Search results for: technology threat avoidance theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12962

Search results for: technology threat avoidance theory

12662 Kuehne + Nagel's PharmaChain: IoT-Enabled Product Monitoring Using Radio Frequency Identification

Authors: Rebecca Angeles

Abstract:

This case study features the Kuehne + Nagel PharmaChain solution for ‘cold chain’ pharmaceutical and biologic product shipments with IOT-enabled features for shipment temperature and location tracking. Using the case study method and content analysis, this research project investigates the application of the structurational model of technology theory introduced by Orlikowski in order to interpret the firm’s entry and participation in the IOT-impelled marketplace.

Keywords: Internet of Things (IOT), radio frequency identification (RFID), structurational model of technology (Orlikowski), supply chain management

Procedia PDF Downloads 229
12661 Women's Perceptions of Zika Virus Prevention Recommendations: A Tale of Two Cities within Fortaleza, Brazil

Authors: Jeni Stolow, Lina Moses, Carl Kendall

Abstract:

Zika virus (ZIKV) reemerged as a global threat in 2015 with Brazil at its epicenter. Brazilians have a long history of combatting Aedes aegypti mosquitos as it is a common vector for dengue, chikungunya, and yellow fever. As a response to the epidemic, public health authorities promoted ZIKV prevention behaviors such as mosquito bite prevention, reproductive counseling for women who are pregnant or contemplating pregnancy, pregnancy avoidance, and condom use. Most prevention efforts from Brazil focused on the mosquito vector- utilizing recycled dengue approaches without acknowledging the context in which women were able to adhere to these prevention messages. This study used qualitative methods to explore how women in Fortaleza, Brazil perceive ZIKV, the Brazilian authorities’ ZIKV prevention recommendations, and the feasibility of adhering to these recommendations. A core study aim was to look at how women perceive their physical, social, and natural environment as it impacts women’s ability to adhere to ZIKV prevention behaviors. A Rapid Anthropological Assessment (RAA) containing observations, informational interviews, and semi-structured in-depth interviews were utilized for data collection. The study utilized Grounded Theory as the systematic inductive method of analyzing the data collected. Interviews were conducted with 35 women of reproductive age (15-39 years old), who primarily utilize the public health system. It was found that women’s self-identified economic class was associated with how strongly women felt they could prevent ZIKV. All women interviewed technically belong to the C-class, the middle economic class. Although all members of the same economic class, there was a divide amongst participants as to who perceived themselves as higher C-class versus lower C-class. How women saw their economic status was dictated by how they perceived their physical, social, and natural environment. Women further associated their environment and their economic class to their likelihood of contracting ZIKV, their options for preventing ZIKV, their ability to prevent ZIKV, and their willingness to attempt to prevent ZIKV. Women’s perceived economic status was found to relate to their structural environment (housing quality, sewage, and locations to supplies), social environment (family and peer norms), and natural environment (wetland areas, natural mosquito breeding sites, and cyclical nature of vectors). Findings from this study suggest that women’s perceived environment and economic status impact their perceived feasibility and desire to attempt behaviors to prevent ZIKV. Although ZIKV has depleted from epidemic to endemic status, it is suggested that the virus will return as cyclical outbreaks like that seen with similar arboviruses such as dengue and chikungunya. As the next ZIKV epidemic approaches it is essential to understand how women perceive themselves, their abilities, and their environments to best aid the prevention of ZIKV.

Keywords: Aedes aegypti, environment, prevention, qualitative, zika

Procedia PDF Downloads 131
12660 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 92
12659 Connecting Lives Inside and Outside the Classroom: Why and How to Implement Technology in the Language Learning Classroom

Authors: Geoffrey Sinha

Abstract:

This paper is primarily addressed to teachers who stand on the threshold of bringing technology and new media into their classrooms. Technology and new media, such as smart phones and tablets have changed the face of communication in general and of language teaching more specifically. New media has widespread appeal among young people in particular, so it is in the teacher’s best interests to bring new media into their lessons. It is the author’s firm belief that technology will never replace the teacher, but it is without question that the twenty-first century teacher must employ technology and new media in some form, or run the risk of failure. The level that one chooses to incorporate new media within their class is entirely in their hands.

Keywords: new media, social media, technology, education, language learning

Procedia PDF Downloads 330
12658 The Design of Information Technology System for Traceability of Thailand’s Tubtimjun Roseapple

Authors: Pimploi Tirastittam, Phutthiwat Waiyawuththanapoom, Sawanath Treesathon

Abstract:

As there are several countries which import agriculture product from Thailand, those countries demand Thailand to establish the traceability system. The traceability system is the tool to reduce the risk in the supply chain in a very effective way as it will help the stakeholder in the supply chain to identify the defect point which will reduce the cost of operation in the supply chain. This research is aimed to design the traceability system for Tubtimjun roseapple for exporting to China, and it is the qualitative research. The data was collected from the expert in the tuntimjun roseapple and fruit exporting industry, and the data was used to design the traceability system. The design of the tubtimjun roseapple traceability system was followed the theory of supply chain which starts from the upstream of the supply chain to the downstream of the supply chain to support the process and condition of the exporting which included the database designing, system architecture, user interface design and information technology of the traceability system.

Keywords: design information, technology system, traceability, tubtimjun roseapple

Procedia PDF Downloads 169
12657 The Impact of Political Leadership on Cameroon’s Economic Development From 2000 to 2023

Authors: Okpu Enoh Ndip Nkongho

Abstract:

The type of political leadership in place impacts a state's economic development or underdevelopment directly and indirectly. One of the main challenges to Cameroon's economic development may be ineffective or misguided political leadership. The economy of the Cameroon state has declined significantly due to a number of factors, including a lack of effective and feasible economic policies, a reliance on crude oil that is excessive, tribal politics, the threat of insurgency, bribery, and corruption, violations of human rights, neglect of other sectors like science, technology, education, and transportation, and a careless attitude on the part of the administrators toward the general public. As a result, the standard of living has decreased, foreign exchange has decreased, and the value of the Cameroonian currency has depreciated. Therefore, from 2000 to 2023, this paper focused on the relationship between political leadership and economic development in Cameroon and offered suggestions for improving political leadership that will, in turn, lead to the country's economy getting back on track. The study employed a qualitative technique, with the framework for the investigation derived from the trait theory of leadership. According to the information provided above, the paper was able to conclude that there is a lack of cooperation between the three branches of government in Cameroon. This is shown in situations when one branch operates independently of the others and refuses to function as a backup when needed. The study recommended that the Executive collaborate closely with the National Assembly to speed action on some key legislation required to stimulate economic development. On the other hand, there is a need for more clarity and consistency in the government's policy orientation. There is no doubt that our current economic troubles are at least partially the result of a lack of economic policy leadership and confidence.

Keywords: politics, leadership, economic, development, Cameroon

Procedia PDF Downloads 49
12656 Focusing on the Utilization of Information and Communication Technology for Improving Childrens’ Potentials in Science: Challenges for Sustainable Development in Nigeria

Authors: Osagiede Mercy Afe

Abstract:

After the internet explosion in the 90’s, Technology was immediately integrated into the school system. Technology which symbolizes advancement in human knowledge was seen as a setback by many educators many efforts have been made to help stem this erroneous believes and help educators realize the benefits of technology and ways of implementing it in the classrooms especially in the sciences. This advancement created a constantly expanding gap between the pupil’s perception on the use of technology within the learning atmosphere and the teacher’s perception and limitations hence the focus of this paper is on the need to refocus on the potentials of Science and Technology in enhancing children learning at school especially in science for sustainable development in Nigeria. The paper recommended measures for facilitating the sustenance of science and technology in Nigerian schools so as to enhance the potentials of our children in Science and Technology for a better tomorrow.

Keywords: children, information communication technology (ICT), potentials, sustainable development, science education

Procedia PDF Downloads 481
12655 Institutional Segmantation and Country Clustering: Implications for Multinational Enterprises Over Standardized Management

Authors: Jung-Hoon Han, Jooyoung Kwak

Abstract:

Distances between cultures, institutions are gaining academic attention once again since the classical debate on the validity of globalization. Despite the incessant efforts to define international segments with various concepts, no significant attempts have been made considering the institutional dimensions. Resource-based theory and institutional theory provides useful insights in assessing market environment and understanding when and how MNEs loose or gain advantages. This study consists of two parts: identifying institutional clusters and predicting the effect of MNEs’ origin on the applicability of competitive advantages. MNEs in one country cluster are expected to use similar management systems.

Keywords: institutional theory, resource-based theory, institutional environment, cultural dimensions, cluster analysis, standardized management

Procedia PDF Downloads 481
12654 An Interoperability Concept for Detect and Avoid and Collision Avoidance Systems: Results from a Human-In-The-Loop Simulation

Authors: Robert Rorie, Lisa Fern

Abstract:

The integration of Unmanned Aircraft Systems (UAS) into the National Airspace System (NAS) poses a variety of technical challenges to UAS developers and aviation regulators. In response to growing demand for access to civil airspace in the United States, the Federal Aviation Administration (FAA) has produced a roadmap identifying key areas requiring further research and development. One such technical challenge is the development of a ‘detect and avoid’ system (DAA; previously referred to as ‘sense and avoid’) to replace the ‘see and avoid’ requirement in manned aviation. The purpose of the DAA system is to support the pilot, situated at a ground control station (GCS) rather than in the cockpit of the aircraft, in maintaining ‘well clear’ of nearby aircraft through the use of GCS displays and alerts. In addition to its primary function of aiding the pilot in maintaining well clear, the DAA system must also safely interoperate with existing NAS systems and operations, such as the airspace management procedures of air traffic controllers (ATC) and collision avoidance (CA) systems currently in use by manned aircraft, namely the Traffic alert and Collision Avoidance System (TCAS) II. It is anticipated that many UAS architectures will integrate both a DAA system and a TCAS II. It is therefore necessary to explicitly study the integration of DAA and TCAS II alerting structures and maneuver guidance formats to ensure that pilots understand the appropriate type and urgency of their response to the various alerts. This paper presents a concept of interoperability for the two systems. The concept was developed with the goal of avoiding any negative impact on the performance level of TCAS II (understanding that TCAS II must largely be left as-is) while retaining a DAA system that still effectively enables pilots to maintain well clear, and, as a result, successfully reduces the frequency of collision hazards. The interoperability concept described in the paper focuses primarily on facilitating the transition from a late-stage DAA encounter (where a loss of well clear is imminent) to a TCAS II corrective Resolution Advisory (RA), which requires pilot compliance with the directive RA guidance (e.g., climb, descend) within five seconds of its issuance. The interoperability concept was presented to 10 participants (6 active UAS pilots and 4 active commercial pilots) in a medium-fidelity, human-in-the-loop simulation designed to stress different aspects of the DAA and TCAS II systems. Pilot response times, compliance rates and subjective assessments were recorded. Results indicated that pilots exhibited comprehension of, and appropriate prioritization within, the DAA-TCAS II combined alert structure. Pilots demonstrated a high rate of compliance with TCAS II RAs and were also seen to respond to corrective RAs within the five second requirement established for manned aircraft. The DAA system presented under test was also shown to be effective in supporting pilots’ ability to maintain well clear in the overwhelming majority of cases in which pilots had sufficient time to respond. The paper ends with a discussion of next steps for research on integrating UAS into civil airspace.

Keywords: detect and avoid, interoperability, traffic alert and collision avoidance system (TCAS II), unmanned aircraft systems

Procedia PDF Downloads 267
12653 Self Determination Theory and Trauma Informed Approach in Women's Shelters: A Common Ground

Authors: Gamze Dogan Birer

Abstract:

Women’s shelters provide service to women who had been subjected to physical, psychological, economical, and sexual violence. It is proposed that adopting a trauma-informed approach in these shelters would contribute to the ‘woman-defined’ success of the service. This includes reshaping the physical qualities of the shelter, contacts, and interventions that women face during their stay in a way that accepts and addresses their traumatic experiences. It is stated in this paper that the trauma-informed approach has commonalities with the basic psychological needs that are proposed by self-determination theory. Therefore, it is proposed that self-determination theory can be used as a theoretical background for trauma-informed approach

Keywords: self determination theory, trauma informed approach, violence against women, women's shelters

Procedia PDF Downloads 155
12652 An Ab Initio Molecular Orbital Theory and Density Functional Theory Study of Fluorous 1,3-Dion Compounds

Authors: S. Ghammamy, M. Mirzaabdollahiha

Abstract:

Quantum mechanical calculations of energies, geometries, and vibrational wavenumbers of fluorous 1,3-dion compounds are carried out using density functional theory (DFT/B3LYP) method with LANL2DZ basis sets. The calculated HOMO and LUMO energies show that charge transfer occurs in the molecules. The thermodynamic functions of fluorous 1,3-dion compounds have been performed at B3LYP/LANL2DZ basis sets. The theoretical spectrograms for F NMR spectra of fluorous 1,3-dion compounds have also been constructed. The F NMR nuclear shieldings of fluoride ligands in fluorous 1,3-dion compounds have been studied quantum chemical.

Keywords: density function theory, natural bond orbital, HOMO, LOMO, fluorous

Procedia PDF Downloads 384
12651 The Differential Impacts of Shame and Guilt on Father Involvement in Families with Special Needs Children

Authors: Lo Kai Chung

Abstract:

Fathers in the family of disabled children play a crucial role in fostering child development. Previous studies addressing emotions of father involvement in rearing children with special needs have been rare. With reference to the cultural orientation and masculine idea of Chinese fathers, shame and guilt are probable causal emotions that affect fathers’ psycho-behavioral reactions and, thus, father involvement. Based on the findings of our earlier qualitative studies, the current study aims to develop and validate a multi-item scale of guilt or shame and explore their relations with and fatherhood in families with children with special needs. A model is proposed to understand the roles that shame and guilt play in affecting fathers’ involvement in their family system. The severity and type of the child’s special needs are regarded as independent variables affecting the father’s emotional responses – shame and guilt. It is hypothesized that shame and guilt, under the influence of masculinity, lead to avoidance and compensation, respectively, which subsequently decrease and increase father involvement with children with special needs. A cross-sectional online questionnaire survey of fathers with children with special needs recruited by convenience sampling was conducted. Potential participants were reached by bulk emails, related groups on the Internet and education/social services providers. Totally 537 valid sets of online questionnaires were collected from fathers of children with special needs. EFA on the items pool of shame and guilt was performed, resulting in an x-item single-factor solution and y-item single-factor solution, respectively. Further path model analysis revealed that shame and guilt, under the influence of masculinity, showed differential avoidance and compensation responses and resulted in a decrease and increase in father involvement with special needs children. Demographic and key confounding variables were controlled in the analysis. The shame and guilt scales developed show good psychometric properties. Furthermore, they showed significant differential impacts, under the influence of masculinity, on avoidance and compensation behaviours, consequently resulting in a decrease/increase in father involvement in the expected directions. The findings have important theoretical and practical implications. At the community and policy level, the findings inform the design of strategies for strengthening the role of men in families with special needs children.

Keywords: emotions, father involvement, guilt, shame, special needs

Procedia PDF Downloads 63
12650 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students

Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah

Abstract:

Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.

Keywords: obesity, food security, body image, self-esteem

Procedia PDF Downloads 74
12649 Countering Terrorism through Social Media: Case Study in Indonesia

Authors: Mauly Budiyanti, Aisyah M. Anggiana

Abstract:

Terrorism is a threat to national security since the war on terror era after the tragedy of 9/11. The shifting of national threat from military to non-military centric leads us to recognize that military action is not the only way to face and solve terrorism. Alongside the use of military action to counter terrorism, Indonesia has another way to counter it by using the role of social media. The role of social media on spreading positivity to counter terrorism has the power to show that people now are fearless toward terrorist attack because their goal is to make sure that people are threatened enough by the way they act. This is showing the emergence of the non-state actor has a big impact on national security, as well as pluralism, said about the involving of non-state actor on international events. In this paper, we will examine the role of social media in countering terrorism based on study case in Indonesia.

Keywords: Indonesia, national security, social media, terrorism.

Procedia PDF Downloads 216
12648 Coping Techniques, Repertoire, and Flexibility in Parental Adjustment to Pediatric Cancer

Authors: Michael Dolgin, Oz Hamtzani, Talma Kushnir

Abstract:

A literature review has shown that while parents of children with cancer experience increased levels of psychological distress associated with their child's medical condition, considerable variability in parental adjustment is evident. Of the factors that may account for this variability, little attention has been devoted to the simultaneous interaction of three coping constructs and their role in parental adjustment: (1) Coping techniques employed, (2) Repertoire of coping techniques, and (3) Flexibility in applying coping techniques. While these constructs have been studied individually in relation to adjustment in general, studies to date have not included them together within a single conceptual model and research design and evaluated them in a clinical population. The objective of the current study was to determine how these three coping technique constructs interact to impact parental adjustment to pediatric cancer. A cross-sectional sample of 145 parents of children in active cancer treatment completed standardized measures of coping techniques, repertoire, flexibility, and parental distress. A hierarchical multiple regression analysis demonstrated that 37% of the variance in parental distress was predicted by the use of avoidance-focused coping techniques [F(1,118)=69.843, p<.001], with an additional 3% predicted by coping repertoire [F(2,117)=7.63, p=.00] for a total of 40% variance explained. Coping flexibility was found to mediate the relationship between coping repertoire and parental distress. These findings suggest that coping techniques employed by parents (problem/emotion-focused vs. avoidance-focused), as well as coping repertoire, significantly impact parental adjustment. Flexibility in applying coping techniques within one’s coping repertoire further contributes to parental adjustment. Implications for further study and clinical intervention will be presented.

Keywords: coping techniques, repertoire, flexibility, adjustment

Procedia PDF Downloads 38
12647 The Construction of Research-Oriented/Practice-Oriented Engineering Testing and Measurement Technology Course under the Condition of New Technology

Authors: He Lingsong, Wang Junfeng, Tan Qiong, Xu Jiang

Abstract:

The paper describes efforts on reconstruction methods of engineering testing and measurement technology course by applying new techniques and applications. Firstly, flipped classroom was introduced. In-class time was used for in-depth discussions and interactions while theory concept teaching was done by self-study course outside of class. Secondly, two hands-on practices of technique applications, including the program design of MATLAB Signal Analysis and the measurement application of Arduino sensor, have been covered in class. Class was transformed from an instructor-centered teaching process into an active student-centered learning process, consisting of the pre-class massive open online course (MOOC), in-class discussion and after-class practice. The third is to change sole written homework to the research-oriented application practice assignments, so as to enhance the breadth and depth of the course.

Keywords: testing and measurement, flipped classroom, MOOC, research-oriented learning, practice-oriented learning

Procedia PDF Downloads 144
12646 Patent License of Transfer Technology: Challenges and Opportunities in Indonesia

Authors: Agung Sujatmiko

Abstract:

One of the purposes of patent licensing was to transfer technology from developed countries to developing countries. For this reason, the role of the patent license agreement was very important and had a function as a tool to achieve technological development. This goal was very good, but in fact, many problems and obstacles arose in its implementation, so the technology transfer that had been implemented had not given good results. For this reason, it was necessary to find a solution so that technology could switch properly. The problem approach used the statutory and conceptual approaches. The analysis used was deductive by analyzing general laws and regulations and then concluding. Several regulations related to technology transfer were the main source to find answers to why technology transfer was difficult to achieve and what caused it. Once the cause was known, a solution would be sought.

Keywords: license, patent, technology, tie in clause

Procedia PDF Downloads 90
12645 Buckling Behavior of FGM Plates Using a Simplified Shear Deformation Theory

Authors: Mokhtar Bouazza

Abstract:

In this paper, the simplified theory will be used to predict the thermoelastic buckling behavior of rectangular functionally graded plates. The material properties of the functionally graded plates are assumed to vary continuously through the thickness, according to a simple power law distribution of the volume fraction of the constituents. The simplified theory is used to obtain the buckling of the plate under different types of thermal loads. The thermal loads are assumed to be uniform, linear, and non-linear distribution through the thickness. Additional numerical results are presented for FGM plates that show the effects of various parameters on thermal buckling response.

Keywords: buckling, functionally graded, plate, simplified higher-order deformation theory, thermal loading

Procedia PDF Downloads 376
12644 Linking Business Owners’ Choice of Organizational Form to Appraisers’ Determination of Value: An Agency Theory Perspective

Authors: Majdi Anwar Quttainah, William Paczkowski, Ali Muhammad

Abstract:

Determining the value of a privately held firms confound those in academia as well as practitioners in the fields of appraisal, forensic accounting, and law. Divergent parties to the transfer look to apply the valuation technique to serve their own best interests. This paper seeks to explore how agency theory induces owners to choose the form of their businesses at inception and how this choice will affect the appraisers’ valuation of the firm at the transfer of ownership.

Keywords: organizational form, agency theory, value

Procedia PDF Downloads 427
12643 Internet of Things Professional Construction Building through the School-Enterprise Cooperation

Authors: Jumin Zhao, Na Li, Dengao Li, Yujuan Yan

Abstract:

As the rapid rise of the networking industry, the shortage of Internet of Things (IoT) talented people greatly stimulates the majority of colleges to speed up the pace of professional networking reform. Caused by the construction of the original specialty, many problems appear such as the vague specialty, the mixed theoretical, the poor practical ability and the different goal. To solve the issues above, we build a ‘theory-practice-theory-improvement’ four-step model of school-enterprise integration of personnel training. Besides, we integrate the advanced teaching philosophy: flip class and Mu class, making IoT teaching more professional and the ability of students more comprehensive.

Keywords: IoT, theory-practice-theory-promotion, major construction, school-enterprise cooperation

Procedia PDF Downloads 377
12642 Peridynamic Modeling of an Isotropic Plate under Tensile and Flexural Loading

Authors: Eda Gök

Abstract:

Peridynamics is a new modeling concept of non-local interactions for solid structures. The formulations of Peridynamic (PD) theory are based on integral equations rather than differential equations. Through, undefined equations of associated problems are avoided. PD theory might be defined as continuum version of molecular dynamics. The medium is usually modeled with mass particles bonded together. Particles interact with each other directly across finite distances through central forces named as bonds. The main assumption of this theory is that the body is composed of material points which interact with other material points within a finite distance. Although, PD theory developed for discontinuities, it gives good results for structures which have no discontinuities. In this paper, displacement control of the isotropic plate under the effect of tensile and bending loading has been investigated by means of PD theory. A MATLAB code is generated to create PD bonds and corresponding surface correction factors. Using generated MATLAB code the geometry of the specimen is generated, and the code is implemented in Finite Element Software. The results obtained from non-local continuum theory are compared with the Finite Element Analysis results and analytical solution. The results show good agreement.

Keywords: non-local continuum mechanics, peridynamic theory, solid structures, tensile loading, flexural loading

Procedia PDF Downloads 116
12641 Technology Use by African Smallholder Farmers and the Significant Mediating Factors

Authors: Enobong Akpan-Etuk

Abstract:

The willingness of smallholder farmers in Africa to adopt new agricultural technologies has been low, despite the technological advancement in agriculture. Although technology is seen as the main route out of the traditional methods of food production and poverty, the rate of adoption of agricultural technology remains low among farmers in Africa. Factors affecting the adoption of agricultural technologies include the acquisition of information, characteristics of the technology, education of farmers, social capital, farm size, and household size. This paper explored the literature on the influence of the factors that determine the adoption of technology by smallholder farmers.

Keywords: smallholder, technology, adoption

Procedia PDF Downloads 139
12640 The Application of Green Technology to Residential Architecture in Hangzhou

Authors: Huiru Chen, Xuran Zhang

Abstract:

At present, the residential architecture in China are still causing high energy consumption and high pollution during their whole life cycle, which can be backward compared with the developed countries. The aim of this paper is to discuss the application of green technology to residential architecture in Hangzhou. This article will start with the development of green buildings, then analyzes the use status of green technology in Hangzhou from several specific measures. Analysis of the typical existing green residential buildings in Hangzhou is an attempt to form a preliminary Hangzhou’s green technology application strategy system. Through research, it has been found that the application of green technology in Hangzhou has changed from putting green to the facade, to the combination of the preservation of the traditional green concept and the modern green technology.

Keywords: application, green technology, Hangzhou, residential architecture

Procedia PDF Downloads 203
12639 Bring Your Own Device Security Model in a Financial Institution of South Africa

Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren

Abstract:

This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.

Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis

Procedia PDF Downloads 25
12638 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 67
12637 Model of Application of Blockchain Technology in Public Finances

Authors: M. Vlahovic

Abstract:

This paper presents a model of public finances, which combines three concepts: participatory budgeting, crowdfunding and blockchain technology. Participatory budgeting is defined as a process in which community members decide how to spend a part of community’s budget. Crowdfunding is a practice of funding a project by collecting small monetary contributions from a large number of people via an Internet platform. Blockchain technology is a distributed ledger that enables efficient and reliable transactions that are secure and transparent. In this hypothetical model, the government or authorities on local/regional level would set up a platform where they would propose public projects to citizens. Citizens would browse through projects and support or vote for those which they consider justified and necessary. In return, they would be entitled to a tax relief in the amount of their monetary contribution. Since the blockchain technology enables tracking of transactions, it can be used to mitigate corruption, money laundering and lack of transparency in public finances. Models of its application have already been created for e-voting, health records or land registries. By presenting a model of application of blockchain technology in public finances, this paper takes into consideration the potential of blockchain technology to disrupt governments and make processes more democratic, secure, transparent and efficient. The framework for this paper consists of multiple streams of research, including key concepts of direct democracy, public finance (especially the voluntary theory of public finance), information and communication technology, especially blockchain technology and crowdfunding. The framework defines rules of the game, basic conditions for the implementation of the model, benefits, potential problems and development perspectives. As an oversimplified map of a new form of public finances, the proposed model identifies primary factors, that influence the possibility of implementation of the model, and that could be tracked, measured and controlled in case of experimentation with the model.

Keywords: blockchain technology, distributed ledger, participatory budgeting, crowdfunding, direct democracy, internet platform, e-government, public finance

Procedia PDF Downloads 146
12636 Understanding Workplace Behavior through Organizational Culture and Complex Adaptive Systems Theory

Authors: Péter Restás, Andrea Czibor, Zsolt Péter Szabó

Abstract:

Purpose: This article aims to rethink the phenomena of employee behavior as a product of a system. Both organizational culture and Complex Adaptive Systems (CAS) theory emphasize that individual behavior depends on the specific system and the unique organizational culture. These two major theories are both represented in the field of organizational studies; however, they are rarely used together for the comprehensive understanding of workplace behavior. Methodology: By reviewing the literature we use key concepts stemming from organizational culture and CAS theory in order to show the similarities between these theories and create an enriched understanding of employee behavior. Findings: a) Workplace behavior is defined here as social cognition issue. b) Organizations are discussed here as complex systems, and cultures which drive and dictate the cognitive processes of agents in the system. c) Culture gives CAS theory a context which lets us see organizations not just as ever-changing and unpredictable, but as such systems that aim to create and maintain stability by recurring behavior. Conclusion: Applying the knowledge from culture and CAS theory sheds light on our present understanding of employee behavior, also emphasizes the importance of novel ways in organizational research and management.

Keywords: complex adaptive systems theory, employee behavior, organizational culture, stability

Procedia PDF Downloads 410
12635 Utility Assessment Model for Wireless Technology in Construction

Authors: Yassir AbdelRazig, Amine Ghanem

Abstract:

Construction projects are information intensive in nature and involve many activities that are related to each other. Wireless technologies can be used to improve the accuracy and timeliness of data collected from construction sites and shares it with appropriate parties. Nonetheless, the construction industry tends to be conservative and shows hesitation to adopt new technologies. A main concern for owners, contractors or any person in charge on a job site is the cost of the technology in question. Wireless technologies are not cheap. There are a lot of expenses to be taken into consideration, and a study should be completed to make sure that the importance and savings resulting from the usage of this technology is worth the expenses. This research attempts to assess the effectiveness of using the appropriate wireless technologies based on criteria such as performance, reliability, and risk. The assessment is based on a utility function model that breaks down the selection issue into alternatives attribute. Then the attributes are assigned weights and single attributes are measured. Finally, single attribute are combined to develop one single aggregate utility index for each alternative.

Keywords: analytic hierarchy process, decision theory, utility function, wireless technologies

Procedia PDF Downloads 338
12634 Ecological Systems Theory, the SCERTS Model, and the Autism Spectrum, Node and Nexus

Authors: C. Surmei

Abstract:

Autism Spectrum Disorder (ASD) is a complex developmental disorder that can affect an individual’s (but is not limited to) cognitive development, emotional development, language acquisition and the capability to relate to others. Ecological Systems Theory is a sociocultural theory that focuses on environmental systems with which an individual interacts. The SCERTS Model is an educational approach and multidisciplinary framework that addresses the challenges confronted by individuals on the autism spectrum and other developmental disabilities. To aid the understanding of ASD and educational philosophies for families, educators, and the global community alike, a Comparative Analysis was undertaken to examine key variables (the child, society, education, nurture/care, relationships, communication). The results indicated that the Ecological Systems Theory and the SCERTS Model were comparable in focus, motivation, and application, attaining to a viable and notable relationship between both theories. This paper unpacks two child development philosophies and their relationship to each other.

Keywords: autism spectrum disorder, ecological systems theory, education, SCERTS model

Procedia PDF Downloads 575
12633 Socio-Technical Systems: Transforming Theory into Practice

Authors: L. Ngowi, N. H. Mvungi

Abstract:

This paper critically examines the evolution of socio-technical systems theory, its practices, and challenges in system design and development. It examines concepts put forward by researchers focusing on the application of the theory in software engineering. There are various methods developed that use socio-technical concepts based on systems engineering without remarkable success. The main constraint is the large amount of data and inefficient techniques used in the application of the concepts in system engineering for developing time-bound systems and within a limited/controlled budget. This paper critically examines each of the methods, highlight bottlenecks and suggest the way forward. Since socio-technical systems theory only explains what to do, but not how doing it, hence engineers are not using the concept to save time, costs and reduce risks associated with new frameworks. Hence, a new framework, which can be considered as a practical approach is proposed that borrows concepts from soft systems method, agile systems development and object-oriented analysis and design to bridge the gap between theory and practice. The approach will enable the development of systems using socio-technical systems theory to attract/enable the system engineers/software developers to use socio-technical systems theory in building worthwhile information systems to avoid fragilities and hostilities in the work environment.

Keywords: socio-technical systems, human centered design, software engineering, cognitive engineering, soft systems, systems engineering

Procedia PDF Downloads 282