Search results for: privacy issues
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5328

Search results for: privacy issues

4998 Locket Application

Authors: Farah Al-Fityani, Aljohara Alsowail, Shatha Bindawood, Heba Balrbeah

Abstract:

Locket is a popular app that lets users share spontaneous photos with a close circle of friends. The app offers a unique way to stay connected with loved ones by allowing users to see glimpses of their day through photos displayed on a widget on their home screen. This summary outlines the process of developing an app like Locket, highlighting the importance of user privacy and security. It also details the findings of a study on user engagement with the Locket app, revealing positive sentiment towards its features and concept but also identifying areas for improvement. Overall, the summary portrays Locket as a successful app that is changing the way people connect on social media.

Keywords: locket, app, machine learning, connect

Procedia PDF Downloads 18
4997 A Framework on the Critical Success Factors of E-Learning Implementation in Higher Education: A Review of the Literature

Authors: Sujit K. Basak, Marguerite Wotto, Paul Bélanger

Abstract:

This paper presents a conceptual framework on the critical success factors of e-learning implementation in higher education, derived from an in-depth survey of literature review. The aim of this study was achieved by identifying critical success factors that affect for the successful implementation of e-learning. The findings help to articulate issues that are related to e-learning implementation in both formal and non-formal higher education and in this way contribute to the development of programs designed to address the relevant issues.

Keywords: critical success factors, e-learning, higher education, life-long learning

Procedia PDF Downloads 348
4996 Cross-Dialectal Study of Issues in Dagbanli Phonology

Authors: Abdul-Razak Inusah

Abstract:

The study is a cross-sectional investigation of issues in Dagbanli Phonology, a Mabia language spoken in the Northern Region of Ghana. The issues investigated and assessed for the purpose of Dagbanli phonology are the status of the velar fricatives [x, ɣ] and the flap [ɾ] across Dagbanli dialects. The ethnographic approach is employed to solicit the primary data from bucolic Dagbanli speech communities. The descriptive method is engaged for the analysis of the primary data available. The investigation reveals that the dialects have the velar fricatives [x, ɣ] confined to specific segmental contexts with a particular inventory stricture. The flap[ɾ] is noticed to occur mostly in intervocalic but entirely missing in Dagbanli indigenous words in word-initial. The velar fricatives [x, ɣ] and the flap[ɾ] are observed to be non-contrastive and only suffice as dialectal allophones in the language. The paper shows evidence of coalesce of non-coronal labial /m/ and coronal fricative /s/ to produce dorsal fricative [x] in intervocalic and coalesce of stem final stop /ɡ/ and suffix onset fricative /s/ to yield the dorsal fricative [x], a finding which shows the status of the segment [x] in Dagbanli phonology. The paper concludes that the segments [x], [ɣ] and [ɾ] are positional variants of /ɡ+s/ or /m+s/, /ɡ/ and /d/.

Keywords: Dagbani, phonology, dialect, segment, fricatives, coalesce

Procedia PDF Downloads 34
4995 A Novel Parametric Chaos-Based Switching System PCSS for Image Encryption

Authors: Mohamed Salah Azzaz, Camel Tanougast, Tarek Hadjem

Abstract:

In this paper, a new low-cost image encryption technique is proposed and analyzed. The developed chaos-based key generator provides complex behavior and can change it automatically via a random-like switching rule. The designed encryption scheme is called PCSS (Parametric Chaos-based Switching System). The performances of this technique were evaluated in terms of data security and privacy. Simulation results have shown the effectiveness of this technique, and it can thereafter, ready for a hardware implementation.

Keywords: chaos, encryption, security, image

Procedia PDF Downloads 457
4994 Young People, the Internet and Inequality: What are the Causes and Consequences of Exclusion?

Authors: Albin Wallace

Abstract:

Part of the provision within educational institutions is the design, commissioning and implementation of ICT facilities to improve teaching and learning. Inevitably, these facilities focus largely on Internet Protocol (IP) based provisions including access to the World Wide Web, email, interactive software and hardware tools. Educators should be committed to the use of ICT to improve learning and teaching as well as to issues relating to the Internet and educational disadvantage, especially with respect to access and exclusion concerns. In this paper I examine some recent research into the issue of inequality and use of the Internet during which I discuss the causes and consequences of exclusion in the context of social inequality, digital literacy and digital inequality, also touching on issues of global inequality.

Keywords: inequality, internet, education, design

Procedia PDF Downloads 471
4993 An Empirical Investigation of the Challenges of Secure Edge Computing Adoption in Organizations

Authors: Hailye Tekleselassie

Abstract:

Edge computing is a spread computing outline that transports initiative applications closer to data sources such as IoT devices or local edge servers, and possible happenstances would skull the action of new technologies. However, this investigation was attained to investigation the consciousness of technology and communications organization workers and computer users who support the service cloud. Surveys were used to achieve these objectives. Surveys were intended to attain these aims, and it is the functional using survey. Enquiries about confidence are also a key question. Problems like data privacy, integrity, and availability are the factors affecting the company’s acceptance of the service cloud.

Keywords: IoT, data, security, edge computing

Procedia PDF Downloads 70
4992 An Analysis of Brand-Building Characteristics in the Iran Airline Websites

Authors: Pedram Behyar, Zahra Bayat

Abstract:

The internet and web are changing ways of “far reaching scope and potential for transformation of the marketing functions”. The web is developing in a faster rate than any previous new communication medium. The website of destination has become a crucial branding channel, that is why all businesses are changing their way to communicate with their customers to encounter their needs and wants in better ways. Website provides numerous opportunities for businesses to strengthen their relationship with their customers. One of these opportunities is website component that enables internet users to make two-way communication with the businesses.

Keywords: marketing communication, brand image, usability, privacy and security, personalization and customization, responsiveness, customer online web experience

Procedia PDF Downloads 481
4991 The Attitude towards Sustainable Development Issues among Malaysian Engineering Undergraduates

Authors: Balamuralithara Balakrishnan

Abstract:

This paper reports the findings of the perception and attitude towards Sustainable Development among Malaysian undergraduates. The study was carried out involving 86 engineering undergraduates from three universities in Malaysia. This research was conducted based on a survey whereby the respondents were given a questionnaire to gauge their attitude towards sustainable development. The output of the analyses showed that the respondents have an appropriate attitude towards the sustainability issues expect for economic and social equality aspects. These findings suggest that the engineering educators involved in sustainable development education need to educate undergraduate students on this important issue. This investigation serves as a cornerstone to which the current paradigm of sustainable development education can be examined for further improvement by related stakeholders.

Keywords: sustainable development, engineering education, Malaysia, attitude

Procedia PDF Downloads 133
4990 Issues in the Learning and Construction of a National Music Identity in Multiracial Malaysia: Diversity, Complexity, and Contingency

Authors: Loo Fung Ying, Loo Fung Chiat

Abstract:

The formation of a musical identity that shapes the nation in this multiracial country reveals many complexities, conundrums, and contingencies. Creativity and identity formation at the level of an individual or a collective group further diversified musical expression, representation, and style, which has led to an absence of regularities. In addition, ‘contemporizing accretion,’ borrowing a term used by Schnelle in theology (2009), further complicates musical identity, authenticity, conception, and realization. Thus, in this paper, we attempt to define the issues surrounding the teaching and learning of the multiracial Malaysian national music identity. We also discuss unnecessary power hierarchies, interracial conflicts, and sentiments in the construct of a multiracial national music identity by referring to genetic origins, the evolution of music, and the neglected issues of representation and reception at a global level from a diachronic perspective. Lastly, by synthesizing Ladson-Billings, Gay, Kruger, and West-Burns’s culturally relevant/responsive pedagogical theories, we discuss possible analytic tools for consideration that are more multiculturally relevant and responsive for the teaching, learning, and construction of a multiracial Malaysian national music identity.

Keywords: Malaysia, music, multiracial, national music identity, culturally relevant/responsive pedagogy

Procedia PDF Downloads 188
4989 Improving Sustainability of the Apparel Industry with Joining the Forces among the Brand Owners: The Case Study of Digital Textile Printing

Authors: Babak Mohajeri, Elina Ilen, Timo Nyberg

Abstract:

Sustainability has become an important topic in contemporary business. The apparel industry is a good example to assess sustainability in practice. Value chains in the apparel industry are faced with various challenges regarding sustainability issues. Apparel companies pay higher attention to economic sustainability issues, and environmental and social sustainability issues of the apparel industry are often underrated. In this paper, we analyze the role of the different players in the value chain of the apparel industry in terms of sustainability. We realize that the brand owners have the highest impact on improving the sustainability of the apparel industry. We design a collaborative business model to join the forces among the brand owners for improving the sustainability of the apparel industry throughout the value chain. We have conducted a case study of shifting from conventional screen-printing to more environmentally sustainable digital textile printing. We suggest that this shift can be accelerated if the brand owners join their forces together to shift from conventional printing to digital printing technology in the apparel industry. Based on the proposed business model, we suggest future directions for using joining the forces among the brand owners for case of sustainability

Keywords: sustainability, digital textile printing , joining forces, apparel industry

Procedia PDF Downloads 395
4988 Policy Implications of Cashless Banking on Nigeria’s Economy

Authors: Oluwabiyi Adeola Ayodele

Abstract:

This study analysed the Policy and general issues that have arisen over time in Nigeria’ Cashless banking environment as a result of the lack of a Legal framework on Electronic banking in Nigeria. It undertook an in-depth study of the cashless banking system. It discussed the evolution, growth and development of cashless banking in Nigeria; It revealed the expected benefits of the cashless banking system; It appraised regulatory issues and other prevalent problems on cashless banking in Nigeria; and made appropriate recommendations where necessary. The study relied on primary and secondary sources of information. The primary sources included the Constitution of the Federal Republic of Nigeria, Statutes, Conventions and Judicial decisions, while the secondary sources included Books, Journals Articles, Newspapers and Internet Materials. The study revealed that cashless banking has been adopted in Nigeria but still at the developing stage. It revealed that there is no law for the regulation of cashless banking in Nigeria, what Nigeria relies on for regulation is the Central Bank of Nigeria’s Cashless Policy, 2014. The Banks and Other Financial Institutions Act Chapter B3, LFN, 2004 of Nigeria lack provision to accommodate issues on Internet banking. However, under the general principles of legality in criminal law, and by the provisions of the Nigerian Constitution, a person can only be punished for conducts that have been defined to be criminal by written laws with the penalties specifically stated in the law. Although Nigeria has potent laws for the regulation of paper banking, these laws cannot be substituted for paperless transactions. This is because the issues involved in both transactions vary. The study also revealed that the absence of law in the cashless banking environment in Nigeria will subject consumers to endless risks. This study revealed that the creation of banking markets via the Internet relies on both available technologies and appropriate laws and regulations. It revealed however that Law of some of the countries considered on cashless banking has taken care of most of the legal issues and other problems prevalent in the cashless banking environment. The study also revealed some other problems prevalent in the Nigerian cashless banking environment. The study concluded that for Nigeria to find solutions to the legal issues raised in its cashless banking environment and other problems of cashless banking, it should have a viable legal Frame work for internet banking. The study concluded that the Central Bank of Nigeria’s Policy on Cashless banking is not potent enough to tackle the challenges posed to cashless banking in Nigeria because policies only have a persuasive effect and not a binding effect. There is, therefore, a need for appropriate Laws for the regulation of cashless Banking in Nigeria. The study also concluded that there is a need to create more awareness of the system among Nigerians and solve infrastructural problems like prevalent power outage which often have been creating internet network problem.

Keywords: cashless-banking, Nigeria, policies, laws

Procedia PDF Downloads 476
4987 Developing a Modular Architecture of Apparel Product

Authors: Yu Zhao, Mengqin Sun, Yahui Zhang

Abstract:

Apparel products (or apparel) with the sense of aesthetics, usability (ergonomics) and function are fundamental and varied in people’s daily life. The numerous apparel thus produced by apparel industry, have been triggered many issues, such as the waste of sources and the environmental pollutions. In this study, a hybrid architecture called modular architecture of apparel (MAA) has been proposed to deal with the variety of apparel, and thus to overcome the aforementioned issues. Generally, the establishment of MAA takes advantage of the modular design of a general product that a product is assembled with many modules through their modular interface connector. The development of MAA is to first analyze the structure of apparel in terms of the necessity to form an apparel and the aesthetics, ergonomics, and function of apparel; then to divide apparel into many segments (or module in product design) based on the structure of apparel; to develop modular interfaces and modular interface connectors in terms of the features of apparel’s modules. It is noted that in the general product design, modules of a product are only about the function and ergonomics, but in MAA, the module of aesthetics is developed. Further, an apparel design with employing the MAA is carried out to validate its usefulness and efficiency. There are three contributions out of this study, the first is to overcome the aforementioned issues (i.e. waste of source and environmental pollutions); the second is the improvement of the modular design for product by considering aesthetics; the third is to add the value in realizing the personalized mass production of apparel in the near future.

Keywords: apparel, architecture, modular design, segment

Procedia PDF Downloads 264
4986 Early Initiation of Breastfeeding and Its Determinants among Non-Caesarean Deliveries at Primary and Secondary Health Facilities: A Case Observational Study

Authors: Farhana Karim, Abdullah N. S. Khan, Mohiuddin A. K. Chowdhury, Nabila Zaka, Alexander Manu, Shams El Arifeen, Sk Masum Billah

Abstract:

Breastfeeding, an integral part of newborn care, can reduce 55-87% of all-cause neonatal mortality and morbidity. Early initiation of breastfeeding within 1 hour of birth can avert 22% of newborn mortality. Only 45% of world’s newborns and 42% of newborns in South-Asia are put to the breast within one hour of birth. In Bangladesh, only a half of the mothers practice early initiation of breastfeeding which is less likely to be practiced if the baby is born in a health facility. This study aims to generate strong evidence for early initiation of breastfeeding practices in the government health facilities and to explore the associated factors influencing the practice. The study was conducted in selected health facilities in three neighbouring districts of Northern Bangladesh. Total 249 normal vaginal delivery cases were observed for 24 hours since the time of birth. The outcome variable was initiation of breastfeeding within 1 hour while the explanatory variables included type of health facility, privacy, presence of support person, stage of labour at admission, need for augmentation of labour, complications during delivery, need for episiotomy, spontaneous cry of the newborn, skin-to-skin contact with mother, post-natal contact with the service provider, receiving a post-natal examination and counselling on breastfeeding during postnatal contact. The simple descriptive statistics were employed to see the distribution of samples according to socio-demographic characteristics. Kruskal-Wallis test was carried out for testing the equality of medians among two or more categories of each variable and P-value is reported. A series of simple logistic regressions were conducted with all the potential explanatory variables to identify the determining factors for breastfeeding within 1 hour in a health facility. Finally, multiple logistic regression was conducted including the variables found significant at bi-variate analyses. Almost 90% participants initiated breastfeeding at the health facility and median time to initiate breastfeeding was 38 minutes. However, delivering in a sub-district hospital significantly delayed the breastfeeding initiation in comparison to delivering in a district hospital. Maintenance of adequate privacy and presence of separate staff for taking care of newborn significantly reduced the time in early breastfeeding initiation. Initiation time was found longer if the mother had an augmented labour, obstetric complications, and the newborn needed resuscitation. However, the initiation time was significantly early if the baby was put skin-to-skin on mother’s abdomen and received a postnatal examination by a provider. After controlling for the potential confounders, the odds of initiating breastfeeding within one hour of birth is higher if mother gives birth in a district hospital (AOR 3.0: 95% CI 1.5, 6.2), privacy is well-maintained (AOR 2.3: 95% CI 1.1, 4.5), babies cry spontaneously (AOR 7.7: 95% CI 3.3, 17.8), babies are put to skin-to-skin contact with mother (AOR 4.6: 95% CI 1.9, 11.2) and if the baby is examined by a provider in the facility (AOR 4.4: 95% CI 1.4, 14.2). The evidence generated by this study will hopefully direct the policymakers to identify and prioritize the scopes for creating and supporting early initiation of breastfeeding in the health facilities.

Keywords: Bangladesh, early initiation of breastfeeding, health facility, normal vaginal delivery, skin to skin contact

Procedia PDF Downloads 136
4985 Study of Parking Demand for Offices – Case Study: Kolkata

Authors: Sanghamitra Roy

Abstract:

In recent times, India has experienced the phenomenal rise in the number of registered vehicles and vehicular trips, particularly intra-city trips in most of its urban areas. The increase in vehicle ownership and use have increased parking demand immensely and accommodating the same is now a matter of big concern. Most cities do not have adequate off-street parking facilities thus forcing people to park on the streets. This has resulted in decreased carrying capacity, decreased traffic speed, increased congestion, and increased environmental problems. While integrated multi-modal transportation system is the answer to such problems, parking issues will continue to exist. In Kolkata, only 6.4% land is devoted for roads. The consequences of this huge crunch in road spaces coupled with increased parking demand are severe particularly in the CBD and major commercial areas, making the role of off-street parking facilities in Kolkata even more critical. To meaningfully address parking issues, it is important to identify the factors that influence parking demand so that it can be assessed and comprehensive parking policies and plans for the city can be formulated. This paper aims at identifying the factors that contribute towards parking demand for offices in Kolkata and their degree of correlation with parking demand. The study is limited to home-to-work trips located within Kolkata Municipal Corporation (KMC) where parking related issues are most pronounced. The data for the study is collected through personal interviews, questionnaires and direct observations from offices across the wards of KMC. SPSS is used for classification of the data and analyses of the same. The findings of this study will help in re-assessment of the parking requirements specified in The Kolkata Municipal Corporation Building Rules as a step towards alleviating parking related issues in the city.

Keywords: building rules, office spaces, parking demand, urbanization

Procedia PDF Downloads 303
4984 Creation of a Care Robot Impact Assessment

Authors: Eduard Fosch-Villaronga

Abstract:

This paper pioneers Care Robot Impact Assessment (CRIA), a methodology used to identify, analyze, mitigate and eliminate the risks posed by the insertion of non-medical personal care robots (PCR) in medical care facilities. Its precedent instruments (Privacy and Surveillance Impact Assessment (PIA and SIA)) fall behind in coping with robots. Indeed, personal care robots change dramatically how care is delivered. The paper presents a specific risk-sector methodology, identifies which robots are under its scope and presents some of the challenges introduced by these robots.

Keywords: ethics, impact assessment, law, personal care robots

Procedia PDF Downloads 557
4983 The Effect of General Data Protection Regulation on South Asian Data Protection Laws

Authors: Sumedha Ganjoo, Santosh Goswami

Abstract:

The rising reliance on technology places national security at the forefront of 21st-century issues. It complicates the efforts of emerging and developed countries to combat cyber threats and increases the inherent risk factors connected with technology. The inability to preserve data securely might have devastating repercussions on a massive scale. Consequently, it is vital to establish national, regional, and global data protection rules and regulations that penalise individuals who participate in immoral technology usage and exploit the inherent vulnerabilities of technology. This study paper seeks to analyse GDPR-inspired Bills in the South Asian Region and determine their suitability for the development of a worldwide data protection framework, considering that Asian countries are much more diversified than European ones. In light of this context, the objectives of this paper are to identify GDPR-inspired Bills in the South Asian Region, identify their similarities and differences, as well as the obstacles to developing a regional-level data protection mechanism, thereby satisfying the need to develop a global-level mechanism. Due to the qualitative character of this study, the researcher did a comprehensive literature review of prior research papers, journal articles, survey reports, and government publications on the aforementioned topics. Taking into consideration the survey results, the researcher conducted a critical analysis of the significant parameters highlighted in the literature study. Many nations in the South Asian area are in the process of revising their present data protection measures in accordance with GDPR, according to the primary results of this study. Consideration is given to the data protection laws of Thailand, Malaysia, China, and Japan. Significant parallels and differences in comparison to GDPR have been discussed in detail. The conclusion of the research analyses the development of various data protection legislation regimes in South Asia.

Keywords: data privacy, GDPR, Asia, data protection laws

Procedia PDF Downloads 64
4982 In Its 20th Anniversary, Will Dayton Peace Agreement Continue or Complete Its Mission?

Authors: Halit Turan, Mehmet Ozturk, Serdal Akyuz

Abstract:

General Framework Agreement for Peace (Dayton Peace Agreement) in Bosnia and Herzegovina (GFAP), is one of the most challenging issues in the contemporary peace studies scholarship. It is clear that this agreement has created an exceptional state structure which Bosnia and Herzegovina has still executed for 20 years. The agreement, signed reluctantly by warring sides to end war, has carried out reaching the present day. Demonstrations held by unemployed people in the early of 2014 can be seen as a symptom of discontent about low economic wealth level which is a clear consequence of agreement. This paper lays out the influences of problems stemmed from the agreement to the future of country especially in terms of economic issues.

Keywords: Bosnia and Herzegovina, dayton peace agreement, economic problems, social discontent

Procedia PDF Downloads 236
4981 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 220
4980 Second Language Skill through M-Learning

Authors: Subramaniam Chandran, A. Geetha

Abstract:

This paper addresses three issues: how to prepare the instructional design for imparting English language skill from inter-disciplinary self-learning material; how the disadvantaged students are benefited from such kind of language skill imparted through m-learning; and how do m-learners perform better than the other learners. This paper examines these issues through an experimental study conducted among the distance learners enrolled in a preparatory program for bachelor’s degree. This program is designed for the disadvantaged learners especially for the school drop-outs to qualify to pursue graduate program through distant education. It also explains how mobile learning helps them to enhance their capacity in learning despite their rural background and other disadvantages. In India, nearly half of the students enrolled in schools do not complete their study. The pursuance of higher education is very low when compared with developed countries. This study finds a significant increase in their learning capacity and mobile learning seems to be a viable alternative where the conventional system could not reach the disadvantaged learners. Improving the English language skill is one of the reasons for such kind of performance. Exercises framed from the relevant self-learning material for enhancing English language skill not only improves language skill but also widens the subject-knowledge. This paper explains these issues out of the study conducted among the disadvantaged learners.

Keywords: English language skill, disadvantaged learners, distance education, m-learning

Procedia PDF Downloads 403
4979 Early Installation Effect on the Machines’ Generated Vibration

Authors: Maitham Al-Safwani

Abstract:

Motor vibration issues were analyzed by several studies. It is generally accepted that vibration issues result from poor equipment installation. We had a water injection pump tested in the factory and exceeded the pump the vibration limit. Once the pump was brought to the site, its half-size shim plates were replaced with full-size shims plates that drastically reduced the vibration. In this study, vibration data was recorded for several similar motors run at the same and different speeds. The vibration values were recorded -for two and a half hours- and the vibration readings were analyzed to determine when the readings became consistent. This was as well supported by recording the audio noises produced by some machines seeking a relationship between changes in machine noises and machine abnormalities, such as vibration.

Keywords: vibration, noise, installation, machine

Procedia PDF Downloads 165
4978 The Effects of Cost-Sharing Contracts on the Costs and Operations of E-Commerce Supply Chains

Authors: Sahani Rathnasiri, Pritee Ray, Sardar M. N. Isalm, Carlos A. Vega-Mejia

Abstract:

This study develops a cooperative game theory-based cost-sharing contract model for a business to consumer (B2C) e-commerce supply chain to minimize the overall supply chain costs and the individual costs within an information asymmetry scenario. The objective of this study is to address the issues of strategic interactions among the key players of the e-commerce supply chain operation, which impedes the optimal operational outcomes. Game theory has been included in the field of supply chain management to resolve strategic decision-making issues; however, most of the studies are limited only to two-echelons of the supply chains. Multi-echelon supply chain optimizations based on game-theoretic models are less explored in the previous literature. This study adopts a cooperative game model to focus on the common payoff of operations and addresses the issues of information asymmetry and coordination of a three-echelon e-commerce supply chain. The cost-sharing contract model integrates operational features such as production, inventory management and distribution with the contract related constraints. The outcomes of the model highlight the importance of maintaining lower operational costs by all players to obtain benefits from the cost-sharing contract. Further, the cost-sharing contract ensures true cost revelation, and hence eliminates the information asymmetry issues among the players. Comparing the results of the contract model with the de-centralized e-commerce supply chain operation further emphasizes that the cost-sharing contract derives Pareto-improved outcomes and minimizes the costs of overall e-commerce supply chain operation.

Keywords: cooperative game theory, cost-sharing contract, e-commerce supply chain, information asymmetry

Procedia PDF Downloads 108
4977 Cognitive Models of Health Marketing Communication in the Digital Era: Psychological Factors, Challenges, and Implications

Authors: Panas Gerasimos, Kotidou Varvara, Halkiopoulos Constantinos, Gkintoni Evgenia

Abstract:

As a result of growing technology and briefing by the internet, users resort to the internet and subsequently to the opinion of an expert. In many cases, they take control of their health in their hand and make a decision without the contribution of a doctor. According to that, this essay intends to analyze the confidence of searching health issues on the internet. For the fulfillment of this study, there has been a survey among doctors in order to find out the reasons a patient uses the internet about their health problems and the consequences that health information could lead by searching on the internet, as well. Specifically, the results regarding the research of the users demonstrate: a) the majority of users make use of the internet about health issues once or twice a month, b) individuals that possess chronic disease make health search on the internet more frequently, c) the most important topics that the majority of users usually search are pathological, dietary issues and the search of issues that are associated with doctors and hospitals. However, it observed that topic search varies depending on the users’ age, d) the most common sources of information concern the direct contact with doctors, as there is a huge preference from the majority of users over the use of the electronic form for their briefing and e) it has been observed that there is large lack of knowledge about e-health services. From the doctor's point of view, the following conclusions occur: a) almost all doctors use the internet as their main source of information, b) the internet has great influence over doctors’ relationship with the patients, c) in many cases a patient first makes a visit to the internet and then to the doctor, d) the internet significantly has a psychological impact on patients in order to for them to reach a decision, e) the most important reason users choose the internet instead of the health professional is economic, f) the negative consequence that emerges is inaccurate information, g) and the positive consequences are about the possibility of online contact with the doctor and contributes to the easy comprehension of the doctor, as well. Generally, it’s observed from both sides that the use of the internet in health issues is intense, which declares that the new means the doctors have at their disposal, produce the conditions for radical changes in the way of providing services and in the doctor-patient relationship.

Keywords: cognitive models, health marketing, e-health, psychological factors, digital marketing, e-health services

Procedia PDF Downloads 188
4976 Transcending the Boundary of Traumas: Spatial Trauma in Richard Powers' 'The Echo Maker'

Authors: Nodi Islam

Abstract:

This paper critically reads Richard Powers’ novel The Echo Maker to read and understand the personal traumas of the characters in the novel depending on the various situations they face throughout the story. Also, the paper attempts to read different traumas and disorders due to their different situations. With a focus on the individual experiences, this paper addresses the core issues of trauma, which triggers their reactions and reads the novel through theories of Freud, Caruth, and other critics in this field. While transcending the boundary of personal and collective trauma, this paper suggests that traumas not only arise from the core mental issues, from both past or present memories; it also depends on places too which can be called, according to Yi-Fu Tuan, topophobia. Intimate places such as home provoke not only attachment and expectation but also produce fear in a person. Failure in identifying with such places means losing a central piece of identity of the individual. In order to analyse the traumas in the novel, the characters’ association with homes and places has been provided. This paper attempts to suggest that people are not traumatised because of what Freud explained as unpleasant memories of the past but also intimacy and lost identities related to a place can trigger trauma.

Keywords: spatial trauma, traumatic stress disorder, identity and place, core mental issues

Procedia PDF Downloads 128
4975 Vocational and Technical Education in Nigeria: Issues and Challenges

Authors: Maikudi Umar

Abstract:

This paper conceived Vocational and Technical Education as those aspects of educational process, in addition to general education leading to acquisition of practical skills, attitudes as well as basic scientific knowledge as it relates to occupations in various sectors of the economic and social life. The paper therefore viewed Vocational and Technical education as those aspects of educational training designed to provide the recipient with the skills abilities and understanding needed for efficient performance in chosen occupational carrier for self reliance. The paper also examined some major inhibitions to the attainment of self reliance through VTE. The paper also recommended a change of attitudes by governments in Nigeria by providing adequate equipment so as to meet up with the challenges.

Keywords: vocational education, technical education, skills and self reliance, issues and challenges

Procedia PDF Downloads 457
4974 Imparting Second Language Skill through M-Learning

Authors: Subramaniam Chandran, A. Geetha

Abstract:

This paper addresses three issues: how to prepare instructional design for imparting English language skill from inter-disciplinary self-learning material; how the disadvantaged students are benefited from such kind of language skill imparted through m-learning; and how do the m-learners perform better than the other learners. This paper examines these issues through an experimental study conducted among the distance learners enrolled in preparatory program for bachelor’s degree. This program is designed for the disadvantage learners especially for the school drop-outs to qualify to pursue graduate program through distant education. It also explains how mobile learning helps them to enhance their capacity in learning despite their rural background and other disadvantages. In India nearly half of the students enrolled in schools do not complete their study. The pursuance of higher education is very low when compared with developed countries. This study finds a significant increase in their learning capacity and mobile learning seems to be a viable alternative where conventional system could not reach the disadvantaged learners. Improving the English language skill is one of the reasons for such kind of performance. Exercises framed from the relevant self-learning material for enhancing English language skill not only improves language skill but also widens the subject-knowledge. This paper explains these issues out of the study conducted among the disadvantaged learners.

Keywords: English language skill, disadvantaged learners, distance education, m-learning

Procedia PDF Downloads 639
4973 Forecasting Optimal Production Program Using Profitability Optimization by Genetic Algorithm and Neural Network

Authors: Galal H. Senussi, Muamar Benisa, Sanja Vasin

Abstract:

In our business field today, one of the most important issues for any enterprises is cost minimization and profit maximization. Second issue is how to develop a strong and capable model that is able to give us desired forecasting of these two issues. Many researches deal with these issues using different methods. In this study, we developed a model for multi-criteria production program optimization, integrated with Artificial Neural Network. The prediction of the production cost and profit per unit of a product, dealing with two obverse functions at same time can be extremely difficult, especially if there is a great amount of conflict information about production parameters. Feed-Forward Neural Networks are suitable for generalization, which means that the network will generate a proper output as a result to input it has never seen. Therefore, with small set of examples the network will adjust its weight coefficients so the input will generate a proper output. This essential characteristic is of the most important abilities enabling this network to be used in variety of problems spreading from engineering to finance etc. From our results as we will see later, Feed-Forward Neural Networks has a strong ability and capability to map inputs into desired outputs.

Keywords: project profitability, multi-objective optimization, genetic algorithm, Pareto set, neural networks

Procedia PDF Downloads 424
4972 Using Soft Systems Methodology in the Healthcare Industry of Mauritius

Authors: Arun Kumar, Neelesh Haulder

Abstract:

This paper identifies and resolves some key issues relating to a specific aspect within the supply chain logistics of the public health care industry in the Republic of Mauritius. The analysis and the proposed solution are performed using soft systems methodology (SSM). Through the application of this relevant systematic approach at problem solving, the aim is to obtain an in-depth analysis of the problem, incorporating every possible world view of the problem and consequently to obtain a well explored solution aimed at implementing relevant changes within the current supply chain logistics of the health care industry, with the purpose of tackling the key identified issues.

Keywords: soft systems methodology, CATWOE, healthcare, logistics

Procedia PDF Downloads 499
4971 A Lightweight Blockchain: Enhancing Internet of Things Driven Smart Buildings Scalability and Access Control Using Intelligent Direct Acyclic Graph Architecture and Smart Contracts

Authors: Syed Irfan Raza Naqvi, Zheng Jiangbin, Ahmad Moshin, Pervez Akhter

Abstract:

Currently, the IoT system depends on a centralized client-servant architecture that causes various scalability and privacy vulnerabilities. Distributed ledger technology (DLT) introduces a set of opportunities for the IoT, which leads to practical ideas for existing components at all levels of existing architectures. Blockchain Technology (BCT) appears to be one approach to solving several IoT problems, like Bitcoin (BTC) and Ethereum, which offer multiple possibilities. Besides, IoTs are resource-constrained devices with insufficient capacity and computational overhead to process blockchain consensus mechanisms; the traditional BCT existing challenge for IoTs is poor scalability, energy efficiency, and transaction fees. IOTA is a distributed ledger based on Direct Acyclic Graph (DAG) that ensures M2M micro-transactions are free of charge. IOTA has the potential to address existing IoT-related difficulties such as infrastructure scalability, privacy and access control mechanisms. We proposed an architecture, SLDBI: A Scalable, lightweight DAG-based Blockchain Design for Intelligent IoT Systems, which adapts the DAG base Tangle and implements a lightweight message data model to address the IoT limitations. It enables the smooth integration of new IoT devices into a variety of apps. SLDBI enables comprehensive access control, energy efficiency, and scalability in IoT ecosystems by utilizing the Masked Authentication Message (MAM) protocol and the IOTA Smart Contract Protocol (ISCP). Furthermore, we suggest proof-of-work (PoW) computation on the full node in an energy-efficient way. Experiments have been carried out to show the capability of a tangle to achieve better scalability while maintaining energy efficiency. The findings show user access control management at granularity levels and ensure scale up to massive networks with thousands of IoT nodes, such as Smart Connected Buildings (SCBDs).

Keywords: blockchain, IOT, direct acyclic graphy, scalability, access control, architecture, smart contract, smart connected buildings

Procedia PDF Downloads 97
4970 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria

Authors: Akachi Odoemene

Abstract:

There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.

Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria

Procedia PDF Downloads 230
4969 Evaluating Global ‘Thing’ Security of Consumer Products

Authors: Achutha Raman

Abstract:

Today's brave new world features a bonanza of digitally interconnected products, or ‘things,’ that improve convenience, possibilities, and in some cases efficiency for consumers. Nonetheless, even as the market accelerates, this Internet of ‘things’ is subject to substantial leakage of consumer personal data. First defining the fluid concept of ‘things,’ this paper subsequently uses case studies taken from the EU, Asia, and the US, to highlight large gaps and comprehensively evaluate the state of security for consumer ‘things.’ Ultimately, this paper offers several ways of improving the present status quo, and especially focuses on an evaluative approach that augments the standard mechanism of Firmware Over the Air Updates, and ought to be easily implementable.

Keywords: cybersecurity, FOTA, Internet of Things, transnational privacy

Procedia PDF Downloads 200