Search results for: internet forensic
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1896

Search results for: internet forensic

1566 An Assessment of the Digital Transformation of Radio

Authors: Fatih Sogut

Abstract:

Developments in information technologies have caused significant changes in terms of radio and television broadcasting. With these changes in terms of production format, transmission techniques and service delivery, the distinction between traditional media and New Media has emerged. The viewer/listener, who was in a passive position before, is now in an active position and has a say in many matters, including content production. Visual and auditory data transfer has diversified and become easier thanks to the convergence phenomenon. These transformations and developments also affected one of the oldest electronic communication tools, radio. In this study, in order to adapt to the new era that emerged with the digital age, the change in radio broadcasting and the factors that led to this change were tried to be explained.

Keywords: Internet, radio broadcasting, digital transformation, Internet broadcasting

Procedia PDF Downloads 161
1565 Cyber Bullying Victimization of Elementary School Students and Their Reflections on the Victimization

Authors: Merve Sadetas Sezer, Ismail Sahin, Ahmet Oguz Akturk

Abstract:

With the use of developing technology, mostly in communication and entertainment, students spend considerable time on the internet. In addition to the advantages provided by the internet, social isolation brings problems such as addiction. This is one of the problems of the virtual violence. Cyber-bullying is the common name of the intensities which students are exposed on the internet. The purpose of this study designed as a qualitative research is to find out the cyber bullying varieties and its effects on elementary school students. The participants of this research are 6th, 7th and 8th grade students of a primary school and 24 students agreed to participate in the study. The students were asked to fill an interview with semi-structured open-ended questions. According to the results obtained in the research, the most important statements determined by the participants are breaking passwords on social networking sites, slang insult to blasphemy and taking friendship offers from unfamiliar people. According to participants from the research, the most used techniques to prevent themselves from cyber bullying are to complain to the site administrator, closing accounts on social networking sites and countercharging. Also, suggestions were presented according to the findings.

Keywords: bullying, cyber-bullying, elementary, peer-relationship, virtual victimization

Procedia PDF Downloads 335
1564 Acoustic Analysis for Comparison and Identification of Normal and Disguised Speech of Individuals

Authors: Surbhi Mathur, J. M. Vyas

Abstract:

Although the rapid development of forensic speaker recognition technology has been conducted, there are still many problems to be solved. The biggest problem arises when the cases involving disguised voice samples come across for the purpose of examination and identification. Such type of voice samples of anonymous callers is frequently encountered in crimes involving kidnapping, blackmailing, hoax extortion and many more, where the speaker makes a deliberate effort to manipulate their natural voice in order to conceal their identity due to the fear of being caught. Voice disguise causes serious damage to the natural vocal parameters of the speakers and thus complicates the process of identification. The sole objective of this doctoral project is to find out the possibility of rendering definite opinions in cases involving disguised speech by experimentally determining the effects of different disguise forms on personal identification and percentage rate of speaker recognition for various voice disguise techniques such as raised pitch, lower pitch, increased nasality, covering the mouth, constricting tract, obstacle in mouth etc by analyzing and comparing the amount of phonetic and acoustic variation in of artificial (disguised) and natural sample of an individual, by auditory as well as spectrographic analysis.

Keywords: forensic, speaker recognition, voice, speech, disguise, identification

Procedia PDF Downloads 354
1563 The Long – Term Effects of a Prevention Program on the Number of Critical Incidents and Sick Leave Days: A Decade Perspective

Authors: Valerie Isaak

Abstract:

Background: This study explores the effectiveness of refresher training sessions of an intervention program at reducing the employees’ risk of injury due to patient violence in a forensic psychiatric hospital. Methods: The original safety intervention program that consisted of a 3 days’ workshop was conducted in the maximum-security ward of a psychiatric hospital in Israel. Ever since the original intervention, annual refreshers were conducted, highlighting one of the safety elements covered in the original intervention. The study examines the effect of the intervention program along with the refreshers over a period of 10 years in four wards. Results: Analysis of the data demonstrates that beyond the initial reduction following the original intervention, refreshers seem to have an additional positive long-term effect, reducing both the number of violent incidents and the number of actual employee injuries in a forensic psychiatric hospital. Conclusions: We conclude that such an intervention program followed by refresher training would promote employees’ wellbeing. A healthy work environment is part of management’s commitment to improving employee wellbeing at the workplace.

Keywords: wellbeing, violence at work, intervention program refreshers, public sector mental healthcare

Procedia PDF Downloads 123
1562 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 135
1561 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 79
1560 Intelligent Rainwater Reuse System for Irrigation

Authors: Maria M. S. Pires, Andre F. X. Gloria, Pedro J. A. Sebastiao

Abstract:

The technological advances in the area of Internet of Things have been creating more and more solutions in the area of agriculture. These solutions are quite important for life, as they lead to the saving of the most precious resource, water, being this need to save water a concern worldwide. The paper proposes the creation of an Internet of Things system based on a network of sensors and interconnected actuators that automatically monitors the quality of the rainwater that is stored inside a tank in order to be used for irrigation. The main objective is to promote sustainability by reusing rainwater for irrigation systems instead of water that is usually available for other functions, such as other productions or even domestic tasks. A mobile application was developed for Android so that the user can control and monitor his system in real time. In the application, it is possible to visualize the data that translate the quality of the water inserted in the tank, as well as perform some actions on the implemented actuators, such as start/stop the irrigation system and pour the water in case of poor water quality. The implemented system translates a simple solution with a high level of efficiency and tests and results obtained within the possible environment.

Keywords: internet of things, irrigation system, wireless sensor and actuator network, ESP32, sustainability, water reuse, water efficiency

Procedia PDF Downloads 137
1559 Characteristics Features and Action Mechanism of Some Country Made Pistols

Authors: Ajitesh Pal, Arpan Datta Roy, H. K. Pratihari

Abstract:

The different illegal firearms crudely made by skilled gunsmith from scrap materials are popularly known as country made firearms. Such firearms along with improvised ammunition are clandestinely marketed at the cheaper price without any license to the extremist group, criminal, poachers and firearm lovers. As per National Crime Records Bureau (NCRB), MHA, Govt of India about 80% firearm cases are committed by country made/improvised firearms. The ballistic division of the laboratory has examined a good number of cases. The analysis of firearm cases received for forensic examination revealed that 7.65mm calibre pistols mostly improvised firearm are commonly used in firearm related crime cases. In the present communication, physical parameters and other characteristics features of some 7.65mm calibre pistols have been discussed in detail. The detailed study on country made (CM) firearm will help to prepare a database related to type of material used, origin of the raw material and tools used for inscription. The study also includes to establish the chemistry of propellants & head stamp pattern. The database will be helpful to the firearm examiners, researchers, students pursuing study on forensic science as reference material.

Keywords: improvised pistol, stringent gun law, working mechanism, parameters, database

Procedia PDF Downloads 60
1558 Internet of Things as a Source of Opportunities for Entrepreneurs

Authors: Svetlana Gudkova

Abstract:

The Internet of Things experiences a rapid growth bringing inevitable changes into many spheres of human activities. As the Internet has changed the social and business landscape, IoT as its extension, can bring much more profound changes in economic value creation and competitiveness of the economies. It has been already recognized as the next industrial revolution. However, the development of IoT is in a great extent stimulated by the entrepreneurial activity. To expand and reach its full potential it requires proactive entrepreneurs, who explore the potential and create innovative ideas pushing the boundaries of IoT technologies' application further. The goal of the research is to analyze, how entrepreneurs utilize the opportunities created by IoT and how do they stimulate the development of IoT through discovering of new ways of generating economic value and creating opportunities, which attract other entrepreneurs. The qualitative research methods have been applied to prepare the case studies. Entrepreneurs are recognized as an engine of economic growth. They introduce innovative products and services into the market through the creation of a new combination of the existing resources and utilizing new knowledge. Entrepreneurs not only create economic value but what is more important, they challenge the existing business models and invent new ways of value creation. Through identification and exploitation of entrepreneurial opportunities, they create new opportunities for other entrepreneurs. It makes the industry more attractive to other profit/innovation-driven start-ups. IoT creates numerous opportunities for entrepreneurs in the different industries. Smart cities, healthcare, manufacturing, retail, agriculture, smart vehicles and smart buildings benefit a lot from IoT-based breakthrough innovations introduced by entrepreneurs. They reinvented successfully the business models and created new entrepreneurial opportunities for other start-ups to introduce next innovations.

Keywords: entrepreneurship, internet of things, breakthrough innovations, start-ups

Procedia PDF Downloads 190
1557 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices

Authors: Robin Singh, Jing-Chiou Liou

Abstract:

The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secure

Keywords: cybersecurity, DDoS, IoT, medical devices

Procedia PDF Downloads 71
1556 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery

Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman

Abstract:

Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.

Keywords: CGA, IPv6, NDP, SEND

Procedia PDF Downloads 376
1555 Determining the Information Technologies Usage and Learning Preferences of Construction

Authors: Naci Büyükkaracığan, Yıldırım Akyol

Abstract:

Information technology is called the technology which provides transmission of information elsewhere regardless of time, location, distance. Today, information technology is providing the occurrence of ground breaking changes in all areas of our daily lives. Information can be reached quickly to millions of people with help of information technology. In this Study, effects of information technology on students for educations and their learning preferences were demonstrated with using data obtained from questionnaires administered to students of 2015-2016 academic year at Selcuk University Kadınhanı Faik İçil Vocational School Construction Department. The data was obtained by questionnaire consisting of 30 questions that was prepared by the researchers. SPSS 21.00 package programme was used for statistical analysis of data. Chi-square tests, Mann-Whitney U test, Kruskal-Wallis and Kolmogorov-Smirnov tests were used in the data analysis for Descriptiving statistics. In a study conducted with the participation of 61 students, 93.4% of students' reputation of their own information communication device (computer, smart phone, etc.) That have been shown to be at the same rate and to the internet. These are just a computer of itself, then 45.90% of the students. The main reasons for the students' use of the Internet, social networking sites are 85.24%, 13.11% following the news of the site, as seen. All student assignments in information technology, have stated that they use in the preparation of the project. When students acquire scientific knowledge in the profession regarding their preferred sources evaluated were seen exactly when their preferred internet. Male students showed that daily use of information technology while compared to female students was statistically significantly less. Construction Package program where students are eager to learn about the reputation of 72.13% and 91.80% identified in the well which they agreed that an indispensable element in the professional advancement of information technology.

Keywords: information technologies, computer, construction, internet, learning systems

Procedia PDF Downloads 287
1554 WebGIS Development Framework With Prioritized Usability Elements

Authors: Ezekiel Mwangi, Stephen Kimani, Agnes Mindila

Abstract:

Usability is one of the key factors that determine the success or failure of any WebGIS (technology normally applied on the internet to analyze and present spatial data on the Internet). However, not all the usability attributes have the same impact on usability. It is, therefore, necessary to prioritize WebGIS usability elements and determine the ones that are more crucial to the success of the WebGIS. This research aims to identify the main elements of WebGIS usability, investigate the order of importance and priority of the usability elements of WebGIS, and propose a WebGIS development framework that incorporates the prioritization of the usability elements. This will be achieved through a literature review. The outcome of this research will help usability specialists and WebGIS developers in determining specific usability elements that should be accorded more emphasis during the design and development of WebGIS.

Keywords: framework, prioritization, usability, WebGIS

Procedia PDF Downloads 144
1553 The Family Resemblance in the Handwriting of Painters: Jacek and Rafał Malczewski’s Case

Authors: Olivia Rybak-Karkosz

Abstract:

This paper aims to present the results of scientific research on family resemblance in the handwriting of painters. Such a problem is known in handwriting analysis, but it was never a research subject in the scope of painters' signatures on works of art. For this research, the author chose Jacek, and Rafał Malczewski (father and son) as many of their paintings are in museums, and most of them are signed. The aim was to create a catalogue of traits similar to the handwriting of both artists. Such data could be helpful for the expert’s opinion in the decision-making process to establish whether the signature is authentic and, if so, whether it is the artist whose signature is analysed, not the other family member. There are known examples of relatives of the artists who signed their works. Many of them were artists themselves. For instance Andrzej Wróblewski’s mother, Krystyna was a printmaker. To save his legacy, she signed many of her son’s works after his death using his name. This research methodology consisted of completing representative samples of signatures of both artists, which were collected in selected Polish museums. Then a catalogue of traits was created using a forensic handwriting graphic-comparative method (graphic method). The paper contains a concluding statement that it could be one of the elements of research in an expert’s analysis of the authenticity of the signature on paintings.

Keywords: artist’s signatures, authenticity of an artwork, forensic handwriting analysis, graphic-comparative method

Procedia PDF Downloads 75
1552 Analytical Derivative: Importance on Environment and Water Analysis/Cycle

Authors: Adesoji Sodeinde

Abstract:

Analytical derivatives has recently undergone an explosive growth in areas of separation techniques, likewise in detectability of certain compound/concentrated ions. The gloomy and depressing scenario which charaterized the application of analytical derivatives in areas of water analysis, water cycle and the environment should not be allowed to continue unabated. Due to technological advancement in various chemical/biochemical analysis separation techniques is widely used in areas of medical, forensic and to measure and assesses environment and social-economic impact of alternative control strategies. This technological improvement was dully established in the area of comparison between certain separation/detection techniques to bring about vital result in forensic[as Gas liquid chromatography reveals the evidence given in court of law during prosecution of drunk drivers]. The water quality analysis,pH and water temperature analysis can be performed in the field, the concentration of dissolved free amino-acid [DFAA] can also be detected through separation techniques. Some important derivatives/ions used in separation technique. Water analysis : Total water hardness [EDTA to determine ca and mg ions]. Gas liquid chromatography : innovative gas such as helium [He] or nitrogen [N] Water cycle : Animal bone charcoal,activated carbon and ultraviolet light [U.V light].

Keywords: analytical derivative, environment, water analysis, chemical/biochemical analysis

Procedia PDF Downloads 326
1551 The Driving Force for Taiwan Social Innovation Business Model Transformation: A Case Study of Social Innovation Internet Celebrity Training Project

Authors: Shih-Jie Ma, Jui-Hsu Hsiao, Ming-Ying Hsieh, Shin-Yan Yang, Chun-Han Yeh, Kuo-Chun Su

Abstract:

In Taiwan, social enterprises and non-profit organizations (NPOs) are not familiar with innovative business models, such as live streaming. In 2019, a brand new course called internet celebrity training project is introduced to them by the Social Innovation Lab. The Goal of this paper is to evaluate the effect of this project, to explore the role of new technology (internet live stream) in business process management (BPM), and to analyze how live stream programs can assist social enterprises in creating new business models. Social Innovation, with the purpose to solve social issues in innovative ways, is one of the most popular topics in the world. Social Innovation Lab was established in 2017 by Executive Yuan in Taiwan. The vision of Social Innovation Lab is to exploit technology, innovation and experimental methods to solve social issues, and to maximize the benefits from government investment. Social Innovation Lab aims at creating a platform for both supply and demand sides of social issues, to make social enterprises and start-ups communicate with each other, and to build an eco-system in which stakeholders can make a social impact. Social Innovation Lab keeps helping social enterprises and NPOs to gain better publicity and to enhance competitiveness by facilitating digital transformation. In this project, Social Innovation Lab exerted the influence of social media such as YouTube and Facebook, to make social enterprises and start-ups adjust their business models by using the live stream of social media, which becomes one of the tools to expand their market and diversify their sales channels. Internet live stream training courses were delivered in different regions of Taiwan in 2019, including Taitung, Taichung, Kaohsiung and Hualien. Through these courses, potential groups and enterprises were cultivated to become so-called internet celebrities. With their concern about social issues in mind, these internet celebrities know how to manipulate social media to make a social impact in different fields, such as aboriginal people, food and agriculture, LOHAS (Lifestyles of Health and Sustainability), environmental protection and senior citizens. Participants of live stream training courses in Taiwan are selected to take in-depth interviews and questionnaire surveys. Results indicate that the digital transformation process of social enterprises and NPOs can be successful by implementing business process reengineering, a significant change made by social innovation internet celebrities. Therefore, this project can be the new driving force to facilitate the business model transformation in Taiwan.

Keywords: business process management, digital transformation, live stream, social innovation

Procedia PDF Downloads 136
1550 Assessment of E-learning Facilities and Information Need by Open and Distance Learning Students in Jalingo, Nigeria

Authors: R. M. Bashir, Sabo Elizabeth

Abstract:

Electronic learning is an increasingly popular learning approach in higher educational institutions due to vast growth of internet technology. An investigation on the assessment of e-learning facilities and information need by open and distance learning students in Jalingo, Nigeria was conducted. Structured questionnaires were administered to 70 students of the university. Information sourced from the respondents covered demographic, economic and institutional variables. Data collected for demographic variables were computed as frequency count and percentages. Information on assessment of e-learning facilities and information need among open and distance learning students was computed on a three or four point Likert Rating Scale. Findings indicated that there are more men compared to women, a large proportion of the respondents are married and there are more matured students. A high proportion of the students obtained qualifications higher than the secondary school certificate. The proportion of computer literate students was higher compared with those students that owned a computer. Inadequate e-books and reference materials, internet gadgets and inadequate books (hard copies) and reference material are factors that limit utilization of e-learning facilities. Inadequate computer facilities caused delay in examination schedule at the study center. Open and distance learning students required to a high extent information on university timetable and schedule of activities, books (hard and e-books) and reference materials and contact with course coordinators via internet for better learning and academic performance.

Keywords: open and distance learning, information required, electronic books, internet gadgets, Likert scale test

Procedia PDF Downloads 275
1549 Progress and Challenges of Smart Cities in India: An Exploratory Study

Authors: Sushil K. Sharma, Jeff Zhang, Saeed Tabar

Abstract:

Worldwide, several governments are utilizing the Internet of Things (IoT) and other information and communication technologies (ICTs) to create smart city infrastructures to improve both the quality of government services and citizen welfare. Over 700 cities from around the world have already started implementing their smart city projects. Smart City utilizes the network of connected things, or the Internet of Things (IoT), that interconnects devices and various components across city infrastructure, making them work together seamlessly to enhance the quality, performance, and interactivity of urban services, optimize resources, and reduce costs. Without developing smart cities, the accelerating growth of cities, and their disproportionate consumption of physical and social resources are unsustainable. In 2016, the Indian Government released a list of 100 cities with the intention of kick-starting the process of developing them into 'smart cities’ as part of the Smart Cities Mission. This study reports the progress and challenges of Smart City projects in India. The data were collected through the city/state government websites, media reports, and focus group discussions/interviews. The preliminary results indicate that smart city projects are not only behind in their implementation and scope but also lacks the sincerity for its implementation.

Keywords: smart city, smart government, Internet of Things, digital government

Procedia PDF Downloads 164
1548 Consumer Perception of 3D Body Scanning While Online Shopping for Clothing

Authors: A. Grilec, S. Petrak, M. Mahnic Naglic

Abstract:

Technological development and the globalization in production and sales of clothing in the last decade have significantly influenced the changes in consumer relationship with the industrial-fashioned apparel and in the way of clothing purchasing. The Internet sale of clothing is in a constant and significant increase in the global market, but the possibilities offered by modern computing technologies in the customization segment are not yet fully involved, especially according to the individual customer requirements and body sizes. Considering the growing trend of online shopping, the main goal of this paper is to investigate the differences in customer perceptions towards online apparel shopping and particularly to discover the main differences in perceptions between customers regarding three different body sizes. In order to complete the research goal, the quantitative study on the sample of 85 Croatian consumers was conducted in 2017 in Zagreb, Croatia. Respondents were asked to indicate their level of agreement according to a five-point Likert scale ranging from strongly disagree (1) to strongly agree (5). To analyze attitudes of respondents, simple and descriptive statistics were used. The main findings highlight the differences in respondent perception of 3D body scanning, using 3D body scanning in Internet shopping, online apparel shopping habits regarding their body sizes.

Keywords: consumer behavior, Internet, 3D body scanning, body types

Procedia PDF Downloads 152
1547 Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)

Authors: Dilip Singh Sisodia, Shrish Verma

Abstract:

Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.

Keywords: online social networking sites, spam, attacks, internet, clickjacking / likejacking, drive-by-download, URL shortening, networking, socially engineered attacks, elgg framework

Procedia PDF Downloads 334
1546 The Role of Intermediaries in E-Government Adoption in India: Bridging the Digital Divide

Authors: Rajiv Kumar, Amit Sachan, Arindam Mukherjee

Abstract:

Despite the transparency and benefits of e-government, and its potential to serve citizens better, there is low diffusion and adoption of e-government services in India. Limited access to computer and internet, lack of computer and internet skills, low trust in technology, and risk associated in using e-government services are major hindrances in e-government adoption in India. Despite a large number of citizens belonging to the non-adopter category, the government has made some services mandatory to be accessed online where citizens have no other choice. Also despite the digital divide, a large number of citizens prefer online access to government services. In such cases intermediaries like common service centers, internet café and services agents’ roles are significant for accessing e-government services. Hence research is needed to explore this. The study aims to investigate the role of intermediaries in online access to public services by citizens. Qualitative research methodology using semi-structured interview was used. The results show that intermediaries play an important role in bridging the digital divide. The study also highlights on what circumstances citizens are taking help of these intermediaries. The study then highlights its limitations and discusses scope for future study.

Keywords: adoption, digital divide, e-government, India, intermediaries

Procedia PDF Downloads 262
1545 Online Social Network Vital to Hospitality and Tourism Marketing and Management

Authors: Nureni Asafe Yekini, Olawale Nasiru Lawal, Bola Dada, Gabriel Adeyemi Okunlola

Abstract:

This study is focused on the strengths and challenges associated with using the online social network as a rapidly evolving medium in marketing tourism services and businesses among the youths in Nigeria. The paper examines the Nigerian tourists’ attitude, mainly towards three aspects: application of Internet for travel and tourism; usage of online social networks in sharing travel and tourism experiences; and trust in electronic-media for marketing tourism businesses and services. The aim of this research is to determine the level of application of internet tools in marketing tourism businesses and services in Nigeria. This study reports an empirical analysis based on data obtained from a survey among 1004 Nigerian tourists. The outcome confirms the research hypothesis and points to crucial importance of introducing online social network site for marketing tourism businesses and services in Nigeria, and increasing the awareness for Nigeria as a tourist destination. Moreover, the paper strongly recommends the use of online social network as a tool for marketing tourism businesses and services, and the need for identifying effective framework for application of ICT tools in marketing tourism businesses and services in Nigeria at large.

Keywords: tourism business, internet, online social networks, tourism services, ICT

Procedia PDF Downloads 343
1544 Utilization of Multi-Criteria Evaluation in Forensic Engineering and the Expertise outside Wall Subsystem

Authors: Tomas Barnak, Libor Matejka

Abstract:

The aim of this study is to create a standard application using multi-criteria evaluation in the field of forensic engineering. This situation can occur in the professional assessment in several cases such as when it is necessary to consider more criteria variant of the structural subsystems, more variants according to several criteria based on a court claim, which requires expert advice. A problematic situation arises when it is necessary to clearly determine the ranking of the options according to established criteria, and reduce subjective evaluation. For the procurement in the field of construction which is based on the prepared text of the law not only economic criteria but also technical, technological and environmental criteria will be determined. This fact substantially changes the style of evaluation of individual bids. For the above-mentioned needs of procurement, the unification of expert’s decisions and the use of multi-criteria assessment seem to be a reasonable option. In the case of experimental verification when using multi-criteria evaluation of alternatives construction subsystem the economic, technical, technological and environmental criteria will be compared. The core of the solution is to compare a selected number of set criteria, application methods and evaluation weighting based on the weighted values assigned to each of the criteria to use multi-criteria evaluation methods. The sequence of individual variations is determined by the evaluation of the importance of the values of corresponding criteria concerning expertise in the problematic of outside wall constructional subsystems.

Keywords: criteria, expertise, multi-criteria evaluation, outside wall subsystems

Procedia PDF Downloads 314
1543 Additional Opportunities of Forensic Medical Identification of Dead Bodies of Unkown Persons

Authors: Saule Mussabekova

Abstract:

A number of chemical elements widely presented in the nature is seldom met in people and vice versa. This is a peculiarity of accumulation of elements in the body, and their selective use regardless of widely changed parameters of external environment. Microelemental identification of human hair and particularly dead body is a new step in the development of modern forensic medicine which needs reliable criteria while identifying the person. In the condition of technology-related pressing of large industrial cities for many years and specific for each region multiple-factor toxic effect from many industrial enterprises it’s important to assess actuality and the role of researches of human hair while assessing degree of deposition with specific pollution. Hair is highly sensitive biological indicator and allows to assess ecological situation, to perform regionalism of large territories of geological and chemical methods. Besides, monitoring of concentrations of chemical elements in the regions of Kazakhstan gives opportunity to use these data while performing forensic medical identification of dead bodies of unknown persons. Methods based on identification of chemical composition of hair with further computer processing allowed to compare received data with average values for the sex, age, and to reveal causally significant deviations. It gives an opportunity preliminary to suppose the region of residence of the person, having concentrated actions of policy for search of people who are unaccounted for. It also allows to perform purposeful legal actions for its further identification having created more optimal and strictly individual scheme of personal identity. Hair is the most suitable material for forensic researches as it has such advances as long term storage properties with no time limitations and specific equipment. Besides, quantitative analysis of micro elements is well correlated with level of pollution of the environment, reflects professional diseases and with pinpoint accuracy helps not only to diagnose region of temporary residence of the person but to establish regions of his migration as well. Peculiarities of elemental composition of human hair have been established regardless of age and sex of persons residing on definite territories of Kazakhstan. Data regarding average content of 29 chemical elements in hair of population in different regions of Kazakhstan have been systemized. Coefficients of concentration of studies elements in hair relative to average values around the region have been calculated for each region. Groups of regions with specific spectrum of elements have been emphasized; these elements are accumulated in hair in quantities exceeding average indexes. Our results have showed significant differences in concentrations of chemical elements for studies groups and showed that population of Kazakhstan is exposed to different toxic substances. It depends on emissions to atmosphere from industrial enterprises dominating in each separate region. Performed researches have showed that obtained elemental composition of human hair residing in different regions of Kazakhstan reflects technogenic spectrum of elements.

Keywords: analysis of elemental composition of hair, forensic medical research of hair, identification of unknown dead bodies, microelements

Procedia PDF Downloads 135
1542 Green Supply Chain Network Optimization with Internet of Things

Authors: Sema Kayapinar, Ismail Karaoglan, Turan Paksoy, Hadi Gokcen

Abstract:

Green Supply Chain Management is gaining growing interest among researchers and supply chain management. The concept of Green Supply Chain Management is to integrate environmental thinking into the Supply Chain Management. It is the systematic concept emphasis on environmental problems such as reduction of greenhouse gas emissions, energy efficiency, recycling end of life products, generation of solid and hazardous waste. This study is to present a green supply chain network model integrated Internet of Things applications. Internet of Things provides to get precise and accurate information of end-of-life product with sensors and systems devices. The forward direction consists of suppliers, plants, distributions centres and sales and collect centres while, the reverse flow includes the sales and collects centres, disassembled centre, recycling and disposal centre. The sales and collection centre sells the new products are transhipped from factory via distribution centre and also receive the end-of life product according their value level. We describe green logistics activities by presenting specific examples including “recycling of the returned products and “reduction of CO2 gas emissions”. The different transportation choices are illustrated between echelons according to their CO2 gas emissions. This problem is formulated as a mixed integer linear programming model to solve the green supply chain problems which are emerged from the environmental awareness and responsibilities. This model is solved by using Gams package program. Numerical examples are suggested to illustrate the efficiency of the proposed model.

Keywords: green supply chain optimization, internet of things, greenhouse gas emission, recycling

Procedia PDF Downloads 322
1541 Mechanisms Underlying the Effects of School-Based Internet Intervention for Alcohol Drinking Behaviours among Chinese Adolescent

Authors: Keith T. S. Tung, Frederick K. Ho, Rosa S. Wong, Camilla K. M. Lo, Wilfred H. S. Wong, C. B. Chow, Patrick Ip

Abstract:

Objectives: Underage drinking is an important public health problem both locally and globally. Conventional prevention/intervention relies on unidirectional knowledge transfer such as mail leaflets or health talks which showed mixed results in changing the target behaviour. Previously, we conducted a school internet-based intervention which was found to be effective in reducing alcohol use among adolescents, yet the underlying mechanisms have not been properly investigated. This study, therefore, examined the mechanisms that explain how the intervention produced a change in alcohol drinking behaviours among Chinese adolescent as observed in our previous clustered randomised controlled trial (RCT) study. Methods: This is a cluster randomised controlled trial with parallel group design. Participating schools were randomised to the Internet intervention or the conventional health education group (control) with a 1:1 allocation ratio. Secondary 1–3 students of the participating schools were enrolled in this study. The Internet intervention was a web-based quiz game competition, in which participating students would answer 1,000 alcohol-related multiple-choice quiz questions. Conventional health education group received a promotional package on equivalent alcohol-related knowledge. The participants’ alcohol-related attitude, knowledge, and perceived behavioural control were self-reported before the intervention (baseline) and one month and three months after the intervention. Results: Our RCT results showed that participants in the Internet group were less likely to drink (risk ratio [RR] 0.79, p < 0.01) as well as in lesser amount (β -0.06, p < 0.05) compared to those in the control group at both post-intervention follow-ups. Within the intervention group, regression analyses showed that high quiz scorer had greater improvement in alcohol-related knowledge (β 0.28, p < 0.01) and attitude (β -0.26, p < 0.01) at 1 month after intervention, which in turn increased their perceived behavioural control against alcohol use (β 0.10 and -0.26, both p < 0.01). Attitude, compared to knowledge, was found to be a stronger contributor to the intervention effect on perceived behavioural control. Conclusions: Our internet-based intervention has demonstrated effectiveness in reducing the risk of underage drinking when compared with conventional health education. Our study results further showed an attitude to be a more important factor than knowledge in changing health-related behaviour. This has an important implication for future prevention/intervention on an underage drinking problem.

Keywords: adolescents, internet-based intervention, randomized controlled trial, underage drinking

Procedia PDF Downloads 141
1540 Internet of Things based AquaSwach Water Purifier

Authors: Karthiyayini J., Arpita Chowdary Vantipalli, Darshana Sailu Tanti, Malvika Ravi Kudari, Krtin Kannan

Abstract:

This paper is propelled from the generally existing undertaking of the smart water quality management, which addresses an IoT (Internet of things) based brilliant water quality observing (SWQM) framework which we call it AquaSwach that guides in the ceaseless estimation of water conditions dependent on five actual boundaries i.e., temperature, pH, electric conductivity and turbidity properties and water virtue estimation each time you drink water. Six sensors relate to Arduino-Mega in a discrete way to detect the water parameters. Extracted data from the sensors are transmitted to a desktop application developed in the NET platform and compared with the WHO (World Health Organization) standard values.

Keywords: AquaSwach, IoT, WHO, water quality

Procedia PDF Downloads 200
1539 Consumer Based Online Authenticity: An Exploratory Approach: Case of Terroir Product of Souss Massa Region, Morocco

Authors: Fatima Ezzahra Ouboutaib, Abdellatif Aitheda, Soumiya Mekkaoui

Abstract:

Marketing research is starting to focus on authenticity to position an offer, especially local products. However, its use remains more problematic with the internet for cooperatives. This paper investigates how digitalization impacts the satisfaction of the quest for authenticity. On the theoretical level, it explains authenticity in online and offline contexts in the postmodernism era. Then, an exploratory qualitative study tries to understand the contribution of digitization to the satisfaction of the search for authenticity. Therefore, cooperatives selling terroir products on the Internet are advised to keep also direct contact which tends to show a traditional manner of production to enhance customers’ perception of terroir product authenticity.

Keywords: authenticity, terroir product, online authenticity, postmodernism

Procedia PDF Downloads 118
1538 Mobile Systems: History, Technology, and Future

Authors: Shivendra Pratap Singh, Rishabh Sharma

Abstract:

The widespread adoption of mobile technology in recent years has revolutionized the way we communicate and access information. The evolution of mobile systems has been rapid and impactful, shaping our lives and changing the way we live and work. However, despite its significant influence, the history and development of mobile technology are not well understood by the general public. This research paper aims to examine the history, technology and future of mobile systems, exploring their evolution from early mobile phones to the latest smartphones and beyond. The study will analyze the technological advancements and innovations that have shaped the mobile industry, from the introduction of mobile internet and multimedia capabilities to the integration of artificial intelligence and 5G networks. Additionally, the paper will also address the challenges and opportunities facing the future of mobile technology, such as privacy concerns, battery life, and the increasing demand for high-speed internet. Finally, the paper will also provide insights into potential future developments and innovations in the mobile sector, such as foldable phones, wearable technology, and the Internet of Things (IoT). The purpose of this research paper is to provide a comprehensive overview of the history, technology, and future of mobile systems, shedding light on their impact on society and the challenges and opportunities that lie ahead.

Keywords: mobile technology, artificial intelligence, networking, iot, technological advancements, smartphones

Procedia PDF Downloads 79
1537 Effect of Media on Psycho-Social Interaction among the Children with Their Parents of Urban People in Dhaka

Authors: Nazma Sultana

Abstract:

Social media has become an important part of our daily life. It has a significance influences on the people who use them in their daily life frequently. The number of people using social network sites has been increasing continuously. For this frequent utilization has started to affect our social life. This study examine whether the use of social network sites affects the psychosocial interaction between children and their parents. At first parents introduce their children to the internet and different type of device in their early childhood. Many parents use device for feeding their children by watching rhyme or cartoon. As a result children are habituate with it. In Bangladesh 70% people are heavy internet users. About 23 percent of them spend more than five hours on the social networking sites a day. Media are increasing pervasive in the lives of children-roughly the average child today spends nearly about 45 hours per week with media, compared with 17 hours with parents and 30 hours in school. According to a social learning theory, children & adolescents learn by observing & imitating what they see on screen particularly when these behaviors are realistic or are rewarded. The influence of the media on the psychosocial development of children is profound. Thus it is important for parents to provide guidance on age-appropriate use of all media, including television, radio, music, video games and the internet.

Keywords: social media, psychosocial, Technology, Parent, Social Relationship, Adolescents, Teenage, Youth

Procedia PDF Downloads 99