scholarly journals Psychotherapy via the Internet: What Programs Do Psychotherapists Use, How Well-Informed Do They Feel, and What Are Their Wishes for Continuous Education?

Author(s):  
Elke Humer ◽  
Peter Stippl ◽  
Christoph Pieh ◽  
Wolfgang Schimböck ◽  
Thomas Probst

The outbreak of the COVID-19 pandemic has caused changes in the provision of psychotherapy around the world. The common format of delivering in-person psychotherapy is replaced by psychotherapy via the Internet to a great extent. This study examined how well Austrian psychotherapists feel informed about the use of the Internet in psychotherapy, where additional information needs exist, and which software is used. A link to an online survey was sent to all psychotherapists providing a valid email address in the official list of licensed psychotherapists at the start of the COVID-19 lockdown in Austria. A total of 1547 people took part in the survey. The results show that psychotherapy via the Internet was primarily offered via Skype and Zoom during the COVID-19 pandemic and that the majority of the therapists felt well-informed about psychotherapy via the Internet; however, several therapists stated that they wish to have further information on data protection and security. Overall, the study shows that Austrian psychotherapists coped well with the rapid change from the provision of psychotherapy through personal contact to psychotherapy via the Internet. Security and data protection aspects of therapy via the Internet should be addressed in training and further education of psychotherapists. As this study was conducted online, it might have caused some respondent bias towards a higher participation of psychotherapists with higher preference for new technologies.

2021 ◽  
Vol 18 (2) ◽  
pp. 247-256
Author(s):  
Sanja Klisarić

In a world of increasingly intense cyber content that relies on new technologies, the security of all systems is at risk. This article will present the danger and security options in order to protect not only data but also the entire system connected to the new technologies. Also, the importance of persons dealing with online security issues will be emphasized. The analysis of the content reveals the possibility for prediction that is presented in the paper, and connected with the conclusion that technology will develop more and more, and thus the danger of cyber attacks will be more and more intense. The paper focuses on the essence of the defense against terrorism that is necessary on the Internet. This indicates those defense options that are in line with the roles of those in charge of Internet security as an open field for terrorist cyber attacks.


2021 ◽  
Vol 5 (1) ◽  
pp. 46-68
Author(s):  
Deanne Destriani Firmansyah Putri ◽  
Muhammad Helmi Fahrozi

ABSTRAKKemajuan teknologi yang diiringi perkembangan internet kini kian pesat. Di era globalisasi seperti ini kita semakin dipermudah semenjak kemuncul internet. Seperti belanja, kita dapat membeli kebutuhan sehari-hari melalui aplikasi belanja online lewat beberapa e-commerce. Pelanggan e-commerce di Indonesia tercatat mengalami peningkatan sebesar 38,3% setelah terjadi pandemi, hal ini justru membuat tingkat keamanan internet semakin rentan karena banyak pendaftar baru yang mendaftarkan data pribadinya ke dalam data pelanggan e-commerce. Maka tak banyak terjadi kasus kebocoran data seperti yang terjadi pada e-commerce Bhinneka.com. Oleh karena itu tentu kita masih dihadapi persoalan mengenai bagaimana pencegahan kebocoran data dan apa upaya penindakan untuk pelaku kebocoran data serta bagaimana tanggung jawab dari e-commerce tersebut, maka perlu adanya pengesahan RUU Perlindungan Data Pribadi yang mana telah dibentuk oleh pemerintah dari lama, RUU ini apabila disahkan dapat menjadi jawaban dari persoalan kebocoran data. Metode penelitian yang digunakan adalah yuridis-normatif dengan pendekatan perundang-undangan dan pendekatan kasus. Dalam penelitian ini akan menjabarkan betapa pentingnya RUU Perlindungan Data Pribadi untuk segera disahkan untuk menutut pelaku dan menuntut pertanggungjawaban pemilik e-commerce itu sendiri, tentunya masyrakat akan mendapatkan kepastian hukum untuk menangani masalah kebocoran data.Kata Kunci: E-commerce; Kebocoran Data; Pandemi COVID-19; Perlindungan Data Pribadi.ABSTRACTThe progression of the technology which accompanied by development of the internet are growing rapidly. In this era of globalization, we’ve made it easier by the since emerged of the internet. Like shopping, we can buy our needs by online shopping application through some e-commerces. The consumers of e-commerce in Indonesia has increased until 38,3% after this pandemic happened, this thing actually makes the level of internet security more vulnerable because many registrants just register their data into the e-commerce. So many cases about data leakage, like it happened in e-commerce Bhinneka.com. Therefore, we still facing problems regarding about data leakage and how to prevent data leakage, what our behaviour regarding data leakage perpetrators and what the responsibility by the e-commerce, and then to legalization The Protection of Personal Data Bill is very important, if this bill has legalized it can answer all problems about data leakage. The research method used is normative juridical with statute approach and case approach. In this research will be explained how important to legalization The Protection of Personal Data Bill, because many important articles which can be applied to the consumers who feel disadvantaged by data leakage perpetrators and public will get legal certainty to deal with data leakage problems.Keywords: Data Leakage; E-commerce; Pandemic of COVID-1; Personal Data Protection.


2021 ◽  
Vol 13 (8) ◽  
pp. 4106
Author(s):  
Lenka Mynaříková ◽  
Lukáš Novotný

Schools have an irreplaceable role in preparing the young generation for educational, professional, and social challenges, however, this effort fails if teachers themselves are not equipped with sufficient ICT competencies and do not work on their constant development. The presented quantitative study analyzed how secondary school teachers understand and actively use Information and Communication Technologies (ICT) in their teaching practice and what barriers they encounter in terms of the further education in ICT provided by accredited institutions. In a sample of 1846 Czech teachers who completed an online survey, results showed they lacked both understanding and active use of new technologies, rarely participated in further education, and were unsatisfied with the courses provided to them. Their main barriers to further education were the lack of sufficient technology available in school, insufficient knowledge and skills in ICT, and the lack of support from school management. Unlike in other studies, time was not identified as an important barrier. Possible legislative, educational, and school management consequences regarding the further education in ICT based on the barriers in attending the courses and identified age and gender differences are discussed.


2020 ◽  
pp. 125-132
Author(s):  
Marina Kadnichanskaya ◽  
Elena Galkina

Today in the world, the prevalence of information and telecommunication technologies (ICT) and the Internet contribute to the development of new strategies for work behavior among the population, when less formal rules are applied. This leads to the expansion of the socio-economic space of the city beyond the geographical territory. In modern society, there is a rapid development of the service sector. The introduction of modern technology allows the use of a variety of employment models. The number of temporary workers in the organization's staff is increasing. The development of informal employment and self-employment has resulted in freelance as a new model of employment in the labor market. Unwillingness to work in an office with set hours, search for freedom in allocation of time and work, an increased interest in new technologies, are the reasons for choosing freelance as a labor strategy for young people. The article analyzes the work of domestic and foreign researchers and official statistics in the field of labor and employment. The methodological basis of the study was an online survey of 300 respondents employed in freelance and living in the city of Ulyanovsk, conducted in February–April 2018. For the analysis of empirical data, the IBM SPSS Statistics program was used. The study identified the features of freelancing in the modern labor market in the socio-economic space of the city of Ulyanovsk, revealed the degree of youth involvement in the freelance sphere, the motives for choosing freelancing as a labor strategy, described the current problems and risks faced by freelancers. The hypothesis is confirmed that the spread of freelance as a new model of employment in the labor market is due to the transformation of labor and employment processes, as well as due to the development of information and communication technologies, in particular the Internet, which allows individuals to work outside the office.


Author(s):  
Fredj Dridi ◽  
Gustaf Neumann

Advances in the World Wide Web technology have resulted in the proliferation of significant collaborative applications in commercial environments. However, the World Wide Web as a distributed system, which introduces new technologies (like Java applets and ActiveX) and uses a vulnerable communication infrastructure (the Internet), is subject to various security attacks. These security attacks violate the confidentiality, integrity, and availability of Web resources. To achieve a certain degree of Web security and security management, different protocols and techniques have been proposed and implemented. This is still a hot topic in the current research area and still requires more ambitious efforts. We give an overview of the Internet security issues with special emphasis on the Web security. We describe an architecture built up by the means of security services to shield against these threats and to achieve information security for networked systems like the WWW. We focus on the authentication and access control services (like role-based access control) and their administration aspects. We discuss several elementary techniques and Internet standards which provide state-of-the-art of Web security.


2006 ◽  
Vol 88 (6) ◽  
pp. 550-553 ◽  
Author(s):  
Damian J Mole ◽  
Colin Fox ◽  
Giulio Napolitano

INTRODUCTION The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. PARTICIPANTS AND METHODS A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. RESULTS Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. CONCLUSIONS Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended.


2021 ◽  
Vol 12 (1) ◽  
pp. 413-425
Author(s):  
Kamila Wylęgły

Aim. The purpose of this article is to analyse risky behaviours undertaken by university students on the Internet. Theory. The concepts of “risk” and “risky behaviour” are known and often discussed in science. Krzysztof Ostaszewski (2005) defines risky behaviours as actions that contradict social norms and legal order, which at the same time pose a threat to a person's health and development. The catalogue of risky behaviours is very diverse and—more importantly—open. With the development of civilisation, new forms appear. Examples include risky behaviours on the Internet. Methodology and research results. The study population sample consisted of 241 university students. The research was conducted using an online survey questionnaire. The respondents admitted to taking risks in the virtual world. A large percentage of respondents admit to sharing private information on social networks (almost 70%). Nearly 75% of respondents ignore communications about potential threats to websites, putting themselves at risk of losing sensitive data. Moreover, 65.1% of students admit to downloading content from illegal sources. Other risky behaviours undertaken by students on the Internet include Internet addiction and online activities, aggression on the Internet, sexual and/or erotic behaviour in cyberspace. The paper also presents the answers to open-ended questions, which refer to threats on the Internet as perceived by the students. The answers given most often referred to: addiction to new technologies, loss/theft of private data, vulnerability to false/unverified information available on the Internet. Cognitive value. Online risk-taking is a global problem. The phenomenon should be further theoretically considered and analysed in a pedagogical practice.


2020 ◽  
Vol 158 (04) ◽  
pp. 345-350
Author(s):  
Christian Juhra ◽  
Jörg Ansorg ◽  
David Alexander Back ◽  
Dominik John ◽  
Andrea Kuckuck-Winkelmann ◽  
...  

AbstractNew communication technologies allow patients to communicate with their physicians from anywhere using computer or smartphone. Adding video to the mere phone call optimizes the personal contact between patient and physicians regardless of distance. Legal and reimbursements requirements must be taken into account, especially only certified software products must be used. In addition, patient consent is needed and confidentiality must be assured. The video patient consultation can be reimbursed by the health insurance companies. As with all new technologies, the introduction of these video consultations faced some challenges. Although patients and physicians have expressed great interest in this technology, it has been rarely used so far. The current COVID crisis increased the need for video consultations resulting in an increasing use of video patient consultation. It can be expected that this demand will still exists after the COVID crisis.


Mousaion ◽  
2020 ◽  
Vol 38 (2) ◽  
Author(s):  
Rexwhite Tega Enakrire ◽  
Isaac Mpho Mothiba

Information literacy competencies indicate the ability of an individual to apply a certain search strategy of information discovery, to understand its design, to value judgement, and to use it in various contents and contexts. The influence of information literacy competencies plays an important role in enabling information users to meet their information needs and prepares them for lifelong learning. The purpose of this study was to examine the influence of information literacy competencies of users in the Saulsville public library, South Africa. The rationale was a lack of awareness and the inability of the users to find their information needs based on the task and decision at hand. The descriptive survey design adopted for this study made use of a questionnaire to collect data from 1 120 registered members of the Saulsville library. Of the 1 120 registered users being the population for the study, the authors purposively used 10 per cent (112 members) of the population as sample size. The findings revealed that users of the Saulsville public library had limited awareness and competencies of information literacy. The users were exposed to some form of library orientation and the use of library resources during their visit to the library. The findings further indicated that the users’ information literacy competencies were affirmed through the quality of information obtained and the satisfaction of library services rendered by library staff. The study recommends the acquisition of new technologies that could enhance users’ interactive information literacy training in public libraries and formal education settings.  


GIS Business ◽  
2019 ◽  
Vol 14 (6) ◽  
pp. 656-666
Author(s):  
Dr. Entisar Al-Obaidi

Media refers to the channels of communication through which we distribute news, education, movies, music, advertising messages and other information. It includes physical and online newspapers and magazines, television, radio, telephone, the Internet, fax and billboards, are a dominant force in lives of children. Although television is remaining the predominant medium for children and adolescents, the new technologies are become more popular. We have to concern about the potential harmful effects of media "messages and images"; however, the positive and negative effects of media should be recognized. Parents have to establish the plan for all media in family home. Media that are influences on children should be recognized by "schools, policymakers, product advertisers, and entertainment producers".


Sign in / Sign up

Export Citation Format

Share Document