Results for 'internet use'

1000+ found
Order:
  1. Internet Use and Healthcare.László Ropolyi - 2021 - In Dagmar Eigner (ed.), Wahrnehmung, Kommunikation und Resonanz. Beiträge zur Medical Anthropology, Band 4. Perception, Communication, and Resonance. Contributions to Medical Anthropology, Volume 4. Wien: Schriftenreihe der Landesverteidigungsakademie. pp. 173-192.
    The medical use of computing and information and communication technologies (ICTs) has a history of several decades, but the emergence of the internet, and especially the web and social media, created a new situation. As a result, currently the term eHealth is widely used – and the usage of the internet (and mobile) “technologies” in healthcare (among the patients and professionals, too) tends to be usual practice. There are more and more signs of the institutionalization of this new (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  44
    The association between parent-child relationship and problematic internet use among English- and Chinese-language studies: A meta-analysis.Yalin Zhu, Linyuan Deng & Kun Wan - 2022 - Frontiers in Psychology 13:885819.
    As past studies of the association between parent-child relationship and problematic internet use show mixed results and are influenced by many factors, this meta-analysis of 75 primary Chinese and English language studies from 1990 to 2021 with 110,601 participants (aged 6−25 years) explored (a) the overall association between parent-child relationship and problematic internet use, and (b) whether the association is affected by their types, country, measures, objects of the parent-child relationship, gender, age, year and publication types. We used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Online Masquerade: Redesigning the Internet for Free Speech Through the Use of Pseudonyms.Carissa Véliz - 2019 - Journal of Applied Philosophy 36 (4):643-658.
    Anonymity promotes free speech by protecting the identity of people who might otherwise face negative consequences for expressing their ideas. Wrongdoers, however, often abuse this invisibility cloak. Defenders of anonymity online emphasise its value in advancing public debate and safeguarding political dissension. Critics emphasise the need for identifiability in order to achieve accountability for wrongdoers such as trolls. The problematic tension between anonymity and identifiability online lies in the desirability of having low costs (no repercussions) for desirable speech and high (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  4. The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  5.  4
    The relationship between future self-continuity and intention to use Internet wealth management: The mediating role of tolerance of uncertainty and trait anxiety.Rongzhao Wang, Xuanxuan Lin, Zetong Ye, Hua Gao & Jianrong Liu - 2022 - Frontiers in Psychology 13:939508.
    This study aimed to analyze the mediating effect of tolerance of uncertainty (TU) and trait anxiety (TA) on future self-continuity (FSC) and intention to use Internet wealth management (IUIWM) systems. A questionnaire survey was distributed online and a total of 388 participants completed questionnaire, The questionnaire included the following scales: Chinese version of the FSC, Intention to Use the Internet Wealth Management, TU, and TA. Pearson correlation was used to investigate the correlation coefficient between variables while the sequential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The internet, cognitive enhancement, and the values of cognition.Richard Heersmink - 2016 - Minds and Machines 26 (4):389-407.
    This paper has two distinct but related goals: (1) to identify some of the potential consequences of the Internet for our cognitive abilities and (2) to suggest an approach to evaluate these consequences. I begin by outlining the Google effect, which (allegedly) shows that when we know information is available online, we put less effort into storing that information in the brain. Some argue that this strategy is adaptive because it frees up internal resources which can then be used (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  7. Internet ethics: the constructionist values of homo poieticus.Luciano Floridi & J. W. Sanders - 2005 - In Robert Cavalier (ed.), The Impact of the Internet on our moral lives. New York, NY, USA: pp. 195-214.
    In this chapter, we argue that the web is a poietically- enabling environment, which both enhances and requires the development of a “constructionist ethics”. We begin by explaining the appropriate concept of “constructionist ethics”, and analysing virtue ethics as the primary example. We then show why CyberEthics (or Computer Ethics, as it is also called) cannot be based on virtue ethics, yet needs to retain a constructionist approach. After providing evidence for significant poietic uses of the web, we argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  8. Internet-Based Commons of Intellectual Resources: An Exploration of their Variety.Paul B. de Laat - 2006 - In Jacques Berleur, Markku I. Nurminen & John Impagliazzo (eds.), IFIP; Social Informatics: An Information Society for All? In Remembrance of Rob Kling Vol 223. Springer.
    During the two last decades, speeded up by the development of the Internet, several types of commons have been opened up for intellectual resources. In this article their variety is being explored as to the kind of resources and the type of regulation involved. The open source software movement initiated the phenomenon, by creating a copyright-based commons of source code that can be labelled `dynamic': allowing both use and modification of resources. Additionally, such a commons may be either protected (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Knowledge, Democracy, and the Internet.Nicola Mößner & Philip Kitcher - 2017 - Minerva 55 (1):1-24.
    The internet has considerably changed epistemic practices in science as well as in everyday life. Apparently, this technology allows more and more people to get access to a huge amount of information. Some people even claim that the internet leads to a democratization of knowledge. In the following text, we will analyze this statement. In particular, we will focus on a potential change in epistemic structure. Does the internet change our common epistemic practice to rely on expert (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  10. The Internet as Friend or Foe of Intellectual Freedom.Elizabeth Buchanan - 2004 - International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Download  
     
    Export citation  
     
    Bookmark  
  11.  96
    Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication among various (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. A virtue epistemology of the Internet: Search engines, intellectual virtues and education.Richard Heersmink - 2018 - Social Epistemology 32 (1):1-12.
    This paper applies a virtue epistemology approach to using the Internet, as to improve our information-seeking behaviours. Virtue epistemology focusses on the cognitive character of agents and is less concerned with the nature of truth and epistemic justification as compared to traditional analytic epistemology. Due to this focus on cognitive character and agency, it is a fruitful but underexplored approach to using the Internet in an epistemically desirable way. Thus, the central question in this paper is: How to (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  14. Engineering affect: emotion regulation, the internet, and the techno-social niche.Joel Krueger & Lucy Osler - 2019 - Philosophical Topics 47 (2):205-231.
    Philosophical work exploring the relation between cognition and the Internet is now an active area of research. Some adopt an externalist framework, arguing that the Internet should be seen as environmental scaffolding that drives and shapes cognition. However, despite growing interest in this topic, little attention has been paid to how the Internet influences our affective life — our moods, emotions, and our ability to regulate these and other feeling states. We argue that the Internet scaffolds (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  15. Homo Virtualis: existence in Internet space.Daria Bylieva, Victoria Lobatyuk & Anna Rubtsova - 2018 - SHS Web of Conference 44:00021.
    The study of a person existence in Internet space is certainly an actual task, since the Internet is not only a source of innovation, but also the cause of society's transformations and the social and cultural problems that arise in connection with this. Computer network is global. It is used by people of different professions, age, level and nature of education, living around the world and belonging to different cultures. It complicates the problem of developing common standards of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Democratic Obligations and Technological Threats to Legitimacy: PredPol, Cambridge Analytica, and Internet Research Agency.Alan Rubel, Clinton Castro & Adam Pham - 2021 - In Algorithms & Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press: Cambridge University Press. pp. 163-183.
    ABSTRACT: So far in this book, we have examined algorithmic decision systems from three autonomy-based perspectives: in terms of what we owe autonomous agents (chapters 3 and 4), in terms of the conditions required for people to act autonomously (chapters 5 and 6), and in terms of the responsibilities of agents (chapter 7). -/- In this chapter we turn to the ways in which autonomy underwrites democratic governance. Political authority, which is to say the ability of a government to exercise (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Toward a Philosophy of the Internet.Laszlo Ropolyi - 2018 - APA Newsletter on Philosophy and Computers 17 (2):40-49.
    The paper argues for the necessity of building up a philosophy of the Internet and proposes a version of it, an «Aristotelian» philosophy of the Internet. First, an overview of the recent trends in the Internet research is presented. This train of thoughts leads to a proposal of understanding the nature of the Internet in the spirit of the Aristotelian philosophy i. e., to conceive the Internet as the Internet, as a totality of its (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. Towards a just and fair Internet: applying Rawls’ principles of justice to Internet regulation.David M. Douglas - 2015 - Ethics and Information Technology 17 (1):57-64.
    I suggest that the social justice issues raised by Internet regulation can be exposed and examined by using a methodology adapted from that described by John Rawls in 'A Theory of Justice'. Rawls' theory uses the hypothetical scenario of people deliberating about the justice of social institutions from the 'original position' as a method of removing bias in decision-making about justice. The original position imposes a 'veil of ignorance' that hides the particular circumstances of individuals from them so that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. The social media use of adult New Zealanders: Evidence from an online survey.Edgar Pacheco - 2022 - Report.
    To explore social media use in New Zealand, a sample of 1001 adults aged 18 and over were surveyed in November 2021. Participants were asked about the frequency of their use of different social media platforms (text message included). This report describes how often each of the nine social media sites and apps covered in the survey are used individually on a daily basis. Differences based on key demographics, i.e., age and gender, are tested for statistical significance, and findings summarised.
    Download  
     
    Export citation  
     
    Bookmark  
  20. Brave. Net. World: the Internet as a disinformation superhighway?Luciano Floridi - 1996 - The Electronic Library 14:509-514.
    This article is a modified version of a paper I gave to the conference Philosophy & Informatics - First Italian Conference on the use of ICT in philosophical disciplines, promoted by the Italian Philosophical Association (University of Rome "La Sapienza", 23-24 November, 1995).
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. The world is a big network. Pandemic, the Internet and institutions.Constantin Vica - 2020 - Revista de Filosofie Aplicata 3 (Supplementary Issue):136-161.
    2020 is the year of the first pandemic lived through the Internet. More than half of the world population is now online and because of self-isolation, our moral and social lives unfold almost exclusively online. Two pressing questions arise in this context: how much can we rely on the Internet, as a set of technologies, and how much should we trust online platforms and applications? In order to answer these two questions, I develop an argument based on two (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. The ontological revolution: On the phenomenology of the internet.Alexandros Schismenos - 2016 - SOCRATES 4 (2):56-67.
    Cogitation described as calculation, the living being described as a machine, cognitive functions considered as algorithmic sequences and the ‘mechanization’ of the subjective were the theoretical elements that late heideggerian anti–humanism, especially in France was able to utilize[1], even more so, after the second cybernetics or post-cybernetics movement of the late ‘60s introduced the concepts of the autopoietic and the allopoietic automata[2]. Recently, neurologists pose claims on the traditional epistemological field of philosophy, proceeding from this ontological decision, the equation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Gender, age and staff preparedness to adopt Internet tools for research sharing during Covid-19 in African varsities.Valentine Joseph Owan, Michael Ekpenyong Asuquo, Samuel Okpon Ekaette, Sana Aslam, Moses Eteng Obla & Mercy Valentine Owan - 2021 - Library Philosophy and Practice (E-Journal) 2021:Article 6133.
    This study assessed the partial as well as the collaborative impact of age and gender on academic staff preparedness to adopt Internet tools for research sharing in African universities during Covid-19. Although evidence abounds in the literature on gender and age as they affect relatively, scholars’ utilisation of digital tools for research communication, such studies did not examine scholars’ preparedness to adopt from a broad perspective of Africa. This study was conducted based on the argument that the preparedness of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This chapter (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Some information is too dangerous to be on the internet.Vincent C. Müller - 2006 - Acm Sigcas Computers and Society 36 (1):2.
    This paper investigates a problem about freedom of information. Although freedom of information is generally considered desirable, there are a number of areas where there is substantial agreement that freedom of information should be limited. After a certain ordering of the landscape, I argue that we need to add the category of "dangerous" information and that this category has gained a new quality in the context of current information technology, specifically the Internet. This category includes information the use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Curriculum Restructuring and Job Creation Among Nigerian Graduates: The Mediating Role of Emerging Internet Applications.Valentine Joseph Owan, Daniel Clement Agurokpon & Joseph Udida Udida - 2021 - International Journal of Educational Administration, Planning and Research 13 (2):1-16.
    Existing literature on entrepreneurship education has continually highlighted its potential for job creation. However, much attention has not been paid to the restructuring of the curriculum that can enable entrepreneurship education to thrive for job creation. This study used a structural equation modelling approach to understand the mediating role that the deployment of emerging Internet Applications (IAs) play in the nexus between curriculum restructuring and job creation. Being a quantitative study, a virtual snowball sample of 4,628 higher education graduates (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  85
    Professional variables and staff readiness to utilise internet-based channels for research communication in an Era of Covid-19.Valentine Joseph Owan, Levi Udochukwu Akah, Ogbeche Mary Mark & Moses Eteng Obla - 2021 - Library Philosophy and Practice (E-Journal) 2021:Article 5863.
    This study assessed the professional variables of academic staff in African varsities and their readiness to Utilise Internet-Based Channels for Research Communication in an era of Covid-19. Drawing from Maslow’s hierarchy of needs theory, the study was guided by four null hypotheses. The quantitative research method based on the virtual cross-sectional survey design was adopted. A total of 8,591 academics in African universities were the targeted demographic of this study. However, data were collected from a virtual snowball sample of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  81
    An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will then analyse the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  74
    Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can deny it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Speech Based Controlled Techniques using NLP.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):24-32.
    The main objective of our project is to construct a fully functional voice-based home automation system that uses the Internet of Things and Natural Language Processing. The home automation system is user-friendly to smartphones and laptops. A set of relays is used to connect the Node MCU to homes under controlled appliances. The user sends a command through the speech to the mobile devices, which interprets the message and sends the appropriate command to the specific appliance. The voice command (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Exploring New Zealand children’s technology access, use, skills and opportunities. Evidence from Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2019 - Netsafe.
    While children’s interaction with digital technologies is a matter of interest around the world, evidence based on nationally representative data about how integrated these tools are in children’s everyday life is still limited in New Zealand. This research report presents findings from a study that explores children’s internet access, online skills, practices, and opportunities. This report is part of Netsafe’s research project Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online, and our first publication as a member of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The key (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. IoT Based Intruder Prevention using Fogger.T. Krishna Prasath - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):81-90.
    Anamoly detection in videos plays an important role in various real-life applications. Most of traditional approaches depend on utilizing handcrafted features which are problem-dependent and optimal for specific tasks. Nowadays, there has been a rise in the amount of disruptive and offensive activities that have been happening. Due to this, security has been given principal significance. Public places like shopping centers, avenues, banks, etc. are increasingly being equipped with CCTVs to guarantee the security of individuals. Subsequently, this inconvenience is making (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. You Only Live Twice: A Computer Simulation of the Past Could be Used for Technological Resurrection.Alexey Turchin - manuscript
    Abstract: In the future, it will be possible to create advance simulations of ancestor in computers. Superintelligent AI could make these simulations very similar to the real past by creating a simulation of all of humanity. Such a simulation would use all available data about the past, including internet archives, DNA samples, advanced nanotech-based archeology, human memories, as well as text, photos and videos. This means that currently living people will be recreated in such a simulation, and in some (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  54
    Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest over a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Possible effects of extensive technological use on the identity process: from continuity to multiplicity.Monica de Marchis & Roberta Zaratti - 2008 - Dialogues in Philosophy, Mental and Neuro Sciences 1 (1):33-36.
    The starting point of our study is the awareness that currently we are in a phase of epochal change of the epistemological paradigm. As for the passage from oral to writing culture, now we can see, with the technological diffusion, a further transition to digital culture. Our aim is to make psychotherapists, researchers, and educators aware that the new phenomena emerging in relation to this technological diffusion bring on a necessary change. Such a change is needed in the way these (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Factsheet: Who is sending and sharing potentially harmful digital communications?Neil Melhuish & Edgar Pacheco - 2021 - In Netsafe. Netsafe.
    This factsheet presents findings from a quantitative study looking at adults’ experiences of sending and sharing potentially harmful digital communications in New Zealand. Typically research into harmful digital communications focuses on the experiences of those on the receiving end – the victims. However, to better address the distress and harm caused, information is needed about the people sending and sharing potentially harmful messages and posts. In this study we asked adult New Zealanders whether they had sent potentially harmful digital communications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  37
    Prolegomena to a Web-Life-Theory.Laszlo Ropolyi - 2014 - Acta Universitatis Sapientiae, Communicatio 1 (1):9-19.
    Human existence is being transformed. Its structure, many thousand years old, seems to be changing: built on the natural and the social, there is a third form of existence: web-life. Man is now the citizen of three worlds and its nature is being formed by the relations of natural, social and web-life. We regard as our main goal the study of web-life, which has developed as the result of Internet use.
    Download  
     
    Export citation  
     
    Bookmark  
  43. New Zealand children’s experiences of online risks and their perceptions of harm Evidence from Ngā taiohi matihiko o Aotearoa – New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2020 - Netsafe.
    While children’s experiences of online risks and harm is a growing area of research in New Zealand, public discussion on the matter has largely been informed by mainstream media’s fixation on the dangers of technology. At best, debate on risks online has relied on overseas evidence. However, insights reflecting the New Zealand context and based on representative data are still needed to guide policy discussion, create awareness, and inform the implementation of prevention and support programmes for children. This research report (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  44. ICT-enabled self-determination, disability and young people.Edgar Pacheco, Miriam Lips & Pak Yoong - 2019 - Information, Communication and Society 22 (8):1112-1127.
    Research and practice about self-determination in the context of disability has centred on teaching skills and providing support to help people with impairments to be independent. However, limited research exists about the impact of Information and Communication Technologies, in particular social media and mobile devices, on the development of self-determination skills among people with disabilities. This paper presents the findings of a qualitative study which collected data from observations, a researcher diary, focus groups, individual interviews and data from social media. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Gaming Google: Some Ethical Issues Involving Online Reputation Management.Jo Ann Oravec - 2013 - Journal of Business Ethics Education 10:61-81.
    Using the search engine Google to locate information linked to individuals and organizations has become part of everyday functioning. This article addresses whether the “gaming” of Internet applications in attempts to modify reputations raises substantial ethical concerns. It analyzes emerging approaches for manipulation of how personally-identifiable information is accessed online as well as critically-important international differences in information handling. It investigates privacy issues involving the data mining of personally-identifiable information with search engines and social media platforms. Notions of “gaming” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  43
    Attentional Harms and Digital Inequalities.Anna Hartford - 2022 - JMIR Mental Health 9 (2).
    Recent years have seen growing public concern about the effects of persuasive digital technologies on public mental health and well-being. As the draws on our attention reach such staggering scales and as our ability to focus our attention on our own considered ends erodes ever further, the need to understand and articulate what is at stake has become pressing. In this ethical viewpoint, we explore the concept of attentional harms and emphasize their potential seriousness. We further argue that the acknowledgment (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Digital technologies in the context of university transition and disability: theoretical and empirical advances.Edgar Pacheco - manuscript
    Since transition to higher education emerged as a research topic in the early 1970s, scholarly inquiry has focused on students without impairments and, what is more, little attention has been paid to the role of digital technologies. This article seeks to address this knowledge gap by looking at the university experiences of a group of first-year students with vision impairments from New Zealand, and the way they use digital tools, such as social media and mobile devices, to manage their transition-related (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  61
    The digital parenting strategies and behaviours of New Zealand parents. Evidence from Nga taiohi matihiko o Aotearoa – New Zealand Kids Online.Neil Melhuish & Edgar Pacheco - 2021 - Netsafe.
    Parents play a critical role in their child’s personal development and day-to-day experiences. However, as digital technologies are increasingly embedded in most New Zealand children’s everyday life activities parents face the task of ensuring their child’s online safety. To do so, they need to understand the way their child engages with and through these tools and make sense of the rapidly changing, and more technically complex, nature of digital devices. This presents a digital parenting dilemma: maximising children’s online opportunities while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  36
    Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  88
    A Sustainability Improvement Strategy of Interconnected Data Centers Based on Dispatching Potential of Electric Vehicle Charging Stations.Xihao Wang, Xiaojun Wang, Yuqing Liu, Chun Xiao, Rongsheng Zhao, Ye Yang & Zhao Liu - 2022 - Sustainability 14 (11):6814.
    With the rapid development of information technology, the electricity consumption of Internet Data Centers (IDCs) increases drastically, resulting in considerable carbon emissions that need to be reduced urgently. In addition to the introduction of Renewable Energy Sources (RES), the joint use of the spatial migration capacity of IDC workload and the temporal flexibility of the demand of Electric Vehicle Charging Stations (EVCSs) provides an important means to change the carbon footprint of the IDC. In this paper, a sustainability improvement (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 1000