Search results for: internet usage behavior
9542 The Application of Internet of Things in Healthcare: Building an Interconnected Health Environment
Authors: Quinn Au, Amedeo Carmine, Tauheed Khan Mohd
Abstract:
The Internet of Things (IoT) is emerging as a new development in information technology in recent years, with the potential to improve convenience and efficiency in life. Following the rise of IoT, the Social Internet of Things (SIoT) is another new development in which the benefits of connectivity and user-friendliness from social network services (SNS) are its main features. With the introduction of IoT, the world will be much more modernized, convenient, and industrialized. This paper will discuss the applications of IoT in different sectors such as healthcare services, education, and lifestyle. The privacy challenges that IoT still poses to user data will also be discussed. Finally, an empirical study to evaluate the number of active installed IoT connections in recent years demonstrates the increase in usage of IoT regardless of the privacy challenges. The study also examines some types of IoT devices that are being preferred in the market and predictions from researchers about IoT in the upcoming years.Keywords: IoT, health care, robotics, social Internet of Things
Procedia PDF Downloads 1519541 The Integration of Patient Health Record Generated from Wearable and Internet of Things Devices into Health Information Exchanges
Authors: Dalvin D. Hill, Hector M. Castro Garcia
Abstract:
A growing number of individuals utilize wearable devices on a daily basis. The usage and functionality of these wearable devices vary from user to user. One popular usage of said devices is to track health-related activities that are typically stored on a device’s memory or uploaded to an account in the cloud; based on the current trend, the data accumulated from the wearable device are stored in a standalone location. In many of these cases, this health related datum is not a factor when considering the holistic view of a user’s health lifestyle or record. This health-related data generated from wearable and Internet of Things (IoT) devices can serve as empirical information to a medical provider, as the standalone data can add value to the holistic health record of a patient. This paper proposes a solution to incorporate the data gathered from these wearable and IoT devices, with that a patient’s Personal Health Record (PHR) stored within the confines of a Health Information Exchange (HIE).Keywords: electronic health record, health information exchanges, internet of things, personal health records, wearable devices, wearables
Procedia PDF Downloads 1289540 Internet Pornography Consumption and Relationship Commitment of Filipino Married Individuals
Authors: Racidon P. Bernarte, Vincent Jude G. Estella, Dominador Jr. M. Nucon, Jin Danniel O. Villatema
Abstract:
Purpose: Internet pornography has many negative effects, but one of the disturbing phases of pornography usage is; users are insentient on how pornography influences and affects them. The acceptance of Internet pornography use in a relationship has been found to be higher among men than among women. The use of pornography directly correlates to a decrease in sexual intimacy. Hence, this might lead to the weakening of the relationship of the married individuals to their partner. To find out the relevance of the claim, the researchers aimed to explore the relationship of Internet pornography consumption to the relationship commitment of married individuals in the Philippines. Different factors such as level of satisfaction, the size of the investment, quality of alternatives, relationship stability, and viewing habits of the Filipino married individuals were also considered in determining the relationship of watching pornography online and the relationship commitment of the Filipino married individuals. Design/ Methodology/ Approach –The study used the quantitative research approach, specifically descriptive method and correlation in order to further analyze the gathered data. A self-administered survey was distributed to 400 selected Filipino married individuals who were married individuals that are watching pornography on the Internet who are living in Quezon City. Findings –It is revealed that Internet pornography consumption has a negative effect on the relationship commitment of married individuals. Furthermore, watching pornography online weakened the relationship commitment of the Filipino married individuals that leads to an unstable relationship.Keywords: internet pornography consumption, relationship commitment, married individuals, polytechnic university of the Philippines
Procedia PDF Downloads 4189539 The Antecedents of Facebook Check in Adoption Intention: The Perspective of Social Influence
Authors: Hsiu-Hua Cheng
Abstract:
Recently, the competition between websites becomes intense. How to make users “adopt” their websites is an issue of urgent importance for online communities companies. Social procedures (such as social influence) can possibly explain how and why users’ technologies usage behaviors affect other people to use the technologies. This study proposes two types of social influences on the initial usage of Facebook Check In-friends and group members. Besides, this study indicates that Facebook friends’ previous usage of Facebook Check In and Facebook group members’ previous usage of Facebook Check In will positively influence focal actors’ Facebook Check In adoption intention. The article concludes with contributions to academic research and practice.Keywords: social influence, adoption intention, facebook check in, previous usage behavior
Procedia PDF Downloads 4449538 Use of Smartphones in 6th and 7th Grade (Elementary Schools) in Istria: Pilot Study
Authors: Maja Ruzic-Baf, Vedrana Keteles, Andrea Debeljuh
Abstract:
Younger and younger children are now using a smartphone, a device which has become ‘a must have’ and the life of children would be almost ‘unthinkable’ without one. Devices are becoming lighter and lighter but offering an array of options and applications as well as the unavoidable access to the Internet, without which it would be almost unusable. Numerous features such as taking of photographs, listening to music, information search on the Internet, access to social networks, usage of some of the chatting and messaging services, are only some of the numerous features offered by ‘smart’ devices. They have replaced the alarm clock, home phone, camera, tablet and other devices. Their use and possession have become a part of the everyday image of young people. Apart from the positive aspects, the use of smartphones has also some downsides. For instance, free time was usually spent in nature, playing, doing sports or other activities enabling children an adequate psychophysiological growth and development. The greater usage of smartphones during classes to check statuses on social networks, message your friends, play online games, are just some of the possible negative aspects of their application. Considering that the age of the population using smartphones is decreasing and that smartphones are no longer ‘foreign’ to children of pre-school age (smartphones are used at home or in coffee shops or shopping centers while waiting for their parents, playing video games often inappropriate to their age), particular attention must be paid to a very sensitive group, the teenagers who almost never separate from their ‘pets’. This paper is divided into two sections, theoretical and empirical ones. The theoretical section gives an overview of the pros and cons of the usage of smartphones, while the empirical section presents the results of a research conducted in three elementary schools regarding the usage of smartphones and, specifically, their usage during classes, during breaks and to search information on the Internet, check status updates and 'likes’ on the Facebook social network.Keywords: education, smartphone, social networks, teenagers
Procedia PDF Downloads 4529537 Heritage and Tourism in the Era of Big Data: Analysis of Chinese Cultural Tourism in Catalonia
Authors: Xinge Liao, Francesc Xavier Roige Ventura, Dolores Sanchez Aguilera
Abstract:
With the development of the Internet, the study of tourism behavior has rapidly expanded from the traditional physical market to the online market. Data on the Internet is characterized by dynamic changes, and new data appear all the time. In recent years the generation of a large volume of data was characterized, such as forums, blogs, and other sources, which have expanded over time and space, together they constitute large-scale Internet data, known as Big Data. This data of technological origin that derives from the use of devices and the activity of multiple users is becoming a source of great importance for the study of geography and the behavior of tourists. The study will focus on cultural heritage tourist practices in the context of Big Data. The research will focus on exploring the characteristics and behavior of Chinese tourists in relation to the cultural heritage of Catalonia. Geographical information, target image, perceptions in user-generated content will be studied through data analysis from Weibo -the largest social networks of blogs in China. Through the analysis of the behavior of heritage tourists in the Big Data environment, this study will understand the practices (activities, motivations, perceptions) of cultural tourists and then understand the needs and preferences of tourists in order to better guide the sustainable development of tourism in heritage sites.Keywords: Barcelona, Big Data, Catalonia, cultural heritage, Chinese tourism market, tourists’ behavior
Procedia PDF Downloads 1389536 Regulation and Transparency: The Case of Corporate Governance Disclosure on the Internet in the United Arab Emirates
Authors: Peter Oyelere, Fernando Zanella
Abstract:
Corporate governance is one of the most discussed and researched issues in recent times in countries around the world, with different countries developing and adopting different governance structures, models and mechanisms. While the Codes of corporate governance have been weaved into the regulatory fabrics of most countries, it is equally critically important that their mechanisms, procedures and practices be transparent, and be transparently communicated to all stakeholders. The Internet can be a very useful and cost-effective tool for the timely and voluntary communication of corporate governance matters to stakeholders. The current paper details the results of an investigation on the extent of which companies listed in the UAE are using the Internet for communicating corporate governance issues, matters and procedures. We surveyed the websites of companies listed on the two UAE Stock Exchanges – the Abu Dhabi Stock Exchange (ADX) and the Dubai Financial Market (DFM) – to find out their level and nature of usage of the Internet for corporate governance disclosures. Regulatory and policy implications of the results of our investigation, as well as other areas for further studies, are also presented in the paper.Keywords: corporate governance, internet financial reporting, regulation, transparency, United Arab Emirates
Procedia PDF Downloads 3649535 Solar Power Monitoring and Control System using Internet of Things
Authors: Oladapo Tolulope Ibitoye
Abstract:
It has become imperative to harmonize energy poverty alleviation and carbon footprint reduction. This is geared towards embracing independent power generation at local levels to reduce the popular ambiguity in the transmission of generated power. Also, it will contribute towards the total adoption of electric vehicles and direct current (DC) appliances that are currently flooding the global market. Solar power system is gaining momentum as it is now an affordable and less complex alternative to fossil fuel-based power generation. Although, there are many issues associated with solar power system, which resulted in deprivation of optimum working capacity. One of the key problems is inadequate monitoring of the energy pool from solar irradiance, which can then serve as a foundation for informed energy usage decisions and appropriate solar system control for effective energy pooling. The proposed technique utilized Internet of Things (IoT) in developing a system to automate solar irradiance pooling by controlling solar photovoltaic panels autonomously for optimal usage. The technique is potent with better solar irradiance exposure which results into 30% voltage pooling capacity than a system with static solar panels. The evaluation of the system show that the developed system possesses higher voltage pooling capacity than a system of static positioning of solar panel.Keywords: solar system, internet of things, renewable energy, power monitoring
Procedia PDF Downloads 839534 The Use of TV and the Internet in the Social Context
Authors: Khulood Miliany
Abstract:
This study examines the media habits of young people in Saudi Arabia, in particular their use of the Internet and television in the domestic sphere, and how use of the Internet impacts upon other activities. In order to address the research questions, focus group interviews were conducted with Saudi university students. The study found that television has become a central part of social life within the household where television represents a main source for family time, particularly in Ramadan while the Internet is a solitary activity where it is used in more private spaces. Furthermore, Saudi females were also more likely to have their Internet access monitored and circumscribed by family members, with parents controlling the location and the amount of time spent using the Internet.Keywords: domestication of technology, internet, social context, television, young people
Procedia PDF Downloads 2979533 Internet Addiction among Students: An Empirical Study in Pondicherry University
Authors: Mashood C., Abdul Vahid K., Ashique C. K.
Abstract:
The technology is growing beyond human expectation. Internet is one of very sophisticated product of the information technology. It has various advantages like connecting the world, simplifying the difficult tasks done in past etc. Simultaneously it has demerits also; that is lack of authenticity and internet addiction. To find out the problems of internet addiction, a study conducted among the Postgraduate students of Pondicherry University and collected 454 samples. The study strictly focused to identify the internet addiction among students, influence and interdependence of personality on internet addiction among first years and second years. To evaluate this, we used two major analysis, these are Confirmatory Factor Analysis (CFA) to predict the internet addiction with the observed data and Logistic Regression to identify the difference between first years and second years in the case of internet addiction. Before applying to the core analysis, the data applied to some preliminary tests to check the model fit. The empirical findings shows that , the students of Pondicherry University are very much addicted to the internet, But there is no such huge difference between first years and second years in case of internet addiction.Keywords: internet addiction, students, Pondicherry University, empirical study
Procedia PDF Downloads 4599532 The Study of Information Uses Behaviour of Tourists in Songkhla Province, Thailand
Authors: Patraporn Kaewkhanitarak, Suchada Srichuar, Narawat Kanjanapan
Abstract:
This research is the survey research. The purpose of this research is to study information uses behavior and problem of tourists in Songkhla Province. The tool used in this study include structure questioner standardize in 5 levels rating scale. The 400 participants selected by convenience sampling (allowable error 5%) by Taro Yamane method. The collecting data period is 6 months from January-June 2014. The result of this study found that the type of information that the tourists often use to plan their trip is internet (x̅ = 3.81) and the most popular text is restaurant (x̅ = 3.77). The tourists found that booking or buying service from internet provided more affordable price and they could select appropriate plan by themselves. The most convenience source of information that the tourists often use is internet and website (x̅ = 3.69). Nevertheless, they explained that most of tourist information source in Songkhla province are lack and insufficient of tourist organization that provide information and service related to tourism.Keywords: information, behavior, tourists, Thailand
Procedia PDF Downloads 2539531 Development and Evaluation of an Internet-Based Transdiagnostic Therapy Intervention in the Arab World
Authors: Mariam Fishere
Abstract:
The proposed research study aims at developing an Internet-based transdiagnostic treatment and evaluating its efficacy. Based on the Common Elements Treatment Approach (CETA), a combined low-intensity and technology supported transdiagnostic treatment protocol will be culturally adapted for usage by nonprofessional therapists in Arabic-speaking countries. This Internet-based CETA intervention will target individuals suffering from one or more of the following disorders: depression, anxiety and posttraumatic stress disorder (PTSD), which are all major contributors to the global burden of mental illness. The growing body of research in the area of transdiagnostic treatment has proven to be effective in high-income countries (HICs), but there remain questions about its efficacy, cultural appropriateness, and validity for low- to middle-income countries (LMICs). The aim of this dissertation project is to investigate the efficacy of a newly developed Internet-delivery of an evidence-based transdiagnostic treatment – CETA – for a sample of Arabic-speaking individuals suffering from at least one of the following disorders; depression, anxiety, and PTSD.Keywords: transdiagnostic, internet-based interventions, mental health, Arab world
Procedia PDF Downloads 2289530 Performance Evaluation of Vertical Handover on Silom Line BTS
Authors: Silumpa Suboonsan, Suwat Pattaramalai
Abstract:
In this paper, the performance of internet usage by using Vertical Handover (VHO) between cellular network and wireless local area network (WLAN) on Silom line Bangkok Mass Transit System (BTS) is evaluated. In the evaluation model, there is the WLAN on every BTS station and there are cellular base stations along the BTS path. The maximum data rates for cellular network are 7.2, 14.4, 42, and 100Mbps and for WLAN are 54, 150, and 300Mbps. The simulation are based on users using internet, watching VDOs and browsing web pages, on the BTS train from first station to the last station (full time usage) and on the BTS train for traveling some number of stations (random time). The results shows that VHO system has throughput a lot more than using only cellular network when the data rate of WLAN is more than one of cellular network. Lastly, the number of watching HD VDO and Full HD VDO is higher on VHO system on both regular time and rush hour of BTS travelling.Keywords: vertical handover, WLAN, cellular, silom line BTS
Procedia PDF Downloads 4789529 Emergence of Information Centric Networking and Web Content Mining: A Future Efficient Internet Architecture
Authors: Sajjad Akbar, Rabia Bashir
Abstract:
With the growth of the number of users, the Internet usage has evolved. Due to its key design principle, there is an incredible expansion in its size. This tremendous growth of the Internet has brought new applications (mobile video and cloud computing) as well as new user’s requirements i.e. content distribution environment, mobility, ubiquity, security and trust etc. The users are more interested in contents rather than their communicating peer nodes. The current Internet architecture is a host-centric networking approach, which is not suitable for the specific type of applications. With the growing use of multiple interactive applications, the host centric approach is considered to be less efficient as it depends on the physical location, for this, Information Centric Networking (ICN) is considered as the potential future Internet architecture. It is an approach that introduces uniquely named data as a core Internet principle. It uses the receiver oriented approach rather than sender oriented. It introduces the naming base information system at the network layer. Although ICN is considered as future Internet architecture but there are lot of criticism on it which mainly concerns that how ICN will manage the most relevant content. For this Web Content Mining(WCM) approaches can help in appropriate data management of ICN. To address this issue, this paper contributes by (i) discussing multiple ICN approaches (ii) analyzing different Web Content Mining approaches (iii) creating a new Internet architecture by merging ICN and WCM to solve the data management issues of ICN. From ICN, Content-Centric Networking (CCN) is selected for the new architecture, whereas, Agent-based approach from Web Content Mining is selected to find most appropriate data.Keywords: agent based web content mining, content centric networking, information centric networking
Procedia PDF Downloads 4759528 A Survey on Internet of Things and Fog Computing as a Platform for Internet of Things
Authors: Samira Kalantary, Sara Taghipour, Mansoure Ghias Abadi
Abstract:
The Internet of Things (IOT) is a technological revolution that represents the future of computing and communications. IOT is the convergence of Internet with RFID, NFC, Sensor, and smart objects. Fog Computing is the natural platform for IOT. At present, the IOT as a new network communication technology has rapidly shifted from concept to application under fog computing virtual storage computing platform. In this paper, we describe everything about IOT and difference between cloud computing and fog computing.Keywords: cloud computing, fog computing, Internet of Things (IoT), IOT application
Procedia PDF Downloads 5849527 Internet as a Marketing Tool for Tourism Promotion
Authors: Emeka Okonkwo
Abstract:
The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.Keywords: internet, marketing, tourism, tourism management
Procedia PDF Downloads 4189526 Patterns of Problem Behavior of Out-Of-School Adolescents and Gender Difference in South Korea
Authors: Jaeyoung Lee, Minji Je
Abstract:
Objectives: The adolescents not attending school are named out-of-school adolescents. They are more vulnerable to health management and are likely to be exposed to a number of risk factors. This study was conducted to investigate the problem behavior of out-of-school adolescents and analyze the difference caused by gender. Methods: In this study, the problem behaviors of out-of-school adolescents, the vulnerable class, were defined in 8 types and based on this definition, the survey on run away from home, drop out, prostitution, violence, internet game addiction, theft, drug addiction, and smoking was conducted. The study was conducted in a total of 507 out-of-school adolescents, including 342 males, and 165 females. The type, frequency and start time of the 8 problem behaviors were identified. The collected data were analyzed with chi-square test and t-test using SPSS statistics 22. Results: Among the problem behaviors of the subjects, violence ( =17.41, p < .001), internet game addiction ( =16.14, p < .001), theft ( =22.48, p < .001), drug addiction ( =4.17, p=.041), and smoking ( =3.90, p=.048) were more significantly high in male out-of-school adolescents than female out-of-school adolescents. In addition, the frequency of the problem behavior was higher in male out-of-school adolescents with statistical significance than in female out-of-school adolescents (t=5.08, p= < .001). In terms of the start time of the problem behavior, only internet game addiction was higher in male out-of-school adolescents with the statistical significance than in female out-of-school adolescents ( =6.22, p=.032). No statistically significant difference was found in other problem behaviors (p > .05). Conclusions: In this study, it was found that gender difference in problem behaviors of out-of-school adolescents exists, and its frequency and difference of types were identified. When the social countermeasures were provided for those adolescents, a distinguished approach is required depending on the patterns of problem behavior and gender. When preparing policy alternatives and interventions for out-of-school adolescents, it is required to reflect the results of this study.Keywords: addictive behavior, adolescent, gender, problem behavior
Procedia PDF Downloads 2059525 A Survey of Domain Name System Tunneling Attacks: Detection and Prevention
Authors: Lawrence Williams
Abstract:
As the mechanism which converts domains to internet protocol (IP) addresses, Domain Name System (DNS) is an essential part of internet usage. It was not designed securely and can be subject to attacks. DNS attacks have become more frequent and sophisticated and the need for detecting and preventing them becomes more important for the modern network. DNS tunnelling attacks are one type of attack that are primarily used for distributed denial-of-service (DDoS) attacks and data exfiltration. Discussion of different techniques to detect and prevent DNS tunneling attacks is done. The methods, models, experiments, and data for each technique are discussed. A proposal about feasibility is made. Future research on these topics is proposed.Keywords: DNS, tunneling, exfiltration, botnet
Procedia PDF Downloads 759524 An Exploratory Study on the Difference between Online and Offline Conformity Behavior among Chinese College Students
Authors: Xinyue Ma, Dishen Zhang, Yijun Liu, Yutian Jiang, Huiyan Yu, Chufeng Gu
Abstract:
Conformity is defined as one in a social group changing his or her behavior to match the others’ behavior in the group. It is used to find that people show a higher level of online conformity behavior than offline. However, as anonymity can decrease the level of online conformity behavior, the difference between online and offline conformity behavior among Chinese college students still needs to be tested. In this study, college students (N = 60) have been randomly assigned into three groups: control group, offline experimental group, and online experimental group. Through comparing the results of offline experimental group and online experimental group with the Mann-Whitney U test, this study verified the results of Asch’s experiment, and found out that people show a lower level of online conformity behavior than offline, which contradicted the previous finding found in China. These results can be used to explain why some people make a lot of vicious remarks and radical ideas on the Internet but perform normally in their real life: the anonymity of the network makes the online group pressure less than offline, so people are less likely to conform to social norms and public opinions on the Internet. What is more, these results support the importance and relevance of online voting, because fewer online group pressures make it easier for people to expose their true ideas, thus gathering more comprehensive and truthful views and opinions.Keywords: anonymity, Asch’s group conformity, Chinese college students, online conformity
Procedia PDF Downloads 1529523 Road Traffic Psychology: A Survey of Seat Belt Usage among Drivers in Ogbomoso, Oyo State, Nigeria
Authors: I. T. Adebayo, J. R. Aworemi, V. A. Ogundele, O. J. Babalola, J. O. Ajayi
Abstract:
The behavior of road users is a critical element in road safety. However, despite the proven effectiveness of the seat belt in reducing injury severity, some drivers still do not use the seat belt. The study, therefore, examined seat belt usage among drivers in Ogbomoso, Oyo State, Nigeria. Face-to-face surveys were conducted to elicit data on seat belt usage and road behaviors on 54,038 drivers plying the General-Lautech Road in Ogbomoso over a period of six months. Data collected were analyzed using both descriptive and inferential statistics. Findings revealed that seat belt usage was moderate among private car drivers in the morning (52.75 percent) and much lower in the evening (37.67 percent), while less than 30 percent of the commercial bus/taxi drivers used the seat during both periods. The paired T-test revealed a significant difference in seat belt usage by all the drivers in the morning and in the evening, as indicated with a T value of 113.977 and the level of significance p < 0.05. The study concluded that there is a significant difference in the usage of the seat belt by both private car and commercial bus/taxi drivers in Ogbomoso as most drivers made use of the seat belt, especially in the morning, to avoid being delayed when flagged down and fined for non-compliance with seat belt usage by the road traffic law enforcement agents. However, most of the drivers cited inadequate/lack of enforcement of compulsory use of seat belts by the relevant agencies and discomfort as the major reasons for not using the seat belt while driving.Keywords: drivers, road , seat belt, traffic psychology
Procedia PDF Downloads 2009522 The Relationship between Coping Styles and Internet Addiction among High School Students
Authors: Adil Kaval, Digdem Muge Siyez
Abstract:
With the negative effects of internet use in a person's life, the use of the Internet has become an issue. This subject was mostly considered as internet addiction, and it was investigated. In literature, it is noteworthy that some theoretical models have been proposed to explain the reasons for internet addiction. In addition to these theoretical models, it may be thought that the coping style for stressing events can be a predictor of internet addiction. It was aimed to test with logistic regression the effect of high school students' coping styles on internet addiction levels. Sample of the study consisted of 770 Turkish adolescents (471 girls, 299 boys) selected from high schools in the 2017-2018 academic year in İzmir province. Internet Addiction Test, Coping Scale for Child and Adolescents and a demographic information form were used in this study. The results of the logistic regression analysis indicated that the model of coping styles predicted internet addiction provides a statistically significant prediction of internet addiction. Gender does not predict whether or not to be addicted to the internet. The active coping style is not effective on internet addiction levels, while the avoiding and negative coping style are effective on internet addiction levels. With this model, % 79.1 of internet addiction in high school is estimated. The Negelkerke pseudo R2 indicated that the model accounted for %35 of the total variance. The results of this study on Turkish adolescents are similar to the results of other studies in the literature. It can be argued that avoiding and negative coping styles are important risk factors in the development of internet addiction.Keywords: adolescents, coping, internet addiction, regression analysis
Procedia PDF Downloads 1739521 Internet Versus Muslim Communities Challenges, Problems and Solutions
Authors: Bashir Muhammad
Abstract:
The present research contains the definition of the internet, the inter-relationship between and globalization as well as the divergent views of scholars on internet net-work. Additionally, both the positive and the negative impacts of the internet on Muslim communities were elucidated. As an example, it is part of the positive effect that the internet constitutes a vital source of vast information and data acquisition in various academic sciences in general and Islamic Studies in particular. The most recent and current facts and scientific discoveries by specialists of various ramifications could be fund as fast as possible. Many other exciting points were also cited. And on the negative side of the internet, among many other points, it releases uncontrolled promiscuous pictures and sometimes misguiding information about Islam, which could gradually and easily destroy the sound moral up bring of our young Muslim generation and pollute their positive thinking and reasoning. Another problem is that, Muslims in most cases pertaining to internet services are passive consumers, having no power to control it and manipulate it for their welfare and well being. Due to that, they have to pay the price for that, directly or indirectly.Keywords: internet, muslim, challenges, communities
Procedia PDF Downloads 1219520 The Relationship between Mobile Phone Usage and Secondary School Students’ Academic Performance: Work Experience at an International School
Authors: L. N. P. Wedikandage, Mohamed Razmi Zahir
Abstract:
Technology is a global imperative because of its contributions to human existence and because it has improved global socioeconomic relations. As a result, the mobile phone has become the most important mode of communication today. Smartphones, Internet-enabled devices with built-in computer software and applications, are one of the most significant inventions of the twenty-first century. Technology is advantageous to many people, especially those involved in education. It is an important learning tool for today's schoolchildren. It enables students to access online learning platforms and course resources and interact digitally. Senior secondary students, in particular, have some of the most expensive and sophisticated mobile phones, tablets, and iPads capable of connecting to the internet and various social media platforms, other websites, and so on. At present, the use of mobile phones' potential for effective teaching and learning is growing. This is due to the benefits of mobile learning, including the ability to share knowledge without any limits in space or Time and the capacity to facilitate the development of critical thinking, participatory learning, problem-solving, and the development of lifelong communication skills. However, it is yet unclear how mobile devices may affect education and how they may affect opportunities for learning. As a result, the purpose of this research was to ascertain the relationship between mobile phone usage and the academic Performance of secondary-level students at an international school in Sri Lanka. The study's sample consisted of 523 secondary-level students from an international school, ranging from Form 1 to Upper 6. For the study, a survey research design and questionnaires were used. Google Forms was used to create the students' survey. There were three hypotheses tested to find out the relationship between mobile phone usage and academic preference. The findings show that there is a positive relationship between mobile phone usage and academic performance among secondary school students (the number of students obtaining simple passes is significantly higher when mobile phones are being used for more than 7 hours), no relationship between mobile phone usage and academic performance among secondary school students of different parents' occupations, and a relationship between the frequency of mobile phone usage and academic performance among secondary school students.Keywords: mobile phone, academic performance, secondary level, international schools
Procedia PDF Downloads 859519 Communication Strategies of Russian-English Asymmetric Bilinguals Given Insufficient Language Faculty
Authors: Varvara Tyurina
Abstract:
In the age of globalization Internet communication as a new format of interactions have become an integral part of our daily routine. Internet environment allows for new conditions and provides participants to a communication act with extra communication tools which can be used on Internet forums or in chat rooms. As a result communicants tend to alternate their behavior patterns in contrast to those practiced in live communication. It is not yet clear which communication strategies participants to Internet communication abide by and what determines their choices. Given the continually changing environment of a forum or a chat the behavior of a communicant can be interpreted in terms of autopoiesis theory which sees adaptation as the major tool for coexistence between the living system and its niche. Each communication act is seen as interaction between the communicant (i.e. the living system) and the overall environment of the forum (i.e. the niche) rather than one particular interlocutor. When communicating via the Internet participants are believed to aim at reaching a balance between themselves and the environment of a forum or a chat. The research focuses on unveiling the adaptation strategies employed by a communicant in particular cases and looks into the reasons they are employed. There is a correlation between language faculty of the communicants and the strategies they opt for when communicating on Internet forums and in chat rooms. The research included an experiment with a sample of Russian-English asymmetric bilinguals aged 16-25. Respondents were given two texts of equivalent contents, but of different language complexity. They had to respond to the texts as if they were making a reciprocal comment at a forum. It has been revealed that when communicants realize that their language faculty is not sufficient to understand the initial text they tend to amend their communication strategy in order to maintain the balance with the niche (remain involved in the communication). Most common strategies for responding to a difficult-to-understand text were self-presentation, veiling poor language faculty and response evasion. The research has so far focused on a very narrow aspect of correlation between language faculty and communication behavior, namely the syntactic and lexicological complexity of initial texts. It is essential to conduct a series of experiments that dwell on other characteristics of the texts to determine the range of cases when language faculty determines the choice of adaptation strategy.Keywords: adaptation, communication strategies, internet communication, verbal interaction, autopoiesis theory
Procedia PDF Downloads 3629518 Anti-Fables and Their Linguo Cultural Characteristics
Authors: Tamila Dilaverova
Abstract:
In our era of globalization, the unhindered intercultural communication represents an essential element of development. To be proficient in a language one needs to get acquainted with cultural and national peculiarities of the language of native speakers. Cultural peculiarities are explicitly reflected in the nation’s cultural heritage, monuments, literary works, tales, even in clothes. A specific role in the evaluation of cultural performances, establishment, broadcasting, and preservation of behavior norms belongs to the folk texts, among which the fables occupy one of the most important places. A fable, as a genre has existed since ancient times. Fables are universal because they are absolutely appropriate for any century and for any society. Even in the era of the internet, fables turned out to be actual. Internet offers a wide range of re-made fables. Generally, they are new interpretations of Aesop’s fables, but in some cases they are original. These fables became the subject of our research because they contain some modern slangs and jargons and their language is not that much literary. But, besides the changes in the language, there are some changes in the fields of their occupation, everyday activities and the ways of moneymaking. Because of the numerous changes, these new fables can be called 'anti-fables.' Anti-fables are the very new kinds of fables, that can be absolutely suitable for internet generation and perfectly reflects modern reality. All these changes are the reflections of thoughts and actions of new generation and these anti-fables can become a new internet literary genre.Keywords: intercultural, fable, language, internet
Procedia PDF Downloads 2229517 A Study on How to Develop the Usage Metering Functions of BIM (Building Information Modeling) Software under Cloud Computing Environment
Authors: Kim Byung-Kon, Kim Young-Jin
Abstract:
As project opportunities for the Architecture, Engineering and Construction (AEC) industry have grown more complex and larger, the utilization of BIM (Building Information Modeling) technologies for 3D design and simulation practices has been increasing significantly; the typical applications of the BIM technologies include clash detection and design alternative based on 3D planning, which have been expanded over to the technology of construction management in the AEC industry for virtual design and construction. As for now, commercial BIM software has been operated under a single-user environment, which is why initial costs for its introduction are very high. Cloud computing, one of the most promising next-generation Internet technologies, enables simple Internet devices to use services and resources provided with BIM software. Recently in Korea, studies to link between BIM and cloud computing technologies have been directed toward saving costs to build BIM-related infrastructure, and providing various BIM services for small- and medium-sized enterprises (SMEs). This study addressed how to develop the usage metering functions of BIM software under cloud computing architecture in order to archive and use BIM data and create an optimal revenue structure so that the BIM services may grow spontaneously, considering a demand for cloud resources. To this end, the author surveyed relevant cases, and then analyzed needs and requirements from AEC industry. Based on the results & findings of the foregoing survey & analysis, the author proposed herein how to optimally develop the usage metering functions of cloud BIM software.Keywords: construction IT, BIM (Building Information Modeling), cloud computing, BIM-based cloud computing, 3D design, cloud BIM
Procedia PDF Downloads 5069516 Analysis of User Data Usage Trends on Cellular and Wi-Fi Networks
Authors: Jayesh M. Patel, Bharat P. Modi
Abstract:
The availability of on mobile devices that can invoke the demonstrated that the total data demand from users is far higher than previously articulated by measurements based solely on a cellular-centric view of smart-phone usage. The ratio of Wi-Fi to cellular traffic varies significantly between countries, This paper is shown the compression between the cellular data usage and Wi-Fi data usage by the user. This strategy helps operators to understand the growing importance and application of yield management strategies designed to squeeze maximum returns from their investments into the networks and devices that enable the mobile data ecosystem. The transition from unlimited data plans towards tiered pricing and, in the future, towards more value-centric pricing offers significant revenue upside potential for mobile operators, but, without a complete insight into all aspects of smartphone customer behavior, operators will unlikely be able to capture the maximum return from this billion-dollar market opportunity.Keywords: cellular, Wi-Fi, mobile, smart phone
Procedia PDF Downloads 3659515 Integration of Internet-Accessible Resources in the Field of Mobile Robots
Authors: B. Madhevan, R. Sakkaravarthi, R. Diya
Abstract:
The number and variety of mobile robot applications are increasing day by day, both in an industry and in our daily lives. First developed as a tool, nowadays mobile robots can be integrated as an entity in Internet-accessible resources. The present work is organized around four potential resources such as cloud computing, Internet of things, Big data analysis and Co-simulation. Further, the focus relies on integrating, analyzing and discussing the need for integrating Internet-accessible resources and the challenges deriving from such integration, and how these issues have been tackled. Hence, the research work investigates the concepts of the Internet-accessible resources from the aspect of the autonomous mobile robots with an overview of the performances of the currently available database systems. IaR is a world-wide network of interconnected objects, can be considered an evolutionary process in mobile robots. IaR constitutes an integral part of future Internet with data analysis, consisting of both physical and virtual things.Keywords: internet-accessible resources, cloud computing, big data analysis, internet of things, mobile robot
Procedia PDF Downloads 3889514 Real-Time Big-Data Warehouse a Next-Generation Enterprise Data Warehouse and Analysis Framework
Authors: Abbas Raza Ali
Abstract:
Big Data technology is gradually becoming a dire need of large enterprises. These enterprises are generating massively large amount of off-line and streaming data in both structured and unstructured formats on daily basis. It is a challenging task to effectively extract useful insights from the large scale datasets, even though sometimes it becomes a technology constraint to manage transactional data history of more than a few months. This paper presents a framework to efficiently manage massively large and complex datasets. The framework has been tested on a communication service provider producing massively large complex streaming data in binary format. The communication industry is bound by the regulators to manage history of their subscribers’ call records where every action of a subscriber generates a record. Also, managing and analyzing transactional data allows service providers to better understand their customers’ behavior, for example, deep packet inspection requires transactional internet usage data to explain internet usage behaviour of the subscribers. However, current relational database systems limit service providers to only maintain history at semantic level which is aggregated at subscriber level. The framework addresses these challenges by leveraging Big Data technology which optimally manages and allows deep analysis of complex datasets. The framework has been applied to offload existing Intelligent Network Mediation and relational Data Warehouse of the service provider on Big Data. The service provider has 50+ million subscriber-base with yearly growth of 7-10%. The end-to-end process takes not more than 10 minutes which involves binary to ASCII decoding of call detail records, stitching of all the interrogations against a call (transformations) and aggregations of all the call records of a subscriber.Keywords: big data, communication service providers, enterprise data warehouse, stream computing, Telco IN Mediation
Procedia PDF Downloads 1759513 The Hindrances Associated with Internet Banking Services in Nigeria: The Lagos State Perspective
Authors: Patience Oluchi Silas, Yemi Adeshina
Abstract:
Financial transactions involving the use of the internet has become an important practice among commercial banks in Nigeria with the introduction of internet banking and this has improved banking efficiency in rending services to customers. However, customers in Lagos State are enslaved in the fear of insecurity, technical failure, inadequate operational facilities, including improper telecommunications and poor power supply. It is in line with this that this paper explores the obstacles faced by Lagosians, tourists, small scale business owners, companies, customers and the government's attitude in addressing the challenges associated with online banking system in Nigeria through relevant legislations. Internet banking has the potential to transform economic activity and achieve developmental goals. If the associated Challenges are addressed quickly, then it will have the desired impact on the Nigerian economy. In this study, Respondents, mostly bank employees and customers were issued well designed and structured questionnaires to effectively examine the new developments brought about by the introduction of Internet banking and the challenges inhibiting its adoption. Hypotheses were formulated to test assumptions and claims generated from the study. The results were statistically analyzed to address the issues of errors and chances, and at the end, the result of the statistical analysis shows that all especially insecurity, inadequate operational facilities and poor power supply are the significant factors affecting the adoption of internet banking services in Nigeria. The study recommends that for internet banking to assume a developmental dimension in Nigeria and for the country to be fully integrated and respected in global financial environment, the prevalent level of frauds in Lagos State and among Nigerians must first be addressed and the relevant local laws should be put in place and in consonance with international laws and conventions; get the citizens well educated on the intricacies of Internet usage and frauds.Keywords: internet-banking, adoption, challenges, insecurity, legislation, fraud, Lagos state, statistics
Procedia PDF Downloads 342