Navigating the Cyber World: An In-Depth Analysis of Internet Usage, Risks, and Influences on Adolescents

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : April 4, 2024 at 1:50 pm | [if 1553 equals=””] Volume :12 [else] Volume :12[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Shilpi Saxena, Vicky Singh, Rahul Mandal, Mritunjay Kr. Ranjan, Pradnya Janardhan Dongardive

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Assistant professor, Students (BCA), Students (BCA), Assistant professor, Assistant professor, Department of Computer Science and Application, Sandip University, Nashik, Department of Computer Science and Application, Sandip University, Nashik, Department of Computer Science and Application, Sandip University, Nashik, Department of Computer Science and Application, Sandip University, Nashik, Department of Commerce, Ashoka Center for Business and Computer Studies Nashik, Nashik, Maharashtra, Maharashtra, Maharashtra, Maharashtra, Maharashtra, India, India, India, India, India
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nThis study surveyed aged 10 and up learn more about their online habits. In order to learn more about the online habits of this group, the survey asked questions regarding the frequency, duration, and motivations for respondents’ time spent online. The study also looked at high-risk behaviours like excessive screen time, increased social media use, and extended gaming sessions as possible indicators of problematic internet use. Indicators of internet addiction or reliance, such as a disregard for commitments in real life, emotional anguish when not online, and problems managing online use, were also analysed in the study. As an added goal, the research aimed to determine what motivates and drives children to engage in excessive internet use in order to shed light on what kinds of media, apps, or social networking sites are most appealing to children. The research aimed to discover how children’s internet use influences their school performance, health, and social and emotional growth. By achieving these aims, to shed light on the connection between internet use and addiction, giving actionable data that legislators, educators, parents, and medical professionals can utilise to address and mitigate the potential issues that may come from their children’s online use.

n

n

n

Keywords: Internet, Cybersecurity, Digital risks, online fraud, Cyberbullying, cyber world

n[if 424 equals=”Regular Issue”][This article belongs to Journal Of Network security(jons)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal Of Network security(jons)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Shilpi Saxena, Vicky Singh, Rahul Mandal, Mritunjay Kr. Ranjan, Pradnya Janardhan Dongardive Navigating the Cyber World: An In-Depth Analysis of Internet Usage, Risks, and Influences on Adolescents jons April 4, 2024; 12:-

n

How to cite this URL: Shilpi Saxena, Vicky Singh, Rahul Mandal, Mritunjay Kr. Ranjan, Pradnya Janardhan Dongardive Navigating the Cyber World: An In-Depth Analysis of Internet Usage, Risks, and Influences on Adolescents jons April 4, 2024 {cited April 4, 2024};12:-. Available from: https://journals.stmjournals.com/jons/article=April 4, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘jons’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

1.Geofrey Mwamba Nyabuto. The Internet and Social Media Contribution to Inclusivity and Exclusivity in Society. International Journal of Scientific Research and Engineering Trends. 2023 Dec 27;9(6):1–10.
2.Drăghici G. The Internet, Lifestyle and Society. European Proceedings of Educational Sciences. 2023 Apr 10.
3.Sinha S, Shrivastava A, Paradis C. A Survey of the Mobile Phone-Based Interventions for Violence Prevention Among Women. Advances in Social Work. 2020 Mar 25;19(2):493–517.
4.Vuletić D, Milenković M, Đukić A. Cyberspace as a domain of conflict: The case of the United States – Iran and North Korea. Vojno delo. 2021;73(1):1–14.
5.Asaad RR, Saeed VA. A Cyber Security Threats, Vulnerability, Challenges and Proposed Solution. Applied computing Journal. 2022 Dec 29;227–44.
6.Lafton T, Holmarsdottir HB, Kapella O, Sisask M, Zinoveva L. Children’s Vulnerability to Digital Technology within the Family: A Scoping Review. Societies. 2022 Dec 31;13(1):11.
7.Zainuddin N, Daud M, Ahmad S, Maslizan M, Abdullah SAL. A Study on Privacy Issues in Internet of Things (IoT). 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP). 2021 Jan 8;
8.Yadav ErP, Mittal ErA, Yadav DrH. IoT: Challenges and Issues in Indian Perspective. 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU) [Internet]. 2018 Feb; Available from: https://ieeexplore.ieee.org/document/8519869/figures
9.Andrea I, Chrysostomou C, Hadjichristofi G. Internet of Things: Security vulnerabilities and challenges. 2015 IEEE Symposium on Computers and Communication (ISCC) [Internet]. 2015 Jul; Available from: https://ieeexplore.ieee.org/abstract/document/7405513/authors#authors
10.Rachit, Bhatt S, Ragiri PR. Security trends in Internet of Things: a survey. SN Applied Sciences. 2021 Jan;3(1).
11.Ahmed E, Islam A, Ashraf M, Chowdhury AI, Rahman MM. Internet of Things (IoT): Vulnerabilities, Security Concerns and Things to Consider [Internet]. IEEE Xplore. 2020. p. 1–6. Available from: https://ieeexplore.ieee.org/document/9225283
12.Mammen AS, Patrick HA. Demographics Influence on Faculty Perception towards Work Environment: a Study of Kerala Business Schools. Adarsh Journal of Management Research. 2015 Mar 1;8(1):9.
13.Abiodun OI, Abiodun EO, Alawida M, Alkhawaldeh RS, Arshad H. A Review on the Security of the Internet of Things: Challenges and Solutions. Wireless Personal Communications. 2021 Mar 6.
14.Saini K, Rupesh Kumar Mishra, Kavita Bhati, Sumreen Kawoosa. Social media based linking approach for finding the effectiveness of the social issues. 2016 Apr 1;
15.Arif Md. Sattar, Mritunjay Kr. Ranjan, Singh G. Social, Emotional and Ethical (SEE) Attributes, Which Configures Our Bioinformatics Systems to Activate the Hidden Forces to Shape Human Decisions. 2022 Nov 1;175–202.
16.Conti M, Passarella A. Online Social Networks and Media. Online Social Networks and Media. 2017 Jun;1:iii–vi.
17.Boyle AM, O’Sullivan LF. Staying Connected: Computer-Mediated and Face-to-Face Communication in College Students’ Dating Relationships. Cyberpsychology, Behavior, and Social Networking. 2016 May;19(5):299–307.
18.Hern M, Johal A. O My Friends, There is No Friend. transcript Verlag; 2024.
19.Al-rahmi WM, Zeki AM, Alias N, Saged AA. The Impact of Using social media for Teaching and Learning in Post-secondary Institutes. The Anthropologist. 2017 Jul 3;29(1):8–18.
20.Rodríguez-Castro Y, Martínez-Román R, Alonso-Ruido P, Adá-Lameiras A, Carrera-Fernández MV. Intimate Partner Cyberstalking, Sexism, Pornography, and Sexting in Adolescents: New Challenges for Sex Education. International Journal of Environmental Research and Public Health. 2021 Feb 23;18(4). Available from: https://pubmed.ncbi.nlm.nih.gov/33672240/

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Journal Of Network security

n

[if 344 not_equal=””]ISSN: 2395-6739[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 12
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received March 5, 2024
Accepted March 8, 2024
Published April 4, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]