This paper investigates and studies the motivation structure and risk prevention and control of contemporary youth in network mass disturbances. This study selected more than 1200 college students ...from 5 colleges and universities in Hebei province as the research objects through questionnaire survey and interview. Network group event is a special group event which is different from the common group event in the field and the subject and object of the event. The results show that the frequent occurrence of network mass disturbances is driven by internal motives and external causes. Based on this, this paper starts from the balance of government, youth and network operators. To explore the construction of a diversified network of mass incidents prevention and control system rational reference Suggestions.
The lack of consumer confidence in information privacy has been identified as a major problem hampering the growth of e-commerce. Despite the importance of understanding the nature of online ...consumers' concerns for information privacy, this topic has received little attention in the information systems community. To fill the gap in the literature, this article focuses on three distinct, yet closely related, issues. First, drawing on social contract theory, we offer a theoretical framework on the dimensionality of Internet users' information privacy concerns (IUIPC). Second, we attempt to operationalize the multidimensional notion of IUIPC using a second-order construct, and we develop a scale for it. Third, we propose and test a causal model on the relationship between IUIPC and behavioral intention toward releasing personal information at the request of a marketer. We conducted two separate field surveys and collected data from 742 household respondents in one-on-one, face-to-face interviews. The results of this study indicate that the second-order IUIPC factor, which consists of three first-order dimensions—namely, collection, control, and awareness—exhibited desirable psychometric properties in the context of online privacy. In addition, we found that the causal model centering on IUIPC fits the data satisfactorily and explains a large amount of variance in behavioral intention, suggesting that the proposed model will serve as a useful tool for analyzing online consumers' reactions to various privacy threats on the Internet.
The concept of digital financial inclusion (DFI) has gained considerable attention in recent years due to its emergence as a prominent development strategy in several nations. While environmental ...sustainability is one of the biggest aims of the earth today. This study examines the impact of DFI on the environmental sustainability of the South Asian region (Pakistan, India, Bangladesh and Afghanistan) from 2011 to 2021. Using STATA, the study employed the generalized method of moments (GMM) technique, and the empirical evidence demonstrates that DFI has a significant negative impact on environmental sustainability by increasing CO2 emissions. In addition, study indicates that the growing number of internet users and renewable energy consumption have a substantial adverse effect on CO2 emissions per capita. This suggests that the increased use of the internet and renewable energy consumption contribute to environmental sustainability. On the other hand, Population growth also has a significant negative impact on CO2 emissions per capita and GDP growth and industrialization has no significant impact on environmental sustainability. These findings indicate that policymakers in the South Asian region should design policies that promote DFI and the use of new technology in such a way that stimulate business activities and achieve environmental sustainability.
(The dependence and behavior of the citizens on information security and internet activities deeply affect the route that intend for using the information technology. It is a well known factor that ...the growth of cyber crimes in India is a resultant factor of issues such as lack of proper training and education and the low awareness levels of Indians towards punishment for cyber crimes. This paper aims at studying the perception levels of teenage internet users towards the aspect of cyber crimes based on statutory and ethical perspectives. Descriptive research design was adopted for this study in the sample size was fixed at 120 involving the intermediate college level students of Guntur district in Andhra Pradesh. The data analysis was carried out with the help of statistical tools like t-Test and ANOVA. The findings of the study shows that there is no difference in the perception levels among male and female teenage internet users and the study further shows that there exists the significant difference in the perception levels of the respondents based on their level of education and perspectives based on statutory and ethical issues.
Internet has become an innovative relief for the modern generation, at it also promote a burden on the society. The internet acts as the genesis and breeding ground for a new kind of crime called the ...“cyber crime”. Common internet users are not aware of cyber crimes and they are not conscious on the precautionary aspects to over come such attacks from taking place. This paper aims to analyze the awareness levels of internet users towards various forms of cyber crimes. This study was conducted in Krishna and Guntur districts of Andhra Pradesh. Descriptive Research Design was adopted for the study and a sample size of 160 respondents were selected using Random Sampling Technique involving both the genders among the internet users. The findings of the study shows that the awareness levels of the internet users towards cyber crimes in the study area are very low and they have very less perception towards various forms of cyber crimes that exists in the modern times.
Objective:
This study used a sample of Korean adolescents to evaluate: (a) associations between problematic internet use and depression, bipolar disorder symptoms and suicidal ideation; and (b) ...whether mood disorders mediate the relationship between problematic internet use and suicidal ideation.
Method:
A total of 795 middle and high school students were recruited (538 girls; mean age, 13.87 ± 1.51 years). The Internet Addiction Proneness Scale for Youth–Short Form (KS-scale) was used to evaluate the presence and severity of problematic internet use. The frequencies of depression, suicidal ideation and probable bipolar disorder were compared between adolescents with and without internet addiction. The associations between the severity of problematic internet use and the severity of depressive symptoms, bipolar symptoms and suicidal ideation were also analyzed.
Results:
Seventy-five adolescents (9.4%) met the criteria for problematic internet use. The presence of problematic internet use was significantly associated with suicidal ideation (OR = 5.82, 95% CI = 3.30–10.26, p < 0.001) as well as depression (OR = 5.00, 95% CI = 2.88–8.66, p < 0.001). There was a marginally significant association between problematic internet use and probable bipolar disorder (OR = 3.05, 95% CI = 0.96–9.69, p = 0.059). In the path model, problematic internet use significantly predicted depressive symptoms (β = 0.296, 95% CI = 0.214–0.367, p = 0.005), which predicted suicidal ideation (β = 0.699, 95% CI = 0.631–0.751, p = 0.009). Problematic internet use also predicted suicidal ideation directly (β = 0.115, 95% CI = 0.052–0.193, p = 0.006). Conversely, depressive symptoms (β = 0.119, 95% CI = −0.005–0.219, p = 0.040) and suicidal ideation (β = 0.215, 95% CI = 0.089–0.346, p = 0.005) predicted problematic internet use.
Conclusions:
There is a complex transactional relationship between problematic internet use, depressive symptoms, bipolar symptoms and suicidal ideation, so these conditions must be assessed together during the evaluation of adolescents. Prospective studies are warranted to elucidate the causal relationships between problematic internet use, mood symptoms and suicidal ideation.
Purpose. The article is devoted to the identification of peculiarities of interpersonal communication of adolescents in the Internet for further development of the program of development of skills of ...safe and productive interpersonal communication of adolescents in social networks. The relevance of the study is determined by the fact that the use of social networks not only generates the problem of adolescent Internet addiction, but also has a negative impact on the process of socialisation, as well as provokes bullying and other violent actions against the developing personality.
Method. The study involved 56 adolescents aged 14-15 years - students of the centre of education of the city of Tula. As a diagnostic material were used methods to identify interpersonal and communicative features of adolescents (questionnaire of interpersonal relations A.A. Rukavishnikov and questionnaire K.S. Zhmyrko); determination of the level of communication of adolescents (questionnaire of interpersonal relations A.A. Rukavishnikov and questionnaire K.S. Zhmyrko). Zhmyrko); determining the level of communicative tolerance in the process of interpersonal interaction (the method of diagnostics of communicative tolerance V.V. Boyko); establishing the main orientations in the communication of schoolchildren (the method of diagnostics of motivational orientations in interpersonal communications I.D. Ladanov, V.A. Urazaeva).
Results. The results obtained during the diagnostic survey allow us to conclude that adolescents, due to their psychological and personal characteristics, unformed culture of communication in social networks, inability to express their opinions and defend their own point of view, create situations of conflict in social networks and provoke cyberbullying.
Practical implications. The materials of the study can be used in the work of psychological service of educational organisation and contribute to the development of skills of effective and safe communication in social networks among adolescents, formation of resistance to the negative impact of virtual environment.
Practical Web Analytics for User Experience teaches you how to use web analytics to help answer the complicated questions facing UX professionals. Within this book, you'll find a quantitative ...approach for measuring a website's effectiveness and the methods for posing and answering specific questions about how users navigate a website. The book is organized according to the concerns UX practitioners face. Chapters are devoted to traffic, clickpath, and content use analysis, measuring the effectiveness of design changes, including A/B testing, building user profiles based on search habits, supporting usability test findings with reporting, and more. This is the must- have resource you need to start capitalizing on web analytics and analyze websites effectively. * Discover concrete information on how web analytics data support user research and user-centered design * Learn how to frame questions in a way that lets you navigate through massive amounts of data to get the answer you need * Learn how to gather information for personas, verify behavior found in usability testing, support heuristic evaluation with data, analyze keyword data, and understand how to communicate these findings with business stakeholders
The aim of this study was to investigate the changes in older adults’ mobile phone use from before to during the COVID-19 pandemic. The media displacement and digital divide approaches served as the ...theoretical frameworks of the study. The data were drawn from the 2018 and 2020 waves of the Aging + Communication + Technology cross-national longitudinal panel study. The sample consisted of older Internet users, aged 62 to 96 (in 2018), from Austria, Canada, Finland, Israel, the Netherlands, Romania, and Spain, who participated in both waves (N = 4,398). Latent class analysis and latent transition analysis with multinomial regression models were the main methods applied to the data. With regard to the findings, three mobile phone function use profiles—Narrow Use, Medium Use, and Broad Use—were identified from the data. Lower age, being married, higher income, and place of residence (in 2018) predicted belonging to the three profiles, while country differences in the prevalence of the profiles were substantial. Between 2018 and 2020, transition from one profile to another was relatively rare but typically toward the “Broad Use” category. Profile transitions were most common in Romania, while stability was highest in Finland, Israel, and Canada. In addition, gender, age, marital status, and place of residence predicted the likelihood of changing from one profile to another between 2018 and 2020. The results suggest that older adults’ mobile phone function use is relatively stable over a two-year time span. While new mobile phone functions are adopted, they seem to augment the spectrum of mobile usage rather than displace older similar functionalities. In addition, demographic, socioeconomic, and country-level digital divides, although slightly modified over time, remain significant among older adults.
Phishing has emerged as a significant cyber threat, resulting in huge financial frauds for internet users annually. This malicious activity uses social engineering and upgraded methodologies (like ...file archiver in the browser, content injection, calendar phishing, more convincing fake websites or emails, voice manipulation, or other tools designed to deceive and exploit the target’s confidence) to extract sensitive information from unsuspected victims. In order to mitigate these attacks, several methods and tools have been devised; various detection techniques and block phishing websites, and browser extensions that notify users about suspicious websites. Our work elaborates on meticulous analysis of the detection of phishing attacks by classifying them into four broader categories based on the adopted methodologies like List-Based Detection, Heuristic-Based Detection, machine learning (ML)-based, and deep learning (DL)-based. Additionally, it summarizes the popular devised schemes, highlighting their advantages and limitations, and how these are suitable for the different types of deployments.
Display omitted
•This research work elaborates on VPNs, proxy links, and advanced detection techniques, including heuristics-based and deep learning models, to comprehensively combat phishing attacks.•This paper provides comprehensive reports with detected URLs, timestamps, attack types, probability scores, and mitigation suggestions.•This study is to create a comprehensive understanding on detection of different types of Phishing techniques.