In recent years, the usage model of the Internet has changed, pushing researchers towards the design of the Information-Centric Networking (ICN) paradigm as a possible replacement of the existing ...architecture. Even though both Academia and Industry have investigated the feasibility and effectiveness of ICN, achieving the complete replacement of the Internet Protocol (IP) is a challenging task: (i) the process involves multiple parties, such as Internet Service Providers (ISPs), that need to coordinate among each other; (ii) it requires an indefinite amount of time to update hardware and software of network components; and (iii) it is a high risk goal that might introduce unexpected complications. Thus, the process of replacing the current Internet will inevitably lead towards a period of coexistence between the old and the new architectures. Given the urgency of the problem, this transition phase will happen very soon and people should address it in a smooth way. Some research groups have already addressed the coexistence by designing their own architectures, but none of those is the final solution to move towards the future Internet considering the unaltered state of the networking. To design such architecture, the research community needs now a comprehensive overview of the existing solutions that have so far addressed the coexistence. The purpose of this paper is to reach this goal by providing the first comprehensive survey and classification of the coexistence architectures according to their features (i.e., deployment approach, deployment scenarios, addressed coexistence requirements and additional architecture or technology used) and evaluation parameters (i.e., challenges emerging during the deployment and the runtime behaviour of an architecture). We believe that this paper will finally fill the gap required for moving towards the design of the final coexistence architecture.
The Internet is a medium with great consequences for social and economic life. This book is written to help people discern in what ways it has commanded the public imagination, and the methodological ...issues that arise when one tries to study and understand the social processes occurring within it.
As a spreading addictive behaviour in recent years, internet gaming disorder (IGD) has been studied a lot and the overall research results indicate that IGD has a high prevalence among adolescents ...and young adults (AYAs). To update the status quo of prevalence, it is necessary to conduct comprehensive analyses.
On the premise of following the PRISMA statement, the study conducted two systematic reviews and meta-analyses to assess the global prevalence of IGD among AYAs and identify its possible risk factors. To achieve the goals, PubMed and CNKI databases were used to select the concerned studies published up to May 31, 2021. Heterogeneity was assessed using a funnel plot, Begg's test, Egger's test, and trim-and-fil method, followed by sensitivity analysis, subgroup analysis, and meta-regression analysis.
For the meta-analysis of prevalence, 407,620 participants from 155 reports in 33 countries were included. The pooled prevalence of IGD among AYAs was 9.9% (95% CI: 8.6%–11.3%, P = 0.000, I2 = 94.4%), including 8.8% (95% CI: 7.5%–10.0%) among adolescents and 10.4% (95% CI: 8.8%–11.9%) among young adults. The following 12 factors are the possible risk factors of IGD among AYAs, which are stress, long average game time, family dysfunction, poor academic performance, being bullied, bullying, interpersonal problems, hyperactivity/inattention, anxiety, depression, emotional distress and low self-esteem.
This study confirms the prevalence and possible risk factors for IGD among AYAs. It's valuable in understanding the threat of IGD and finding intervention strategies for IGD among AYAs.
•Provides updated global prevalence of internet gaming disorder among adolescents and young adults in summary (9.9%) and separately (8.8% vs 10.4%).•Higher prevalence of internet gaming disorder among adolescents and young adults in males (15.4%) compared to females (6.4%).•Identify 12 possible risk factors for internet gaming disorder among adolescents and young adults.
•Sensor-packed manufacturing systems will become ubiquitous.•Cybersecurity aspects are gaining importance within the manufacturing domain.•Manufacturing cyber-physical systems are expected to follow ...the trend set by other domains that benefited from the Internet of Things, Cloud Computing, and Big Data.•Outcomes of the implementation of manufacturing cyber-physical systems could be transformative to the extent that predictive manufacturing systems can become a reality.
The recent advances in sensor and communication technologies can provide the foundations for linking the physical manufacturing facility and machine world to the cyber world of Internet applications. The coupled manufacturing cyber-physical system is envisioned to handle the actual operations in the physical world while simultaneously monitor them in the cyber world with the help of advanced data processing and simulation models at both the manufacturing process and system operational levels. Moreover, a sensor-packed manufacturing system in which each process or piece of equipment makes available event and status information, coupled with market research for true advanced Big Data analytics, seem to be the right ingredients for event response selection and operation virtualization. As a drawback, the resulting manufacturing cyber-physical system will be vulnerable to the inevitable cyber-attacks, unfortunately, so common for the software and Internet-based systems. This reality makes cybersecurity penetration within the manufacturing domain a need that goes uncontested across researchers and practitioners. This work provides a review of the current status of virtualization and cloud-based services for manufacturing systems and of the use of Big Data analytics for planning and control of manufacturing operations. Building on already developed cloud business solutions, cloud manufacturing is expected to offer improved enterprise manufacturing and business decision support. Based on the current state-of-the-art cloud manufacturing solutions and Big Data applications, this work also proposes a framework for the development of predictive manufacturing cyber-physical systems that include capabilities for attaching to the Internet of Things, and capabilities for complex event processing and Big Data algorithmic analytics.
How online affinity networks expand learning and opportunity for young people
Boyband One Direction fanfiction writers, gamers who solve math problems together, Harry Potter fans who knit for a ...cause. Across subcultures and geographies, young fans have found each other and formed community online, learning from one another along the way. From these and other in-depth case studies of online affinity networks, Affinity Online considers how young people have found new opportunities for expanded learning in the digital age. These cases reveal the shared characteristics and unique cultures and practices of different online affinity networks, and how they support “connected learning”—learning that brings together youth interests, social activity, and accomplishment in civic, academic, and career relevant arenas. Although involvement in online communities is an established fixture of growing up in the networked age, participation in these spaces show how young people are actively taking up new media for their own engaged learning and social development.
While providing a wealth of positive examples for how the online world provides new opportunities for learning, the book also examines the ways in which these communities still reproduce inequalities based on gender, race, and socioeconomic status. The book concludes with a set of concrete suggestions for how the positive learning opportunities offered by online communities could be made available to more young people, at school and at home. Affinity Online explores how online practices and networks bridge the divide between in-school and out-of-school learning, finding that online affinity networks are creating new spaces of opportunity for realizing the ideals of connected learning.
This study aimed to provide evidence for the reliability and validity of the Japanese version of the Problematic Internet Use Questionnaire (PIUQ). The PIUQ is an 18-item scale that includes three ...subscales (Obsession, Neglect, Control Disorder). There are also two short forms, a 9-item and a 6-item version. The PIUQ was administered to 587 adults, 360 adolescents, and 222 undergraduate students in Japan. In all three samples, Cronbach's alpha coefficients of the total scores were high, and the majority of the subscale scores also demonstrated adequate internal consistency. One-month test-retest correlations were lower than in the original PIUQ research, and construct validity was demonstrated by correlations between the PIUQ and the Internet Addiction Test (IAT), psychological distress, participant's time spent on Internet use, sleep, exercise, and time spent on various online activities. Both the full version and the short forms of the PIUQ demonstrated adequate construct validity. The short forms will be useful for convenient screening and the assessment of problematic Internet use.
•Reliability and validity of the PIUQ were investigated in three groups of Japanese participants.•The PIUQ and its two short forms showed adequate internal consistency.•Construct validity was supported by correlation with IAT, K10, participants' lifestyles and online activities.•Test-retest reliability was low but acceptable.
Fresh from a party, a teen posts a photo on Facebook of a friend drinking a beer. A college student repurposes an article from Wikipedia for a paper. A group of players in a multiplayer online game ...routinely cheat new players by selling them worthless virtual accessories for high prices. InDisconnected, Carrie James examines how young people and the adults in their lives think about these sorts of online dilemmas, describing ethical blind spots and disconnects. Drawing on extensive interviews with young people between the ages of 10 and 25, James describes the nature of their thinking about privacy, property, and participation online. She identifies three ways that young people approach online activities. A teen might practiceself-focused thinking, concerned mostly about consequences for herself;moral thinking, concerned about the consequences for people he knows; orethical thinking, concerned about unknown individuals and larger communities. James finds, among other things, that youth are often blind to moral or ethical concerns about privacy; that attitudes toward property range from "what's theirs is theirs" to "free for all"; that hostile speech can be met with a belief that online content is "just a joke"; and that adults who are consulted about such dilemmas often emphasize personal safety issues over online ethics and citizenship. Considering ways to address the digital ethics gap, James offers a vision ofconscientious connectivity, which involves ethical thinking skills but, perhaps more important, is marked by sensitivity to the dilemmas posed by online life, a motivation to wrestle with them, and a sense of moral agency that supports socially positive online actions.
To examine the relationship between different Internet-use intensities and adolescent mental and somatic health.
Data were drawn from the 2002 Swiss Multicenter Adolescent Survey on Health, a ...nationally representative survey of adolescents aged 16 to 20 years in post-mandatory school. From a self-administered anonymous questionnaire, 3906 adolescent boys and 3305 girls were categorized into 4 groups according to their intensity of Internet use: heavy Internet users (HIUs; >2 hours/day), regular Internet users (RIUs; several days per week and ≤ 2 hours/day), occasional users (≤ 1 hour/week), and non-Internet users (NIUs; no use in the previous month). Health factors examined were perceived health, depression, overweight, headaches and back pain, and insufficient sleep.
In controlled multivariate analysis, using RIUs as a reference, HIUs of both genders were more likely to report higher depressive scores, whereas only male users were found at increased risk of overweight and female users at increased risk of insufficient sleep. Male NIUs and female NIUs and occasional users also were found at increased risk of higher depressive scores. Back-pain complaints were found predominantly among male NIUs.
Our study provides evidence of a U-shaped relationship between intensity of Internet use and poorer mental health of adolescents. In addition, HIUs were confirmed at increased risk for somatic health problems. Thus, health professionals should be on the alert when caring for adolescents who report either heavy Internet use or very little/none. Also, they should consider regular Internet use as a normative behavior without major health consequence.
The Internet of Things (IoT) infrastructure with numerous diverse physical devices are growing up rapidly, which need a dynamic services coordination approach that can integrate those heterogeneous ...physical devices into the context-aware IoT infrastructure. This paper proposes a situation-aware dynamic IoT services coordination approach. First, focusing on the definition of formal situation event pattern with event selection and consumption strategy, an automaton-based situational event detection algorithm is proposed. Second, the enhanced event-condition-action is used to coordinate the IoT services effectively, and also the collaboration process decomposing algorithm and the rule mismatch detection algorithms are proposed. Third, the typical scenarios of IoT services coordination for smart surgery process are also illustrated and the measurement and analysis of the platform's performance are reported. Finally, the conclusions and future works are given.
•A review of COVID-19 guidelines ensures the need of disruptive technologies.•COVID-19 enforces healthcare system to find alternatives for patients' treatment.•The disruptive technologies used to ...analyze and to restrict the spread of COVID-19.•The study aids healthcare team to detect the plan of treatment remotely and safely.•The analysis of COVID-19 patients ensures the importance of intelligent framework.
This paper describes a framework using disruptive technologies for COVID-19 analysis. Disruptive technologies include high-tech and emerging technologies such as AI, industry 4.0, IoT, Internet of Medical Things (IoMT), big data, virtual reality (VR), Drone technology, and Autonomous Robots, 5 G, and blockchain to offer digital transformation, research and development and service delivery. Disruptive technologies are essential for Industry 4.0 development, which can be applied to many disciplines. In this paper, we present a framework that uses disruptive technologies for COVID-19 analysis. The proposed framework restricts the spread of COVID-19 outbreaks, ensures the safety of the healthcare teams and maintains patients' physical and psychological healthcare conditions. The framework is designed to deal with the severe shortage of PPE for the medical team, reduce the massive pressure on hospitals, and track recovered patients to treat COVID-19 patients with plasma. The study provides oversight for governments on how to adopt technologies to reduce the impact of unprecedented outbreaks for COVID-19. Our work illustrates an empirical case study on the analysis of real COVID-19 patients and shows the importance of the proposed intelligent framework to limit the current outbreaks for COVID-19. The aim is to help the healthcare team make rapid decisions to treat COVID-19 patients in hospitals, home quarantine, or identifying and treating patients with typical cold or flu.