706 research outputs found

    The Impacts of Privacy Rules on Users' Perception on Internet of Things (IoT) Applications: Focusing on Smart Home Security Service

    Get PDF
    Department of Management EngineeringAs communication and information technologies advance, the Internet of Things (IoT) has changed the way people live. In particular, as smart home security services have been widely commercialized, it is necessary to examine consumer perception. However, there is little research that explains the general perception of IoT and smart home services. This article will utilize communication privacy management theory and privacy calculus theory to investigate how options to protect privacy affect how users perceive benefits and costs and how those perceptions affect individuals??? intentions to use of smart home service. Scenario-based experiments were conducted, and perceived benefits and costs were treated as formative second-order constructs. The results of PLS analysis in the study showed that smart home options to protect privacy decreased perceived benefits and increased perceived costs. In addition, the perceived benefits and perceived costs significantly affected the intention to use smart home security services. This research contributes to the field of IoT and smart home research and gives practitioners notable guidelines.ope

    Smartphone as an Edge for Context-Aware Real-Time Processing for Personal e-Health

    Get PDF
    The medical domain is facing an ongoing challenge of how patients can share their health information and timeline with healthcare providers. This involves secure sharing, diverse data types, and formats reported by healthcare-related devices. A multilayer framework can address these challenges in the context of the Internet of Medical Things (IoMT). This framework utilizes smartphone sensors, external services, and medical devices that measure vital signs and communicate such real-time data with smartphones. The smartphone serves as an “edge device” to visualize, analyze, store, and report context- aware data to the cloud layer. Focusing on medical device connectivity, mobile security, data collection, and interoperability for frictionless data processing allows for building context-aware personal medical records (PMRs). These PMRs are then securely transmitted through a communication protocol, Message Queuing Telemetry Transport (MQTT), to be then utilized by authorized medical staff and healthcare institutions. MQTT is a lightweight, intuitive, and easy-to-use messaging protocol suitable for IoMT systems. Consequently, these PMRs are to be further processed in a cloud computing platform, Amazon Web Services (AWS). Through AWS and its services, architecting a customized data pipeline from the mobile user to the cloud allows displaying of useful analytics to healthcare stakeholders, secure storage, and SMS notifications. Our results demonstrate that this framework preserves the patient’s health-related timeline and shares this information with professionals. Through a serverless Business intelligence interactive dashboard generated from AWS QuickSight, further querying and data filtering techniques are applied to the PMRs which identify key metrics and trends

    Seoul e-Government

    Get PDF

    A Study of Smartphone Addiction among Adolescents in Mongolia

    Get PDF
    학위논문 (석사)-- 서울대학교 대학원 공과대학 협동과정 기술경영·경제·정책전공, 2017. 8. 황준석.Although high technology has created many new advancements and services through the population, besides the dark side has appeared in society. The dark side of modern IT technology is having an impact on daily life of youth in several ways including, personal information security problem, overuse, cyber bullying and etc. Adolescents use a smartphone to communicate with their family and friends, to provide their security as well as to obtain a new information and qualitative education however at the same time they are addicted to a smartphone. This study aims to determine factors that influence smartphone addiction the most among the Mongolian adolescents using the regression analysis method. Previous studies show numerous influencing factors based on socioeconomic, psychological and personal characteristics, however this study has the differentiation that is focused on social factors in Mongolian society. The smartphone addiction is possible to be measured by Smartphone Addiction Scale in the research area. The participants, who are aged 13-17, own a smartphone at least two months use. In order to examine and understand the overuse of a smartphone, this study investigates influencing factors that are adolescents base on empirical data gathered from a personal interview survey. In Mongolia, the survey was conducted in 21 randomly chosen general educational schools and focused on the students of middle school and high school classes in the year 2016. The thesis was conducted by the empirical study, which included 383 participants, and was analyzed by Ordinary Least-Squares Regression Method. The study was examined by the link between family, school, the use of a smartphone, the awareness of smartphone addiction and compulsive behaviors. The study result suggest that the smartphone addiction is an epidemic problem among Mongolian children especially in the Capital City. By understanding these influencing factors, Mongolian Government Agencies and policy-makers could make a decision and implement planning against to smartphone and internet addiction among adolescents. Lastly, this study gives a rational explanation and suggests policy guidelines on the problem of smartphone addiction for three levels. Keywords: Use of smartphone addiction, Internet addiction, Adolescents, Teenager, Mongolian Society, usage of smartphone, IT policy of addictionIntroduction 1 1.1. Introduction 1 1.2. Research Motivation 5 1.3. Purpose of Dissertation 8 Literature review 10 2.1. Smartphone Device 10 2.2. Smartphone Application 11 2.3. The Usage of Smartphone 12 2.4. Internet Addiction 13 2.5. Smartphone Addiction 14 2.6. Behavioral Addiction of Smartphone 15 2.7. Smartphone Addition Scale 16 2.8. Adolescents 18 2.9. Related Study 19 2.10. Policy on Smartphone Addiction in the World 20 Research Methodology 22 3.1. Proposal 22 3.2. Research Model and Hypothesis 25 3.3. Survey Participants 31 3.4. Measurements of Variables 32 3.5. Construction of Model 33 3.5.1 Ordinary Least Squares Analysis 33 3.5.2 The Limitation of Model 35 Data Analysis 36 4.1. Data collection 36 4.2. Demographic and Descriptive Statistics 37 4.3. The smartphone Usage and Descriptive Statistics 40 4.4. Regression Analysis Results 44 4.4.1. Regression analysis on Family Factor 44 4.4.2. Regression analysis on School Factor 46 4.4.3. Regression analysis on the Use of Smartphone Factor 48 4.4.4. Regression Analysis on the Awareness Factor 49 4.5. Result Discussion 50 Conclusion and Policy Implications 53 5.1. Conclusion 53 5.2. Policy Implications 55 5.2.1 Treatment of Screen Addiction 55 5.2.2 Implications of Policy 58 5.3. Limitation and Future research 64 References 66 Appendix 72Maste

    From spaces of sexual violence to sites of networked resistance: Re-imagining mobile and social media technologies

    Get PDF
    To date, much of the work on mobile and social media in the context of sexual violence has focused on its threats and harmful effects, particularly in relation to cyber-bullying and other forms of online harassment. But what if we think of such technologies as technologies of non-violence? In this article we make a case for exploring this work in rural South Africa, where, in spite of some challenges of access, the availability of technology is increasing the number of possible ways of addressing sexual violence. Building on what we offer as a primer of technologies currently available, we consider the implications of this work for researchers (especially those in education), interested in how technology can help to address sexual violence

    Navigating LGBTQ+ and Disabled Intersections Online: Social Support and Identity Construction in the Age of Social Media

    Get PDF
    There is a lack of research about the lived experiences of self-identified lesbian, gay, bisexual, transgender, queer, and otherwise-identified (LGBTQ+) young adults with disabilities who use the Internet to achieve particular social aims. Using open-ended survey questions, the researcher applied multidimensional and overlapping frameworks of intersectionality, feminist-disability theory, and social work to answer the following: What are the lived experiences of disabled, LGBTQ+ young adults who use social media for social support and identity construction? Using secondary data, fifteen (N=15) cases of LGBTQ+ disabled young adults aged 18 to 31 living in the United States were selected, and data was analyzed using a phenomenological thematic analysis. The research revealed salient themes, such as community/belonging, access to “others like me,” positive identity formation and protective mental health factors to name a few, each of which respectively facilitated or complicated participants’ motives to use social media platforms. Implications of v the research findings for social science scholars and suggestions for future research are discussed

    Seoul public transportation

    Get PDF

    Horizontal surveillance, mobile communication and social networking sites. The lack of privacy in young people’s daily lives

    Get PDF
    Social networking sites and mobile communication have progressively encouraged the proliferation of certain surveillance and control practices employed by users on a daily basis. Platforms like Facebook and Instagram and devices such as mobile phones have normalised forms of horizontal surveillance, which have begun to be accepted by citizens as the norm. Thus, this paper examines a series of lateral and social surveillance practices that demonstrate a more deliberate and reprehensible behaviour on the part of users by focusing on the conflicts arising from the lack of privacy and control and the deficient management of inappropriate or annoying content in the social networking site environment. To this end, 311 students of the Universidad de Sevilla aged between 18 and 26 were asked to fill in a questionnaire. The survey results show that the majority of the respondents acknowledged having felt being spied on social networking sites, as well as having ended up at loggerheads with acquaintances as a consequence of having shared personal content with others. Lastly, it is apparent that, despite present concerns about the absence of privacy and control and inappropriate or annoying content, users believe that these are risks well worth running for the sake of sharing on social media

    Roots Reloaded. Culture, Identity and Social Development in the Digital Age

    Get PDF
    This edited volume is designed to explore different perspectives of culture, identity and social development using the impact of the digital age as a common thread, aiming at interdisciplinary audiences. Cases of communities and individuals using new technology as a tool to preserve and explore their cultural heritage alongside new media as a source for social orientation ranging from language acquisition to health-related issues will be covered. Therefore, aspects such as Art and Cultural Studies, Media and Communication, Behavioral Science, Psychology, Philosophy and innovative approaches used by creative individuals are included. From the Aboriginal tribes of Australia, to the Maoris of New Zealand, to the mystical teachings of Sufi brotherhoods, the significance of the oral and written traditions and their current relation to online activities shall be discussed in the opening article. The book continues with a closer look at obesity awareness support groups and their impact on social media, Facebook usage in language learning context, smartphone addiction and internet dependency, as well as online media reporting of controversial ethical issues. The Digital progress has already left its dominating mark as the world entered the 21st century. Without a doubt, as technology continues its ascent, society will be faced with new and altering values in an effort to catch-up with this extraordinary Digitization, adapt satisfactorily in order to utilize these strong developments in everyday life
    corecore