use E-Safety in the Use of Social Networking Apps by Children, Adolescents, and Young Adults By Published On :: 2018-12-16 Aim/Purpose: Following the widespread use of social networking applications (SNAs) by children, adolescents, and young adults, this paper sought to examine the usage habits, sharing, and dangers involved from the perspective of the children, adolescents, and young adults. The research question was: What are the usage habits, sharing, drawbacks, and dangers of using SNAs from the perspective of children, adolescents, and young adults? Background: Safety has become a major issue and relates to a range of activities including online privacy, cyberbullying, exposure to violent content, exposure to content that foments exclusion and hatred, contact with strangers online, and coarse language. The present study examined the use of social networking applications (SNAs) by children, adolescents, and young adults, from their point of view. Methodology: This is a mixed-method study; 551participants from Israel completed questionnaires, and 110 respondents were also interviewed. Contribution: The study sought to examine from their point of view (a) characteristics of SNA usage; (b) the e-safety of SNA; (c) gender differences between age groups; (d) habits of use; (e) hazards and solutions; and (f) sharing with parents and parental control. Findings: Most respondents stated that cyberbullying (such as shaming) happens mainly between members of the group and it is not carried out by strangers. The study found that children’s awareness of the connection between failures of communication in the SNAs and quarrels and disputes was lower than that of adolescents and young adults. It was found that more children than adolescents and young adults believe that monitoring and external control can prevent the dangers inherent in SNAs, and that the awareness of personal responsibility increases with age. The SNAs have intensified the phenomenon of shaming, but the phenomenon is accurately documented in SNAs, unlike in face-to-face communication. Therefore, today more than ever, it is possible and necessary to deal with shaming, both in face-to-face and in SNA communication. Recommendations for Practitioners: Efforts should be made to resolve the issue of shaming among members of the group and to explain the importance of preserving human dignity and privacy. The Internet in general and SNAs in particular are an integral part of children’s and adolescents’ life environment, so it can be said that the SNAs are part of the problem because they augment shaming. But they can also be part of the solution, because interactions are accurately documented, unlike in face-to-face communication, where it is more difficult to examine events, to remember exactly what has been said, to point out cause and effect, etc. Therefore, more than ever before, today it is possible and necessary to deal with shaming both in face-to-face and in the SNA communication, because from the point of view of youngsters, this is their natural environment, which includes smart phones, SNAs, etc. Recommendations for Researchers: The study recommends incorporating in future studies individual case studies and allowing participants to express how they perceive complex e-Safety situa-tions in the use of social networking apps. Impact on Society: Today more than ever, it is possible and necessary to deal with shaming, both in face-to-face and in SNA communication. Future Research: The study was unable to find significant differences between age groups. Fur-ther research may shed light on the subject. Full Article
use Performance Expectancy, Effort Expectancy, and Facilitating Conditions as Factors Influencing Smart Phones Use for Mobile Learning by Postgraduate Students of the University of Ibadan, Nigeria By Published On :: 2018-07-05 Aim/Purpose: This study examines the influence of Performance Expectancy (PE), Effort Expectancy (EE), and Facilitating Conditions (FC) on the use of smart phones for mobile learning by postgraduate students in University of Ibadan, Nigeria. Background: Due to the low level of mobile learning adoption by students in Nigeria, three base constructs of the Unified Theory of Acceptance and Use of Technology (UTAUT) model were used as factors to determine smart phone use for mobile learning by the postgraduate students in the University of Ibadan. Methodology: The study adopted a descriptive survey research design of the correlational type, the two-stage random sampling technique was used to select a sample size of 217 respondents, and a questionnaire was used to collect data. Descriptive statistics (frequency counts, percentages, mean, and standard deviation), test of norm, and inferential statistics (correlation and regression analysis) were used to analyze the data collected. Contribution: The study empirically validated the UTAUT model as a model useful in predicting smart phone use for mobile learning by postgraduate students in developing countries. Findings: The study revealed that a significant number of postgraduate students used their smart phones for mobile learning on a weekly basis. Findings also revealed a moderate level of Performance Expectancy (???? =16.97), Effort Expectancy (???? =12.57) and Facilitating Conditions (???? =15.39) towards the use of smart phones for mobile learning. Results showed a significant positive relationship between all the independent variables and use of smart phones for mobile learning (PE, r=.527*; EE, r=.724*; and FCs, r=.514*). Out of the independent variables, PE was the strongest predictor of smart phone use for mobile learning (β =.189). Recommendations for Practitioners: Librarians in the university library should organize periodic workshops for postgraduate students in order to expose them to the various ways of using their smart phones to access electronic databases. Recommendation for Researchers: There is a need for extensive studies on the factors influencing mobile technologies adoption and use in learning in developing countries. Impact on Society: Nowadays, mobile learning is increasingly being adopted over conventional learning systems due to its numerous benefits. Thus, this study provides an insight into the issues influencing the use of smart phones for mobile learning by postgraduate students from developing countries. Future Research: This study utilized the base constructs of the UTAUT model to determine smart phone use for mobile learning by postgraduate students in a Nigerian university. Subsequent research should focus on other theories to ascertain factors influencing Information Technology adoption and usage by students in developing countries. Full Article
use Conceptions of an Information System and Their Use in Teaching about IS By Published On :: Full Article
use A Framework for Effective User Interface Design for Web-Based Electronic Commerce Applications By Published On :: Full Article
use Salvaging Information Engineering Techniques in the Data Warehouse Environment By Published On :: Full Article
use Five Roles of an Information System: A Social Constructionist Approach to Analysing the Use of ERP Systems By Published On :: Full Article
use Use-Cases and Personas: A Case Study in Light-Weight User Interaction Design for Small Development Projects By Published On :: Full Article
use The Value of User Participation in E-Commerce Systems Development By Published On :: Full Article
use Informing Systems in Business Environments: A Purpose-Focused View By Published On :: Full Article
use A Double Helix Metaphor for Use and Usefulness in Informing Systems By Published On :: Full Article
use On Categorizing the IS Research Literature: User Oriented Perspective By Published On :: Full Article
use The Culture of Information Systems in Knowledge-Creating Contexts: The Role of User-Centred Design By Published On :: Full Article
use Co-evolution and Contradiction: A Diamond Model of Designer-User Interaction By Published On :: Full Article
use Double Helix Relationships in Use and Design of Informing Systems: Lessons to Learn from Phenomenology and Hermeneutics By Published On :: Full Article
use Senior Citizens and E-commerce Websites: The Role of Perceived Usefulness, Perceived Ease of Use, and Web Site Usability By Published On :: Full Article
use Measuring IS System Service Quality with SERVQUAL: Users' Perceptions of Relative Importance of the Five SERVPERF Dimensions By Published On :: Full Article
use A Model for Mandatory Use of Software Technologies: An Integrative Approach by Applying Multiple Levels of Abstraction of Informing Science By Published On :: Full Article
use When What is Useful is Not Necessarily True: The Underappreciated Conceptual Scheme By Published On :: Full Article
use The Social Network Application Post-Adoptive Use Model (SNAPUM): A Model Examining Social Capital and Other Critical Factors Affecting the Post-Adoptive Use of Facebook By Published On :: Full Article
use User Perceptions of Aesthetic Visual Design Variables within the Informing Environment: A Web-Based Experiment By Published On :: Full Article
use Decision Confidence, Information Usefulness, and Information Seeking Intention in the Presence of Disconfirming Information By Published On :: Full Article
use Social Networks in which Users are not Small Circles By Published On :: 2015-06-16 Understanding of social network structure and user behavior has important implications for site design, applications (e.g., ad placement policies), accurate modeling for social studies, and design of next-generation infrastructure and content distribution systems. Currently, characterizations of social networks have been dominated by topological studies in which graph representations are analyzed in terms of connectivity using techniques such as degree distribution, diameter, average degree, clustering coefficient, average path length, and cycles. The problem is that these parameters are not completely satisfactory in the sense that they cannot account for individual events and have only limited use, since one can produce a set of synthetic graphs that have the exact same metrics or statistics but exhibit fundamentally different connectivity structures. In such an approach, a node drawn as a small circle represents an individual. A small circle reflects a black box model in which the interior of the node is blocked from view. This paper focuses on the node level by considering the structural interiority of a node to provide a more fine-grained understanding of social networks. Node interiors are modeled by use of six generic stages: creation, release, transfer, arrival, acceptance, and processing of the artifacts that flow among and within nodes. The resulting description portrays nodes as comprising mostly creators (e.g., of data), receivers/senders (e.g., bus boys), and processors (re-formatters). Two sample online social networks are analyzed according to these features of nodes. This examination points to the viability of the representational method for characterization of social networks. Full Article
use Influence of Information Product Quality on Informing Users: A Web Portal Context By Published On :: 2016-11-03 Web portals have been used as information products to deliver personalized, feature-rich, and flexible information needs to Internet users. However, all portals are not equal. Most of them have relatively a small number of visitors, while a few capture the majority of surfers. This study seeks to uncover the factors that contribute the perceived quality of a general portal. Based on 21 factors derived from an extensive literature review on Information Product Quality (IPQ), web usage, and media use, an experimental study was conducted to identify the factors that are perceived by web portal users as most relevant. The literature categorizes quality factors of an information product in three dimensions: information, physical, and service. This experiment suggests a different clustering of factors: Content relevancy, Communication interactiveness, Information currency, and Instant gratification. The findings in this study will help developers find a more customer-oriented approach to developing high-traffic portals. Full Article
use Predicting the Use of Twitter in Developing Countries: Integrating Innovation Attributes, Uses and Gratifications, and Trust Approaches By Published On :: 2016-08-02 Based on the diffusion of innovation (DOI) theory (Rogers, 2003), the uses and gratifications (U&G) theory, and trust theory, this study investigated the factors that influence the use of Twitter among the Kuwaiti community. The study surveyed Twitter users in Kuwait. A structured online questionnaire was used to collect data, and 463 respondents who provided complete answers participated. Multiple regression analysis was used to examine the effect of three theoretical perspectives on Twitter usage. The result of the analysis showed that Twitter usage is better explained by DOI constructs than by U&G constructs. The findings indicated that the perceived relative advantage from DOI, and the need for information, need to pass time, and need for interpersonal utility from the U&G approach, have a direct positive significant effect on the use of Twitter. None of the trust theory constructs was found to be significant in predicting the general use of Twitter. The study results help Twitter providers and users in individual or organizational contexts to understand what factors generally affect the usage of the Twitter service. Full Article
use Genetic-linked Inattentiveness Protects Individuals from Internet Overuse: A Genetic Study of Internet Overuse Evaluating Hypotheses Based on Addiction, Inattention, Novelty-seeking and Harm-avoidance By Published On :: 2016-06-17 The all-pervasive Internet has created serious problems, such as Internet overuse, which has triggered considerable debate over its relationship with addiction. To further explore its genetic susceptibilities and alternative explanations for Internet overuse, we proposed and evaluated four hypotheses, each based on existing knowledge of the biological bases of addiction, inattention, novelty-seeking, and harm-avoidance. Four genetic loci including DRD4 VNTR, DRD2 Taq1A, COMT Val158Met and 5-HTTLPR length polymorphisms were screened from seventy-three individuals. Our results showed that the DRD4 4R/4R individuals scored significantly higher than the 2R or 7R carriers in Internet Addiction Test (IAT). The 5-HTTLPR short/short males scored significantly higher in IAT than the long variant carriers. Bayesian analysis showed the most compatible hypothesis with the observed genetic results was based on attention (69.8%), whereas hypotheses based harm-avoidance (21.6%), novelty-seeking (7.8%) and addiction (0.9%) received little support. Our study suggests that carriers of alleles (DRD4 2R and 7R, 5-HTTLPR long) associated with inattentiveness are more likely to experience disrupted patterns and reduced durations of Internet use, protecting them from Internet overuse. Furthermore, our study suggests that Internet overuse should be categorized differently from addiction due to the lack of shared genetic contributions. Full Article
use Effectiveness of Agile Implementation Methods in Business Intelligence Projects from an End-user Perspective By Published On :: 2016-06-07 The global Business Intelligence (BI) market grew by 10% in 2013 according to the Gartner Report. Today organizations require better use of data and analytics to support their business decisions. Internet power and business trend changes have provided a broad term for data analytics – Big Data. To be able to handle it and leverage a value of having access to Big Data, organizations have no other choice than to get proper systems implemented and working. However traditional methods are not efficient for changing business needs. The long time between project start and go-live causes a gap between initial solution blueprint and actual user requirements in the end of the project. This article presents the latest market trends in BI systems implementation by comparing Agile with traditional methods. It presents a case study provided in a large telecommunications company (20K employees) and the results of a pilot research provided in the three large companies: telecommunications, digital, and insurance. Both studies prove that Agile methods might be more effective in BI projects from an end-user perspective and give first results and added value in a much shorter time compared to a traditional approach. Full Article
use Acceptance of ERP Systems: The Uses and Gratifications Theory Perspective By Published On :: 2017-12-27 Aim/Purpose: This study aims to provide a better understanding of individual acceptance of enterprise resource (ERP) systems. Based on the uses and gratifications theory (UGT) and informing science theory, the study developed and empirically tested a research model to explain the effects of ERP characteristics (specifically, informativeness and enjoyment) on ERP acceptance and use. Background: Individual acceptance of ERP systems is crucial for achieving the benefits associated with ERP systems. Unfortunately, little research has focused on acceptance of ERP systems at the individual level. This study attempts to fill this void. Methodology: A survey questionnaire was distributed to ERP users to collect data to empiri-cally test the research model developed in this study. In addition to demographic and background information question, the survey contained instruments to measure the study variables. Contribution: The empirical results show that UGT provides a sound theoretical framework for explaining users’ gratifications, attitudes, and behavioral intentions toward adopting and using an ERP. These results support the view that subsumes information systems and other fields that endeavor to inform their audience. Findings: Individuals’ perceptions of the informativeness and entertainment of ERP systems demonstrated strong direct effects on attitude toward using and satisfaction with ERP systems. In turn, satisfaction with ERP systems showed a direct significant impact on intention to use an ERP system. Recommendations for Practitioners: Maintaining a favorable environment and designing training workshops that highlight the information and enjoyment aspects of an ERP can boost users’ perceptions of ERP informativeness and enjoyment and, eventually, improve their attitude and satisfaction with an ERP. Recommendation for Researchers: Researchers should test the proposed research model with other types of ERP systems and in different environments to enhance the generalizability of the results to other systems and settings. Impact on Society: The results of is study can be used as a foundation on which to develop plans and design strategies to enhance individual acceptance of ERP systems and realize the benefits associated with these systems. Future Research: Future research should extend the research model by integrating other personal and technology variables to provide further insights into what influences individuals to accept or reject an ERP system. Full Article
use Cognition to Collaboration: User-Centric Approach and Information Behaviour Theories/Models By Published On :: 2016-12-07 Aim/Purpose: The objective of this paper is to review the vast literature of user-centric in-formation science and inform about the emerging themes in information behaviour science. Background: The paradigmatic shift from system-centric to user-centric approach facilitates research on the cognitive and individual information processing. Various information behaviour theories/models emerged. Methodology: Recent information behaviour theories and models are presented. Features, strengths and weaknesses of the models are discussed through the analysis of the information behaviour literature. Contribution: This paper sheds light onto the weaknesses in earlier information behaviour models and stresses (and advocates) the need for research on social information behaviour. Findings: Prominent information behaviour models deal with individual information behaviour. People live in a social world and sort out most of their daily or work problems in groups. However, only seven papers discuss social information behaviour (Scopus search). Recommendations for Practitioners : ICT tools used for inter-organisational sharing should be redesigned for effective information-sharing during disaster/emergency times. Recommendation for Researchers: There are scarce sources on social side of the information behaviour, however, most of the work tasks are carried out in groups/teams. Impact on Society: In dynamic work contexts like disaster management and health care settings, collaborative information-sharing may result in decreasing the losses. Future Research: A fieldwork will be conducted in disaster management context investigating the inter-organisational information-sharing. Full Article
use Ladies First: The Influence of Mobile Dating Applications on the Psychological Empowerment of Female Users By Published On :: 2018-11-23 Aim/Purpose: This study was undertaken to shed light on how the use of a heteronormative mobile dating application creates an environment to promote psychological empowerment among female users within the online dating scene. The study focused on a mobile dating application which specifically challenges traditional gender roles, namely Bumble. Background: Mobile dating applications have become an increasingly popular medium for people to meet potential partners. However, users’ pre-existing social norms and biases inform how they communicate on these platforms, and stereotyped judgment about women perpetuates ideologies which continue to oppress them within the cyber world. Despite this, very little research has investigated the experiences of female users of mobile dating applications. Methodology: The study was qualitative in nature, and 10 semi-structured interviews of female Bumble users were conducted. The data were analyzed using thematic analysis. Contribution: The study contributes to knowledge by highlighting how key features of mobile dating applications influence various aspects of psychological empowerment as articulated in the findings. Findings: The findings show that the Bumble application supports Intrapersonal variables of Psychological Empowerment of female users relative to Domain Specific Perceived Control and Self-Efficacy, Motivation to Control and Perceived Competence. However, Domain Specific Perceived Control can also be negatively impacted due to self-doubt when female users receive little to no matches. Interactional variables of psychological empowerment are also supported, as Bumble allows female users to be critically aware of the need to screen potential partners, understand relevant causal agents, develop skills relative to initiating conversations and mobilize resources. However, Bumble is not effective in supporting behavioral variables of psychological empowerment because of limitations in the tool’s functionality and the behavior of the people interacting on the platform. Recommendations for Practitioners: The findings are important as they suggest the need to enhance the features available to female users in order to better suit their needs and desire to take control of their lives in the context of dating and/or friendship. Recommendation for Researchers: The findings reveal the need for a change of perceptions and attitudes on the part of some users to create a safer and more considerate virtual dating space, to truly achieve psychological empowerment. Future Research: More research is required on how male and female users domesticate mobile dating applications and how the use of these applications influence their daily lives from a socio-cultural point of view. Full Article
use Informed Change: Exploring the Use of Persuasive Communication of Indigenous Cultures Through Film Narratives By Published On :: 2020-09-25 Aim/Purpose: There is a need to find a way to utilize narrative storytelling in film to make students more aware of the impacts of global problems and how they are perceived. Background: Two films from the year 2015 from two very different places in the world explore the encroachment and secondary effects of urban civilization upon indigenous cultures. Methodology: An interpretive, qualitative, methodology was used in addressing and discussing the use of these two films as a persuasive communication teaching aid. Contribution: This paper offers an approach to using narratives of films on indigenous issues in education to inform students about real-world issues and the wide impacts of those on various cultures and populations. Findings: Through the discussion of the two films, we suggest that using films with indigenous themes is beneficial to a course curriculum in a variety of subjects from communication to history and politics, to help students visualize the problems at hand. Anecdotally, the authors note that students are more engaged and willing to discuss topics if they have watched films or clips that deal with those topics than if they have simply read about them. Recommendation for Researchers: Technology and use of visuals are used as teaching tools in a variety of fields. Film narratives can be used as a teaching tool in multiple fields and provide insight about a variety of ideas. Identifying films such as those with indigenous themes provides an example of how one film can bring up multiple, real-world, topics and through led discussion student reflection can potentially lead to self-insights and have lasting impacts. Future Research: Additional research and assessment can be done on the impact of teaching with films and their compelling story telling of issues, and what types of questions should be asked to maximize learning and the impact of film narratives. Full Article
use The Good, the Bad, and the Neutral: Twitter Users’ Opinion on the ASUU Strike By Published On :: 2022-11-05 Aim/Purpose: Nigeria’s university education goes through incessant strikes by the Academic Staff Union of Universities (ASUU). This strike has led to shared emotion on micro-blogging sites like Twitter. This study analyzed selected historical tweets from the “ASUU” to understand citizens’ opinions. Background: The researchers conducted sentiment analysis and topic modelling to understand Twitter users’ opinions on the strike. Methodology: The researchers used the Valence Aware Dictionary for Sentiment Reasoning (VADER) technique for sentiment analysis, and the Latent Dirichlet allocation (LDA) was used for topic modelling. A total of 10,000 tweets were first extracted for the study. After data cleaning, 1323 tweets were left. Contribution: To the researcher’s best knowledge, no published study has presented a sentiment analysis on the topic of the ASUU strike using the Twitter dataset. This research will fill this gap by providing a sentiment analysis and drawing out subjects by exploring the tweets on the phrase “ASUU.” Findings: The sentiment analysis result using VADER returned 567 tweets as ‘Negative,’ with the remaining 544 and 212 categorized as Positive and Neutral. The result of the LDA returned six topics, all comprising seven keywords. The topics were the solution to the strike, ASUU strike effect, strike Call-off, appeal to ASUU, student protest and student appeal. Recommendation for Researchers: Researchers can use this study’s findings to compare with other contexts of opinion mining. Practitioners may also use the research to understand better the attitudes of their staff and students about the strikes to create actionable solutions before the suspension of the strike. Future Research: Future studies can collect information from other social networking and blogging sites. Full Article
use Real Danger or Urgent Necessity? Young Ghanaian’s Perspectives on Smartphone Use in Relation to Academic Success By Published On :: 2023-10-10 Aim/Purpose: In this article, the subjective perspectives of young people in Ghana on the use of digital media are elaborated. The aim is to make the positions of young people visible in the often adult-dominated discourse on digital media and to overcome adult-centered considerations in academic and public debates. In addition, the focus on young people from the Global South is intended to help make their underrepresented voices present in this discourse. Background: Digital media devices and Internet access are conditional on people’s social, economic, and educational participation. Many people in the Global South in particular are not yet granted such access. For children and young people worldwide, the educational opportunities offered by digital media are associated with potential threats to mental health and well-being. However, young people’s views on digital media are rarely addressed, especially in the Global South. Methodology: Based on a qualitative thematic analysis of responses to open-ended questionnaire questions, young Ghanaians’ views on smartphone use and how it affects academic success are examined. Contribution: By focusing on the subjective perspectives of young people, especially from the Global South, voices that have hardly been heard in the discourse on digital media are made audible. This should help overcome the dominant adult-centered perspectives in this discourse. Findings: For young people in Ghana, digital media are part of their everyday lives and often necessary to succeed at school. At the same time, they are concerned about the dangers, e.g., from overuse or cybercrime, for which they have few strategies to deal with. In their answers, they refer to socio-culturally specific discourses and values as well as to generational hierarchies that they perceive and deal with, which go far beyond the topic of digital media use. This makes clear the social tensions in which the debate about digitalization is embedded. Recommendation for Researchers: Young people’s knowledge of and perspectives on digital media is an important resource for learning to use them in an emancipated way. Future Research: Future research should recognize young people as experts in their own right on the issue, explore ways to include their perspectives in the discourse on digital media use and work with them to harness the future potential of the technology and avoid risks. Full Article
use Analysis of Machine-Based Learning Algorithm Used in Named Entity Recognition By Published On :: 2023-03-12 Aim/Purpose: The amount of information published has increased dramatically due to the information explosion. The issue of managing information as it expands at this rate lies in the development of information extraction technology that can turn unstructured data into organized data that is understandable and controllable by computers Background: The primary goal of named entity recognition (NER) is to extract named entities from amorphous materials and place them in pre-defined semantic classes. Methodology: In our work, we analyze various machine learning algorithms and implement K-NN which has been widely used in machine learning and remains one of the most popular methods to classify data. Contribution: To the researchers’ best knowledge, no published study has presented Named entity recognition for the Kikuyu language using a machine learning algorithm. This research will fill this gap by recognizing entities in the Kikuyu language. Findings: An evaluation was done by testing precision, recall, and F-measure. The experiment results demonstrate that using K-NN is effective in classification performance. Recommendation for Researchers: With enough training data, researchers could perform an experiment and check the learning curve with accuracy that compares to state of art NER. Future Research: Future studies may be done using unsupervised and semi-supervised learning algorithms for other resource-scarce languages. Full Article
use Informing Academia Through Understanding of the Technology Use, Information Gathering Behaviors, and Social Concerns of Gen Z By Published On :: 2024-11-11 Aim/Purpose: The aim of this paper is to examine Gen Z students located in a representative region of the United States when it comes to technology use, news and information gathering behaviors, civic engagement, and social concerns and whether differences exist based on institutional type. The purpose is to report this information so that academics can better understand the behaviors, priorities, and interests of current American students. Background: This paper investigates the mindset of Generation Z students living in the United States during a period of heightened civic unrest. Through the lens of the Theory of Generations, Uses and Gratifications Theory, and Intersectional Theory, this study aims to examine the Gen Z group and compare findings across populations. Methodology: An electronic survey was administered to students from 2019 through 2022. The survey included a combination of multiple responses, Likert scaled, dichotomous, open-ended, and ordinal questions. It was developed in the Survey Monkey system and reviewed by content and methodological experts to examine bias, vagueness, or potential semantic problems. The survey was pilot-tested in 2018 before implementation in order to explore the efficacy of the research methodology. It was then modified accordingly before widespread distribution to potential participants. The surveys were administered to students enrolled in classes taught by the authors, all of whom are educators. Participation was voluntary, optional, and anonymous. Contribution: This paper provides insight into the mindset of Generation Z students living in the United States, which is helpful to members of academia who should be informed about the current generation of students in higher education. Studying Generation Z helps us understand the future and can provide insight into the shifting needs and expectations of society. Findings: According to the findings, Gen Z are heavy users of digital technologies who use social media as their primary source for gathering news about current events as well as information for schoolwork. The majority of respondents considered themselves to be social activists. When institutional type was considered, there were notable differences with the students at the Historically Black College or University (HBCU), noting the greatest concern with a number of pressing issues, including racial justice/Black Lives Matter, women’s rights, gun violence, immigration reform, and human trafficking. Less significance across groups was found when LGBTQIA+ rights and climate change were considered. Recommendation for Researchers: As social media continues to proliferate in daily life and become a vital means of news and information gathering, additional studies such as the one presented here are needed. In other countries facing similarly turbulent times, measuring student interest, awareness, and engagement is highly informative. Future Research: Future research will explore the role that influencers have in opinion formation and the information-gathering habits of Gen Z. Full Article
use Spilling Outside the Box: The Effects of Individuals' Creative Behaviors at Work on Time Spent with their Spouses at Home By amj.aom.org Published On :: Thu, 04 Jun 2015 14:48:41 +0000 Most research on creativity describes it as a net positive: producing new products for the organization and satisfaction and positive affect for creative workers. However, a host of anecdotal and historical evidence suggests that creative work can have deleterious consequences for relationships. This raises the question: how does creativity at work impact relationships at home? Relying on work-family conflict and resource allocation theory as conceptual frameworks, we test a model of creative behaviors during the day at work and the extent to which employees spend time with their spouses at home in the evening, using 685 daily matched responses from 108 worker-spouse pairings. Our results reveal that variance-focused creative behaviors (problem identification, information searching, idea generation) lead to a decline in time spent with spouse at home. In contrast, selection-focused creative behaviors (idea validation) lead to an increase in time spent with spouse. Further, openness to experience moderates these relationships. Overall, the results raise questions about the possible relational costs of creative behaviors at work on life at home. Full Article
use Accused thought about murdering housemate - court By www.bbc.com Published On :: Wed, 13 Nov 2024 13:36:40 GMT Dylan Thomas, 24, admits the manslaughter of William Bush on Christmas Eve but denies murder. Full Article
use Woman Jailed for Murder After Estranged Husband Threatens to Hurt Her Family and Burn Down House By www.ammoland.com Published On :: Fri, 08 Nov 2024 17:45:43 +0000 LaToya claimed self-defense, but Manassas, Virginia Prosecutor D. Burke Walker had other ideas and charged the woman with second-degree murder. Full Article Gun Rights News Gun Rights John Crump Self Defense Virginia
use Oath Keepers Have Never Been What Government & Media Have Accused Them Of By www.ammoland.com Published On :: Sat, 09 Nov 2024 13:54:21 +0000 So, any thought of disobeying them must be destroyed – along with anyone daring to spread the idea that the oath is to the Constitution, not to a regime and its unlawful orders. Full Article Gun Rights News David Codrea
use COVID-19 appropriate disinfectants use educational leaflet By www.pss.org.sg Published On :: Thu, 19 Mar 2020 15:57:28 +0000 Find out more on how to maintain good personal hygiene and keeping our environment clean! Full Article
use Justin Welby resigns as Archbishop of Canterbury over abuse scandal By thesun.my Published On :: Tue, 12 Nov 2024 14:21:52 GMT LONDON: The Archbishop of Canterbury Justin Welby resigned on Tuesday, saying he stepped down “in sorrow” after failing to ensure there was a proper investigation into allegations of abuse by a volunteer at Christian summer camps decades ago.Welby, the spiritual leader of 85 million Anglicans worldwide, had faced calls to resign after a report last week found he had taken insufficient action to stop a person it described as arguably the Church of England’s most prolific serial abuser.“Having sought the gracious permission of His Majesty The King, I have decided to resign as Archbishop of Canterbury,“ Welby said in a statement.“I hope this decision makes clear how seriously the Church of England understands the need for change and our profound commitment to creating a safer church. As I step down I do so in sorrow with all victims and survivors of abuse.” Full Article Reuters
use Selangor police record 387 child abuse cases By thesun.my Published On :: Wed, 13 Nov 2024 09:47:24 GMT SHAH ALAM: A total of 387 cases of child abuse were recorded by the Selangor police from January to October, said state police chief Datuk Hussein Omar Khan.He said that of the total, 139 victims were aged between 0 and 1 year, 96 were between two and five years old, while the and remaining victims were aged up to 18 years.“Childcare providers were the main perpetrators of these crimes, followed by biological parents, teachers and stepparents,“ he said.He made these comments to the press after officiating the second Child Interview Centre (CIC) under the Sexual, Abuse and Child Investigation Division (D11) of the Criminal Investigation Department (CID) at the Selangor police headquarters in Seksyen 11 police station today.Hussein said police investigations found that most child abuse cases were caused by negligence, such as leaving babies or young children alone, which posed risks to the victims and led to neglect.He also noted that there had been a trend of increasing reports of child abuse cases, partly due to growing awareness of violence against children among the public and various organisations.“Some people are now coming forward and bravely making reports, thanks to numerous awareness programmes and initiatives by the Royal Malaysia Police (PDRM) in the community to provide information,“ he said.Regarding the second CIC, Hussein said that RM180,000 had been allocated to refurbish an existing premises at the Seksyen 11 Police Station for this purpose.He said the establishment of the second CIC, which has been operational since March 5, was in response to the increasing number of child-related cases that require interviews each year, with an average of 400 to 500 cases annually.“The establishment of this CIC takes into account the rising number of cases, with 875 children already interviewed this year alone, involving various cases such as abuse, neglect and sexual offences.“Given current needs, we are also planning to expand this service. Both CIC facilities are currently located in Shah Alam, so there is a need to extend them to Kuala Selangor, Sabak Bernam, Hulu Selangor or the southern part of the state,“ he said.Hussein also said that the first CIC, established in 2014 and located in Seksyen 7, serves the police districts (IPD) of South Klang, North Klang, Gombak, Shah Alam, Hulu Selangor, Kuala Selangor, Kajang and KLIA.“The second CIC caters to the IPDs of Petaling Jaya, Subang Jaya, Sabak Bernam, Kuala Langat, Sungai Buloh, Sepang, Serdang and Ampang Jaya,“ he added, noting that the centre conducts interviews with children under the age of 16, as referred by investigating officers from the 16 IPDs. Full Article BERNAMA
use Three suspects involved in house break-in, firearms smuggling shot dead in Penang By thesun.my Published On :: Wed, 13 Nov 2024 09:54:26 GMT GEORGE TOWN: Three local men, active in firearms smuggling, house break-ins, and luxury vehicle thefts that resulted in losses exceeding RM4 million, were shot dead during a shootout at Jalan Changkat-Pulau Burung, Nibong Tebal, earlier today.Penang police chief Datuk Hamzah Ahmad said that at 5.30 am, a team from the Penang Criminal Investigation Department (JSJ) and Seberang Perai Selatan (SPS) district police were conducting a crime prevention operation when they noticed two suspicious vehicles in the area.“The police approached the two vehicles, a Honda Accord and a Perodua Myvi, which were acting suspiciously. Upon identifying themselves as police officers, the suspects suddenly fired several shots at our vehicles.“The police team then returned fire in self-defence, and the three men, aged between 30 and 42, were found dead at the scene,“ he said in a press conference at the Penang Police Headquarters today.He added that a search at the scene revealed a semi-automatic pistol, a revolver, a box of Master bullets containing 50 rounds of 9mm Luger A USA ammunition, a box of 9mm Luger D62 ammunition containing 44 rounds, two machetes, a crowbar, a sledgehammer, and various other tools used in vehicle theft.Hamzah said checks revealed that the Honda Accord used by the suspects was a stolen vehicle, which had been reported missing in Seri Kembangan, Selangor.He added that during the incident, the suspects were believed to be on their way to commit a robbery at a location they had already identified, which was not far from the site of the shootout.“Initial investigations found that the three men were actively involved in luxury vehicle and 4x4 vehicle thefts, as well as house break-ins across the state since the start of this year.“Their modus operandi was to target luxury homes, break in, and steal valuables, while the stolen vehicles would be smuggled into neighbouring countries and sold,“ he said, adding that the firearms used by the suspects were also smuggled from abroad.He explained that none of the suspects had regular employment. The first suspect, aged 42, who was the gang leader, had 35 prior criminal offences and eight drug-related convictions; the second suspect had six previous drug-related offences, while the third suspect had no identification, and all three were believed to be criminal associates.“With the elimination of these three criminals, police believe they have successfully solved 33 cases of vehicle theft, robbery, and house break-ins that have occurred in Penang since the beginning of this year,“ he said. Full Article BERNAMA
use No contempt citations for ex-president Duterte as he refrains from swearing at House drug war probe By www.philstar.com Published On :: Wed, 13 Nov 2024 19:50:00 +0800 The House of Representatives saw quite a toned-down but more gutsy version of former President Rodrigo Duterte as he refrained from swearing at the House probe into his bloody anti-narcotics campaign. Full Article
use Veterans Day - Land of the Free Because of the Brave By www.majorgeeks.com Published On :: Mon, 11 Nov 2024 09:49:51 -0500 Veterans Day - Land of the Free Because of the Brave Full Article
use Why Small Developer Tools Get Flagged as Malware and How to Safely Use Them By www.majorgeeks.com Published On :: Tue, 12 Nov 2024 09:30:50 -0500 ... Full Article
use NSA Advises Andriod and iPhone User to Restart Thier Phones By www.majorgeeks.com Published On :: Sun, 28 Jul 2024 07:57:33 -0400 In its recently released mobile device best practices guide, the National Security Agency (NSA) goes old-school geek and advises people to turn their phones off and on again.... Full Article
use Just crossed over 1100 Active Users of the yToggle Extension - and 5 Star Rated! Thanks!!!!! By www.majorgeeks.com Published On :: Sat, 09 Nov 2024 10:42:16 -0500 ... Full Article
use Report: 10 Used Cars With Big Price Drops By clark.com Published On :: Tue, 22 Sep 2020 14:00:50 +0000 Vehicle prices are continuing on the downward trajectory, which is something that money expert Clark Howard has been saying would happen. “The used vehicle prices are on a steady downturn, and the new vehicles are on a downturn as well but not as steep because they don’t have as far to fall as the used […] The post Report: 10 Used Cars With Big Price Drops appeared first on Clark Howard. Full Article Cars newsletter
use New Report: The Average Price of a Used Car By clark.com Published On :: Mon, 20 Sep 2021 14:00:00 +0000 Vehicle prices have been causing sticker shock for the past couple of years, but money expert Clark Howard says used cars have normalized recently. A recent report from vehicle research site iSeeCars indicates that shoppers are still throwing their dollars toward older used cars as the price of new cars remains stubbornly expensive. Here are […] The post New Report: The Average Price of a Used Car appeared first on Clark Howard. Full Article Cars newsletter