Parental mediation of young children’s internet use: Adaptation of parental mediation scale and review of parental mediation based on the demographic variables and digital data security awareness

2019 ◽  
Vol 25 (3) ◽  
pp. 2275-2296
Author(s):  
Aykut Durak ◽  
Hüseyin Kaygin
2020 ◽  
Vol 11 (2) ◽  
pp. 161-170
Author(s):  
Rochman Hadi Mustofa

AbstractBig Data has become a significant concern of the world, along with the era of digital transformation. However, there are still many young people, especially in developing countries, who are not yet aware of the security of their big data, especially personal data. Misuse of information from big data often results in violations of privacy, security, and cybercrime. This study aims to determine how aware of the younger generation of security and privacy of their big data. Data were collected qualitatively by interviews and focus group discussions (FGD) from. Respondents were undergraduate students who used social media and financial technology applications such as online shopping, digital payments, digital wallet and hotel/transportation booking applications. The results showed that students were not aware enough and understood the security or privacy of their digital data, and some respondents even gave personal data to potentially scam sites. Most students are not careful in providing big data information because they are not aware of the risks behind it, socialization is needed in the future as a step to prevent potential data theft.


2014 ◽  
Author(s):  
Juan Ignacio Martínez de Morentin ◽  
Alejandra Cortés ◽  
Concepción Medrano ◽  
Pedro Apodaca

2020 ◽  
Vol 16 (1) ◽  
pp. 1
Author(s):  
Shubham Shrimali ◽  
Aadarsh Kumar ◽  
K.John Singh
Keyword(s):  

2015 ◽  
Vol 14 (10) ◽  
pp. 6184-6189
Author(s):  
Himanshu Gupta ◽  
Kapil Chauhan

In today's society, data security is the big problem for every business organization or an individual. Most found threat is theft of personal data and information. With time digital data become more prevalent, personnel try to secure their information by using highly encrypted passwords and authentication identities, but, the misuse and theft of these security measures are rising in lot of theft cases Taking advantage of security flaws in authentication identities ends up in cards being duplicated or counterfeited and hence misused. This increasing fight with cyber security has been the sole reason of  making  biometric security systems, the  important area of concern is that how do  one can implement the biometric security for increasing of data security.  First unique feature which is found different in every human is Fingerprints; Humans have used fingerprints for personal identification. Presently, most of the organisation use  fingerprint recognition for authentication process  it is one of the oldest and most commonly used biometrics, with high accuracy & generally easy and efficient and fast.  In this paper we propose the idea to use fingerprint recognition along with the user authentication password or to access the data or information. Since the only person who can access information is the person linked to it, no thief can gain access. It also makes your data, very hard for cyber criminals to hack into.


2021 ◽  
Vol 12 ◽  
Author(s):  
Yu Tian ◽  
Tengfei Zuo ◽  
Qianqian Sun ◽  
Lu Sun ◽  
Sheng Cao ◽  
...  

This study had two aims: to test the effect and the effect size of specific problematic Internet use (SPIU) [online shopping, online pornography, social network site (SNS) usage, and Internet gaming] on generalized problematic Internet use (GPIU) and to reveal the gender differences in GPIU and SPIU for students from the elementary school level to the university level. In total, 5,215 Chinese students (2,303 males, mean age = 16.20 years, range = 10–23 years) from four types of schools (elementary school, junior high school, senior high school, and university) provided self-report data on demographic variables (gender and educational levels), online shopping, online pornography, SNS usage, Internet gaming, and GPIU. After calculations had been controlled for demographic variables, the results indicated that (i) online shopping, online pornography, SNS usage, and Internet gaming positively predicted GPIU—and Internet gaming was the most critical predictor of GPIU—and that (ii) gender differences were revealed in Internet gaming and GPIU in all educational levels, except at senior high school where the gender differences in GPIU were not significant. Significant gender differences were found for online shopping and online pornography for all educational levels above elementary school. These results provided further understanding of the association between GPIU and SPIU and gender differences in PIU, which suggested that gender differences across different educational levels should be considered in interventions of PIU.


Compiler ◽  
2014 ◽  
Vol 3 (1) ◽  
Author(s):  
Cakra Aminuddin Hamka ◽  
Haruno Sajati ◽  
Yuliani Indrianingsih

Along with the development of current technology, making technology is very important in today's life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access.


Sign in / Sign up

Export Citation Format

Share Document