• Title/Summary/Keyword: Computer Usage

Search Result 1,229, Processing Time 0.111 seconds

Understanding the Risks on Saudi Arabian's Youth Being Online Without Having Strong Cyber-Security Awareness

  • Alharbi, Nawaf;Soh, Ben;AlZain, Mohammed A;Alharbi, Mawaddah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.131-146
    • /
    • 2022
  • The Internet is becoming a basic need for many individuals globally in this digital age. The youths became more active online than before, with the majority relying on different platforms to communicate and interact with peers. Saudi Arabia is one of the nations where internet usage is high, with an increasing number of active internet users. The youth in Saudi Arabia are engaged in various online platforms. However, they lack adequate knowledge about cybersecurity and the dangers of internet usage, which exposes them to the risk of falling victims to cybercriminals. The most common dangers of internet usage include viruses, malware, phishing, and hacking, compromising users' sensitive information. Increased awareness of these potential threats helps protect Internet users and secure their data. The understanding of the dangers of Internet usage among youths varies across countries. In this regard, our study explores the risks of internet usage among youth in Saudi Arabia compared to the United States, South Africa, and New Zealand.

What makes University Students to continuously use Cloud Services? - Enjoyment and Social Influence

  • Lee, Jong Man;Lee, Sang Jong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.123-129
    • /
    • 2018
  • The purpose of this paper is to investigate the influence of utilitarian, hedonic and social motivations on continuance intention to use cloud services. To do this, this study built a research model and examined how ease of use, usefulness, enjoyment, social influence affect the continuance usage intention of cloud services. The survey method was used for this paper, and data from a total of 82 university students were used for the analysis. And structural equation model was used to analyze the data. The results of this empirical study is summarized as followings. First, enjoyment has a direct effect on the continuance usage intention of cloud services. Second, social influence has a direct effect on the continuance usage intention. Further, it will provide meaning suggestion point of the importance of not only utilitarian motivation but also hedonic and social motivations in establishing the use policy of cloud services.

Access, Skills and Constraints of Barangay Officials towards the Use of Information and Communications Technology (ICT)

  • Santiago, Cereneo S. Jr.;Ulanday, Ma. Leah P.;Centeno, Zarah Jane R.;Bayla, Ma. Cristina D.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.2
    • /
    • pp.37-54
    • /
    • 2021
  • The study determined the access, skills and constraints towards the usage of ICT among barangay officials. A complete enumeration technique was used due to the small size of the population. A total of 121 barangay secretaries and barangay treasurers comprised the study respondents. The findings revealed that most of barangay officials have access to personal computer at home and in the office using their own mobile data and office internet connectivity. With the support from the Local Government Unit (LGU), it was found that most of the respondents are advance and proficient in computer usage. As constraints to ICT usage, the study respondents still experienced slow internet bandwidth that makes connection and communication weak along with the low income status. Consequently, it was found that there were no significant differences in terms of skills and constraints among barangay secretaries and barangay treasurers towards using ICT. It can be concluded that study respondents prefer to use office computer to access the information they need due to the convenience and availability of resources. The study respondents were competent enough to handle their job well but listed slow internet and low financial resources may hamper their ICT usage. Research implications were also offered.

Extraction of ObjectProperty-UsageMethod Relation from Web Documents

  • Pechsiri, Chaveevan;Phainoun, Sumran;Piriyakul, Rapeepun
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1103-1125
    • /
    • 2017
  • This paper aims to extract an ObjectProperty-UsageMethod relation, in particular the HerbalMedicinalProperty-UsageMethod relation of the herb-plant object, as a semantic relation between two related sets, a herbal-medicinal-property concept set and a usage-method concept set from several web documents. This HerbalMedicinalProperty-UsageMethod relation benefits people by providing an alternative treatment/solution knowledge to health problems. The research includes three main problems: how to determine EDU (where EDU is an elementary discourse unit or a simple sentence/clause) with a medicinal-property/usage-method concept; how to determine the usage-method boundary; and how to determine the HerbalMedicinalProperty-UsageMethod relation between the two related sets. We propose using N-Word-Co on the verb phrase with the medicinal-property/usage-method concept to solve the first and second problems where the N-Word-Co size is determined by the learning of maximum entropy, support vector machine, and naïve Bayes. We also apply naïve Bayes to solve the third problem of determining the HerbalMedicinalProperty-UsageMethod relation with N-Word-Co elements as features. The research results can provide high precision in the HerbalMedicinalProperty-UsageMethod relation extraction.

A Study on the Factors Promoting the Usage of WiBro Service (와이브로 서비스 활성화 방안)

  • Yoon, Jong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.7
    • /
    • pp.165-172
    • /
    • 2011
  • This study was to investigate which factors promote the usage of WiBro service, and to propose a few of research propositions on the relationships between these factor and characteristics of mobile Internet usage. To accomplish these research purposes, the study defined research variables such as factors promoting the usage of WiBro service, characteristic of mobile Internet usage, and types of user based on the review of mobile Internet service related studies. The study performed various statistical analyses using survey questionnaires on mobile Internet users, and finally proposed some research propositions, based on the analysis results, that could be used in the future studies.

Factors influencing usage intention and actual use of mobile learning (모바일러닝의 사용의도 및 실제사용에 영향을 미치는 요인 분석)

  • Lee, Jeongmin;Noh, Jiyae
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.4
    • /
    • pp.19-30
    • /
    • 2015
  • This study investigated the structural relationships among performance expectancy, effort expectancy, social influence, facilitating condition, attitude, usage intention and actual use. In order to examine structural relationships among variables, we surveyed 285 high school students in spring semester of 2014. After collecting data, we examined causal relationships among variables using structural equation modeling. The results of this study were as follows: First, performance expectancy and effort expectancy significantly affected attitude; however, social influence did not. Second, attitude affected usage intention and usage intention significantly affected actual use. Third, the indirect effect of attitude between performance expectancy, effort expectancy and usage intention were significant and the indirect effect of usage intention between attitude and actual was also significant. Finally, the moderating effect of gender and experience were not significant. Based on this study, the practical strategies to facilitate usage intention and actual use of mobile learning of high school students were suggested.

Analysis of Delay-Bandwidth Normalization Characteristic in Decay Usage Algorithm of UNIX (UNIX의 Decay Usage 알고리즘에서의 지연시간-사용량 정규화 특성 분석)

  • Park, Kyeong-Ho;Hwang, Ho-Young;Lee, Chang-Gun;Min, Sang-Lyul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.10
    • /
    • pp.511-520
    • /
    • 2007
  • Decay usage scheduling algorithm gives preference to processes that have consumed little CPU in the recent past. It has been widely-used in time-sharing systems such as UNIX, where CPU-intensive processes and interactive processes are mixed. However, there has been no sound understanding about the mixed effects of decay usage parameters on the service performance. This paper empirically analyzes their effects in terms of the resulting service bandwidth and delay Based on such empirical analysis, we derive the clear meaning of each parameter. Such analysis and understanding provides a basis of controlling decay usage parameters for desirable service provision as required by applications.

A Study on Copyright Usage Permission Platform Based on Blockchain for Distribution of Theme, Background and Signal Music (주제/배경/시그널 음원의 유통을 위한 블록체인 기반의 이용허락 플랫폼에 관한 연구)

  • Kim, Youngmo;Park, Byeongchan;Jang, Seyoung;Kim, Seok-Yoon
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.1
    • /
    • pp.18-24
    • /
    • 2021
  • The current settlement and distribution used in theme, background and signal music market other than conventional music is being carried out with either the comprehensive settlement method or the measured meter-rate settlement method in the payment process of collected user fees and compensation depending on the use-permission types. In this settlement and distribution process, however, the reliability issues are often being raised because of the difficulty of tracking rights due to changes in music source rights management information, etc, and the opaque settlement and distribution method itself. This paper proposes a new settlement and distribution platform using a blockchain for the reliable collection and distribution of copyright fees among music user group, monitoring organization group, trust organization group and copyright holders, based on the monitoring information of the theme, background and signal music usage. This platform also provides the transparency in settlement and distribution process among stakeholders through smart contract system.

A Study on Influence of Usage Learning Effect for Computer System Acceptance (실사용에 의한 학습효과가 컴퓨터 시스템의 수용에 미치는 영향에 관한 연구)

  • Kim, Chong-Su
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.3
    • /
    • pp.176-183
    • /
    • 2010
  • The benefits of information technology cannot be obtained unless potential users utilize it for their work. This led to a lot of research works on computer system acceptance. But most of the works address the early stage of system introduction, leaving the learning effect on system acceptance unexplored. In this longitudinal study, two groups of novice and experienced users have been empirically investigated and compared for their acceptance of computer system and for the learning effect of actual usage. A research model based on the technology acceptance theory has been proposed and applied to the two groups. The result shows that the factor job relevance gets more important and the effect of user training on system acceptance diminishes as time passes. This finding may help introducing computer systems which can be easily accepted by users over the whole life cycle period of computer systems.

A Platform for RFID Security and Privacy Administration

  • Rieback, Melanie R.;Gaydadjiev, Georgi N.;Crispo, Bruno;Hofman, Rutger F.H.;Tanenbaum, Andrew S.
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.75-86
    • /
    • 2008
  • This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an "RFID firewall", enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID Guardian using off-the-shelf components, and our experience has shown that active mobile devices are a valuable tool for managing the security of RFID tags in a variety of applications, including protecting low-cost tags that are unable to regulate their own usage.

  • PDF