Interactive than Others a Four-part Model of Cyber-interactivity: Some Cyber-places Are More

نویسندگان

  • Sally J McMillan
  • SALLY J. McMILLAN
چکیده

Existing communication models and definitions of interactivity provide both background and structure for a new model of cyber-interactivity that is introduced and explored in this article. Two primary dimensions, direction of communication and level of receiver control over the communication process, provide the primary framework for this new model of computer-mediated cyberinteractivity. A study designed to explore the applicability of this model analyzed 108 health-related websites using both perception-based and feature-based measures of these two dimensions. No significant correlation was found between the perception-based and feature-based models. The perception-based model was a better predictor of attitude toward the website and perceived relevance of the subject of the website than the feature-based model. However, the feature-based model may hold greater promise as a tool for website developers who seek to incorporate appropriate levels of interactivity in their

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Civil Responsibility of Government in the Cyberspace: Looking at the Cyber Ethics

Background: Given the appropriateness of cyberspace and its interconnectedness, each country is expected to minimize the possibility of harmful actions by securing and continuously monitoring the Internet and the virtual world. Of course, part of this goal will be achieved through the adoption of appropriate national laws and, in part, through proper education of citizens and the development of...

متن کامل

Application of Stochastic Optimal Control, Game Theory and Information Fusion for Cyber Defense Modelling

The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches‎. ‎In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques‎. ‎Jump processes are applied to model different and complex situations in cyber games‎. ‎Applying jump processes we propose some m...

متن کامل

Prevalence of Traditional and Cyber Bullying Among Teenagers Herat-Afghanistan

Background and Aim: Bullying is one of the most common problems among teenagers in many schools around the world, which is recently considered by researchers in the fields of psychology and even criminology as a traditional and cyber bullying. The purpose of this study is to investigate the rate of traditional and cyber bullying among male and female teenagers in the secondary schools of Herat...

متن کامل

E-Assessment via Apps/modules, Based on the Post Methods Theorizing

The post methods era has witnessed a dramatic change inapproaches to and methods of teaching as well as testing. At the heart of such a change, collaborative learning has received top priority and testing domain has actually gone under scrutiny. This new mode of education has made stakeholders, especially in higher education; reflect on an interactive e-assessment based instruction. Such a cybe...

متن کامل

Characteristics of an Islamic View of Cyber-Ethics

The current Cyber-ethics in Western societies (and its followers in other societies) have been compiled based on secularist presupposition. This presupposition has different principles in comparison with the Islamic attitude which can lead one to take a different approach toward ethical problems. This paper is an attempt to propose principles of Islamic cyber-ethics upon which we can prepare an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002