How to Uncover “Pushing Hand” Operations

This chapter suggests how individual netizens or companies can uncover “pushing hand” operations. It is vitally important that Internet users, either corporations or individuals should acquire some knowledge and skills in identifying Internet mercenary marketing schemes since unrestricted information manipulation has grown to such a large scale that it led to a media claim that 70% of visits to the Chinese Internet derived from pushing hand operations. Evaluating information and deciding whether it is in fact a genuine recommendation from netizens or managed information from pushing hands is not an easy task. Several clues of online information evaluation are provided.

Author(s):  
E. V. Klimenko ◽  
N. S. Buslova

The article is devoted to the consideration of ways to solve one of the actual problems in theory and methodology of training and upbringing — the problem of developing professional skills of future informatics teacher. As a way to adapt students to the profession, the possibility of their involvement in social designing was chosen. Participation in social projects contributes to the approbation and introduction of new forms and methods in teaching informatics. Expanding the experience of future teachers in carrying out large-scale events contributes to the formation of a socially adapted personality competitive in modern society. The potential of a social project in consolidating the knowledge and skills obtained during the theoretical training at the university is indicated. In the article, theoretical reasoning is accompanied by examples of real social projects and activities aimed at the formation of professional competencies of future informatics teachers.


2019 ◽  
Author(s):  
Francesco Brigo ◽  
Simona Lattanzi ◽  
Giorgia Giussani ◽  
Laura Tassi ◽  
Nicola Pietrafusa ◽  
...  

BACKGROUND The Internet has become one of the most important sources of health information, accessed daily by an ever-growing number of both patients and physicians, seeking medical advice and clinical guidance. A deeper insight into the current use of the Web as source of information on epilepsy would help in clarifying the individual attitude towards this medium by Internet users. OBJECTIVE We investigated views towards the Internet in a sample of Italian healthcare specialists involved in epilepsy field, to explore factors which explained the influence of information found on the internet. METHODS This study was a self-administered survey conducted in a group of members of the Italian Chapter of the International League Against Epilepsy (ILAE) in January 2018. RESULTS 184 questionnaires were analyzed. 97.8% of responders reported to seek online information on epilepsy. The Internet was most frequently searched to obtain new information (69.9%) or to confirm a diagnostic or therapeutic decision (37.3%). The influence of consulting the Internet on clinical practice was associated with registration to social network(s) (OR: 2.94; 95%CI: 1.28-6.76; p=0.011), higher frequency of Internet use (OR: 3.66; 95%CI: 1.56-9.21; p=0.006) and higher confidence in reliability of online information (OR: 2.61; 95%CI: 1.09-6.26; p=0.031). No association was found with age, sex, years in epilepsy practice or easiness to find online information. CONCLUSIONS Internet is frequently used among healthcare professionals involved in the epilepsy to obtain information about this disease. The attitude of being influenced by the Internet for diagnostic and/or therapeutic decisions in epilepsy is independent on age and years of experience in epilepsy, and probably reflects an individual approach towards the Web.


2018 ◽  
Vol 26 (3) ◽  
pp. 264-276 ◽  
Author(s):  
Jurjen Jansen ◽  
Paul van Schaik

Purpose The purpose of this paper is to test the protection motivation theory (PMT) in the context of fear appeal interventions to reduce the threat of phishing attacks. In addition, it was tested to what extent the model relations are equivalent across fear appeal conditions and across time. Design/methodology/approach A pre-test post-test design was used. In the pre-test, 1,201 internet users filled out an online survey and were presented with one of three fear appeal conditions: strong fear appeal, weak fear appeal and control condition. Arguments regarding vulnerability of phishing attacks and response efficacy of vigilant online information-sharing behaviour were manipulated in the fear appeals. In the post-test, data were collected from 786 internet users and analysed with partial least squares path modelling. Findings The study found that PMT model relations hold in the domain of phishing. Self-efficacy and fear were the most important predictors of protection motivation. In general, the model results were equivalent across conditions and across time. Practical Implications It is important to consider online information-sharing behaviour because it facilitates the occurrence and success of phishing attacks. The results give practitioners more insight into important factors to address in the design of preventative measures to reduce the success of phishing attacks. Future research is needed to test how fear appeals work in real-world settings and over longer periods. Originality/value This paper is a substantial adaptation of a previous conference paper (Jansen and Van Schaik, 2017a, b).


2020 ◽  
Vol 7 (2) ◽  
Author(s):  
Ellyta Tambunan ◽  
Anwari Masatip

The use of technology today in various sectors of life is very high, this can also seen from the needs and improvements provided by this digital service. Augmented Reality (AR) is one of the organizations that builds and improves online information today. The Covid-19 pandemic had a considerable effect on the use of this technology with the imposition of large-scale physical distancing, this depends on various sectors that exist today, especially the tourism sector. Therefore, it has a big impact on tourism activities / activities, both on a national and international scale (foreign) who will visit tourist spots / destinations. Augmented Reality has various features that support in various fields, one of which is traveling. The scientific and theoretical studies in this study provide a useful reference source for developers of mobile AR applications, tourism managers, and effective marketing strategies in facing the new normal era today. So that tourism businesses or tourist destinations better understand user preferences for mobile AR applications and others that are able to maintain behavior can still enjoy travel with their impulsivity in the context of tourism as a result.  


2010 ◽  
Vol 2 (4) ◽  
pp. 12-30 ◽  
Author(s):  
Athena Eftychiou ◽  
Bogdan Vrusias ◽  
Nick Antonopoulos

The increasing amount of online information demands effective, scalable, and accurate mechanisms to manage and search this information. Distributed semantic-enabled architectures, which enforce semantic web technologies for resource discovery, could satisfy these requirements. In this paper, a semantic-driven adaptive architecture is presented, which improves existing resource discovery processes. The P2P network is organised in a two-layered super-peer architecture. The network formation of super-peers is a conceptual representation of the network’s knowledge, shaped from the information provided by the nodes using collective intelligence methods. The authors focus on the creation of a dynamic hierarchical semantic-driven P2P topology using the network’s collective intelligence. The unmanageable amounts of data are transformed into a repository of semantic knowledge, transforming the network into an ontology of conceptually related entities of information collected from the resources located by peers. Appropriate experiments have been undertaken through a case study by simulating the proposed architecture and evaluating results.


2009 ◽  
pp. 2072-2087
Author(s):  
Carmen Gould ◽  
Fang Zhao

This chapter reports the results of a national survey which investigated Australian Internet users’ attitudes and behaviours toward online information privacy using a typology that combines specific demographic and attitudinal measurements with behavioural data. The chapter contains a comprehensive examination of the internal, external/ environmental, and behavioural dimensions of information privacy, incorporating a profile of each of the typologies’ categories along with a general profile of total respondents. The implications of the findings for e-entrepreneurship and e-business ethics also are discussed.


2020 ◽  
Vol 26 (6) ◽  
pp. 335-345
Author(s):  
Soowon Park ◽  
Seungchan Lee ◽  
Boungho Choi ◽  
Seunghee Cho ◽  
Jin-Pyo Hong ◽  
...  

<b><i>Aims:</i></b> The aim of the current study was to develop and validate a short-form of the internet overuse screening questionnaire (IOS-Qs). <b><i>Methods:</i></b> A total of 571 adults were recruited from a representative, stratified, and multistage cluster sample. Among participants, 188 and 383 were used in the development and validation of the IOS-Qs, respectively. <b><i>Results:</i></b> Experts’ ratings and Rasch model analyses led to the selection of 8 items from the IOS-Qs; latent-class analysis using these 8 items revealed an estimated prevalence of 8.6% (33 out of 383) of problematic internet over-users. Problematic internet over-users were positively associated with a 1-year prevalence rate of any mental disorder (OR 3.08, <i>p</i> = 0.008), mood disorder (OR 7.11, <i>p</i> = 0.003), and depressive disorder (OR 5.22, <i>p</i> = 0.016). The receiver operating characteristic curves identified an optimal cutoff score of 9.5 for differentiating problematic internet over-users from unproblematic internet users with 94% sensitivity and 94% specificity. <b><i>Conclusion:</i></b> The results suggest that the IOS-Qs was valid, and items including social isolation were crucial to the brief distinction of at-risk internet users. Because of its brevity, the questionnaire can be effectively administered as a large-scale survey.


2014 ◽  
Vol 38 (2) ◽  
pp. 209-231 ◽  
Author(s):  
Darja Groselj

Purpose – This study aims to map the information landscape as it unfolds to users when they search for health topics on general search engines. Website sponsorship, platform type and linking patterns were analysed in order to advance the understanding of the provision of health information online. Design/methodology/approach – The landscape was sampled by ten very different search queries and crawled with VOSON software. Drawing on Roger's framework of information politics on the web, the landscape is described on two levels. The front-end is examined qualitatively by assessing website sponsorship and platform type. On the back-end, linking patterns are analysed using hyperlink network analysis. Findings – A vast majority of the websites have commercial and organisational sponsorship. The analysis of the platform type shows that health information is provided mainly on static homepages, informational portals and general news sites. A comparison of ten different health domains revealed substantial differences in their landscapes, related to domain-specific characteristics. Research limitations/implications – The size and properties of the web crawl were shaped by using third party software, and the generalisability of the results is limited by the selected search queries. Further research exploring how specific characteristics of different health domains shape provision of information online is suggested. Practical implications – The demonstrated method can be used by organisations to discern the characteristics of the online information landscape in which they operate and to inform their business strategies. Originality/value – The study examines health information landscapes on a large scale and makes an original contribution by comparing them across ten different health domains.


Sign in / Sign up

Export Citation Format

Share Document