media collaboration
Recently Published Documents


TOTAL DOCUMENTS

27
(FIVE YEARS 8)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 3 (2) ◽  
pp. 73-84
Author(s):  
Rindra Risdiantoro

Abstract. One of the controllers of children's delinquency is teachers and parents. They are the main controllers to protect and save individuals and groups from deviant behavior. Efforts made by teachers and parents to their children who commit deviant behavior at MI Darul Hikam Batu City by making efforts to prevent (preventive), inhibit (responsive), repair (rehabilitation) and cure (curative). The objectives of this study are: 1) to explain the behavioral deviations carried out by students of MI Darul Hikam Batu City, 2) to explain the factors that cause deviant behavior to students at MI Darul Hikam Batu City, 3) to explain the collaboration of teachers and parents in overcoming deviant behavior. to the students of MI Darul Hikam Batu City. The form of deviant behavior carried out by students at MI Darul Hikam Batu City is included in the category of deviation from social norms. The factors that cause deviant behavior in Darul Hikam MI students in Batu City are the social environment, lack of attention from parents, lack of discipline, being influenced by electronic media or social media. Collaboration between teachers and parents in overcoming the deviant behavior of MI Darul Hikam students in Batu City through reprimands, warnings, advice, and punishments.   Keywords: collaboration, teachers and parents, deviant behavior.


Author(s):  
Ila Mehrotra Anand, Saurabh Anand

Interacting with software using keyboard and mouse will soon be history. Voice, speeches, gestures are the next big thing in communication. IoT will certainly produce a large amount of people-related data and it is this data that is going to be really useful for decision taking purposes. HR would need to incorporate technology to successfully control the organizational human resources. IoT will allow us to access our data and other applications like Continuous Performance Management, where digital culture is required to create a genuinely valuable connection between an employee and his or her staff. It also helps to exchange thoughts and experiences through social media collaboration which is a driving force for all employees. The paper tries to analyze the role of IoT in People analytics, challenges associated with it and how Delloitte Canada has gone about implementing it across their organization.


Author(s):  
Jitendra Singh

Smartphones have deeply penetrated in modern lifestyle. Accordingly, usage has grown manifold in the area of social media, collaboration, and mobile-based payment. The security of smartphones is increasingly critical at the user end as well as at service provider's end due to the involvement of monetary payments and personal information. Despite using a smartphone for mobile payments, strong security measures have not been put into place by a majority of users, particularly those involved with electronic payments. This article is an attempt to identify threats applicable to smartphones and classify them based on a broader category of threats. Existing vulnerabilities have been explored. In the light of the digital India campaign, security preparedness among Indian users has been assessed by carrying out a survey that reveals a poor level of preparedness among mobile users. Finally, the authors have proposed a lotus diagram (LD)-based framework to mitigate threats that can negatively impact mobile-based payment. The proposed method will greatly help in strengthening security and mitigating the threats for the user.


2019 ◽  
Vol 13 (2) ◽  
pp. 51
Author(s):  
Ratna Istriyani

Nama gang (jalan kecil) selama ini dianggap sebagai petunjuk alamat atau jalan dan lazim ditemukan di masyarakat urban yang lazim dengan relasi individualistis. Kendati demikian, nama gang kini juga mulai jamak ditemukan di lingkungan pedesaan. Namun bagaimana jika gang di pedesaan itu dinamai dengan logo dan brand telepon seluler? Tentu saja itu adalah realitas yang paradoks dan ganjil. Realitas itu merupakan salah satu dari realitas aneh di era postmodern, yang mana korporasi multinasional telah berhasil menyerang kesadaran masyarakat secara ideologis (total). Keberhasilan itu juga merupakan hasil dari kolaborasi media (teknologi informasi dan komunikasi) serta pasar yang sangat intim dan masif. Oleh karena itu, bagaimana cara kita menemukan pintu keluar dari jeratan itu?Keyword: gang seluler, postmodern, korporasi multinasional.The name of the alley has been considered as a sign of address or road and is commonly found in urban communities that are prevalent with individualistic relations. Nevertheless, the name of the alley is now also starting to be found in a rural environment. But what if the alley in the countryside is named after the cell phone logo and brand? Of course it is a paradoxical and strange reality. That reality is one of the strange realities in the postmodern era, in which multinational corporations have succeeded in attacking people’s consciousness ideologically (totally). This success is also the result of media collaboration (information and communication technology) and a very intimate and massive market. Therefore, how do we find the exit from the trap?Keyword: cellular alley names, postmodern, multinational corporation.


2019 ◽  
Vol 10 (4) ◽  
pp. 1-17
Author(s):  
Jitendra Singh

Smartphones have deeply penetrated in modern lifestyle. Accordingly, usage has grown manifold in the area of social media, collaboration, and mobile-based payment. The security of smartphones is increasingly critical at the user end as well as at service provider's end due to the involvement of monetary payments and personal information. Despite using a smartphone for mobile payments, strong security measures have not been put into place by a majority of users, particularly those involved with electronic payments. This article is an attempt to identify threats applicable to smartphones and classify them based on a broader category of threats. Existing vulnerabilities have been explored. In the light of the digital India campaign, security preparedness among Indian users has been assessed by carrying out a survey that reveals a poor level of preparedness among mobile users. Finally, the authors have proposed a lotus diagram (LD)-based framework to mitigate threats that can negatively impact mobile-based payment. The proposed method will greatly help in strengthening security and mitigating the threats for the user.


Sign in / Sign up

Export Citation Format

Share Document