smart phones
Recently Published Documents


TOTAL DOCUMENTS

1449
(FIVE YEARS 416)

H-INDEX

31
(FIVE YEARS 5)

2022 ◽  
Vol 30 (3) ◽  
pp. 1-18
Author(s):  
Yangling Xiao ◽  
Bingjun Tong ◽  
Yanmei Sheng ◽  
Mingxin Cui

With the increasing popularity of the smart phones and electronic payment, WeChat shopping has become a trendy lifestyle for many people. However, the issue of WeChat business integrity has gradually appeared due to the virtuality of the Internet. This paper analyzed the development of WeChat business and its business integrity. The influencing factors of WeChat business integrity and related hypotheses had been studied based on theoretical and practical analysis. The reliability and validity of the data collected through questionnaires were tested with SPSS24.0. Empirical analysis was done to the hypotheses by using the structural equation model. The results indicated that products and service quality, after-sale guarantee, payment security and Word-of-mouth had a prominent positive effect on the integrity of WeChat business.


2022 ◽  
Vol 30 (3) ◽  
pp. 0-0

With the increasing popularity of the smart phones and electronic payment, WeChat shopping has become a trendy lifestyle for many people. However, the issue of WeChat business integrity has gradually appeared due to the virtuality of the Internet. This paper analyzed the development of WeChat business and its business integrity. The influencing factors of WeChat business integrity and related hypotheses had been studied based on theoretical and practical analysis. The reliability and validity of the data collected through questionnaires were tested with SPSS24.0. Empirical analysis was done to the hypotheses by using the structural equation model. The results indicated that products and service quality, after-sale guarantee, payment security and Word-of-mouth had a prominent positive effect on the integrity of WeChat business.


2022 ◽  
pp. 205-222
Author(s):  
María A. Pérez-Juárez ◽  
Javier M. Aguiar-Pérez ◽  
Javier Del-Pozo-Velázquez ◽  
Miguel Alonso-Felipe ◽  
Saúl Rozada-Raneros ◽  
...  

The presence of technology on college campuses has increased rapidly in recent years. Students come to the classroom with a variety of technological devices including smart phones, tablets, or laptops and use them during academic activity. For this reason, there are many researchers who, in recent times, have been interested in the problems derived from digital distraction in higher education. In many cases, researchers have conducted studies and surveys to obtain first-hand information from the protagonists, that is, from university professors and students. Despite the efforts, there are many questions that still remain unanswered. The authors are aware of the enormous challenge that the use of technology poses in the university classrooms and want to delve into the causes and consequences of student digital distraction and the strategies that can be used by instructors to curb student digital distraction without deteriorating student-instructor rapport in the context of higher education.


Author(s):  
Suleiman Abu Safiyah

The study aims to identify the role of teachers in guiding students to use smart phones in their learning process, where the researcher used the descriptive analytical approach, and the questionnaire consists of (25) paragraphs as a tool for collecting study data after verifying its validity and reliability, while the sample was chosen by the researcher from his community consisting of (2401) teachers using the stratified random method, which consisted of (360) teachers, and the Statistical Package for Social Sciences (SPSS) program was used to analyze the data. The results of the study show that there was a role for teachers in directing public secondary school students affiliated to the Rusifa District to use smart phones in their learning process came in a medium degree, and an arithmetic mean of (3.37). The results also show that there were no statistically significant differences at the significance level (α ≥ 0.05) between the responses of the sample members about the role of teachers in directing public secondary school students affiliated to the Rusifa District to use smart phones in their learning process according to the study variables: Gender, Academic Qualification, and Number of Years of Experience. Based on the results, the researcher recommends: the need for school officials to realize this dangerous phenomenon and work to confront it by giving students homework urging them to use their smart devices for doing it, and guiding and educating teachers and students on the optimal use of mobile phones in the learning process


2021 ◽  
Vol 5 (2) ◽  
pp. 1-8
Author(s):  
Agung Riyadi ◽  
James James

In today's development, children are used to using smart phones or smartphones. Most of these smartphones run on the Android or IOS operating system. In smartphones there are applications that can be used for various purposes. One type of these applications is games. In this case, there are still many users who play the game having difficulty understanding the layout and menus that have been presented in a game, making it difficult for users to play it. In this study the author will discuss the user experience in the game "idle breeder" Idle Breeder is a top-down game with an idle genre with a relaxing feel. The formulation of this research is how to design a user interface in the idle breeder game and also how to do analysis in terms of user experience from users. User experience focuses on the comfort and convenience of users in using idle breeder games (usability)


2021 ◽  
Vol 5 (2) ◽  
pp. 102-109
Author(s):  
Riwinoto Riwinoto ◽  
William Tan

Saat ini, Perkembangan teknologi sudah sangat maju. Sebagian masyarakat sudah menggunakan dan memiliki Smart Phones ataupun Mobile Phones. Salah satu aspek didalam Smart Phones adalah Game Mobile yang dapat didownload di App Store, maupun Play Store. Game Mobile memiliki kesesuaian dengan pengguna saat ini. Dalam pengembangan game mobile, salah satu yang penting adalah perfomansi yang optimum game bisa berjalan di perangkat. Penelitian merupakan penelitian awal untuk mengetahui perfomasi prototype game yang sedang dikerjakan. Analisa perfomansi mencakup komputasi rendering, scripting, phyics, animasi, garbage collection, global illumination, UI dan others.  Perfomasi dilakukan dengan menggunakan tools unity profiler  yang tersedia di unity 3D IDE.  Hasil observasi menunjukan bahwa prototype game yang sudah dikembangkan masih mempunyai perfomansi komputasi yang buruk karena FPS yang dihasilkan hanya sampai level 15-20 FPS di mana idealnya mendapatkan 60 FPS. Diperlukan riset lanjutan untuk menentukan langkah optimasi pada prototype game sebelum melangkah ke pengembangan game yang full fitur.


2021 ◽  
Vol 9 (12) ◽  
pp. 669-710
Author(s):  
Dr.Yusuf Perwej ◽  
Syed Qamar Abbas ◽  
Jai Pratap Dixit ◽  
Dr. Nikhat Akhtar ◽  
Anurag Kumar Jaiswal

In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace.  Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't just a problem that affects individuals but it also applies to an organization or a government. Everything has recently been digitized, with cybernetics employing a variety of technologies such as cloud computing, smart phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about privacy, security, and financial compensation. Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data.  The primary goal of this article is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyber security tools, and cyber security difficulties. Cyber security safeguards the data and integrity of computing assets that are part of or connected to an organization's network, with the goal of defending such assets from all threat actors throughout the life cycle of a cyber-attack.


2021 ◽  
Vol 33 (02) ◽  
pp. 123-149
Author(s):  
Muhammad Sirod ◽  
Poniman

This research aims to understand the extent of the students’ participation to join the lectures during the Covid-19 pandemic, that requires the lectures to be conducted through online system. In such a condition Inquary-based learning is selected as an appropriate method of learning, in which the students’ independence is needed. The researchers conducted a case study on the application of inquiry-based learning, especially in the subject of Structure-Grammar, at the English Study Program, Academy of Foreign Language St. Pignatelli Surakarta In the implementation of this method the students are expected to be autonomous learners who must be aware of themselves that they need particular knowledge and consequently, with their own accord they will find any sources from both reference-books and scientific webs. The role of the lecturer is to guide them in such a way that they master the minimum requirements. The research results show that the students of Semester II give 66.66% of positive response, and those of Semester IV 73.55%. There are more than 25 % of students who do not give positive participation to the lectures due to  several obstacles, namely the lack of smart phones, adequate computers or internet access. Although the results are not so satisfying, they can be used as a reference for autonomous learning.


Sign in / Sign up

Export Citation Format

Share Document