scholarly journals Analisa Pemanfaatan Dan Peran Software Open-source Bagi Mahasiswa Universitas Abdurrab

2021 ◽  
Vol 12 (1) ◽  
pp. 49
Author(s):  
Salamun Salamun ◽  
Sukri Sukri

Abstract. Analysis of Software Utilization and the Role of Open-source for Abdurrab University Students. Open-source software can be acquired by downloading it for free from the internet, where the software code is published to the public or internet users. Generally, people will fix the software weaknesses and modify its display or language. Then, the repaired software is uploaded and published back to the internet. At the same time, other people will also download this open-source software application and fix other flaws. The purpose of this study was to determine the benefits and roles of open-source software for Abdurrab University students. The results of this study indicate an increase in student interest in using open-source applications and the influence, utilization, and role of open-source software for Abdurrab University students. The conclusion in this study is that open-source software still plays an important role for students because it is very helpful in various aspects to support learning.Keywords: Internet, Software, University of Abdurrab, open-sourceAbstrak.Open-source software dapat dimiliki dengan cara mengunduh secara gratis dari internet, yang mana kode software dipublikasikan ke publik atau pengguna internet. Umumnya, orang akan memperbaiki kelemahan-kelemahan software tersebut dan memodifikasi tampilan atau bahasanya. Lalu, software yang diperbaiki tersebut diunggah dan dipublikasikan kembali ke internet. Pada saat yang sama, orang lain juga akan mengunduh aplikasi software open-source ini dan memperbaiki kelemahan-kelemahan lain. Tujuan dari penelitian ini adalah mengetahui manfaat dan peran open-source software bagi mahasiswa Universitas Abdurrab. Hasil penelitian ini memperlihatkan adanya peningkatan minat mahasiswa dalam menggunakan aplikasi open-source dan pengaruh, pemanfaatan, serta peran software open-source bagi mahasiswa Universitas Abdurrab. Kesimpulan pada penelitian ini ialah open-source software masih berperan penting bagi mahasiswa karena sangat membantu dalam berbagai aspek untuk mendukung pembelajaran.Kata Kunci: Internet, Software, Universitas Abdurrab, open-source

The content which is expressed over the internet and its associated social media based on any of the protected characteristics like gender, religion, race, and disability is referred to online hate content. This article aims to examine the user responses on online hate content and determine the predictors of on online hate content. With an objective to identify the determinants of online hate content, the data has been collected from 716 internet users using research instrument designed for the purpose. Both online and offline modes are used for collecting the data. A comprehensive analysis is made using partial least squares path modeling (PLS-PM) package from an open-source software R. The analysis of structural model revealed that the attitude and opinions towards different protected characteristics such as gender, religion, race and disability are influencers of online hate content. Further, the analysis of measurement models revealed the role of measuring indicators.


Author(s):  
C. A. Ardagna

Nowadays, a global information infrastructure connects remote parties through the use of large scale networks, and many companies focus on developing e-services based on remote resources and on interactions between remote parties. In such a context, e-government (e-gov) systems became of paramount importance for the public administration, and many ongoing development projects are targeted on their implementation, security, and release (Bettini, Jajodia, Sean Wang, & Wijesekera, 2002). For open-source software to play an important role in this scenario, three main technological requirements must be fulfilled: (1) the identification and optimization of de facto standards for building e-gov open-source software components, (2) the adoption of open-source techniques to secure e-gov services and (3) the standard integration of these components into an open-source middleware layer, capable of conveying a completely open-source e-gov solution. This article highlights that e-gov systems should be constructed on an open-source middleware layer, providing full public responsibility in its development. The role of open-source middleware for secure e-gov services deployment is discussed, focusing on implementing a security environment without custom programming. An alternative solution is given and consists of the adoption of a stand-alone architecture that fulfils all security requirements.


2016 ◽  
Vol 3 (1) ◽  
Author(s):  
Mike Francoeur

There is a tendency, particularly among Western pundits and technologists, to examine the Internet in almost universally positive terms; this is most evident in any discussion of the medium’s capacity for democratization. While the Internet has produced many great things for society in terms of cultural and economic production, some consideration must be given to the implications that such a revolutionary medium holds for the public sphere. By creating a communicative space that essentially grants everyone his or her own microphone, the Internet is fragmenting public discourse due to the proliferation of opinions and messages and the removal of traditional gatekeepers of information. More significantly, because of the structural qualities of the Internet, users no longer have to expose themselves to opinions and viewpoints that fall outside their own preconceived notions. This limits the robustness of the public sphere by limiting the healthy debate that can only occur when exposed to multiple viewpoints. Ultimately, the Internet is not going anywhere, so it is important to equip the public with the tools and knowledge to be able to navigate the digital space. 


2006 ◽  
Vol 40 (3) ◽  
pp. 286-295 ◽  
Author(s):  
Andrew Buxton

PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.


2016 ◽  
Vol 11 (3) ◽  
pp. 163
Author(s):  
Muhamad Abu-Jalil ◽  
Ashraf Aaqoulah

This study aimed to identify the role of Internet technology in transforming the role of its users to promoters of medical products in Jordan. The study found that there are statistically significant effects of independent variables (multipurpose and advanced Internet programs, reduced costs of the use of Internet programs, collective and interactive communication via the Internet, and Internet information abundance and variety of its resources) on the dependent factor, which is transformation of the role of Internet users to promoters of medical products in Jordan. The study recommended increasing attention on networks to promote medical products in Jordan. This is consistent with the fact that promotion via networks has become an effective way to support and enhance the image of products and its delivery to the target group in all markets around the world.


2018 ◽  
Vol 19 (1) ◽  
pp. 75-90
Author(s):  
Maurício Benedeti Rosa ◽  
Rosane Nunes de Faria ◽  
Eduardo Rodrigues de Castro

AbstractWe use a political economy perspective to provide the first empirical analysis of the main political and economic determinants of asynchronous approval (AA) for a variety of countries over the period 2000–2015. The key results that emerge from our paper are the prominent role of regulatory quality and the number of internet users in a particular country in influencing AA across countries. We found that the higher the share of internet users in a country, the lower the AA. Consumer access to the internet makes them less exposed to negative news about genetically modified (GM) products, as they are less influenced by the negative bias of traditional mass media toward biotechnology. Additionally, the better the regulation quality (the more efficiently a government formulates and implements regulation), the shorter the time necessary to approve new GM events, and the lower the AA. Furthermore, our findings confirm that determinants such as corruption, trade relations with stringent markets, and the size of the rural population are also important in explaining AA of GM events.


Author(s):  
عبد الكريم الدبيسي ◽  
يسرى خالد إبراهيم

The digital environment has brought a lot of changes to the lives of societies and affected and changed their cultures, lifestyles, ways of thinking and interaction with the environment. The digital environment, with its rapid developments, has produced new ideas and behaviors on societies in general and Arab society was not far from these currents, after more than fifteen A year since the Internet entered Iraq, which is one of the most important manifestations of democracy, the latest radical changes in human relations. The information acquired by the human being today is one of the Internet and its culture dependent on it, and here began the study questionably head of that: What is the role of social networking sites in promoting young people's awareness of the importance of the popular movement? The research aims through adopting the survey method (Public Opinion Survey) to identify the most important political, economic and social dimensions of youth awareness that the Internet has brought to them by enhancing information and increasing confidence in the importance of change and persistence on the principle and the research sample is from university students and they are the motors of mobility in the Arab countries Study (Iraq )


2021 ◽  
Vol 64 (10) ◽  
pp. 85-93
Author(s):  
Jihoon Lee ◽  
Gyuhong Lee ◽  
Jinsung Lee ◽  
Youngbin Im ◽  
Max Hollingsworth ◽  
...  

Modern cell phones are required to receive and display alerts via the Wireless Emergency Alert (WEA) program, under the mandate of the Warning, Alert, and Response Act of 2006. These alerts include AMBER alerts, severe weather alerts, and (unblockable) Presidential Alerts, intended to inform the public of imminent threats. Recently, a test Presidential Alert was sent to all capable phones in the U.S., prompting concerns about how the underlying WEA protocol could be misused or attacked. In this paper, we investigate the details of this system and develop and demonstrate the first practical spoofing attack on Presidential Alerts, using commercially available hardware and modified open source software. Our attack can be performed using a commercially available software-defined radio, and our modifications to the open source software libraries. We find that with only four malicious portable base stations of a single Watt of transmit power each, almost all of a 50,000-seat stadium can be attacked with a 90% success rate. The real impact of such an attack would, of course, depend on the density of cellphones in range; fake alerts in crowded cities or stadiums could potentially result in cascades of panic. Fixing this problem will require a large collaborative effort between carriers, government stakeholders, and cellphone manufacturers. To seed this effort, we also propose three mitigation solutions to address this threat.


First Monday ◽  
2014 ◽  
Author(s):  
Mei-Yuit Chan ◽  
Shameem Rafik-Galea ◽  
Ngee-Thai Yap

A recent development in Malaysia was the unprecedented rise in young Malaysians’ participation in the country’s social and political affairs, facilitated almost entirely by the Internet. This phenomenon caught many by surprise considering that university students in the country had been barred through legislation from active involvement in political activities for more than 30 years. Through a survey of 514 university students in a Malaysian public university, supplemented by interview data and samples of students’ writing, this study investigated in which ways Malaysian tertiary students are participating in the public sphere through the Internet. Following Hauser’s (1999) conception of public discourse as personal, interactive, informal, and distributed voices among the citizenry, we argue for a perspective that explains how online interactions in the friendship frame among young people represent their participation in the public sphere in the context of contemporary society.


2010 ◽  
Vol 38 (2) ◽  
Author(s):  
Peter L. M. Vasterman

The Digital Pillory: The impact of the Internet on the development of scandals The Digital Pillory: The impact of the Internet on the development of scandals This article explores the consequences of the changing public arena for the way scandals develop. Scandals, defined as a process of public outrage over a (presumed) transgression of the dominant morality, used to be the domain of the professional mass media. The Internet seems to offer a more level playing field for actors who want to trigger a scandal by disclosing compromising information. But what exactly is the role of the Internet in the different stages of a scandal; which type of actors are dominant and how do media and these websites interact? A qualitative and quantitative analysis of four recent Dutch scandals shows that the Internet, more specifically semiprofessional weblogs can indeed play an important role in exposing, accusing and denouncing the culprit. But the professional media are still very important; when they refuse to adopt a disclosure by bloggers the scandal fails. The role of the Internet users is mainly reactive, but the scale of outrage on the Internet fuels the scandal process.


Sign in / Sign up

Export Citation Format

Share Document