Apps, Apps, and More Apps

Author(s):  
Matthew J. Haught ◽  
Ran Wei ◽  
Jack V. Karlis

This paper explores the reasons millions of people use stand-alone, task-oriented software programs designed for use on mobile devices, commonly known as “apps.” This study uses a survey with a probability sample of 576 app users. Consistent with the uses and gratifications approach, respondents were asked about their attitudes, interests, and opinions regarding apps. Theses measures were reduced to five factors. Then, regression analyses considered the factors as well as app use statistics and demographics to predict app use. The motivations of entertainment, convenience, and instrumentality are consistent with previously studied gratifications of the Internet and the mobile phone. However, the constant availability gratification for apps is unique because they provide quick access to information anytime and anywhere. Regression analysis showed these motivations predicted patterns of app use.

Comunicar ◽  
2015 ◽  
Vol 22 (44) ◽  
pp. 159-167 ◽  
Author(s):  
Mercedes Durán-Segura ◽  
Roberto Martínez-Pecino

Cyberbullying is a phenomenon that has been extensively analysed amongst adolescents. However, in Spain, there have been few studies of young adults and particularly of their romantic relationships in the digital context. This study analyses cyberbullying in romantic relationships in mobile and digital exchanges between partners, in a sample comprising 336 students using quantitative methodology. The results show that 57,2% of the sample admit to having been victimised by their partner by mobile phone and 27,4% via the Internet. The percentage of victimised males was higher than that of females. 47,6% affirmed that they had bullied their partner by mobile phone and 14% over the Internet. The percentage of males who did so was higher than that of females. The regression analyses showed correlation between having been victimised by a partner via one of these media and having experienced cyberbulling in other by means of the same technological medium. The effects of this interaction highlight that males victimised through the use of mobile phones or the Internet are involved, to a greater extent than victimised females, as the perpetrators in this phenomenon. The results suggest modernisation in the types of violence that young adults experience in their relationships. El ciberacoso es un fenómeno ampliamente analizado entre adolescentes, sin embargo en España ha sido poco estudiado entre jóvenes y particularmente en sus relaciones de noviazgo. Empleando una metodología cuantitativa este estudio analiza el ciberacoso mediante el teléfono móvil e Internet en las relaciones de noviazgo en una muestra compuesta por 336 estudiantes universitarios. El análisis de resultados indica que un 57,2% declara haber sido victimizado por su pareja mediante el teléfono móvil, y un 27,4% a través de Internet. El porcentaje de chicos victimizados fue mayor que el de las chicas. Un 47,6% declara haber acosado a su pareja a través del teléfono móvil, y un 14% a través de Internet. El porcentaje de chicos que lo ejerció fue superior al de las chicas. Los análisis de regresión muestran la relación entre haber sido victimizado por la pareja a través de uno de estos medios y el ejercicio del ciberacoso hacia la pareja mediante el mismo medio tecnológico. Los efectos de interacción ponen de manifiesto que los chicos victimizados a través del teléfono móvil o de Internet se implican, en mayor medida que las chicas victimizadas, como agresores en este fenómeno. Los resultados sugieren una modernización en los tipos de violencia que experimenta la juventud en sus relaciones de pareja.


2019 ◽  
Vol 8 (4) ◽  
pp. 8787-8791

In recent years, owing to the proliferation of the Internet of Things (IoT), homes and offices are being translated into smart homes and offices. The paper demonstrates an IoT system for managing the visitors in a smart office environment. The automation system comprises Raspberry Pi equipped with camera and an android mobile phone. The Raspberry Pi equipped with camera is kept in the visitor’s waiting area and the consulting person possesses an android mobile phone in which the visitor management software is installed. The visitor takes an appointment using the client application installed in his android mobile phone by selecting an available slot and receives a QR code. The consulting person has the access to information regarding each appointment through professional application installed in his android phone. Whenever the visitor shows the QR code to the Raspberry Pi camera, the professional application is notified and the consulting person is able to access the list of all the visitors in real time. An intelligent token system is used to determine the order of passage when several visitors are there at the office


Mousaion ◽  
2016 ◽  
Vol 34 (1) ◽  
pp. 83-100
Author(s):  
Solomon Bopape

The study of law focuses, among other aspects, on important issues relating to equality, fairness and justice in as far as free access to information and knowledgeis concerned. The launching of the Open Access to Law Movement in 1992, the promulgation of the Durham Statement on Open Access to Legal Scholarshipin 2009, and the formation of national and regional Legal Information Institutes (LIIs) should serve as an indication of how well the legal world is committed to freely publishing and distributing legal information and knowledge through the Internet to legal practitioners, legal scholars and the public at large aroundthe world. In order to establish the amount of legal scholarly content which is accessible through open access publishing innovations and initiatives, this studyanalysed the contents of websites for selected open access resources on the Internet internationally and in South Africa. The results of the study showed that there has been a steady developing trend towards the adoption of open access for legal scholarly literature internationally, while in South Africa legal scholarly literature is under the control of commercial publishers. This should be an issue for the legal scholarship which, among its focus, is to impart knowledge about the right of access to information and knowledge.


2018 ◽  
Vol 1 (2) ◽  
pp. 12
Author(s):  
Pedro Vitor de Sousa Guimarães ◽  
Sandro César Silveira Jucá ◽  
Renata Imaculada Soares Pereira ◽  
Ayrton Alexsander Monteiro Monteiro

This paper describes the use of a Linux embedded system for use in digital information and communication technology in order to generate image warnings using Internet of Things (IoT) prin- ciples. The proposed project generated a product, developed using concepts of project-based learning (ABP), called SECI (electronic internal communication system) that is accessed by students to view online warnings by distributed monitors and also by mobile devices connected to the Internet.


2021 ◽  
Vol 64 (1) ◽  
pp. 23-40
Author(s):  
Katrien Pype

AbstractIn the 2016 Abiola Lecture, Mbembe argued that “the plasticity of digital forms speaks powerfully to the plasticity of African precolonial cultures and to ancient ways of working with representation and mediation, of folding reality.” In her commentary, Pype tries to understand what “speaking powerfully to” can mean. She first situates the Abiola Lecture within a wide range of exciting and ongoing scholarship that attempts to understand social transformations on the continent since the ubiquitous uptake of the mobile phone, and its most recent incarnation, the smartphone. She then analyzes the aesthetics of artistic projects by Alexandre Kyungu, Yves Sambu, and Hilaire Kuyangiko Balu, where wooden doors, tattoos, beads, saliva, and nails correlate with the Internet, pixels, and keys of keyboards and remote controls. Finally, Pype asks to whom the congruence between the aesthetics of a “precolonial” Congo and the digital speaks. In a society where “the past” is quickly demonized, though expats and the commercial and political elite pay thousands of dollars for the discussed art works, Pype argues that this congruence might be one more manifestation of capitalism’s cannibalization of a stereotypical image of “Africa.”


Safety ◽  
2021 ◽  
Vol 7 (1) ◽  
pp. 17
Author(s):  
Miroslava Mikusova ◽  
Joanna Wachnicka ◽  
Joanna Zukowska

The topic of the use of mobile devices and headphones on pedestrian crossings is much less explored in comparison to the use of the mobile phone while driving. Recent years have seen many discussions on this issue, especially in foreign countries. The Slovak Republic, however, has not been giving it enough attention (and it is not mentioned in the National Road Safety Plan for the Slovak Republic from 2011 to 2020). This paper aims to draw attention to this issue. It presents basic outputs of a pilot study on pedestrian safety, with a focus on the use of mobile devices and headphones at selected non-signalized pedestrian crossings in three Slovak cities. Overall, 9% of pedestrians used headphones or mobile devices at observed pedestrian crossings (4% of them used headphones, 1% used headphones and at same time used their mobile phone, 2% made phone calls and 2% used their mobile phones). While these numbers can be considered relatively low, the study proved that during weekdays every 2 min someone was using the crossing without fully focusing on crossing the road safely. Another main finding was that although the safety risk at pedestrian crossings is increased by factors such as rush hour traffic or reduced visibility, pedestrian behavior related to the use of mobile phones and headphones does not change. A safety assessment was also carried out at the crossings. The results show that pedestrian behavior is not affected by the level of safety of the crossing (e.g., visibility of the crossing for drivers). The results of the presented analysis suggest that action is needed to change that. Due to the lack of information about accidents involving pedestrians using mobile phones and headsets when crossing the road, no relevant statistical data could be analyzed. The dataset collected can be used as a basis for further investigation or comparisons with other countries of the relevant indicators. In future work, we would like to include a pedestrian–driver interaction factor focusing on driver speed behavior in relation to pedestrians (who are on or are about to step onto a pedestrian crossing) and identify critical situations caused by improper behavior of drivers and/or pedestrians. This will help to understand speed adjustment problems related to pedestrian crossings.


Publications ◽  
2021 ◽  
Vol 9 (3) ◽  
pp. 34
Author(s):  
Ruth Breeze

At times of crisis, access to information takes on special importance, and in the Internet age of constant connectedness, this is truer than ever. Over the course of the pandemic, the huge public demand for constantly updated health information has been met with a massive response from official and scientific sources, as well as from the mainstream media. However, it has also generated a vast stream of user-generated digital postings. Such phenomena are often regarded as unhelpful or even dangerous since they unwittingly spread misinformation or make it easier for potentially harmful disinformation to circulate. However, little is known about the dynamics of such forums or how scientific issues are represented there. To address this knowledge gap, this chapter uses a corpus-assisted discourse approach to examine how “expert” knowledge and other sources of authority are represented and contested in a corpus of 10,880 reader comments responding to Mail Online articles on the development of the COVID-19 vaccine in February–July 2020. The results show how “expert” knowledge is increasingly problematized and politicized, while other strategies are used to claim authority. The implications of these findings are discussed in the context of sociological theories, and some tentative solutions are proposed.


1991 ◽  
Vol 19 (3) ◽  
pp. 205-215 ◽  
Author(s):  
Arts Jiujias ◽  
Peter Horvath

Eighty-six Canadian female undergraduates attributed self-monitoring traits to a target presented on videotape, and evaluated her in terms of liking. Attributed self-monitoring was negatively correlated with attraction to the target and was the only predictor of attraction in a multiple regression analysis. Multiple regression analyses with subscales of attributed self-monitoring as predictors suggested that the evaluations may be the result of the attributed unpredictability of the high self-monitoring prototype.


2004 ◽  
Vol 03 (02) ◽  
pp. 265-279 ◽  
Author(s):  
STAN LIPOVETSKY ◽  
MICHAEL CONKLIN

Comparative contribution of predictors in multivariate statistical models is widely used for decision making on the importance of the variables for the aims of analysis and prediction. However, the analysis can be made difficult because of the predictors' multicollinearity that distorts estimates for coefficients in the linear aggregate. To solve the problem of the robust evaluation of the predictors' contribution, we apply the Shapley Value regression analysis that provides consistent results in the presence of multicollinearity both for regression and discriminant functions. We also show how the linear discriminant function can be constructed as a multiple regression, and how the logistic regression can be approximated by linear regression that helps to obtain the variables contribution in the linear aggregate.


Sign in / Sign up

Export Citation Format

Share Document