scholarly journals Perilaku Penggunaan Aplikasi Sitasi Mahasiswa (Studi Kasus di Program Studi Pascasarjana Fikom Unpad 2018)

Author(s):  
Risa Nurisani ◽  
Eko Retno Wulandari ◽  
Yanti Sundari

Segala bentuk kutipan yang dicantumkan penulis di dalam tulisannya perlu dicantumkan sitasi dan referensinya. Melalui penggunaan aplikasi sitasi, penulis dimudahkan dengan bank data bibliografi dan pencantuman daftar pustaka. Studi ini menjabarkan perilaku penggunaan aplikasi sitasi mahasiswa program studi magister Ilmu Komunikasi Fikom Unpad 2018 sebanyak 49 orang. Hasil studi menunjukkan bahwa hanya setengah dari jumlah total mahasiswa yang telah aktif menggunakan aplikas sitasi. Mendeley adalah aplikasi sitasi yang paling banyak digunakan dibanding aplikasi sitasi lainnya. Alasan utama mahasiswa lainnya belum menggunakan aplikasi sitasi adalah perlunya pendampingan dan mereka terbiasa mencantumkan sitasi secara manual. Hampir sebagian dari mereka mulai menggunakan aplikasi sitasi baru-baru ini yaitu saat mengambil perkuliahan magister dan disarankan oleh dosen di kelas. Sedangkan kesulitan dirasakan mahasiswa pada awal penggunaan aplikasi sitasi. Studi juga mengungkapkan kelebihan dan kekurangan dari aplikasi yang digunakan, serta saran dan harapan mahasiswa terkait penggunaan aplikasi sitasi. Mendeley sebagai aplikasi sitasi yang paling banyak digunakan dinilai mudah setelah sering digunakan, dapat menyimpan file artikel yang telah diunduh, otomatis membaca metadata file yang diunggah di dalam Mendeley, dan dapat menelusur referensi yang telah ada di Internet melalui Mendeley. Namun kekurangannya adalah pengguna perlu memahami perlunya parafrase dan penulisan kapitalisasi metadata pada gaya sitasi yang disyaratkan, memerlukan akses internet untuk sinkronisasi data, dan sering error. Sedangkan saran dan harapan terkait penggunaan aplikasi sitasi ini di antaranya adalah perlunya diagendakan pelatihan dan pendampingan penggunaan aplikasi sitasi secara intensif di awal perkuliahan serta perlunya mahasiswa membiasakan diri dalam menggunakan aplikasi sitasi.All forms of quotations that the author lists in his writing need to include citations and references. Through the use of citation applications, the author is facilitated with bibliographic data banks and the inclusion of bibliography. This study outlines the behavior of 49 people using the citation application for 2018 Unpad Communication Science students in Master of Communication Science. The results of the study show that only half of the total number of students who have been active uses citation applications. Mendeley is the most widely used citation application compared to other citation applications. The main reason other students have not used the citation application is the need for mentoring and they are accustomed to listing citations manually. Nearly some of them started using the citation application recently, namely when taking master lectures and suggested by lecturers in the class. While the difficulties felt by students at the beginning of the use of citation applications. The study also revealed the advantages and disadvantages of the application used, as well as suggestions and expectations of students regarding the use of citation applications. Mendeley as the most used citation application is considered easy after being used frequently, can save downloaded article files, automatically reads the metadata of files uploaded in Mendeley, and can search for references that already exist on the Internet through Mendeley. But the disadvantage is that users need to understand the need for paraphrasing and writing capitalization of metadata in the required citation styles, requiring internet access for data synchronization, and frequent errors. While the suggestions and expectations related to the use of this citation application include the need to schedule training and assistance in the use of intensive citation applications at the beginning of the lecture and the need for students to get used to using the citation application.

Author(s):  
Indriati Retno Palupi ◽  
Wiji Raharjo

There Change the design of the studying process in University during the covid-19 pandemic from face to face to online learning needs some tools to support it. Some tools coming with their own advantages and disadvantages. One of them is Zoom. It becoming tools liked by many lecturers and college students because easy installation process and complete features although it is not free and easy to hack. Nevertheless, internet access is still becoming a big problem in online learning. A mix between two tools of online learning is one of the solutions, for example, zoom and google classroom application. Zoom is used for virtual communication in online learning but it does not provide features for sending the assignment. Otherwise, google classroom provides features to send and receipt some assignments, and it can save the quote on the internet. Both of them will complete each other to support all needs in online learning.


2015 ◽  
Vol 5 (2) ◽  
pp. 68
Author(s):  
Mirsat Yeşiltepe ◽  
İrem Yılmaz ◽  
Muhammet Kurulay

<p>Which enables a user to specific conditions required by the relevant system that lets users connect to determine if the user is defined is the concept of authentication [1]. The authentication uses is very wide[2][3]. One of these is the use of accessing internet. Only certain users can use the generated web service objective in this area it is. The aim of this study was to compare students and staff in universities in Turkey internet access methods. The data were generated by contacting the university. In this way, universities can not work on which of the authentication methods they use to access the Internet, the use of which for the main purpose of the method of talking about the advantages and disadvantages of the university is to find out better.</p><p> </p><p>Keywords: active directory, authentication, kerberos, XML</p>


10.28945/2926 ◽  
2005 ◽  
Author(s):  
James N. Morgan ◽  
Craig A. VanLengen

The divide between those who have computer and Internet access and those who do not appears to be narrowing, however overall statistics may be misleading. Measures of computer availability in schools often include cases where computers are only available for administration or are available only on a very limited basis (Gootman, 2004). Access to a computer and the Internet outside of school helps to reinforce student learning and emphasize the importance of using technology. Recent U.S. statistics indicate that ethnic background and other demographic characteristics still have substantial impact on the availability and use of computers by students outside of the classroom. This paper examines recent census data to determine the impact of the household on student computer use outside of the classroom. Encouragingly, the findings of this study suggest that use of a computer at school substantially increases the chance that a student will use a computer outside of class. Additionally, this study suggests that computer use outside of the classroom is positively and significantly impacted by being in a household with adults who either use a computer at work or work in an industry where computers are extensively used.


Author(s):  
Courtney Deine-Jones

As more libraries offer patron access to the Internet and other on-line services, they must consider the needs of patrons with disabilities who will be using their Internet links either from the library or from remote sites. In planning and implementing technological improvements to optimize access for all patrons, librarians and information specialists must take into account questions of both physical and intellectual access to electronic information. This paper addresses these issues from a pragmatic perspective, reviewing available options and suggesting strategies for improving access for people with various disabilities.


2020 ◽  
Vol 3 (2) ◽  
pp. 342-350
Author(s):  
Suparna Parwodiwiyono

Abstrak: Bagi generasi pasca milenial penggunaan internet sangat akrab tetapi dengan berbagai tujuan penggunaan. Penelitian ini ingin melihat keterkaitan penggunaan internet oleh penduduk yang sedang sekolah untuk kepentingan penyelesaian tugas sekolah di Indonesia untuk mendapatkan hasil belajar yang baik. Analisis berdasarkan data sekunder dari Survei Sosial Ekonomi Nasional tahun 2018. Hanya saja data yang didapatkan tidak simetris dengan adanya pencilan. Regresi kuantil digunakan untuk meminimumkan pengaruh dari pencilan yang ada. Penelitian mendapatkan hasil bahwa terdapat kaitan yang erat antara akses internet dari penduduk yang sedang sekolah dengan penyelesaian tugas sekolah.  Hasil regresi kuantil menunjukkan bahwa proporsi akses internet untuk penyelesaian tugas sekolah berbeda antar golongan proporsi penggunaan internet. Proporsi penggunaan internet yang tinggi akan digunakan untuk penyelesaian tugas sekolah yang lebih tinggi pula. Abstract: For the post millennial generation the use of the internet is very familiar but with various purposes of use. This study wants to look at the relationship between the use of the internet by residents who are currently in school for the sake of completing school work in Indonesia to get good learning outcomes. Analysis based on secondary data from the 2018 National Socio-Economic Survey. It's just that the data obtained is not symmetrical with outliers. Quantile regression is used to minimize the effect of outliers. The study found that there was a close relationship between internet access from residents who were in school and completion of school work. The quantile regression results show that the proportion of internet access for completing school work differs between groups of proportions of internet use. A high proportion of internet use will be used for completing higher school work.


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


2021 ◽  
Vol 29 (Supplement_1) ◽  
pp. i1-i1
Author(s):  
P Donyai ◽  
N Patel ◽  
H Almomani

Abstract Introduction The internet provides a platform for both legal and illegal online suppliers of medicines, which are sometimes difficult to distinguish between. Therefore, consumers accessing the internet are at risk of purchasing fake medicines from illegal suppliers. This is particularly problematic when people buy Prescription-Only Medicines (POMs) from the internet, despite an abundance of governmental campaigns 1. This under-researched issue has nonetheless been highlighted in news articles in the past few years which are a potential source of information, albeit informally, about how and why people end up buying fake medicines via the internet. This study is phase-1 of a larger study that aims to develop a questionnaire using the Theory of Planned Behaviour (TPB)2 to examine risky online purchasing of medicines to help focus future campaigns. Aim The aim is to identify the factors that lead people to inadvertently buy fake POMs online by examining newspaper articles covering this topic and categorising the findings according to the TPB’s indirect measures; namely, behavioural beliefs, normative beliefs, and control beliefs. Methods Newspaper articles were collected from the electronic database “ProQuest” using a series of search words for retrieving newspaper articles covering the purchasing of fake medicines online throughout the world. The search was limited to articles published from April-2019 to March-2020 to retrieve relevant articles in this fast-developing field. Articles that did not focus on POMs or only covered the supply side (e.g. efforts to combat illegal suppliers) were excluded. After evaluating each article using the inclusion/exclusion criteria, 52 articles remained. Thematic analysis was employed to analyse the newspaper articles against the TPB. The NVivo software program (version 12) was used to aid the generation of the themes. Results Using thematic analysis, 12 themes were generated and categorised according to the TPB’s indirect measures as follows. The behavioural beliefs (i.e. advantages and disadvantages of buying medicines online) included a perception of convenience, low price, privacy of the purchase, potential harmful effect, low quality, and lack of medical oversight. The normative beliefs (i.e. social factors influencing decisions to buy medicines online) included endorsement by influencers, deceptive marketing by suppliers, as well as organizations fighting the fake supply chain. The control beliefs (i.e. what encourages or stops purchasing medicines online) included encountering medicines shortages, outbreak of pandemic diseases, and accessibility issues. Conclusion This newspaper-analysis study created an initial map of ideas for why consumers might inadvertently buy fake POMs online highlighting the complexity of personal beliefs as well as a range of external circumstances. Further exploring these factors provides the basis for future campaigns for changing/controlling the purchasing of fake medicines online. Although the newspaper articles offer a wide range of data and provide different points of view, the validity of their content cannot be proven and are taken at face value. Therefore, the next step for this study is to complete semi-structured interviews with consumers purchasing medicines online (Phase-2) to verify the themes generated in Phase-1 before developing a larger questionnaire study (Phase-3). References 1. HM Government. Protect your health when buying medicines online. Accessed 08 October 2020 from: https://fakemeds.campaign.gov.uk/ 2. Ajzen, I. The theory of planned behaviour. Organizational behaviour and human decision processes. 1991; 50 (2),179–211.


Author(s):  
Sorina Mihaela Bălan

One of the most wonderful inventions is the internet. Analyzing the advantages and disadvantages of this fantastic world, we believe that we must turn our attention to the sexual implications of cyberbullying. In introduction can find the specific terminology, like: cyberbullying, harassment, cyberstalking, denigration, outing and trickery and sexting. Next part present same research in the topics, same case study from specific literature. How can manage the security and online reputation? – the answers can guided the rider. Education in prevention of Sexting and cyberbullying indicate also advices for parents, made reference at parental control recommendations and ten specific messages to share with adolescents in formal or informal. In this moment we can say that is difficult to managing the security and online reputation in sexting and cyberbullying but is a major provocation.


Sign in / Sign up

Export Citation Format

Share Document