Multigenerational online behavior and media use : concepts, methodologies, tools, and applications /

"This book is a vital reference source on the impact of social networking platforms on a variety of relationships, including those between individuals, governments, citizens, businesses, and consumers. The publication also highlights the negative behavioral, physical, and mental effects of spen...

Full description

Saved in:
Bibliographic Details
Corporate Authors: IGI Global (Editor); Information Resources Management Association.
Published: IGI Global,
Publisher Address: Hershey, Pennsylvania :
Publication Dates: [2019]
Literature type: eBook
Language: English
Subjects:
Online Access: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7909-0
Summary: "This book is a vital reference source on the impact of social networking platforms on a variety of relationships, including those between individuals, governments, citizens, businesses, and consumers. The publication also highlights the negative behavioral, physical, and mental effects of spending a lot of time online such as mental health issues, Internet addiction, and body image control"--
Carrier Form: 105 PDFs (3 volume (1765 pages))
Bibliography: Includes bibliographical references and index.
ISBN: 9781522579106
Access: Restricted to subscribers or individual electronic text purchasers.
Index Number: HM851
CLC: TP393.4-05
Contents: Section 1. Fundamental concepts and theories. Chapter 1. Cyber culture: exploring the relationship ; Chapter 2. A case study in smartphone usage and gratification in the age of narcissism ; Chapter 3. The human factor: cyber security's greatest challenge ; Chapter 4. Improving global health with smartphone technology: a decade in review of mhealth initiatives ; Chapter 5. Cyber crimes: types, sizes, defence mechanism, and risk mitigation ; Chapter 6. Perceptions of social media impact on social behavior of students: a comparison between students and faculty ; Chapter 7. Virtual communication: strengthening of real relationships or simulation? -- Section 2. Development and design methodologies. Chapter 8. Cyber-aggression in higher education ; Chapter 9. SPCTA: an analytical framework for analyzing cyber threats by non-state actors ; Chapter 10. Changing the approach to deterrence in cyberspace while protecting civilians from cyber conflict ; Chapter 11. Emerging adults' coping strategies: longitudinal linkages to their involvement in cyber aggression and cyber victimization ; Chapter 12. A survey study of smartphones behavior in Brunei: a proposal of modelling big data strategies ; Chapter 13. Human factor role for cyber threats resilience ; Chapter 14. It's time there was an app for that too: a usability study of mobile timebanking ; Chapter 15. Internet use and violent extremism: a cyber-VERA risk assessment protocol ; Chapter 16. Integrating smartphone talking applications, trust, switching cost and customer switching behaviour in the mobile phone market: the case of Egypt ; Chapter 17. Safe distances: online and RL hyper-personal relationships as potential attack surfaces ; Chapter 18. The role of communication in online trust: the communicative action theory contribution ; Chapter 19. Digital wellness: integrating wellness in everyday life with digital content and learning technologies ; Chapter 20. The effect of parental demographics on parental assessment of adolescent Internet addiction ; Chapter 21. Exploring the risk factors of interactive e-health interventions for digital addiction -- Section 3. Tools and technologies. Chapter 22. Cyber attacks, contributing factors, and tackling strategies: the current status of the science of cybersecurity ; Chapter 23. Mobile embedded system: your door key evolved with your smartphone a user evaluation of a two-factor authentication ; Chapter 24. Smartwatches vs. smartphones: notification engagement while driving ; Chapter 25. Measuring the world: how the smartphone industry impacts cyber deterrence credibility ; Chapter 26. Smartphone guns shooting tweets: killing the "other" in Palestine ; Chapter 27. The future of apps: a smart investment for business ; Chapter 28. Social media activism from an information warfare and security perspective ; Chapter 29. Authenticity in online religion: an actor-network approach ; Chapter 30. The effect of flow frequency on Internet addiction to different Internet usage activities ; Chapter 31. Living parallel-ly in real and virtual: Internet as an extension of self ; Chapter 32. Mobile phone use during class at a Japanese women's college ; Chapter 33. Serious games as positive technologies ; Chapter 34. Hacking well-being: can serious games fit positive technology framework? ; Chapter 35. Spear phishing: the tip of the spear used by cyber terrorists ; Chapter 36. Recognizing driving behavior and road anomaly using smartphone sensors ; Chapter 37. The trend of mobile malwares and effective detection techniques ; Chapter 38. Mobile security in low-income households' businesses: a measure of financial inclusion ; Chapter 39. Supporting students' mental health and academic success through mobile app and IoT ; Chapter 40. Consumer behavior in online risky purchase decisions: exploring trustworthiness across culture ; Chapter 41. "Nothing crueler than high school students": the cyberbully in film and television ; Chapter 42. The use of social media in college recruiting and the student job search -- Section 4. Utilization and applications. Chapter 43. Life-value of young smartphone users ; Chapter 44. Privacy concerns and smartphone app purchase behavior in Malaysia ; Chapter 45. After auction's complete: what will buyers do next? a case study of feedback rating at Ebay ; Chapter 46. "A large can of worms": teachers' perceptions of young people's technology use ; Chapter 47. Notification display choice for smartphone users: investigating the impact of notification displays on a typing task ; Chapter 48. The lived experience of smartphone use in a unit of the United States Army ; Chapter 49. The social networks of cyberbullying on Twitter ; Chapter 50. Mobile devices and advertising: perceptions and opportunities ; Chapter 51. A cross-cultural study of smartphone adoption in Uzbekistan and South Korea ; Chapter 52. Out of work, out of mind?: smartphone use and work-life boundaries ; Chapter 53. Perceived impacts as user experien
Communication between real-world and cyber-world: conceptual thinking on cyber-racism! ; Chapter 83. Beware!: a multimodal analysis of cautionary tales in strategic cybersecurity messaging online ; Chapter 84. How people choose and use their smartphones ; Chapter 85. Youths and cyberbullying: description, theories, and recommendations ; Chapter 86. Predicting dysfunctional internet use: the role of age, conscientiousness, and internet literacy in Internet addiction and cyberbullying ; Chapter 87. Cybersecurity and human capital in community banks ; Chapter 88. Psychological and behavioral examinations of online terrorism -- Section 7. Emerging trends. Chapter 89. Pedagogical potential of virtual worlds: challenges and opportunities ; Chapter 90. Youth and mobile: an investigation of socialization ; Chapter 91. Cyber espionage and illegitimate information retrieval ; Chapter 92. A social media mining and analysis approach for supporting cyber youth work ; Chapter 93. Communication 2.0 at school: a way to connect teachers and students.