Search results for: internet data science
27550 Characterization of Internet Exchange Points by Using Quantitative Data
Authors: Yamba Dabone, Tounwendyam Frédéric Ouedraogo, Pengwendé Justin Kouraogo, Oumarou Sie
Abstract:
Reliable data transport over the Internet is one of the goals of researchers in the field of computer science. Data such as videos and audio files are becoming increasingly large. As a result, transporting them over the Internet is becoming difficult. Therefore, it has been important to establish a method to locally interconnect autonomous systems (AS) with each other to facilitate traffic exchange. It is in this context that Internet Exchange Points (IXPs) are set up to facilitate local and even regional traffic. They are now the lifeblood of the Internet. Therefore, it is important to think about the factors that can characterize IXPs. However, other more quantifiable characteristics can help determine the quality of an IXP. In addition, these characteristics may allow ISPs to have a clearer view of the exchange node and may also convince other networks to connect to an IXP. To that end, we define five new IXP characteristics: the attraction rate (τₐₜₜᵣ); and the peering rate (τₚₑₑᵣ); the target rate of an IXP (Objₐₜₜ); the number of IXP links (Nₗᵢₙₖ); the resistance rate τₑ𝒻𝒻 and the attraction failure rate (τ𝒻).Keywords: characteristic, autonomous system, internet service provider, internet exchange point, rate
Procedia PDF Downloads 9327549 Internet Usage Behavior on Mobile Phones of the Faculty of Management Science Students at Suan Sunandha Rajabhat University
Authors: Arpapron Phokajang
Abstract:
The objectives of this research were to study the internet usage, including; date, time, description of using service, network service, telephone charge, and to study the internet usage behavior on mobile phones of the Faculty of Management Science students at Suan Sunandha Rajabhat University. The samples consisted of 395 students from the Faculty of Management Science. Questionnaires were used for collecting the data. Descriptive statistics used in this research including percentage, mean, and standard deviation. The findings of this research found that most respondents were female, aged between 21 and 25 years old, used the monthly AIS network service calls on Monday to Friday around 6.01-12.00 p.m., the internet usage behavior on mobile phones for entertainment was found in the highest level in all aspects, and education, business and commerce, and communication were found in the moderate level and using the internet to watch YouTube in the highest level also.Keywords: faculty of management science, internet usage behavior, mobile phones, Suan Sunandha Rajabhat University
Procedia PDF Downloads 23827548 Longitudinal Analysis of Internet Speed Data in the Gulf Cooperation Council Region
Authors: Musab Isah
Abstract:
This paper presents a longitudinal analysis of Internet speed data in the Gulf Cooperation Council (GCC) region, focusing on the most populous cities of each of the six countries – Riyadh, Saudi Arabia; Dubai, UAE; Kuwait City, Kuwait; Doha, Qatar; Manama, Bahrain; and Muscat, Oman. The study utilizes data collected from the Measurement Lab (M-Lab) infrastructure over a five-year period from January 1, 2019, to December 31, 2023. The analysis includes downstream and upstream throughput data for the cities, covering significant events such as the launch of 5G networks in 2019, COVID-19-induced lockdowns in 2020 and 2021, and the subsequent recovery period and return to normalcy. The results showcase substantial increases in Internet speeds across the cities, highlighting improvements in both download and upload throughput over the years. All the GCC countries have achieved above-average Internet speeds that can conveniently support various online activities and applications with excellent user experience.Keywords: internet data science, internet performance measurement, throughput analysis, internet speed, measurement lab, network diagnostic tool
Procedia PDF Downloads 6227547 Internet Addiction among Students: An Empirical Study in Pondicherry University
Authors: Mashood C., Abdul Vahid K., Ashique C. K.
Abstract:
The technology is growing beyond human expectation. Internet is one of very sophisticated product of the information technology. It has various advantages like connecting the world, simplifying the difficult tasks done in past etc. Simultaneously it has demerits also; that is lack of authenticity and internet addiction. To find out the problems of internet addiction, a study conducted among the Postgraduate students of Pondicherry University and collected 454 samples. The study strictly focused to identify the internet addiction among students, influence and interdependence of personality on internet addiction among first years and second years. To evaluate this, we used two major analysis, these are Confirmatory Factor Analysis (CFA) to predict the internet addiction with the observed data and Logistic Regression to identify the difference between first years and second years in the case of internet addiction. Before applying to the core analysis, the data applied to some preliminary tests to check the model fit. The empirical findings shows that , the students of Pondicherry University are very much addicted to the internet, But there is no such huge difference between first years and second years in case of internet addiction.Keywords: internet addiction, students, Pondicherry University, empirical study
Procedia PDF Downloads 45827546 A Study on the Usage of Library versus the Internet as Sources of Information with Reference to the Undergraduate Students in the Faculties of Humanities, Social Sciences, Science and Commerce and Management in the University of Kelaniya
Authors: Dilini Bodhinayaka, Aunsha Sajeewanie Rubasinghe
Abstract:
The library of the University of Kelaniya plays a significant role in supporting the academic work of the university. As at July, 2016 the library of the University of Kelaniya comprised of 250301 printed books, 2157 CD-ROMs, 1203 theses and 800 non-book materials. Furthermore, the library is subscribed to about 60 local journals, access to over 12,500 full text academic journals and around 100,000 e-books. The library provides the services and resources that support in teaching, doing research and learning. On the other hand, undergraduate students have adopted and continued to use the online information retrieval for their academic and research work. This study aims to compare the usage of internet and the usage of library among undergraduates in the faculties of Humanities, Social Sciences, Science and Commerce & Management in the University of Kelaniya. Also, the research attempts to determine the factors of enthusiasm or the disinterest in the students in using library and Internet. All the undergraduate students in the University (8440 students at the time of the study) were taken as the population of the study and the sample of 15% was selected out of the population using stratified sampling method. A total of 1266 questionnaires were distributed among undergraduates of the above mentioned faculties. The qualitative data were analyzed using Descriptive Statistical Method. Findings, of the study indicated that undergraduate students of the faculties of Humanities, Social Sciences, Science and Commerce & Management use both the library and the internet to fulfill their information needs. But, the students in the faculty of Science and Commerce & Management use the internet sources more than the library. The undergraduates in the faculties of Humanities and Social Sciences frequently use the university library than the internet. Although, majority agreed that the internet is the most preferred source of information they have no an adequate awareness about the available internet resources in the E-library of the University of Kelaniya.Keywords: university libraries, University of Kelaniya, online resources, undergraduates in Sri Lanka
Procedia PDF Downloads 23827545 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet
Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima
Abstract:
Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.Keywords: IP address, digital forensics, big data, data analytics, information and communication technology
Procedia PDF Downloads 12327544 Integration of Internet-Accessible Resources in the Field of Mobile Robots
Authors: B. Madhevan, R. Sakkaravarthi, R. Diya
Abstract:
The number and variety of mobile robot applications are increasing day by day, both in an industry and in our daily lives. First developed as a tool, nowadays mobile robots can be integrated as an entity in Internet-accessible resources. The present work is organized around four potential resources such as cloud computing, Internet of things, Big data analysis and Co-simulation. Further, the focus relies on integrating, analyzing and discussing the need for integrating Internet-accessible resources and the challenges deriving from such integration, and how these issues have been tackled. Hence, the research work investigates the concepts of the Internet-accessible resources from the aspect of the autonomous mobile robots with an overview of the performances of the currently available database systems. IaR is a world-wide network of interconnected objects, can be considered an evolutionary process in mobile robots. IaR constitutes an integral part of future Internet with data analysis, consisting of both physical and virtual things.Keywords: internet-accessible resources, cloud computing, big data analysis, internet of things, mobile robot
Procedia PDF Downloads 38627543 A Named Data Networking Stack for Contiki-NG-OS
Authors: Sedat Bilgili, Alper K. Demir
Abstract:
The current Internet has become the dominant use with continuing growth in the home, medical, health, smart cities and industrial automation applications. Internet of Things (IoT) is an emerging technology to enable such applications in our lives. Moreover, Named Data Networking (NDN) is also emerging as a Future Internet architecture where it fits the communication needs of IoT networks. The aim of this study is to provide an NDN protocol stack implementation running on the Contiki operating system (OS). Contiki OS is an OS that is developed for constrained IoT devices. In this study, an NDN protocol stack that can work on top of IEEE 802.15.4 link and physical layers have been developed and presented.Keywords: internet of things (IoT), named-data, named data networking (NDN), operating system
Procedia PDF Downloads 16927542 Location Privacy Preservation of Vehicle Data In Internet of Vehicles
Authors: Ying Ying Liu, Austin Cooke, Parimala Thulasiraman
Abstract:
Internet of Things (IoT) has attracted a recent spark in research on Internet of Vehicles (IoV). In this paper, we focus on one research area in IoV: preserving location privacy of vehicle data. We discuss existing location privacy preserving techniques and provide a scheme for evaluating these techniques under IoV traffic condition. We propose a different strategy in applying Differential Privacy using k-d tree data structure to preserve location privacy and experiment on real world Gowalla data set. We show that our strategy produces differentially private data, good preservation of utility by achieving similar regression accuracy to the original dataset on an LSTM (Long Term Short Term Memory) neural network traffic predictor.Keywords: differential privacy, internet of things, internet of vehicles, location privacy, privacy preservation scheme
Procedia PDF Downloads 17827541 The Current Status of Middle Class Internet Use in China: An Analysis Based on the Chinese General Social Survey 2015 Data and Semi-Structured Investigation
Authors: Abigail Qian Zhou
Abstract:
In today's China, the well-educated middle class, with stable jobs and above-average income, are the driving force behind its Internet society. Through the analysis of data from the 2015 Chinese General Social Survey and 50 interviewees, this study investigates the current situation of this group’s specific internet usage. The findings of this study demonstrate that daily life among the members of this socioeconomic group is closely tied to the Internet. For Chinese middle class, the Internet is used to socialize and entertain self and others. It is also used to search for and share information as well as to build their identities. The empirical results of this study will provide a reference, supported by factual data, for enterprises seeking to target the Chinese middle class through online marketing efforts.Keywords: middle class, Internet use, network behaviour, online marketing, China
Procedia PDF Downloads 12027540 Heterogeneous Reactions to Digital Opportunities: A Field Study
Authors: Bangaly Kaba
Abstract:
In the global information society, the importance of the Internet cannot be overemphasized. Africa needs access to the powerful information and communication tools of the Internet in order to obtain the resources and efficiency essential for sustainable development. Unfortunately, in 2013, the data from Internetworldstats showed only 15% of African populations have access to Internet. This relative low Internet penetration rate signals a problem that may threaten the economic development, governmental efficiency, and ultimately the global competitiveness of African countries. Many initiatives were undertaken to bring the benefits of the global information revolution to the people of Africa, through connection to the Internet and other Global Information Infrastructure technologies. The purpose is to understand differences between socio-economically advantaged and disadvantaged internet users. From that, we will determine what prevents disadvantaged groups from benefiting from Internet usage. Data were collected through a survey from Internet users in Ivory Coast. The results reveal that Personal network exposure, Self-efficacy and Availability are the key drivers of continued use intention for the socio-economically disadvantaged group. The theoretical and practical implications are also described.Keywords: digital inequality, internet, integrative model, socio-economically advantaged and disadvantaged, use continuance, Africa
Procedia PDF Downloads 46727539 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria
Authors: K. Alese Boniface, K. Adu Michael
Abstract:
Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)
Procedia PDF Downloads 27827538 Internet Versus Muslim Communities Challenges, Problems and Solutions
Authors: Bashir Muhammad
Abstract:
The present research contains the definition of the internet, the inter-relationship between and globalization as well as the divergent views of scholars on internet net-work. Additionally, both the positive and the negative impacts of the internet on Muslim communities were elucidated. As an example, it is part of the positive effect that the internet constitutes a vital source of vast information and data acquisition in various academic sciences in general and Islamic Studies in particular. The most recent and current facts and scientific discoveries by specialists of various ramifications could be fund as fast as possible. Many other exciting points were also cited. And on the negative side of the internet, among many other points, it releases uncontrolled promiscuous pictures and sometimes misguiding information about Islam, which could gradually and easily destroy the sound moral up bring of our young Muslim generation and pollute their positive thinking and reasoning. Another problem is that, Muslims in most cases pertaining to internet services are passive consumers, having no power to control it and manipulate it for their welfare and well being. Due to that, they have to pay the price for that, directly or indirectly.Keywords: internet, muslim, challenges, communities
Procedia PDF Downloads 12027537 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things
Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala
Abstract:
In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.Keywords: embedded computing, internet of things, mobile computing, wireless technologies
Procedia PDF Downloads 31527536 Behavioral Pattern of 2G Mobile Internet Subscribers: A Study on an Operator of Bangladesh
Authors: Azfar Adib
Abstract:
Like many other countries of the world, mobile internet has been playing a key role in the growth of internet subscriber base in Bangladesh. This study has attempted to identify particular behavioral or usage patterns of 2G mobile internet subscribers who were using the service of the topmost internet service provider (as well as the top mobile operator) of Bangladesh prior to the launching of 3G services (when 2G was fully dominant). It contains some comprehensive analysis carried on different info regarding 2G mobile internet subscribers, obtained from the operator’s own network insights.This is accompanied by the results of a survey conducted among 40 high-frequency users of this service.Keywords: mobile internet, Symbian, Android, iPhone
Procedia PDF Downloads 43727535 Calculate Product Carbon Footprint through the Internet of Things from Network Science
Authors: Jing Zhang
Abstract:
To reduce the carbon footprint of mankind and become more sustainable is one of the major challenges in our era. Internet of Things (IoT) mainly resolves three problems: Things to Things (T2T), Human to Things, H2T), and Human to Human (H2H). Borrowing the classification of IoT, we can find carbon prints of industries also can be divided in these three ways. Therefore, monitoring the routes of generation and circulation of products may help calculate product carbon print. This paper does not consider any technique used by IoT itself, but the ideas of it look at the connection of products. Carbon prints are like a gene or mark of a product from raw materials to the final products, which never leave the products. The contribution of this paper is to combine the characteristics of IoT and the methodology of network science to find a way to calculate the product's carbon footprint. Life cycle assessment, LCA is a traditional and main tool to calculate the carbon print of products. LCA is a traditional but main tool, which includes three kinds.Keywords: product carbon footprint, Internet of Things, network science, life cycle assessment
Procedia PDF Downloads 11427534 An Analysis of Privacy and Security for Internet of Things Applications
Authors: Dhananjay Singh, M. Abdullah-Al-Wadud
Abstract:
The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.Keywords: Internet of Things (IoT), message authentication, privacy, security
Procedia PDF Downloads 38127533 Effects of Internet Addiction on Students’ Academic Performance among Some Tertiary Institutions in Oyo State, Nigeria
Authors: Mujidat Lola Olugbode
Abstract:
This study investigates the effects of internet addiction on academic performance among students in some tertiary institutions in Oyo State, Nigeria. A descriptive survey research design was adopted for the study. Two research questions and two hypotheses were answered and tested. The population of the study comprised of all students in five tertiary institutions in Oyo State, Nigeria. Simple random sampling technique was used to select 2550 participants (respondents) from the institutions used for the study, this constituted the sample for the study. The instruments used for data collection was a self-constructed questionnaire on Internet Addiction and Students Academic Performance (IAASAP). The reliability coefficient of the instrument was 0.77. Data collected were analyzed using frequency and percentages, Pearson Product Moment Correlation coefficient (PPMCC) and t-test analysis. The results showed that the students in tertiary institutions in Oyo State were occasionally addicted to internet use. The study also revealed a positive correlation between internet addiction and academic performance. The findings also showed that there was significant difference in the internet addiction between male and female Students. Based on the above findings, the researchers recommended among others that government, educators, parents, counselors, teachers should help redirect the internet use toward academics to ensure greater academic performance.Keywords: internet, addiction, internet addiction, academic performance, tertiary institution, students
Procedia PDF Downloads 6227532 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 1327531 Comparison of Self-Efficacy and Life Satisfaction in Normal Users and Users with Internet Addiction
Authors: Mansour Abdi, Hadi Molaei Yasavoli
Abstract:
The purpose of this research is to comparison of self- efficacy and life satisfaction in normal users and users with internet addiction. The present study was descriptive and causal-comparative. Therefore, 304 students were selected random sampling method from students of Semnan University and completed questionnaires of internet addiction (young), Self-Efficacy Questionnaire and Life Satisfaction (SWIS). For data analysis was used the Multivariate Analysis of Variance (MANOVA). The results showed that internet addiction users have lower levels of self-efficacy and life satisfaction in comparison with normal users and the difference in p=0/0005 significantly. The findings showed that 78 percent of the variance in the dependent variables of self-efficacy and life satisfaction by grouping variables (internet addiction users and normal) is determined. Finally, considering that the rate of self-efficacy and life satisfaction is effective in the incidence of Internet addiction, it is proposed required measures are taken to enhance self-efficacy and life satisfaction in Internet users.Keywords: self-efficacy, life satisfaction, users, internet addiction, normal users
Procedia PDF Downloads 49027530 Viral Advertising: Popularity and Willingness to Share among the Czech Internet Population
Authors: Martin Klepek
Abstract:
This paper presents results of primary quantitative research on viral advertising with focus on popularity and willingness to share viral video among Czech Internet population. It starts with brief theoretical debate on viral advertising, which is used for the comparison of the results. For purpose of collecting data, online questionnaire survey was given to 384 respondents. Statistics utilized in this research included frequency, percentage, correlation and Pearson’s Chi-square test. Data was evaluated using SPSS software. The research analysis disclosed high popularity of viral advertising video among Czech Internet population but implies lower willingness to share it. Significant relationship between likability of viral video technique and age of the viewer was found.Keywords: internet advertising, internet population, promotion, marketing communication, viral advertising, viral video
Procedia PDF Downloads 47327529 Students’ Perspectives on Learning Science Education amidst COVID-19
Authors: Rajan Ghimire
Abstract:
One of the diseases caused by the coronavirus shook the whole world. This situation challenged the education system across the world and compelled educators to shift to an online mode of teaching. Many academic institutions that were persistent to keep their traditional pedagogical approach were also forced to change their teaching methods. This study aims to assess science education students' experiences and perceptions of this global issue, especially on the science teaching and learning process. The study is based on qualitative research and through in-depth interviews with respondents and data is analyzed. Online distance teaching and learning processes meet the requirements of students who cannot or prefer not to participate in conventional classroom settings. But there are some challenges for the students and teachers in the science teaching learning process. This study recommends some points to all stakeholders.Keywords: electronic devices, internet, online and distance learning, science education, educational policy
Procedia PDF Downloads 4927528 The Use of TV and the Internet in the Social Context
Authors: Khulood Miliany
Abstract:
This study examines the media habits of young people in Saudi Arabia, in particular their use of the Internet and television in the domestic sphere, and how use of the Internet impacts upon other activities. In order to address the research questions, focus group interviews were conducted with Saudi university students. The study found that television has become a central part of social life within the household where television represents a main source for family time, particularly in Ramadan while the Internet is a solitary activity where it is used in more private spaces. Furthermore, Saudi females were also more likely to have their Internet access monitored and circumscribed by family members, with parents controlling the location and the amount of time spent using the Internet.Keywords: domestication of technology, internet, social context, television, young people
Procedia PDF Downloads 29527527 Science Subjects Studied and Relation to Income after University Graduation: An Empirical Analysis in Japan
Authors: Kazuo Nishimura, Junichi Hirata, Tadashi Yagi, Junko Urasaka
Abstract:
This paper is an investigation of the effect of science education during the high school education how science graduates of universities are appreciated in the labor market in Japan. We conducted a survey utilizing the internet and analyzed the subjects they were good at and their annual income. The results confirm that among science graduates, workers adept at physics tend to have higher incomes compared to workers good at other subjects. Generational analysis based on the curriculum guideline amendments reveals that the generational difference is small among science majors who are good at physics.Keywords: curriculum, income, physics, science
Procedia PDF Downloads 28427526 A Survey on Internet of Things and Fog Computing as a Platform for Internet of Things
Authors: Samira Kalantary, Sara Taghipour, Mansoure Ghias Abadi
Abstract:
The Internet of Things (IOT) is a technological revolution that represents the future of computing and communications. IOT is the convergence of Internet with RFID, NFC, Sensor, and smart objects. Fog Computing is the natural platform for IOT. At present, the IOT as a new network communication technology has rapidly shifted from concept to application under fog computing virtual storage computing platform. In this paper, we describe everything about IOT and difference between cloud computing and fog computing.Keywords: cloud computing, fog computing, Internet of Things (IoT), IOT application
Procedia PDF Downloads 58327525 Data Science in Military Decision-Making: A Semi-Systematic Literature Review
Authors: H. W. Meerveld, R. H. A. Lindelauf
Abstract:
In contemporary warfare, data science is crucial for the military in achieving information superiority. Yet, to the authors’ knowledge, no extensive literature survey on data science in military decision-making has been conducted so far. In this study, 156 peer-reviewed articles were analysed through an integrative, semi-systematic literature review to gain an overview of the topic. The study examined to what extent literature is focussed on the opportunities or risks of data science in military decision-making, differentiated per level of war (i.e. strategic, operational, and tactical level). A relatively large focus on the risks of data science was observed in social science literature, implying that political and military policymakers are disproportionally influenced by a pessimistic view on the application of data science in the military domain. The perceived risks of data science are, however, hardly addressed in formal science literature. This means that the concerns on the military application of data science are not addressed to the audience that can actually develop and enhance data science models and algorithms. Cross-disciplinary research on both the opportunities and risks of military data science can address the observed research gaps. Considering the levels of war, relatively low attention for the operational level compared to the other two levels was observed, suggesting a research gap with reference to military operational data science. Opportunities for military data science mostly arise at the tactical level. On the contrary, studies examining strategic issues mostly emphasise the risks of military data science. Consequently, domain-specific requirements for military strategic data science applications are hardly expressed. Lacking such applications may ultimately lead to a suboptimal strategic decision in today’s warfare.Keywords: data science, decision-making, information superiority, literature review, military
Procedia PDF Downloads 16627524 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities
Authors: Nazli Hardy
Abstract:
Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.Keywords: Internet of Things (IoT), authentication, protocols, survey
Procedia PDF Downloads 29927523 Technological Loneliness; The Effect on Loneliness of Internet Addiction of University Students; The Case of Turkey
Authors: Adem Pala, Mustafa Biner
Abstract:
Nowadays, despite the fact that technology and internet shorten the virtual distance, too much use and misuse of internet create distance among people. There is a considerable number of people living in the same house even sitting at the same table but busy themselves with mobiles and computers for long hours without talking to each other. Internet usage is very common among young people especially university students. Evolving out of this problem, internet addiction of university students and effect on their loneliness, and relationship between them consist of the purpose of this study. The study is important because it discusses what can be done in order to make the young people more social via determining the university students’ loneliness and their internet addiction. The study was carried out with 440 university students studying at different universities and departments. The group consists of 200 female and 240 male students with average of age 20,9. In the study, 19 questions, “internet addiction scale” consisting of 3 subscales, and UCLA loneliness scale were used as data collection tools. As a result, it is found out that the loneliness of individuals with internet addiction is higher than the other individuals. The males’ loneliness related to internet addiction is higher than the females; on the other hand, it is determined females feel more lonesome in general loneliness. It is thought that the findings of the study will determine the individuals under risk, prevent them, help researchers and people doing clinical studies during rehabilitation progress.Keywords: internet addiction, loneliness, Turkey, university students
Procedia PDF Downloads 32827522 The Antecedents of Internet Addiction toward Smartphone Usage
Authors: Pui-Lai To, Chechen Liao, Hen-Yi Huang
Abstract:
Twenty years after Internet development, scholars have started to identify the negative impacts brought by the Internet. Overuse of Internet could develop Internet dependency and in turn cause addiction behavior. Therefore understanding the phenomenon of Internet addiction is important. With the joint efforts of experts and scholars, Internet addiction has been officially listed as a symptom that affects public health, and the diagnosis, causes and treatment of the symptom have also been explored. On the other hand, in the area of smartphone Internet usage, most studies are still focusing on the motivation factors of smartphone usage. Not much research has been done on smartphone Internet addiction. In view of the increasing adoption of smartphones, this paper is intended to find out whether smartphone Internet addiction exists in modern society or not. This study adopted the research methodology of online survey targeting users with smartphone Internet experience. A total of 434 effective samples were recovered. In terms of data analysis, Partial Least Square (PLS) in Structural Equation Modeling (SEM) is used for sample analysis and research model testing. Software chosen for statistical analysis is SPSS 20.0 for windows and SmartPLS 2.0. The research result successfully proved that smartphone users who access Internet service via smartphone could also develop smartphone Internet addiction. Factors including flow experience, depression, virtual social support, smartphone Internet affinity and maladaptive cognition all have significant and positive influence on smartphone Internet addiction. In the scenario of smartphone Internet use, descriptive norm has a positive and significant influence on perceived playfulness, while perceived playfulness also has a significant and positive influence on flow experience. Depression, on the other hand, is negatively influenced by actual social support and positive influenced by the virtual social support.Keywords: internet addiction, smartphone usage, social support, perceived playfulness
Procedia PDF Downloads 24427521 Internet as a Marketing Tool for Tourism Promotion
Authors: Emeka Okonkwo
Abstract:
The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.Keywords: internet, marketing, tourism, tourism management
Procedia PDF Downloads 416