Search This Blog

Artikel Pilihan

Jadual Waktu Sistem Badan Manusia!

Waktu Pagi 3:00 am – 5:00 am Paru-paru – Ini adalah waktu terbaik untuk bangun dari tidur. Ketika ini terdapat lebih banyak kandungan ozo...

Showing posts with label References. Show all posts
Showing posts with label References. Show all posts

Challenges of implementing the ethics through the use of information technologies in the university

Friday, December 28, 2012

Agni Dika, Mentor Hamiti (2011) Challenges of implementing the ethics through the use of information technologies in the university, Procedia Social and Behavioral Sciences, Vol.15, pp.1110–1114


Abstract


In university premises where we live, despite the social development which allegedly is compatible with the European one, the principles related to ethical use of Information Technologies (IT) differ in many cases. Therefore, often we find actions that are contrary to the code of ethics and legal infrastructure, during which some of the following dilemmas are posed:




  • How ethical is to have installed a software without a license in our computers, justifying that it costs quite especially for students?

  • Does this mean that avoiding the conflict with the code of ethics, the computer should not be used, or should be used partly only with the licensed software?

  • In the other hand, are we going against the code of ethics if we buy licensed software and do not give its copy to the other students, when we know that in our computer we have installed copied software?


Students that use IT face other dilemmas, which are analyzed in this paper. Some of them are mentioned below.




  • The case when our students or members of academic staff travel in Europe with computers that have installed unlicensed software, as well as facing the law.

  • Another is the ethical dilemma that currently relates to the use of Facebook in the global space, when we know that through the same private content are published, without the consent of the persons involved?!

  • We can state the same about the multimedia recordings that are posted on YouTube or in other sites with private or free access!


Case study was conducted at the SEE University (SEEU, 2010) in R. Macedonia, where students and academic staff discussed and debated issues regarding ethic dilemmas.


Keywords: Information Technology, University, Ethical Code, Software, License;

Effectiveness of using information technology in higher education in Saudi Arabia

Fahad N. Alfahad (2012) Effectiveness of using information technology in higher education in Saudi Arabia, Procedia - Social and Behavioral Sciences, Vol.46, pp.1268 – 1278


Abstract
Information technology (IT) refers to “personal electronic devices such as laptops and handheld computers, smart phones, and institution’s computers and associated devices”. This study investigates the usefulness, efficiency and efficacy of information technology in higher education in the Kingdom of Saudi Arabia. The study was conducted in the College of Education, King Saud University. The survey was distributed among 161 female college students selected randomly from a pool of 400 female students who were attending different courses in different areas. Results indicated that 61.5% of the participants used the electronic device in their course activities and 65.8% used IT for blogging. Interestingly, 72% of participants are often doing
online shopping and 88.6% of the students are often creating read, send e-mail and instant messages. A number of issues arising from this study were included in the conclusion and implications.


Keywords: higher education,educational technology,elearning,Saudi arabia

Identification of Six Socio-types of Internet Users and their Impact on the Interactivity of Tourism Websites

Thursday, November 15, 2012

Francine Charest, Francois Bedard, Identification of Six Socio-types of Internet Users and their Impact on the Interactivity of Tourism Websites, www.springerlink.com/content/r08h801046242r8g/fulltext.pdf


Abstract


Many studies have shown that Internet users do not form a homogenous group in regard to the way in which they appropriate websites. Socio-demographic profiling (age, sex, education, social status) is the usual method for explaining the different website usages of Internet users. This article proposes a new approach - that of socio-types - to understand and manage the different usages. Laboratory observation sessions were conducted about Internet users and their appropriation of the website of a destination management organization. These sessions allowed to identify six socio-types among Internet users of tourism sites: (i) the "Explorer", (ii) the "Agenda Setter", (iii) the "Demanding Type", (iv) the "Party Type", (v) the "What To Do Type" and (vi) the "Google Addict". A good knowledge of each of those socio-types will prove very useful for managers in charge of building or redesigning a website. Moreover, that knowledge will make the managers more aware of the need to invest in the interactivity of their websites so that each visitor, whatever his/her socio-type, can find their area of interest.


Keywords: Internet user socio-types, appropriation theory, website design.

The Effect of the Internet: Direct or Indirect?

Jan Sladek, The Effect of the Internet: Direct or Indirect?, Masaryk University Journal of Law and Technology.


The presentation deals with the problematic of social consequences of the Internet use. The author attempts to trace the impact of Internet use on social habits of the users. Furthermore, he tries to isolate the effects from the influence of age. By this, the author contributes to the discussion of knowledge society and cyberculture as he strives for correction of widely held opinions by comparing it to the results of his analysis. In addition, the methodological problems are discussed briefly

An Empirical Study of Problematic Internet Use and Self-Esteem

Monday, November 12, 2012

Laura Widyanto, Mark D. Griffiths, An Empirical Study of Problematic Internet Use and Self-Esteem, International Journal of Cyber Behavior, Psychology and Learning, 1(1), 13-24, January-March 2011


ABSTRACT


Previous research has alluded to the existence of a relationship between self-esteem and problematic Internet use. The main aim of the study was to examine the relationship between problematic Internet use and a number of distinct demographic, behavioural, and psychosocial variables. Using an online survey, a self-selected sample comprising 1,467 Internet users participated in the study. The survey comprised 50 questions including validated scales for both self-esteem (Rosenberg’s Self-Esteem Scale) and problematic Internet use (Internet Related Problem Scale; IPRS) in addition to demographic information. Based on previous literature, it was hypothesized that problematic Internet users were more likely than non-problematic Internet users to post low self-esteem scores. Results showed that self-esteem was strongly and negatively associated with IRPS. Also, for those with high IRPS scores, participation in online forums was the primary online activity followed by online gaming and chatting. Although the study comprised a self-selecting sample and utilized self-report, the results appear to provide robust evidence of an association between self-esteem and problematic Internet use mirroring prior research in the area.


Keywords: Addiction, Internet Use, Internet Related Problem Scale (IPRS), Problematic Internet Use, Self-Esteem

Does Internet use reflect your personality?

Leman Pinar Tosun, Timo Lajunen, Does Internet use reflect your personality? Relationship between Eysenck’s personality dimensions and Internet use, Computers in Human Behavior 26 (2010) 162–167, doi:10.1016/j.chb.2009.10.010


Abstract


The aim of this study was to investigate the relationship between three Eysenckian personality dimensions – psychoticism, extroversion and neuroticism – and the Internet use. A sample of 427 Turkish university students completed the Eysenck’s Personality Questionnaire, an Internet survey which contained questions about interpersonal motives for Internet use and a scale for measuring the tendency for expressing one’s ‘‘true” self on the Internet. The results indicated that psychoticism was the only personality dimension related to establishing new relationships and having ‘‘Internet only” friends; and extroversion was the only personality dimension that is related to maintaining long-distance relationships, and supporting daily face-to-face relationships. The results supported the idea that for some individuals, Internet can be used as social substitute for face-to-face social interactions while for some others it can be used as a tool of social extension, depending on the user’s personality characteristics. Also, psychoticism and neuroticism were found to be positively associated with the expressing ‘‘true self” on the Internet, and it was shown that the relationship between psychoticism and Internet uses as social substitute is mediated by the tendency to express one’s true self on the Internet.


Keywords: Personality, Internet, Psychoticism

Understanding Internet Usage : A Social-Cognitive Approach to Uses and Gratifications

Friday, November 9, 2012

Robert Larose, Dana Mastro, Matthew S. Eastin (2001) Understanding Internet Usage: A Social-Cognitive Approach to Uses and Gratifications, Social Science Computer Review 19: 395, DOI: 10.1177/089443930101900401


Abstract


Several studies have applied uses and gratifications to explain Internet usage. Like Bandura’s social-cognitive theory, the uses and gratifications framework explains media use in terms of expected positive outcomes, or gratifications. However, previous uses and gratifications research accounted for little variance in Internet behavior, although there were conflicting results. This research identifies new variables from social-cognitive theory that might further explain Internet usage and resolve inconsistencies in prior research. Measures of self-efficacy and self-disparagement were developed for the domain of Internet behavior. Internet addiction was interpreted as a deficient self-regulation within the social-cognitive framework. Finally, the negative outcomes of online behavior were analyzed for their impact on Internet usage. In a survey of 171 college students, the social-cognitive model explained 60% of the available variance in Internet usage using multiple regression analysis, a significant improvement over prior uses and gratifications research.


Keywords: Internet use, Internet behavior, social-cognitive theory, self-efficacy, self-disparagement, gratifications, multiple regression models

Kajian Tahap Pengetahuan dan Penggunaan Teknologi Maklumat di Kalangan Anggota Jabatan Kesihatan Negeri Terengganu

Abdul Manan, M.D.,Mohd Kamil, H. & Jamaluddin, A.R., Buletin Kesihatan Masyarakat Isu Khas 2000,


PENGENALAN


Jabatan Kesihatan Negeri Terenggan (JKNT) mempunyai kemudahan kesihatan iaitu 5 buah hospital, 7 Pejabat Kesihatan, 40 Klinik Kesihatan (termasuk Klinik Kesihatan Ibu & Anak), 132 Klinik Desa dan pelbagai kemudahan lagi seperti Klinik Pergigian Pakar dan lain-lain lagi. Ia juga mengandungi lebih 4,300 anggota. Dalam meningkatkan perkhidmatannya dan sesuai dengan peredaran masa, peralatan pejabat dibekalkan dengan peralatan komputer.


Bekalan ini bermula di sekitar 10 tahun yang lalu dan sehingga kini telah banyak hospital dan kemudahan kesihatan yang lain dilengkapkan dengan peralatan ini. Antara program yang telah dilengkapi dengan sistem komputer adalah seperti pengurusan kewangan, pengurusan personel dan rekod-rekod. Disamping itu kebanyakan program dalam Kementerian Kesihatan mempunyai format berkomputernya sendiri terutama dalam pengurusan data demi untuk melicinkan pengurusan program itu sendiri. Ini termasuklan borang pengurusan data 'Health Management Information System (HMIS) dalam pelbagai program kesihatan. Disamping itu kemudahan-kemudahan di peringkat klinik juga dibekalkan komputer untuk kegunaan anggota. Sejak kebelakangan ini pula beberapa kemudahan networking pula diperkenalkan. Ini sejajar dengan dasar kerajaan untuk memperkembangan penggunaan IT dalam pengurusan kerajaan.


Anggota JKNT tidak ketinggalan dalam mengikuti perkembangan ini. Pelbagai kursus berkaitan telah diadakan disamping kursus-kursus lain yang ditawarkan oleh agensi lain. Disamping itu anggota JKNT sendiri berusaha meningkatkan pengetahuan dan kebolehan masing-masing dalam mengandalikan komputer.


Pada amnya banyak peralatan dan kemudahan ini dibekalkan kepada kemudahan kesihatan terutamanya hospital dan klinik. Setakat manakah komputer digunakan, kerja apakah yang digunakan dan kekerapan komputer digunakan tidaklah berapa diketahui. Begitu juga setakat mana pengetahuan dan kebolehan anggota JKNT mengguna dan mengendalikan alatan ini juga tidak diketahui lebih-lebih lagi mengikut perkembangan IT semasa yang begitu cepat berubah. Adalah dengan ini dirasakan amat perlu diadakan satu kajian untuk mengetahui setakat mana anggota JKNT mengguna peralatan ini disamping menentukan tahap pengetahuan dan kebolehan mereka tentang IT.


Objektif Umum kajian ini adalah untuk menentukan tahap pengetahuan dan penggunaan teknologi maklumat (IT) di kalangan anggota Jabatan Kesihatan Negeri Terengganu sementara objektif khusus adalah untuk menentukan tahap penggunaan komputer di kalangan anggota, untuk menentukan tahap pengetahuan anggota tentang IT, untuk menentukan tahap kebolehan anggota menggunakan aplikasi dan mengendalikan komputer semasa menjalankan tugas serta menentukan tahap pemilikan komputer di pejabat dan persendirian (di rumah).

Tahap Pengetahuan Dan Penggunaan Komputer Dalam Kalangan Guru-Guru Di Tiga Buah Sekolah Menengah Teknik Di Kuala Lumpur

Baharin Abu & Lim Lih Hoon (2010) Tahap Pengetahuan Dan Penggunaan Komputer Dalam Kalangan Guru-Guru Di Tiga Buah Sekolah Menengah Teknik Di Kuala Lumpur, Fakulti Pendidikan, Universiti Teknologi Malaysia.


Abstrak :


Tujuan kajian ini adalah untuk mengenalpasti tahap pengetahuan dan penggunaan komputer dalam kalangan guru-guru di tiga buah sekolah menengah teknik di Kuala Lumpur.Aspek yang dikaji ialah tahap pengetahuan perkakasan komputer, pengetahuan penggunaan perisian komputer, sikap guru terhadap penggunaan komputer dan masalah yang dihadapi oleh guru-guru dalam penggunaan komputer. Respoden kajian terdiri daripada 160 orang guru di tiga buah Sekolah Menengah Teknik di Kuala Lumpur. Data diperolehi menggunakan instrumen soal selidik dan dianalisis menggunakan perisian SPSS ( Statistical Packages for the Social Sciences). Nilai kebolehpercayaan Alpha Cronbach alat kajian adalah α =.942. Penganalisisan data dibuat secara deskriptif menggunakan kekerapan, peratus dan min. Hasil kajian mendapati tahap pengetahuan guru-guru sekolah menengah teknik terhadap perkakasan komputer berada di tahap tinggi manakala tahap pengetahuan guru-guru menggunakan perisian komputer berada di tahap yang sederhana. Hasil dapatan kajian juga menunjukkan guru-guru mempunyai keyakinan yang tinggi dalam penggunaan komputer. Manakala masalah utama dalam penggunnaan komputer ialah tiada galakan dari pihak pentadbir sekolah dan peruntukan untuk membeli perisian.


Katakunci : tahap pengetahuan dan penggunaan computer, guru di sekolah teknik

Tahap Pengetahuan, Sikap Dan Masalah Penggunaan Komputer Di Kalangan Guru Di Sekolah Menengah Daerah Alor Gajah.

Zaidatun Tasir & Lim Bee Yeok (2010) Tahap Pengetahuan, Sikap Dan Masalah Penggunaan Komputer Di Kalangan Guru Di Sekolah Menengah Daerah Alor Gajah, Fakulti Pendidikan, Universiti Teknologi Malaysia.


Abstrak :


Kajian ini dijalankan bagi mengenal pasti tahap pengetahuan, sikap dan masalah penggunaan komputer di kalangan guru di lima buah sekolah di sekitar bandar Alor Gajah, Melaka. Kajian ini juga mengenal pasti tujuan dan kekerapan penggunaan komputer semasa proses pengajaran dan pembelajaran. Dapatan menunjukkan bahawa tujuan utama guru-guru menggunakan komputer adalah untuk melaksanakan tugasan sekolah. Dari segi kekerapan penggunaan pula, guru-guru dalam kajian ini adalah merupakan pengguna komputer yang sederhana. Untuk kajian ini, responden adalah sebanyak 202 orang yang terdiri daripada guruguru yang mengajar di lima buah sekolah menengah di sekitar bandar Alor Gajah. Soal selidik telah digunakan sebagai instrumen kajian dan pengumpulan data dilakukan dengan menggunakan skala Likert empat mata. Data-data ini kemudiannya diproses menggunakan perisian “Statistical Packages for the Social Sciences 13.0” (SPSS). Nilai kebolehpercayaan bagi instrumen kajian ini ialah alfa-0.881. Penganalisisan dibuat secara kaedah statistik deskriptif iaitu dalam bentuk kekerapan, peratusan serta min. Hasil daripada kajian ini menunjukkan tahap pengetahuan komputer di kalangan guru adalah agak tinggi (min =2.91), sikap guru yang positif dalam penggunaan komputer semasa proses pengajaran dan pembelajaran (min=3.10). Bagi pengenalpastian masalah dalam penggunaan komputer pula menunjukkan para guru yang terlibat dalam kajian tidak mengalami masalah yang serius untuk menggunakan komputer dalam pengajaran mereka (min =2.36). Seterusnya hasil analisis Ujian T digunakan dan dapatan menunjukkan wujudnya perbezaan yang signifikan antara konstruk masalah berdasarkan jantina dan memberi nilai signifikan 0.04 (p0.05). Berpandukan hasil kajian, penyelidik telah mengutarakan beberapa cadangan bagi membantu pihak Kementerian Pelajaran dan sekolah khususnya mempercepatkan perkembangan teknologi komputer kepada guru-guru di sekolah.


Katakunci : tahap pengetahuan, sikap, masalah, penggunaan komputer, guru

Muslims and the media in the blogosphere

Tuesday, November 6, 2012

Daniel Martin Varisco, Muslims and the media in the blogosphere, Contemporary Islam (2010) 4:157-177. DOI 10.1007/s11562-009-0106-y


Abstract


In the past two decades a virtual Ummah has evolved in cyberspace. While some of these websites are targeted specifically at Muslims, others attempt to provide outreach on Islam or counter Islamophobic bias. As noted by Jon Anderson, in his pioneering work on Islam in cyberspace, Muslims were among the first engineering students to create websites at the dawn of the Internet, before mainstream Islamic organizations posted official websites. There is a wealth of material by Muslims in English and Western languages, some of it archived for research. This article explores the methodological problems posed in studying the range of Islam-content blogs, from private individuals to religious scholars, as well as Muslim websites that feature comments from readers. The focus of the paper is an analysis of blogs about Islam or by Muslims that either act as watchdogs on the media or try to provide alternative views to the mainstream media of competing Muslim groups. Researching these blogs as a form of e-ethnography calls for a rethinking and refining of anthropological methodology as e-ethnography.


Keywords : Internet, Muslim blogs, Islamophobia, Ethnography

iMuslims: rewiring the house of Islam

Daniel Martin Varisco, Contemporary Islam, DOI 10.1007/s11562-010-0115-x


Gary R. Bunt. Chapel Hill: University of North Carolina Press, 2009. 358pp. ISBN 978-0-8078-5966-7


Keywords : Cyberspace, Islam online, Jihad . Islamic rituals . Iraq . Palestine


‘The Prophet Muhammad stated: “Seek knowledge even as far as China.” The Internet could be seen as an extension of that quest”.’ (p. 26)


There is probably no scholar who has logged and blogged more hours searching websites by and about Muslims than Gary R. Bunt, a senior lecturer in Islamic Studies at the University of Wales. His latest book expands on two earlier studies, the pioneering Virtually Islamic (2000) and follow up Islam in the digital age: e-jihad, online fatwas amd cyber Islamic environments (2003). It is not surprising that in the early days of his online research Bunt was responsible for a meltdown of his university server due to the amount of Islam-related Internet traffic arriving in his e-mail account (p. 82). iMuslims is a study that not only locates Islam in cyberpace, but provides a rich documentation of websites, both ongoing and those which have disappeared. The present volume reintroduces the reader to his earlier concept of cyber-Islamic environments (CIE), surveys previous research, probes the wide range of sites and Muslim perspectives online, examines the trajectories of Islamic sacred content in cyberspace, and focuses on Muslim blogging and what he terms ‘digital jihadi’ websites, especially for the recent war in Iraq and the Palestinian issue.


As a scholar who studies Islam rather than a proponent for any particular Islamic worldview, Bunt proposes his ‘cyber-Islamic environment’ as an ‘umbrella term’ (p. 1), the diverse dimensions of which he illustrates in a massive chart (pp. 46–47) that interrelates sacred sources, the reading environment, translation issues, symbolism, content, players, technologies and media types, surfer profiles and globalization issues. He even encourages readers to provide their own amendments and additions to this chart via a wiki format on his main website (virtuallyislamic.com). Although the focus is primarily on Sunni, or what appear to be Sunni, sites, Bunt applies the term “Islamic” in the widest possible sense. One of the facets of CIE is that the classical notion of one idealized ummah no longer holds: ‘in fact there are numerous parallel ummah frameworks operating in cyberspace, reflecting diverse notions of the concept of community’ (p. 31).


A primary focus of Bunt’s research is the technological influence of the medium, cyberspace both as a space and increasingly as an online way of life and ‘second life’, on Muslims and representation of Islam. A distinction can be made between ‘online religion’ which can radically alter traditional modes of being Muslim, and ‘religion online,’ which may be little more than archiving materials. Bunt notes that some Muslims now explain their worldview in terms of specific websites rather than a local mosque or offline religious affiliation. One example of this is the following of Shaykh Yusuf al-Qaradawi, a transplanted Egyptian preacher who has a regular presence on the satellite channel al-Jazeera and helped found the successful Islamic web portal Islam Online in 1997, in addition to having his own well-visited personal website. Here the medium greatly increases access to a specific charismatic individual, not unlike the case with American televanglists, but at the other extreme there is
now a Muslim avatar ummah in Second Life. Bunt mentions a Ramadan tent sponsored on Second Life in 2007 by Islam Online, but which saw harassment of Muslim female avatars by two non-Muslim males. Bias crimes are thus not limited to the real offline world, as the history of hacking illustrates only too well.


As in real life, Muslims interact in cyberspace with multiple identities. Although the earliest Muslim websites tended to be personal webpages, mainstream organizations like al-Azhar have in recent years begun to utilize the web in sophisticated ways. One can now navigate through cyberspace in what might be termed an Islamic ‘cloud.’ In addition to websites operated by Islamic organizations, there are now clones of most of the major social networking sites, including MuslimSpace (founded in 2006 by an Egyptian based in Finland), IslamicTorrents (a rival to YouTube), Muslimr (paralleling flickr), and a variety of Muslim dating
sites. There is even an OpenIslampedia variant of Wikipedia. One of the problems in researching CIEs, especially when documenting this in publications that take more than a year to get into print, is the rapidly evolving context in which software changes and websites appear and disappear. Thus, the data provided on online access in Muslim countries were already 3–4 years old when the book appeared.

The Influence of Media Violence on Youth

Monday, November 5, 2012

Craig A. Anderson, Leonard Berkowitz, Edward Donnerstein, L. Rowell Huesmann, James D. Johnson, Daniel Linz, Neil M. Malamuth, Ellen Wartella, The Influence of Media Violence on Youth, Psychological Science in the Public Interest. Vol. 4, No. 3, December 2003. pp. 81-110.




[caption id="attachment_7395" align="alignleft" width="150"]Copying ... Copying ...[/caption]

Summary—Research on violent television and films, video games, and music reveals unequivocal evidence that media violence increases the likelihood of aggressive and violent behavior in both immediate and long-term contexts. The effects appear larger for milder than for more severe forms of aggression, but the effects on severe forms of violence are also substantial (r.13 to .32) when compared with effects of other violence risk factors or medical effects deemed important by the medical community (e.g., effect of aspirin on heart attacks). The research base is large; diverse in methods, samples, and media genres; and consistent in overall findings. The evidence is clearest within the most extensively researched domain, television and film violence. The growing body of video-game research yields essentially the same conclusions.




[caption id="attachment_7396" align="alignright" width="150"]Aggresive Aggresive[/caption]

Short-term exposure increases the likelihood of physically and verbally aggressive behavior, aggressive thoughts, and aggressive emotions. Recent large-scale longitudinal studies provide converging evidence linking frequent exposure to violent media in childhood with aggression later in life, including physical assaults and spouse abuse. Because extremely violent criminal behaviors (e.g., forcible rape, aggravated assault, homicide) are rare, new longitudinal studies with larger samples are needed to estimate accurately how much habitual childhood exposure to media violence increases the risk for extreme violence.


Well-supported theory delineates why and when exposure to media violence increases aggression and violence. Media violence produces short-term increases by priming existing aggressive scripts and cognitions, increasing physiological arousal, and triggering an automatic tendency to imitate observed behaviors. Media violence produces long-term effects via several types of learning processes leading to the acquisition of lasting (and automatically accessible) aggressive scripts, interpretational schemas, and aggression-supporting beliefs about social behavior, and by reducing individuals’ normal negative emotional responses to violence (i.e., desensitization).




[caption id="attachment_7397" align="alignleft" width="150"]Boycotting Boycotting[/caption]

Certain characteristics of viewers (e.g., identification with aggressive characters), social environments (e.g., parental influences), and media content (e.g., attractiveness of the perpetrator) can influence the degree to which media violence affects aggression, but there are some inconsistencies in research results. This research also suggests some avenues for preventive intervention (e.g., parental supervision, interpretation, and control of children’s media use). However, extant research on moderators suggests that no one is wholly immune to the effects of media violence.


Recent surveys reveal an extensive presence of violence in modern media. Furthermore, many children and youth spend an inordinate amount of time consuming violent media. Although it is clear that reducing exposure to media violence will reduce aggression and violence, it is less clear what sorts of interventions will produce a reduction in exposure. The sparse research literature suggests that counter attitudinal and parental-mediation interventions are likely to yield beneficial effects, but that media literacy interventions by themselves are unsuccessful.


Though the scientific debate over whether media violence increases aggression and violence is essentially over, several critical tasks remain. Additional laboratory and field studies are needed for a better understanding of underlying psychological processes, which eventually should lead to more effective interventions. Large-scale longitudinal studies would help specify the magnitude of media-violence effects on the most severe types of violence. Meeting the larger societal challenge of providing children and youth with a much healthier media diet may prove to be more difficult and costly, especially if the scientific, news, public policy, and entertainment communities fail to educate the general public about the real risks of media-violence exposure to children and youth.


More to read:-

Citizen participation in online news media. An overview of current developments in four European countries and the United States

Friday, November 2, 2012


Abstract
With the continuing diffusion of the Internet, with the changing media-consumption patterns and with the impact of the Web 2.0 phenomenon, there seems to be widespread optimism regarding democratic participation and active citizenship through online media. Authors such as Bowman and Willis (2003) and Dan Gillmor (2004) describe how, on the Internet, the people themselves have become the media. In contrast to traditional media, blogs and other community-driven media are characterised by a fundamental convergence of the roles of content producers and consumers because every user has the opportunity to both consume and create content. Axel Bruns (2005) has coined the term ‘produsage’ to refer to this blurring line, while Gillmor (2004: 136) and Rosen (2006) speak of the “former audience” to stress that the public should no longer be regarded as a passive group of receivers. Some authors regard this as being part of a larger societal development toward a participatory culture, something that Hartley also has called a “redactional society” (Hartley, 2000). There are some doubts about the foundations of such a development though. Some authors question the idea of a “hyperactive audience” (Schönbach, 1997; see also Hanitzsch, 2006). They claim that only institutionalized forms of journalism guarantee quality through organizational structures and professional work routines and that they offer society a shared meaning in the form of content that reaches mass audiences.

Fifteen Minutes of Fame: The Power of Blogs in the Lifecycle of Viral Political Information


  • Nahon, Karine; Hemsley, Jeff; Walker, Shawn; and Hussain, Muzammil (2011) "Fifteen Minutes of Fame: The Power of Blogs in the Lifecycle of Viral Political Information," Policy & Internet: Vol. 3: Iss. 1, Article 2. DOI: 10.2202/1944-2866.1108, Available at: http://www.psocommons.org/policyandinternet/vol3/iss1/art2


Abstract
This empirical study addresses dynamics of viral information in the blogosphere, presenting a new methodology which enables the capture of dynamism and the time-factor of information diffusion in networks. Data was gathered on nearly 10,000 blogs and 13,000 blog posts, linking to 65 of the top U.S. presidential election videos that became viral on the Internet between March 2007 and June 2009. The article argues that the blogosphere is not monolithic and illuminates the role of four important blog types: elite, top-political, top-general and tail blogs. It creates a map of the ‘life cycle’ of blogs posting links to viral information. It shows that elite and top-general blogs ignite the virality process, which means that they get the chance to frame messages and influence agenda setting while top-political and tail blogs act as followers in the process.

A Study of Internet Addiction through the Lens of the InterpersonalTheory


Abstract
Previous studies have presented conflicting claims regarding reasons that people become addicted to the Internet. In this study, we attempted to identify predictors of Internet addiction based on Sullivan's interpersonal theory and Internet addiction literature. In our research model, it is hypothesized that good parent–child relationship positively correlates with good interpersonal relationships, which in turn are hypothesized to correlate with undesirable social anxiety.

In addition, both parent–child and interpersonal relationships are hypothesized to negatively correlate with Internet addiction, whereas the level of social anxiety is hypothesized to positively correlate with Internet addiction. The results of this study confirm the research model hypotheses, indicating that the quality of parent–child relationship is indeed positively correlated to the quality of our participants' interpersonal relationships and that frustrating interpersonal relationships may raise the level of social anxiety. In addition, interpersonal relationships, the parent–child relationship, and social anxiety all influence Internet addiction, as predicted by the model. Finally, the more social anxiety and discontent with their peer interactions the participants experienced, the more addicted they were to the Internet.

Internet Addiction: The Emergence of a New Clinical Disorder



Abstract
Anecdotal reports indicated that some on-line users were becoming addicted to the Internet in much the same way that others became addicted to drugs or alcohol, which resulted in academic, social, and occupational impairment. However, research among sociologists, psychologists, or psychiatrists has not formally identified addictive use of the Internet as a problematic behavior. 

This study investigated the existence of Internet addiction and the extent of problems caused by such potential misuse. Of all the diagnoses referenced in the Diagnostic and Statistical Manual of Mental Disorders—Fourth Edition (DSM-IV; American Psychiatric Association, 1995), Pathological Gambling was viewed as most akin to the pathological nature of Internet use. By using Pathological Gambling as a model, addictive Internet use can be defined as an impulse-control disorder that does not involve an intoxicant. Therefore, this study developed a brief eight-item questionnaire referred to as a Diagnostic Questionnaire (DQ), which modified criteria for pathological gambling to provide a screening instrument for classification of participants. On the basis of this criteria, case studies of 396 dependent Internet users (Dependents) and 100 nondependent Internet users (Nondependents) were classified. Qualitative analyses suggest significant behavioral and functional usage differences between the two groups such as the types of applications utilized, the degree of difficulty controlling weekly usage, and the severity of problems noted. Clinical and social implications of pathological Internet use and future directions for research are discussed.

Internet Over-Users' Psychological Profiles: A Behavior SamplingAnalysis on Internet Addiction


Abstract
What kinds of psychological features do people have when they are overly involved in usage of the internet? Internet users in Korea were investigated in terms of internet over-use and related psychological profiles by the level of internet use. We used a modified Young's Internet Addiction Scale, and 13,588 users (7,878 males, 5,710 females), out of 20 million from a major portal site in Korea, participated in this study. Among the sample, 3.5% had been diagnosed as internet addicts (IA), while 18.4% of them were classified as possible internet addicts (PA). The Internet Addiction Scale showed a strong relationship with dysfunctional social behaviors. More IA tried to escape from reality than PA and Non-addicts (NA). When they got stressed out by work or were just depressed, IA showed a high tendency to access the internet. The IA group also reported the highest degree of loneliness, depressed mood, and compulsivity compared to the other groups. The IA group seemed to be more vulnerable to interpersonal dangers than others, showing an unusually close feeling for strangers. Further study is needed to investigate the direct relationship between psychological well-being and internet dependency.

Internet Addiction on Campus: The Vulnerability of College Students


Abstract
Use of the Internet on college campuses has increased dramatically in recent years, leading to pathological use, or Internet addiction, for some students. Internet addiction is defined as a psychological dependence on the Internet and is characterized by (a) an increasing investment of resources on Internet-related activities, (b) unpleasant feelings (e.g., anxiety, depression, emptiness) when offline, (c) an increasing tolerance to the effects of being online, and (d) denial of the problematic behaviors. Individuals exhibiting such symptoms often are dealing with underlying psychological issues. College students are particularly vulnerable to pathological Internet use due to several factors. These factors include (a) the psychological and developmental characteristics of late adolescence/young adulthood, (b) ready access to the Internet, and (c) an expectation of computer/Internet use. The nature of the computer medium and the sense of control experienced when engaged in computer activities can also contribute to the potential for problematic computer/Internet use. Research on Internet addiction is in its infancy. The need for greater understanding of Internet addiction and its treatment is noted.

Internet Gratifications and Internet Addiction: On the Uses and Abusesof New Media


  • Indeok Song, Robert Larose, Matthew S. Eastin and Carolyn A. Lin. Internet Gratifications and Internet Addiction: On the Uses and Abuses of New Media, CyberPsychology & Behavior. August 2004, 7(4): 384-394. doi:10.1089/cpb.2004.7.384. http://www.liebertonline.com/doi/abs/10.1089/cpb.2004.7.384

Abstract
Internet addiction has been identified as a pathological behavior, but its symptoms may be found in normal populations, placing it within the scope of conventional theories of media attendance. The present study drew upon fresh conceptualizations of gratifications specific to the Internet to uncover seven gratification factors: Virtual Community, Information Seeking, Aesthetic Experience, Monetary Compensation, Diversion, Personal Status, and Relationship Maintenance. With no parallel in prior research, Virtual Community might be termed a "new" gratification. Virtual Community, Monetary Compensation, Diversion, and Personal Status gratifications accounted for 28% of the variance in Internet Addiction Tendency. The relationship between Internet addiction and gratifications was discussed in terms of the formation of media habits and the distinction between content and process gratifications.