Search results for: consumer privacy
1393 Impact of Audit Committee on Earning Quality of Listed Consumer Goods Companies in Nigeria
Authors: Usman Yakubu, Muktar Haruna
Abstract:
The paper examines the impact of the audit committee on the earning quality of the listed consumer goods sector in Nigeria. The study used data collected from annual reports and accounts of the 13 sampled companies for the periods 2007 to 2018. Data were analyzed by means of descriptive statistics to provide summary statistics for the variables; also, correlation analysis was carried out using the Pearson correlation technique for the correlation between the dependent and independent variables. Regression was employed using the Generalized Least Square technique since the data has both time series and cross sectional attributes (panel data). It was found out that the audit committee had a positive and significant influence on the earning quality in the listed consumer goods companies in Nigeria. Thus, the study recommends that competency and personal integrity should be the worthwhile attributes to be considered while constituting the committee; this could enhance the quality of accounting information. In addition to that majority of the committee members should be independent directors in order to allow a high level of independency to be exercised.Keywords: earning quality, corporate governance, audit committee, financial reporting
Procedia PDF Downloads 1721392 Importance of Ethics in Cloud Security
Authors: Pallavi Malhotra
Abstract:
This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education
Procedia PDF Downloads 3251391 The Factors Influencing Consumer Behavior of Beverage in Retail Stores Chiang Mai Province
Authors: Winita Kitisak, Boontarika Panyomoon, Siriyakorn Nilpoun, Nithit Yosit, Peeraya Somsak
Abstract:
The purpose of this study will affect the marketing mix that influences the consumers’ behavior towards beverage purchasing from retail stores. It aims to study the consumers and to better understand their behaviors and factors influencing their decision making on buying beverage in retail stores. We study the example of 400 consumers in Chiang Mai. The study shows that most of the respondents were male, 50 percent is 20-30 year old, and 36.66 percent is 31-40 year old, only 2.66 percent is upper 50 years old, bachelor’s degree holders, working in business field and student with 10,001-15,000 Baht income. Most buyers spend 4-6 times a week buying cheap beverage from retail stores. The consumer bought alcoholic beverages, green tea drinks, and soft drinks, but the mainly purchased product was beer. The results indicate that the brand of the product motivates more on consumers’ demand. While shelf displays, products presentation, and sales promotion affect the most on the consumers’ decision to purchase from the retail stores, the promotions moderately impact the consumers’ decision on purchasing from retail stores.Keywords: consumer behavior, beverage, retail stores, convenience store
Procedia PDF Downloads 2231390 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption
Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme
Procedia PDF Downloads 3791389 Between a Rock and a Hard Place: The Impact of Inflation on Global Supply Chains
Authors: Elad Harison
Abstract:
The paper identifies the complex links between post-COVID-19 inflationary pressures and global supply chains. Throughout the COVID-19 lockdowns and long periods after the termination of social distancing policies, consumers, notably in the U.S., have confronted and still face disruptions in the supply of goods. The study analyzes the monetary policy in the U.S. that led to the significant shift in consumer demand during a limited supply period, hence resulting in shortages and emphasizing inflationary dynamics. We argue that the monetary guidelines applied by the U.S. government further elevated the scope of supply chain disruptions.Keywords: consumer demand, COVID-19, inflation, monetary policy, supply chain
Procedia PDF Downloads 921388 Adolescents’ Role in Family Buying Decision Making
Authors: Harleen Kaur, Deepika Jindal Singla
Abstract:
Buying decision making is a complicated process, in which consumer’s decision is under the impact of others. The buying decision making is directed in a way that they have to act as customers in the society. Media and family are key socialising agents for adolescents’. Moreover, changes in the socio-cultural environment in India necessitate that adolescents’ influence in family’s buying decision-making should be investigated. In comparison to Western society, Indian is quite different, when compared in terms of family composition and structure, behaviour, values and norms which effect adolescents’ buying decision-making.Keywords: adolescents, buying behavior, Indian urban families, consumer socialization
Procedia PDF Downloads 4781387 Personal Data Protection: A Legal Framework for Health Law in Turkey
Authors: Veli Durmus, Mert Uydaci
Abstract:
Every patient who needs to get a medical treatment should share health-related personal data with healthcare providers. Therefore, personal health data plays an important role to make health decisions and identify health threats during every encounter between a patient and caregivers. In other words, health data can be defined as privacy and sensitive information which is protected by various health laws and regulations. In many cases, the data are an outcome of the confidential relationship between patients and their healthcare providers. Globally, almost all nations have own laws, regulations or rules in order to protect personal data. There is a variety of instruments that allow authorities to use the health data or to set the barriers data sharing across international borders. For instance, Directive 95/46/EC of the European Union (EU) (also known as EU Data Protection Directive) establishes harmonized rules in European borders. In addition, the General Data Protection Regulation (GDPR) will set further common principles in 2018. Because of close policy relationship with EU, this study provides not only information on regulations, directives but also how they play a role during the legislative process in Turkey. Even if the decision is controversial, the Board has recently stated that private or public healthcare institutions are responsible for the patient call system, for doctors to call people waiting outside a consultation room, to prevent unlawful processing of personal data and unlawful access to personal data during the treatment. In Turkey, vast majority private and public health organizations provide a service that ensures personal data (i.e. patient’s name and ID number) to call the patient. According to the Board’s decision, hospital or other healthcare institutions are obliged to take all necessary administrative precautions and provide technical support to protect patient privacy. However, this application does not effectively and efficiently performing in most health services. For this reason, it is important to draw a legal framework of personal health data by stating what is the main purpose of this regulation and how to deal with complicated issues on personal health data in Turkey. The research is descriptive on data protection law for health care setting in Turkey. Primary as well as secondary data has been used for the study. The primary data includes the information collected under current national and international regulations or law. Secondary data include publications, books, journals, empirical legal studies. Consequently, privacy and data protection regimes in health law show there are some obligations, principles and procedures which shall be binding upon natural or legal persons who process health-related personal data. A comparative approach presents there are significant differences in some EU member states due to different legal competencies, policies, and cultural factors. This selected study provides theoretical and practitioner implications by highlighting the need to illustrate the relationship between privacy and confidentiality in Personal Data Protection in Health Law. Furthermore, this paper would help to define the legal framework for the health law case studies on data protection and privacy.Keywords: data protection, personal data, privacy, healthcare, health law
Procedia PDF Downloads 2241386 Revolutionizing Product Packaging: The Impact of Transparent Graded Lanes on Ketchup and Edible Oils Containers on Consumer Behavior
Authors: Saeid Asghari
Abstract:
The growing interest in sustainability and healthy lifestyles has stimulated the development of solutions that promote mindful consumption and healthier choices. One such solution is the use of transparent graded lanes in product packaging, which enables consumers to visually track their product consumption and encourages portion control. However, the extent to which this packaging affects consumer behavior, trust, and loyalty towards a product or brand, as well as the effectiveness of messaging on the graded lanes, remains unclear. The research aims to examine the impact of transparent graded lanes on consumer behavior, trust, and loyalty towards products or brands in the context of the Janbo chain supermarket in Tehran, Iran, focusing on Ketchup and edible oils containers. A representative sample of 720 respondents is selected using quota sampling based on sex, age, and financial status. The study assesses the effect of messaging on the graded lanes in enhancing consumer recall and recognition of the product at the time of purchase, increasing repeat purchases, and fostering long-term relationships with customers. Furthermore, the potential outcomes of using transparent graded lanes, including the promotion of healthy consumption habits and the reduction of food waste, are also considered. The findings and results can inform the development of effective messaging strategies for graded lanes and suggest ways to enhance consumer engagement with product packaging. Moreover, the study's outcomes can contribute to the broader discourse on sustainable consumption and healthy lifestyles, highlighting the potential role of packaging innovations in promoting these values. We used four theories (social cognitive theory, self-perception theory, nudge theory, and marketing and consumer behavior) to examine the effect of these transparent graded lanes on consumer behavior. The conceptual model integrates the use of transparent graded lanes, consumer behavior, trust and loyalty, messaging, and promotion of healthy consumption habits. The study aims to provide insights into how transparent graded lanes can promote mindful consumption, increase consumer recognition and recall of the product, and foster long-term relationships with customers. Findings suggest that the use of transparent graded lanes on Ketchup and edible oils containers can have a positive impact on consumer behavior, trust, and loyalty towards a product or brand, as well as promote mindful consumption and healthier choices. The messaging on the graded lanes is also found to be effective in promoting recall and recognition of the product at the time of purchase and encouraging repeat purchases. However, the impact of transparent graded lanes may be limited by factors such as cultural norms, personal values, and financial status. Broadly speaking, the investigation provides valuable insights into the potential benefits and challenges of using transparent graded lanes in product packaging, as well as effective strategies for promoting healthy consumption habits and building long-term relationships with customers.Keywords: packaging customer behavior, purchase, brand loyalty, healthy consumption
Procedia PDF Downloads 2521385 Development of Non-frozen Vegan Burger Patty Using Tender Jackfruit (Artocarpus Heterophyllus) as a Meat Substitute: Evaluation of Textural, Physico-Chemical, and Sensory Characteristics
Authors: O. D. A. N. Perera, H. G. Wanigasinghe
Abstract:
Tender jackfruit is an underutilized biomass, which still has a good consumer demand. Valorization of this ingredient into meat analog would obtain greater consumer acceptance due to concerns about health, the environment, and living sustainably of mankind have increased significantly in this decade, opening the market for meat substitutes. The objective of this research was to create a plant-based meat substitute with a structure similar to meat products. In this study, three different combinations of tender jackfruit were used to create vegan burger patties, which were then examined for their textural, physico-chemical, and sensory qualities. The developed burger patties have been compared with store-bought chicken patties. The developed vegan burger patties P1, P2, and P3 had a comparable flavor preference to the control and demonstrated considerable general acceptability (p >.05). P3 has a high quantity of protein (17.10 ± 0.02%) and fiber (6.40 ± 0.06%). At the same time, the vegan burger patty resulted in less fat, high fiber, and high protein which meets the vegan consumer requirements.Keywords: underutilized, high fibre, soya protein isolate, cooking yield
Procedia PDF Downloads 651384 The Emotions in Consumers’ Decision Making: Review of Empirical Studies
Authors: Mikel Alonso López
Abstract:
This paper explores, in depth, the idea that emotions are present in all consumer decision making processes, meaning that purchase decisions have never been purely cognitive or as they traditionally have been defined, rational. Human beings, in all kinds of decisions, has "always" used neural systems related to emotions along with neural systems related to cognition, regardless of the type of purchase or the product or service in question. Therefore, all purchase decisions are, at the same time, cognitive and emotional. This paper presents an analysis of the main contributions of researchers in this regard.Keywords: emotions, decision making, consumer behaviour, emotional behaviour
Procedia PDF Downloads 3921383 Evolving Jurisprudence of Rape Laws in India: A Study of Last One Decade
Authors: Drutika Upadhyay
Abstract:
Rape is one of the most heinous crimes committed against the body of a woman violating her privacy and dignity. The Right to Privacy and the Right to Live with Dignity constitute the very essence of the Right to Life and Personal Liberty, a Fundamental Right guaranteed under Article 21 of the Indian Constitution. The study is conducted with the primary objective of analyzing the efficacy of rape laws in India. The study begins by explaining the origin, meaning, and kinds of rape recognised under Indian jurisprudence. Further, it explains various statutory and penal provisions relating to rape and the loopholes in such provisions. It focuses on the procedure followed during investigation and trial and also aims at developing an understanding of the rights of the victim and the sentence in cases of rape. The study also throws some light upon the amendments made to the criminal law and the recommendations of the Law Commission of India to meet the demands of the changing criminal justice delivery system. The outcome of the study suggests that the laws relating to rape have proved to be a major failure owing to the lack of proper implementation. Also, the lack of education among the masses leads to gender biasness, which is the ultimate cause for the commission of such crime. At last, the author concludes that the present criminal law system of the country contains various lacunae that need to be filled in so as to make the criminal justice system more stringent. Further, the scope of the definition of ‘rape’ needs to be widened in order to include such other acts of non-consensual and sexual nature that are currently not included in the definition. The author has adopted a non-doctrinal and analytical approach and relied upon the secondary sources of data for the purpose of the study. The scope of the study is limited to the crime committed against women.Keywords: amendment, criminal law, fundamental right, personal liberty, privacy, rape
Procedia PDF Downloads 1301382 Consumer Market for Mineral Water and Development Policy in Georgia
Authors: Gulnaz Erkomaishvili
Abstract:
The paper discusses mineral water consumer market and development policy in Georgia, the tools and measures, which will contribute to the production of mineral waters and increase its export. The paper studies and analyses current situation in mineral water production sector as well as the factors affecting increase and reduction of its export. It’s noted that in order to gain and maintain competitive advantage, it’s necessary to provide continuous supply of high-quality goods with modern design, open new distribution channels to enter new markets, carry out broad promotional activities, organize e-commerce. Economic policy plays an important role in protecting markets from counterfeit goods. The state also plays an important role in attracting foreign direct investments. Stable business environment and export-oriented strategy is the basis for the country’s economic growth. Based on the research, the paper suggests the strategy for improving the competitiveness of Georgian mineral waters, relevant conclusions and recommendations are provided.Keywords: mineral waters, consumer market for mineral waters, export of mineral waters, mineral water development policy in Georgia
Procedia PDF Downloads 4281381 From Service to Ritual: Preliminary Development on Conceptual Framework for Designing Ritual
Authors: Yi-Jing Lee
Abstract:
Prior to the development of ritual design tool and framework, this paper establishes a systematic review on the studies related to ritual and ritual design across anthropology, consumer culture, marketing, and design. It is found that following symbolic anthropologists, the ethnographic approach was adapted by consumer culture researchers to study modern rituals and marketers to enhance consumption. In the domain of design, although there are already designers aware of the importance of ritualistic dimension of human interaction, there are little frameworks for conceptualizing and developing rituals. The conceptualized framework and developing tools is proposed and suggestions of applying it is made in the end of the paper.Keywords: ritual, ritual design, service design, symbolic interaction
Procedia PDF Downloads 1931380 Consumer Value and Purchase Behaviour: The Mediating Role of Consumers' Expectations of Corporate Social Responsibility in Durban, South Africa
Authors: Abosede Ijabadeniyi, Jeevarathnam P. Govender
Abstract:
Prevailing strategic Corporate Social Responsibility (CSR) research is predominantly centred around the predictive implications of the construct on behavioural outcomes. This phenomenon limits the depth of our understanding of the trajectory of strategic CSR. The purpose of this paper is to investigate the mediating effects of CSR expectations on the relationship between consumer value and purchase behaviour by identifying the implications of the multidimensionality of CSR (economic, legal, ethical and philanthropic) on the latter. Drawing from the stakeholder theory and its interplay with the prevalence of Ubuntu values; the underlying force which governs the values of South African camaraderie, we hypothesise that the multidimensionality of CSR expectations has positive mediating effects in the relationship between consumer value and purchase behaviour. Partial Least Square (PLS) path modelling was employed, using six measures of the average path coefficient (APC) to test the relationship between the constructs. Results from a sample of mall shoppers of (n=411), based on a survey conducted across five major malls in Durban, South Africa, indicate that only the legal dimension of CSR serves as a mediating factor in the relationship among the constructs. South Africa’s unique history of segregation, leading to the proliferation of spontaneous organisational approach to CSR and higher expectations of organisational legitimacy are identified as antecedents of consumers’ reliance on the law (legal CSR) to redress the ills of the past, sustainable development, and socially responsible behaviour. The paper also highlights theoretical and managerial implications for future research.Keywords: consumer value, corporate marketing, corporate social responsibility, purchase behaviour, Ubuntu
Procedia PDF Downloads 3691379 Impact of Negative News on Ethical Fashion: Case Study to Investigate the Effect of Fashion CSR Ad Framing on Purchase Intention
Authors: Dana Lee, Young Chan Kim
Abstract:
The purpose of this paper is to examine the relationship between the fashion corporate social responsibility (CSR) ad framing and consumer purchase behaviours with the focus on consumer’s concern and involvement towards fashion brands. A self-completion questionnaire was administered to 200 respondents. Factor analysis and other statistical analyses were applied to test hypotheses. The results suggested that the quality of the product was the most important factor when consumers purchase fashion brand products with high level of responsibility towards unethical practices but surprisingly favourability for fast fashion. Unexpectedly, it was shown that consumers took the plenty of blame, but not much responsibility on buying fast fashion evading their responsibility to CSR ad, and their purchase intentions remained unchanged. The result, on the other hand, showed that fashion CSR ads can significantly moderate individuals’ emotions even though this had no significant correlation with the purchase intentions. Despite the limited sample size and geographical region, this research has important implications for contemporary fashion brands that use ad framing to understand how consumers’ involvement and concernedness toward the CSR actions in ad, influence their favourability (purchase intention) for fashion brands.Keywords: framing effect, CSR advertisements, consumer behaviour, purchase intention
Procedia PDF Downloads 2101378 Analyzing Consumer Preferences and Brand Differentiation in the Notebook Market via Social Media Insights and Expert Evaluations
Authors: Mohammadreza Bakhtiari, Mehrdad Maghsoudi, Hamidreza Bakhtiari
Abstract:
This study investigates consumer behavior in the notebook computer market by integrating social media sentiment analysis with expert evaluations. The rapid evolution of the notebook industry has intensified competition among manufacturers, necessitating a deeper understanding of consumer priorities. Social media platforms, particularly Twitter, have become valuable sources for capturing real-time user feedback. In this research, sentiment analysis was performed on Twitter data gathered in the last two years, focusing on seven major notebook brands. The PyABSA framework was utilized to extract sentiments associated with various notebook components, including performance, design, battery life, and price. Expert evaluations, conducted using fuzzy logic, were incorporated to assess the impact of these sentiments on purchase behavior. To provide actionable insights, the TOPSIS method was employed to prioritize notebook features based on a combination of consumer sentiments and expert opinions. The findings consistently highlight price, display quality, and core performance components, such as RAM and CPU, as top priorities across brands. However, lower-priority features, such as webcams and cooling fans, present opportunities for manufacturers to innovate and differentiate their products. The analysis also reveals subtle but significant brand-specific variations, offering targeted insights for marketing and product development strategies. For example, Lenovo's strong performance in display quality points to a competitive edge, while Microsoft's lower ranking in battery life indicates a potential area for R&D investment. This hybrid methodology demonstrates the value of combining big data analytics with expert evaluations, offering a comprehensive framework for understanding consumer behavior in the notebook market. The study emphasizes the importance of aligning product development and marketing strategies with evolving consumer preferences, ensuring competitiveness in a dynamic market. It also underscores the potential for innovation in seemingly less important features, providing companies with opportunities to create unique selling points. By bridging the gap between consumer expectations and product offerings, this research equips manufacturers with the tools needed to remain agile in responding to market trends and enhancing customer satisfaction.Keywords: consumer behavior, customer preferences, laptop industry, notebook computers, social media analytics, TOPSIS
Procedia PDF Downloads 241377 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application
Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba
Abstract:
NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)
Procedia PDF Downloads 3021376 Language Effects on the Prestige and Product Image of Advertised Smartphone in Consumer Purchases in Indonesia
Authors: Vidyarini Dwita, Rebecca Fanany
Abstract:
This study will discuss the growth of the market for smartphone technology in Indonesia. This country, with the world’s fourth largest population, has a reputation as the social media capital of the world, and this reputation is largely justified. The penetration of social media is high in Indonesia which has one of the largest global markets. Most Indonesian users of Facebook, Twitter and other social media platforms access the sites from their mobile phones. Indonesia is expected to continue to be a major market for digital mobile devices, such as smartphone and tablets that can access the internet. The aim of this study to describe the way responses of Indonesian consumers to smartphone advertising using English and Indonesian will impact on their perceptions of the prestige and product image of the advertised items and thus influence consumer intention to purchase the item. Advertising for smartphones and similar products is intense and dynamic and often draws on the social attitudes of Indonesians with respect to linguistic and cultural content and especially appeals to their desire to be part of global mainstream culture. The study uses a qualitative method based on in-depth interviews with 30 participants. Content analysis is employed to analyse the responses of Indonesian consumers to smartphone advertising that uses English and Indonesian text. Its findings indicate that consumers’ impressions of English and Indonesian slogans influence their attitudes toward smartphones, suggesting that linguistic context plays a role in influencing consumer purchases.Keywords: consumer purchases, marketing communication, product image, smartphone advertising, sociolinguistic
Procedia PDF Downloads 2241375 VCloud: A Security Framework for VANET
Authors: Wiseborn Manfe Danquah, D. Turgay Altilar
Abstract:
Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)
Procedia PDF Downloads 3541374 Digital Skepticism In A Legal Philosophical Approach
Authors: dr. Bendes Ákos
Abstract:
Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity.Keywords: legal philosophy, privacy, security, ethics, digital skepticism
Procedia PDF Downloads 431373 Assessment the Manner of Obtaining Hierarchies and Privacy of Traditional Houses Entrance in Providing a Safe Place-Case Study: Traditional Houses in Shiraz
Authors: Zahra A. Barzegar, Maryam B. Golboo
Abstract:
In this paper, the manner of obtaining hierarchies and privacy entry of traditional houses in providing a safe place in the city of Shiraz will be evaluated by qualitative–descriptive methods and 6 old houses are the case study. The houses of Shiraz, as the houses in other cities in Iran are a response to climate and physical features. The old part of Shiraz has a compressed and dense texture in which the houses are in narrow and tight alleys. In this regard, the principles of traditional house entrance design have been introduced. The results show that every house has a private entrance. Direction of the entry of most houses is toward the south and with a turn to the South-East side. Entrance to yard path in all the cases is not straight, and this had been done by using 90 degrees rotates of the corridor leading to the yard. Vestibule provides a private place for the house and entrance stairway to the rooftop is located inside it.Keywords: entrance, components of entrance, hierarchy, frontage, Shiraz houses
Procedia PDF Downloads 3091372 The Effect of Technology and Artifical Intelligence on Legal Securities and Privacy Issues
Authors: Kerolis Samoul Zaghloul Noaman
Abstract:
area law is the brand new access in the basket of worldwide law in the latter half of the 20 th Century. inside the last hundred and fifty years, courts and pupils advanced a consensus that, the custom is an vital supply of global law. Article 38(1) (b) of the statute of the international court of Justice identified global custom as a supply of global law. country practices and usages have a more role to play in formulating commonplace international regulation. This paper examines those country practices which may be certified to emerge as global standard law. due to the fact that, 1979 (after Moon Treaty) no hard law had been developed within the vicinity of space exploration. It attempts to link among country practices and custom in area exploration and development of standard global regulation in area activities. The paper makes use of doctrinal approach of felony research for inspecting the current questions of worldwide regulation. The paper explores exceptional worldwide prison files which include general meeting Resolutions, Treaty standards, working papers of UN, cases relating to commonplace global law and writing of jurists regarding area law and standard international law. it's far argued that, ideas such as common background of mankind, non-navy region, sovereign equality, nuclear weapon unfastened area and protection of outer area environment, etc. evolved nation practices a number of the worldwide community which can be certified to turn out to be international customary regulation.Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures
Procedia PDF Downloads 201371 Visualizing Indonesian Hijab Fashion Style in Social Media
Authors: Siti Dewi Aisyah
Abstract:
The rise of the Internet in the late twentieth century rapidly gains information and understands the world through screens. The digital way of communication through the Internet becomes an ordinary daily pattern. In the digital era, Fashion has been tremendously shared on social media platform especially because of the emergence of #OOTD (Outfit of the Day). Fashion cannot survive without the media. The media have played a vital role in shaping fashion into the complex cultural phenomenon it has become, and fashion has become an intrinsic part of today’s visual culture, and vice versa. Islamic Muslim Fashion has become a trend in Indonesia. It is said that social media has a huge impact in its development. Indonesia is ranked among the most users of social media. That is why people who wear hijab also use social media for different purposes, one of this is to introduce hijab fashion. Consequently, they are becoming famous in social media. Social media has become a tool for communicating their beliefs as a Muslim as well as personal branding as a good hijabi yet with a fashionable style. This study will examine how social media especially Blog and Instagram can lead the movement of Islamic Modest Fashion in Indonesia, how it triggers the consumer culture to hijabi, how they visualize their style in their social media. This research had been conducted through in-depth interviews with several bloggers who created Hijabers Community who have made a new trend in Islamic fashion and also Instagrammers who made their feeds as a style inspiration. This research is based on empirical research with qualitative methods (text and picture analysis). The methodology used for this research is by analyzing Blog and Instagram through visual analysis on the social media especially about the Islamic Modest Fashion trend. This research also contains a literature review of a diverse group of works on topics related to the study. This research will be examined through several theoretical frameworks including the study of social media, visual analysis and consumer culture. Fashion and consumer culture are also two main topics because fashion furthermore leads to consumer culture. The benefit of this research is for gaining the insight how social media can visualize the trend in hijab fashion style of Indonesian people.Keywords: blog, consumer culture, hijab fashion, instagram, style, visual analysis
Procedia PDF Downloads 3201370 Radio Frequency Identification Chips in Colour Preference Tracking
Authors: A. Ballard
Abstract:
The ability to track goods and products en route in the delivery system, in the warehouse, and on the top floor is a huge advantage to shippers and retailers. Recently the emergence of radio frequency identification (RFID) technology has enabled this better than ever before. However, a significant problem exists in that RFID technology depends on the quality of the information stored for each tagged product. Because of the profusion of names for colours, it is very difficult to ascertain that stored values are recognised by all users who view the product visually. This paper reports the findings of a study in which 50 consumers and 50 logistics workers were shown colour swatches and asked to choose the name of the colour from a multiple choice list. They were then asked to match consumer products, including toasters, jumpers, and toothbrushes, with the identifying inventory information available for each one. The findings show that the ability to match colours was significantly stronger with the color swatches than with the consumer products and that while logistics professionals made more frequent correct identification than the consumers, their results were still unsatisfactorily low. Based on these findings, a proposed universal model of colour identification numbers has been developed.Keywords: consumer preferences, supply chain logistics, radio frequency identification, RFID, colour preference
Procedia PDF Downloads 1201369 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme
Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme
Procedia PDF Downloads 4801368 Implications of Circular Economy on Users Data Privacy: A Case Study on Android Smartphones Second-Hand Market
Authors: Mariia Khramova, Sergio Martinez, Duc Nguyen
Abstract:
Modern electronic devices, particularly smartphones, are characterised by extremely high environmental footprint and short product lifecycle. Every year manufacturers release new models with even more superior performance, which pushes the customers towards new purchases. As a result, millions of devices are being accumulated in the urban mine. To tackle these challenges the concept of circular economy has been introduced to promote repair, reuse and recycle of electronics. In this case, electronic devices, that previously ended up in landfills or households, are getting the second life, therefore, reducing the demand for new raw materials. Smartphone reuse is gradually gaining wider adoption partly due to the price increase of flagship models, consequently, boosting circular economy implementation. However, along with reuse of communication device, circular economy approach needs to ensure the data of the previous user have not been 'reused' together with a device. This is especially important since modern smartphones are comparable with computers in terms of performance and amount of data stored. These data vary from pictures, videos, call logs to social security numbers, passport and credit card details, from personal information to corporate confidential data. To assess how well the data privacy requirements are followed on smartphones second-hand market, a sample of 100 Android smartphones has been purchased from IT Asset Disposition (ITAD) facilities responsible for data erasure and resell. Although devices should not have stored any user data by the time they leave ITAD, it has been possible to retrieve the data from 19% of the sample. Applied techniques varied from manual device inspection to sophisticated equipment and tools. These findings indicate significant barrier in implementation of circular economy and a limitation of smartphone reuse. Therefore, in order to motivate the users to donate or sell their old devices and make electronic use more sustainable, data privacy on second-hand smartphone market should be significantly improved. Presented research has been carried out in the framework of sustainablySMART project, which is part of Horizon 2020 EU Framework Programme for Research and Innovation.Keywords: android, circular economy, data privacy, second-hand phones
Procedia PDF Downloads 1281367 Nude Cosmetic Water-Rich Compositions for Skin Care and Consumer Emotions
Authors: Emmanuelle Merat, Arnaud Aubert, Sophie Cambos, Francis Vial, Patrick Beau
Abstract:
Basically, consumers are sensitive to many stimuli when applying a cream: brand, packaging and indeed formulation compositions. Many studies demonstrated the influence of some stimuli such as brand, packaging, formula color and odor (e.g. in make-up applications). Those parameters influence perceived quality of the product. The objective of this work is to further investigate the relationship between nude skincare basic compositions with different textures and consumer experience. A tentative final step will be to connect the consumer feelings with key ingredients in the compositions. A new approach was developed to better understand touch-related subjective experience in consumers based on a combination of methods: sensory analysis with ten experts, preference mapping on one hundred female consumers and emotional assessments on thirty consumers (verbal and non-verbal through prosody and gesture monitoring). Finally, a methodology based on ‘sensorial trip’ (after olfactory, haptic and musical stimuli) has been experimented on the most interesting textures with 10 consumers. The results showed more or less impact depending on compositions and also on key ingredients. Three types of formulation particularly attracted the consumer: an aqueous gel, an oil-in-water emulsion, and a patented gel-in-oil formulation type. Regarding these three formulas, the preferences were both revealed through sensory and emotion tests. One was recognized as the most innovative in consumer sensory test whereas the two other formulas were discriminated in emotions evaluation. The positive emotions were highlighted especially in prosody criteria. The non-verbal analysis, which corresponds to the physical parameters of the voice, showed high pitch and amplitude values; linked to positive emotions. Verbatim, verbal content of responses (i.e., ideas, concepts, mental images), confirmed the first conclusion. On the formulas selected for their positive emotions generation, the ‘sensorial trip’ provided complementary information to characterize each emotional profile. In the second step, dedicated to better understand ingredients power, two types of ingredients demonstrated an obvious input on consumer preference: rheology modifiers and emollients. As a conclusion, nude cosmetic compositions with well-chosen textures and ingredients can positively stimulate consumer emotions contributing to capture their preference. For a complete achievement of the study, a global approach (Asia, America territories...) should be developed.Keywords: sensory, emotion, cosmetic formulations, ingredients' influence
Procedia PDF Downloads 1791366 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach
Authors: Jumana Majdi Qutub
Abstract:
Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.Keywords: cloud computing, cyber crime, data protection, privacy
Procedia PDF Downloads 2601365 Interconnected Market Hypothesis: A Conceptual Model of Individualistic, Information-Based Interconnectedness
Authors: James Kinsella
Abstract:
There is currently very little understanding of how the interaction between in- vestors, consumers, the firms (agents) affect a) the transmission of information, and b) the creation and transfer of value and wealth between these two groups. Employing scholarly ideas from multiple research areas (behavioural finance, emotional finance, econo-biology, and game theory) we develop a conceptual the- oretic model (the ‘bow-tie’ model) as a framework for considering this interaction. Our bow-tie model views information transfer, value and wealth creation, and transfer through the lens of “investor-consumer connection facilitated through the communicative medium of the ‘firm’ (agents)”. We confront our bow-tie model with theoretical and practical examples. Next, we utilise consumer and business confidence data alongside index data, to conduct quantitative analy- sis, to support our bow-tie concept, and to introduce the concept of “investor- consumer connection”. We highlight the importance of information persuasiveness, knowledge, and emotional categorization of characteristics in facilitating a communicative relationship between investors, consumers, and the firm (agents), forming academic and practical applications of the conceptual bow-tie model, alongside applications to wider instances, such as those seen within the Covid-19 pandemic.Keywords: behavioral finance, emotional finance, economy-biology, social mood
Procedia PDF Downloads 1261364 Evaluation of Robot Application in Hospitality
Authors: Lina Zhong, Sunny Sun, Rob Law
Abstract:
Artificial intelligence has been developing rapidly. Previous studies have evaluated hotel technology either from an employee or consumer perspective. However, impacts, which mainly include the social and economic impacts of hotel robots, are unknown as they are newly introduced. To bridge the aforementioned research gap, this study evaluates hotel robots from contextual, diagnostic, evaluative, and strategic aspects using framework analysis as a basis to assist hotel managers in real-time hotel marketing strategy management, adjustment and revenue achievement. Findings show that, from a consumer perspective, the overall acceptance of hotel robots is low. The main implication is that the cost of hotel robots should be carefully estimated, and the investment should be made based on phases.Keywords: application, evaluation, framework analysis, hotel robot
Procedia PDF Downloads 170