Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 52
Filtrar
1.
Heliyon ; 10(11): e32087, 2024 Jun 15.
Artículo en Inglés | MEDLINE | ID: mdl-38868050

RESUMEN

One of the critical technologies to ensure cyberspace security is network traffic anomaly detection, which detects malicious attacks by analyzing and identifying network traffic behavior. The rapid development of the network has led to explosive growth in network traffic, which seriously impacts the user's information security. Researchers have delved into intrusion detection as an active defense technology to address this challenge. However, traditional machine learning methods struggle to capture complex threats and attack patterns when dealing with large-scale network data. In contrast, deep learning methods have the advantages of automatically extracting features from network traffic data and strong generalization capabilities. Aiming to enhance the ability of network anomaly traffic detection, this paper proposes a network traffic anomaly detection based on Deep Residual Shrinkage Network (DRSN), namely "GSOOA-1DDRSN". This method uses an improved Osprey optimization algorithm to select the most relevant and essential features in network traffic, reducing the features' dimensionality. For better detection performance of network traffic anomalies, a one-dimensional deep residual shrinkage network (1DDRSN) is designed as a classifier. Validation is performed using the NSL-KDD and UNSW-NB15 datasets and compared with other methods. The experimental results show that GSOOA-1DDRSN has improved multi-classification accuracy, precision, recall, and F1 Score by approximately 2 % and 3 %, respectively, compared to the 1DDRSN model on two datasets. Additionally, it reduces the time computation costs by 20 % and 30 % on these datasets. Furthermore, compared to other models, GSOOA-1DDRSN offers superior classification accuracy and effectively reduces the number of features.

2.
Child Abuse Negl ; 147: 106597, 2024 01.
Artículo en Inglés | MEDLINE | ID: mdl-38103307

RESUMEN

OBJECTIVES: In this study, we first assessed whether four routine activity theory (RAT) variables (Internet exposure, target suitability, proximity to offender, and guardianship) determine Tanzanian adolescents' online sexual exploitation (OSE). Second, we identified two types of guardianship that moderate the relationships between these variables and adolescents' OSE. Third, we assessed the moderating effect of locality (rural area) on the relationships among the RAT variables and OSE. METHOD: Our analysis was based on a stratified random sample of 1014 secondary school adolescents aged 12-20 years (M = 15.67; SD = 1.35) recruited from urban and rural regions of Tanzania. We used Poisson regressions to test the main effects of the RAT variables and the moderating effects of two types of guardianship and locality on OSE. RESULTS: We found that OSE increased with the suitability of the respondents and with online exposure. Social guardianship had a moderating effect on OSE by reducing the positive influence of target suitability. Living in a rural area also had a moderating effect on OSE through reinforcing the effect of proximity to potential perpetrators in cyberspace. CONCLUSION: RAT can effectively increase our understanding of the OSE of minors in Tanzania. Furthermore, social rather than physical guardianship can mitigate the risk factors of OSE.


Asunto(s)
Instituciones Académicas , Conducta Sexual , Adolescente , Humanos , Tanzanía/epidemiología , Factores de Riesgo , Estudiantes
3.
Z Psychosom Med Psychother ; 69(3): 249-260, 2023 Oct.
Artículo en Alemán | MEDLINE | ID: mdl-37815584

RESUMEN

Objectives: The present explorative study evaluates the question of media regulation in treatment and the question of psychoanalysts' experiences with digital crossings of boundaries. Methods: Using a self-constructed questionnaire, N = 50 completed questionnaires were distributed to psychoanalysts (age: M = 48,64, SD = 12,71; m = 44 %, f = 56 %) at the 51st IPA Congress held in July 2019 that were analyzed using aMann-Whitney U-test and Chi square test. Results: The majority of the psychoanalysts surveyed 68 %, (n = 34) do not regularly discuss the use ofmedia with their patients at the beginning of treatment, 28%(n = 14) of the analysts surveyed contacted their patients using digital media services without discussing this possibility of contact beforehand, 16 % (n = 8) contacted their patients at night, 46 %, n = 23 googled their patients and 24 %, (n = 12) secretly used a mobile phone during analysis. Conclusions: Due to the advancing technology of the health care system, further psychoanalytic research that accompanies the process of using media in treatment is necessary.


Asunto(s)
Internet , Psicoanálisis , Humanos , Encuestas y Cuestionarios
4.
Healthcare (Basel) ; 11(16)2023 Aug 16.
Artículo en Inglés | MEDLINE | ID: mdl-37628508

RESUMEN

INTRODUCTION: The aim of this study is to evaluate the results of online group meetings for breast cancer patients in the active phase of treatment. The group therapy sessions took place weekly, synchronously, online, on Zoom, with a total of 12 meetings lasting about 2.5 h per session, between December 2021 and February 2022. We analyzed the topics of discussion chosen by the participants, the structure of the group, the results obtained at the main scales of evaluation/monitoring of quality of life and the motivation of patients to participate in the therapeutic group. All patients were in the active phase of treatment (chemotherapy, radiotherapy, hormone therapy, etc.). The main goal of the group therapy was to reduce the stress related to the disease. MATERIAL AND METHODS: Systematic observations included ABS psychological tests, EQ-5D-5L, HADS-Hospital Anxiety and Depression Scale, and the Recurrence Fear Questionnaire; the questionnaires were administered at the beginning and at the end of the therapeutic intervention; the participation in the therapy and in the research of the patients began after signing the informed consent document; the intervention was evaluated at the end using a feedback questionnaire. The group was closed, and the participants signed an informed consent document and agreed to have the sessions recorded. RESULTS: Comparing the initial with the final results of the psychological tests administered, there was an improvement in the quality of life of the participants in all areas, with a clinically significant decrease in the areas of pain and depression, along with an increase in perception of well-being, a decrease in FoP scores and an increase in the level of rationality about the disease. CONCLUSIONS: Group therapy for cancer patients was useful in improving the quality of life; the closed group, even online, provided a safe environment in which they could share feelings. A close correlation was noted between the scores obtained on the FoP-Q and HADS scales. It is evident that there is a strong relationship between FoP and depression. Results on these scales correlated well with results on the EQ-5D-5L quality of life questionnaire.

5.
Front Neurorobot ; 17: 1205370, 2023.
Artículo en Inglés | MEDLINE | ID: mdl-37614968

RESUMEN

Deep neural networks (DNNs) have been shown to be susceptible to critical vulnerabilities when attacked by adversarial samples. This has prompted the development of attack and defense strategies similar to those used in cyberspace security. The dependence of such strategies on attack and defense mechanisms makes the associated algorithms on both sides appear as closely processes, with the defense method being particularly passive in these processes. Inspired by the dynamic defense approach proposed in cyberspace to address endless arm races, this article defines ensemble quantity, network structure, and smoothing parameters as variable ensemble attributes and proposes a stochastic ensemble strategy based on heterogeneous and redundant sub-models. The proposed method introduces the diversity and randomness characteristic of deep neural networks to alter the fixed correspondence gradient between input and output. The unpredictability and diversity of the gradients make it more difficult for attackers to directly implement white-box attacks, helping to address the extreme transferability and vulnerability of ensemble models under white-box attacks. Experimental comparison of ASR-vs.-distortion curves with different attack scenarios under CIFAR10 preliminarily demonstrates the effectiveness of the proposed method that even the highest-capacity attacker cannot easily outperform the attack success rate associated with the ensemble smoothed model, especially for untargeted attacks.

6.
Violence Against Women ; : 10778012231179219, 2023 Jun 05.
Artículo en Inglés | MEDLINE | ID: mdl-37278011

RESUMEN

Image-based sexual abuse (IBSA) refers to the nonconsensual production, dissemination, or threat of dissemination of private sexual images of another. Arabs belong to a conservative society where the distribution of a nude photo constitutes a violation of the dignity of the family and may have serious consequences. Based on semistructured in-depth interviews, the present study examined how 32 Arab educational counselors in Israel handle IBSA. Findings suggest that counselors identified the victim as experiencing difficulties that allowed her to be harmed. Also, it was found that counselors were afraid it might harm the victims on the grounds of family honor. These findings indicate that it is necessary to find culturally sensitive solutions both for the prevention and treatment of this phenomenon.

7.
Entropy (Basel) ; 25(3)2023 Feb 26.
Artículo en Inglés | MEDLINE | ID: mdl-36981308

RESUMEN

The constant-Q Gabor atom is developed for spectral power, information, and uncertainty quantification from time-frequency representations. Stable multiresolution spectral entropy algorithms are constructed with continuous wavelet and Stockwell transforms. The recommended processing and scaling method will depend on the signature of interest, the desired information, and the acceptable levels of uncertainty of signal and noise features. Selected Lamb wave signatures and information spectra from the 2022 Tonga eruption are presented as representative case studies. Resilient transformations from physical to information metrics are provided for sensor-agnostic signal processing, pattern recognition, and machine learning applications.

8.
ZDM ; : 1-13, 2023 Jan 02.
Artículo en Inglés | MEDLINE | ID: mdl-36619684

RESUMEN

Much of the mathematics that children experience in school neglect the skills increasingly needed for citizenship, particularly the power of complex data to investigate and make sense of the world. We draw on the relatively new field of data science as a multi-disciplinary approach to investigate problems through analysis of massive, non-standard, incongruous and/or messy data. Our exploratory qualitative study had as its research question: What can children learn about citizenship when they engage with data science? The case study in this paper illustrated ways that children's learning about citizenship were enriched through an age-appropriate data science investigation. The study analysed classroom video from a Year 4 classroom (aged 9-10) over six lessons that integrated curricula in digital technologies, health, and mathematics. In these lessons, the children generated and analysed non-standard data and debated social, well-being and privacy issues as they considered their activities in cyberspace. The video data were analysed using a framework based on critical citizenship education literature that examined dimensions of power, collective engagement, individual responsibility and action. Three key findings emerged. First, the case study highlighted skills in citizenship education developed through data science, positioning children as agents and advocates. Second, the study showed how a complex data investigation in citizenship education was achievable with primary children through meaningful curriculum integration. This is important given that problems that citizens address are typically interdisciplinary. Finally, the findings revealed a gap between data science skills and those developed in the mathematics curriculum, and recommend ways that the maths curriculum could be updated.

9.
Appetite ; 180: 106362, 2023 01 01.
Artículo en Inglés | MEDLINE | ID: mdl-36368563

RESUMEN

With the globalization of food sales and consumption, exotic foods are now regularly crossing geographical and cultural borders and moving into local areas. This process is attracting ever-increasing attention from academics. Taking avocado consumption presented on Sina Weibo as an example, this research analyzes avocado related user-generated content on Sina Weibo over three years- 2013, 2015, and 2017- and employs topic modeling and semantic network methods to obtain the mechanism by which exotic food cross borders to appear in local consumers' daily food choices. Two specific links are explored: online information dissemination and offline daily consumption. The result indicates that a selective geographical narrative and framework for avocado information influence local consumers' choice of exotic foods according to three aspects: edibility, accessibility, and acceptability. For local consumers, the avocado is now connected with local objects and spaces, gradually transforming from a novelty to functional daily food and from low to high-frequency consumption to high-frequency consumption, escaping the marginal and penetrating into the core cultural context and completing the process of embedment into the everyday. This study refutes the assertion that "globalized diets bring about homogenized diets," explores the mechanism of influence by which information dissemination in cyberspace affects cultural borders, complements the study of food consumption in Southern countries, and provides new thoughts on the theoretical and practical exploration of food globalization from the perspective of food geography.


Asunto(s)
Persea , Humanos , Geografía
10.
Educ Inf Technol (Dordr) ; 28(6): 6423-6451, 2023.
Artículo en Inglés | MEDLINE | ID: mdl-36415781

RESUMEN

The authors decided to investigate the impact of the pandemic period and the resulting limitations in Polish primary school online security education. The first part of the study investigates the impact of the COVID-19 pandemic on students' educational learning outcomes in information and Internet security. The study has been performed via a student-oriented survey of 20 questions. The statistical analysis confirms the significant difference before and after the pandemic in several questions at most. Nevertheless, this justifies the statement that pandemics had a positive impact on post-pandemic Internet-related security education. The second part of the study has been focused on students' perception and self-awareness of cyberspace problems. For this purpose, the authors used novel majority-based decision fusion clustering validation methods. The revealed results illustrate the positive tendency toward the students' self-awareness and self-confidence of online security problems and e-threats before, during and after the challenging pandemic period. Moreover, the presented validation methods show the appealing performance in educational data analysis, and therefore, the authors recommended these methods as a preprocessing step that helps to explore the intrinsic data structures or students' behaviors and as a postprocessing step to predict learning outcomes in different educational environments.

11.
Archit Intell ; 1(1): 11, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-35993030

RESUMEN

The thesis is that the metaverse will become a pervasive part of the future internet and will thus become a key arena within which the life of society unfolds. As three-dimensional, immersive virtual world, the metaverse will be designed by architects rather than graphic designers. After 30 years of theoretical speculation and technological advances the internet is finally on the way to transforming in ways envisioned with the concept of 'cyberspace'. The key analogy is no longer the magazine with separate pages but the city and its seamless web of spaces. The paper argues that this immersive internet delivers a superior, more productive platform for social exchange and communication. Co-location synergies will unfold and order the distribution of sites and enable an intuitive browsing navigation full of discoveries and serendipitous encounters, as well as creating sites for vivid crowd interactions. It is this superiority that will lead to architects taking over from graphic designers as profession owning the design of all online interaction frames. This paper explores the plausibility of this takeover and the attendant expansion of architecture's competency.

12.
Rev. neuro-psiquiatr. (Impr.) ; 85(3): 183-193, jul.-sep. 2022. tab, graf
Artículo en Español | LILACS-Express | LILACS | ID: biblio-1560288

RESUMEN

RESUMEN Objetivo: Adaptar el Cuestionario sobre el Uso Problemático de Internet (PIUQ) para su utilización en el Perú. Material y Métodos: La traducción al español y la adaptación cultural del PIUQ siguieron un proceso sistematizado que incluyó la traducción directa, la evaluación por juicio de expertos y la retrotraducción, y culminó con la aprobación final de los creadores de la escala. Para cada uno de los 18 ítems, un primer comité de expertos evaluó en la versión preliminar la comprensibilidad, aceptabilidad, relevancia y el conjunto de respuestas; posteriormente, un segundo comité, examinó en la versión final los rasgos de claridad, pertinencia y relevancia. Se calculó la V de Aiken para cada uno de los diferentes aspectos evaluados en los 18 ítems. Resultados: En la versión preliminar, la V de Aiken tuvo valores bajos para la comprensibilidad de los ítems 1, 3, 4, 6 y 16, y para el conjunto de respuestas del ítem 4. El análisis del primer comité de expertos produjo modificaciones en los ítems 1, 4 y 16 de la dimensión de obsesión, 5 y 8 de negligencia, y 15 de trastorno de control. La evaluación por parte del segundo comité de expertos resultó en valores adecuados de V de Aiken en todos los aspectos de los 18 ítems. Conclusiones: La versión peruana final así obtenida demostró estar alineada a los fines del cuestionario original, sin alterar el significado de los ítems.


SUMMARY Objective : To adapt the Problem Internet Use Questionnaire (PIUQ) for its utilization in Peru. Material and Methods : The translation and cultural adaptation of the PIUQ followed a systematic process that involved direct translation, evaluation and judgment by expert committees and back-translation, culminating with the final approval by the scale creators. For each of the 18 items, a first group of experts assessed comprehensibility, acceptability, relevance and quality of the response set in the preliminary version; subsequently, a second group of experts, evaluated clarity, relevance and pertinence in the final version. Aiken's V was calculated for each of the different features evaluated in the 18 items. Results : In the preliminary version, Aiken's V had low values for the comprehensibility of items 1, 3, 4, 6 and 16, and for the response set of item 4. The analysis of the first expert committee led to modifications in items 1, 4 and 16 of the obsession dimension, 5 and 8 of neglect, and 15 of control disorder. The evaluation by the second expert committee resulted in adequate Aiken V values for all aspects of the 18 items. Conclusions : The final Peruvian version thus obtained proved to be aligned to the purposes of the original questionnaire, without altering the meaning of the items.

13.
Motrivivência (Florianópolis) ; 34(65): {1-25}, 20220316.
Artículo en Portugués | LILACS-Express | LILACS | ID: biblio-1411167

RESUMEN

Este estudo organiza-se em torno das seguintes questões: como a Educação Física, e os profissionais da área têm sido representados e compreendidos nos seus espaços de atuação (escolas, academias, universidades), a partir da ilustração imagética dos memes? Quais elementos essas imagens evocam sobre o cotidiano e o profissional de Educação Física nos diferentes espaços de atuação? Assume como objetivo analisar, compreender e contextualizar os memes da internet enquanto reproduções imagéticas do profissional e do cotidiano da Educação Física. Para tanto optou-se, metodologicamente, pela iconografia e iconologia. Para tanto, foram extraídos 52 memes relacionados a área da Educação Física que foram produzidos e/ou compartilhados por duas redes sociais. Desse modo, os resultados sinalizam que a utilização de memes como objetos de pesquisa inauguram novas possibilidades analíticas para o campo da Educação Física. Uma vez que essas produções se constituem como signos icônicos de comunicação rápidas e instantâneas, em circulação no ciberespaço.


This study is organized around the following question: how has Physical Education and professionals in the field been represented and understood in their spaces of activity (schools, academies, universities), based on the imagery illustration of memes? What elements do these images evoke about the daily life and the physical education professional in the different spaces of action? It aims to analyze, understand and contextualize internet memes as imagery reproductions of the professional and the daily life of physical education. Iconography and iconology were methodologically chosen. For this, 52 memes related to the area of physical education were extracted that were produced and/or shared by two social networks. Thus, the results indicate that the use of memes as research objects inaugurate new analytical possibilities for the field of Physical Education. Since these productions constitute as iconic signs of fast and instant communication, in circulation in cyberspace.


Este estudio se organiza en torno a la siguiente pregunta: ¿cómo han sido representadas y comprendidas la Educación Física y los profesionales del área en sus espacios de acción (escuelas, academias, universidades), a partir de la ilustración imaginaria de los memes? ¿Qué elementos evocan estas imágenes sobre la vida cotidiana y el profesional de la Educación Física en los diferentes espacios de actuación? Su objetivo es analizar, comprender y contextualizar los memes de internet como reproducciones de imágenes de la vida profesional y cotidiana de la educación física. Para ello optamos, metodológicamente, por la iconografía y la iconología. Para ello se extrajeron 52 memes relacionados con el área de educación física que fueron producidos y/o compartidos por dos redes sociales. Así, los resultados indican que el uso de memes como objetos de investigación abre nuevas posibilidades analíticas para el campo de la Educación Física. Ya que estas producciones se constituyen como signos icónicos de comunicación rápida e instantánea, circulando en el ciberespacio.

14.
Sensors (Basel) ; 22(2)2022 Jan 11.
Artículo en Inglés | MEDLINE | ID: mdl-35062504

RESUMEN

Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization's cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises' security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and e-commerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies.


Asunto(s)
Seguridad Computacional , Atención a la Salud , Comercio , Políticas
15.
Curr Issues Personal Psychol ; 10(4): 253-264, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-38013731

RESUMEN

The rapid development of information and communication technologies has created a new dimension in interpersonal relationships, which is commonly called cyberspace. Structural features of cyberspace such as anonymity, the lack of non-verbal indicators of interaction, their asynchrony, a sense of impunity and the lack of specific norms of conduct cause that the behavior of some people online may differ significantly from their behavior in real life. Individuals with psychopathic personality disorder can use cyberspace for criminal activities such as cyberbullying, trolling, digital piracy, cybervandalism or data theft. This is a very significant problem, as some researchers predict that as digital communication develops, 'cyberpsychopaths' will become the dominant form of criminals. Currently, there is a lack of research on the relationship between the structural features of cyberspace and the expression of psychopathic personality traits and their role in committing cybercrimes.

16.
J King Saud Univ Comput Inf Sci ; 34(10): 8176-8206, 2022 Nov.
Artículo en Inglés | MEDLINE | ID: mdl-37521180

RESUMEN

This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events. Following what appeared to be substantial gaps between the initial breakout of the virus and the first COVID-19-related cyber-attack, the investigation indicates how attacks became significantly more frequent over time, to the point where three or four different cyber-attacks were reported on certain days. This study contributes in the direction of fifteen types of cyber-attacks which were identified as the most common pattern and its ensuing devastating events during the global COVID-19 crisis. The paper is unique because it covered the main types of cyber-attacks that most organizations are currently facing and how to address them. An intense look into the recent advances that cybercriminals leverage, the dynamism, calculated measures to tackle it, and never-explored perspectives are some of the integral parts which make this review different from other present reviewed papers on the COVID-19 pandemic. A qualitative methodology was used to provide a robust response to the objective used for the study. Using a multi-criteria decision-making problem-solving technique, many facets of cybersecurity that have been affected during the pandemic were then quantitatively ranked in ascending order of severity. The data was generated between March 2020 and December 2021, from a global survey through online contact and responses, especially from different organizations and business executives. The result show differences in cyber-attack techniques; as hacking attacks was the most frequent with a record of 330 out of 895 attacks, accounting for 37%. Next was Spam emails attack with 13%; emails with 13%; followed by malicious domains with 9%. Mobile apps followed with 8%, Phishing was 7%, Malware 7%, Browsing apps with 6%, DDoS has 6%, Website apps with 6%, and MSMM with 6%. BEC frequency was 4%, Ransomware with 2%, Botnet scored 2% and APT recorded 1%. The study recommends that it will continue to be necessary for governments and organizations to be resilient and innovative in cybersecurity decisions to overcome the current and future effects of the pandemic or similar crisis, which could be long-lasting. Hence, this study's findings will guide the creation, development, and implementation of more secure systems to safeguard people from cyber-attacks.

17.
Int Cybersecur Law Rev ; 3(1): 7-34, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-37521508

RESUMEN

With the exponential increase of digital data in cyber environments, security measures have gained more importance. Cybersecurity threats are revealed by national and international units, and the number of these threats is increasing daily. The elimination of cybersecurity risks is possible with an effective cybersecurity strategy. Since the concept of management is not sufficient, the implementation of this strategy is possible with cyber governance, which includes all stakeholders in the management processes. This study emphasizes the importance and necessity of cyber governance in ensuring cybersecurity. The research and results for cybersecurity governance have been examined. A descriptive research model was used to this end. In terms of research philosophy, a basic research model and a documentary research model have been created with regard to the application method. The universe of the research consists of studies obtained from Web of Science, EBSCO, Scopus, Google Scholar, and TR Index. Studies from the last 5 years have been downloaded with the determined keywords. The result showed that although there are studies that produce local solutions for cybersecurity governance in different countries, a general governance framework has not been established as yet. On the contrary, there is a latent struggle to retain the management of this area, not its governance.

18.
Wiad Lek ; 75(11 pt 2): 2850-2854, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-36591779

RESUMEN

OBJECTIVE: The aim: The paper attempts to investigate the impact of social networks and digital media on mental health and psychological well-being. PATIENTS AND METHODS: Materials and methods: The data collection was carried out using PubMed, Scopus, Web of Science, Google Scholar databases. Research papers were identified according to the search terms "cyberspace", "cyberpsychology", "digital media", "virtual reality", "social networks", "mental health", "psychological well-being", "beauty", "beauty standards". The authors used integrative anthropological approach, interpretive research paradigm, and multidisciplinary analysis. CONCLUSION: Conclusion: The digital world is a relatively recent phenomenon, therefore, the potential relationship between its use and mental health and psychological well-being has not yet been adequately explored. Most of the research has been conducted over the last decades; and until now the scientific community has not been able to fully interpret the obtained results and come to final conclusions. As Timpano and Beard rightly pointed out, the future research should be focused on types and motivations for the use of social networks; identify potential mechanisms linking the social media use and mental health symptoms; reveal an impact of social networks on declines in face-to-face social interactions; understand the link of social networks with maladaptive coping strategies and health behaviors. The relationship between social networks, digital media use and psychological functioning is not straightforward and depends on many factors. However, we should not forget that there is nothing new under the sun. The same people act in both digital and physical spaces. And the psychological problems that are revealed in the digital universe are the same that "accompany" the actors of the digital communication process in the real, physical world. Anyway, we cannot avoid cyberspace, so we have to learn how to interact within this challenging world.


Asunto(s)
Salud Mental , Medios de Comunicación Sociales , Red Social , Humanos , Comunicación
19.
Int J Wirel Inf Netw ; 29(3): 206-221, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-34955626

RESUMEN

Importance of spectrum regulation and management was first revealed on May of 1985 after the release of unlicensed ISM bands resulting in emergence of Wi-Fi, Bluetooth and many other wireless technologies that has affected our daily lives by enabling the emergence of the smart world and IoT era. Today, the idea of a liberated spectrum is circulating around, which can potentially direct wireless networking industry into another revolution by enabling a new paradigm in intelligent spectrum regulation and management. The RF signal radiated from IoT devices as well as other wireless technologies create an RF cloud causing co- and cross-interference to each other. Lack of a science and technology for understanding, measurement, and modeling of the RF cloud interference in near real-time results in inefficient utilization of the precious spectrum, a unique natural resource shared among all wireless devices of the universe in frequency, time, and space. Near real time forecasting of the RF cloud interference is essential to pursue the path to the optimal utilization of spectrum and a liberated spectrum management. This paper presents a historical perspective on the evolution of spectrum regulation and management, explains the diversified meanings of interference for different sectors of the wireless industry, and presents a path for implementing a theoretical foundation for interference monitoring and forecasting to enable the emergence of a liberated spectrum industry and a new paradigm in spectrum management and regulations.

20.
Psicol. ciênc. prof ; 42: e241107, 2022.
Artículo en Portugués | LILACS, Index Psicología - Revistas | ID: biblio-1422385

RESUMEN

Buscamos, a partir da revisão teórica em plataformas acadêmicas on-line, apresentar proximidades entre os elementos constituintes da categoria de conhecimento cyberpunk, enfocando sua ficção, e a tecnomodernidade do século XXI, alertando sobre problemáticas decorrentes da dominação tecnológica e do processo de "coisificação" do humano. Para tal empreitada teórica e acessibilidade de leitura, utilizamos exemplos cotidianos e metáforas, elucidando terminologias como ciberespaço, distopia e algoritmos. Concluímos que a antiga ficção cyberpunk "profetizou" quanto à tecnomodernidade que vivenciamos, denunciando a nocividade do uso irrefletido das tecnologias. Também compreendemos que a tecnologia empregada em regimes totalitários guarda semelhanças com a sociedade de controle atual. Podemos, portanto, caminhar para uma sociedade continuamente afirmativa quanto ao avanço tecnológico e seu consumismo, conforme a lógica de maior produção e desempenho, no entanto sem acrescer, necessariamente, ao bem-estar social. Alternativa mais dignificante é trabalharmos nossa potência de negação diante do mau emprego tecnológico, opondo-nos a um presente insustentável e a um futuro mais catastrófico e desigual.(AU)


This work sought, from the theoretical review on online academic platforms, to present the proximity between the constituent elements of the cyberpunk knowledge category, focusing on its fiction components, and the 21st century techno-modernity, warning about problems arising from technological domination and the process of "reification" of the human. For this theoretical endeavor, and for increasing the reading accessibility, we used everyday examples and metaphors, elucidating terminologies, such as cyberspace, dystopia, and algorithms. We concluded that the old cyberpunk fiction "prophesied" about the techno-modernity we experience, denouncing the harmfulness of the thoughtless use of technologies. We also understood that the technology used in fictional totalitarian regimes has similarities with the current control society. Therefore, we can move towards a society that is continually affirmative regarding technological advancement and consumerism, according to the logic of greater production and performance. However, without necessarily adding to social welfare. Thus, a more dignified alternative is to work on the power of negation that the society and the individuals have in the face of bad technological employment, opposing an unsustainable present and a more catastrophic and unequal future.(AU)


A partir de una revisión teórica en las plataformas académicas en línea, este trabajo pretende presentar la proximidad entre los elementos constitutivos de la categoría de conocimiento ciberpunk enfocándose en su ficción y la tecno-modernidad del siglo XXI, advirtiendo sobre los problemas derivados de la dominación tecnológica y el proceso de "reificación" de lo humano. Para tal esfuerzo teórico y accesibilidad a la lectura, se utilizan ejemplos y metáforas cotidianas, aclarando terminologías como las de ciberespacio, distopía y algoritmos. Se concluye que la vieja ficción ciberpunk "profetizó" la tecno-modernidad que experimentamos, denunciando la nocividad del uso irreflexivo de las tecnologías. También se pudo comprender que la tecnología utilizada por los regímenes totalitarios ficcionales guarda similitudes con la sociedad de control actual. Por lo tanto, es posible avanzar hacia una sociedad que sea continuamente afirmativa respecto al avance tecnológico y al consumismo, de acuerdo con la lógica de mayor producción y rendimiento. Pero esto no aumenta necesariamente el bienestar social. Una alternativa mejor sería trabajar el poder de negación que tiene nuestra sociedad y sus individuos frente al uso inadecuado de la tecnología, oponiéndonos a un presente insostenible y a un futuro más catastrófico y desigual.(AU)


Asunto(s)
Humanos , Masculino , Femenino , Historia del Siglo XXI , Internet , Cultura , Obra de Ficción , Fascismo , Trastornos Fóbicos , Psicología , Calidad de Vida , Problemas Sociales , Valores Sociales , Tecnología , Televisión , Violencia , Desarrollo Tecnológico , Capitalismo , Narración , Emociones , Marginación Social , Conducta Criminal , Realidad Virtual , Adicción a la Tecnología , Relaciones Interpersonales , Películas Cinematográficas
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA