Search results for: internet access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4519

Search results for: internet access

4489 Internet Addiction among Students: An Empirical Study in Pondicherry University

Authors: Mashood C., Abdul Vahid K., Ashique C. K.

Abstract:

The technology is growing beyond human expectation. Internet is one of very sophisticated product of the information technology. It has various advantages like connecting the world, simplifying the difficult tasks done in past etc. Simultaneously it has demerits also; that is lack of authenticity and internet addiction. To find out the problems of internet addiction, a study conducted among the Postgraduate students of Pondicherry University and collected 454 samples. The study strictly focused to identify the internet addiction among students, influence and interdependence of personality on internet addiction among first years and second years. To evaluate this, we used two major analysis, these are Confirmatory Factor Analysis (CFA) to predict the internet addiction with the observed data and Logistic Regression to identify the difference between first years and second years in the case of internet addiction. Before applying to the core analysis, the data applied to some preliminary tests to check the model fit. The empirical findings shows that , the students of Pondicherry University are very much addicted to the internet, But there is no such huge difference between first years and second years in case of internet addiction.

Keywords: internet addiction, students, Pondicherry University, empirical study

Procedia PDF Downloads 436
4488 A Survey on Internet of Things and Fog Computing as a Platform for Internet of Things

Authors: Samira Kalantary, Sara Taghipour, Mansoure Ghias Abadi

Abstract:

The Internet of Things (IOT) is a technological revolution that represents the future of computing and communications. IOT is the convergence of Internet with RFID, NFC, Sensor, and smart objects. Fog Computing is the natural platform for IOT. At present, the IOT as a new network communication technology has rapidly shifted from concept to application under fog computing virtual storage computing platform. In this paper, we describe everything about IOT and difference between cloud computing and fog computing.

Keywords: cloud computing, fog computing, Internet of Things (IoT), IOT application

Procedia PDF Downloads 547
4487 Analyzing the Plausible Alternatives in Contracting the Societal Fissure Caused by Digital Divide in Sri Lanka

Authors: Manuela Nayantara Jeyaraj

Abstract:

'Digital Divide' is a concept that has existed in this paradigm ever since the discovery of the first-generation technologies. Before the turn of the century, it was basically used to describe the gap between those with telephone communication access and those without it. At present, it is plainly descriptive in itself to illustrate the cavity among those with Internet access and those without. Though the concept of digital divide has been merely lying in sight for as long as time itself, the friction it caused has not yet been fully realized to solve major crisis situations. Unlike well-developed countries, Sri Lanka is still in the verge of moving farther away from a developing country in the race towards reaching a developed state. Access to technological resources varies from region to region, even within the island itself, with one region having a considerable percentage of its community exposed to the Internet and its related technologies, and the other unaware of such. Thus, this paper intends to analyze the roots for the still-extant gap instigated based on the concept of ‘Digital Divide’ and explores the plausible potentials that could be brought about by narrowing this prevailing percentage among the population, specifically entrenching the advantages reaped towards an economic augmentation and culture or lifestyle revolution on the path towards development.

Keywords: communication, digital divide, society, Sri Lanka

Procedia PDF Downloads 204
4486 Internet as a Marketing Tool for Tourism Promotion

Authors: Emeka Okonkwo

Abstract:

The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.

Keywords: internet, marketing, tourism, tourism management

Procedia PDF Downloads 390
4485 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 125
4484 The Third Level Digital Divide: Millennials and Post-Millennials Online Activities in South Africa

Authors: Ayanda Magida, Brian Armstrong

Abstract:

The study aimed to assess the third level of the digital divide among the millennials and post-millennials in South Africa. The millennials are people born from 1981-to 1996, that is, people between the ages of 25-40 years old and post-millennials are people born from 1997 to date. For the study, only post-millennials born between 1997-2003 were included as they were old enough to consent to participation in the study. Data was collected as part of the Ph.D. project that focuses on the relationship between income inequality, the digital divide, and social cohesion in South Africa. The digital divide has three main levels, namely the first, second and third. The first and second focus on access and usage, respectively. The third-level digital divide can be defined as the differences in the benefits associated with being online. The current paper focuses on the third level: the benefits derived by being online using four domains: economic, educational, social, and personal benefits. The economic benefits include income, employment and finance-related activities; the social benefits include socializing belonging, identity, and informal networks. The personal benefits include personal wellbeing and self-actualization. A total of 763 participants completed the survey, and 61.3% were post-millennials between the ages of 18-24 and s 38.6 % were millennials between 25 and 40. The majority of the respondents were female (62%), male (34%) and nonbinary (1%), respectively. Most of the respondents were black, followed by whites, Indians and colored, respectively. Thus, they represented the status of the demographics of the country. Most of the respondents had access to the internet and smartphone. Most expressed that they use laptops (68%) or mobile (71%) to access the internet and 54 % access the internet using wireless/Wi-Fi. There were no differences between the millennial and post-millennial economic and educational benefits of being online. However, the post-millennials were more inclined to use the internet for social and personal benefits than the millennials. This could be attributed to many factors, such as age. The post-millennials are still discovering themselves and therefore would derive social and personal benefits associated with being online. The findings confirm studies that argue that younger generations derive more benefits from being online than the older generation. Based on the findings, it is evident that the post-millennials are not using the internet or online activities for social networks and socializing but can derive economic benefits such as job looking and education benefits from being online. It can be inferred that there are no significant differences between the two groups, and it seems like the third-level digital divide is not evident among the two groups as they both have been able to derive meaningful benefits from being online. Further studies should focus on the third-level divide between the baby boomers and Generation X.

Keywords: third-level digital divide, millennials, post-millennials, online activities

Procedia PDF Downloads 75
4483 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem

Procedia PDF Downloads 324
4482 The Relationship between Coping Styles and Internet Addiction among High School Students

Authors: Adil Kaval, Digdem Muge Siyez

Abstract:

With the negative effects of internet use in a person's life, the use of the Internet has become an issue. This subject was mostly considered as internet addiction, and it was investigated. In literature, it is noteworthy that some theoretical models have been proposed to explain the reasons for internet addiction. In addition to these theoretical models, it may be thought that the coping style for stressing events can be a predictor of internet addiction. It was aimed to test with logistic regression the effect of high school students' coping styles on internet addiction levels. Sample of the study consisted of 770 Turkish adolescents (471 girls, 299 boys) selected from high schools in the 2017-2018 academic year in İzmir province. Internet Addiction Test, Coping Scale for Child and Adolescents and a demographic information form were used in this study. The results of the logistic regression analysis indicated that the model of coping styles predicted internet addiction provides a statistically significant prediction of internet addiction. Gender does not predict whether or not to be addicted to the internet. The active coping style is not effective on internet addiction levels, while the avoiding and negative coping style are effective on internet addiction levels. With this model, % 79.1 of internet addiction in high school is estimated. The Negelkerke pseudo R2 indicated that the model accounted for %35 of the total variance. The results of this study on Turkish adolescents are similar to the results of other studies in the literature. It can be argued that avoiding and negative coping styles are important risk factors in the development of internet addiction.

Keywords: adolescents, coping, internet addiction, regression analysis

Procedia PDF Downloads 147
4481 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 70
4480 Internet Versus Muslim Communities Challenges, Problems and Solutions

Authors: Bashir Muhammad

Abstract:

The present research contains the definition of the internet, the inter-relationship between and globalization as well as the divergent views of scholars on internet net-work. Additionally, both the positive and the negative impacts of the internet on Muslim communities were elucidated. As an example, it is part of the positive effect that the internet constitutes a vital source of vast information and data acquisition in various academic sciences in general and Islamic Studies in particular. The most recent and current facts and scientific discoveries by specialists of various ramifications could be fund as fast as possible. Many other exciting points were also cited. And on the negative side of the internet, among many other points, it releases uncontrolled promiscuous pictures and sometimes misguiding information about Islam, which could gradually and easily destroy the sound moral up bring of our young Muslim generation and pollute their positive thinking and reasoning. Another problem is that, Muslims in most cases pertaining to internet services are passive consumers, having no power to control it and manipulate it for their welfare and well being. Due to that, they have to pay the price for that, directly or indirectly.

Keywords: internet, muslim, challenges, communities

Procedia PDF Downloads 96
4479 Identify Users Behavior from Mobile Web Access Logs Using Automated Log Analyzer

Authors: Bharat P. Modi, Jayesh M. Patel

Abstract:

Mobile Internet is acting as a major source of data. As the number of web pages continues to grow the Mobile web provides the data miners with just the right ingredients for extracting information. In order to cater to this growing need, a special term called Mobile Web mining was coined. Mobile Web mining makes use of data mining techniques and deciphers potentially useful information from web data. Web Usage mining deals with understanding the behavior of users by making use of Mobile Web Access Logs that are generated on the server while the user is accessing the website. A Web access log comprises of various entries like the name of the user, his IP address, a number of bytes transferred time-stamp etc. A variety of Log Analyzer tools exists which help in analyzing various things like users navigational pattern, the part of the website the users are mostly interested in etc. The present paper makes use of such log analyzer tool called Mobile Web Log Expert for ascertaining the behavior of users who access an astrology website. It also provides a comparative study between a few log analyzer tools available.

Keywords: mobile web access logs, web usage mining, web server, log analyzer

Procedia PDF Downloads 338
4478 Remote Wireless Communications Lab in Real Time

Authors: El Miloudi Djelloul

Abstract:

Technology nowadays enables the remote access to laboratory equipment and instruments via Internet. This is especially useful in engineering education, where students can conduct laboratory experiment remotely. Such remote laboratory access can enable student to use expensive laboratory equipment, which is not usually available to students. In this paper, we present a method of creating a Web-based Remote Laboratory Experimentation in the master degree course “Wireless Communications Systems” which is part of “ICS (Information and Communication Systems)” and “Investment Management in Telecommunications” curriculums. This is done within the RIPLECS Project and the NI2011 FF005 Research Project “Implementation of Project-Based Learning in an Interdisciplinary Master Program”.

Keywords: remote access, remote laboratory, wireless telecommunications, external antenna-switching controller board (EASCB)

Procedia PDF Downloads 488
4477 Deep Reinforcement Learning-Based Computation Offloading for 5G Vehicle-Aware Multi-Access Edge Computing Network

Authors: Ziying Wu, Danfeng Yan

Abstract:

Multi-Access Edge Computing (MEC) is one of the key technologies of the future 5G network. By deploying edge computing centers at the edge of wireless access network, the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios. Meanwhile, with the development of IOV (Internet of Vehicles) technology, various delay-sensitive and compute-intensive in-vehicle applications continue to appear. Compared with traditional internet business, these computation tasks have higher processing priority and lower delay requirements. In this paper, we design a 5G-based Vehicle-Aware Multi-Access Edge Computing Network (VAMECN) and propose a joint optimization problem of minimizing total system cost. In view of the problem, a deep reinforcement learning-based joint computation offloading and task migration optimization (JCOTM) algorithm is proposed, considering the influences of multiple factors such as concurrent multiple computation tasks, system computing resources distribution, and network communication bandwidth. And, the mixed integer nonlinear programming problem is described as a Markov Decision Process. Experiments show that our proposed algorithm can effectively reduce task processing delay and equipment energy consumption, optimize computing offloading and resource allocation schemes, and improve system resource utilization, compared with other computing offloading policies.

Keywords: multi-access edge computing, computation offloading, 5th generation, vehicle-aware, deep reinforcement learning, deep q-network

Procedia PDF Downloads 78
4476 3G or 4G: A Predilection for Millennial Generation of Indian Society

Authors: Rishi Prajapati

Abstract:

3G is the abbreviation of third generation of wireless mobile telecommunication technologies. 3G is a mode that finds application in wireless voice telephony, mobile internet access, fixed wireless internet access, video calls and mobile TV. It also provides mobile broadband access to smartphones and mobile modems in laptops and computers. The first 3G networks were introduced in 1998, followed by 4G networks in 2008. 4G is the abbreviation of fourth generation of wireless mobile telecommunication technologies. 4G is termed to be the advanced form of 3G. 4G was firstly introduced in South Korea in 2007. Many abstracts have floated researches that depicted the diversity and similarity between the third and the fourth generation of wireless mobile telecommunications technology, whereas this abstract reflects the study that focuses on analyzing the preference between 3G versus 4G given by the elite group of the Indian society who are known as adolescents or the Millennial Generation aging from 18 years to 25 years. The Millennial Generation was chosen for this study as they have the easiest access to the latest technology. A sample size of 200 adolescents was selected and a structured survey was carried out which had several closed ended as well as open ended questions, to aggregate the result of this study. It was made sure that the effect of environmental factors on the subjects was as minimal as possible. The data analysis comprised of primary data collection reflecting it as quantitative research. The rationale behind this research is to give brief idea of how 3G and 4G are accepted by the Millennial Generation in India. The findings of this research would materialize a framework which depicts whether Millennial Generation would prefer 4G over 3G or vice versa.

Keywords: fourth generation, wireless telecommunication technology, Indian society, millennial generation, market research, third generation

Procedia PDF Downloads 229
4475 Internet Economy: Enhancing Information Communication Technology Adaptation, Service Delivery, Content and Digital Skills for Small Holder Farmers in Uganda

Authors: Baker Ssekitto, Ambrose Mbogo

Abstract:

The study reveals that indeed agriculture employs over 70% of Uganda’s population, of which majority are youth and women. The study further reveals that over 70% of the farmers are smallholder farmers based in rural areas, whose operations are greatly affected by; climate change, weak digital skills, limited access to productivity knowledge along value chains, limited access to quality farm inputs, weak logistics systems, limited access to quality extension services, weak business intelligence, limited access to quality markets among others. It finds that the emerging 4th industrial revolution powered by artificial intelligence, 5G and data science will provide possibilities of addressing some of these challenges. Furthermore, the study finds that despite rapid development of ICT4Agric Innovation, their uptake is constrained by a number of factors including; limited awareness of these innovations, low internet and smart phone penetration especially in rural areas, lack of appropriate digital skills, inappropriate programmes implementation models which are project and donor driven, limited articulation of value addition to various stakeholders among others. Majority of farmers and other value chain actors lacked knowledge and skills to harness the power of ICTs, especially their application of ICTs in monitoring and evaluation on quality of service in the extension system and farm level processes.

Keywords: artificial intelligence, productivity, ICT4agriculture, value chain, logistics

Procedia PDF Downloads 57
4474 Health Information Needs and Utilization of Information and Communication Technologies by Medical Professionals in a Northern City of India

Authors: Sonika Raj, Amarjeet Singh, Vijay Lakshmi Sharma

Abstract:

Introduction: In 21st century, due to revolution in Information and Communication Technologies (ICTs), there has been phenomenal development in quality and quantity of knowledge in the field of medical science. So, the access to relevant information to physicians is critical to the delivery of effective healthcare services to patients. The study was conducted to assess the information needs and attitudes of the medical professionals; to determine the sources and channels of information used by them; to ascertain the current usage of ICTs and the barriers faced by them in utilization of ICTs in health information access. Methodology: This descriptive cross-sectional study was carried in 2015 on hundred medical professionals working in public and private sectors of Chandigarh. The study used both quantitative and qualitative method for data collection. A semi structured questionnaire and interview schedule was used to collect data on information seeking needs, access to ICTs and barriers to healthcare information access. Five Data analysis was done using SPSS-16 and qualitative data was analyzed using thematic approach. Results: The most preferred sources to access healthcare information were internet (85%), trainings (61%) and communication with colleagues (57%). They wanted information on new drug therapy and latest developments in respective fields. All had access to computer with but almost half assessed their computer knowledge as average and only 3% had received training regarding usage. Educational status (p=0.004), place of work (p=0.004), number of years in job (p=0.004) and sector of job (p=0.04) of doctors were found to be significantly associated with their active search for information. The major themes that emerged from in-views were need; types and sources of healthcare information; exchange of information among different levels of healthcare providers; usage of ICTs to obtain and share information; barriers to access of healthcare information and quality of health information materials and involvement in their development process Conclusion and Recommendations: The medical professionals need information in their in their due course of work. However, information needs of medical professionals were not being adequately met. There should be training of professional regarding internet skills and the course on bioinformatics should be incorporated in the curricula of medical students. The policy framework must be formulated that will encourage and promote the use of ICTs as tools for health information access and dissemination.

Keywords: health information, ICTs, medical professionals, qualitative

Procedia PDF Downloads 325
4473 Integration of Internet-Accessible Resources in the Field of Mobile Robots

Authors: B. Madhevan, R. Sakkaravarthi, R. Diya

Abstract:

The number and variety of mobile robot applications are increasing day by day, both in an industry and in our daily lives. First developed as a tool, nowadays mobile robots can be integrated as an entity in Internet-accessible resources. The present work is organized around four potential resources such as cloud computing, Internet of things, Big data analysis and Co-simulation. Further, the focus relies on integrating, analyzing and discussing the need for integrating Internet-accessible resources and the challenges deriving from such integration, and how these issues have been tackled. Hence, the research work investigates the concepts of the Internet-accessible resources from the aspect of the autonomous mobile robots with an overview of the performances of the currently available database systems. IaR is a world-wide network of interconnected objects, can be considered an evolutionary process in mobile robots. IaR constitutes an integral part of future Internet with data analysis, consisting of both physical and virtual things.

Keywords: internet-accessible resources, cloud computing, big data analysis, internet of things, mobile robot

Procedia PDF Downloads 351
4472 Birds of a Feather Flock Together: Exploring Effects of Internet Celebrity Endorsement in Advertising

Authors: Shiu-Wan Hung, Che-Wei Chang, Han-Yu Lin

Abstract:

Internet celebrities possess high visibility and a great number of fans on the Internet and are the targets that various companies are keen to collaborate with. This study investigated the para-social interaction and its antecedents among internet celebrities and their fans. The effects of Internet celebrity advertising from the perspectives of source credibility and endorser suitability were studied. This study gathered 283 valid questionnaires from people who regularly follow internet celebrities for analysis. The experimental results suggest that expertise has the most significant and direct influence on advertising. Additionally, Internet celebrities with high attractiveness can better influence the thinking of their fans and enhance homophily. However, when considering the construction of source credibility, the direct influence of attractiveness is the least significant, suggesting that the attractiveness of internet celebrities can only promote advertising via the mediating effect of homophily.

Keywords: celebrity, para-social interaction, homophily, source credibility

Procedia PDF Downloads 53
4471 RAPDAC: Role Centric Attribute Based Policy Driven Access Control Model

Authors: Jamil Ahmed

Abstract:

Access control models aim to decide whether a user should be denied or granted access to the user‟s requested activity. Various access control models have been established and proposed. The most prominent of these models include role-based, attribute-based, policy based access control models as well as role-centric attribute based access control model. In this paper, a novel access control model is presented called “Role centric Attribute based Policy Driven Access Control (RAPDAC) model”. RAPDAC incorporates the concept of “policy” in the “role centric attribute based access control model”. It leverages the concept of "policy‟ by precisely combining the evaluation of conditions, attributes, permissions and roles in order to allow authorization access. This approach allows capturing the "access control policy‟ of a real time application in a well defined manner. RAPDAC model allows making access decision at much finer granularity as illustrated by the case study of a real time library information system.

Keywords: authorization, access control model, role based access control, attribute based access control

Procedia PDF Downloads 131
4470 Searching for Health-Related Information on the Internet: A Case Study on Young Adults

Authors: Dana Weimann Saks

Abstract:

This study aimed to examine the use of the internet as a source of health-related information (HRI), as well as the change in attitudes following the online search for HRI. The current study sample included 88 participants, randomly divided into two experimental groups. One was given the name of an unfamiliar disease and told to search for information about it using various search engines, and the second was given a text about the disease from a credible scientific source. The study findings show a large percentage of participants used the internet as a source of HRI. Likewise, no differences were found in the extent to which the internet was used as a source of HRI when demographics were compared. Those who searched for the HRI on the internet had more negative opinions and believed symptoms of the disease were worse than the average opinion among those who obtained the information about the disease from a credible scientific source. The Internet clearly influences the participants’ beliefs, regardless of demographic differences.

Keywords: health-related information, internet, young adults, HRI

Procedia PDF Downloads 88
4469 Comparison of Self-Efficacy and Life Satisfaction in Normal Users and Users with Internet Addiction

Authors: Mansour Abdi, Hadi Molaei Yasavoli

Abstract:

The purpose of this research is to comparison of self- efficacy and life satisfaction in normal users and users with internet addiction. The present study was descriptive and causal-comparative. Therefore, 304 students were selected random sampling method from students of Semnan University and completed questionnaires of internet addiction (young), Self-Efficacy Questionnaire and Life Satisfaction (SWIS). For data analysis was used the Multivariate Analysis of Variance (MANOVA). The results showed that internet addiction users have lower levels of self-efficacy and life satisfaction in comparison with normal users and the difference in p=0/0005 significantly. The findings showed that 78 percent of the variance in the dependent variables of self-efficacy and life satisfaction by grouping variables (internet addiction users and normal) is determined. Finally, considering that the rate of self-efficacy and life satisfaction is effective in the incidence of Internet addiction, it is proposed required measures are taken to enhance self-efficacy and life satisfaction in Internet users.

Keywords: self-efficacy, life satisfaction, users, internet addiction, normal users

Procedia PDF Downloads 459
4468 A Study on the Effect of the Mindfulness and Cultivation of Wisdom as an Intervention Strategy for College Student Internet Addiction

Authors: P. C. Li, R. H. Feng, S. J. Chen, Y. J. Yu, Y. L. Chen, X. Y. Fan

Abstract:

The purpose of this study is to investigate the effect of mindfulness and wisdom comprehensive strategy intervention on addiction to the Internet of college students by engaging fourteen intensive full-day mindfulness-based wisdom retreat curriculum. Wisdom, one of the practice method from the threefold training. Internet addiction, a kind of impulse control disorder, which attract the attentions of society due to its high prevalence and harmfulness in the last decade. Therefore, the study of internet addiction intervention is urgent. Participants with internet addiction were Chinese college students and screened by internet addiction disorder diagnose questionnaire (IAD-DQ). A quasi-experimental pretest and posttest design was used as research design. The finding shows that the mindfulness-based wisdom intervention strategy appeared to be effective in reducing the Internet addiction. Moreover, semi-structure interview method was conducted and outcomes included five themes: the reduction of internet use, the increment of awareness on emotion, self-control, present concentration and better positive lifestyle, indicating that mindfulness could be an effective intervention for this group with internet addiction.

Keywords: mindfulness, internet addiction, wisdom comprehensive intervention, cognitive-behavior therapy

Procedia PDF Downloads 150
4467 The Access to the City in the Medellín Urban Experience

Authors: Mansilla, Juan Camilo

Abstract:

According to many studies, public space in the cities of Global South is constantly morcellated and captured by a multiplicity of actors in a permanent struggle for power. This imposed public space restricts the access to services and political actions to many inhabitants. The author has conducted several focus group sessions using video in a reflective mode with low-income communities in Medellín, Colombia in order to study how people in this city are shift from a physical public space to a hybrid public space shaped by internet. Beyond the fragmented city and the violent urban context manifested by participants, these activities have highlighted how the access to the city is currently going through a dialectic movement between the physical and the digital space. The purpose of this article is to make explicit the link between this hybrid public space and the boundaries of exclusion in the city. Urban marginality is closely related with the idea of access and space. Low-income communities in Medellín assume the digital realm like a “not controlled space” of resistance, where alternative ways of expression like hip hop movement, graffiti, dance, video and virtual communities produce effective changes in the physical realm.

Keywords: access to the city, hybrid public space, low-income communities, Medellín, urban marginality

Procedia PDF Downloads 452
4466 Utilizing Google Earth for Internet GIS

Authors: Alireza Derambakhsh

Abstract:

The objective of this examination is to explore the capability of utilizing Google Earth for Internet GIS applications. The study particularly analyzes the utilization of vector and characteristic information and the capability of showing and preparing this information in new ways utilizing the Google Earth stage. It has progressively been perceived that future improvements in GIS will fixate on Internet GIS, and in three noteworthy territories: GIS information access, spatial data scattering and GIS displaying/preparing. Google Earth is one of the group of geobrowsers that offer a free and simple to utilize administration that empower information with a spatial part to be overlain on top of a 3-D model of the Earth. This examination makes a methodological structure to accomplish its objective that comprises of three noteworthy parts: A database level, an application level and a customer level. As verification of idea a web model has been produced, which incorporates a differing scope of datasets and lets clients direst inquiries and make perceptions of this custom information. The outcomes uncovered that both vector and property information can be successfully spoken to and imagined utilizing Google Earth. In addition, the usefulness to question custom information and envision results has been added to the Google Earth stage.

Keywords: Google earth, internet GIS, vector, characteristic information

Procedia PDF Downloads 277
4465 Influencing Factors to Mandatory versus Non-Mandatory E-Government Services Adoption in India: An Empirical Study

Authors: Rajiv Kumar, Amit Sachan, Arindam Mukherjee

Abstract:

Government agencies around the world, including India, are incorporating digital technologies and processes into their day-to-day operations to become more efficient. Despite low internet penetration (around 34.8% of total population) in India, Government of India has made some public services mandatory to access online (e.g. passport, tax filing).This is insisting citizens to access mandatory public services online. However, due to digital divide, all citizens do not have equal access to internet. In light of this, it is an interesting topic to explore how citizens are able to access mandatory online public services. It is important to understand how citizens are adopting these mandatory e-government services and how the adoption behavior of these mandatory e-government services is different or similar to adoption behavior of non-mandatory e-government services. The purpose of this research is to investigate the factors that influence adoption of mandatory and non-mandatory e-government services in India. A quantitative technique is employed in this study. A conceptual model has been proposed by integrating the influencing factors to adopt e-government services from previous studies. The proposed conceptual model highlights a comprehensive set of potential factors influencing the adoption of e-government services. The proposed model has been validated by keeping in view the local context of Indian society. Online and paper based survey was administered, collected data was analyzed and results have been discussed. A total of 463 valid responses were received and further the responses were analyzed. The research reveals that the influencing factors to adopt e-government services are not same for both mandatory and non-mandatory e-government services. There are some factors that influence adoption of both mandatory and non-mandatory e-government services but there are some which are relevant for either of mandatory and non-mandatory e-government services. The research findings may help government or concerned agencies in successfully implementing e-government services.

Keywords: adoption, e-government, India, mandatory, non-mandatory

Procedia PDF Downloads 285
4464 Characterization of Internet Exchange Points by Using Quantitative Data

Authors: Yamba Dabone, Tounwendyam Frédéric Ouedraogo, Pengwendé Justin Kouraogo, Oumarou Sie

Abstract:

Reliable data transport over the Internet is one of the goals of researchers in the field of computer science. Data such as videos and audio files are becoming increasingly large. As a result, transporting them over the Internet is becoming difficult. Therefore, it has been important to establish a method to locally interconnect autonomous systems (AS) with each other to facilitate traffic exchange. It is in this context that Internet Exchange Points (IXPs) are set up to facilitate local and even regional traffic. They are now the lifeblood of the Internet. Therefore, it is important to think about the factors that can characterize IXPs. However, other more quantifiable characteristics can help determine the quality of an IXP. In addition, these characteristics may allow ISPs to have a clearer view of the exchange node and may also convince other networks to connect to an IXP. To that end, we define five new IXP characteristics: the attraction rate (τₐₜₜᵣ); and the peering rate (τₚₑₑᵣ); the target rate of an IXP (Objₐₜₜ); the number of IXP links (Nₗᵢₙₖ); the resistance rate τₑ𝒻𝒻 and the attraction failure rate (τ𝒻).

Keywords: characteristic, autonomous system, internet service provider, internet exchange point, rate

Procedia PDF Downloads 65
4463 A Study on the Usage of Library versus the Internet as Sources of Information with Reference to the Undergraduate Students in the Faculties of Humanities, Social Sciences, Science and Commerce and Management in the University of Kelaniya

Authors: Dilini Bodhinayaka, Aunsha Sajeewanie Rubasinghe

Abstract:

The library of the University of Kelaniya plays a significant role in supporting the academic work of the university. As at July, 2016 the library of the University of Kelaniya comprised of 250301 printed books, 2157 CD-ROMs, 1203 theses and 800 non-book materials. Furthermore, the library is subscribed to about 60 local journals, access to over 12,500 full text academic journals and around 100,000 e-books. The library provides the services and resources that support in teaching, doing research and learning. On the other hand, undergraduate students have adopted and continued to use the online information retrieval for their academic and research work. This study aims to compare the usage of internet and the usage of library among undergraduates in the faculties of Humanities, Social Sciences, Science and Commerce & Management in the University of Kelaniya. Also, the research attempts to determine the factors of enthusiasm or the disinterest in the students in using library and Internet. All the undergraduate students in the University (8440 students at the time of the study) were taken as the population of the study and the sample of 15% was selected out of the population using stratified sampling method. A total of 1266 questionnaires were distributed among undergraduates of the above mentioned faculties. The qualitative data were analyzed using Descriptive Statistical Method. Findings, of the study indicated that undergraduate students of the faculties of Humanities, Social Sciences, Science and Commerce & Management use both the library and the internet to fulfill their information needs. But, the students in the faculty of Science and Commerce & Management use the internet sources more than the library. The undergraduates in the faculties of Humanities and Social Sciences frequently use the university library than the internet. Although, majority agreed that the internet is the most preferred source of information they have no an adequate awareness about the available internet resources in the E-library of the University of Kelaniya.

Keywords: university libraries, University of Kelaniya, online resources, undergraduates in Sri Lanka

Procedia PDF Downloads 212
4462 Readiness of Estonian Working and Non-working Older Adults to Benefit from eHealth

Authors: Marianne Paimre

Abstract:

Estonia is heralded as the most successful digital country in the world with the highly acclaimed eHealth system. Yet 40% of the 65–74-year-olds do not use the Internet at all, and digital divide between young and elderly people's use of ICT is larger than in many advanced countries. Poor access to ICT resource and insufficient digital skills can lead to detachment from digital health resources, delayed diagnoses, and increased rates of hospitalization. To reveal digital divide within the elderly population itself, the presentation focuses on the health information behavior of Estonian seniors who either continue or have stopped working after retirement to use digital health applications. The author's main interest is on access, trust, and skills to use the Internet for medical purposes. Fifteen in-depth interviews with 65+ working persons, as well as 15 interviews with full-time retirees, were conducted. Also, six think-aloud protocols were conducted. The results indicate that older adults, who due to the nature of their work, have regular access to computers, often search for health-related information online. They exposed high source criticism and were successful in solving the given tasks. Conversely, most of the fully retired older adults claimed not using computers or other digital devices and cited lack of skills as the main reason for their inactivity. Thus, when developing health applications, it should be borne in mind that the ability and willingness of older adults to use e-solutions are very different.

Keywords: digital divide, digital healthcare, health information behavior, older adults

Procedia PDF Downloads 132
4461 Net Folklore as a Part of Kazakhstani Internet Literature

Authors: Dina Sabirova, Madina Moldagali

Abstract:

The rapid development of new media, especially the Internet, has led to major changes in folk culture. The net space is increasingly becoming a creation of the ‘folk’ imagination, saturated with multimedia stories with collective authorship, like traditional folklore. Moreover, the Internet picks up and changes old folklore traditions, such as the form of publication, the way of storytelling, or gave a new morality to the ‘old tales’. In this article, the similarities and differences between Internet folklore/ cyber-folklore/ digital folklore and oral folk art were examined by using the material of modern Kazakh authors. The relationship between tradition and innovation was studied in order to interpret the sequence of the authors' research taking into account the realities. The material of the article was the prose texts of Kazakh writers published in internet magazines and social networks. An immanent and intertextual analysis of the text was carried out. Thus, the new forms of Internet folklore lead to new forms of expression and social morality in society

Keywords: internet literature, modern Kazakhstani authors, net folklore, oral folk art

Procedia PDF Downloads 69
4460 Profile of Internet and Smartphone Overuse Based on Internet Usage Needs

Authors: Yeoju Chung

Abstract:

Adolescents internet and smartphone addiction are increasing in Korea. But differences between internet addiction and smartphone addiction have been researched in these days. The main objective of this article is to explore the presence of clusters within a sample of adolescents based on dimensions associated with addiction and internet usage needs. The sample consists of 617 adolescents in the 14-19 year age group who were recruited in Korea A cluster analysis identified four groups of participants: internet overuse(IO), smartphone overuse(SO), both overuse(B) and normal(N) use group. MANOVA analysis based on internet usage showed that there are differences among four groups in internet usage needs. IO has higher cyber self-seeking needs and emotion and thought expression needs than SO. SO has higher real relationship and life needs with cyberworld than IO, B, and N. B has the highest cyber self-seeking needs and emotion and thought expression needs, however, game fun seeking needs is the highest in IO. These results support that IO seeks game fun needs, SO seeks real relationship and life needs, and B seeks cyber self and expression in cyberworld.

Keywords: addiction, internet, needs, smartphone

Procedia PDF Downloads 250