years ago, there has always been some kind of map showing what it looks like. Maps, even partial ones, of today's enormous Internet, whether of its physical wiring, its information content, or some other aspect, challenge both creator and user. Yet a map, even a complicated one, has a way of bounding chaos and giving us a ready-packaged mental construct. Some time ago, we discovered Martin Dodge's remarkable collection of Internet maps at the Centre for Advanced Spatial Analysis, University College London. His Atlas of Cyberspaces ( contains separate collections for maps of:

  • ISP and Internet backbone networks
  • Three-dimensional information spaces
  • Information landscapes or visualizations
  • Cyberspace using geographic metaphors

The Atlas of Cyberspaces also includes examples of Web site maps and several other map categories.

This was last updated in September 2005

Continue Reading About Internet map


  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.


  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...



  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...


  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...