Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 184

World Academy of Science, Engineering and Technology

[Information and Communication Engineering]

Online ISSN : 1307-6892

184 You are Canceled: The Contemporary Practices of Cancel Culture on YouTube and the Risks of Digital Labor

Authors: SeoYoon Sung

Abstract:

Cancel culture is a rapidly growing online phenomenon. Its rising trend – social media platform users and communities "canceling" or ousting individuals or communities out of work, business, or online presence – is creating new social concerns. While public shaming is not new, the online canceling practice visible today raises important questions about social media platforms and the impact on the fleeting and risky nature of digital work: What roles do the platforms' affordances play in facilitating and reinforcing the cancel culture? In particular, how does the materiality of visual platforms interact with people's participation in this culture? And importantly, what are the social implications of cancel culture on people's engagement in digital work? This work pays particular attention to the uses and affordances of YouTube in the context of its growing online communities and how cancel culture is practiced in this platform. Through the lens of sociomateriality, this study examines the mutual enactment of technological and social agencies and shows how the cancel culture is exercised and developed through such enactment. Using online ethnography, this work will select five to six large YouTube channels (1 to 20 million subscribers) in the beauty and entertainment industries that have recently undergone a scandal leading to their content creators stopping all online activities. Through content analyses of the data collected of videos, comments, and user activities (e.g., view counts, likes, dislikes, and trending), it will examine in-depth the materiality (e.g., features, functions, and uses) of YouTube and the social agency (i.e., how users adopt and shape the uses of their tools) to show how the close interplay of the two factors contribute to creating and reinforcing a set of norms and rules that constitute cancel culture. Further, this work uses Richard Rogers' (2013) 'digital methods' framework to discuss how the study of social media offers insights beyond internet research to expand our understanding of important social conditions today. While openly discussing the limitations of studying online phenomena due to the abrupt and transient nature of the tools' changing sociomateriality (i.e., the changing nature of what is available to users during the time of occurrence), this work shows how the study of social media can point to an important social change. This work, then, is a study of the fast-changing landscape of work and emerging online labor infrastructure. It highlights the growing dependence of people's jobs, work, and reputation on social media technologies and raises ethical issues that platform organizations and we as users need to consider for the future of jobs and work.

Keywords: YouTube, cancel culture, digital work and labor, future of work, social media platforms, sociomateriality

Procedia PDF Downloads 1
183 Precise String Analysis for Detecting Malware in Android Programs

Authors: Assad Maalouf, Lunjin Lu, James Lynott

Abstract:

We design and implement a precise model of string operations using finite state machine transformers and state transformers to approximate the values string variables can take throughout the execution of the program. We use our model to analyze Android program string variables. Our experimental results show that our string analysis is very efficient at detecting the contextual effect of string operations on the string variables. Our model proved to be very useful when it came to verifying statements about the string variables of the program.

Keywords: Static Analysis, android, abstract interpretation, string analysis

Procedia PDF Downloads 1
182 Improving Taint Analysis of Android Applications Using Finite State Machines

Authors: Assad Maalouf, Lunjin Lu, James Lynott

Abstract:

We present a taint analysis that can automatically detect when string operations result in a string that is free of taints, where all the tainted patterns have been removed. This is an improvement on the conservative behavior of previous taint analyzers, where a string operation on a tainted string always leads to a tainted string unless the operation is manually marked as a sanitizer. The new taint analysis is built on top of a string analysis that uses finite state automata to approximate the sets of values that string variables can take during the execution of a program. The proposed approach has been implemented as an extension of FlowDroid and experimental results show that the resulting new taint analyzer is much more precise than the original FlowDroid.

Keywords: Static Analysis, android, string analysis, taint analysis

Procedia PDF Downloads 1
181 Autonomic Recovery Plan with Server Virtualization

Authors: M. Saad, S. Hameed, S. Anwer, M. Saady

Abstract:

For autonomic recovery with server virtualization, a cogent plan that includes recovery techniques and backups with virtualized servers can be developed instead of assigning an idle server to backup operations. In addition to hardware cost reduction and data center trail, the disaster recovery plan can ensure system uptime and to meet objectives of high availability, recovery time, recovery point, server provisioning, and quality of services. This autonomic solution would also support disaster management, testing, and development of the recovery site. In this research, a workflow plan is proposed for supporting disaster recovery with virtualization providing virtual monitoring, requirements engineering, solution decision making, quality testing, and disaster management. This recovery model would make disaster recovery a lot easier, faster, and less error prone.

Keywords: Cloud Computing, Disaster Recovery, server virtualization, autonomous intelligence

Procedia PDF Downloads 1
180 A Deep-Learning Based Prediction of Pancreatic Adenocarcinoma with Electronic Health Records from the State of Maine

Authors: Bo Jin, Xiaodong Li, Peng Gao, Shiying Hao, Xuefeng B. Ling, Yaqi Zhang, Le Zheng, Chengyin Ye, Minjie Xia, Changlin Fu, Karl G. Sylvester, Eric Widen, Chao-Jung Huang, Yongxia Han, Modi Liu

Abstract:

Predicting the risk of Pancreatic Adenocarcinoma (PA) in advance can benefit the quality of care and potentially reduce population mortality and morbidity. The aim of this study was to develop and prospectively validate a risk prediction model to identify patients at risk of new incident PA as early as 3 months before the onset of PA in a statewide, general population in Maine. The PA prediction model was developed using Deep Neural Networks, a deep learning algorithm, with a 2-year electronic-health-record (EHR) cohort. Prospective results showed that our model identified 54.35% of all inpatient episodes of PA, and 91.20% of all PA that required subsequent chemoradiotherapy, with a lead-time of up to 3 months and a true alert of 67.62%. The risk assessment tool has attained an improved discriminative ability. It can be immediately deployed to the health system to provide automatic early warnings to adults at risk of PA. It has potential to identify personalized risk factors to facilitate customized PA interventions.

Keywords: electronic health records, Deep learning, Cancer Prediction, pancreatic adenocarcinoma

Procedia PDF Downloads 1
179 Interoperability Maturity Models for Consideration When Using School Management Systems (SMS) in South Africa: A Scoping Review

Authors: Keneilwe Maremi, Marlien Herselman, Adele Botha

Abstract:

The main purpose and focus of this paper are to determine the Interoperability Maturity Models to consider when using School Management Systems (SMS). The importance of this is to inform and help schools with knowing which Interoperability Maturity Model is best suited for their SMS. To address the purpose, this paper will apply a scoping review to ensure that all aspects are provided. The scoping review will include papers written from 2012-2019 and a comparison of the different types of Interoperability Maturity Models will be discussed in detail, which includes the background information, the levels of interoperability, and area for consideration in each Maturity Model. The literature was obtained from the following databases: IEEE Xplore and Scopus, the following search engines were used: Harzings, and Google Scholar. The topic of the paper was used as a search term for the literature and the term “Interoperability Maturity Models” was used as a keyword. The data were analyzed in terms of the definition of Interoperability, Interoperability Maturity Models, and levels of interoperability. The results provide a table that shows the focus area of concern for each Maturity Model (based on the scoping review where only 24 papers were found to be best suited for the paper out of 740 publications initially identified in the field). This resulted in the most discussed Interoperability Maturity Model for consideration (ISIMM and OIM).

Keywords: Interoperability, scoping review, interoperability maturity model, school management system

Procedia PDF Downloads 1
178 Internet Media and Public: A Report of a Mutual Deception

Authors: Safet Zejnullahu

Abstract:

The relationship between the public and media is more than meaningful. It has been a topic of discussion as early as the birth of the media. The 'magic box' called radio adapted and transformed by following the tastes and interests of the public. Television went a step further by complementing the magic sound of the magic box with photos/images. Newspapers informed the reader, but from time to time, they also provided them the room to express their opinions. The media-public report in the traditional media is a report of a mutual respect. Today, the report between media and public should be well defined. The goal of this paper is to analyze the history of the media-public relationship, with a special emphasis on the analysis of this relationship in media of the internet time. This paper seeks to prove that the internet media has created a completely new and thus far unknown relationship between the media and public. Through research, which includes an analysis of the media in Kosovo and Albania, it will be proven that the media of the internet time has elevated this relationship to a new level, with many unknowns in terms of the functioning and role of the media. The results and findings of the paper are related to the conclusion that from the relationship in which the roles of the media and the public are known, nowadays, this relationship goes beyond the known principle and rules and is more defined as a relationship of mutual deception. The media goes beyond the line of the humility of the public, and the public seeks to direct the content of the media. The media-public report in the internet-media is a report based on mutual attempt for fraud.

Keywords: Media, Public, direction, report, humility

Procedia PDF Downloads 1
177 Analyzing the Place of Technology in Communication: Case Study of Kenya during COVID-19

Authors: Josephine K. Mule, Levi Obonyo

Abstract:

Technology has changed human life over time. The COVID-19 pandemic has altered the work set-up, the school system, the shopping experience, church attendance, and even the way athletes train in Kenya. Although the use of technology to communicate and maintain interactions has been on the rise in the last 30 years, the uptake during the COVID-19 pandemic has been unprecedented. Traditionally, ‘paid’ work has been considered to take place outside the “home house” but COVID-19 has resulted in what is now being referred to as “the world’s largest work-from-home experiment” with up to 43 percent of employees working at least some of the time remotely. This study was conducted on 90 respondents from across remote work set-ups, school systems, merchants and customers of online shopping, church leaders and congregants and athletes, and their coaches. Data were collected by questionnaires and interviews that were conducted online. The data is based on the first three months since the first case of coronavirus was reported in Kenya. This study found that the use of technology is in the center of working remotely with work interactions being propelled on various online platforms including, Zoom, Microsoft Teams, and Google Meet, among others. The school system has also integrated the use of technology, including students defending their thesis/dissertations online and university graduations being conducted virtually. Kenya is known for its long-distance runners, due to the directives to reduce interactions; coaches have taken to providing their athletes with guidance on training on social media using applications such as WhatsApp. More local stores are now offering the shopping online option to their customers. Churches have also felt the brunt of the situation, especially because of the restrictions on crowds resulting in online services becoming more popular in 2020 than ever before. Artists, innovatively have started online musical concerts. The findings indicate that one of the outcomes in the Kenyan society that is evident as a result of the COVID-19 period is a population that is using technology more to communicate and get work done. Vices that have thrived in this season where the use of technology has increased, include the spreading of rumors on social media and cyberbullying. The place of technology seems to have been cemented by demand during this period.

Keywords: Communication, Technology, Kenya, COVID-19, coronavirus

Procedia PDF Downloads 1
176 Discussing Embedded versus Central Machine Learning in Wireless Sensor Networks

Authors: Anne-Lena Kampen, Øivind Kure

Abstract:

Machine learning (ML) can be implemented in Wireless Sensor Networks (WSNs) as a central solution or distributed solution where the ML is embedded in the nodes. Embedding improves privacy and may reduce prediction delay. In addition, the number of transmissions is reduced. However, quality factors such as prediction accuracy, fault detection efficiency and coordinated control of the overall system suffer. Here, we discuss and highlight the trade-offs that should be considered when choosing between embedding and centralized ML, especially for multihop networks. In addition, we present estimations that demonstrate the energy trade-offs between embedded and centralized ML. Although the total network energy consumption is lower with central prediction, it makes the network more prone for partitioning due to the high forwarding load on the one-hop nodes. Moreover, the continuous improvements in the number of operations per joule for embedded devices will move the energy balance toward embedded prediction.

Keywords: Energy Consumption, Wireless Sensor Networks, WSN, central machine learning, embedded machine learning, local machine learning

Procedia PDF Downloads 1
175 Fast Approximate Bayesian Contextual Cold Start Learning (FAB-COST)

Authors: Jack R. McKenzie, Peter A. Appleby, Thomas House, Neil Walton

Abstract:

Cold-start is a notoriously difficult problem which can occur in recommendation systems, and arises when there is insufficient information to draw inferences for users or items. To address this challenge, a contextual bandit algorithm – the Fast Approximate Bayesian Contextual Cold Start Learning algorithm (FAB-COST) – is proposed, which is designed to provide improved accuracy compared to the traditionally used Laplace approximation in the logistic contextual bandit, while controlling both algorithmic complexity and computational cost. To this end, FAB-COST uses a combination of two moment projection variational methods: Expectation Propagation (EP), which performs well at the cold start, but becomes slow as the amount of data increases; and Assumed Density Filtering (ADF), which has slower growth of computational cost with data size but requires more data to obtain an acceptable level of accuracy. By switching from EP to ADF when the dataset becomes large, it is able to exploit their complementary strengths. The empirical justification for FAB-COST is presented, and systematically compared to other approaches on simulated data. In a benchmark against the Laplace approximation on real data consisting of over 670, 000 impressions from autotrader.co.uk, FAB-COST demonstrates at one point increase of over 16% in user clicks. On the basis of these results, it is argued that FAB-COST is likely to be an attractive approach to cold-start recommendation systems in a variety of contexts.

Keywords: cold-start learning, expectation propagation, multi-armed bandits, Thompson Sampling, variational inference

Procedia PDF Downloads 1
174 Impact of Weather Conditions on Generalized Frequency Division Multiplexing over Gamma Gamma Channel

Authors: Muhammad Sameer Ahmed, Piotr Remlein, Tansal Gucluoglu

Abstract:

The technique called as Generalized frequency division multiplexing (GFDM) used in the free space optical channel can be a good option for implementation free space optical communication systems. This technique has several strengths e.g. good spectral efficiency, low peak-to-average power ratio (PAPR), adaptability and low co-channel interference. In this paper, the impact of weather conditions such as haze, rain and fog on GFDM over the gamma-gamma channel model is discussed. A Trade off between link distance and system performance under intense weather conditions is also analysed. The symbol error probability (SEP) of GFDM over the gamma-gamma turbulence channel is derived and verified with the computer simulations.

Keywords: free space optics, weather conditions, generalized frequency division multiplexing, gamma gamma distribution

Procedia PDF Downloads 1
173 Location Privacy Preservation of Vehicle Data In Internet of Vehicles

Authors: Ying Ying Liu, Austin Cooke, Parimala Thulasiraman

Abstract:

Internet of Things (IoT) has attracted a recent spark in research on Internet of Vehicles (IoV). In this paper, we focus on one research area in IoV: preserving location privacy of vehicle data. We discuss existing location privacy preserving techniques and provide a scheme for evaluating these techniques under IoV traffic condition. We propose a different strategy in applying Differential Privacy using k-d tree data structure to preserve location privacy and experiment on real world Gowalla data set. We show that our strategy produces differentially private data, good preservation of utility by achieving similar regression accuracy to the original dataset on an LSTM (Long Term Short Term Memory) neural network traffic predictor.

Keywords: Internet of Things, differential privacy, Internet Of Vehicles, location privacy, privacy preservation scheme

Procedia PDF Downloads 1
172 Spontaneous Symmetry Breaking or Not: An Insight Study of Similarities of Some Deep Convolutional Neural Network Solutions

Authors: Yimin Zhou, Vasant Honavar, Yonggang Li

Abstract:

Deep Learning is widely used in almost every computer science related area. But the knowledge about the fundamental theory behind it seems not so much as its extensive application. There are proposed ones as Spin Glass and Spontaneous Symmetry Breaking but either is restricted to Deep Neural Network or can be inferenced in 2 ReLu layers only but not in practical situation. In this paper, the theory of Spontaneous Symmetry Breaking is extended into true deep convolutional networks in real practical application situation. Several practical deep convolutional neural networks were explored such as LeNet in written digits recognition, AlexNet in object classification and VGGNet in object reidentification and verification by searching the clues of SSB within the trained models i.e. the solutions to the problems. By comparing them via various methods even ablation experiments and extreme problem cases, it can be concluded that SSB perhaps partically does exist in these problems. And finally a probability of SSB theory is established or not in deep Convolutional Neural Network networks is given.

Keywords: Theoretical Physics, spontaneous symmetry breaking, CNN, similarity metric

Procedia PDF Downloads 1
171 The Use of Smartphones as a News Resource by Female University Students in the UAE

Authors: Mahinaz Saad

Abstract:

Little empirical data exists regarding smartphone usage for news consumption in the UAE, and no previous research explored undergraduate female university students’ usage of smartphones. This represents a gap in the professional literature and makes it an important area to examine. Uses and Gratifications theory is used to study the motivations of consumers for adopting a particular type of communication tool. This theory is an audience-centred approach to understanding mass communication that assumes audiences are active consumers of media and explains why and how people seek out specific media to satisfy needs. This theory is particularly relevant given the rapid development of new communication technologies. Situated within this theoretical framework, this study utilised a quantitative research design to explore respondents’ (N=488) how and why respondents use their smartphones. Further, this study explored the relationship between mobile news use and the use of other mediums for news access and how different gratifications predict mobile hard news use and mobile soft news use. Results revealed that smartphones often replace traditional media as a news source and have become students’ primary source of news. Results also revealed that different gratifications can be used as a predictor of mobile hard news and soft news and that most students use their smartphones to access soft news. These results are fundamental in allowing us to predict possible future trends relating to news consumption in the UAE and the myriad ways in which the media landscape is changing.

Keywords: smartphones, university students, uses and gratifications, News consumption

Procedia PDF Downloads 1
170 A Framework for Green Use and Disposal of Information Communication Technology Devices

Authors: Frezer Alem Kebede

Abstract:

The notion of viewing ICT as merely support for the business process has shifted towards viewing ICT as a critical business enabler. As such, the need for ICT devices has increased, contributing to high electronic equipment acquisition and disposal. Hence, its use and disposal must be seen in light of environmental sustainability, i.e., in terms of green use and disposal. However, there are limited studies on green Use and Disposal framework to be used as guiding lens by organizations in developing countries. And this study endeavors to address that need taking one of the largest multinational ICT intensive company in the country. The design and development of this framework passed through several stages, initially factors affecting green use and disposal were identified after quantitative and qualitative data analysis then there were multiple brainstorming sessions for the design enhancement as participative modelling was employed. Given the difference in scope and magnitude of the challenges identified, the proposed framework approaches green use and disposal in four imperatives; strategically, tactically, operationally and through continuous improvement.

Keywords: Sustainability, Energy Efficiency, green ICT, green use, green disposal, green use and disposal framework

Procedia PDF Downloads 1
169 A Literature Review on the Effect of Industrial Clusters and the Absorptive Capacity on Innovation

Authors: Enrique Claver Cortes, Bartolome Marco Lajara, Eduardo Sanchez Garcia, Pedro Seva Larrosa, Encarnacion Manresa Marhuenda, Lorena Ruiz Fernandez, Esther Poveda Pareja

Abstract:

In recent decades, the analysis of the effects of clustering as an essential factor for the development of innovations and the competitiveness of enterprises has raised great interest in different areas. Nowadays, companies have access to almost all tangible and intangible resources located and/or developed in any country in the world. However, despite the obvious advantages that this situation entails for companies, their geographical location has shown itself, increasingly clearly, to be a fundamental factor that positively influences their innovative performance and competitiveness. Industrial clusters could represent a unique level of analysis, positioned between the individual company and the industry, which makes them an ideal unit of analysis to determine the effects derived from company membership of a cluster. Also, the absorptive capacity (hereinafter 'AC') can mediate the process of innovation development by companies located in a cluster. The transformation and exploitation of knowledge could have a mediating effect between knowledge acquisition and innovative performance. The main objective of this work is to determine the key factors that affect the degree of generation and use of knowledge from the environment by companies and, consequently, their innovative performance and competitiveness. The elements analyzed are the companies' membership of a cluster and the AC. To this end, 30 most relevant papers published on this subject in the "Web of Science" database have been reviewed. Our findings show that, within a cluster, the knowledge coming from the companies' environment can significantly influence their innovative performance and competitiveness, although in this relationship, the degree of access and exploitation of the companies to this knowledge plays a fundamental role, which depends on a series of elements both internal and external to the company.

Keywords: Innovation, Knowledge, Clusters, absorptive capacity

Procedia PDF Downloads 1
168 How Influencers Influence: The Effects of Social Media Influencers Influence on Purchase Intention and the Differences among Generation X and Millennials

Authors: Samatha Ss Sutton, Kaouther Kooli

Abstract:

In recent years social media influences (SMI) have become integrated into many companies marketing strategies to create buzz, target new and younger markets and further expand social media coverage in business (Lim et al 2017). SMI’s can be defined as online personalities with a substantial number of followers, across one or more social media platforms, with influence on their followers (Lou and Yuan 2018). Recently expenditure on influencer marketing has increased exponentially becoming an important area for marketing opportunities and strategies in the future (Lou and Yuan 2018). In order to market products and brands effectively through SMI’s it is important for business to understand the attributes of SMI that effect purchase intention (Lim et al 2017) of their followers and whether or not these attributes vary across generations so to market effectively to their specific segment or target market. The present study involves quantitative research to understand the attributes by which influence differs across generations namely Generation X and Millennials and its effects on purchase intentions of these generational groups. A survey will be conducted using an online questionnaire. Structural Equation Modelling and Multi group analysis will be applied. The study provides insight to marketers/decision makers on how to use influencers accordingly with their target consumer.

Keywords: Social Media Marketing, intention to purchase, social media influencers, Attitude towards social media influencers

Procedia PDF Downloads 1
167 Digital Transformation as the Subject of the Knowledge Model of the Discursive Space

Authors: Rafal Maciag

Abstract:

Due to the development of the current civilization, one must create suitable models of its pervasive massive phenomena. Such a phenomenon is the digital transformation, which has a substantial number of disciplined, methodical interpretations forming the diversified reflection. This reflection could be understood pragmatically as the current temporal, a local differential state of knowledge. The model of the discursive space is proposed as a model for the analysis and description of this knowledge. Discursive space is understood as an autonomous multidimensional space where separate discourses traverse specific trajectories of what can be presented in multidimensional parallel coordinate system. Discursive space built on the world of facts preserves the complex character of that world. Digital transformation as a discursive space has a relativistic character that means that at the same time, it is created by the dynamic discourses and these discourses are molded by the shape of this space.

Keywords: Knowledge, Complexity, discourse, Digital transformation, discursive space

Procedia PDF Downloads 1
166 A Tool for Assessing Performance and Structural Quality of Business Process

Authors: Faiez Gargouri, Mariem Kchaou, Wiem Khlif

Abstract:

Modeling business processes is an essential task when evaluating, improving, or documenting existing business processes. To be efficient in such tasks, a business process model (BPM) must have high structural quality and high performance. Evidently, evaluating the performance of a business process model is a necessary step to reduce time, cost, while assessing the structural quality aims to improve the understandability and the modifiability of the BPMN model. To achieve these objectives, a set of structural and performance measures have been proposed. Since the diversity of measures, we propose a framework that integrates both structural and performance aspects for classifying them. Our measure classification is based on business process model perspectives (e.g., informational, functional, organizational, behavioral, and temporal), and the elements (activity, event, actor, etc.) involved in computing the measures. Then, we implement this framework in a tool assisting the structural quality and the performance of a business process. The tool helps the designers to select an appropriate subset of measures associated with the corresponding perspective and to calculate and interpret their values in order to improve the structural quality and the performance of the model.

Keywords: Performance, Perspectives, tool, measures, classification framework, structural quality

Procedia PDF Downloads 1
165 Overview of a Quantum Model for Decision Support in a Sensor Network

Authors: Shahram Payandeh

Abstract:

This paper presents an overview of a model which can be used as a part of a decision support system when fusing information from multiple sensing environment. Data fusion has been widely studied in the past few decades and numerous frameworks have been proposed to facilitate decision making process under uncertainties. Multi-sensor data fusion technology plays an increasingly significant role during people tracking and activity recognition. This paper presents an overview of a quantum model as a part of a decision-making process in the context of multi-sensor data fusion. The paper presents basic definitions and relationships associating the decision-making process and quantum model formulation in the presence of uncertainties.

Keywords: Decision Support, Sensor Network, quantum model, sensor space

Procedia PDF Downloads 1
164 Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4

Authors: Mardiyansyah Mardiyansyah, Hendrik Maulana, Eka Kurnia Sari, Imam Baehaki, Mohammad Agus Prihandono

Abstract:

Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia.

Keywords: Mobile Security, Regulations, mobile security framework, NIST SP 1800-4

Procedia PDF Downloads 1
163 StockTwits Sentiment Analysis on Stock Price Prediction

Authors: Min Chen, Rubi Gupta

Abstract:

Understanding and predicting stock market movements is a challenging problem. It is believed stock markets are partially driven by public sentiments, which leads to numerous research efforts to predict stock market trend using public sentiments expressed on social media such as Twitter but with limited success. Recently a microblogging website StockTwits is becoming increasingly popular for users to share their discussions and sentiments about stocks and financial market. In this project, we analyze the text content of StockTwits tweets and extract financial sentiment using text featurization and machine learning algorithms. StockTwits tweets are first pre-processed using techniques including stopword removal, special character removal, and case normalization to remove noise. Features are extracted from these preprocessed tweets through text featurization process using bags of words, N-gram models, TF-IDF (term frequency-inverse document frequency), and latent semantic analysis. Machine learning models are then trained to classify the tweets' sentiment as positive (bullish) or negative (bearish). The correlation between the aggregated daily sentiment and daily stock price movement is then investigated using Pearson’s correlation coefficient. Finally, the sentiment information is applied together with time series stock data to predict stock price movement. The experiments on five companies (Apple, Amazon, General Electric, Microsoft, and Target) in a duration of nine months demonstrate the effectiveness of our study in improving the prediction accuracy.

Keywords: Machine Learning, sentiment analysis, stock price prediction, tweet processing

Procedia PDF Downloads 1
162 Motivational Antecedents that Influenced a Higher Education Institution in the Philippines to Adopt Enterprise Architecture

Authors: Ma. Eliza Jijeth V. dela Cruz

Abstract:

Technology is a recent prodigy in people’s everyday life that has taken off. It infiltrated almost every aspect of one’s lives, changing how people work, how people learn and how people perceive things. Academic Institutions, just like other organizations, have deeply modified its strategies to integrate technology into the institutional vision and corporate strategy that has never been greater. Information and Communications Technology (ICT) continues to be recognized as a major factor in organizations realizing its aims and objectives. Consequently, ICT has an important role in the mobilization of an academic institution’s strategy to support the delivery of operational, strategic or transformational objectives. This ICT strategy should align the institution with the radical changes of the ICT world through the use of Enterprise Architecture (EA). Hence, EA’s objective is to optimize the islands of legacy processes to be integrated that is receptive to change and supportive of the delivery of the strategy. In this paper, the focus is to explore the motivational antecedents during the adoption of EA in a Higher Education Institution in the Philippines for its ICT strategic plan. The seven antecedents (viewpoint, stakeholders, human traits, vision, revolutionary innovation, techniques and change components) provide understanding into EA adoption and the antecedents that influences the process of EA adoption.

Keywords: Enterprise Architecture‎, Adoption, antecedents, Higher Educational Institutions

Procedia PDF Downloads 1
161 SNR Classification Using Multiple CNNs

Authors: Thinh Ngo, Paul Rad, Brian Kelley

Abstract:

Noise estimation is essential in today wireless systems for power control, adaptive modulation, interference suppression and quality of service. Deep learning (DL) has already been applied in the physical layer for modulation and signal classifications. Unacceptably low accuracy of less than 50% is found to undermine traditional application of DL classification for SNR prediction. In this paper, we use divide-and-conquer algorithm and classifier fusion method to simplify SNR classification and therefore enhances DL learning and prediction. Specifically, multiple CNNs are used for classification rather than a single CNN. Each CNN performs a binary classification of a single SNR with two labels: less than, greater than or equal. Together, multiple CNNs are combined to effectively classify over a range of SNR values from −20 ≤ SNR ≤ 32 dB.We use pre-trained CNNs to predict SNR over a wide range of joint channel parameters including multiple Doppler shifts (0, 60, 120 Hz), power-delay profiles, and signal-modulation types (QPSK,16QAM,64-QAM). The approach achieves individual SNR prediction accuracy of 92%, composite accuracy of 70% and prediction convergence one order of magnitude faster than that of traditional estimation.

Keywords: classification, Deep learning, prediction, SNR, CNN

Procedia PDF Downloads 1
160 The Current Status of Middle Class Internet Use in China: An Analysis Based on the Chinese General Social Survey 2015 Data and Semi-Structured Investigation

Authors: Abigail Qian Zhou

Abstract:

In today's China, the well-educated middle class, with stable jobs and above-average income, are the driving force behind its Internet society. Through the analysis of data from the 2015 Chinese General Social Survey and 50 interviewees, this study investigates the current situation of this group’s specific internet usage. The findings of this study demonstrate that daily life among the members of this socioeconomic group is closely tied to the Internet. For Chinese middle class, the Internet is used to socialize and entertain self and others. It is also used to search for and share information as well as to build their identities. The empirical results of this study will provide a reference, supported by factual data, for enterprises seeking to target the Chinese middle class through online marketing efforts.

Keywords: Online Marketing, China, middle class, internet use, network behaviour

Procedia PDF Downloads 1
159 The Use of Mobile Phones by Refugees to Create Social Connectedness: A Literature Review

Authors: Sarah Vuningoma, Maria Rosa Lorini, Wallace Chigona

Abstract:

Mobile phones are one of the main tools for promoting the wellbeing of people and supporting the integration of communities on the margins such as refugees. Information and Communication Technology has the potential to contribute towards reducing isolation, loneliness, and to assist in improving interpersonal relations and fostering acculturation processes. Therefore, the use of mobile phones by refugees might contribute to their social connectedness. This paper aims to demonstrate how existing literature has shown how the use of mobile phones by refugees should engender social connectedness amongst the refugees. Data for the study are drawn from existing literature; we searched a number of electronic databases for papers published between 2010 and 2019. The main findings of the study relate to the use of mobile phones by refugees to (i) create a sense of belonging, (ii) maintain relationships, and (iii) advance the acculturation process. The analysis highlighted a gap in the research over refugees and social connectedness. In particular, further studies should consider evaluating the differences between those who have a refugee permit, those who are waiting for the refugee permit, and those whose request was denied.

Keywords: Refugees, Mobile Phones, belonging, social connectedness

Procedia PDF Downloads 1
158 Analysis of Scholarly Communication Patterns in Korean Studies

Authors: Erin Hea-Jin Kim

Abstract:

This study aims to investigate scholarly communication patterns in Korean studies, which focuses on all aspects of Korea, including history, culture, literature, politics, society, economics, religion, and so on. It is called ‘national study or home study’ as the subject of the study is itself, whereas it is called ‘area study’ as the subject of the study is others, i.e., outside of Korea. Understanding of the structure of scholarly communication in Korean studies is important since the motivations, procedures, results, or outcomes of individual studies may be affected by the cooperative relationships that appear in the communication structure. To this end, we collected 1,798 articles with the (author or index) keyword ‘Korean’ published in 2018 from the Scopus database and extracted the institution and country of the authors using a text mining technique. A total of 96 countries, including South Korea, was identified. Then we constructed a co-authorship network based on the countries identified. The indicators of social network analysis (SNA), co-occurrences, and cluster analysis were used to measure the activity and connectivity of participation in collaboration in Korean studies. As a result, the highest frequency of collaboration appears in the following order: S. Korea with the United States (603), S. Korea with Japan (146), S. Korea with China (131), S. Korea with the United Kingdom (83), and China with the United States (65). This means that the most active participants are S. Korea as well as the USA. The highest rank in the role of mediator measured by betweenness centrality appears in the following order: United States (0.165), United Kingdom (0.045), China (0.043), Japan (0.037), Australia (0.026), and South Africa (0.023). These results show that these countries contribute to connecting in Korean studies. We found two major communities among the co-authorship network. Asian countries and America belong to the same community, and the United Kingdom and European countries belong to the other community. Korean studies have a long history, and the study has emerged since Japanese colonization. However, Korean studies have never been investigated by digital content analysis. The contributions of this study are an analysis of co-authorship in Korean studies with a global perspective based on digital content, which has not attempted so far to our knowledge, and to suggest ideas on how to analyze the humanities disciplines such as history, literature, or Korean studies by text mining. The limitation of this study is that the scholarly data we collected did not cover all domestic journals because we only gathered scholarly data from Scopus. There are thousands of domestic journals not indexed in Scopus that we can consider in terms of national studies, but are not possible to collect.

Keywords: Korean Studies, Scholarly Communication, co-authorship network, Koreanology

Procedia PDF Downloads 1
157 Information Communication Technologies and Renewable Technologies' Impact on Irish People's Lifestyle: A Constructivist Grounded Theory Study

Authors: Hamilton V. Niculescu

Abstract:

This paper discusses findings relating to people's engagement with mobile communication technologies and remote automated systems. This interdisciplinary study employs a constructivist grounded theory methodology, with qualitative data that was generated following in-depth semi-structured interviews with 18 people living in Ireland being corroborated with participants' observations and quantitative data. Additional data was collected following participants' remote interaction with six custom-built automated enclosures, located at six different sites around Dublin, Republic of Ireland. This paper argues that ownership and education play a vital role in people engaging with and adoption of new technologies. Analysis of participants' behavior and attitude towards Information Communication Technologies (ICT) suggests that innovations do not always improve peoples' social inclusion. Technological innovations are sometimes perceived as destroying communities and create a dysfunctional society. Moreover, the findings indicate that a lack of public information and support from Irish governmental institutions, as well as limited off-the-shelves availability, has led to low trust and adoption of renewable technologies. A limited variation in participants' behavior and interaction patterns with technologies was observed during the study. This suggests that people will eventually adopt new technologies according to their needs and experience, even though they initially rejected the idea of changing their lifestyle.

Keywords: Automation, Communication, ICT, Renewables

Procedia PDF Downloads 1
156 A Constructivist Grounded Theory Study on the Impact of Automation on People and Gardening

Authors: Hamilton V. Niculescu

Abstract:

Following a three year study conducted on eighteen Irish people that are involved in growing vegetables in various community gardens around Dublin, Republic of Ireland, it was revealed that addition of some automated features aimed at improving agricultural practices represented a process which was regarded as potentially beneficial, and as a great tool to closely monitor climate conditions inside the greenhouses. The participants were provided with a free custom-built mobile app through which they could remotely monitor and control features such as irrigation, air ventilation, and windows to ensure optimal growing conditions for vegetables growing inside purpose-built greenhouses. While the initial interest was generally high, within weeks, the participants' level of interaction with the enclosures slowly declined. By employing a constructivist grounded theory methodology, following focus group discussions, in-depth semi-structured interviews, and observations, it was revealed that participants' trust in newer technologies, and renewables, in particular, was low. There are various reasons for this, but because the participants in this study consist of mainly working-class people, it can be argued that lack of education and knowledge are the main barriers acting against the adoption of innovations. Consequently, it was revealed that most participants eventually decided to "set and forget" the systems in automatic working mode, indicating that the immediate effect of introducing people to assisting technologies also introduced some unintended consequences into their lifestyle. It is argued that this occurrence also indicates the fact that people initially "read" newer technologies and only adopt those features that they find useful and less intrusive in regards to their current lifestyle.

Keywords: Automation, Communication, Sustainable, Greenhouse

Procedia PDF Downloads 1
155 Community Observatory for Territorial Information Control and Management

Authors: A. Olivi, P. Reyes Cabrera

Abstract:

Ageing and urbanization are two of the main trends that characterize the twenty-first century. Its trending is especially accelerated in the emerging countries of Asia and Latin America. Chile is one of the countries in the Latin American region, where the demographic transition to ageing is becoming increasingly visible. The challenges that the new demographic scenario poses to urban administrators call for searching innovative solutions to maximize the functional and psycho-social benefits derived from the relationship between older people and the environment in which they live. Although mobility is central to people's everyday practices and social relationships, it is not distributed equitably. On the contrary, it can be considered another factor of inequality in our cities. Older people are a particularly sensitive and vulnerable group to mobility. In this context, based on the ageing in place strategy and following the social innovation approach within a spatial context, the "Community Observatory of Territorial Information Control and Management" project aims at the collective search and validation of solutions for the satisfaction of mobility and accessibility specific needs of urban aged people. Specifically, the Observatory intends to: i) promote the direct participation of the aged population in order to generate relevant information on the territorial situation and the satisfaction of the mobility needs of this group; ii) co-create dynamic and efficient mechanisms for the reporting and updating of territorial information; iii) increase the capacity of the local administration to plan and manage solutions to environmental problems at the neighborhood scale. Based on a participatory mapping methodology and on the application of digital technology, the Observatory designed and developed, together with aged people, a crowdsourcing platform for smartphones, called DIMEapp, for reporting environmental problems affecting mobility and accessibility. DIMEapp has been tested at a prototype level in two neighborhoods of the city of Valparaiso. The results achieved in the testing phase have shown high potential in order to i) contribute to establishing coordination mechanisms with the local government and the local community; ii) improve a local governance system that guides and regulates the allocation of goods and services destined to solve those problems.

Keywords: Ageing, Accessibility, Digital Technology, City, local governance

Procedia PDF Downloads 1