scholarly journals Pelatihan Internet Sehat Sebagai Antisipasi Cyber Bullying Anak Remaja di Panti Asuhan “Kemala Puji” Bandar Lampung

2021 ◽  
Vol 1 (2) ◽  
pp. 199-204
Author(s):  
KURNIA FADILA ◽  
Hary Sabita ◽  
Anandha Sartika Putri ◽  
Joko Triloka

The background of foster children in Kemala Puji orphanage are mostly from poor families, orphans, neglected, and homeless child. The institution have been serve, nurture, and empower by providing them a sufficient living. Hence, it still needs a better improvement. This is because these children deserve to be made for the next generation. This activity aims to rise of social care between humanity in adolescents, especially for children in the orphanage. This have been done by imparting knowledge to them about healthy internet. Moreover, its increases understanding how to use the internet more healthily, properly and to anticipate of cyber bullying against them. The outcome of training activities are the youth children have been understood how to use a healthy internet, and they have been sufficient skills how to use internet which was given during the training.

Network ◽  
2021 ◽  
Vol 1 (1) ◽  
pp. 28-49
Author(s):  
Ehsan Ahvar ◽  
Shohreh Ahvar ◽  
Syed Mohsan Raza ◽  
Jose Manuel Sanchez Vilchez ◽  
Gyu Myoung Lee

In recent years, the number of objects connected to the internet have significantly increased. Increasing the number of connected devices to the internet is transforming today’s Internet of Things (IoT) into massive IoT of the future. It is predicted that, in a few years, a high communication and computation capacity will be required to meet the demands of massive IoT devices and applications requiring data sharing and processing. 5G and beyond mobile networks are expected to fulfill a part of these requirements by providing a data rate of up to terabits per second. It will be a key enabler to support massive IoT and emerging mission critical applications with strict delay constraints. On the other hand, the next generation of software-defined networking (SDN) with emerging cloudrelated technologies (e.g., fog and edge computing) can play an important role in supporting and implementing the above-mentioned applications. This paper sets out the potential opportunities and important challenges that must be addressed in considering options for using SDN in hybrid cloud-fog systems to support 5G and beyond-enabled applications.


2020 ◽  
Vol 8 (27) ◽  
pp. 13619-13629 ◽  
Author(s):  
Asif Abdullah Khan ◽  
Md Masud Rana ◽  
Guangguang Huang ◽  
Nanqin Mei ◽  
Resul Saritas ◽  
...  

A high-performance perovskite/polymer piezoelectric nanogenerator for next generation self-powered wireless micro/nanodevices.


Sensors ◽  
2016 ◽  
Vol 16 (3) ◽  
pp. 403 ◽  
Author(s):  
Alexander Kotsev ◽  
Sven Schade ◽  
Massimo Craglia ◽  
Michel Gerboles ◽  
Laurent Spinelle ◽  
...  

Author(s):  
O. P. Kopylova ◽  
◽  
S. V. Medvedeva ◽  
Yu. V. Kalashnikova ◽  
◽  
...  

Possibilities of legal regulation of cyber bullying are considered in modern conditions. Aggressive behavior in the Internet space is gaining momentum in its distribution among adolescents not only in Russia but throughout the world. Cyber bullying is one of the newest, most dangerous, and also depressing emotional states of a teenager in terms of the consequences of the risk they face. The concept of “cyber bullying” is considered; its forms are specified; proposals aimed at neutralizing the bullying that occurs among adolescents in the Internet space are formulated.


2020 ◽  
Author(s):  
Tanweer Alam

<p>The fog computing is the emerging technology to compute, store, control and connecting smart devices with each other using cloud computing. The Internet of Things (IoT) is an architecture of uniquely identified interrelated physical things, these physical things are able to communicate with each other and can transmit and receive information. <a>This research presents a framework of the combination of the Internet of Things (IoT) and Fog computing. The blockchain is also the emerging technology that provides a hyper, distributed, public, authentic ledger to record the transactions. Blockchains technology is a secured technology that can be a boon for the next generation computing. The combination of fog, blockchains, and IoT creates a new opportunity in this area. In this research, the author presents a middleware framework based on the blockchain, fog, and IoT. The framework is implemented and tested. The results are found positive. </a></p>


US, is one country, which started the evolution of the Internet and also the first to be affected and the first to retaliate to the ugly side of the Internet, the cyber crimes. US saw a sea of growth in the cyber crimes against women and created new laws to mitigate such crime and prevent future victimization. In this chapter, we discuss about various laws developed by the US to prevent cyber victimization of women as well as conventional laws that were applied to protect women in cyber space. Regulation of crimes in cyber space such as cyber bullying, cyber stalking are examined in detail. The issue of privacy in cyber space vis-à-vis the laws related to that are identified and analyzed.


Sign in / Sign up

Export Citation Format

Share Document