首页 > 最新文献

Multigenerational Online Behavior and Media Use最新文献

英文 中文
Perceptions of Social Media Impact on Social Behavior of Students 社交媒体对学生社会行为影响的认知
Pub Date : 2016-10-26 DOI: 10.29333/OJCMT/2574
K. Hashim, L. Al-Sharqi, I. Kutbi
Social media has become pervasive, impacting the social fabric and culture of our society. This study investigates differences and similarities between students' and faculty's perceptions of social media impact on social behavior of students. Data were collected using a specially designed survey. The sample size was 2605 students and 507 faculty of different genders and ages. Research outcome indicates that students and faculty are familiar with and are immersed in social media use. The findings support the advantages of social media use on students' social behavior and do not indicate any obvious disadvantages. The findings of the study include identification of dominant group perceptions pertaining to advantages and disadvantages of social media use on social behavior of students. Common concerns of the two groups pertaining to students include physical inactivity, social introversion, exposure to bullying and domination attitudes; and mental dullness. These findings can help discern possible issues relating to use of social media affecting social behavior.
社交媒体已经无处不在,影响着我们社会的社会结构和文化。本研究探讨学生与教师对社交媒体对学生社会行为影响的认知差异与相似之处。数据是通过特别设计的调查收集的。样本量为2605名学生和507名不同性别和年龄的教师。研究结果表明,学生和教师熟悉并沉浸在社交媒体的使用中。研究结果支持了社交媒体使用对学生社交行为的好处,并没有指出任何明显的缺点。该研究的发现包括确定主导群体对社交媒体使用对学生社会行为的利弊的看法。这两类人对学生的共同担忧包括缺乏体育活动、社会内向、遭受欺凌和支配态度;精神迟钝。这些发现可以帮助识别与使用社交媒体影响社会行为有关的可能问题。
{"title":"Perceptions of Social Media Impact on Social Behavior of Students","authors":"K. Hashim, L. Al-Sharqi, I. Kutbi","doi":"10.29333/OJCMT/2574","DOIUrl":"https://doi.org/10.29333/OJCMT/2574","url":null,"abstract":"Social media has become pervasive, impacting the social fabric and culture of our society. This study investigates differences and similarities between students' and faculty's perceptions of social media impact on social behavior of students. Data were collected using a specially designed survey. The sample size was 2605 students and 507 faculty of different genders and ages. Research outcome indicates that students and faculty are familiar with and are immersed in social media use. The findings support the advantages of social media use on students' social behavior and do not indicate any obvious disadvantages. The findings of the study include identification of dominant group perceptions pertaining to advantages and disadvantages of social media use on social behavior of students. Common concerns of the two groups pertaining to students include physical inactivity, social introversion, exposure to bullying and domination attitudes; and mental dullness. These findings can help discern possible issues relating to use of social media affecting social behavior.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121785031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Human Factor Role for Cyber Threats Resilience 人为因素在网络威胁复原中的作用
Pub Date : 1900-01-01 DOI: 10.4018/978-1-4666-8793-6.CH017
Z. Minchev
The chapter describes the problem of building cyber threats resilience for the human factor as the technological growth is constantly changing the security landscape of the new digital world. A methodological framework for meeting the problem by using the “scenario method” and experts' support is outlined. An implementation of comprehensive morphological and system analyses of cyber threats are performed, followed by agent based mixed reality validation, incorporating biometrics monitoring. The obtained results demonstrate a correlation of experts' beliefs for cyber threats identification, related to human factor biometric response, whilst using social networks and inhabiting smart environments of living. The achieved results prove “use with care” necessity for new technologies, concerning cyber threats landscape for assuring a sustainable resilience balance from the human factor perspective.
本章描述了由于技术发展不断改变新数字世界的安全格局,为人为因素建立网络威胁抵御能力的问题。概述了通过使用“情景法”和专家支持来解决问题的方法框架。对网络威胁进行了全面的形态学和系统分析,随后进行了基于代理的混合现实验证,并结合了生物识别监测。获得的结果表明,在使用社交网络和居住在智能生活环境中,专家对网络威胁识别的信念与人为因素生物识别反应相关。取得的成果证明了“谨慎使用”新技术的必要性,涉及网络威胁环境,以确保从人为因素的角度实现可持续的弹性平衡。
{"title":"Human Factor Role for Cyber Threats Resilience","authors":"Z. Minchev","doi":"10.4018/978-1-4666-8793-6.CH017","DOIUrl":"https://doi.org/10.4018/978-1-4666-8793-6.CH017","url":null,"abstract":"The chapter describes the problem of building cyber threats resilience for the human factor as the technological growth is constantly changing the security landscape of the new digital world. A methodological framework for meeting the problem by using the “scenario method” and experts' support is outlined. An implementation of comprehensive morphological and system analyses of cyber threats are performed, followed by agent based mixed reality validation, incorporating biometrics monitoring. The obtained results demonstrate a correlation of experts' beliefs for cyber threats identification, related to human factor biometric response, whilst using social networks and inhabiting smart environments of living. The achieved results prove “use with care” necessity for new technologies, concerning cyber threats landscape for assuring a sustainable resilience balance from the human factor perspective.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115412513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cyber Security Crime and Punishment 网络安全犯罪与处罚
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7912-0.ch008
Evon M. O. Abu-Taieh, A. Alfaries, Shaha T. Al-Otaibi, G. Aldehim
Cyberspace and the existence of the internet allows different types of crimes to appear. Hence, there is a need for new laws to be set with a collective, comprehensive, view of crime and a global understanding. This article studies 5 different countries' laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These different countries issued different laws at different times, some in 2007 others are as new as 2015. The article looks at the laws from an academic definition of different crimes, and also describes the laws from a perspective of each country.
网络空间和互联网的存在使得不同类型的犯罪出现。因此,有必要以集体、全面的观点和全球的理解来制定新的法律。本文研究了5个不同国家有关网络犯罪的法律:约旦、阿曼、科威特、卡塔尔和沙特阿拉伯。这些不同的国家在不同的时间颁布了不同的法律,有些是在2007年颁布的,有些是在2015年颁布的。本文从对不同犯罪的学术定义入手,并从各国的角度对法律进行了描述。
{"title":"Cyber Security Crime and Punishment","authors":"Evon M. O. Abu-Taieh, A. Alfaries, Shaha T. Al-Otaibi, G. Aldehim","doi":"10.4018/978-1-5225-7912-0.ch008","DOIUrl":"https://doi.org/10.4018/978-1-5225-7912-0.ch008","url":null,"abstract":"Cyberspace and the existence of the internet allows different types of crimes to appear. Hence, there is a need for new laws to be set with a collective, comprehensive, view of crime and a global understanding. This article studies 5 different countries' laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These different countries issued different laws at different times, some in 2007 others are as new as 2015. The article looks at the laws from an academic definition of different crimes, and also describes the laws from a perspective of each country.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116787303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Volunteered Surveillance 自愿监测
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7909-0.ch070
Subhi Can Sarıgöllü, E. Aksakal, Mine Galip Koca, Ece Akten, Yonca Aslanbay
As the front end of the digitized commercial world, corporations, marketers, and advertisers are under the spotlight for taking advantage of some part of the big data provided by consumers via their digital presence and digital advertising. Now, collectors and users of that data have escalated the level of their asymmetric power with scope and depth of the instant and historical data on consumers. Since consumers have lost the ownership (control) over their own data, their reaction ranges from complete opposition to voluntary submission. This chapter investigates psychological and societal reasons for this variety in consumer behavior and proposes that a contractual solution could promote a beneficial end to all parties through transparency and mutual power.
作为数字化商业世界的前端,企业、营销人员和广告商正因利用消费者通过其数字形象和数字广告提供的部分大数据而受到关注。现在,这些数据的收集者和用户已经升级了他们的不对称权力的范围和深度,对消费者的即时和历史数据。由于消费者已经失去了对自己数据的所有权(控制权),他们的反应从完全反对到自愿提交。本章调查了这种消费者行为多样性的心理和社会原因,并提出合同解决方案可以通过透明度和相互权力促进各方的利益。
{"title":"Volunteered Surveillance","authors":"Subhi Can Sarıgöllü, E. Aksakal, Mine Galip Koca, Ece Akten, Yonca Aslanbay","doi":"10.4018/978-1-5225-7909-0.ch070","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch070","url":null,"abstract":"As the front end of the digitized commercial world, corporations, marketers, and advertisers are under the spotlight for taking advantage of some part of the big data provided by consumers via their digital presence and digital advertising. Now, collectors and users of that data have escalated the level of their asymmetric power with scope and depth of the instant and historical data on consumers. Since consumers have lost the ownership (control) over their own data, their reaction ranges from complete opposition to voluntary submission. This chapter investigates psychological and societal reasons for this variety in consumer behavior and proposes that a contractual solution could promote a beneficial end to all parties through transparency and mutual power.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131684779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Out of Work, Out of Mind? 没工作就没心情?
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7909-0.ch052
Emily I.M. Collins, A. Cox, Ruby Wootton
Smartphones are now ubiquitous and valuable in many professions and yet have also been blamed for creating an ‘always on' culture, blurring boundaries between work and home. Research has shown that checking e-mails out-of-hours via computer makes workers feel more overloaded with work but also increases their sense of coping. A total of 94 participants completed a survey exploring whether the same pattern would emerge for accessing e-mail on smartphones, showing that those who use smartphones for work e-mail experienced lower levels of overload, but not coping, and push notifications were associated with greater use of smartphones for e-mail. However, there were no significant correlations between coping or overload and e-mail use or quantity, suggesting that lower overload is not due to the ability to processes or read more e-mails outside of work.
智能手机现在在许多行业中无处不在,也很有价值,但它也被指责造成了一种“永远在线”的文化,模糊了工作和家庭之间的界限。研究表明,在非工作时间通过电脑查看电子邮件会让员工感到工作压力更大,但也会增强他们的应对意识。共有94名参与者完成了一项调查,以探索在智能手机上收发电子邮件是否也会出现同样的模式。调查显示,使用智能手机收发工作邮件的人超载程度较低,但无法应对,推送通知与使用智能手机收发电子邮件的人更多有关。然而,处理或过载与电子邮件使用或数量之间没有显著的相关性,这表明较低的过载并不是因为有能力在工作之外处理或阅读更多的电子邮件。
{"title":"Out of Work, Out of Mind?","authors":"Emily I.M. Collins, A. Cox, Ruby Wootton","doi":"10.4018/978-1-5225-7909-0.ch052","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch052","url":null,"abstract":"Smartphones are now ubiquitous and valuable in many professions and yet have also been blamed for creating an ‘always on' culture, blurring boundaries between work and home. Research has shown that checking e-mails out-of-hours via computer makes workers feel more overloaded with work but also increases their sense of coping. A total of 94 participants completed a survey exploring whether the same pattern would emerge for accessing e-mail on smartphones, showing that those who use smartphones for work e-mail experienced lower levels of overload, but not coping, and push notifications were associated with greater use of smartphones for e-mail. However, there were no significant correlations between coping or overload and e-mail use or quantity, suggesting that lower overload is not due to the ability to processes or read more e-mails outside of work.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115488645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emerging Adults' Coping Strategies 新成人的应对策略
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7909-0.ch011
Michelle F. Wright
The present study examined coping strategies for cyber victimization among 270 (130 women) emerging adults, and how these strategies related to cyber aggression one year later (Time 2). The most frequently utilized coping strategies among emerging adults were telling one's friends and ignoring the aggressor. The coping strategies of telling no one, getting revenge against the aggressor, pretending it didn't happen, waiting for the aggressor to stop, and crying were related to cyber victimization one year later. Blocking the aggressor and getting revenge against the aggressor were associated with Time 2 cyber aggression perpetration. Tell my friends related negatively to their involvement in cyber aggression. This research has implications for interventions aimed at reducing these behaviors among emerging adults.
本研究调查了270名(130名女性)初出期成年人面对网络侵害时的应对策略,以及这些策略在一年后与网络攻击的关系(时间2)。初出期成年人最常用的应对策略是告诉朋友和无视攻击者。不告诉任何人、报复攻击者、假装没有发生、等待攻击者停止、哭泣等应对策略与一年后的网络受害有关。阻断攻击者并对攻击者进行报复与Time 2网络攻击行为有关。告诉我的朋友,他们参与网络攻击的负面影响。这项研究对旨在减少这些行为的干预措施具有启示作用。
{"title":"Emerging Adults' Coping Strategies","authors":"Michelle F. Wright","doi":"10.4018/978-1-5225-7909-0.ch011","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch011","url":null,"abstract":"The present study examined coping strategies for cyber victimization among 270 (130 women) emerging adults, and how these strategies related to cyber aggression one year later (Time 2). The most frequently utilized coping strategies among emerging adults were telling one's friends and ignoring the aggressor. The coping strategies of telling no one, getting revenge against the aggressor, pretending it didn't happen, waiting for the aggressor to stop, and crying were related to cyber victimization one year later. Blocking the aggressor and getting revenge against the aggressor were associated with Time 2 cyber aggression perpetration. Tell my friends related negatively to their involvement in cyber aggression. This research has implications for interventions aimed at reducing these behaviors among emerging adults.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114764116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authenticity in Online Religion 网络宗教的真实性
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7909-0.ch029
M. Tan
In this article, the subject of online religion and how it can be researched is discussed. The dynamics of religious experience, authority, communication and more is subject of much discussion both in academia and religious discourses primarily because of the seemingly immaterial realm that is cyberspace. This article examines unique aspects of the nature of online religion and pays particular attention to the fluidity of online/offline relations and the subject of “authenticity” in the realm of online religion. Following from that is the discussion of how actor-network theory (ANT), first developed by Bruno Latour, can be deployed as a useful methodological approach to researching online religion, and to navigate potentially deterministic and oppositional discourses of online/offline relations.
在这篇文章中,讨论了网络宗教的主题以及如何研究它。宗教经验、权威、交流等的动态是学术界和宗教话语中大量讨论的主题,主要是因为网络空间这个看似无形的领域。本文考察了网络宗教性质的独特方面,并特别关注在线/离线关系的流动性以及在线宗教领域中的“真实性”主题。接下来的讨论是,布鲁诺·拉图尔(Bruno Latour)首先提出的行动者网络理论(ANT),如何作为一种有用的方法论方法来研究在线宗教,并引导在线/离线关系的潜在确定性和对立性话语。
{"title":"Authenticity in Online Religion","authors":"M. Tan","doi":"10.4018/978-1-5225-7909-0.ch029","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch029","url":null,"abstract":"In this article, the subject of online religion and how it can be researched is discussed. The dynamics of religious experience, authority, communication and more is subject of much discussion both in academia and religious discourses primarily because of the seemingly immaterial realm that is cyberspace. This article examines unique aspects of the nature of online religion and pays particular attention to the fluidity of online/offline relations and the subject of “authenticity” in the realm of online religion. Following from that is the discussion of how actor-network theory (ANT), first developed by Bruno Latour, can be deployed as a useful methodological approach to researching online religion, and to navigate potentially deterministic and oppositional discourses of online/offline relations.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129222111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Media and Identity 社交媒体与身份
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7909-0.ch074
E. Melonashi
The present chapter aims to explore the relationship between social media and identity by reviewing theoretical frameworks as well as empirical studies on the topic. Considering the complexity of the concept of identity, a multidisciplinary theoretical approach is provided, including Psychological Theories, Sociological Theories and Communication Theories. These theories are revisited in the context of online identity formation and communication through social media. Different aspects of identity such as gender identity, professional identity, political identity etc., are discussed and illustrated through empirical studies in the field. Moreover, the role of social media as a factor that might either promote or hinder identity development is also discussed (e.g., phenomena such as cyber-bulling and internet addiction). Finally recommendations and suggestions for future research are provided, including the need for multidisciplinary theoretical frameworks to the investigation of the relationships between social media and identity.
本章旨在通过回顾有关该主题的理论框架和实证研究,探讨社交媒体与身份之间的关系。考虑到认同概念的复杂性,提供了多学科的理论方法,包括心理学理论、社会学理论和传播学理论。这些理论在网络身份形成和社交媒体传播的背景下被重新审视。身份的不同方面,如性别认同,职业认同,政治认同等,通过在该领域的实证研究进行了讨论和说明。此外,还讨论了社交媒体作为可能促进或阻碍身份发展的因素的作用(例如,网络欺凌和网络成瘾等现象)。最后提出了对未来研究的建议和建议,包括需要多学科的理论框架来研究社交媒体与身份之间的关系。
{"title":"Social Media and Identity","authors":"E. Melonashi","doi":"10.4018/978-1-5225-7909-0.ch074","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch074","url":null,"abstract":"The present chapter aims to explore the relationship between social media and identity by reviewing theoretical frameworks as well as empirical studies on the topic. Considering the complexity of the concept of identity, a multidisciplinary theoretical approach is provided, including Psychological Theories, Sociological Theories and Communication Theories. These theories are revisited in the context of online identity formation and communication through social media. Different aspects of identity such as gender identity, professional identity, political identity etc., are discussed and illustrated through empirical studies in the field. Moreover, the role of social media as a factor that might either promote or hinder identity development is also discussed (e.g., phenomena such as cyber-bulling and internet addiction). Finally recommendations and suggestions for future research are provided, including the need for multidisciplinary theoretical frameworks to the investigation of the relationships between social media and identity.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122236111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-Aggression in Higher Education 高等教育中的网络攻击
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-2960-6.CH007
Michelle F. Wright
Emerging adults are actively engaged in a digital world in which blogs, social networking sites, watching videos, and instant messaging are a typical part of their daily lives. Their immersion in the digital world has occurred for as long as many of them can remember, with many not knowing a world without our modern technological advances. Although the digital age has brought us many conveniences in our daily lives, there is a darker side to emerging adults' involvement with these technologies, such as cyber aggression involvement. This chapter draws on research from around the world, utilizing a variety of research designs, to describe the nature, extent, and consequences associated with emerging adults' involvement in cyber aggression. Concluding the chapter is a solutions and recommendation section in which various recommendations are given to help colleges and universities strive to reduce cyber aggression on their campuses among their students.
新兴成年人积极参与数字世界,博客、社交网站、看视频和即时通讯是他们日常生活的典型组成部分。他们中的许多人记事以来,就一直沉浸在数字世界中,许多人不知道一个没有现代技术进步的世界。尽管数字时代为我们的日常生活带来了许多便利,但新兴成年人对这些技术的参与也有其黑暗的一面,比如网络攻击参与。本章借鉴了来自世界各地的研究,利用各种研究设计,描述了与新兴成年人参与网络攻击相关的性质、程度和后果。本章的结尾处是解决方案和建议部分,其中给出了各种建议,以帮助高校努力减少学生在校园中的网络攻击。
{"title":"Cyber-Aggression in Higher Education","authors":"Michelle F. Wright","doi":"10.4018/978-1-5225-2960-6.CH007","DOIUrl":"https://doi.org/10.4018/978-1-5225-2960-6.CH007","url":null,"abstract":"Emerging adults are actively engaged in a digital world in which blogs, social networking sites, watching videos, and instant messaging are a typical part of their daily lives. Their immersion in the digital world has occurred for as long as many of them can remember, with many not knowing a world without our modern technological advances. Although the digital age has brought us many conveniences in our daily lives, there is a darker side to emerging adults' involvement with these technologies, such as cyber aggression involvement. This chapter draws on research from around the world, utilizing a variety of research designs, to describe the nature, extent, and consequences associated with emerging adults' involvement in cyber aggression. Concluding the chapter is a solutions and recommendation section in which various recommendations are given to help colleges and universities strive to reduce cyber aggression on their campuses among their students.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115667746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Fight for Cyber Thoreau 为网络而战,梭罗
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7909-0.ch059
M. Crosston
This analysis sheds light on where cyber disobedience fits in to larger society positively and does not deserve to be summarily thrown in with all types of illegal cyber acts. Making these legal delineations does not solve all of the problems a state will face in the new cyber age. But they will go a long way in helping a democratic state honor its foundation of civil liberties and freedom and avoid becoming a perpetuator of virtual hyperbole and digital panic. In so doing, it guarantees the people greater freedom for themselves while also having greater confidence in the fairness of their own government. This, in place of the chaotic, ambiguous, and uninformed legal and political environment governing cyber action today, would be a dramatic improvement.
这一分析揭示了网络不服从如何积极地适应更大的社会,而不应该被草率地与所有类型的非法网络行为相提并论。做出这些法律界定并不能解决一个国家在新的网络时代将面临的所有问题。但在帮助一个民主国家尊重其公民自由和自由的基础,避免成为虚拟夸张和数字恐慌的永久制造者方面,它们将大有帮助。在这样做的过程中,它保证了人民更大的自由,同时也对自己政府的公正性有了更大的信心。这将取代目前管理网络行动的混乱、模糊和不知情的法律和政治环境,这将是一个巨大的进步。
{"title":"The Fight for Cyber Thoreau","authors":"M. Crosston","doi":"10.4018/978-1-5225-7909-0.ch059","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch059","url":null,"abstract":"This analysis sheds light on where cyber disobedience fits in to larger society positively and does not deserve to be summarily thrown in with all types of illegal cyber acts. Making these legal delineations does not solve all of the problems a state will face in the new cyber age. But they will go a long way in helping a democratic state honor its foundation of civil liberties and freedom and avoid becoming a perpetuator of virtual hyperbole and digital panic. In so doing, it guarantees the people greater freedom for themselves while also having greater confidence in the fairness of their own government. This, in place of the chaotic, ambiguous, and uninformed legal and political environment governing cyber action today, would be a dramatic improvement.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130037264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Multigenerational Online Behavior and Media Use
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1