Conference Paper

Digital Literacy in Device Use Among Secondary School Students

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

Article
Full-text available
In addition to economic challenges, employers are also facing a growing generation gap. Generations that are significantly different in terms of values, mindsets and preferences need to be effectively managed in a workplace, which requires complex solutions. In this paper we present sub results of our primary research. In a quantitative procedure, we conducted a pre-tested standardized questionnaire online survey with random sample making method, resulting in 1146 evaluable questionnaires. Descriptive statistics to evaluate the results presented in this study. Descriptive statistics, and bivariate and multivariate analyses were applied to process the quantitative results, to test the hypotheses put forward. The main focus of our research is to investigate the factors that influence employees' choice of jobs, and we analyzed the structure of their preference system. As a result of the research, we were able to identify distinct clusters according to the preference system of job selection. In the context of the resulting segments, we also analyzed which motivational tools could be most effective in encouraging higher performance. We believe that our research has useful implications for practice, by highlighting how to differentiate the pool of employees in terms of job choice and how to apply effective incentives to a specific segment.
Article
Full-text available
A distributed denial-of-service (DDoS) attack is one of the most pernicious threats to network security. DDoS attacks are considered one of the most common attacks among all network attacks. These attacks cause servers to fail, causing users to be inconvenienced when requesting service from those servers. Because of that, there was a need for a powerful technique to detect DDoS attacks. Deep learning and machine learning are effective methods that researchers have used to detect DDoS attacks. So, in this study, a novel deep learning classification method was proposed by mixing two common deep learning algorithms, Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM). The NSL-KDD dataset was used to test the model. This method architecture consists of seven layers to achieve higher performance compared with traditional CNN and LSTM. The proposed model achieved the highest accuracy of 99.20% compared with previous work.
Book
Full-text available
Generational issues are a perennial favourite. Analysing one’s own generation and comparing it to the next is of great interest to the media and the public alike. With more generations coexisting than ever before – in the home, school, workplace and marketplace – this interest has never been more so than today. Indeed, media coverage on the generations, particularly the younger, emerging generations, abounds in an attempt to appease our desire to better understand and engage with each other: our employees, colleagues, students and children. I am contacted almost daily – by the media, business men and women, and parents – to talk about the generations. With this saturation of media on the generations, identifying what is fact and what is hype and conjecture can be a challenge. While some generational commentary reads much like an astrological chart, genuine research-based generational studies now form an important part of sociology. Yet it is more than an academic discipline. The insights and applications that flow from robust generational analysis is of great value to business leaders, educators and parents. Generational segmentation, like any professional discipline, is only useable when conducted by experts.
Article
Full-text available
The opportunities afforded through digital and communications technologies, in particular social media, have inspired a diverse range of interdisciplinary perspectives exploring how such advancements influence the way we live. Rather than positioning technology as existing in a separate space to society more broadly, the ‘digital society’ is a concept that recognises such technologies as an embedded part of the larger social entity and acknowledges the incorporation of digital technologies, media, and networks in our everyday lives (Lupton 2014), including in crime perpetration, victimisation and justice. In this article, we explore potential for an interdisciplinary concept of digital society to expand and inspire innovative crime and justice scholarship within an emerging field of ‘digital criminology’.
Article
Full-text available
While smartphones and related mobile technologies are recognized as flexible and powerful tools that, when used prudently, can augment human cognition, there is also a growing perception that habitual involvement with these devices may have a negative and lasting impact on users’ ability to think, remember, pay attention, and regulate emotion. The present review considers an intensifying, though still limited, area of research exploring the potential cognitive impacts of smartphone-related habits, and seeks to determine in which domains of functioning there is accruing evidence of a significant relationship between smartphone technology and cognitive performance, and in which domains the scientific literature is not yet mature enough to endorse any firm conclusions. We focus our review primarily on three facets of cognition that are clearly implicated in public discourse regarding the impacts of mobile technology – attention, memory, and delay of gratification – and then consider evidence regarding the broader relationships between smartphone habits and everyday cognitive functioning. Along the way, we highlight compelling findings, discuss limitations with respect to empirical methodology and interpretation, and offer suggestions for how the field might progress toward a more coherent and robust area of scientific inquiry.
Article
Full-text available
Self-luminous devices, such as computers, tablets and cell phones can emit short-wavelength (blue) light, which maximally suppresses melatonin. Melatonin is a hormone that starts rising approximately 2 hours prior to natural bedtimes and signals darkness and sleep to the body. The present study extends from previously published studies showing that light from self-luminous devices suppresses melatonin and delays sleep. This is the first study conducted in the home environment that investigated the effects of self-luminous devices on melatonin levels in adolescents (age 15–17 years). Results show that 1-hour and 2-hour exposure to light from self-luminous devices significantly suppressed melatonin by approximately 23% and 38% respectively. Compared to our previous studies, these results suggest that adolescents may be more sensitive to light than other populations.
Article
Full-text available
Children use electronic screens at ever younger ages, but there is still little empirical research on how and why parents mediate this media use. In line with Vygotsky’s zone of proximal development, we explored whether children’s media skills and media activities, next to parents’ attitudes about media for children, and several child and parent-family characteristics, predicted parental mediation practices. Furthermore, we investigated children’s use and ownership of electronic screens in the bedroom in relationship to the child’s media skills. Data from an online survey among 896 Dutch parents with young children (0-7 years) showed that children’s use and ownership of TV, game consoles, computers and touchscreens, primarily depended on their media skills and age, not on parent’s attitudes about media for children. Only touchscreens were used more often by children, when parents perceived media as helpful in providing moments of rest for the child. In line with former studies, parents consistently applied co-use, supervision, active mediation, restrictive mediation, and monitoring, depending on positive and negative attitudes about media. The child’s media skills and media activities, however, had stronger relationships with parental mediation styles, whereas age was not related. Canonical discriminant analysis, finally, captured how the five mediation strategies varied among infants, toddlers, pre-schoolers, and early childhood children, predominantly as a result of children’s media skills, and media activities, i.e., playing educational games and passive entertainment use.
Article
Full-text available
Our society has come to rely on the sheer size, technological power, and lightening fast speed of the Internet to seek out immeasurable pages of information, explore the unknown, and communicate with virtually anyone, anywhere, and at anytime across the globe. Conversely, the Internet has opened windows of previously unknown criminal opportunities that not only challenge, but also transcend all physical boundaries, borders, and limitations to detect, punish, and diminish what appears to be a mounting problem of global proportion. As such, the Internet has literally become a fertile breeding ground for an entirely new and unique type of criminal offender hereafter known as the cyber stalker - an offender who uses the Internet as a tool or weapon of sorts to prey upon, harass, threaten, and generate immense fear and trepidation in its victims through sophisticated stalking tactics. This paper presents a glimpse into the deviant behaviors and tactics associated with cyber stalking crimes, legislative intervention measures, and preventative initiatives created specifically to curtail this emerging global crime.
Article
Full-text available
Despite extensive popular press coverage of the dark side of the internet, apparently no social scientific research has yet been published on the topic of cyberstalking. This report summarizes three pilot studies conducted in the process of developing a satisfactory factorially complex measure of cyberstalking victimization, and then investigates the incidence of such victimization, and its interrelationships to obsessive relational intrusion. Findings indicate that cyberstalking is experienced by a nontrivial proportion of the sample, and that there are small but generally consistent relationships between facets of cyberstalking and spatially based stalking. In addition, the results suggested that only interactional forms of coping were related consistently with forms of cyberstalking.
Article
Full-text available
The purpose of this exploratory study is to better understand the current dynamics of the Malaysian market for smartphone and the usage behaviors of consumers. This paper presents the result of a survey on the trend of smartphone from the perspective of end consumers. The data was collected from 1814 respondents across major cities in Malaysia. This study has looked into the familiarity of users towards smartphones, choices of smartphone brand and service providers, and most importantly the determinants that influence their purchasing decision. Additionally, the consumers" preferences on smartphone specifications such as design, computing power, operating platform, and price were investigated. Furthermore, consumers" usage behaviors such as using smartphone for email, web browsing, gaming, and document reading were examined. The statistics presented provides fundamental information regarding the trends in the smartphone market and usage behaviors in Malaysia. Such information are useful for academics for the development of future works in the field, whereas for smartphone manufacturers, application developers and other stakeholders, they are able to plan their direction in the Malaysian smartphone market.
Article
Full-text available
Social networks and the need to communicate are universal human conditions. A general assumption is that communication technologies help to increase and strengthen social ties. The Internet provides many social networking opportunities. But how do social networking sites affect individual relationships? Do people use social networking sites to expand their personal networks, to find people who have had similar experiences, to discuss a common hobby, for the potential of offline dating? Or, do people spend time on networking sites to deepen their existing personal networks and stay connected to old friends or distant family? What is the nature of the communications that transpire on social networking sites? Is it personal, emotional, private, and important; or trivial, informal, and public? We examined the literature on social networking sites and conducted our own studies of how students on American college campuses engage in social networking.
Article
Full-text available
Abstract Social network,sites,(SNSs) are increasingly attracting the attention of academic,and,industry researchers intrigued by their affordances and reach.,This special theme section of the,Journal,of Computer-Mediated,Communicationbrings ,together scholarship on these emergent phenomena.,In this introductory article, we describe features of SNSs and propose a comprehensive definition. We then present one perspective on the history of such sites, discussing key changes and developments. After briefly summarizing existing scholarship concerning SNSs, we discuss the articles,in this special section and conclude with considerations for future,research.
Article
Full-text available
Sleep deprivation severely compromises the ability of human beings to respond to stimuli in a timely fashion. These deficits have been attributed in large part to failures of vigilant attention, which many theorists believe forms the bedrock of the other more complex components of cognition. One of the leading paradigms used as an assay of vigilant attention is the psychomotor vigilance test (PVT), a high signal-load reaction-time test that is extremely sensitive to sleep deprivation. Over the last twenty years, four dominant findings have emerged from the use of this paradigm. First, sleep deprivation results in an overall slowing of responses. Second, sleep deprivation increases the propensity of individuals to lapse for lengthy periods (>500 ms), as well as make errors of commission. Third, sleep deprivation enhances the time-on-task effect within each test bout. Finally, PVT results during extended periods of wakefulness reveal the presence of interacting circadian and homeostatic sleep drives. A theme that links these findings is the interplay of "top-down" and "bottom-up" attention in producing the unstable and unpredictable patterns of behavior that are the hallmark of the sleep-deprived state.
Article
The range of knowledge, skills and competencies that are considered important and useful is constantly changing. A combination of many factors shape our preferences in learning and how acquired knowledge is perceived. The focus of this paper is to analyze what kind of knowledge and competence levels have been appreciated by the pandemic, as well as how each generation perceives the role and importance of the knowledge elements examined in the research. In the context of primary research, it was demonstrated that the Coronavirus has led to an increase in the value of more conscious behaviors, such as, health orientation and the pursuit of safety (H1). Furthermore, it was proven that, beyond the impact of the pandemic, it is true, that age (generational affiliation) influences the perception of the importance of certain competencies (H2). © 2022, Budapest Tech Polytechnical Institution. All rights reserved.
Book
The Fourth Industrial Revolution is changing everything - from the way we relate to each other, to the work we do, the way our economies work, and what it means to be human. We cannot let the brave new world that technology is currently creating simply emerge. All of us need to help shape the future we want to live in. But what do we need to know and do to achieve this? In Shaping the Fourth Industrial Revolution, Klaus Schwab and Nicholas Davis explore how people from all backgrounds and sectors can influence the way that technology transforms our world. Drawing on contributions by more than 200 of the world's leading technology, economic and sociological experts to present a practical guide for citizens, business leaders, social influencers and policy-makers this book outlines the most important dynamics of the technology revolution, highlights important stakeholders that are often overlooked in our discussion of the latest scientific breakthroughs, and explores 12 different technology areas central to the future of humanity. Emerging technologies are not predetermined forces out of our control, nor are they simple tools with known impacts and consequences. The exciting capabilities provided by artificial intelligence, distributed ledger systems and cryptocurrencies, advanced materials and biotechnologies are already transforming society. The actions we take today - and those we don't - will quickly become embedded in ever-more powerful technologies that surround us and will, very soon, become an integral part of us. By connecting the dots across a range of often-misunderstood technologies, and by exploring the practical steps that individuals, businesses and governments can take, Shaping the Fourth Industrial Revolution helps equip readers to shape a truly desirable future at a time of great uncertainty and change.
Article
Building upon Eck and Clarke’s (2003) ideas for explaining crimes in which there is no face-to-face contact between victims and offenders, the authors developed an adapted lifestyle–routine activities theory. Traditional conceptions of place-based environments depend on the convergence of victims and offenders in time and physical space to explain opportunities for victimization. With their proposed cyberlifestyle–routine activities theory, the authors moved beyond this conceptualization to explain opportunities for victimization in cyberspace environments where traditional conceptions of time and space are less relevant. Cyberlifestyle–routine activities theory was tested using a sample of 974 college students on a particular type of cybervictimization—cyberstalking. The study’s findings provide support for the adapted theoretical perspective. Specifically, variables measuring online exposure to risk, online proximity to motivated offenders, online guardianship, online target attractiveness, and online deviance were significant predictors of cyberstalking victimization. Implications for advancing cyberlifestyle–routine activities theory are discussed.
Article
The twofold purpose of this paper is to offer recommendations to accounting educators regarding educational technology (ET) delivery modes, and to stimulate accounting education research efforts in the area of ET. Drawing from behavioral and cognitive theory, as well as educational research on the impact of technology on learning, this paper reports and discusses the current state of research in ET. Next, ET research and accounting technology research are reviewed and classified into five types: (1) evaluation research, (2) media-comparison studies, (3) intra-medium studies, (4) aptitude-treatment interaction studies, and (5) alternative research designs. We provide practical guidelines to accounting educators and theory-based suggestions to accounting education researchers with regard to ET and its potential impact on student learning. Finally, we offer some directions for future accounting ET research.
Article
The advent of the Internet, with sophisticated algorithmic search engines, has made accessing information as easy as lifting a finger. No longer do we have to make costly efforts to find the things we want. We can "Google" the old classmate, find articles online, or look up the actor who was on the tip of our tongue. The results of four studies suggest that when faced with difficult questions, people are primed to think about computers and that when people expect to have future access to information, they have lower rates of recall of the information itself and enhanced recall instead for where to access it. The Internet has become a primary form of external or transactive memory, where information is stored collectively outside ourselves.
Article
This study aims to address possible associations between excessive or dysfunctional use of mobile phones and certain psychological variables. Our study focuses on Problematic Mobile Phone Use (PU) in 196 young adults. A survey was arranged to measure PU, daily mobile phone use in minutes, use of short message service (SMS) and also included psychological and health variables (e.g., chronic stress, depression). Statistic analysis indicates that chronic stress, low emotional stability, female gender, young age, depression, and extraversion are associated with PU. Future research needs to clarify the causality of these findings and should also intend to develop concepts for a more meaningful use of mobile phone and related technologies.
Article
Electronic media have often been considered to have a negative impact on the sleep of children and adolescents, but there are no comprehensive reviews of research in this area. The present study identified 36 papers that have investigated the relationship between sleep and electronic media in school-aged children and adolescents, including television viewing, use of computers, electronic gaming, and/or the internet, mobile telephones, and music. Many variables have been investigated across these studies, although delayed bedtime and shorter total sleep time have been found to be most consistently related to media use. A model of the mechanisms by which media use may affect sleep is presented and discussed as a vehicle for future research.
Technology vs. Humanity. The Coming Clash Between Man and Machine
  • G Leonhard
The effects of social media on college students
  • Q Wang
  • W Chen
  • Y Liang
Az innováció szerepe és a versenykpésséggel való összefüggései.
  • J Varga
Redefining the Role of Project Leader for Achieving a Better Project Result
  • J Varga
  • A Csiszárik-Kocsir
Financial knowledge, skills and investment practice in Hungary - results based on a primary research
  • A Csiszárik-Kocsir
  • J Varga
Understanding the innovation management system: The CEN/TS technical specification for a better innovation performance
  • J Varga
  • A Csiszárik-Kocsir
Secure the future of Germany as a production location, implementation recommendations for the future project industry 4.0
  • H Kagermann
  • W Wahlster
  • J Helbig
Innovation policies in the digital age
  • D Guelleci
  • C Paunoai
The Positive and Negative Effects of Digital Technologies on Students 'Learning
  • G O K Tolga
Analysis of Financially Aware Consumer Segments from the Perspective of Conscious Consumer Behaviour
  • M Garai-Fodor
Beginning the workday yet already depleted?
  • K Lanaj
  • R E Johnson
  • C Barnes
Safety and risk analysis from the behavioral economics paradigm, use of the possibilities of soft computing methods
  • A Forgács
  • J Lukács
  • R Horváth
Instant Gratification & Its Dark Side
  • R Alsop
What's eating up Adolescent Sleep? Evidence from Bihar
  • A K Jha
  • V Pandey
  • V Kumari
For Disease Control & Prevention: Electronic Media And Youth Violence: A CDC Issue Brief For Educators And Caregivers
  • M H Feldman
  • D Ferdon
Secure the future of Germany as a production location, implementation recommendations for the future project industry 4.0
  • Kagermann
Whats eating up Adolescent Sleep? Evidence from Bihar
  • Jha
The effects of social media on college students
  • Wang
Beginning the workday yet already depleted?
  • Lanaj
Safety and risk analysis from the behavioral economics paradigm, use of the possibilities of soft computing methods
  • Forgács