Academic literature on the topic 'Internet effects and challenges'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet effects and challenges.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Internet effects and challenges"

1

Mohd Sukor, Nurhafizah, and Nor Hamizah Razak. "Children and Adolescents’ Use of Internet: Psychological Issues and Challenges." Jurnal Pendidikan Awal Kanak-kanak Kebangsaan 12, no. 1 (2023): 1–11. https://doi.org/10.37134/jpak.vol12.1.1.2023.

Full text
Abstract:
Technological advancement and the Internet are two-edged swords. Children and adolescents across the world have turned to the internet and digital technologies as a result of the pandemic COVID-19. Despite the benefits, technology advancement has a negative impact. There are many factors contributing to the use of internet among children and adolescents as well as the hazards associated with the over-usage of the digital technology. Studies also investigate the psychological effects of internet use on children and adolescents, which include physical, social, cognitive and emotional effects. This paper highlights the discussion of Islam as a way of encountering the issues and challenges faced as a result of the internet usage. Islam recognises the advent of technological tools to facilitate lives and provides general guidelines in using modern technology such as internet. This is paralleled with the role of human as a vicegerent on earth, which calls for good and prevents evildoing, in which can be materialised by using the internet effectively. The article outlines the concluding remarks.
APA, Harvard, Vancouver, ISO, and other styles
2

Omoniyi, Gbenga T., Shahrudin Awang Nor, Nor Iadah Yusop, and Rotimi-Williams Bello. "YOUTH'S ATTITUDE TOWARDS INTERNET CRIME SOCIAL FACTORS, CAUSES AND EFFECTS." International Journal of Computer Science and Mobile Computing 8, no. 1 (2019): 105–18. https://doi.org/10.5281/zenodo.4453800.

Full text
Abstract:
Abstract: Computer crime, also commonly referred to as Internet or online crime is any type of crime scheme that uses one or more components of the Internet to commit a criminal act. Agreeably, the Internet technology has influenced productivity and connectivity among people. This is not without some security challenges that threaten the users of the Internet. The level at which these security challenges threaten both the citizenry and the government of Nigeria is alarming. This implies that Internet crime in Nigeria is societal menace and questions on the factors enabling the rampant of Internet crime among the youth in Nigeria must be asked. The objective of this paper is to address the social factors, causes and the effects of youth’s attitude towards Internet crime. As such, 130 Internet users from universities were surveyed using self-administered questionnaires distributed across Lagos state, Nigeria. The data collected through survey and questionnaire was analyzed using analytical techniques such as Pearson correlation and hierarchical regression. Based on the findings of this study, it can be concluded that there is significant effect of age, sex, belief, knowledge, commitment, and involvement factors on the youth involvement in Internet crime in Nigeria. However, security policy severity, security policy certainty, attachment, and attitude did not have significant effect on youth involvement in Internet crime in Nigeria. 
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Mengting. "Problematic Internet Use among Adolescents: A Review of Influencing Factors and Coping Strategies." Journal of Education and Educational Research 8, no. 2 (2024): 376–79. http://dx.doi.org/10.54097/28xww613.

Full text
Abstract:
Currently, the Internet is deeply embedded in human life, and adolescent problematic Internet use has become a global public health challenge. This review explores the influencing factors and coping strategies of adolescent problematic Internet use. Theoretical models such as I-PACE, Internet Compensation Theory, Attachment Theory, and Socio-Psycho-Physiological Model are involved. Macro to micro factors is analyzed: internet anonymity, family and school environment, personality, self-control and emotional problems. Point out the physiological, psychological, and behavioral effects of problematic use. Propose prevention and intervention strategies such as cognitive-behavioral therapy, family therapy, and exercise interventions to support adolescents in overcoming problematic Internet use challenges.
APA, Harvard, Vancouver, ISO, and other styles
4

Abdul Hamid, Md Zahir, Nor Shafrin Ahmad, and Rahimi Che Aman. "Exploring the Effects of Internet Addiction: A multi-construct analysis using the Chen Internet Addiction Scale." Environment-Behaviour Proceedings Journal 10, SI24 (2025): 219–25. https://doi.org/10.21834/e-bpj.v10isi24.6389.

Full text
Abstract:
This study examines the impact of Internet Addiction (IA) among adolescents in Malaysia using the Chen Internet Addiction Scale (CIAS). Data from 376 respondents reveal moderate impacts in Withdrawal (Mean = 2.05, SD = 0.61), Tolerance (Mean = 2.34, SD = 0.59), Compulsive Behavior (Mean = 2.14, SD = 0.61), and Health and Interpersonal Problems (Mean = 2.27, SD = 0.55). At the same time, Time Management issues revealed a low impact (Mean = 1.96, SD = 0.66). These findings highlight adolescents' increasing internet dependency and its potential behavioral and health challenges.
APA, Harvard, Vancouver, ISO, and other styles
5

Alzoubi, Yehia Ibrahim, Ahmad Al-Ahmad, Hasan Kahtan, and Ashraf Jaradat. "Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges." Future Internet 14, no. 7 (2022): 216. http://dx.doi.org/10.3390/fi14070216.

Full text
Abstract:
The Internet of things model enables a world in which all of our everyday devices can be integrated and communicate with each other and their surroundings to gather and share data and simplify task implementation. Such an Internet of things environment would require seamless authentication, data protection, stability, attack resistance, ease of deployment, and self-maintenance, among other things. Blockchain, a technology that was born with the cryptocurrency Bitcoin, may fulfill Internet of things requirements. However, due to the characteristics of both Internet of things devices and Blockchain technology, integrating Blockchain and the Internet of things can cause several challenges. Despite a large number of papers that have been published in the field of Blockchain and the Internet of things, the problems of this combination remain unclear and scattered. Accordingly, this paper aims to provide a comprehensive survey of the challenges related to Blockchain–Internet of things integration by evaluating the related peer-reviewed literature. The paper also discusses some of the recommendations for reducing the effects of these challenges. Moreover, the paper discusses some of the unsolved concerns that must be addressed before the next generation of integrated Blockchain–Internet of things applications can be deployed. Lastly, future trends in the context of Blockchain–Internet of things integration are discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

Pitchan, Muhammad Adnan Bin, Wan Amizah Wan Mahmud, Shahrul Nazmi Sannusi, and Ali Salman. "Control and freedom of the Internet." Media and communication as antecedents to the transformation agenda in Malaysia 25, no. 2 (2015): 243–52. http://dx.doi.org/10.1075/japc.25.2.07pit.

Full text
Abstract:
The Internet has become a popular medium now because it provides many benefits to users, though at the same time it also carries negative effects, especially to developing countries, such as sedition, pornography, defamation and cyber crime. Therefore, this study focuses on the control and freedom of the Internet system and the challenges faced by the government. The main focus of this paper is to see whether the government face challenges in controlling the content of the Internet. This study uses two theories, namely the theory of media development and media dependency theory as a guideline for the study. Qualitative approach such as in-depth interviews were chosen as research methodology to obtain the qualitative data. The study found that there are several challenges faced by the government in controlling the misuse of Internet, such as Internet domain registration, difficulties in identifying suspects, false registration, development of technology and content monitoring aspects.
APA, Harvard, Vancouver, ISO, and other styles
7

Jieli, Wu. "Community Response to Internet Addiction among Minors: An Overview, Findings, Challenges." Journal of Addiction & Addictive Disorders 11, no. 1 (2024): 1–7. http://dx.doi.org/10.24966/aad-7276/100153.

Full text
Abstract:
Purpose: The article aims to explore the nature and characteristics of minors' Internet addiction behavior, and analyze the comprehensive factors as well as the diverse effects based on the deviant behavior theory. The deviant behavior theory, integrating misconduct with sociocultural concepts, social values, and norms, can provide new insight into the existing theoretical research on this issue.
APA, Harvard, Vancouver, ISO, and other styles
8

Makles, Przemysław. "Internet addiction – challenges and strategies for dealing with digital dependency." Pedagogika. Studia i Rozprawy 32 (2023): 205–17. http://dx.doi.org/10.16926/p.2023.32.13.

Full text
Abstract:
In today’s world, media are an integral part of everyday functioning. Regardless of age, everyone uses them every day. One of the most popular mediums in the last decade is the Internet, which not only enables communication with other people, but is also a source of a lot of information. Using the Internet offers many possibilities. One of them is getting to know other people and their opinions. Unfortunately, excessive use of the Internet leads to addiction. Cyberspace also carries numerous threats. Especially young and inexperienced people are at risk of being harmed by someone they do not know and have never seen. The phenomenon of Internet addiction is a huge problem experienced by an increasing number of users all over the world. Long term use of electronic devices, activity on social media and even obsessive involvement in online games are becoming more widespread and are generating serious side effects among various age groups. These are health issues such as difficulties with sleep or concentration, increased stress levels, depression, as well as decreased effectiveness and, above all, difficulties in maintaining social relationships. In this article, we will focus on the problem of Internet addiction. We will identify the difficulties that arise in the context of this phenomenon and present some methods that may be useful for people who want to overcome their digital dependencies. We will also present practical approaches and tools that allow you to regain control over your Internet use.
APA, Harvard, Vancouver, ISO, and other styles
9

Durodolu, Oluwole O., Mercy A. Iroaganachi, and Josephine N. Otunla. "Effects of slow internet on academic library staff productivity and job satisfaction." Berkala Ilmu Perpustakaan dan Informasi 20, no. 2 (2024): 435–47. https://doi.org/10.22146/bip.v20i2.14705.

Full text
Abstract:
Introduction. This paper investigated the effects of slow internet on academic library staff productivity and job satisfaction of academic library staff using the University of Ibadan library as a case in focus. Data Collection Methods. The study employed a qualitative research method, guided by a phenomenological research paradigm, using Focus Group discussions for data collection. The responses were presented and discussed objectively. Data Analysis. NVivo software was used for qualitative data analysis to enhance the depth of qualitative research by providing data management technique and facilitate complex analyses, and support robust reporting. Results and Discussion. Findings of the study revealed that slow internet may have serious consequences on library staff, their operations, and productivity including; decreased output, staff dissatisfaction, and hampered user services etcetera. The study recommends that universities and library management invest in faster, more reliable internet, implement hybrid systems to provide alternative resources during technological limitations, ensure librarians are adaptable in managing slow internet challenges, and encourage librarians to maintain a positive mindset to avoid frustration and job dissatisfaction. Conclusion. This research addresses a gap in the literature by examining how internet speed impacts library staff productivity and satisfaction, providing insights for enhancing library services and staff well-being amidst technological challenges.
APA, Harvard, Vancouver, ISO, and other styles
10

Akhmedova, Sevar Qudratullayevna. "THE EFFECTS OF INTERNET, MEDIA, ADVERTISEMENT ON DEVELOPMENT OF LANGUAGES." МЕДИЦИНА, ПЕДАГОГИКА И ТЕХНОЛОГИЯ: ТЕОРИЯ И ПРАКТИКА 2, no. 5 (2024): 551–58. https://doi.org/10.5281/zenodo.11243846.

Full text
Abstract:
This article discusses about the impact of technology globalization and media on languages. It explores the benefits of it and it’s effective sides for using any kind of language. The author presents arguments supporting benefits of globalization and its impact on language. Additionally, the article acknowledges potential challenges and offers suggestions for overcoming them. Overall, it advocates for the significance of the effect that made technology and media on language.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Internet effects and challenges"

1

Mucha, Tomáš. "STRATEGIC CHALLENGES OF MULTI-SIDED INTERNET START-UPS." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-125111.

Full text
Abstract:
The theory of this thesis focuses on particulars of multi-sided platform businesses with special emphasis put on early stage start-ups. The goal is to capture crucial findings and fuse them together to point out specifics which apply only for start-ups that are developed in form of multi-sided platform business. This thesis should provide guidance to all entrepreneurs considering such new business formations. It aims at showing them the most important points leading to positive value creation in multi-sided platform businesses. Specifically, it explains the strategic points hidden behind pricing and network effects utilization. At the same time it depicts what are the unnecessary distractions which just destroy attention and consume time and effort. Consequently, these findings are tested on practical example, where real start-up is modelled using this theoretical framework. Such real application points out strong and weak points. Consequently, the optimal framework is derived based on prior findings. The main suggestions point out what should be examined further by the theory and where the research captured enough knowledge.
APA, Harvard, Vancouver, ISO, and other styles
2

Schier, Christa Marianne. "Qualitative Internet research : its objects, methods and ethical challenges." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/4356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Turchina, T. "The Internet and foreign language education: benefits and challenges." Thesis, Прага, 2011. http://essuir.sumdu.edu.ua/handle/123456789/63542.

Full text
Abstract:
As we approach the next century, it is essential that we make informed decisions about how the Internet can be successfully integrated into the language classroom. If we as educators do not rise to the challenge - who will?<br>Over the past few years, the Internet has emerged as a prominent new technology. The influence of such a powerful technological tool has pervaded all aspects of the educational, business, and economic sectors of our world. Regardless of whether one uses the Internet or not, one must be clear about the fact that we have entered a new information age and the Internet is here to stay.
APA, Harvard, Vancouver, ISO, and other styles
4

Andersson, Peter. "Deregulation and Internet : new challenges to postal services in Sweden /." Linköping : Tema, Univ, 2001. http://www.bibl.liu.se/liupubl/disp/disp2001/arts228s.htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Celosia, Guillaume. "Privacy challenges in wireless communications of the Internet of Things." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI069.

Full text
Abstract:
Également connue sous le nom d'Internet des Objets (IdO), la prolifération des objets connectés offre des opportunités sans précédent aux consommateurs. Des moniteurs d'activité physique aux assistants médicaux, en passant par les appareils électroménagers pour maisons intelligentes, les objets IdO évoluent dans une pléthore de domaines d'application. Cependant, les avantages qu'ils peuvent apporter à notre société augmentent conjointement avec leurs implications en matière de vie privée. Communiquant continuellement de précieuses informations par le biais de liaisons non filaires telles que le Bluetooth et le Wi-Fi, ces appareils connectés accompagnent leurs propriétaires dans leurs activités. La plupart du temps émises sur des canaux ouverts, et parfois en l'absence de chiffrement, ces informations sont alors facilement accessibles pour tout attaquant passif à portée. Dans cette thèse, nous explorons deux problèmes de vie privée majeurs résultant de l'expansion de l'IdO et de ses communications sans fil : le traçage physique et l'inférence d'informations utilisateurs. Sur la base de deux grands ensembles de données composés de signaux radio issus de périphériques Bluetooth/BLE, nous mettons d'abord en échec les fonctionnalités anti-traçage existantes avant de détailler plusieurs applications invasives pour la vie privée. En s'appuyant sur des attaques passives et actives, nous démontrons également que les messages diffusés contiennent des informations en clair allant des caractéristiques techniques des appareils aux données personnelles des utilisateurs telles que des adresses e-mail et numéros de téléphone. Dans un second temps, nous concevons des contre-mesures pratiques pour résoudre les problèmes de vie privée identifiés. Dans ce sens, nous fournissons des recommandations aux fabricants, et proposons une approche afin de vérifier l'absence de failles dans l'implémentation de leurs protocoles. Enfin, dans le but d'illustrer davantage les menaces de vie privée enquêtées, nous implémentons deux démonstrateurs. Par conséquent, Venom introduit un système de traçage physique visuel et expérimental, tandis qu'Himiko propose une interface humaine permettant d'inférer des informations sur les appareils IdO et leurs propriétaires<br>Also known as the Internet of Things (IoT), the proliferation of connected objects offers unprecedented opportunities to consumers. From fitness trackers to medical assistants, through smarthome appliances, the IoT objects are evolving in a plethora of application fields. However, the benefits that they can bring to our society increase along with their privacy implications. Continuously communicating valuable information via wireless links such as Bluetooth and Wi-Fi, those connected devices support their owners within their activities. Most of the time emitted on open channels, and sometimes in the absence of encryption, those information are then easily accessible to any passive attacker in range. In this thesis, we explore two major privacy concerns resulting from the expansion of the IoT and its wireless communications: physical tracking and inference of users information. Based on two large datasets composed of radio signals from Bluetooth/BLE devices, we first defeat existing anti-tracking features prior to detail several privacy invasive applications. Relying on passive and active attacks, we also demonstrate that broadcasted messages contain cleartext information ranging from the devices technical characteristics to personal data of the users such as e-mail addresses and phone numbers. In a second time, we design practical countermeasures to address the identified privacy issues. In this direction, we provide recommendations to manufacturers, and propose an approach to verify the absence of flaws in the implementation of their protocols. Finally, to further illustrate the investigated privacy threats, we implement two demonstrators. As a result, Venom introduces a visual and experimental physical tracking system, while Himiko proposes a human interface allowing to infer information on IoT devices and their owners
APA, Harvard, Vancouver, ISO, and other styles
6

McGinthy, Jason M. "Solutions for Internet of Things Security Challenges: Trust and Authentication." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/91443.

Full text
Abstract:
The continuing growth of Internet-connected devices presents exciting opportunities for future technology. These Internet of Things (IoT) products are being manufactured and interleaved with many everyday activities, which is creating a larger security concern. Sensors will collect previously unimaginable amounts of private and public data and transmit all of it through an easily observable wireless medium in order for other devices to perform data analytics. As more and more devices are produced, many are lacking a strong security foundation in order to be the "first to market." Moreover, current security techniques are based on protocols that were designed for more-capable devices such as desktop computers and cellular phones that have ample power, computational ability, and memory storage. Due to IoT's technological infancy, there are many security challenges without proper solutions. As IoT continues to grow, special considerations and protections must be in place to properly secure this data and protect the privacy of its users. This dissertation highlights some of the major challenges related to IoT and prioritizes their impacts to help identify where gaps are that must be filled. Focusing on these high priority concerns, solutions are presented that are tailored to IoT's constraints. A security feature-based framework is developed to help characterize classes of devices to help manage the heterogeneous nature of IoT devices and networks. A novel physical device authentication method is presented to show the feasibility in IoT devices and networks. Additional low-power techniques are designed and evaluated to help identify different security features available to IoT devices as presented in the aforementioned framework.<br>Doctor of Philosophy<br>The Internet has been gaining a foothold in our everyday lives. Smart homes, smart cars, and smart cities are becoming less science fiction and more everyday realities. In order to increase the public’s general quality of life, this new Internet of Things (IoT) technological revolution is adding billions of devices around us. These devices aim to collect unforeseen amounts of data to help better understand environments and improve numerous aspects of life. However, IoT technology is still in its infancy, so there are still many challenges still remaining. One major issue in IoT is the questionable security for many devices. Recent cyber attacks have highlighted the shortcomings of many IoT devices. Many of these device manufacturers simply wanted to be the first in a niche market, ignoring the importance of security. Proper security implementation in IoT has only been done by a minority of designers and manufacturers. Therefore, this document proposes a secure design for all IoT devices to be based. Numerous security techniques are presented and shown to properly protect the data that will pass through many of these devices. The overall goal for this proposed work aims to have an overall security solution that overcomes the current shortfalls of IoT devices, lessening the concern for IoT’s future use in our everyday lives.
APA, Harvard, Vancouver, ISO, and other styles
7

Vander, Vliet James (James Scott) 1970. "Benefits, challenges, and product characteristics to evaluate when considering Internet sales." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80009.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 1999.<br>"June 1999."<br>Includes bibliographical references (leaves 98-103).<br>by James Vander Vliet.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
8

Kayaaslan, Hakan. "Challenges for copyright holders on the Internet : a Turkish case study." Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/210847/.

Full text
Abstract:
In September 2004, scientists from the California Institute of Technology and the European Organization for Nuclear Research succeeded in sending 859 gigabytes of data from California to Switzerland in less than 17 minutes. At such speed, a full-length feature film can be downloaded in 4 seconds. In those 4 seconds, the copyright of a piece of work can easily be infringed on the internet. In recent years, with the improvement of the technology, it has become possible to convert analogue work into digital work through a simple process: it can then be distributed to millions of people from all over the world in a few minutes, using the Internet. In the 1990s, Peer-to-Peer (P2P) file sharing networks exploited this new technology. Using file sharing networks, users started to download songs and movies without paying for them. As a result, the music and movie industry suffered great financial losses. While courts are still dealing with the legal issues caused by P2P networks, an even greater issue has materialised, that of transnational digital copyright infringement through websites. Traditional copyright laws operate territorially and some websites use this territoriality, by going beyond national boundaries and operating abroad. They sometimes use the loophole-ridden copyright laws of foreign countries. Therefore, copyright infringements on the Internet have become an international problem and this situation poses a new challenge for copyright holders. The principle of territoriality is not sufficient anymore. It is obvious that those infringements on the Internet are a global problem, affecting all nations. International issues are usually best solved through international cooperation. The solution clearly lies in the reform and harmonisation of International Private Law (IPL) of copyright at global level. In this Ph. D. thesis, three different scenarios have been examined to show the challenges encountered by copyright holders on the Internet. Jurisdiction and applicable law issues have been identified in these scenarios. The aim of this study is to examine the IPL of copyright on the internet.
APA, Harvard, Vancouver, ISO, and other styles
9

Hamzic, Almira, and Isabel Olofsson. "DNS and the Internet of Things : Outlining the challenges faced by DNS in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202591.

Full text
Abstract:
This thesis work consists of a literature study where different aspects of DNS and the Internet of Things have been researched. A functional naming and service identification method is an essential part in making the IoT global, and DNS is the current method of naming devices on the Internet. The study looks into some challenges DNS will encounter, namely functionality, security and availability. This report concludes that a multicast DNS (mDNS) based solution designed for constrained networks is advantageous. This is despite the limited security that is currently available for such a solution. In the future, it is important that security has top priority, as there are currently limited means of security in DNS. Further study is needed when it comes to availability and how name resolving would work with constrained devices that utilise sleep mode.<br>Detta examensarbete består av en litteraturstudie där olika aspekter av DNS (Domännamnssystemet, eng. Domain Name System) och Sakernas Internet (eng. Internet of Things) har studerats. En fungerande namngivnings-och serviceidentifieringsmetod är en viktig del för att kunna göra Sakernas Internet globalt, och DNS är den nuvarande metoden för att namnge enheter på Internet. Studien undersöker vissa utmaningar som DNS kan stöta på, nämligen funktionalitet, tillgänglighet och säkerhet. Rapportens slutsats är att en lösning baserad på multisändnings-DNS (eng. multicast DNS, mDNS) som är anpassad för begränsade nätverk (eng. constrained networks) är fördelaktig. Detta trots den begränsade säkerhet som finns tillgänglig just nu för en sådan lösning. I framtiden är det viktigt att säkerheten har högsta prioritet, eftersom säkerheten är begränsad hos DNS. Det behövs ytterligare studier när det gäller tillgänglighet och hur adressöversättning skulle fungera med begänsade enheter (eng. constrained devices) som använder viloläge.
APA, Harvard, Vancouver, ISO, and other styles
10

Chase, Mackie, Leah P. Macfadyen, Kenneth Reeder, and Jörg Roche. "Intercultural Challenges in Networked learning: Hard Technologies Meet Soft Skills." First Monday, 2002. http://hdl.handle.net/2429/1323.

Full text
Abstract:
This paper gives an account of themes that emerged from a preliminary analysis of a large corpus of electronic communications in an online, mediated course for intercultural learners. The goals were to test assumptions that electronic communication is internationally standardized, to identify any problematic aspects of such communications, and to construct a framework for the analysis of electronic communications using constructs from intercultural communications theory. We found that cyberspace itself has a culture(s), and is not culture-free. Cultural gaps can exist between individuals, as well as between individuals and the dominant cyberculture, increasing the chances of miscommunication. The lack of elements inherent in face-to-face communication further problematizes intercultural communications online by limiting opportunities to give and save face, and to intuit meaning from non-verbal cues. We conclude that electronic communication across cultures presents distinctive challenges, as well as opportunities to course planners.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Internet effects and challenges"

1

United States. Congress. Senate. Committee on Health, Education, Labor, and Pensions. Internet education: Exploring the benefits and challenges of web-based education : hearing before the Committee on Health, Education, Labor and Pensions, United States Senate, One Hundred Seventh Congress, second session on examining the benefits and challenges of web-based education, September 26, 2002. U.S. G.P.O., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weber, Rolf H. Shaping Internet Governance: Regulatory Challenges. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04620-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mirina, Grosz, and Weber Romana, eds. Shaping Internet governance: Regulatory challenges. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zimbabwe Congress of Trade Unions., ed. Globalisation: Effects & challenges : educational material. Zimbabwe Congress of Trade Unions, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saleh, Imad, Mehdi Ammi, and Samuel Szoniecky, eds. Challenges of the Internet of Things. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119549765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schroeder, Douglas A. Accounting and causal effects: Econometric challenges. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Asia, United Nations Economic and Social Commission for Western. Internet governance: Challenges and opportunities for the ESCWA member countries. United Nations, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Misra, Sridipta, Muthucumaru Maheswaran, and Salman Hashmi. Security Challenges and Approaches in Internet of Things. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44230-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Department of Homeland Security. Office of Inspector General. DHS must address Internet Protocol Version 6 challenges. U.S. Dept. of Homeland Security, Office of Inspector General, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tamirisa, Natalia T. Macroeconomic effects and policy challenges of population aging. International Monetary Fund, European Dept., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Internet effects and challenges"

1

Alfulaiti, Mariam Juma, Mohamed Rafea, Allam Hamdan, and Louai Maghrabi. "Effects of Social Media and the Internet on Academic Performance in Bahrain Universities." In Digitalisation: Opportunities and Challenges for Business. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26956-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kaliukh, I., O. Trofymchuk, Y. Berchun, et al. "The application of Digital Twins and the Internet of Things to assess the metro dynamic effects on historical buildings." In Geotechnical Engineering Challenges to Meet Current and Emerging Needs of Society. CRC Press, 2024. http://dx.doi.org/10.1201/9781003431749-692.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lu, Yang, Savvas Papagiannidis, and Eleftherios Alamanos. "The Spill-Over Effect of the Emotional Reaction to the Use of Internet on the Intention to Use Internet of Things (IoT) Services: An Abstract." In Marketing Opportunities and Challenges in a Changing Global Marketplace. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39165-2_226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Roberts, Caroline, and Marieke Voorpostel. "Combining Data Collection Modes in Longitudinal Studies." In Withstanding Vulnerability throughout Adult Life. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-4567-0_22.

Full text
Abstract:
AbstractTechnological advances over the past two decades have substantially changed the range of data collection methods available to survey researchers. Web-based surveys have gained in popularity as increasing Internet penetration rates improve their coverage potential for general population research. Nevertheless, they still systematically exclude certain subgroups—e.g., those without Internet access or those less able (or motivated) to complete a survey questionnaire on their own. A popular solution to this problem is to use other modes of data collection for those who cannot participate online. However, while mixed mode surveys can be effective at reducing selection errors, measurements obtained from different modes may not be comparable, particularly when it comes to sensitive topics. The fact that measurement and selection errors are confounded poses challenges for researchers analysing mixed mode data, and in a longitudinal setting, has implications for studying changes over time. In this chapter, we discuss these challenges in the context of longitudinal studies designed to measure indicators of vulnerability, and illustrate them with a synthesis of findings from our own research relating to (1) the effects of combining modes on response rates and the representativeness of survey samples and (2) effects for measurement comparability.
APA, Harvard, Vancouver, ISO, and other styles
5

Grosseck, Gabriela, Laura Maliţa, and Mădălin Bunoiu. "Higher Education Institutions Towards Digital Transformation—The WUT Case." In European Higher Education Area: Challenges for a New Decade. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-56316-5_35.

Full text
Abstract:
Abstract New emerging digital technologies such as artificial intelligence, virtual reality, augmented reality, cloud computing, blockchain, robotization, the Internet of Things, big data, etc. have produced a powerful disruptive effect in almost all areas of our existence and have radically changed the way we live, work, learn or relax. Without consciously realizing it, everyone is adapting to the digital era. As nothing “escapes” the all-encompassing digital transformation, higher education follows track too. So, it is natural to ask ourselves: what are the higher education institutions doing to keep up with this rapidly evolving digital world? In this paper, we present the case of West University of Timişoara as an example of good practice in dealing with the effects of digital transformation on the university and its academic community (teachers, students, administrative staff). Our goal is to gain an understanding of what is being proposed through the institutional development strategy, and what is actually happening in our university from the digitalization perspective. Thus, we conduct an exploratory research using a quantitative approach that involves a survey applied to students enrolled in different study programs, at different levels. We focus on their opinion about how our university can prepare and transform in order to adopt an integrated digital approach, looking into topics like: technology-enabled services, digital enrollment of students, digitization of the administrative processes, implementation of digital procedures to offer recommendations or file complains, digital curricula, new modes of digital learning delivery, etc. Our findings reveal that West University of Timişoara must take significant steps towards the implementation of digital transformations, while, however, remaining watchful and cautious of the hidden implications of this process.
APA, Harvard, Vancouver, ISO, and other styles
6

Malik, Ayasha, Veena Parihar, Bharat Bhushan, Rajasekhar Chaganti, Surbhi Bhatia, and Parma Nand Astya. "Security Services for Wireless 5G Internet of Things (IoT) Systems." In 5G and Beyond. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3668-7_9.

Full text
Abstract:
AbstractThe Internet of Things (IoT) is an emerging field that has evolved in recent past years and tends to have a major effect on our lives in the coming future. The development of communication techniques is very rapid and tends to achieve many innovative results. With the invention of 5th Generation mobile networks, i.e., 5G, it is becoming an exciting and challenging topic of interest in the field of wireless communication. 5G networks have the ability to connect millions or billions of nodes without affecting the quality of throughput and latency. The 5G technology can develop a truly digital society in which every device may be connected through the Internet. IoT is an emerging technology in which everything can be connected and communicated via the Internet, the term everything may include computing devices, humans, software, platforms, and solutions. The development of this technology leads to the advent of a number of solutions that are helpful for humankind, for example, smart retailing creation of smart cities, smart farming, intelligent transport systems, smart eco-systems, etc. While IoT is a revolutionary technology in the progression of the Internet, it still has some significant challenges for implementation like ensuring security, performance issues, quality of support and saving of energy, etc. Furthermore, the paper elaborates on the motivation of combining two technology together named IoT and 5G for better communication. Additionally, the paper illustrates the basic architecture of IoT enabling 5G and discussed various solutions to provide communication. Moreover, the paper also discussed the various challenges and research gaps of 5G-IoT technology.
APA, Harvard, Vancouver, ISO, and other styles
7

Kawasumi, Yasuhiko. "Challenges and Opportunities of ICTs for Rural and Remote Areas." In Social and Economic Effects of Community Wireless Networks and Infrastructures. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2997-4.ch011.

Full text
Abstract:
Broadband Internet access is important for rural and remote areas to access e-commerce, e-government, e-learning, e-healthcare, Internet telephony, and other online resources. This chapter discusses the main opportunities and challenges of developing telecommunication infrastructures for rural and remote areas. In addition, affordable high-speed Internet access is important for communication (voice, data, Internet, etc.), community empowerment, job search and career development, and weather and climate monitoring. Expanding Internet access to rural areas, in particular, faces a number of challenges, such as lack of sustainable and affordable power supply, limited funding opportunities, and selecting a suitable technology. The authors discuss these issues using anecdotic evidence from a number of projects and case studies developed in the last 30 years by International Telecommunication Union (ITU). They conclude the chapter with recommendations of successful practices and policy guidelines.
APA, Harvard, Vancouver, ISO, and other styles
8

Rood, Melody Lee, and John Schriner. "The Internet Never Forgets." In Research Anthology on Child and Domestic Abuse and Its Prevention. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5598-2.ch032.

Full text
Abstract:
Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations from the literature focusing on shifting cultural attitudes, effective legislation, and increased education and training.
APA, Harvard, Vancouver, ISO, and other styles
9

Rood, Melody Lee, and John Schriner. "The Internet Never Forgets." In Advances in Human Resources Management and Organizational Development. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4912-4.ch006.

Full text
Abstract:
Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations from the literature focusing on shifting cultural attitudes, effective legislation, and increased education and training.
APA, Harvard, Vancouver, ISO, and other styles
10

Rood, Melody Lee, and John Schriner. "The Internet Never Forgets." In Research Anthology on Combating Cyber-Aggression and Online Negativity. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5594-4.ch060.

Full text
Abstract:
Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations from the literature focusing on shifting cultural attitudes, effective legislation, and increased education and training.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Internet effects and challenges"

1

Al-Ghamdi, Sami M., Hendrik J. Debruyn, Ricardo S. Costa, and Lay Seong Teh. "Challenges in Developing, Deploying, and Transforming Online Corrosion Management Dashboards." In CORROSION 2020. NACE International, 2020. https://doi.org/10.5006/c2020-14757.

Full text
Abstract:
Abstract In the era of the fourth Industry Revolution (IR4.0), Facility Operators in different industry sectors are encouraged to transform the way they execute work processes so they enhance safety, increase efficiency, and reduce cost. This could be achieved through the application of IR4.0 technologies such as Big Data, Advanced Analytics, Mobility, Cloud Computing and the Internet of Things (IoT). The digital transformation of one of the key work processes, Corrosion Management (CM), is challenging for existing, ageing industrial facilities. As a start, CM is defined differently for different industrial sectors and for different Operators within an industrial section, e.g. Oil and Gas. Also, there are different elements in CM using different platforms that may not be ready for full integration and digitization. This paper discusses the journey Saudi Aramco took during the last decade to introduce the concept of an integrated CM and the associated digital challenges. The focus will be on the online Corrosion Management Dashboard (CMDB) development, deployment, maintenance, and finally transformation. The CMDB scope was recently shifted from monitoring the compliance of corrosion-related parameters to predict CM performance by using the combined effect of different parameters. However, with a void in CM digitalization mandate, effort may not be focused or they do not eventually achieve their full potential.
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Borno, Amal, Henry Pedraza, Jeffrey Rogozinski, and Jigar K. Mistry. "Coating the Way to a Hydrogen Economy: Challenges Ahead." In MECC 2023. AMPP, 2023. https://doi.org/10.5006/mecc2023-19939.

Full text
Abstract:
Abstract As both global energy demands and desire to decarbonize the environment increase, there will be an inevitable diversification needed in the energy portfolio. Hydrogen has the potential to play a key role. However, there are unique challenges associated with the production, transportation and utilization of hydrogen and how it interacts with materials that need to be addressed. One such opportunity is coatings technologies. Coating evaluation is an essential step in the development of a safe and reliable hydrogen gas pipeline, unfortunately, there is the lack of published test methods to examine the effect of coated steel substrates to hydrogen exposure under laboratory simulated conditions. Research efforts are currently directed towards developing a standard test method to assess the efficacy of coatings to protect steel exposed to varying environmental conditions, which is important to ensure the safety and effectiveness of the pipelines and other assets. Therefore, in 2022, a group was created by AMPP (AMPP TR21558) to prepare a detailed technical report on the current state- of-the -art technologies to understand the role of coating in mitigating the effects of Hydrogen Embrittlement. The report is being prepared by a cross-functional team from various AMPP committees (SC04, SC08 and SC15) including metallurgists, engineers, chemists, scientists, and operators. This paper presents the challenges related to implementing coating for hydrogen pipelines, an update on AMPP TR21558 technical report and will discuss the currently proposed test protocol for testing coatings for internal application of hydrogen gas pipelines and its preliminary results which was published by the authors in 2022. It also outlines future research projects planned towards addressing technology gaps in understanding performance of coatings in cyclical process environments during hydrogen service.
APA, Harvard, Vancouver, ISO, and other styles
3

Woollin, Paul, Richard J. Pargeter, and Stephen J. Maddox. "Corrosion Fatigue Performance of Welded Risers for Deepwater Applications." In CORROSION 2004. NACE International, 2004. https://doi.org/10.5006/c2004-04144.

Full text
Abstract:
Abstract Steel catenary and top tension risers for deepwater oil and gas field developments are subject to corrosive environments on both internal and external surfaces and to fatigue loading. The girth welds control, the fatigue life of such structures. Therefore, there is a need to quantify the fatigue performance of girth welds under the influence of the external seawater, typically with cathodic protection, and the internal environment, which may contain water, CO2, H2S and chloride and bicarbonate ions. The effect of temperature must also be taken into account. This paper presents a review of published data to illustrate the effects of seawater, sweet (CO2) and sour (H2S) exposure on corrosion fatigue of welds in carbon steels and corrosion resistant alloys (CRAs). In view of the dominance of the fatigue crack propagation process in the fatigue lives of girth welds, particular attention is paid to fatigue crack propagation data. The data indicate the range of predominantly detrimental effects of the various environments on the fatigue performance of welded carbon steel and CRAs and illustrate the effects of weld microstructure. Limitations of existing data are discussed. Challenges remain with respect to design of welded risers against corrosion fatigue and the data required to meet these challenges are discussed.
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Binder, and Kana Krishnathasan. "Pragmatic Effects of Flow on Corrosion Prediction." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09275.

Full text
Abstract:
Abstract Recent design work regarding deep Gulf of Mexico (GOM) subsea flowlines has emphasized the need to identify, develop, and verify critical relationships between corrosion prediction and flow regime mechanisms. In practice this often reduces to a pragmatic interpretation of the effects of flow on corrosion mechanisms. Most importantly the identification of positions or sites, within the internal surface contact areas where the maximum corrosion stimulus may be expected to occur, thereby allowing better understanding, mitigation, monitoring and corrosion control over the life cycle. Some case histories have been reviewed in this context, and the interaction between corrosion mechanisms and flow regimes closely examined, and in some cases correlated. Since the actual relationships are complex, it was determined that a risk based decision making process using selected ‘what if’ corrosion analyses linked to ‘what if’ flow assurance analyses was the best way forward. Using this methodology, and pertinent field data exchange, it is postulated that significant improvements in corrosion prediction can be made. This paper outlines the approach used and shows how relating corrosion modeling software data such as that available from corrosion models Norsok M506, and Cassandra to parallel computational flow modeling in a targeted manner can generate very noteworthy results, and considerably more viable trends for corrosion control guidance. It is postulated that the normally associated lack of agreement between corrosion modeling and field experience, is more likely due to inadequate consideration of corrosion stimulating flow regime data, rather than limitations of the corrosion modeling per se, thus tending to switch the immediate onus for corrosion prediction accuracy and reliability away from corrosion modeling over to the flow regime side. The subject matter is ongoing and it is envisaged that the predictions will be benchmarked against real field data as projects advance into each life cycle and generate field data and experience. This approach is expected to better quantify the lessons learnt aspect of each project, thereby helping improve future designs in a more cost effective manner, as well as attending better to challenges in the areas of deepwater and future arctic pipeline corrosion and integrity management, whereupon the need for inherently safe designs has become far more emphasized.
APA, Harvard, Vancouver, ISO, and other styles
5

Pobjoy, Robert. "Engine Corrosion and Corrosion Prevention." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9614.

Full text
Abstract:
Corrosion and corrosion prevention all have maintenance challenges and associated costs. The cost of preventative maintenance (which includes equipment), the cost of repair/overhaul and the potential cost of engine component mechanical breakdown that is due to corrosion. Ultimately, the benefits of having an intimate understanding of how corrosion occurs can lead to the correct decision making when participating in corrosion prevention measures. This paper will focus on the different types of operating environment, the types of internal and external corrosion, the materials and coatings used, the documented effects of good versus poor maintenance practices and the dispelling of some of the myths regarding maintenance philosophies in the different operational environments.
APA, Harvard, Vancouver, ISO, and other styles
6

Stefanov, Panayot. "Socio-cultural effects of shrinking circulations of print media." In COMMUNICATION AND MEDIA OF THE 21ST CENTURY: EDUCATIONAL AND PROFESSIONAL CHALLENGES. Faculty of Journalism and Mass Communication, 2023. http://dx.doi.org/10.60060/smdr3956.

Full text
Abstract:
The article ”Socio-cultural effects of shrinking circulations of print media” with author Panayot Stefanov researches the socio-cultural effects of the transition of the public from traditional do new media in the conditions of the digital turn. The main hypothesis of the text is that the outflow from the press and the growing consumption of internet are two interrelated but not necessarily reciprocal processes. Through a comparative analysis between two mirror national media landscapes – of Finland and Bulgaria – and a comparison with the culture and reading habits, the report substantiates the dependence between the quality of the media and political indicators in the two countries and in the modern information society in general.
APA, Harvard, Vancouver, ISO, and other styles
7

"The Effect of Corporate Governance on Investor Reaction in Mediation of Internet Financial Reporting." In 3rd Economics, Business, and Government Challenges 2020. Galaxy Science, 2021. http://dx.doi.org/10.11594/nstp.2021.1308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mirković, Momčilo, and Jovana Todorović. "Public health aspects of problematic ineternet use." In Proceedings of the International Congress Public Health - Achievements and Challenges. Institute of Public Health of Serbia "Dr Milan Jovanović Batut", 2024. http://dx.doi.org/10.5937/batutphco24019m.

Full text
Abstract:
Background: In recent years, problematic internet use has become a significant public health problem. Methods and Objectives: The method consists in a search of contemporary literature regarding the most important aspects of problematic Internet use. The main objective of this paper is to provide a basic overview of current scientific findings in conceptualization, measurement and research on problematic Internet use. Results: There is wide agreement that the Internet can serve as a tool that enhances well-being. It is more difficult, however, to find consensus around the issue of problematic Internet use. That may be in part because scientific investigation has lagged far behind technological advances and media attention. The diagnostic schemas that have been proposed since 1996, and the screening tools that have been developed, stress similarities with substance use, impulse control disorders, and obsessive-compulsive disorder. Problematic internet use generally refers to use of Internet content that is out of control and leads to difficulties in daily functioning. That includes generalized problematic internet use, but also specific forms, such as problematic use of video games, social networks and pornography. Prevalence figures vary as a function of the diagnostic definition used, the age group studied, and whether the surveys were conducted online. Studies suggest high comorbidity rates with mood disorders and, among younger individuals, attention-deficit/hyperactivity disorder. Treatment should address any comorbid conditions present, as those may be causing, or exacerbating, problematic Internet use. Interventions that may specifically target problematic Internet use include cognitive behavioral therapy, but detailed guidelines must await further studies. For a medium that has so radically changed how we conduct our lives, the Internet's effects on our psychology remain understudied. Conclusions: More research is needed into the pathophysiology, epidemiology, natural course, and treatment of problematic Internet use. In addition, the more subtle psychological changes, such as disinhibition, that seem to characterize people's online behavior also deserve attention, even if they cannot be seen as necessarily pathological.
APA, Harvard, Vancouver, ISO, and other styles
9

Dey, Shuv, Yogendra Joshi, and J. Michael Brown. "Packaging Environmental Sensors for an Internet-of-Things Solution for Urban-Microclimate Studies." In ASME 2019 International Technical Conference and Exhibition on Packaging and Integration of Electronic and Photonic Microsystems. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/ipack2019-6515.

Full text
Abstract:
Abstract Cities are experiencing a number of negative effects caused by increasing urbanization. For decades, the effects of pollution have been recognized and studied and steps have been taken attempting to control this problem. Many urban environments are also experiencing the effect of the Urban Heat Island (UHI). UHIs are metropolitan areas that have measurably warmer average air temperatures during several periods during the year, than their surrounding rural areas. There is a great interest in studying UHI and pollution and its effects on the environment as well as urban residents. However, in order to study these phenomena, we need more information than we currently have. Thus, an IoT based low cost sensor network can be used to collect the data necessary to study UHI and pollution. There are several key challenges associated with an IoT based solution to environmental data monitoring. This study explores these challenges by looking at what effect the packaging has on the deployed environmental sensors, and how and where to deploy sensor modules. Sensor data collected over a few months’ timeframe are analyzed and presented.
APA, Harvard, Vancouver, ISO, and other styles
10

Milovanović, Vesna. "THE COVID-19 PANDEMIC EFFECTS ON THE HOTEL INDUSTRY." In The Sixth International Scientific Conference - TOURISM CHALLENGES AMID COVID-19, Thematic Proceedings. FACULTY OF HOTEL MANAGEMENT AND TOURISM IN VRNJAČKA BANJA UNIVERSITY OF KRAGUJEVAC, 2021. http://dx.doi.org/10.52370/tisc21570vm.

Full text
Abstract:
The novel coronavirus pandemic has brought about significant disruptions to hotel operations, affecting demand for hotel services and guests’ behavior, as well as financial stability of hotel companies and, consequently, hotel employees. A hotel company is interconnected with various partners in the supply chain, thus, the problem in hotel operation is transferred upstream the supply chain. The aim of this article is to present an overview of the COVID-19 impact on the hotel business, and provisions to cope with the new reality, including safety measures, technology application, quality of service, marketing communication, human resource management, and the supply chain management. Many authors believe that majority of these provisions will prevail in the postCOVID-19 environment, as people will be more cautious regarding safety. Apart from huge destructive impact, the present crisis will also have some positive effects, such as improved innovativeness, resilience, efficient communication and care for internal and external customers, all resulting in improved quality of hotel service.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Internet effects and challenges"

1

Akhmedjanova, Diana, and Komiljon Karimov. Covid-19’s Effects on Higher Education in Uzbekistan: The Case of Westminster International University in Tashkent. TOSHKENT SHAHRIDAGI XALQARO VESTMINSTER UNIVERSITETI, 2020. https://doi.org/10.70735/azco9450.

Full text
Abstract:
Higher education (HE) in Uzbekistan moved to distance learning since the beginning of the pandemic with uneven results. Universities responded with different approaches to ensure safety of their communities and continue teaching and learning, often online. Westminster International University in Tashkent (WIUT) faced considerable challenges with distance learning including access to technology and the Internet, lack of skills for teaching online and understanding how students learn best in the new mode. Only 14% of faculty used this approach before. Based on WIUT’s initial experience, we recommend: Universities and educational leaders analyze the technology, software, and skills of academic staff and students—can they access and feel comfortable with online learning? Use a learning management system (LMS) that will meet the requirements and needs of academic staff and students. Teachers should supplement with other tools or methods as useful. Design and deliver professional development workshops and trainings for academic staff and students for effective online learning and use of technologies.
APA, Harvard, Vancouver, ISO, and other styles
2

Munira, Sirajum, and Wahid bin Ahsan. E-Reading Adoption and Digital Literacy in Rural Bangladesh: Overcoming Barriers and Improving Educational Outcomes. Userhub, 2024. http://dx.doi.org/10.58947/journal.rkmd65.

Full text
Abstract:
This study examines the adoption and impact of e-books and PDFs among students in rural Bangladesh, exploring how digital reading influences study habits and educational outcomes. In-depth interviews with 27 participants, including students, teachers, and parents, reveal patterns of e-reading adoption, its effects on learning, and the challenges of accessing digital resources in rural areas. The research also investigates the role of educational and parental support and the broader cultural and social implications of digital learning in these communities. Key findings show that while students recognize the benefits of e-books, they face significant barriers, including limited access to devices, unreliable internet connectivity, and a lack of digital literacy training. The study emphasizes the need for targeted interventions to improve digital infrastructure and support systems in rural schools, offering practical insights for policymakers and educators.
APA, Harvard, Vancouver, ISO, and other styles
3

Vandendriessche, Marie, Andrea Christou, Chad Damro, Anna Fonts Picas, and Mateu Tomi. Case Studies of Traditionally Internal Policy Areas with Outward Effects: Competition, Climate Change and Health. EsadeGeo. Center for Global Economy and Geopolitics, 2023. https://doi.org/10.56269/202303/mv.

Full text
Abstract:
The EU’s external action comprises a host of different policies. Harnessing tools from all these areas holds great potential to help the EU effectively and sustainably meet strategic challenges and become a stronger global actor. This paper studies the layer of traditionally internal policies with external dimensions – i.e. external action ‘plus’. Within this policy layer, we focus on the policies of competition, climate change and health, which were selected based on their present relevance for EU external action and their varying legal competences. For each policy area, we study the EU’s legal objectives, the linkages that can be identified between the policy area and other external action policies, and the factors that facilitate or obstruct those linkages. To do so, we draw on a set of semi-structured interviews with current and former EU officials, as well as on secondary literature. We carry out our analysis using an actorness-based analytical framework developed in ENGAGE Working Paper 17, which builds on the concepts of opportunity, presence and capabilities. We find strong differences in the extent of linkages between the three policy areas, with limited linkages in competition; widespread and longstanding ones in climate change; and rapidly growing ones in health. Competences play a role, but perhaps a slightly unexpected one: while exclusive competences might theoretically facilitate linkages in the case of competition, the non-political view of the EU’s competition authorities in fact acts as an obstructing factor for linkages. In health, in contrast, where competences are in principle “weaker”, Member States endowed the EU institutions with a stronger role following the COVID-19 outbreak, thereby facilitating linkages with external action. External crises were furthermore identified as a highly relevant factor overall, modifying opportunity structures and potential for linkages – not just in the health field. At the same time however, the 2022 Russian war against Ukraine may detract attention from certain policy areas, which could dampen prospects for linkages in the case of climate change and health. Furthermore, four factors were identified as potentially facilitating linkages: the EU’s market size (particularly in the cases of climate change and competition policies), a plethora of coordination channels, resource scarcity in individual units, and the new Team Europe approach
APA, Harvard, Vancouver, ISO, and other styles
4

Cojoianu, Theodor, Alexander Pfeiffer, Ben Caldecott, Irem Kok, and Elizabeth Harnett. Stranded Assets: A Climate Risk Challenge (Summary). Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0006326.

Full text
Abstract:
Over the last few years, the topic of "stranded assets" resulting from environment-related risk factors has loomed larger. These factors include the effects of physical climate change as well as societal and regulatory responses to climate change. Despite the increasing prominence of these stranded assets as a topic of significant interest to academics, governments, financial institutions, and corporations, there has been little work specifically looking at this issue in Latin America and the Caribbean (LAC). This is a significant omission, given the region's exposure to environment-related risk factors, the presence of extensive fossil fuel resources that may become "unburnable" given carbon budget constraints, and the particular challenges and opportunities facing lower-income and emerging economies in LAC.This report includes an extensive literature review, reviews of case studies, in-depth interviews, extensive informal consultation, and a survey instrument to identify gaps in the stranded asset literature. The report builds on work undertaken in 2015 by the Inter-American Development Bank (IDB) on the issue of stranded assets. It aims to provide a deeper understanding of the issue and the existing literature about it, as well as highlight opportunities for future work, especially in LAC.
APA, Harvard, Vancouver, ISO, and other styles
5

Hong, J., X. de, M. Kovatsch, E. Schooler, and D. Kutscher. Internet of Things (IoT) Edge Challenges and Functions. RFC Editor, 2024. http://dx.doi.org/10.17487/rfc9556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bruni, Stefania, Alessandro Zocchi, and Carina Frossasco. To tech or not to tech: does technology enhance learning or hijack cognitive growth? Future Education Institute, 2025. https://doi.org/10.63523/m2r73a.

Full text
Abstract:
Digital technologies have radically transformed the way we learn, interact with information, and relate to others, highlighting new needs and challenges in the contemporary educational and social context. Digital innovation has increased the demand for adaptable learning tools and methods aimed at enhancing knowledge access, critical and creative thinking, and emotional skills. However, these technological advancements also introduce significant challenges, including the transformation of attentional processes and the growing prevalence of multitasking, with profound implications for learning and productivity. This contribution explores the dilemma of "To tech or not to tech," questioning the potential of digital technology to enable learning without compromising cognitive development. It analyzes the role of technology as a tool to improve cognitive processes and address traditional challenges while also acknowledging emerging complexities. Promoting a balanced and mindful use of technology is essential to ensure that digital tools support learning rather than act as sources of distraction. Future research on the long-term effects of digital technologies on brain development and learning is crucial for developing evidence-based strategies aimed at fostering cognitive well-being and educational effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
7

Kayser, Olivier, Lucie Klarsfeld, and Simon Brossard. The Broadband Effect: Enhancing Market-based Solutions for the Base of the Pyramid. Inter-American Development Bank, 2014. http://dx.doi.org/10.18235/0005987.

Full text
Abstract:
Broadband has a potential impact on the base of the pyramid (BOP), a segment of the population previously excluded from markets, and which lacks access to quality goods and services. Broadband facilitates the development of new business models that are more effective and efficient in terms of accessing, creating, and distributing goods and services to the BOP. A variety of private-sector-led broadband initiatives involving the BOP around the world have demonstrated profitability, while also providing social and economic returns along the value chain. Without the use of such technology, these solutions in some cases would not be available to this segment of the population. The Broadband Effect examines, at a global level, how companies that serve the BOP are deploying the use of broadband to improve the efficiency of their operations and better reach this market segment. This report sheds light on these broadband-enabled BOP business models, the ecosystem in which they operate the benefits and challenges of broadband adoption, and the role of public policy and regulation. The business cases studies therein are sustainable models that directly target the BOP and are enhanced by the use of broadband- and Internet-enabled technologies. The case studies come from a variety of developing economies in different regions around the world, as well as from different sectors such as financial services, education, and health.
APA, Harvard, Vancouver, ISO, and other styles
8

Kayser, Olivier, Lucie Klarsfeld, and Simon Brossard. The Broadband Effect: Enhancing Market-based Solutions for the Base of the Pyramid (Executive Summary). Inter-American Development Bank, 2014. http://dx.doi.org/10.18235/0005988.

Full text
Abstract:
Broadband has a potential impact on the base of the pyramid (BOP), a segment of the population previously excluded from markets, and which lacks access to quality goods and services. Broadband facilitates the development of new business models that are more effective and efficient in terms of accessing, creating, and distributing goods and services to the BOP. A variety of private-sector-led broadband initiatives involving the BOP around the world have demonstrated profitability, while also providing social and economic returns along the value chain. Without the use of such technology, these solutions in some cases would not be available to this segment of the population. The Broadband Effect examines, at a global level, how companies that serve the BOP are deploying the use of broadband to improve the efficiency of their operations and better reach this market segment. This executive summary sheds light on these broadband-enabled BOP business models, the ecosystem in which they operate the benefits and challenges of broadband adoption, and the role of public policy and regulation. The business cases studies therein are sustainable models that directly target the BOP and are enhanced by the use of broadband- and Internet-enabled technologies. The case studies come from a variety of developing economies in different regions around the world, as well as from different sectors such as financial services, education, and health.
APA, Harvard, Vancouver, ISO, and other styles
9

Almås, Ingvild, Orazio Attanasio, Jyotsna Jalan, Francisco Oteiza, and Marcella Vigneri. Using data differently and using different data. Centre for Excellence and Development Impact and Learning (CEDIL), 2018. http://dx.doi.org/10.51744/cip8.

Full text
Abstract:
The lack of adequate measures to capture relevant factors, and the prevalence of measurement error in existing ones, often constitute the main impediment to robust policy evaluation. Random assignment of a given treatment, when feasible, may allow for the identification of causal effects, given that the necessary measurements are available. Measurement challenges include: (a) adequately measuring outcomes of interest; (b) measuring factors that relate to the mechanisms of estimated impacts; and (c) conducting a robust evaluation in areas where the RCT methodology is not feasible. In this paper, we discuss three categories of related approaches to innovation in the use of data and measurements relevant for evaluation: the creation of new measures, the use of multiple measures, and the use of machine learning algorithms. We motivate the relevance of each of the categories by providing a series of detailed examples of cases where each approach has proved useful in impact evaluations. We discuss the challenges and risks involved in each strategy and conclude with an outline of promising directions for future work.
APA, Harvard, Vancouver, ISO, and other styles
10

Garcia-Morchon, O., S. Kumar, and M. Sethi. Internet of Things (IoT) Security: State of the Art and Challenges. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!