902 resultados para Internet users--Psychology


Relevância:

30.00% 30.00%

Publicador:

Resumo:

[ES]En este trabajo fin de grado se presenta un estudio de diferentes metodologías para la estimación de la velocidad de acceso a Internet. En el estudio no sólo se analizan las metodologías de las herramientas más extendidas sino que también se tienen en cuenta los factores de influencia principales examinándose su afección global en los resultados obtenidos. Los resultados de este estudio permitirán a los distintos agentes implicados contar con información de interés para el desarrollo de sus propias herramientas. Además, las conclusiones del estudio podrían conducir, en un futuro próximo, a la estandarización de una metodología unificada, por parte de organismos internacionales del sector, que permita comparativas de datos así como la verificación de los acuerdos de nivel de servicio, de interés para usuarios, operadores y reguladores.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A pesquisa busca compreender como a lógica e as ferramentas das Tecnologias da Informação e Comunicação atuais são apropriadas socialmente na participação dos assuntos cívicos, com ênfase na política. Como percurso, são revisitados os conceitos tradicionais da democracia e situa-se a discussão nas maneiras como os valores democráticos são paulatinamente incorporados aos ambientes digitais contemporâneos, apresentados como elementos importantes na aquisição cognitiva do público. Como recorte demográfico, estuda-se a juventude eleitora conectada, residente na cidade do Rio de Janeiro. Ao fim do trabalho, aplica-se uma pesquisa de caráter quantitativo com amostra representativa do público, na busca por compreender a opinião política, o posicionamento perante a democracia, os hábitos culturais relacionados aos meios massivos e TIC de comunicação, identificando, por fim, os repertórios de ação reconhecidos como tal na esfera pública com o suporte da comunicação digital.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Desde o final do século XX, o tema saúde é um das mais procurados na internet para diversos fins. As pessoas que convivem com HIV/AIDS não estão afastadas dessa tendência, formando inclusive um dos grupos de usuários que mais acessam a internet. Um grupo com um passado e presente de produção de movimento social que muito contribuiu para a reconhecida política HIV/AIDS brasileira. O objetivo desta tese é identificar e analisar os padrões de busca e interação com o conteúdo em saúde na internet no cotidiano das pessoas com HIV/AIDS, em particular nos potenciais desdobramentos em processos de medicalização, tomada de decisão sobre condutas em saúde e relação com movimento social. A metodologia se baseou em análise de conteúdo de entrevistas e realização de etnografia virtual de uma página fechada no Facebook. As discussões sobre o material pesquisado foram divididas em categorias analíticas, cuja análise gerou os seguintes resultados: a sociabilidade produzida na internet contribui para diminuir o sofrimento em relação ao preconceito, tanto em relação ao HIV/AIDS, quanto à homossexualidade; há uma carência de espaços de acolhimento virtual em detrimento a uma maior oferta de espaços para discussão sobre políticas públicas; a medicalização na rede produz a chance de se obter condutas não recomendadas, no entanto, pessoas vinculadas a grupos virtuais possuem mais estímulos a não abandonar a medicação; a confiabilidade nos conteúdos da internet em geral possui um padrão de acesso a sites recomendados pelos órgãos oficiais do setor saúde; é comum pesquisar antes ou depois da consulta médica, no entanto a negociação se dá em cyberespaços de acolhimento; muitos ativistas do HIV/AIDS foram estimulados a participar do ativismo político através da internet. Há necessidade de se ampliar espaços virtuais de acolhimento através de políticas públicas incentivadoras; a formação médica precisa contemplar questões relacionadas à internet e saúde sobre sociabilidade, adesão, e terapêutica digital, prescrição de sites, blogs e redes sociais, devendo-se ponderar com questões de medicalização e prevenção quaternária.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

I have invented "Internet Fish," a novel class of resource-discovery tools designed to help users extract useful information from the Internet. Internet Fish (IFish) are semi-autonomous, persistent information brokers; users deploy individual IFish to gather and refine information related to a particular topic. An IFish will initiate research, continue to discover new sources of information, and keep tabs on new developments in that topic. As part of the information-gathering process the user interacts with his IFish to find out what it has learned, answer questions it has posed, and make suggestions for guidance. Internet Fish differ from other Internet resource discovery systems in that they are persistent, personal and dynamic. As part of the information-gathering process IFish conduct extended, long-term conversations with users as they explore. They incorporate deep structural knowledge of the organization and services of the net, and are also capable of on-the-fly reconfiguration, modification and expansion. Human users may dynamically change the IFish in response to changes in the environment, or IFish may initiate such changes itself. IFish maintain internal state, including models of its own structure, behavior, information environment and its user; these models permit an IFish to perform meta-level reasoning about its own structure. To facilitate rapid assembly of particular IFish I have created the Internet Fish Construction Kit. This system provides enabling technology for the entire class of Internet Fish tools; it facilitates both creation of new IFish as well as additions of new capabilities to existing ones. The Construction Kit includes a collection of encapsulated heuristic knowledge modules that may be combined in mix-and-match fashion to create a particular IFish; interfaces to new services written with the Construction Kit may be immediately added to "live" IFish. Using the Construction Kit I have created a demonstration IFish specialized for finding World-Wide Web documents related to a given group of documents. This "Finder" IFish includes heuristics that describe how to interact with the Web in general, explain how to take advantage of various public indexes and classification schemes, and provide a method for discovering similarity relationships among documents.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Urquhart, C. (editor for JUSTEIS team), Spink, S., Thomas, R., Yeoman, A., Durbin, J., Turner, J., Armstrong, A., Lonsdale, R. & Fenton, R. (2003). JUSTEIS (JISC Usage Surveys: Trends in Electronic Information Services) Strand A: survey of end users of all electronic information services (HE and FE), with Action research report. Final report 2002/2003 Cycle Four. Aberystwyth: Department of Information Studies, University of Wales Aberystwyth with Information Automation Ltd (CIQM). Sponsorship: JISC

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thomas, R., Urquhart, C., Crossan, S. & Hines, B. (2008). MUES (Mid Wales - Users - Ethnic Services) Ethnic services provision 2007-08. Report for Libraries for Life: Delivering the entitlement agenda for library users in Wales 2007-09. Aberystwyth: Department of Information Studies, Aberystwyth University. Related policy guidance published separately Sponsorship: CyMAL

Relevância:

30.00% 30.00%

Publicador:

Resumo:

North, J., Lavallee, D., An investigation of potential users of career transition services in the United Kingdom, Psychology of Sport and Exercise, Vol. 5, No. 1. (January 2004), pp. 77-84. RAE2008

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Internet Traffic Managers (ITMs) are special machines placed at strategic places in the Internet. itmBench is an interface that allows users (e.g. network managers, service providers, or experimental researchers) to register different traffic control functionalities to run on one ITM or an overlay of ITMs. Thus itmBench offers a tool that is extensible and powerful yet easy to maintain. ITM traffic control applications could be developed either using a kernel API so they run in kernel space, or using a user-space API so they run in user space. We demonstrate the flexibility of itmBench by showing the implementation of both a kernel module that provides a differentiated network service, and a user-space module that provides an overlay routing service. Our itmBench Linux-based prototype is free software and can be obtained from http://www.cs.bu.edu/groups/itm/.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the increasing demand for document transfer services such as the World Wide Web comes a need for better resource management to reduce the latency of documents in these systems. To address this need, we analyze the potential for document caching at the application level in document transfer services. We have collected traces of actual executions of Mosaic, reflecting over half a million user requests for WWW documents. Using those traces, we study the tradeoffs between caching at three levels in the system, and the potential for use of application-level information in the caching system. Our traces show that while a high hit rate in terms of URLs is achievable, a much lower hit rate is possible in terms of bytes, because most profitably-cached documents are small. We consider the performance of caching when applied at the level of individual user sessions, at the level of individual hosts, and at the level of a collection of hosts on a single LAN. We show that the performance gain achievable by caching at the session level (which is straightforward to implement) is nearly all of that achievable at the LAN level (where caching is more difficult to implement). However, when resource requirements are considered, LAN level caching becomes much more desirable, since it can achieve a given level of caching performance using a much smaller amount of cache space. Finally, we consider the use of organizational boundary information as an example of the potential for use of application-level information in caching. Our results suggest that distinguishing between documents produced locally and those produced remotely can provide useful leverage in designing caching policies, because of differences in the potential for sharing these two document types among multiple users.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The SafeWeb anonymizing system has been lauded by the press and loved by its users; self-described as "the most widely used online privacy service in the world," it served over 3,000,000 page views per day at its peak. SafeWeb was designed to defeat content blocking by firewalls and to defeat Web server attempts to identify users, all without degrading Web site behavior or requiring users to install specialized software. In this article we describe how these fundamentally incompatible requirements were realized in SafeWeb's architecture, resulting in spectacular failure modes under simple JavaScript attacks. These exploits allow adversaries to turn SafeWeb into a weapon against its users, inflicting more damage on them than would have been possible if they had never relied on SafeWeb technology. By bringing these problems to light, we hope to remind readers of the chasm that continues to separate popular and technical notions of security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Overlay networks have been used for adding and enhancing functionality to the end-users without requiring modifications in the Internet core mechanisms. Overlay networks have been used for a variety of popular applications including routing, file sharing, content distribution, and server deployment. Previous work has focused on devising practical neighbor selection heuristics under the assumption that users conform to a specific wiring protocol. This is not a valid assumption in highly decentralized systems like overlay networks. Overlay users may act selfishly and deviate from the default wiring protocols by utilizing knowledge they have about the network when selecting neighbors to improve the performance they receive from the overlay. This thesis goes against the conventional thinking that overlay users conform to a specific protocol. The contributions of this thesis are threefold. It provides a systematic evaluation of the design space of selfish neighbor selection strategies in real overlays, evaluates the performance of overlay networks that consist of users that select their neighbors selfishly, and examines the implications of selfish neighbor and server selection to overlay protocol design and service provisioning respectively. This thesis develops a game-theoretic framework that provides a unified approach to modeling Selfish Neighbor Selection (SNS) wiring procedures on behalf of selfish users. The model is general, and takes into consideration costs reflecting network latency and user preference profiles, the inherent directionality in overlay maintenance protocols, and connectivity constraints imposed on the system designer. Within this framework the notion of user’s "best response" wiring strategy is formalized as a k-median problem on asymmetric distance and is used to obtain overlay structures in which no node can re-wire to improve the performance it receives from the overlay. Evaluation results presented in this thesis indicate that selfish users can reap substantial performance benefits when connecting to overlay networks composed of non-selfish users. In addition, in overlays that are dominated by selfish users, the resulting stable wirings are optimized to such great extent that even non-selfish newcomers can extract near-optimal performance through naïve wiring strategies. To capitalize on the performance advantages of optimal neighbor selection strategies and the emergent global wirings that result, this thesis presents EGOIST: an SNS-inspired overlay network creation and maintenance routing system. Through an extensive measurement study on the deployed prototype, results presented in this thesis show that EGOIST’s neighbor selection primitives outperform existing heuristics on a variety of performance metrics, including delay, available bandwidth, and node utilization. Moreover, these results demonstrate that EGOIST is competitive with an optimal but unscalable full-mesh approach, remains highly effective under significant churn, is robust to cheating, and incurs minimal overheads. This thesis also studies selfish neighbor selection strategies for swarming applications. The main focus is on n-way broadcast applications where each of n overlay user wants to push its own distinct file to all other destinations as well as download their respective data files. Results presented in this thesis demonstrate that the performance of our swarming protocol for n-way broadcast on top of overlays of selfish users is far superior than the performance on top of existing overlays. In the context of service provisioning, this thesis examines the use of distributed approaches that enable a provider to determine the number and location of servers for optimal delivery of content or services to its selfish end-users. To leverage recent advances in virtualization technologies, this thesis develops and evaluates a distributed protocol to migrate servers based on end-users demand and only on local topological knowledge. Results under a range of network topologies and workloads suggest that the performance of the distributed deployment is comparable to that of the optimal but unscalable centralized deployment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The advent of modern wireless technologies has seen a shift in focus towards the design and development of educational systems for deployment through mobile devices. The use of mobile phones, tablets and Personal Digital Assistants (PDAs) is steadily growing across the educational sector as a whole. Mobile learning (mLearning) systems developed for deployment on such devices hold great significance for the future of education. However, mLearning systems must be built around the particular learner’s needs based on both their motivation to learn and subsequent learning outcomes. This thesis investigates how biometric technologies, in particular accelerometer and eye-tracking technologies, could effectively be employed within the development of mobile learning systems to facilitate the needs of individual learners. The creation of personalised learning environments must enable the achievement of improved learning outcomes for users, particularly at an individual level. Therefore consideration is given to individual learning-style differences within the electronic learning (eLearning) space. The overall area of eLearning is considered and areas such as biometric technology and educational psychology are explored for the development of personalised educational systems. This thesis explains the basis of the author’s hypotheses and presents the results of several studies carried out throughout the PhD research period. These results show that both accelerometer and eye-tracking technologies can be employed as an Human Computer Interaction (HCI) method in the detection of student learning-styles to facilitate the provision of automatically adapted eLearning spaces. Finally the author provides recommendations for developers in the creation of adaptive mobile learning systems through the employment of biometric technology as a user interaction tool within mLearning applications. Further research paths are identified and a roadmap for future of research in this area is defined.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aims: to study the gambling history and stories of participants, motivations, impact and helpseeking. Method: Details were advertised on websites and newspapers. 30 frequent gamblers were interviewed over the telephone for approximately one hour. Verbatim transcriptions were analysed using NVIVO and grounded theory. Results/conclusions: Not all women had gambled before. However, internet accessibility meant prolonged periods were spent gambling to the neglect of other life areas. Some were originally motivated by excitement but others gambled to escape from current difficulties. Depression, anxiety, panic attacks and suicide ideation were common. The women were ambivalent towards their gambling and receiving help.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper reports a study investigating the relationship between Internet identification, Internet anxiety and Internet use. The participants were 446 students (319 females and 127 males) from two universities in the UK and one university in Australia. Measures of Internet identification and Internet anxiety were developed. The majority of participants were NOT anxious about using the Internet, although there were approximately 8% who showed evidence of Internet anxiety. There was a significant and negative relationship between Internet anxiety and Internet use. Those who were more anxious about using the Internet used the Internet less, although the magnitude of effect was small. There was a positive and significant relationship between Internet use and Internet identification. Those who scored high on the measure of Internet identification used the Internet more than those who did not. There was also a significant and negative relationship between Internet anxiety and Internet identification. Finally, males had a significantly higher Internet identification score than females. Implications of these findings are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Este trabajo tiene como propósito esencial, realizar un acercamiento para detectar e identificar las necesidades de información y el comportamiento informativo de entrenadores en deportes de combate. Para ello se aplicó un cuestionario a instructores de aikido, boxeo, esgrima, judo, karate, kendo, lima lama, lucha y taekwondo seleccionados mediante un muestreo no probabilístico por causalidad. En general encontramos que los principales temas de interés entre los instructores son: los programas de entrenamiento, nutrición y dietas de entrenamiento. Por otra parte, los entrenadores son más propensos a utilizar su experiencia, internet y cursos para obtener información. En contraste se nota que la biblioteca y los libros son poco usados.