scholarly journals Current Issues in Conceptualisation, Measurement, and Research of Problematic Use of the Internet

2021 ◽  
Vol 30 (4) ◽  
pp. 741-762
Author(s):  
Josip Razum ◽  
Renata Glavak Tkalić ◽  
Tihana Brkljačić ◽  
Ines Sučić ◽  
Anja Wertag

Problematic use of the Internet (PUI) generally refers to use of different types of Internet content which is not under control and leads to difficulties in everyday functioning. It involves generalised PUI but also specific forms such as problematic use of videogames, social media, and pornography. The main aim of this paper is to offer a basic review of current trends in defining, measurement and research of PUI. The review of available papers points at methodological problems related to determining the prevalence of PUI, and insufficient direct investigation of postulates of existing models regarding the onset and maintenance of PUI. Moreover, this paper offers a critical review of existing instruments for measuring PUI and its specific forms, and recommends the most appropriate instruments. A short review of PUI research methodology and important findings is given. Finally, guidelines for future research in this area are provided, which enable us to investigate these phenomena of contemporary society in a comprehensive and sound way.

2021 ◽  
Vol 106 ◽  
pp. 152225
Author(s):  
Francesco Di Carlo ◽  
Mauro Pettorruso ◽  
Maria Chiara Alessi ◽  
Elena Picutti ◽  
Rebecca Collevecchio ◽  
...  

2002 ◽  
Vol 33 (4) ◽  
pp. 39-47 ◽  
Author(s):  
Steve D. Giffin

A taxonomy of Internet applications has been created to describe the use of the Internet for project management communication. It is based on the technological characteristics of Internet applications, the requirements of project management communication, and the organizational issues associated with using Internet applications. Its dimensions are the sender/receiver synchronization and the relationship between the number of senders and receivers. The taxonomy is populated with six Internet applications that are used commonly in project management communication. The taxonomy is presented as an aid to understanding the capabilities and limitations of Internet applications for different types of project management communication.


2012 ◽  
pp. 608-619 ◽  
Author(s):  
Elizabeth Mazur ◽  
Margaret L. Signorella ◽  
Michelle Hough

Early research on older adult computer users focused on the possibility for technology to increase social interaction and alleviate loneliness. Subsequent research has been equivocal on the possible benefits of the Internet for well-being. Nonetheless, in spite of an initial “gray gap,” older adults are increasingly joining younger cohorts in using the Internet. Barriers to older adults’ use of the Internet remain, such as physical and cognitive limitations. Attitudinal barriers may exist, but it is unclear whether these result from lack of experience or differences in income or health status. Business researchers have found that older persons differ from other age groups in their Internet engagement patterns, including online buying. Future research directions include whether computers can improve cognitive functioning and quality of life, how to increase engagement levels, and if there will always be a lag in technology use among older adults.


Author(s):  
W. Benjamin Porr ◽  
Robert E. Ployhart

This chapter presents a framework through which ethical Internet-based organizational research can be conducted. Organizational constraints that promote the use of the Internet for applied research are identified, followed by potential benefits and drawbacks. The chapter then discusses the ethical issues that must be considered when conducting Internet-based organizational research; these include concerns about privacy, confidentiality, anonymity, informed consent and providing a debriefing. A case study illustrates these issues, and the chapter concludes with directions for future research. Numerous tables and figures are used to serve as a quick reference for the key points of the chapter.


Author(s):  
Kamil Yagci ◽  
Mahmut Efendi ◽  
Sureyya Akçay

In addition to the development of social technology and the widespread use of the internet, the fact that people are getting used to sharing their goods and services has made the concept of sharing economy a popular issue. Sharing economy is “a potential new way for sustainability,” and it is noted that it would disrupt the unsustainable hyper-consumption practices directing capitalist economies. In this regard, the importance of sharing economy becomes prominent. In this study, first of all, basic information was given about sharing economy and then the concepts about how it made progress were introduced. In the next step, the definitions of sharing economy were given, the importance of sharing was mentioned, and then the products used in sharing economy were mentioned. In the following stage, the benefits of sharing economy to nature were addressed, and the weaknesses and dark sides of sharing economy were revealed. Finally, the impact of the sharing economy on the service sector was emphasized, and opinions were presented for future research on this subject.


2018 ◽  
Vol 20 (4) ◽  
pp. 323-336 ◽  
Author(s):  
Sumedha Chauhan ◽  
Parul Gupta ◽  
Mahadeo Jaiswal

Purpose This paper aims to explore the factors inhibiting the internet adoption among base of pyramid (BoP) and to develop further insights of such factors. Design/methodology/approach Researchers used a mixed-method study with QUAL/QUAN sequence in this research. Given the dearth of research on the internet usage by the BoP segment in India, the authors began with the exploratory qualitative study. Semi-structured interviews in local language were carried out with the people belonging to the BoP segment in India using common interview protocol. Face-to-face interviews were conducted for 20-30 min with ten people. Thematic analysis (Braun and Clarke, 2006) was conducted on the interview transcripts which lead to five themes. These themes were identified as the potential inhibitors to the internet adoption by the BoP segment in India. This step was further followed by a confirmatory quantitative study. Findings The results confirm that the factors such as lack of digital literacy, complexity and language barrier play a significant role in inhibiting the internet adoption by the BoP segment. However, there is no impact of perceived risk and cost on the internet adoption. The significant relationship between lack of digital literacy and intention to use implies that if the BoP segment is capable to locate, evaluate and use digital information, it is more likely to use the internet. Similarly, the relationship between complexity and the intention to use suggests that if the BoP segment finds it easy to use and understand the internet, it is more likely to use it. Practical implications This research has the implications for government departments and policymakers that are responsible for promoting use of the internet. Therefore, such departments and policymakers are advised to channelize their effort on resting the digital literacy, especially in terms of internet adoption. Findings of this study show that digital literacy, complexity and language barriers are major inhabitants in the internet adoption. Directed and focused government policies and initiatives such as subsidized seminars and training programmes specially designed for the BoP segment can help in increasing internet adoption. Social implications The adoption and use of the internet services by BoP have major implications for digital equality. Therefore, it would be important to explore the factors inhibiting the internet adoption among BoP. Originality/value This paper not only explores the factors inhibiting internet adoption among BoP in developing countries such as India but also provides deeper insights to these factors by collecting first-hand information from target segment. The finding of this research provides meaningful inputs to policymakers and also to industry to remove digital divide in the target population. This is how this research adds value to the existing knowledge available in this domain and it also provides agenda for future research.


2020 ◽  
Vol 25 ◽  
pp. 17-42
Author(s):  
Jakub Lichański

The problem that we want to investigate in this article is a phenomenon that, for various re-searchers, including Marsh Kinder, we call super entertainment systems. It is about a multitude of uses or the existence of not only figures, but also a certain universe — not necessarily taken from popular culture, resp. literature — which will then be introduced as elements or an intertextual net-work, or rather — become elements in various entertainment systems. They can be: Classic systems, such as classic printed forms,II. Films, including amateur productions and disseminated on the Internet,III. Different types of games ranging from RPG to video games,IV. Different types of theatrical or paratheatrical forms,V. Any gadgets related to the above-mentioned elements,VI. Also — manifestations of fanatic creativity (in any form),VII. Musical forms. The problems that researchers face are related to the following: Can the above-mentioned problems be reduced to a simpler form of the question about the form of the media message? Is it about the so-called old media and new media and media convergence? What and how the roles of the sender/author and the recipient should be determined, and whether such a division is correct (NB: L. Manovich introduces the notions of the creator and consumer, whether the division into a passive/active/participating recipient is important). The problems that lie ahead are twofold:First of all — methodical issues concerning the methodology of description and research of the aforementioned phenomena,Secondly — methodological problems, among which the basic problem appears: can we define one approach to the above-mentioned issues or there will be a multiplicity of methodologies here? In the latter case, you will need to find a way/method to compare test results.


The extend of clever gadgets has accelerated touchy statistics trade on the Internet the usage of most of the time unsecured channels. Since a large use of RFID (Radio-frequency Identification) tags in the transportation and development industries from 1980 to 1990, with the multiplied use of the Internet with 2G/3G or 4G when you consider that 2000, we are witnessing a new generation of related objects. . This paper aims to understand and additionally grant continuing doe’s research topic, challenge, and Future Direction related to Iot security. A systematic mapping finds out about (SMS) is thus utilized on the way to organize the chosen Articles into the following classification: contribution type, Type of Research, Iot Security, and their approach. We take out an overall of twenty-four Articles in support of this systematic discover out about also they categorize the following described criterion. The findings of this SMS are mentioned and the researcher was once given hints on the possible route for future research


Author(s):  
Pankaj Kamthan

The Internet, particularly the Web, has opened new vistas for businesses. The ability that anyone, using (virtually) any device could be reached anytime and anywhere presents a tremendous commercial prospective. In retrospect, the fact that almost anyone can set up a Web Application claiming to offer products and services raises the question of credibility from a consumers’ viewpoint. If not addressed, there is a potential for lost consumer confidence, thus significantly reducing the advantages and opportunities the Web as a medium offers. Establishing credibility is essential for an organization’s reputation (Gibson, 2002) and for building consumers’ trust (Kamthan, 1999). The rest of the article is organized as follows. We first provide the motivational background necessary for later discussion. This is followed by the introduction of a framework within which different types of credibility in the context of Web Applications can be systematically addressed and thereby improved. Next, challenges and directions for future research are outlined. Finally, concluding remarks are given.


Sign in / Sign up

Export Citation Format

Share Document