scholarly journals e-Guardian testavimo sistemos ypatumai ir testų rezultatų analizė

2013 ◽  
Vol 66 ◽  
pp. 123-134
Author(s):  
Renata Danielienė

Pastaruoju metu kompiuteriai ir įvairūs mobilieji įrenginiai yra naudojami namuose, darbe, mokykloje ir pan. Dauguma gyventojų turi prieigą prie interneto, ieško informacijos, ją skelbia, bendrina, siunčiasi įvairius failus ir naudojasi kitomis e-paslaugomis. Tačiau internetu naudojasi ne tik geranoriškai nusiteikę žmonės, e. erdvėje slypi ir įvairių pavojų – internetiniai nusikaltimai, apgavystės, virusai ir pan. Apie interneto pranašumus ir trūkumus privalo žinoti kiekvienas kompiuterio vartotojas nepriklausomai nuo amžiaus. Tam tikslui buvo sukurta e. saugumo programa e-Guardian. Straipsnyje aprašomos dvi e-Guardian versijos, skirtos tėvams ir mokytojams. Taip pat pateikiamas e-Guardian testų konstravimo būdas, naudojamas automatizuotoje testavimo sistemoje. Straipsnyje pateikiami e-Guardian v.2 žvalgomojo testavimo, atlikto Lietuvoje ir Latvijoje, rezultatai. Aprašomi testavimo sistemos projektavimo etapai, ypatumai ir pateikiamos e-Guardian testo tobulinimo rekomendacijos.Pagrindiniai žodžiai: e. saugumas, kompiuterinis testavimas, testavimo sistema, e-Guardian.Features of e-Guardian testing system and analysis of test results Renata Danielienė  SummaryThe advantages of the Internet are well known as well as the importance of Internet usage for communication (email, instant messages), for exchange of shared information in the Intranet, on clouds. Social networks are used for communication and advertisement. Many people share their personal information on the Internet with a good intention. But people, and especially teachers, must know when use of the Internet is an advantage and when it becomes dangerous. For this purpose, two e-safety programmes were created and approved by ECDL Foundation for IT professionals and teachers.In this paper, there are presented the method of e-Guardian test construction and the features of the e-Guardian testing system, pilot testing results are analyzed, the design of testing the system and recommendations for improving the e-Guardian test are described.1pt; line-height: 115%; font-family: Calibri, sans-serif;"> 

Author(s):  
Kai Zheng ◽  
Akhilesh Bajaj ◽  
Beth Osborne Daponte ◽  
John B. Engberg

How people use the Internet is an intriguing question to researchers, computer educators, Internet content providers (ICPs), and marketing practitioners. With the expansion of online information resources and the improvement of connection bandwidth, Internet users have been offered more and more choices, at the same time, faced with more and more dilemmas on how to allocate their time and energy online. How much time do people spend on surfing the Internet? What do they do? Are there any traceable patterns to interpret the Internet behavior and to predict future use based on people’s demographic, social, or psychological characteristics? These are all interesting questions that researchers attempt to answer. In 1995, the HomeNet project conducted at the Human Computer Interaction Institute, Carnegie Mellon University, launched a series of field studies to examine the residential Internet behavior. It has found that social demographics—generation, race and gender, rather than socioeconomic factors—income, education—and psychological factors—like social extraversion and attitude toward computing—were major influences on use (Kraut, Scherlis, Mukhopadhyay, Manning, & Kiesler, 1996). Following the HomeNet project’s initial attempt, many empirical studies have been conducted globally to study the Internet behavior and its driving factors. Among these efforts, a noticeable focus is to resolve the long-lasting controversy, inherited from the similar debate of computer behavior studies, on how gender differences influence the way people use the Internet. Many researchers believe that females are less technology-inclined, less motivated, and therefore less competent in the masculine computer and Internet culture; on the other hand, some other researchers argue females have the ability to be proficient in use of the Internet. The present study is thereby conducted to provide more empirical evidence of gender effects on Internet usage and task preferences. In particular, we are interested in examining gender influences when users’ computer proficiency is controlled for. We believe that the results of this study can provide valuable insights into effective online content delivery, targeted marketing strategies, and customized computer education to encourage use. The close examination of people’s actual surfing data can also contribute to a better understanding of how the Internet is actually utilized. The next section describes the debate about how women and men respond in different ways to computers and the Internet. This is followed by a presentation of our study design: the monitoring software, the content classification schema and method, and the user population that we studied. The findings are presented next, followed by concluding remarks.


2011 ◽  
Vol 39 (10) ◽  
pp. 1425-1430 ◽  
Author(s):  
Vesile Oktan

The relationship between emotion management skills and the use of the Internet was examined in this study to determine whether or not the emotion management skills of university students are a predictor of Internet addiction. The study was conducted in the 2008/2009 academic year with 345 students from different departments of a university in Turkey. Data were collected using the Emotion Management Skills Inventory (Çeçen, 2006) and the Problematic Internet Usage Scale (Ceyhan, Ceyhan, & Gürcan, 2007). Results of regression analysis showed that the total measure of emotion management skills predicted the levels of Internet addiction.


2018 ◽  
Vol 19 (2) ◽  
pp. 191
Author(s):  
Amerti Irvin Widowati ◽  
Linda Ayu Oktoriza Surjawati

<p><em>The purpose of this study is to determine the determinants of the use of the Internet as a medium of literature sources by students of master programs. Data were collected from 300 students of Accounting Program of Semarang University by survey method. Data were analyzed using Partial Least Square (PLS) application. The results of this study indicate that the perception of ease, perception of internet content, and the personality of openness have a significant positive influence on internet usage. While the perception of usability has no significant effect on internet usage. The result of this research can have implication to the lecturer as well as the decision maker about the perception of the student about the internet usage as the literature source. In addition the lecturers can describe the behavior of students who have a tendency to use the internet.</em></p>


2021 ◽  
Author(s):  
◽  
Dale Stephens

<p>The Internet has rapidly become the world’s most prevalent form of communication. It can be accessed twenty-four hours a day from virtually any location in the world from a myriad of technologically savvy devices. Internet users can keep up to date with world events, watch movies, listen to music, interact with government agencies, analyse business trends, undertake research and maintain contact with people anywhere. The Internet also provides the ability for users to shop ‘online’ with virtually any product or service supplier anywhere in the world. This has created concerns regarding the use of personal information obtained through the medium of the Internet. An individual’s right to privacy is a right enshrined in legislation and through tort law. With the uptake of technology and the burgeoning use of the Internet the subject of online privacy has become a complex issue for law and policy makers both in New Zealand and internationally. The aim of this paper is to look at the online shopper or consumer and how their information could be protected. This paper looks at the key areas of privacy legislation, the storage of data and the rise of new technologies including ‘cloud’ computing and suggests that the complexity of online privacy is such that a different approach to access and use of personal information of online shoppers may be required. The rate of technology change, the enormity of the data capture situation and the international accessibility of the Internet are all factors that create an almost impossible situation for ensuring consumer privacy so this paper proposes that the onus moves away from the law and policy makers and put into the hands of the users of the Internet.</p>


2020 ◽  
Vol 7 (1) ◽  
pp. 118-124
Author(s):  
Apu Chandra Das ◽  
Aninda Roy ◽  
Md Sakib Ibne Salam

As the COVID-19 pandemic is spreading and becoming more contagious, people tend to stay home and face mental health challenges such as anxiety, fear, nervousness, and loneliness. In this time, students are using the internet heavily for their study purpose, and jobholders are for their official works. At the same time, the use of the internet might be a relief from those mental challenges. This manuscript assesses a correlation between daily internet usage before and during COVID-19 and found to be nearly strong positive (r=0.66). Then we determine the potential factors affecting daily internet usage during COVID-19 among Bangladeshi students and jobholders who are currently living in Dhaka city by the ordinary least square (OLS) regression method. Our results underpin that the type of internet, regular internet usage before COVID-19, and the effect of internet usage on the study are significantly affecting current internet usage.


Author(s):  
Edward J. Szewczak

The collection of personal information by electronic technology (e-technology) and the possibility of misuse of that information are primary reasons why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of e-technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, and PC software. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly e-technology is global in nature and poses challenges and issues for societies around the world.


Author(s):  
Edward J. Szewczak

Concerns about the collection of personal information by Internet technology and the possibility of misuse of that information are a primary reason why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, hardware and software watermarks, and biometric devices. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly the technology is global in nature and poses challenges and issues for societies around the world.


2020 ◽  
Vol 16 (12) ◽  
pp. 64
Author(s):  
Wejdan Suleiman Irtaimeh

This study deals with the issue of criminal protection of privacy in the Jordanian Cybercrime Law No. 27 of 2015, as the great developments in computer technologies and the widespread use of the Internet have led to the emergence of new forms of electronic crimes related to the protection of the privacy of individuals. The study indicated that the Jordanian legislator did not include in the Jordanian Constitution or in the Cybercrime Law any definition of the right to privacy that delineates its boundaries and clarifies its features. The study concluded that the Cybercrime Law was ambiguous in some of its articles, especially those related to the protection of the right to privacy. The Jordanian legislator did not include special provisions that explicitly criminalize assault on privacy, as it included provisions for other crimes that include assault on this right, which made it lose clarity, precision and accuracy of wording. Moreover, such provisions omitted other forms of electronic crimes related to the right to privacy, which constituted a legislative deficiency. The study concludes that there is a need to amend the Cybercrime Law No. 27 of 2017 and to have explicit provisions that stipulate the criminalization of assault on privacy, as well as the need to issue a special law to protect the personal information of individuals.


Low internet usage by extension agent, impact on the inhibition of the flow of information to the farmers and lead to the income received by farmers. In the digital era today, if the extension agent is not encouraged to use the internet then they will be left behind and will be left out by the farmers. This study aimed to (1) analyze the internet availability in Lampung Province (2) to analyze the level of internet usage for extension agent in Lampung and (3) to analyze factors influencing internet usage of extension agent. This research was conducted in Lampung Province with analysis unit of extension agent in the office of BP3K (Extension Agency of Agriculture, Fisheries, and Forestry) which has been facilitated by computer and internet network. Respondents consisted of 355 extension agent served in BP3K. Multiple Linear Regression Analysis was used to determine the effect of independent variables on the dependent variable. The availability of facilities and internet network in Extension Offices is not sufficient even extension agent used their private facilities. The Internet network had reached the remote areas very well in spreading and transmitting information. Almost all extension agent have internet-connected devices and internet-based applications. Extension agents facilitated by computer and internet network communicating using social media, however capabilities in using the internet to search information related agricultural technology remained low. The use of the internet by extension agent was influenced by the nature of internet innovation, the number of Internet-based applications and the amount of existed hardware.


2020 ◽  
Vol 12 (4) ◽  
pp. 290-300
Author(s):  
Khairi Ghet Elghadafi Elgharnah ◽  
Fezile Ozdamli

Internet security safety awareness of parents is an important issue that should be addressed to raise the knowledge and awareness level about internet risks, information privacy, personal information, safety concerns and online attacks among parents to be able to teach their children to keep safe use on the internet.  This study amid to investigate the awareness of parents towards the safe use of the internet. A questionnaire was created by researchers for this aim.  A survey sample was conducted contains items of the characteristics of internet security and safety. A total of 252 participants who their children study at Near East Libyan School were targeted in this study. 116 of the participants are males and 136 are females. The average age of participants is 27.  Data were collected and analyzed by using SPSS software. Parametric tests were applied to collected data according to statistical analysis. Results are confirmed that parents’ awareness towards the safe use of the internet is medium level. Also, there is no statistically significant difference between relative relationship variables and all dimensions of the questionnaire. Seminars should be organized for information about online privacy information on websites and how to create strong passwords for their children’s online accounts.   Keywords:  Internet security; parents; safe internet


Sign in / Sign up

Export Citation Format

Share Document