139 results on '"Internet abuse"'
Search Results
2. Family relationships and internet abuse in 25 European countries
- Author
-
Rivera, Reynaldo G., Santos, David, Grau Grau, Marc, and DeRose, Laurie F.
- Published
- 2021
- Full Text
- View/download PDF
3. Examining the Gendered Impacts of Technology-Facilitated Sexual Violence: A Mixed Methods Approach.
- Author
-
Champion, Amanda R., Oswald, Flora, Khera, Devinder, and Pedersen, Cory L.
- Subjects
- *
MEN , *SEXUAL harassment , *CRIME victims , *SEX crimes , *TECHNOLOGY - Abstract
Technology-facilitated sexual violence (TFSV) is defined broadly as unwanted or unwelcome sexual behavior involving the use of technology, including online sexual harassment, online gender or sexuality-based harassment, online image-based abuse (colloquially known as "revenge porn"), and online sexual aggression/coercion (colloquially known as "sextortion"). The purpose of this study was to explore the victim impact of TFSV and to critically examine the positioning of TFSV as a gender-based harm; that is, a harm directed primarily towards women. This study employed a mixed methods approach, integrating quantitative online survey data (N = 333; Mage = 33.91 years; 63% women) with qualitative interview data (N = 10; Agerange = 24-46; 50% women) to gain a more comprehensive understanding of TFSV. We found that victims of TFSV experienced anxiety, stress, depression, loss of control, mistrust, multiple victimizations, poor academic/occupation functioning, problematic alcohol consumption, embarrassment, and online behavior changes (e.g., limiting personal information online) due to TFSV victimization. Individuals who experienced online image-based abuse reported greater distress on items of depression, anxiety, and occupational/academic functioning than did victims of other types of TFSV. The current study provides partial support for the gender similarities hypothesis that TFSV is not exclusively a gender-based harm; our findings suggest that women and men's TFSV experiences are similar for most TFSV types. Overall, the present study demonstrates the negative impact TFSV has for both women and men and highlights the need for greater awareness and increased support for all victims of this form of sexual violence. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. Abuso de Internet y adolescentes: gratificaciones, supervisión familiar y uso responsable. Implicaciones educativas y familiares.
- Author
-
Cebollero Salinas, Ana, Cano Escoriaza, Jacobo, and Orejudo Hernández, Santos
- Subjects
TEENAGE boys ,SOCIAL problems ,TEENAGERS ,GENDER ,ONLINE etiquette - Abstract
Copyright of Digital Education Review is the property of University of Barcelona, Virtual Teaching & Learning Research Group and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
5. L'USO PROBLEMATICO DI INTERNET: UN DISTURBO ANCORA IN FASE DI DEFINIZIONE.
- Author
-
Palermo, Stefania, Arone, Alessandro, Flamini, Walter, Ivaldi, Tea, and Marazziti, Donatella
- Abstract
Objective: Problematic Internet use (PIU) is one of the most relevant conditions within the so-called "behavioral addictions" or "non-substance addictions". Since the end of the last century, the Internet has been designated as a revolutionary tool, capable of changing forever, amongst other things, the way we access information and communicate. On the other hand, its several opportunities are potentially capable of becoming an addiction characterized by the establishment and the perpetration of pathological behaviors, as much as the classic psychoactive substances or other activities (grouped in the heterogeneous complex of behavioral addictions) closely related to the dopaminergic circuits and the activation of the reward system. The purpose of this paper is to review the available scientific literature on PIU, starting from the still debated diagnostic framework to its clinical characteristics and possible therapeutic implications. Method: A research was conducted through PubMed and Google Scholar, according to the PRISMA guidelines, combining the terms "problematic Internet use", "Internet abuse", "Internet addiction", "behavioral addictions". Results: Problematic Internet use (PIU) has a worldwide prevalence of about 6%, with higher rates in Southeast Asian countries and in younger age groups. The clinical picture is extremely variable. Besides the typical symptoms of addictions, characterized by tolerance, abstinence, relapse and negative consequences on global functioning, important somatic symptoms are reported, ranging from low back pain to episodes of photosensitive epilepsy. There is a frequent correlation with mood disorders, anxiety disorders and substance use disorders, as well as frequent comorbidity with attention deficit/hyperactivity disorder (ADHD). The treatment of PIU consists of both pharmacological and psychotherapeutic approaches, where the best strategy seems to be a therapeutic path built "ad hoc" on the patient, also taking into account possible subtypes of PIU (i.e. the pathological behavior that is implemented through the use of the Internet). However, the numerous aspects still needed to be clarified, starting with the validation of universal diagnostic criteria, compromise a complete definition of PIU, with consequent deficits ranging from the absence of nosographic recognition to the lack of official therapeutic guidelines. Conclusions: Problematic Internet use (PIU) represents an entity still waiting for a precise psychiatric nosology diagnostic autonomy within DSM. Although in the last years important progress has been made in delineating the key characteristics of this disorder, the uncertainty of the nosographic framework still remains to date, also because of the heterogeneity of the clinical picture and the coexistence, within the wider category of PIU, of numerous sub-categories of disorders depending on the type of pathological use that the individual makes of the Internet. Consequently, the treatment encounters a similar ambiguity, with lacking guidelines, which are mostly based on the treatment indications for similar disorders. In the future, further studies are needed to shed light on the nuclear aspects of PIU, in order to provide a more tailored treatment to subjects suffering from this dramatically emerging form of behavioral addiction. [ABSTRACT FROM AUTHOR]
- Published
- 2020
6. The Effect of Using Social Media on Psychological Violence of Adolescents Dating in Developed Countries: A Systematic Review.
- Author
-
Hidayati, Yusrina and Prasetyo, Sabarinah
- Subjects
DATING violence ,SOCIAL media ,DEVELOPED countries ,PSYCHOLOGICAL abuse ,META-analysis ,HIGH school seniors - Abstract
Background: The violence to women in the world is still happening, about 38% and 19.5% as percentage in dating with opposite sex. The most violence is psychological/emotional violence with 77 percent. The use of social media for adolescents has negative effect as the way of psychological violence that effect their mental health. Methods : The methodology of this study was systematic review that conducted by journals search through online databases of Proquest, Science Direct, and Sage Publications from 2009-2019. The keywords of searching were PICO-S (population-study intervention outcomes compare design ) by using Query dating violence and internet abuse and social media and psychological abuse and adolescent. There are 6 journals that support research inclusion criteria. Findings : Based on 6 journal articles analyzed about the use of social media and adolescents’ dating violence include actions such as compulsion, over jealous, and aggressive on social media. The violence starts from sixth grader of primary school and improves in middle high school and senior high school. Conclusion :The use of social media effects on dating violence then become problems on psychology health such as reproductive process in the future. [ABSTRACT FROM AUTHOR]
- Published
- 2020
7. Factors Contributing to Internet Abuse in the Workplace: Behaviour in SMEs
- Author
-
Rosli, Roshaliza Mohd, Lokman, Anitawati Mohd, Aziz, Azhar Abdul, Hamidi, Saidatul Rahah, Hassan, Oskar Hasdinor, editor, Abidin, Shahriman Zainal, editor, Anwar, Rusmadiah, editor, and Kamaruzaman, Muhamad Fairus, editor
- Published
- 2015
- Full Text
- View/download PDF
8. Assessing the Psychometric Properties of the Internet Abusive Use Questionnaire in Italian University Students.
- Author
-
Servidio, Rocco, Francés, Fernando Calvo, and Bertucci, Andrea
- Subjects
- *
CONFIRMATORY factor analysis , *EXPLORATORY factor analysis , *INTERNET addiction , *ADDICTIONS , *ITALIAN language , *COLLEGE students - Abstract
The risks emanating from the abusive use of the Internet are on the rise, especially among young adults causing psychological problems in their social and personal lifestyles. To date, there are only two validated measures in the Italian language to measure the risk of Internet addiction. This study served to validate an Italian version of the Internet Abusive Use Questionnaire (IAUQ-I) via a translation-backtranslation process. A sample of 289 Italian university students participated in the study (73.70% females). The results of the exploratory and confirmatory factor analysis established the unidimensional factorial structure of the scale. Validity and reliability analyses indicated adequate results concerning the psychometric properties of the Italian IAUQ-I. We also found an association between IAUQ-I and self-esteem, and personality traits. This study shows that the IAUQ-I represents a valid instrument for measuring the abusive use of the Internet and could be used not only for further epidemiological studies, but also to inform practitioners working with persons addicted to technology. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
9. Internalizing problems as a mediator in the relationship between low effortful control and internet abuse in adolescence: A three-wave longitudinal study.
- Author
-
Pace, Ugo, D'Urso, Giulio, and Zappulla, Carla
- Subjects
- *
LONGITUDINAL method , *QUESTIONNAIRES , *SELF-evaluation , *TEENAGERS' conduct of life , *TEMPERAMENT , *INTERNET addiction in adolescence - Abstract
Abstract The aim of the study is to examine the relationships between early adolescents' low effortful control, middle adolescents' internalizing problems and late adolescents' Internet abuse, focusing on the mediating role that middle adolescents' internalizing problems may play in the relationship between early adolescents' low effortful control and late adolescents' Internet abuse. The study followed a sample of 482 adolescents (245 boys and 237 girls) from early adolescence (wave 1; mean age = 14.76, SD = 0.63), through middle adolescence (wave 2; mean age = 15.77, SD = 0.61), to late adolescence (wave 3; mean age = 17.88, SD = 0.57). The participants completed self-report questionnaires on temperament in wave 1 and on internalizing problems and Internet abuse in all three waves. Data from the mediation model showed that internalizing problems in middle adolescence mediated the relationship between low effortful control in early adolescence and Internet abuse in late adolescence. Highlights • We found a predictive role of low effortful control on late adolescents' internet abuse. • We found that internalizing problems mediate the above relationship. • Predictive and mediation roles were highlighted in a three wave longitudinal design. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
10. Prežívanie osamelosti ako prediktor rizikového správania adolescentov.
- Author
-
Lichner, Vladimír
- Abstract
Copyright of Social Work Forum / Fórum Sociální Práce is the property of Charles University Prague, Faculty of Arts and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2018
11. Family relationships and internet abuse in 25 European countries
- Author
-
Marc Grau Grau, Reynaldo Rivera, Laurie F. DeRose, and David Santos
- Subjects
0508 media and communications ,Sociology and Political Science ,Political science ,05 social sciences ,050301 education ,050801 communication & media studies ,Criminology ,Internet abuse ,0503 education - Abstract
The aim of this article is to understand the link between family relationships and internet abuse (IA) using a sample of 18,709 children in 25 European countries. Our results suggest that family relationships are a significant predictor of IA – even when controlling for other significant individual and country-level factors. According to our results, children in two-parent families were less likely to have IA than children in other types of homes, but their advantage seems to derive from having better family dynamics (manifest in more communicative and less autonomous lifestyles) rather than family structure as such. Moreover, the importance of family structure with respect to IA is mediated by children’s relational lifestyles. This suggests that positive parenting characterised by high levels of dialogue may work as a protective factor of IA. We also identified sociodemographic risk factors: IA is more common among older and male children, those with lower levels of self-efficacy, and those living in large cities. The specific components of advantageous relational lifestyles can guide interventions to protect children from IA.
- Published
- 2021
- Full Text
- View/download PDF
12. Addressing the challenges of modern DNS
- Author
-
Olivier van der Toorn, Moritz Müller, Sara Dickinson, Cristian Hesselman, Anna Sperotto, and Roland van Rijswijk-Deij
- Subjects
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Software_OPERATINGSYSTEMS ,General Computer Science ,DNSSEC ,DNS ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Security ,UT-Hybrid-D ,Availability ,Internet abuse ,Theoretical Computer Science - Abstract
TheDomain Name System(DNS) plays a crucial role in connecting services and users on the Internet. Since its first specification, DNS has been extended in numerous documents to keep it fit for today’s challenges and demands. And these challenges are many. Revelations of snooping on DNS traffic led to changes to guarantee confidentiality of DNS queries. Attacks to forge DNS traffic led to changes to shore up the integrity of the DNS. Finally, denial-of-service attack on DNS operations have led to new DNSoperations architectures. All of these developments make DNS a highly interesting, but also highly challenging research topic. This tutorial – aimed at graduate students and early-career researchers – provides a overview of the modern DNS, its ongoing development and its open challenges. This tutorial has four major contributions. We first provide a comprehensive overview of the DNS protocol. Then, we explain how DNS is deployed in practice. This lays the foundation for the third contribution: a review of the biggest challenges the modern DNS faces today and how they can be addressed. These challenges are (i) protecting the confidentiality and (ii) guaranteeing the integrity of the information provided in the DNS, (iii) ensuring the availability of the DNS infrastructure, and (iv) detecting and preventing attacks that make use of the DNS. Last, we discuss which challenges remain open, pointing the reader towards new research areas.
- Published
- 2022
- Full Text
- View/download PDF
13. Targeted
- Author
-
Joshi, Neha
- Subjects
- Internet abuse, Privacy, Social media ads, Social media management, Targeted by ads
- Abstract
The document is about the impact of targeted advertising on individuality and the loss of privacy. I describe my personal experience of being influenced by advertisements and how it led me to question my identity. I highlight how algorithms use personal information to categorize people and target them with specific ads, leading to a loss of privacy. I also argue that the internet has provided us with platforms to promote ourselves, but we lose our identity in the process of being boxed up and targeted by advertisements. I conclude by emphasizing the importance of recognizing and spreading awareness about the death of individuality we are experiencing in this day and age.
- Published
- 2023
14. An Exploratory Study on the Factors Influencing Misconduct Behaviors of Adolescents with Abortion in Korea
- Author
-
Oh Dong Rok
- Subjects
Misconduct ,media_common.quotation_subject ,Self-esteem ,Exploratory research ,Juvenile delinquency ,Abortion ,Psychology ,Internet abuse ,media_common ,Clinical psychology - Published
- 2019
- Full Text
- View/download PDF
15. Abuso de Internet y adolescentes: gratificaciones, supervisión familiar y uso responsable. Implicaciones educativas y familiares
- Author
-
Cebollero Salinas, Ana Belén, Cano de Escoriaza, Jacobo, Orejudo Hernández, Santos, Cebollero Salinas, Ana Belén, Cano de Escoriaza, Jacobo, and Orejudo Hernández, Santos
- Abstract
Internet tiene un gran potencial educativo y social pero no por ello está exento de riesgos como la tecnoadicción o abuso de la tecnología. El objetivo de este trabajo es analizar en qué medida las gratificaciones, la supervisión familiar y su uso responsable influyen en el abuso de Internet y con ello comprender mejor este riesgo en la adolescencia de cara a que docentes y familias puedan establecer estrategias para su prevención. En el estudio participaron 555 adolescentes (55.7% chicos y 44.3 % chicas) de 1º-4º ESO (M: 13. 97 años y SD: 1. 27). Los datos se obtuvieron través de cuestionarios. Los resultados muestran que la evasión es la principal motivación para el abuso digital junto al entretenimiento y el logro digital. El uso responsable y la supervisión familiar juegan un papel protector. Se discuten las diferencias según el género y la edad y las implicaciones educativas para docentes y familias.
- Published
- 2021
16. Using Deterrence to Mitigate Employee Internet Abuse.
- Author
-
Shepherd, Morgan M. and Klein, Gary
- Abstract
This study looks at the question of how to reduce/eliminate employee Internet Abuse. Companies have used acceptable use policies (AUP) and technology in an attempt to mitigate employees' personal use of company resources. Research shows that AUPs do not do a good job at this but that technology does. Research also shows that while technology can be used to greatly restrict personal use of the internet in the workplace, employee satisfaction with the workplace suffers when this is done. In this research experiment we used technology not to restrict employee use of company resources for personal use, but to make the employees more aware of the current Acceptable Use Policy, and measured the decrease in employee internet abuse. The results show that this method can result in a drop from 27 to 21 percent personal use of the company networks. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
17. Abuso de Internet y adolescentes: gratificaciones, supervisión familiar y uso responsable. Implicaciones educativas y familiares
- Author
-
Jacobo Cano de Escoriaza, Santos Orejudo Hernández, Ana Cebollero-Salinas, Grupo de Investigación Educaviva, Cátedra de Inteligencia colectiva de la Universidad de Zaragoza, and Formación de Profesorado Universitario del Gobierno de Aragón.
- Subjects
Social network sites ,Family control ,Critical education ,Sociology ,Uses and gratifications ,Internet abuse ,Humanities ,Abuso de Internet ,Redes sociales ,Usos y Gratificaciones ,Control familiar ,Educación crítica ,Computer Science Applications ,Education - Abstract
Internet tiene un gran potencial educativo y social pero no por ello está exento de riesgos como la tecnoadicción o abuso de la tecnología. El objetivo de este trabajo es analizar en qué medida las gratificaciones, la supervisión familiar y su uso responsable influyen en el abuso de Internet y con ello comprender mejor este riesgo en la adolescencia de cara a que docentes y familias puedan establecer estrategias para su prevención. En el estudio participaron 555 adolescentes (55.7% chicos y 44.3 % chicas) de 1º-4º ESO (M: 13. 97 años y SD: 1. 27). Los datos se obtuvieron través de cuestionarios. Los resultados muestran que la evasión es la principal motivación para el abuso digital junto al entretenimiento y el logro digital. El uso responsable y la supervisión familiar juegan un papel protector. Se discuten las diferencias según el género y la edad y las implicaciones educativas para docentes y familias. Internet abuse has become a social problem in adolescence. Previous research suggested that it is related to the gratifications they receive from using it. However, it is unknown whether continued responsible use (netiquette) and family supervision can balance the rewards that promote this risk. Thus, the purpose of this paper is to analyze the extent to which gratifications, family supervision and responsible use predict Internet abuse and thereby better understand this risk in adolescence so that teachers and families can establish strategies for its prevention according to the gender and age. 555 adolescents (55.7% boys) from 1st to 4th year of ESO (M: 13. 97 years old and SD: 1.27) participated in the study. The data were obtained through questionnaires. The results reveal that, although mainly entertainment in boys and avoidance in girls promote abuse, educating netiquette is an important protection factor for both genders and all ages, as well as family supervision in girls and boys. in adolescents 12-13 years old. Educational and family implications are discussed.
- Published
- 2021
18. Internet Abuse Risk Factors among Spanish Adolescents.
- Author
-
Carballo, José L., Marín-Vila, María, Espada, José P., Orgilés, Mireia, and Piqueras, José A.
- Subjects
- *
INTERNET & teenagers , *INTERNET addiction , *SOCIAL skills , *DRUG utilization , *DRUG abuse - Abstract
Empirical evidence has revealed various factors that contribute to the development and maintenance of Internet abuse. The aim of this paper was to analyze, on a sample of Spanish adolescents, the relationship between Internet abuse and: (1) Personal and interpersonal risk factors, including social skills in both virtual and real-life contexts; (2) Drug use. A total of 814 high school students aged between 13 and 17 participated in this study, and were divided into two groups: Internet Abusers (IA = 173) and Non-Internet Abusers (NIA = 641). Questionnaires were used to analyze Internet and drug use/abuse, as well as social skills, in virtual and real contexts. Various interpersonal risk factors (family and group of friends) were also assessed. IA showed a more severe pattern of Internet and drug use, as well as poorer social skills in both contexts. Moreover, their groups of friends appeared more likely to become involved in risky situations related to Internet and drug abuse. Both IA and NIA showed more adaptive social skills in the virtual context than in the real one. There is a need for further research to build on these findings, with a view to designing specific preventive programs that promote responsible Internet use. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
19. Hospital based Treatment for Internet Addicts.
- Author
-
GIOKA, Sophia, KEFALIAKOS, Antonis, IOANNOU, Andriani, MECHILI, Aggelos, and DIOMIDOUS, Marianna
- Published
- 2014
- Full Text
- View/download PDF
20. The Effect of Using Social Media on Psychological Violence of Adolescents Dating in Developed Countries: A Systematic Review
- Author
-
Sabarinah Prasetyo and Yusrina Hidayati
- Subjects
Intervention (counseling) ,education ,Public Health, Environmental and Occupational Health ,Social media ,Dating violence ,Psychological abuse ,Internet abuse ,Psychology ,Mental health ,Developed country ,Inclusion (education) ,Developmental psychology - Abstract
Background: The violence to women in the world is still happening, about 38% and 19.5% as percentage in dating with opposite sex. The most violence is psychological/emotional violence with 77 percent. The use of social media for adolescents has negative effect as the way of psychological violence that effect their mental health. Methods : The methodology of this study was systematic review that conducted by journals search through online databases of Proquest, Science Direct, and Sage Publications from 2009-2019. The keywords of searching were PICO-S (population-study intervention outcomes compare design ) by using Query dating violence and internet abuse and social media and psychological abuse and adolescent. There are 6 journals that support research inclusion criteria. Findings: Based on 6 journal articles analyzed about the use of social media and adolescents’ dating violence include actions such as compulsion, over jealous, and aggressive on social media. The violence starts from sixth grader of primary school and improves in middle high school and senior high school. Conclusion :The use of social media effects on dating violence then become problems on psychology health such as reproductive process in the future.
- Published
- 2020
- Full Text
- View/download PDF
21. A Tool for the Evaluation of Hikikomori Risk in Italian Adolescents: A first Contribution to its Validation
- Author
-
Alice Masi, Francesco Sulla, Salvo Bonfiglio, Roberta Renati, and Dolores Rollo
- Subjects
Coping (psychology) ,Hikikomori ,Social withdrawal ,Psychometrics ,education ,medicine ,Exploratory research ,medicine.disease ,Internet abuse ,Psychology ,Clinical psychology - Abstract
Hikikomori, a severe form of social withdrawal, has been highlighted in Japan since the late 1990s. However, the phenomenon it is increasingly considered to be serious worldwide condition. In 2018 the Emilia Romagna Regional School Office questioned psychologists and teachers in their locality in order to provide a census of prevalence amongst the students of the region. To develop a full picture of the phenomenon, the current exploratory research aimed to obtain information on hikikomori and the variables associated with it directly from the students involved. The Hikikomori Questionnaire-11 (HQ-11) is a self-report tool that showed good psychometrics properties and resulted useful in investigating risk of social withdrawal. While Internet abuse confirmed to be a risk factor, several protection factors, as functional coping strategies were identified. Possible implications for practice are discussed.
- Published
- 2020
- Full Text
- View/download PDF
22. An Analysis of Internet Abuses Impact on Children's Moral Development
- Author
-
Kharina Viola, Indah Sukmawati, and Zadrian Ardi
- Subjects
Internet use ,business.industry ,Internet privacy ,Affect (psychology) ,Telephone line ,GeneralLiterature_MISCELLANEOUS ,Moral development ,Position (finance) ,The Internet ,Internet users ,business ,Internet abuse ,lcsh:L ,internet abuse, adolescent, moral development ,lcsh:Education - Abstract
The Internet is an open, global communications network that connects over thousands of computer networks, over an individual public or private telephone line, its component network is managed by agents from governments, universities, commercial organizations, and volunteers. Teenagers are the largest individual internet users, which the internet has a positive or negative impact or influence. Positive impact we can get information easily. However, the internet can affect the moral development of adolescents, because of the negative impact of the internet itself. Teenagers misuse of the internet, for example teenagers often watch porn on the internet, which will result in an influence on adolescent morale. With regard to the position of the counselor, then the dimensions of internet use that tend to be more widely used by teenagers, internet counseling will be more efficient and effective.
- Published
- 2018
23. Personality and Motivational Factors Predicting Internet Abuse at Work
- Author
-
Jengchung V. Chen, William H. Ross, and Hsiao-Han Yang
- Subjects
locus of control ,uses and gratifications theory ,Internet abuse ,cyberloafing ,Psychology ,BF1-990 - Abstract
The present study investigates whether a personality variable (Locus of Control) and motivational factors rooted in Uses & Gratifications theory (the desire for virtual community, beautiful websites, maintaining interpersonal relations, and the desire for diversion & entertainment) predict Internet abuse at work in the form of shopping, searching for information unrelated to work, and communicating with friends. Data were analyzed for 320 participants, all of whom were employed and had access to computers at work. Results indicate that external Locus of Control predicts all three forms of Internet abuse. The desire to use the Internet for diversion and entertainment purposes predicts only online shopping and searching for non-work-related information. Results suggest that factors predicting some forms of Internet abuse may not predict other forms of Internet abuse. Implications for research and practice are discussed.
- Published
- 2011
24. Addressing the challenges of modern DNS a comprehensive tutorial.
- Author
-
van der Toorn, Olivier, Müller, Moritz, Dickinson, Sara, Hesselman, Cristian, Sperotto, Anna, and van Rijswijk-Deij, Roland
- Subjects
INTERNET domain naming system ,DENIAL of service attacks ,DATA integrity ,INTERNET users - Abstract
The Domain Name System (DNS) plays a crucial role in connecting services and users on the Internet. Since its first specification, DNS has been extended in numerous documents to keep it fit for today's challenges and demands. And these challenges are many. Revelations of snooping on DNS traffic led to changes to guarantee confidentiality of DNS queries. Attacks to forge DNS traffic led to changes to shore up the integrity of the DNS. Finally, denial-of-service attack on DNS operations have led to new DNS operations architectures. All of these developments make DNS a highly interesting, but also highly challenging research topic. This tutorial – aimed at graduate students and early-career researchers – provides a overview of the modern DNS, its ongoing development and its open challenges. This tutorial has four major contributions. We first provide a comprehensive overview of the DNS protocol. Then, we explain how DNS is deployed in practice. This lays the foundation for the third contribution: a review of the biggest challenges the modern DNS faces today and how they can be addressed. These challenges are (i) protecting the confidentiality and (ii) guaranteeing the integrity of the information provided in the DNS, (iii) ensuring the availability of the DNS infrastructure, and (iv) detecting and preventing attacks that make use of the DNS. Last, we discuss which challenges remain open, pointing the reader towards new research areas. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. Internet abusers associate with a depressive state but not a depressive trait.
- Author
-
Huang, Andrew Chih Wei, Chen, Huai‐En, Wang, Ying‐Chou, and Wang, Le‐Min
- Subjects
- *
INTERNET addiction , *MENTAL depression , *INTERNET users , *INTERNET , *MINNESOTA Multiphasic Personality Inventory , *AGGRESSION (Psychology) , *PHYSIOLOGY - Abstract
Aim The present study investigated three issues: (i) whether Internet abusers display a depressive state without a depressive trait; (ii) which symptoms are shared between Internet abuse and depression; and (iii) which personality characteristics were shown in Internet abusers. Methods Ninety-nine male and 58 female participants aged 18-24 years were screened with the Chen Internet Addiction Scale. After screening, subjects were separated into the high- ( n = 73) and low-risk ( n = 84) Internet abuser groups. Participants were respectively administered the Chinese version of the Beck Depression Inventory- II to assess a depressive state and the Minnesota Multiphasic Personality Inventory-2 to assess a depressive trait. Results The present results showed that high-risk Internet abusers exhibited a stronger depressive state than low-risk Internet abusers in the Beck Depression Inventory- II. However, high-risk Internet abusers didnot show a depressive trait in the Minnesota Multiphasic Personality Inventory-2 compared to low-risk Internet abusers. Therefore, high-risk Internet abuse participants exhibited a depressive state without a depressive trait. Conclusions In a comparison of the symptoms of depression and Internet abuse, it was found that high-risk Internet abuse participants shared some common behavioral mechanisms with depression, including the psychiatric symptoms of loss of interest, aggressive behavior, depressive mood, and guilty feelings. High-risk Internet abuse participants may be more susceptible to a temporal depressive state but not a permanent depressive trait. The present findings have clinical implications for the prevention and treatment of Internet abuse. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
26. ABUSE OF COMPUTER NETWORKS IN CYBER SPACE: THE ROLE OF FAMILY IN THE MODERN INFORMATION AGE.
- Author
-
Minić, Siniša G. and Spalević, Žaklina
- Subjects
- *
COMPUTER networks , *INTERNET , *ORAL communication , *SOCIALIZATION , *INFORMATION technology - Abstract
The Internet introduced a global change in the methods and speed of communication, exerting significant influence on the quality of life of a "common individual". This influence can be observed in all spheres of social life in our environment. Nevertheless, positive and constructive achievements of modern information technology also caused a series of problems related to the emergence and expansion of diverse forms of computer crime. This is a relatively new form of criminal behavior that exhibits major phenomenological diversity and that cannot be defined by a single definition. Even though certain definitions have been adopted, the phenomenon of cyber crime has appeared as a much broader concept. There are numerous documents that classify various forms of cyber crime. The fact is that uncontrolled and aimless use of the Internet implies numerous dangers. Internet abuse is often associated with pornography, which implies that various websites with illegal content also influence the long-term "poisoning" of children. Despite the primary and essential role of the parents, the support of all social segments is necessary in order to raise collective awareness through media and educational campaigns dedicated to youth and children, all for the purpose of providing information about potential Internet abuses and methods of safe usage. [ABSTRACT FROM AUTHOR]
- Published
- 2014
27. INTERNET ABUSE BY UNIVERSITY STUDENTS: A NEGLECTED THEME IN AFRICA.
- Author
-
Touray, Almamy
- Subjects
COMPUTER crimes ,COLLEGE student attitudes ,INTERNET & society ,INTERNET in education ,UNIVERSITIES & colleges - Abstract
The purpose of this paper is to investigate potential Internet abuse by university students, an area lacking research focus in Africa. A case study was conducted at the University of The Gambia (UTG) in 2012. A total of 200 questionnaires were randomly administered to UTG students and 181 valid responses were available for analyses. The result indicates that about 18% of UTG students use the Internet for unspecified activities, demonstrating attributes that could reveal potential Internet abuse. Considering the negative implications of this phenomenon, African researchers cannot afford to neglect this theme. [ABSTRACT FROM AUTHOR]
- Published
- 2013
28. The art of trolling law enforcement: a review and model for implementing ‘flame trolling' legislation enacted in Great Britain (1981–2012).
- Author
-
Bishop, Jonathan
- Subjects
- *
ONLINE trolling , *STATUTORY interpretation , *TELECOMMUNICATION , *SOCIAL networks , *CYBERBULLYING laws , *LAW enforcement , *EMAIL systems , *LEGAL status of internet users , *FREEDOM of speech - Abstract
The advancement of information and communications technology often results in early adoption, followed by concern over a digital divide, followed by mass adoption and then, inevitably, abuse and misuse of that platform. The most recent of these technologies is social networking services. The early adopters used Friendster and MySpace, and the masses now use Facebook and Twitter. The abuse of people on these platforms was called Cyberbullying in the case of the first two in the 2000s, and Internet trolling in the case of the second two in the 2010s. This paper reviews the legislation enacted in the UK parliament between 1981 and 2012 to deal with these offences, called ‘flame trolling’, for those based on transgress humour, or electronic message faults more generally. The paper presents a framework that includes a ‘Trolling Magnitude Scale’ based on established trolling culture, in order to link the legislative offences to the severities of those faults, as well as to the ability of specific Internet users to tolerate them or otherwise. The paper concludes that by using this framework law enforcement agencies such as the police can apply the laws more fairly and proportionally to protect free speech and at the same time be tough on the causes of electronic message faults in the form of Internet abuse and data misuse. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
29. Flow and Telepresence contributing to Internet Abuse: Differences according to Gender and Age.
- Author
-
Stavropoulos, Vasilis, Alexandraki, Kyriaki, and Motti-Stefanidi, Frosso
- Subjects
- *
CYBERBULLYING , *TELEPRESENCE , *INFORMATION & communication technologies , *TELECOMMUNICATION , *VIRTUAL communications , *COMPUTER crimes , *HIGH school students' conduct of life , *GENDER differences (Psychology) - Abstract
Highlights: [•] We examined whether and how Flow and Telepresence associate with Internet Abuse. [•] Second, we investigated gender and age differences in the three variables. [•] We tested 1609 high school students. [•] Flow and Telepresence significantly associated with Internet Abuse with Telepresence moderating flow. [•] Males were higher in Internet Abuse, Flow and Telepresence, while older adolescents scored higher in Telepresence. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
30. Keeping children safe in nurseries: A focus on culture and context.
- Author
-
Wonnacott, Jane
- Subjects
- *
CHILD care , *CHILD sexual abuse , *CHILDREN'S accident prevention , *CORPORATE culture , *INTERNET , *INTERPERSONAL relations , *PORNOGRAPHY , *POWER (Social sciences) , *SEX offenders , *WORK environment , *COMMUNITY support - Abstract
There have been few reported incidents of sexual abuse within nurseries until recently, when abuse has come to light as a result of investigations into online sexual offending. This paper uses information from serious case reviews to compare two of these incidents with a view to understanding the factors that might contribute to abuse taking place within nurseries. Information from the reviews points to the context and culture of the nursery environment being of key importance, particularly the degree to which relationships and the emotional health of the setting allow the offender to assume a position of power within the group. This has implications for the way in which nurseries are managed and regulated. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
31. Online Sexual Activity: Cross-National Comparison Between United States and Peruvian College Students.
- Author
-
Velezmoro, Rodrigo, Negy, Charles, and Livia, Jose
- Subjects
- *
COMPUTER sex , *COLLEGE students' sexual behavior , *SEXUAL intercourse - Abstract
The current generation of college students commonly uses the Internet for myriad sexually-related purposes. Yet, it has been suggested that usage of the Internet for sexual purposes might lead to psychological problems. In this study, undergraduate students from a public university in the U.S. ( n = 320) and Peru ( n = 251) completed questionnaires addressing their online sexual activity (OSA), psychological adjustment, and family environment and communication. Results indicated that Peruvians used the Internet significantly more than U.S. students to view sexually-explicit material (SEM), find sexual partners, and search for sex-related information. Men, irrespective of nationality, used the Internet to view SEM significantly more than women. Social support, religiosity, and erotophilia were found to moderate the relations between nationality and OSA. In absolute terms, both national groups, on average, engaged in OSA a relatively low number of hours each week. Further, no differences were found in maladjustment between those who engage in OSA and those who do not, suggesting that concerns over OSA are probably unwarranted. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
32. PREVENTION OF THE INTERNET ABUSE OF THE RISK GROUP TEENAGERS (12-14 YEAR-OLD) AT SCHOOL.
- Author
-
Klanienė, Ilona and Jokūbaitė, Rasa
- Subjects
INTERNET & children ,TEENAGER abuse ,LEISURE ,EMPIRICAL research ,COMPUTER literacy ,SATISFACTION - Abstract
The article reveals the phenomenon of the Internet abuse among the risk group teenagers, its reasons and caused problems. Also, it discusses the implementation of the prevention activities at school. The summarized scientific literature is illustrated by the results of the empirical investigation. The research has revealed that the risk group teenagers are more likely to abuse the Internet. It is determined by lack of parents' or tutors' control, their low computer literacy expertise, the teenagers' own problems (sense of loneliness, lack of meaningful free time activities). The results have also revealed that the Internet abuse prevention at school is not satisfactory: information is sufficient and there is a lack of attractive means of prevention, collaboration among school, family and community is not sufficient as well as teachers' competence. [ABSTRACT FROM AUTHOR]
- Published
- 2012
33. Internet Abuse among Teenagers and Its Relations to Internet Usage Patterns and Demographics.
- Author
-
Gencer, Suzan Lema and Koc, Mustafa
- Subjects
- *
INTERNET addiction , *INTERNET & teenagers , *RESEARCH on Internet users , *DEMOGRAPHIC surveys , *ACADEMIC achievement , *DIGITAL technology , *GENDER differences (Psychology) , *INTERNET - Abstract
This study focused on exploring Internet abuse among teenagers and its relations to some Internet usage patterns and demographic characteristics in a digitalizing country, Turkey. It was designed as a cross--sectional research on three types of school that differ in their academic performances. The data were collected from 1380 high school students through a paper--based questionnaire. The results identified a small portion of students as Internet abusers experiencing severe problems and one fourth as possible abusers experiencing occasional problems in their lives. Excessive use, tolerance, preoccupation with the Internet, and using the Internet to escape from negative feelings were the most frequently reported symptoms of disturbed patterns of online behaviors. One--way between--groups ANOVA tests revealed that Internet abuse differed significantly based on gender and perceived academic achievement with small effect sizes, and frequency of Internet use, dominant place of Internet use and dominant purpose for Internet use with medium and large effect sizes. On the contrary, no significant differences were found based on perceived socio--economic status and the type of school attended. [ABSTRACT FROM AUTHOR]
- Published
- 2012
34. Personality and Motivational Factors Predicting Internet Abuse at Work.
- Author
-
Chen, Jengchung V., Ross, William H., and Hsiao-Han Yang
- Subjects
- *
LOCUS of control , *MOTIVATION (Psychology) , *INTERNET addiction , *INTERNET searching , *ONLINE shopping - Abstract
The present study investigates whether a personality variable (Locus of Control) and motivational factors rooted in Uses & Gratifications theory (the desire for virtual community, beautiful websites, maintaining interpersonal relations, and the desire for diversion & entertainment) predict Internet abuse at work in the form of shopping, searching for information unrelated to work, and communicating with friends. Data were analyzed for 320 participants, all of whom were employed and had access to computers at work. Results indicate that external Locus of Control predicts all three forms of Internet abuse. The desire to use the Internet for diversion and entertainment purposes predicts only online shopping and searching for non-work-related information. Results suggest that factors predicting some forms of Internet abuse may not predict other forms of Internet abuse. Implications for research and practice are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2011
35. Cefaleia e abuso de internet: uma revisão narrativa
- Author
-
Pedro Augusto Sampaio Rocha-Filho and Tathiana Corrêa Rangel
- Subjects
Predictive validity ,Quality of life (healthcare) ,business.industry ,Mobile phone ,Vulnerability ,The Internet ,Narrative ,School absenteeism ,business ,Internet abuse ,Psychology ,Clinical psychology - Abstract
Contextualização: Entre os jovens, o prejuízo advindo da cefaleia implica em incapacidade, fracasso e absenteísmo escolar, além de maior vulnerabilidade às comorbidades. Neste contexto, o uso intensivo de telefone celular e do computador foram associados com hábitos insalubres. Pesquisas reforçam a validade preditiva da influência da dependência de internet nas condições físicas, no comportamento emocional e na qualidade de vida dos jovens. Poucos estudos associam o abuso de internet com a prevalência de cefaleia. Material e Métodos: O estudo foi uma revisão narrativa. Resultados: O uso excessivo do computador e de instrumentostecnológicos é considerado um impacto negativo na saúde física, podendo estar associado a sintomas somáticos, como cefaleias, depressão, dor musculoesquelética, fadiga e distúrbios de sono. Conclusões: Há necessidade de mais estudos para avaliar as características da cefaleia atribuída ao abuso de internet assim como o seu tratamento.
- Published
- 2018
- Full Text
- View/download PDF
36. Korzystanie z internetu a poziom lęku i radzenie sobie ze stresem uczniów w okresie adolescencji
- Author
-
Marzena Kowaluk-Romanek
- Subjects
Theology ,Internet abuse ,Psychology ,Anxiety state - Published
- 2018
- Full Text
- View/download PDF
37. Internet Abuse Intention at Workplace among Employees: A Malaysian Perspective
- Author
-
Sew Yong Sheng, M. Krishna Moorthy, Lee Xin Hui, Lee Mang Yin, Choo Wan Cing, Tan Wei Lin, and Chin Yoon Mei
- Subjects
business.industry ,Perspective (graphical) ,General Social Sciences ,Business ,Public relations ,Internet abuse ,General Economics, Econometrics and Finance ,General Business, Management and Accounting - Published
- 2018
- Full Text
- View/download PDF
38. Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems
- Author
-
Sadegh Torabi, Mourad Debbabi, Amine Boukhtouta, and Chadi Assi
- Subjects
021110 strategic, defence & security studies ,business.industry ,Computer science ,Domain Name System ,Big data ,0211 other engineering and technologies ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Replication (computing) ,Server ,0202 electrical engineering, electronic engineering, information engineering ,The Internet ,State (computer science) ,Electrical and Electronic Engineering ,business ,Internet abuse ,computer ,Strengths and weaknesses - Abstract
Despite the ubiquitous role of domain name system (DNS) in sustaining the operations of various Internet services (domain name to IP address resolution, e-mail, Web), DNS was abused/misused to perform large-scale attacks that affected millions of Internet users. To detect and prevent threats associated to DNS, researchers introduced passive DNS replication and analysis as an effective alternative approach for analyzing live DNS traffic. In this paper, we survey state of the art systems that utilized passive DNS traffic for the purpose of detecting malicious behaviors on the Internet. We highlight the main strengths and weaknesses of the implemented systems through an in-depth analysis of the detection approach, collected data, and detection outcomes. We highlight an incremental implementation pattern in the studied systems with similarities in terms of the used datasets and detection approach. Furthermore, we show that almost all studied systems implemented supervised machine learning, which has its own limitations. In addition, while all surveyed systems required several hours or even days before detecting threats, we illustrate the ability to enhance performance by implementing a system prototype that utilizes big data analytics frameworks to detect threats in near real-time. We demonstrate the feasibility of our threat detection prototype through real-life examples, and provide further insights for future work toward analyzing DNS traffic in near real-time.
- Published
- 2018
- Full Text
- View/download PDF
39. Perceived stress, sensation seeking, and college students’ abuse of the Internet
- Author
-
Velezmoro, Rodrigo, Lacefield, Katharine, and Roberti, Jonathan W.
- Subjects
- *
INTERNET addiction , *COLLEGE students , *SENSATION seeking , *REGRESSION analysis , *PSYCHOLOGICAL stress , *BOREDOM - Abstract
Abstract: College students (n =140) were examined to test whether sensation seeking and perceived stress would predict abuse of the Internet. Previous studies have found that disinhibition, boredom susceptibility, and total sensation seeking scores were related to Internet abuse (). Because stress has been documented to have a negative effect on students (), and may be linked to Internet use (), it was tested as a possible predictor of Internet abuse. This study also analyzed abuse of the Internet for sexual purposes, because sexuality is prevalent online, and college students are in an age of sexual exploration. Results of stepwise regression analyses revealed that disinhibition and total perceived stress were predictive of Internet abuse for sexual purposes, and perceived hopelessness and boredom susceptibility were predictive of Internet abuse for non-sexual purposes. Implications for students and Internet abuse are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
40. Internet Utilisation and Abuses in Selected Cybercafés in Ogun State, Nigeria.
- Author
-
Adetoro, 'Niram
- Subjects
- *
INTERNET users , *CYBERCAFES , *INTERNET access control -- Government policy , *INTERNET & teenagers , *STATISTICAL sampling - Abstract
The Internet provides numerous resources and services that enable communication, information sharing and improved research, innovation and productivity. However, alongside the positive uses of the Internet are also negative uses, which are of growing concern. This study investigated perceptions and experiences of positive and negative uses of the Internet among users of cybercafés in Ogun State Nigeria. Using survey research design and stratified random sampling technique, a questionnaire was designed and used to collect data from 765 Internet users and managers of 24 cybercafés selected by stratified sampling technique. The results showed that the major reasons for positive Internet uses are exchanging e-mail (85.1%), searching for research materials (68%), and web browsing and chatting (58.6%). Major users of the Internet in the cybercafés were students of higher institutions, job seekers, unemployed graduates, lecturers and other workers in higher institutions, secondary school students, and school leavers. These users reported that they had observed or been the targets of the following kinds of negative uses of the Internet: online fraud and deception (78% of the them), pornography (70.6%), chatting with dubious intent (64.7%), unauthorised access to files (55.6%), posting of provocative and sexually Afr. J. Lib, Arch. & Inf. Sc. Vol. 20, No. 1 (2010) 19 - 27 Internet Utilisation and Abuses in Selected Cybercafés in Ogun State, Nigeria suggestive photographs (54%), spamming (51.8%), overuse/addiction (51.5%), and use of harmful influence sites (50.6%). Respondents reported that Internet abusers were mainly students of higher institutions, unemployed graduates, school leavers, students in secondary school, and job seekers. The study recommends Internet education campaigns, Internet use policies, and monitoring and access control measures to combat Internet abuses in the country. [ABSTRACT FROM AUTHOR]
- Published
- 2010
41. A text mining approach to Internet abuse detection.
- Author
-
Chen-Huei Chou, Atish Sinha, and Huimin Zhao
- Subjects
TEXT mining ,INFORMATION retrieval ,INFORMATION storage & retrieval systems ,INTERNET ,FILTERING software ,WORK environment - Abstract
As the use of the Internet in organizations continues to grow, so does Internet abuse in the workplace. Internet abuse activities by employees-such as online chatting, gaming, investing, shopping, illegal downloading, pornography, and cybersex-and online crimes are inflicting severe costs to organizations in terms of productivity losses, resource wasting, security risks, and legal liabilities. Organizations have started to fight back via Internet usage policies, management training, and monitoring. Internet filtering software products are finding an increasing number of adoptions in organizations. These products mainly rely on blacklists, whitelists, and keyword/profile matching. In this paper, we propose a text mining approach to Internet abuse detection. We have empirically compared a variety of term weighting, feature selection, and classification techniques for Internet abuse detection in the workplace of software programmers. The experimental results are very promising; they demonstrate that the proposed approach would effectively complement the existing Internet filtering techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
42. Internet Use, Abuse, and Dependence Among Students at a Southeastern Regional University.
- Author
-
Fortson, Beverly L., Scotti, Joseph R., Chen, Yi-Chuen, Malone, Judith, and Del Ben, Kevin S.
- Subjects
- *
INTERNET addiction , *COMPUTERS & society , *MENTAL depression , *COLLEGE students' conduct of life , *MENTAL health ,SOUTHEASTERN University (Washington, D.C.) - Abstract
Objective: To assess Internet use, abuse, and dependence. Participants: 411 undergraduate students. Results: Ninety percent of participants reported daily Internet use. Approximately half of the sample met criteria for Internet abuse, and one-quarter met criteria for Internet dependence. Men and women did not differ on the mean amount of time accessing the Internet each day; however, the reasons for accessing the Internet differed between the 2 groups. Depression was correlated with more frequent use of the Internet to meet people, socially experiment, and participate in chat rooms, and with less frequent face-to-face socialization. In addition, individuals meeting criteria for Internet abuse and dependence endorsed more depressive symptoms, more time online, and less face-to-face socialization than did those not meeting the criteria. Conclusions: Mental health and student affairs professionals should be alert to the problems associated with Internet overuse, especially as computers become an integral part of college life. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
43. Profiling Cyber-Slackers in the Workplace: Demographic, Cultural, and Workplace Factors.
- Author
-
Ugrin, Joseph C., Pearson, J. Michael, and Odom, Marcus D.
- Subjects
- *
PERSONAL Internet use in the workplace , *EMPLOYEE attitudes , *SLACKERS , *INTERNET , *ATTITUDES toward work , *PROBLEM employees - Abstract
Internet abuse in the workplace (a.k.a. cyber-slacking) has become a pervasive problem for employers. When employees abuse the Internet through activities like online gaming, online shopping, personal investment managing, personal emailing, chatting, media watching and viewing pornography, they waste work time and reduce available bandwidth. Existing research has failed to build consensus about who is most likely to cyber-slack. This study examines individuals from the United States, Asia, and India and develops clusters of typical patterns of cyber-slacking and examines the impact of demographic and work related factors on predicting individual cluster membership. The results reveal that young executives are the most likely to cyber-slack and a further qualitative analysis reveals that the pressure of their jobs are compelling them to look for stress relievers and the Internet is an easy resource. In addition, young executive's high degree of autonomy also appears to perpetuate their propensity to cyber-slack. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
44. A Review of the Research on Internet Addiction.
- Author
-
Chou, Chien, Condron, Linda, and Belland, John C.
- Subjects
- *
INTERNET addiction , *PEOPLE with Internet addiction , *INTERNET , *COMPULSIVE behavior , *INTERNET users , *PSYCHOLOGISTS - Abstract
Research indicates that maladaptive patterns of Internet use constitute behavioral addiction. This article explores the research on the social effects of Internet addiction. There are four major sections. The Introduction section overviews the field and introduces definitions, terminology, and assessments. The second section reviews research findings and focuses on several key factors related to Internet addiction, including Internet use and time, identifiable problems, gender differences, psychosocial variables, and computer attitudes. The third section considers the addictive potential of the Internet in terms of the Internet, its users, and the interaction of the two. The fourth section addresses current and projected treatments of Internet addiction, suggests future research agendas, and provides implications for educational psychologists. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
45. The evolving sophistication of Internet abuses in Africa.
- Author
-
Ojedokun, Ayoku A.
- Subjects
- *
INTERNET , *WORLD Wide Web , *LIBRARIES & the Internet , *TECHNOLOGY , *COMPUTER network protocols , *INTERNATIONAL courts - Abstract
This paper discusses the evolving sophistication of the Internet and the World Wide Web abuses in Africa. It begins by reviewing known abuses worldwide. It also reviews the various technology solutions in place to reduce the abuses. The paper notes that the various security measures and protocols identified require human intervention based on trust. It argues that human behaviors are unpredictable, and that human trust cannot always be absolutely guaranteed as they can at any point in time compromise their integrity. The paper also notes on-going efforts of some African countries at updating their country laws. The author proposes the creation and enforcement of new international Laws that would compliment country laws and preserve basic civil rights in the electronic environment as a way of bringing sanity into the use of the Internet and the World Wide Web. Such Laws must particularly incorporate measures that would prevent governmental abuses. The paper also suggests the formation of a separate international court with exclusive jurisdiction over the Internet. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
46. Internet Abuse: Addiction? Disorder? Symptom? Alternative Explanations?
- Author
-
Morahan-Martin, Janet
- Subjects
- *
INTERNET addiction , *INTERNET , *SEXUAL dysfunction , *PEOPLE with Internet addiction , *SOCIAL isolation - Abstract
As Internet use has proliferated worldwide, there has been debate whether some users develop disturbed patterns of Internet use (i.e., Internet abuse). This article highlights relevant literature on Internet abuse and computer-mediated communication effects that supports and disputes major questions about Internet abuse. Is the addiction paradigm appropriate for Internet use? Is behavior that has been labeled Internet abuse symptomatic of other problems such as depression, sexual disorders, or loneliness? What are alternative explanations for this phenomenon? Is there adequate research to sup- port Internet abuse as a distinct disorder? [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
47. Young Adults' Internet Use and their Relationships with their Parents
- Author
-
Esufali, Thomas and Chuang, Susan
- Subjects
Internet Addiction ,PIU ,Internet Abuse ,Internet dependence - Abstract
This study explored problematic Internet use (PIU) among Canadian female young adults (YAs) within a University setting (i.e., undergraduate) and its influence on their relationships with their mothers and fathers. More specifically, the focus of this study was on YAs’ perceptions of their parents’ level of monitoring, communication, and conflict and how these constructs were related to PIU. Data were obtained using an online questionnaire filled out by 98 female University students, who were between the ages of 18 and 25. Findings indicated that YAs who showed signs of PIU experienced both higher levels of perceived conflict and monitoring with both mother and fathers. Similar with previous research, it was found that regardless of YAs’ levels of PIU, YAs’ perceived that they were monitored more by their mothers than their fathers. More research needs to be conducted as PIU is a growing concern, not only with the YA cohort, but also among other age groups, as technology and social media increasingly becomes an important part of everyday lives.
- Published
- 2020
48. Sensation seeking and internet dependence of Taiwanese high school adolescents
- Author
-
Lin, Sunny S.J. and Tsai, Chin-Chung
- Subjects
- *
SENSATION seeking , *INTERNET addiction - Abstract
The present study examined excessive Internet use of Taiwanese adolescents and a psychological aspect of users, sensation seeking, thus to differentiate motivation of Internet dependents and non-dependents. Seven hundred and fifty three Taiwanese high school students were selected using cluster sampling and 88 of them were categorized as Internet dependent users. Results indicated that Internet dependents spent more time on-line than non-dependents. While Internet dependents perceived significantly more negative Internet influences on daily routines, school performance, and parental relation than non-dependents, both Internet dependents and non-dependents viewed Internet use as enhancing peer relations. Making friends through the Internet has become a popular activity among adolescents, potentially leading to its excessive use. Internet dependents scored significantly higher on overall sensation seeking and disinhibition than Internet non-dependents. However, both groups did not differ in the life experience seeking subscale and thrill and adventure seeking subscale. This finding contradicts that of Lavin, Marvin, McLarney, Nola, and Scott [CyberPsychol. Behav. 2 (2000) 425]. Possible reasons for this discrepancy and for the relation between Internet dependence and disinhibition in Taiwanese adolescents are also discussed. [Copyright &y& Elsevier]
- Published
- 2002
- Full Text
- View/download PDF
49. Commentary on ''Contrasting Case Studies of Frequent Internet Use: Is It Pathological or Adaptive?''.
- Author
-
Grayson, Paul A. and Schwartz, Victor
- Subjects
- *
INTERNET users , *COMPULSIVE behavior , *SUBSTANCE abuse , *IMPULSE control disorders , *PERSONALITY disorders , *THERAPEUTICS , *COMPULSIVE gambling , *GAMBLING behavior , *PSYCHOTHERAPY - Abstract
Leon and Rotunda are right to call attention to the problems associated with excessive computer and Internet use and to the computer's potential for both adaptive and maladaptive consequences. To decide when computer use is a problem, it makes sense to adapt criteria used for pathological gambling and substance abuse. Although excessive computer use is a new problem on the college psychotherapy scene, the psychological issues underlying this problem are familiar ones: the struggles for intimacy, self-understanding, identity and selfworth. [ABSTRACT FROM PUBLISHER]
- Published
- 2000
- Full Text
- View/download PDF
50. Nontechnical Deterrence Effects of Mild and Severe Internet Use Policy Reminders in Reducing Employee Internet Abuse
- Author
-
Roberto J. Mejias and Morgan M. Shepherd
- Subjects
Longitudinal study ,Internet use ,education ,05 social sciences ,Applied psychology ,Human Factors and Ergonomics ,02 engineering and technology ,Audit ,Computer security ,computer.software_genre ,Computer Science Applications ,Human-Computer Interaction ,Acceptable use policy ,020204 information systems ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,050211 marketing ,Deterrence theory ,Business ,Severity level ,Internet abuse ,computer - Abstract
This two-stage longitudinal study examines how employee Internet abuse may be reduced by nontechnical deterrence methods, specifically via organizational acceptable use policies (AUPs). This study used actual employee usage and audit logs (not self-reporting survey measures) to monitor the web activity of employees. In stage 1, a mild AUP reminder sent to company employees resulted in a 12% decrease in employee Internet abuse. In stage 2, a more severe AUP reminder resulted in a 33% decrease in employee Internet abuse. For both stages, the AUP warning (regardless of severity level) resulted in an immediate and significant decrease in employee nonwork Internet use. Results indicate that the severe AUP treatment was more effective in reducing and maintaining lower levels of employee nonwork Internet use than the mild AUP treatment. Under the mild AUP treatment, employee nonwork Internet use levels returned to their pretreatment levels after only one week. However, under the severe AUP treatment, emp...
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.