scholarly journals THE MINIMIZATION OF THE IMPACT OF INFORMATION AND COMMUNICATION TECHNOLOGIES ON THE HEALTH AND WELL-BEING OF CHILDREN

2019 ◽  
Vol 96 (11) ◽  
pp. 1059-1063 ◽  
Author(s):  
Vladislav R. Kuchma

The strategic goal of the state policy in the field of information security of children is to ensure the harmonious development of the younger generation, to minimize risks associated with the formation of hyperinformative society. The hygienic safety of the life of children under the use of information technology is a necessary condition for their balanced growth, development and formation of health. Modern information technologies of training provide children easy access to information resources, remoteness, mobility, interactivity, the possibility of the formation of social and educational networks, and educational communities, modeling and animation of various processes and phenomena. The purpose of the study is the substantiation of the system of the sanitary safety of hyperinformation of children’s life activity. The analytical method has allowed justify a system of hygienic and medical-psychological-pedagogical safety of the life of children’s life activity in hyperinformational society. The system includes the criteria of hygienic safety for information and communication technologies (ICT) and their means of support; modern sanitary rules and regulations to ensure hygienic safety for the children of information and communication technologies of training in educational institutions; federal recommendations of care for students in conditions of modern information and communications technology of training and information of children’s life activity; federal guidelines for the preservation of mental and psychological health and well-being of students; recommendations for family in security of children’s life activity in hyperinformational space; recommendations for producers and content distributors of providing medical, psychological and educational safety of children’s life activity; game educational programs on rules of the safe use of the Internet by children; monitoring the effectiveness of hygienic safety and protection of children from negative information. The implementation of hygienic children’s safety system will allow provide the best personal mental and physical development, the preservation of mental and psychological health and well-being of children in hyperinformational society; achieve expected results of the Concept of information security of children approved by the Decree of the Russian Federation dated December 2, 2015 № 2471-r, in terms of creating a new media environment.

2019 ◽  
Vol 3 (Supplement_1) ◽  
pp. S14-S15
Author(s):  
William J Chopik ◽  
Shelia R Cotten

Abstract Technology has the ability to enhance and enrich the lives of older adults by facilitating better relationships, health, and well-being. However, older adults vary in how often—and even whether—they use information and communication technologies (ICTs). Further, interactions and relationships with people in their immediate social networks might have implications for whether or not older adults adopt ICTs. In two studies of individuals (N=595 participants; Mage=67.09; 56% Female; 69.2% White) and couples (N=542 couples; Mage=63.65; 50% Female; 83.9% White), I examined individual and dyadic predictors of technology adoption among older adults. Among a wide array of individual difference constructs, the most reliable predictor of technology adoption in both individuals and their spouses was need for cognition (.08 ≤ r ≤ .23). The results will be discussed in the context of how individual differences modulate adoption and the benefits accrued from ICTs across the lifespan.


2021 ◽  
Vol 4 (519) ◽  
pp. 161-168
Author(s):  
N. S. Kovalevska ◽  
◽  
I. V. Nesterenko ◽  
E. B. Sokolova ◽  
T. V. Karbivnycha ◽  
...  

The article is aimed at substantiating organizational provisions and developing recommendations for improving the conceptual principles of projecting a computer-based audit system for the activities of performers of entrepreneurial activities. The article proposes the principles of modeling the audit system in the structure of the information service of entrepreneurs, provides proposals for assessing audit risks at different stages of entrepreneurial activity, substantiates methodological approaches to conducting an audit using modern information and communication technologies. It is proved that computer-based audit is an effective instrument for controlling and managing economic security of business entities. When designing the organizational-methodological structure of the audit, it is proposed to use the stages of audit development: confirming, system-oriented, and risk-based audit. When deciding on the creation and operational function of the computer-based audit of the activities of business entities, it is recommended to take into account their size, category, organizational and legal form of management, organizational structure, level of automation of accounting and control procedures. Scientific approaches using the proposed indicator of information security to assessing the state of information security of business entity are defined, their components are: degree of use of information and communication technologies in business processes, status of information threats, and degree of security of information resources. Methodical principles of auditing using modern information and communication technologies are proposed to strengthen control and analytical functions of management with the use of the latest audit systems. It is proved that computer-based audit covers the use of information technologies and software as a method and tools of the auditor in the process of performing the task on the basis of reliability assessment and identification of significant risks of the information system of a business entity.


Author(s):  
Luca Argenton ◽  
Federica Pallavicini ◽  
Fabrizia Mantovani

Serious games are growing rapidly both as an industry and a field of academic research. They have been able to shape new opportunities for individual and collective learning and training, showing a discrete effectiveness. Further, serious games have been capable of supporting health and well-being. That is why they can be considered as positive technologies. Positive Technology is an emergent field whose goal is to investigate how Information and Communication Technologies (ICTs) can be used to empower the quality of personal experience The aim of the present chapter is to discuss the role of serious games as positive technology, analyzing how they can influence both individual and interpersonal experiences by fostering positive emotions, promoting engagement, as well as enhancing social integration and connectedness.


Author(s):  
Luca Argenton ◽  
Federica Pallavicini ◽  
Fabrizia Mantovani

Serious games are growing rapidly both as an industry and a field of academic research. They have been able to shape new opportunities for individual and collective learning and training, showing a discrete effectiveness. Further, serious games have been capable of supporting health and well-being. That is why they can be considered as positive technologies. Positive Technology is an emergent field whose goal is to investigate how Information and Communication Technologies (ICTs) can be used to empower the quality of personal experience The aim of the present chapter is to discuss the role of serious games as positive technology, analyzing how they can influence both individual and interpersonal experiences by fostering positive emotions, promoting engagement, as well as enhancing social integration and connectedness.


Author(s):  
Hristo Terziev

Internet of Things is a new world for connecting object space in the real world with virtual space in a computer environment. To build IoT as an effective service platform, end users need to trust the system. With the growing quantity of information and communication technologies, the need to ensure information security and improve data security is increasing. One of the potential solutions for this are steganographic methods. Steganography based on the least significant bit (LSB) is a popular and widely used method in the spatial domain.


Sign in / Sign up

Export Citation Format

Share Document