Search results for "internet"
showing 10 items of 2589 documents
Supporting Dispute Handling in E-Commerce Transactions, a Framework and Related Methodologies
2004
An E-commerce transaction is a means to conduct particular commercial activities using the global digital E-commerce infrastructure. We concentrate here on business to customer (B-to-C) E-commerce transactions. These transactions are based on protocols offered by the global infrastructure, primarily the Internet. Using electronic means to do business can greatly improve the efficiency of the business transactions. It, however, poses some problems that were rarely considered to be important before. One class of problems is caused by the behavior of untrusted participants. For reasons such as dishonesty, disputes may arise. In the general case, when a dispute arises an untrustworthy participa…
A Map-Based Visualization Tool To Support Tutors In E-Learning 2.0
2009
Web 2.0 regards essentially the social issues about the new usage of web applications, but participative web and user generated contents induce a new way to think about the design of the web applications themselves. This is particularly true in the field of educational systems that are all web based applications. Many researchers are now devoted to study what is called e-learning 2.0 both as regards the technological issues in the field of computer science, and in relation to the impact of the web 2.0 social and psychological issues on the education process itself. One of the most crucial topics in e-learning 2.0 is the way to provide support to the teacher/tutor to avoid cognitive overload…
Measuring Internet Gaming Disorder and Gaming Disorder: A Qualitative Content Validity Analysis of Validated Scales
2021
Numerous instruments have been developed to measure gaming-related health problems based on “internet gaming disorder” (IGD) in the third section of the Diagnostic and Statistical Manual of Mental Disorders (5th ed.) and “gaming disorder” (GD) in the International Classification of Diseases (11th rev.). However, the criteria in the manuals tend to be operationalized in numerous diverse ways, which can make screening outcomes incomparable. A content validity analysis is needed to reassess the relationships between the diagnostic criteria and the items that operationalize them. The IGD and GD criteria were divided into sematic components. A qualitative content validity analysis was carried o…
Distributing Storage in Cloud Environments
2013
Cloud computing has a major impact on today's IT strategies. Outsourcing applications from IT departments to the cloud relieves users from building big infrastructures as well as from building the corresponding expertise, and allows them to focus on their main competences and businesses. One of the main hurdles of cloud computing is that not only the application, but also the data has to be moved to the cloud. Networking speed severely limits the amount of data that can travel between the cloud and the user, between different sites of the same cloud provider, or indeed between different cloud providers. It is therefore important to keep applications near the data itself. This paper investig…
An Investigation of Security and Privacy for Human Bond Communications
2017
Self-establishing a Service Level Agreement within Autonomic Cloud Networking Environment
2014
International audience; Today, cloud networking which is the ability to connect the user with his cloud services and to interconnect these services within an inter-cloud approach, is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). Several research works have been proposed for the SLA establishing in cloud computing, but not in cloud networking. In this paper, we propose an architecture for self-establishing an end-to-end service level agreement between a Cloud Service User (CSU) and a …
Autonomic Brokerage Service for an End-to-End Cloud Networking Service Level Agreement
2014
8 pages; International audience; Today, cloud networking which is the ability to connect the user with his cloud services and to interconnect these services within an inter-cloud approach, is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) assurance and management in conformance with a corresponding Service Level Agreement (SLA). In this paper, we propose a framework for self-establishing an end-to-end service level agreement between a Cloud Service User (CSU) and multiple Cloud Service Providers (CSPs) in a cloud networking environment using brokerage service. We focus on Qo…
Gender differences in internet addiction: A study on variables related to its possible development
2023
Internet addiction and its related variables (i.e., internet gaming addiction, social media addiction, fear of missing out, phubbing) have mostly been investigated in the general population without considering possible gender differences. The present study aimed to investigate the specific characteristics of men and women in the possible development of pathological behaviors related to internet addiction. A total of 276 participants (of ages ranging from 18 to 30 years old) were recruited in the study (46.7% were males) and responded to online questionnaires on variables related to internet addiction and psychological traits. The results showed that gender represents a key factor in explain…
Internet Addiction and Internet Gaming Disorder
2020
Several forms of excessive pathological Internet use, such as Internet addiction (IA), Internet gaming disorder (IGD), or gaming disorder (GD) are perceived as public health concerns. IGD was included in the Diagnostic and Statistical Manual of Mental Disorders (DSM-5) as a research diagnosis and recently GD was announced for the International Classification of Disease (ICD-11). IA represents a variety of excessive and unregulated consumption of video games, social networking, chat rooms, use of online pornography, online gambling, or the aimless gathering and research of information. The outpatient treatment program Short-Term Treatment of Internet and Computer Game Addiction (STICA) aims …
Family Relationships and Cyberbullying
2015
This chapter analyzes the relationship between family and cyberbullying, a type of technological harassment among peers which is of growing concern in the scientific community and in today’s society. First, this chapter discusses factors associated with family functioning that may predict cyberbullying, particularly the family climate (cohesion, expressivity, and conflict) and parent–children communication. It also examines the role of parental socialization styles and their continuity with parental styles on the Internet: authoritarian style, laissez-faire, permissive and authoritative. In relation to parental styles, one section in this chapter describes the parental monitoring of Interne…