Digital Addictive Technologies and State Security
نویسندگان
چکیده
Purpose: The study aimed to identify the phenomenon of dependence on available digital technology devices, which may pose a potential threat state security and adversely affect health society. Design/Methodology/Approach: A literature analysis own statistical research were used as method problem technology, reasons for its creation, impact this security. Findings: It was found that every person in group uses Internet day. most numerous are people who spend about 3 hours, including using network phone. minimum use is 1 hour (about 10% respondents), maximum 24 hours. This indicates an emerging addiction, thus risk implementing content affecting state's Practical implications: should raise concerns addicts consume undesirable indicate need regulatory changes. Research has shown further searches estimate possible losses risks resulting from unlimited access affects Originality/Value: survey original; so far, it not been conducted form; provides knowledge addiction electronic technologies consequences.
منابع مشابه
Ekiti State Social Security Scheme (ESSSS) and its Effect on Food Security in Ekiti State, Nigeria
This study was carried out to evaluate the Ekiti State Social Security Scheme (ESSSS) in Nigeria. Specifically, the study estimated the food security status of the beneficiaries and non beneficiaries of the scheme, assessed the effect of the social security scheme on households’ food security status, and identified the constraints to the implementation of the scheme in the state. A three stage ...
متن کاملSpecial Issue on Enabling Security Technologies for Digital Rights Management
Modern advancements in communication infrastructure, signal processing, and digital storage technologies have enabled pervasive digital media distribution. Digital distribution allows the introduction of flexible, cost-effective business models that are advantageous to multimedia commerce transactions. The digital nature of the information also enables individuals to manipulate, duplicate, or a...
متن کاملEmerging Security Technologies and Applications
Due to the quick increase in number of mobile, ubiquitous, cloud, network and communication applications and studies, many computer and communication systems, wired or wireless, have been released to service their customers (human users or other systems). However, hackers everywhere around the world may attack these systems for some reasons, e.g., stealing one company’s business secrets for ano...
متن کاملDigital Technologies and Disease Prevention.
In the last 3 decades or so, digital technologies have penetrated into a vast array of human activities; smartphones, computers, Internet, social media, and the rest have not only reached into many domains of everyday life but also spread globally and very rapidly— at a speed that technologies from previous eras had not done. In this special themed issue of the American Journal of Preventive Me...
متن کاملARCE Core Security Technologies
the next big one to surface. With the overwhelming amount of bug reports and security threats made public every day, it is daunting and difficult to identify trends and have a reasonable expectation of adopting a proac-tive information security strategy that deals with possible future threats. The Attack Trends department attempts to examine security bugs and exploitation programs and technique...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: European Research Studies Journal
سال: 2021
ISSN: ['1108-2976']
DOI: https://doi.org/10.35808/ersj/2346