Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Journal

Internet

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 319

Full-Text Articles in Entire DC Network

The Relationship Between Physical Activity Level, Digital Game Addiction, And Academic Success Levels Of University Students, Aydin Ilhan Jul 2024

The Relationship Between Physical Activity Level, Digital Game Addiction, And Academic Success Levels Of University Students, Aydin Ilhan

Journal of Global Education and Research

This study examined the relationship between physical activity, digital game addiction, and academic success among university students. Participants were university 704 students from Turkiye who did physical activity and played digital games. The sample group consisted of 704 university students (342 women and 362 men), selected through random sampling. Data were collected using demographic information forms, a digital game addiction scale, and an international short-form questionnaire about physical activity. The data were analyzed using Pearson correlation, t-tests, one-way ANOVA, and post-hoc tests. The findings revealed a significant negative relationship between academic success and both physical activity and digital game …


From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan Jan 2024

From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan

University of Miami Business Law Review

But for the Internet, many of our interactions with others would be impossible. From socializing to shopping, and, increasingly, working and attending class, the Internet greatly facilitates the ease of our daily lives. However, we frequently neglect to consider that our conduits to the Internet have the potential to lead to harm and injury. When the Internet was in its infancy, and primarily was a repository of information, Congress recognized the threat of continual lawsuits against online entities stemming from the content created by their users. The Communications Decency Act of 1996 arose to mitigate the seemingly Herculean task for …


Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky Jan 2024

Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky

University of Miami Business Law Review

For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …


The Rise Of Isis: A Growing Threat To The World, Grace Ralstin Jan 2024

The Rise Of Isis: A Growing Threat To The World, Grace Ralstin

Pepperdine Policy Review

ISIS has inflicted terror onto civilians in several ways, through ransoms, kidnapping, beheadings, mass shootings, and bombings. These acts of terror are funded through the internet. They use this tool as a mechanism to spread online propaganda and radicalize people, in addition to terrorizing civilians with cyberterrorism to collect money. This analysis also compares ISIS to other terrorist organizations, specifically in their online propaganda tactics and funding. Further, it will posit policy recommendations that are aimed at helping policymakers combat online terrorist activity. The goal should be making cyberspace safer for the public and increasing challenges for terrorists to conduct …


Looking For Liability For Harmful Social Media Content And Cyberbullying After Gonzalez V. Google, Llc, Elizabeth M. Jaffe Jan 2024

Looking For Liability For Harmful Social Media Content And Cyberbullying After Gonzalez V. Google, Llc, Elizabeth M. Jaffe

Marquette Intellectual Property & Innovation Law Review

None


Section 230 As Civil Rights Statute, Enrique Armijo Dec 2023

Section 230 As Civil Rights Statute, Enrique Armijo

University of Cincinnati Law Review

Many of our most pressing discussions about justice, progress, and civil rights have moved online. Activists advocating for social change no longer need to be in the same physical space to connect with others who share their challenges and aspirations. But the convergence of mobility, connectivity, and technology is not the only reason why. Thanks to Section 230 of the Communications Decency Act’s (“Section 230”) immunity for online platforms, websites, and their hosts, speakers can engage in speech about protest, equality, and dissent without fear of collateral censorship from governments, authorities, and others in power who hope to silence them. …


Bullying Y Ciberbullying: Victimización, Acoso Y Daño. Necesidad De Intervenir En El Entorno Escolar, Maialen Garmendia Larrañaga, Estefanía Jiménez Iglesias, Nekane Larrañaga Aizpuru Nov 2023

Bullying Y Ciberbullying: Victimización, Acoso Y Daño. Necesidad De Intervenir En El Entorno Escolar, Maialen Garmendia Larrañaga, Estefanía Jiménez Iglesias, Nekane Larrañaga Aizpuru

Revista Española de Pedagogía

El presente trabajo analiza el ciberbullying a través de los resultados de una encuesta realizada a una muestra representativa de los y las menores españolas usuarias de Internet de entre 9 y 16 años. Los datos revelan que el acoso a través de las tecnologías digitales forma parte de un clima de violencia entre los preadolescente y adolescentes, entre los cuales el acoso cara a cara prevalece claramente sobre el que tiene lugar a través de medios tecnológicos. Si bien las diversas modalidades de acoso se superponen entre sí, la más frecuente es la que tiene lugar en entornos offline. …


Review, Democracy And Fake News: Information Manipulation And Post-Truth Politics, Peter Krapp Aug 2023

Review, Democracy And Fake News: Information Manipulation And Post-Truth Politics, Peter Krapp

Secrecy and Society

No abstract provided.


The Five Internet Rights, Nicholas J. Nugent Jun 2023

The Five Internet Rights, Nicholas J. Nugent

Washington Law Review

Since the dawn of the commercial internet, content moderation has operated under an implicit social contract that website operators could accept or reject users and content as they saw fit, but users in turn could self-publish their views on their own websites if no one else would have them. However, as online service providers and activists have become ever more innovative and aggressive in their efforts to deplatform controversial speakers, content moderation has progressively moved down into the core infrastructure of the internet, targeting critical resources, such as networks, domain names, and IP addresses, on which all websites depend. These …


Boden Lecture: The Past’S Lessons For Today: Can Common-Carrier Principles Make For A Better Internet?, James B. Speta Jun 2023

Boden Lecture: The Past’S Lessons For Today: Can Common-Carrier Principles Make For A Better Internet?, James B. Speta

Marquette Law Review

None.


Social Media Addiction Among Nursing Students And Its Related Factors, Akgün Yeşiltepe, Bedriye Cansu Demirkiran, Sevgi Demir Çam Apr 2023

Social Media Addiction Among Nursing Students And Its Related Factors, Akgün Yeşiltepe, Bedriye Cansu Demirkiran, Sevgi Demir Çam

Makara Journal of Health Research

Background: Social media use has become an indispensable part of our lives as a result of technology advancement and is quite high among students.

Methods: This study employed a cross-sectional design. Participants were 289 students from the Faculty of Health Sciences at Artvin Coruh University, Turkey. The Social Media Addiction Scale (SMAS) was used to obtain data. T-test, one-way ANOVA, Pearson’s correlation, and Bonferroni analysis were used to analyze the data.

Results: The participants’ mean SMAS score was 81.03 ± 34.79, which was moderate. A weak and positive correlation was found between social media addiction and daily …


Understanding Aggression In Digital Environment: Relationship Between Shame And Guilt And Cyber Aggression In Online Social Network, Indro Adinugroho, Priska Kristiani, Nani Nurrachman Sep 2022

Understanding Aggression In Digital Environment: Relationship Between Shame And Guilt And Cyber Aggression In Online Social Network, Indro Adinugroho, Priska Kristiani, Nani Nurrachman

Makara Human Behavior Studies in Asia

Violence on the internet often occurs in Indonesia due to several aspects, such as political reason and entertainment purpose. It has emerged due to the rapid digital movement, which produces numerous digital applications that can widen the connection among humans from various backgrounds. Sometimes, different values and perceptions are the factors that incinerate violence on the internet, particularly verbal violence. In this study, we apply the term cyber aggression (CA), a form of structured and unstructured behavior to harm others online, to explain this phenomenon. The emergence of this new-kind of behavior must be addressed by the government and other …


Tiktok, Cfius, And The Splinternet, Jake T. Seiler May 2022

Tiktok, Cfius, And The Splinternet, Jake T. Seiler

University of Miami International and Comparative Law Review

This note will discuss the role that the Committee on Foreign Investment in the United States (“CFIUS” or “the Committee”) has played in foreign relations and how it contributes to the balkanization of the internet today. The Committee is an interagency body that reviews foreign investments for potential national security threats. Recently, CFIUS has been in the spotlight for its role in the sale of TikTok, a cellphone app owned by a popular Chinese corporation, ByteDance. While much of CFIUS’ review in the past has been focused on Chinese-owned corporations, there is much debate about whether or not countries should …


Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos Mar 2022

Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos

International Journal of Cybersecurity Intelligence & Cybercrime

The proliferation of internet technologies has shaped interactions in contemporary society. Despite the pivotal importance of the internet to the global economy, it has several negative consequences such as internet fraud. This study examined the perception that young adults in Nigeria hold about internet fraud as an innovative means to economic survival rather than as a criminal enterprise. Robert Merton’s Anomie/Strain Theory (AST) was adopted as the theoretical thrust of the study. Adopting a qualitative data collection method, 15 participants were selected using the non-probabilistic purposive and snowballing techniques while opinions were sampled through in-depth interviews in different locations within …


On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek Jan 2022

On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek

Seattle Journal of Technology, Environmental, & Innovation Law

The Internet of Things has experienced exponential growth and use across the globe with 25.1 billion devices currently in use. Until recently, the functionality of the IoT was dependent on secure data flow between internet terrestrial stations and the IoT devices. Now, a new alternative path of data flow is on the horizon.

IoT device manufacturers are now looking to outer space nanosatellite constellations to connect to a different type of internet. This new internet is no longer terrestrial with fiber cables six feet underground but now looking up, literally, 200 to 300 miles above the earth, to communicate, connect …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Online Content Policy: What Legislative Proposals Aiming To Rein In “Big Tech” Need To Grapple With, Shoshana Weissmann Jan 2022

Online Content Policy: What Legislative Proposals Aiming To Rein In “Big Tech” Need To Grapple With, Shoshana Weissmann

Western New England Law Review

There are endless proposals in Congress aimed at fixing the problems with “Big Tech.” Introduced over the last four years, each one hopes to solve problems such as the spread of misinformation online, the spread of unlawful content online, or even the removal of constitutionally protected speech from internet platforms.

Unfortunately, these various pieces of legislation that hope to regulate social media regularly fail to grapple with all kinds of problems, such as First Amendment barriers to action. Further, they fail to recognize that social media is not the cause of many of the problems that legislators seek to solve. …


"Malicious Deepfakes" - How California's A.B. 730 Tries (And Fails) To Address The Internet's Burgeoning Political Crisis, Alexandra Tashman Dec 2021

"Malicious Deepfakes" - How California's A.B. 730 Tries (And Fails) To Address The Internet's Burgeoning Political Crisis, Alexandra Tashman

Loyola of Los Angeles Law Review

No abstract provided.


The Dangers Of Doxing And Swatting: Why Texas Should Criminalize These Malicious Forms Of Cyberharassment, Hannah Mery Oct 2021

The Dangers Of Doxing And Swatting: Why Texas Should Criminalize These Malicious Forms Of Cyberharassment, Hannah Mery

St. Mary's Law Journal

Abstract forthcoming.


Innovative Processes In The Microfinance System, N.I. Sultanova Jun 2021

Innovative Processes In The Microfinance System, N.I. Sultanova

Economics and Innovative Technologies

This article examines the role of innovation in microfinance institutions, in particular the role of digital systems in banking and non-bank microfinance institutions in Uzbekistan. It also analyzes the "digital banks" established in the country, their legal framework, the possibility of using innovations in the activities of microfinance institutions in the country, including digital systems.


The Challenges Of Identifying Dangers Online And Predictors Of Victimization, Catherine D. Marcum Apr 2021

The Challenges Of Identifying Dangers Online And Predictors Of Victimization, Catherine D. Marcum

International Journal of Cybersecurity Intelligence & Cybercrime

This short paper will provide an overview of the impressive pieces included in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. This issue includes articles on the following pertinent topic, utilizing a range of approaches and methodologies: 1) online credibility; 2) cyberbullying; and 3) unauthorized access of information. An emphasis on the importance of policy development and better protection of potential victims is a common thread throughout the issue.


Introducing Catholics & Cultures: Ethnography, Encyclopedia, Cyborg, Mathew N. Schmalz Mar 2021

Introducing Catholics & Cultures: Ethnography, Encyclopedia, Cyborg, Mathew N. Schmalz

Journal of Global Catholicism

In introducing the Catholics & Cultures site and the articles in this special issue, this essay initially locates the overall Catholic & Cultures project within the traditions of ethnography and encyclopedia. Drawing extensively on the work of J. Z. Smith, this essay reflects upon the theoretical implications of emphasizing the diversity of Catholicism in and through a web-based platform that facilitates comparative study and pedagogy. This essay then more specifically considers the web-based aspects of Catholics & Cultures by identifying a nascent cyborgian aesthetic in the site and considering how the site might eventually engage post-modern themes and concerns.


Protection Of Criminal Offences To Face New Ethical Legislation In Jordan And United Arab Emirates Mar 2021

Protection Of Criminal Offences To Face New Ethical Legislation In Jordan And United Arab Emirates

UAEU Law Journal

It is said that 'honor' is the most precious of all things to human, and that without it the life itself becomes undignified especially for societies who give too much of a weight to this matter such as the Islamic Arabian societies.

The world has recently witnessed massive changes in the way of life that has produced a variety of new crimes and criminal techniques which gravely scratches the person's honor. These had specific adverse consequences on the Arabic societies, since this part of the world has become easily connected to the rest of the liberal countries within the concept …


The "Sovereignty" Of The State In Cyberspace, Mustafa Naouse Mar 2021

The "Sovereignty" Of The State In Cyberspace, Mustafa Naouse

UAEU Law Journal

The principle of "Sovereignty" is no longer limited to the political dimensions as was the case in the last two centuries. A new technological dimension has been added to the already established original meaning. This is obvious through the states efforts to control their own distinctive domain names on the Internet. These names are assigned by ICANN[1]. It is a US (California) based international non-profit organization that controls distributing domain names on the Internet and the internet management processes. It can authorize entities to control their own domain names. It can even reassign or cancel the names of …


Internet Law, Taleb Hassan Musa, Omar Mahmoud Aamer Feb 2021

Internet Law, Taleb Hassan Musa, Omar Mahmoud Aamer

UAEU Law Journal

This paper aims to illustrate the basis of cyberspace law and its potential environment. Indeed, the laws governing the cyberspace are still premature at both national and international levels. This is due to the undefined nature of cyber borders that globalize the Internet in contradiction with the geographic borders. Hence, individual countries are losing part of their sovereignty as result of globalization of the internet to a point it is becoming a borderless space with no laws and regulations. This urges to agree on new international legislations to handle any acts that are not confined by geographical borders or any …


Exposure To Pornography Among Young Eritreans: An Exploratory Study, Fikresus Amahazion Feb 2021

Exposure To Pornography Among Young Eritreans: An Exploratory Study, Fikresus Amahazion

Journal of International Women's Studies

The pornography industry is a multibillion-dollar global industry, and it has been normalized in many aspects of popular culture. Pornography use and exposure are increasingly becoming common and widespread, particularly with the rapid growth and spread of the Internet, smartphones, and social media. In many countries around the world, pornography is widely available, easily accessible, and consumed by large segments of the general population. While many studies have been conducted on the use and impacts of pornography, exploring the topic within various contexts around the world, empirical studies from developing countries, particularly in Africa, are sparse. The present study is …


Optimalisasi Peran Internet Dalam Mewujudkan Digital Citizenship Dan Implikasinya Terhadap Ketahanan Pribadi Siswa, Armaidy Armawi, Darto Wahidin Dec 2020

Optimalisasi Peran Internet Dalam Mewujudkan Digital Citizenship Dan Implikasinya Terhadap Ketahanan Pribadi Siswa, Armaidy Armawi, Darto Wahidin

Jurnal Civics: Media Kajian Kewarganegaraan

Individu usia sekolah merupakan salah satu pengakses internet dengan menggunakan media sosial paling aktif. Akses internet menjadi sangat yang rawan, mengingat penggunaannya di dominasi oleh kalangan usia sekolah. Beredarnya isu hoax, fitnah, bahkan menghujat melalui media sosial yang dengan mudahnya di akses melalui internet, menunjukkan belum dewasanya dalam penggunaan internet. Tujuan dalam penelitian ini mengetahui proses optimalisasi peran internet dalam mewujudkan digital citizenship di Kota Semarang dan mengkaji implikasi dari optimalisasi peran internet terhadap ketahanan pribadi siswa di Kota Semarang. Penelitian ini menggunakan pendekatan kualitatif. Temuan penelitian menunjukkan bahwa proses optimalisasi peran internet dalam mewujudkan digital citizenship di SMA …


Threats To The Digital Economy – Call For The Introduction And Development Of Cyber Insurance, F. Khasanov Dec 2020

Threats To The Digital Economy – Call For The Introduction And Development Of Cyber Insurance, F. Khasanov

International Finance and Accounting

This article discusses the goals and objectives of Uzbekistan in terms of establishing a digital economy. The article contains deep analysis of the variety of threats of the digital economy that may be faced along with its advantages, and negative consequences of those threads are revealed with examples of economic losses. The content and essence of the mechanism of cyber risk insurance is maintained which is gaining popularity in the world today as an effective way to ensure cyber security. In terms of changing Uzbekistan's economy into digital, specific proposals have been developed for the widespread introduction and development of …


Any Safe Harbor In A Storm: Sesta-Fosta And The Future Of § 230 Of The Communications Decency Act, Charles Matula May 2020

Any Safe Harbor In A Storm: Sesta-Fosta And The Future Of § 230 Of The Communications Decency Act, Charles Matula

Duke Law & Technology Review

No abstract provided.


Library Application Of Deep Web And Dark Web Technologies, Mollie L. Coffey May 2020

Library Application Of Deep Web And Dark Web Technologies, Mollie L. Coffey

School of Information Student Research Journal

The Deep Web and Dark Web are legitimate tools for use in the field of information science, adding to the discussion of patron privacy. The American Library Association policies on privacy and confidentiality combined with the advancement of internet technology necessitate that library professionals become fluent in Dark Web usability in libraries.