97 resultados para Problematic internet use
Resumo:
E-commerce technologies such as a website, email and the use of web browsers enables access to large amounts of information, facilitates communication and provides niche companies with an effective mechanism for competing with larger organisations world-wide. However recent literature has shown Australian SMEs have been slow in the uptake of these technologies. The aim of this research was to determine which factors were important in impacting on small firms' decision making in respect of information technology and e-commerce adoption. Findings indicate that generally the more a firm was concerned about its competitive position such a firm was likely to develop a web site. Moreover the 'Industry and Skill Demands' dimension suggested that as the formal education of the owner/manager increased, coupled with the likelihood that the firm was in the transport and storage or communication services industries, and realising the cost of IT adoption was in effect an investment, then such a firm would be inclined to develop a web site.
Resumo:
This paper describes an autonomous docking system and web interface that allows long-term unaided use of a sophisticated robot by untrained web users. These systems have been applied to the biologically inspired RatSLAM system as a foundation for testing both its long-term stability and its practicality. While docking and web interface systems already exist, this system allows for a significantly larger margin of error in docking accuracy due to the mechanical design, thereby increasing robustness against navigational errors. Also a standard vision sensor is used for both long-range and short-range docking, compared to the many systems that require both omni-directional cameras and high resolution Laser range finders for navigation. The web interface has been designed to accommodate the significant delays experienced on the Internet, and to facilitate the non- Cartesian operation of the RatSLAM system.
Resumo:
Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.
Resumo:
High-rate flooding attacks (aka Distributed Denial of Service or DDoS attacks) continue to constitute a pernicious threat within the Internet domain. In this work we demonstrate how using packet source IP addresses coupled with a change-point analysis of the rate of arrival of new IP addresses may be sufficient to detect the onset of a high-rate flooding attack. Importantly, minimizing the number of features to be examined, directly addresses the issue of scalability of the detection process to higher network speeds. Using a proof of concept implementation we have shown how pre-onset IP addresses can be efficiently represented using a bit vector and used to modify a “white list” filter in a firewall as part of the mitigation strategy.
Resumo:
The Internet has been shown to positively influence the internationalisation activities of firms through enhanced information, knowledge and network development. Although there has been evidence of a positive impact of the Internet on internationalisation process components, it is vague as to whether the Internet has an impact on firm international market growth. This paper examines the role of the Internet in the outward internationalisation of a cross-national sample of 224 firms from Australia. The results show evidence that a there is a link between Internet usage, Internet intensity and the international market growth of the firm. The findings indicate that firms are using Internet technologies beyond simple e-mail and websites in their international marketing. For example, Internet directories and Internet market spaces are assisting international market expansion of the firm. Firms are integrating the Internet into international marketing processes such as advertising, marketing, market research and international market management as well as in data transference between company and supplier and company and customer. Further, there is evidence in this study of the statistical relationships between the use of website, e-mail and online sales with the international market growth of the firm.
Resumo:
This paper undertakes an overview of two developments in online media that coincided with the 'year-long campaign' that was the 2007 Australian Federal election. It discusses the relatively successful use of the Internet and social media in the 'Kevin07' Australian Labor Party campaign, and contrasts this to the Liberal-National Party's faltering use of You Tube for policy announcements. It also notes the struggle for authority in interpreting polling data between the mainstream media and various online commentators, and the 'July 12 incident' at The Australian, where it engaged in strong denunciation of alleged biases and prejudices among bloggers and on political Web sites. It concludes with consideration of some wider implication for political communication and the politics-media relationship, and whether we are seeing trends towards dispersal and diversification characterising the 'third age' of political communication.
Resumo:
The present paper addresses the findings of a preliminary investigation into policy and codes of conduct pertaining to the use of laptops and PDA’s in business meetings. The purpose of this study was to conduct a review of policies or codes of conduct pertaining to the use of laptops and PDAs in meetings. The investigation included academic literature, policy searches in the public domain of the Internet, as well as personal contact with target industries (large corporations – N=1000 + employees). The results highlight the dearth of policy and codes of conducts pertaining to the use of laptops and PDA’s in business meetings. Consequently, given the growing interdependence between mobile technologies and the contemporary workplace, there exists an opportunity for communication professionals to further research and develop policy and codes of conduct in this area. Implications for corporate communication policies and practices are also discussed.
Resumo:
Potentially harmful substance use is common, but many affected people do not receive treatment. Brief face-to-face treatments show impact, as do strategies to assist self-help remotely, by using bibliotherapies, computers or mobile phones. Remotely delivered treatments offer more sustained and multifaceted support than brief interventions, and they show a substantial cost advantage as users increase in number. They may also build skills, confidence and treatment fidelity in providers who use them in sessions. Engagement and retention remain challenges, but electronic treatments show promise in engaging younger populations. Recruitment may be assisted by integration with community campaigns or brief opportunistic interventions. However, routine use of assisted self-help by standard services faces significant challenges. Strategies to optimize adoption are discussed. ----- ----- Research Highlights: ► Many people with risky or problematic drinking do not currently receive treatment. ► Assisted self-help has a significant impact and can be delivered at low cost. ► Maximal effects from assisted self-help require engagement of potential users. ► Marketing campaigns and integration into existing service models may assist.
Resumo:
In late 2009, Sandra Haukka secured funding from the auDA Foundation to explore what older Australians who never or rarely use the Internet (referred to as ‘non-users’) know about the types of online products and services available to them, and how they might use these products and services to improve their daily life. This project aims to support current and future strategies and initiatives by: 1) exploring the extent to which non-users are aware of the types and benefits of online products and services, (such as e-shopping, e-banking, e-health, social networking, and general browsing and research) as well as their interest in them b) identifying how the Internet can improve the daily life of older Australians c) reviewing the effectiveness of support and services designed to educate and encourage older people to engage with the Internet d) recommending strategies that aim to raise non-user awareness of current and emerging online products and services, and provide non-users with the skills and knowledge needed to use those products and services that they believe can improve their daily life. The Productive Ageing Centre at National Seniors Australia, and Professor Trevor Barr from Swinburne University provided the project with in-kind support.
Resumo:
Real-time sales assistant service is a problematic component of remote delivery of sales support for customers. Solutions involving web pages, telephony and video support prove problematic when seeking to remotely guide customers in their sales processes, especially with transactions revolving around physically complex artefacts. This process involves a number of services that are often complex in nature, ranging from physical compatibility and configuration factors, to availability and credit services. We propose the application of a combination of virtual worlds and augmented reality to create synthetic environments suitable for remote sales of physical artefacts, right in the home of the purchaser. A high level description of the service structure involved is shown, along with a use case involving the sale of electronic goods and services within an example augmented reality application. We expect this work to have application in many sales domains involving physical objects needing to be sold over the Internet.
Resumo:
As the use of Twitter has become more commonplace throughout many nations, its role in political discussion has also increased. This has been evident in contexts ranging from general political discussion through local, state, and national elections (such as in the 2010 Australian elections) to protests and other activist mobilisation (for example in the current uprisings in Tunisia, Egypt, and Yemen, as well as in the controversy around Wikileaks). Research into the use of Twitter in such political contexts has also developed rapidly, aided by substantial advancements in quantitative and qualitative methodologies for capturing, processing, analysing, and visualising Twitter updates by large groups of users. Recent work has especially highlighted the role of the Twitter hashtag – a short keyword, prefixed with the hash symbol ‘#’ – as a means of coordinating a distributed discussion between more or less large groups of users, who do not need to be connected through existing ‘follower’ networks. Twitter hashtags – such as ‘#ausvotes’ for the 2010 Australian elections, ‘#londonriots’ for the coordination of information and political debates around the recent unrest in London, or ‘#wikileaks’ for the controversy around Wikileaks thus aid the formation of ad hoc publics around specific themes and topics. They emerge from within the Twitter community – sometimes as a result of pre-planning or quickly reached consensus, sometimes through protracted debate about what the appropriate hashtag for an event or topic should be (which may also lead to the formation of competing publics using different hashtags). Drawing on innovative methodologies for the study of Twitter content, this paper examines the use of hashtags in political debate in the context of a number of major case studies.
Resumo:
We explored common reasons for non-use of the rapidly growing popularity of social networking sites among a sample of Australian adolescents (N = 69). Transcripts were coded by grouping responses along similar themes for non-use that had been commonly stated by participants. The primary reasons offered by adolescents were: lack of motivation, poor use of time, preference for other forms of communication, preference for engaging in other activities, cybersafety concerns, and a dislike of self-presentation online. The identification of these themes allows for a greater understanding of teenagers' decisions not to engage in the popular medium of communication and points to possible strategies that could be utilised by Web site developers in efforts to appeal to a wider teenage audience.
Resumo:
This chapter describes current trends in the global media environment, with a focus on their implications for the management of public agendas and political processes. It assesses the extent to which trends such as the growth of the blogosphere, "citizen journalism," and other forms if user-generated content, have complicated and problematized news and agenda management as engaged in by both media and political elites. It argues that, in large part due to the rise of the internet and the proliferation if online producers of information and commentary, alongside 24-hour news channels such as CNN and Al Jazeera, political and social actors today face a much more complex, chaotic communication environment than ever bifore, an environment characterized as one of cultural chaos. Having outlined the roots of this trend in the emergence of an expanded, globalized public sphere, the chapter goes on to ask if elite control over the political agenda has been eroded, and if it has, what the consequences for governmmt and the exercise if power might be. Can authoritarian regimes in China, the Middle East, and elsewhere survive the onset if internet-fueled global journalism, for example? In a political environment where public opinion is driven and buffeted by news coverage if unprecedented speed and volume, can democratic governments retain sufficient control over decision- and policy-making processes to enable competent social administration al'ld political management? Can the citizens of contemporary democracies use the emerging media environment to enhance elite accountability and strengthen the democratic process? The chapter concludes that the changing global media environment has the potmtial to strengthen democratic processes, though there is no sil'lgle template for the impact of the internet and other new media on specific countries.
Resumo:
Service-oriented Architectures (SOA) and Web services leverage the technical value of solutions in the areas of distributed systems and cross-enterprise integration. The emergence of Internet marketplaces for business services is driving the need to describe services, not only from a technical level, but also from a business and operational perspective. While, SOA and Web services reside in an IT layer, organizations owing Internet marketplaces are requiring advertising and trading business services which reside in a business layer. As a result, the gap between business and IT needs to be closed. This paper presents USDL (Unified Service Description Language), a specification language to describe services from a business, operational and technical perspective. USDL plays a major role in the Internet of Services to describe tradable services which are advertised in electronic marketplaces. The language has been tested using two service marketplaces as use cases.
Resumo:
Is the brain evolving and adapting to new technological environments such as that of Silicon Valley? This paper examines changes that are being observed and studied relating to a possible correlation between ‘excessive’ focus on technology and the emergence of diagnosable social, physical and mental health dysfunction. The author explores the possible role of university staff and student services in the duty of care toward students. Would it not be more ethical to provide education on healthy technology use and to provide evidence based therapy for those students who fall through the web? Currently students end up being excluded from their courses. Many suffer from social anxiety and depression and lack confidence and social skills to find or hold down a job. Currently many “hibernate” in their rooms for months or years frequently in a state of despair.