Interactive than Others a Four-part Model of Cyber-interactivity: Some Cyber-places Are More
نویسندگان
چکیده
Existing communication models and definitions of interactivity provide both background and structure for a new model of cyber-interactivity that is introduced and explored in this article. Two primary dimensions, direction of communication and level of receiver control over the communication process, provide the primary framework for this new model of computer-mediated cyberinteractivity. A study designed to explore the applicability of this model analyzed 108 health-related websites using both perception-based and feature-based measures of these two dimensions. No significant correlation was found between the perception-based and feature-based models. The perception-based model was a better predictor of attitude toward the website and perceived relevance of the subject of the website than the feature-based model. However, the feature-based model may hold greater promise as a tool for website developers who seek to incorporate appropriate levels of interactivity in their
منابع مشابه
The Civil Responsibility of Government in the Cyberspace: Looking at the Cyber Ethics
Background: Given the appropriateness of cyberspace and its interconnectedness, each country is expected to minimize the possibility of harmful actions by securing and continuously monitoring the Internet and the virtual world. Of course, part of this goal will be achieved through the adoption of appropriate national laws and, in part, through proper education of citizens and the development of...
متن کاملApplication of Stochastic Optimal Control, Game Theory and Information Fusion for Cyber Defense Modelling
The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches. In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques. Jump processes are applied to model different and complex situations in cyber games. Applying jump processes we propose some m...
متن کاملPrevalence of Traditional and Cyber Bullying Among Teenagers Herat-Afghanistan
Background and Aim: Bullying is one of the most common problems among teenagers in many schools around the world, which is recently considered by researchers in the fields of psychology and even criminology as a traditional and cyber bullying. The purpose of this study is to investigate the rate of traditional and cyber bullying among male and female teenagers in the secondary schools of Herat...
متن کاملE-Assessment via Apps/modules, Based on the Post Methods Theorizing
The post methods era has witnessed a dramatic change inapproaches to and methods of teaching as well as testing. At the heart of such a change, collaborative learning has received top priority and testing domain has actually gone under scrutiny. This new mode of education has made stakeholders, especially in higher education; reflect on an interactive e-assessment based instruction. Such a cybe...
متن کاملCharacteristics of an Islamic View of Cyber-Ethics
The current Cyber-ethics in Western societies (and its followers in other societies) have been compiled based on secularist presupposition. This presupposition has different principles in comparison with the Islamic attitude which can lead one to take a different approach toward ethical problems. This paper is an attempt to propose principles of Islamic cyber-ethics upon which we can prepare an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002