Search results for: online marketing to children
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6434

Search results for: online marketing to children

2684 Adolescents' Perspectives on Parental Responses to Teen Dating Violence

Authors: Beverly Black

Abstract:

Teen dating violence (TDV) is a significant public health problem with severe negative impact on youths’ mental and physical health and well-being. Exacerbating the negative impact of TDV victimization is the fact that teens rarely report the violence. They are fearful to tell friends or family, especially parents. The family context is the first place where children learn about interpersonal relationships, and therefore, parental response of teens’ life experiences influences teens’ actions and development. This study examined youths’ perspectives on parental responses to TDV. Effective parental responses to TDV may increase the likelihood that youth will leave abusive relationships. Method. Eleven gender-separate focus groups were conducted with 27 females and 28 males, ages 12 to 17, to discuss parental responses to teen dating violence. Youth were recruited from a metropolitan community in the southwestern part of the United States. Focus groups questions asked the middle and high school youth how they would want their parents to respond to them if they approached them about various incidents of dating violence. All focus groups were transcribed. Using QSR-N10, two researchers’ analyzed data first using open and axial coding techniques to find overarching themes. Researchers triangulated the coded data to ensure accurate interpretations of the participants’ messages and used the scenario questions to structure the coded results. Results. Most youths suggested that parents should simply talk with them; they recognized the importance of communication. Teens wanted parents to ask questions, educate them about healthy relationships, share their personal experiences, and give teens advice (tell them to break up, limit contact with perpetrator, go to police). Younger youth expressed more willingness to listen to parental advice. Older youth wanted their parents to give them the opportunity to make their decisions. Many of the teens’ comments focused on the importance of parents protecting the teen, providing support and empathy for the teen, and especially refraining from overreacting (not yelling, not getting angry and staying calm). Implications. Parents need to know how to effectively respond to youth needing to leave unhealthy relationships. Demanding that their children end a relationship may not be a realistic approach to TDV. A parent’s ineffective response, when approached by an adolescent for assistance in TDV, may influence a youth to dismiss parents and other adults as viable options for seeking assistance. Parents and prevention educators can learn from hearing youths’ voices about effective responses to TDV.

Keywords: adolescents dating abuse, adolescent and parent communication, parental responses to teen dating violence, teen dating violence

Procedia PDF Downloads 259
2683 Potentials and Influencing Factors of Dynamic Pricing in Business: Empirical Insights of European Experts

Authors: Christopher Reichstein, Ralf-Christian Härting, Martina Häußler

Abstract:

With a continuously increasing speed of information exchange on the World Wide Web, retailers in the E-Commerce sector are faced with immense possibilities regarding different online purchase processes like dynamic price settings. By use of Dynamic Pricing, retailers are able to set short time price changes in order to optimize producer surplus. The empirical research illustrates the basics of Dynamic Pricing and identifies six influencing factors of Dynamic Pricing. The results of a structural equation modeling approach show five main drivers increasing the potential of dynamic price settings in the E-Commerce. Influencing factors are the knowledge of customers’ individual willingness to pay, rising sales, the possibility of customization, the data volume and the information about competitors’ pricing strategy.

Keywords: e-commerce, empirical research, experts, dynamic pricing (DP), influencing factors, potentials

Procedia PDF Downloads 243
2682 The Use of Budgeting as an Effective Management Tool for Small, Medium and Micro Enterprises during COVID-19 Pandemic: A Perspective from South Africa

Authors: Abongile Zweni, Grate Moyo, Ricardo Peters, Bingwen Yan

Abstract:

Budgets are one of the most important tools that organisations, big or small, need to use as management tools. When organisations, particularly Small, Medium and Micro Enterprises (SMMEs), do not use budgets, they are bound to fail in their infancy stage. The aim of this study was to assess whether or not SMMEs in South Africa used budgets as an effective management tool during the COVID-19 pandemic. For the purposes of this study, data was collected using an online questionnaire (survey). This study used the quantitative research approach. The study used descriptive statistics to analyse the research question. The study found that most SMMEs did not use budgets during the COVID-19 pandemic; one of the reasons, amongst others, was that most of them had to close down during the lockdown, and some of them did not even qualify for government bailout or government grants.

Keywords: budget management, SMMEs, COVID-19, South Africa

Procedia PDF Downloads 182
2681 Security Issues and Primary School Participation in Kenya

Authors: Rose Mwanza

Abstract:

This paper investigates security factors influencing primary school pupils’ school participation in Kenya. Schools, communities and the Government all have roles to play in enhancing primary school pupil’s school participation. The effective security system of a country provides the necessary avenues to facilitate improved health services protection of children and allows free movement of the country’s citizens which leads to a conducive atmosphere for school participation. Kenya is a signatory to international commitments and conventions related to security such as the National Policy on Peace Building and Conflict Management, United Nations Development Assistance Framework and Key Security Unity, which enable primary school pupils to participate in education. The paper also looks at the strategies the Government of Kenya has put in place to ensure effective pupil school participation.

Keywords: ethnicity, social media, participation in school, poverty, terrorism

Procedia PDF Downloads 49
2680 The Online Advertising Speech that Effect to the Thailand Internet User Decision Making

Authors: Panprae Bunyapukkna

Abstract:

This study investigated figures of speech used in fragrance advertising captions on the Internet. The objectives of the study were to find out the frequencies of figures of speech in fragrance advertising captions and the types of figures of speech most commonly applied in captions. The relation between figures of speech and fragrance was also examined in order to analyze how figures of speech were used to represent fragrance. Thirty-five fragrance advertisements were randomly selected from the Internet. Content analysis was applied in order to consider the relation between figures of speech and fragrance. The results showed that figures of speech were found in almost every fragrance advertisement except one advertisement of Lancôme. Thirty-four fragrance advertising captions used at least one kind of figure of speech. Metaphor was most frequently found and also most frequently applied in fragrance advertising captions, followed by alliteration, rhyme, simile and personification, and hyperbole respectively.

Keywords: advertising speech, fragrance advertisements, figures of speech, metaphor

Procedia PDF Downloads 224
2679 Ontologies for Social Media Digital Evidence

Authors: Edlira Kalemi, Sule Yildirim-Yayilgan

Abstract:

Online Social Networks (OSNs) are nowadays being used widely and intensively for crime investigation and prevention activities. As they provide a lot of information they are used by the law enforcement and intelligence. An extensive review on existing solutions and models for collecting intelligence from this source of information and making use of it for solving crimes has been presented in this article. The main focus is on smart solutions and models where ontologies have been used as the main approach for representing criminal domain knowledge. A framework for a prototype ontology named SC-Ont will be described. This defines terms of the criminal domain ontology and the relations between them. The terms and the relations are extracted during both this review and the discussions carried out with domain experts. The development of SC-Ont is still ongoing work, where in this paper, we report mainly on the motivation for using smart ontology models and the possible benefits of using them for solving crimes.

Keywords: criminal digital evidence, social media, ontologies, reasoning

Procedia PDF Downloads 377
2678 Gender Moderates the Association Between Symbolization Trait (But Not Internalization Trait) and Smoking Behaviour

Authors: Kuay Hue San, Muaz Haqim Shaharum, Nasir Yusoff

Abstract:

Gender plays a big role in psychosocial development. This study aimed to investigate whether gender moderates the relationship between moral identity (internalization and symbolization) and risk-smoking behavior. An online cross-sectional study was carried out on 388 (61% female) youths who fulfilled the study’s inclusion and exclusion criteria. While viewing images of smoking behavior, participants rated their emotional state, which ranged from unpleasant to pleasant. Participants were also asked to fill out the eight-item Moral Identity Scale and provide their socio-demographic information. Gender significantly moderated the relationship between symbolization and smoking behavior. However, the moderation effect was not shown by internalization Finding highlights the implication of gender on moral identity and smoking behavior and the importance of considering this in the public health intervention and program.

Keywords: smoking behaviour, gender, emotion, moral identity

Procedia PDF Downloads 95
2677 Internal Audit Innovation Affects to the Firm Performance Effectiveness

Authors: Prateep Wajeetongratana

Abstract:

The objective of this research is to examine the effects of internal audit innovation on firm performance effectiveness influences of financial report reliability, organizational process improvement, and risk management effectiveness. This paper drew upon the survey data collected from 400 employees survey conducted at Nonthaburi province, Thailand. The statistics utilized in this paper included percentage, mean, standard deviation, and regression analysis. The findings revealed that the majority of samples were between 31-40 years old, married, held an undergraduate degree, and had an average income between 10,000-15,000 baht. And also the results show that auditing integration has only influence on financial report reliability. Moreover, corporate risk evaluation has effect on firm performance by risk management effectiveness and control self-assessment has effect influence on firm performance by organizational process improvement and risk management effectiveness as well.

Keywords: corporate risk evaluation, firm performance effectiveness, internal audit innovation, marketing management

Procedia PDF Downloads 358
2676 Indications and Characteristics of Clinical Application of Periodontal Suturing

Authors: Saimir Heta, Ilma Robo, Vera Ostreni, Glorja Demika, Sonila Kapaj

Abstract:

Suturing, as a procedure of joining the lips of the lembo or wound, is important at the beginning of the healing process. This procedure helps to pass the healing process from the procedure per secundam to the stages of healing per primam, thus logically reducing the healing time of the wound. The element that remains in the individual selection of the dentist applying the suture is the selection of the suture material. At a moment when some types of sutures are offered for use, some elements should be considered in the selection of the suture depending on the constituent material, the cross-section of the suture elements, and whether it collects bacteria in the "pits" created by the material. The presence of bacteria is a source of infection and possible delay in the healing of the sutured wound. Conclusion: The marketing of suture types offers a variety of materials, from which the selection of the most suitable suture type for specific application cases is a personal indication of the dental surgeon, based on professional experiences and knowledge in the field.

Keywords: suture, suture material, types of sutures, clinical application

Procedia PDF Downloads 68
2675 Improving Public Service Delivery by E-Governance

Authors: Aneri Mehta, Neeti Chaudhary

Abstract:

Governments of the countries around the world have started utilizing the potential of technology to deliver online information and services to their citizens. Using ICT in the form of e-governance could yield great benefits in the reform and modernization of the public sector. The experience of e-governance in a number of developed and developing countries has shown that ICT can be a tool for greater service delivery with the goal of improving service quality. E-governance can also promote ‘good governance’, greater civic engagement can increase opportunities for direct representation and voice, and support for increased democracy. This paper discusses and presents the survey findings that seek to test the role of e-governance in improving service delivery by altering the principal-agent relationship. It further seeks to elucidate the quality aspects of public service. Strong leadership is required to implement e-governance to capture and internalize the benefits of quality services and satisfied citizens.

Keywords: public service, service delivery, e-governance, good governance

Procedia PDF Downloads 455
2674 The Roles of Health Consciousness, Health Motivation, and Trust in the Purchase Intention of Meat with Traceability

Authors: Kawpong Polyorat, Nathamon Buaprommee

Abstract:

Food safety crises including mad cow disease and bird flu have raised consumers’ concern in meat safety. In response, the meat industry has adopted traceability systems to standardize quality and safety of their meat production. Traceability, however, is still rarely positioned as a marketing tool to persuade consumers who are meat endusers. Therefore, the present study attempts to understand consumer behaviors in the context of meat with traceability system by conducting a study in Thailand where research in this area is scant. The study results, based on structural equation modeling with AMOS, reveal that, while health motivation has a significant, positive impact on traceability trust, health consciousness does not directly affect traceability. Health consciousness, nevertheless, have a positive influence on health motivation. Finally, traceability trust has a positive impact on purchase intention of meat with traceability. Research implications and future study directions conclude the study report.

Keywords: consumer behavior, health consciousness, health motivation, traceability, trust

Procedia PDF Downloads 308
2673 The Effect of Engineering Construction in Online Consultancy

Authors: Mariam Wagih Nagib Eskandar

Abstract:

The engineering design process is the activities formulation, to help an engineer raising a plan with a specified goal and performance. The engineering design process is a multi-stage course of action including the conceptualization, research, feasibility studies, establishment of design parameters, preliminary and finally the detailed design. It is a progression from the abstract to the concrete; starting with probably abstract ideas about need, and thereafter elaborating detailed specifications of the object that would satisfy the needs, identified. Engineering design issues, problems, and solutions are discussed in this paper using qualitative approach from an information structure perspective. The objective is to identify the problems, to analyze them and propose solutions by integrating; innovation, practical experience, time and resource management, communications skills, isolating the problem in coordination with all stakeholders. Consequently, this would be beneficial for the engineering community to improve the Engineering design practices.

Keywords: education, engineering, math, performanceengineering design, architectural engineering, team-based learning, construction safetyrequirement engineering, models, practices, organizations

Procedia PDF Downloads 58
2672 Big Brain: A Single Database System for a Federated Data Warehouse Architecture

Authors: X. Gumara Rigol, I. Martínez de Apellaniz Anzuola, A. Garcia Serrano, A. Franzi Cros, O. Vidal Calbet, A. Al Maruf

Abstract:

Traditional federated architectures for data warehousing work well when corporations have existing regional data warehouses and there is a need to aggregate data at a global level. Schibsted Media Group has been maturing from a decentralised organisation into a more globalised one and needed to build both some of the regional data warehouses for some brands at the same time as the global one. In this paper, we present the architectural alternatives studied and why a custom federated approach was the notable recommendation to go further with the implementation. Although the data warehouses are logically federated, the implementation uses a single database system which presented many advantages like: cost reduction and improved data access to global users allowing consumers of the data to have a common data model for detailed analysis across different geographies and a flexible layer for local specific needs in the same place.

Keywords: data integration, data warehousing, federated architecture, Online Analytical Processing (OLAP)

Procedia PDF Downloads 223
2671 An Embarrassingly Simple Semi-supervised Approach to Increase Recall in Online Shopping Domain to Match Structured Data with Unstructured Data

Authors: Sachin Nagargoje

Abstract:

Complete labeled data is often difficult to obtain in a practical scenario. Even if one manages to obtain the data, the quality of the data is always in question. In shopping vertical, offers are the input data, which is given by advertiser with or without a good quality of information. In this paper, an author investigated the possibility of using a very simple Semi-supervised learning approach to increase the recall of unhealthy offers (has badly written Offer Title or partial product details) in shopping vertical domain. The author found that the semisupervised learning method had improved the recall in the Smart Phone category by 30% on A=B testing on 10% traffic and increased the YoY (Year over Year) number of impressions per month by 33% at production. This also made a significant increase in Revenue, but that cannot be publicly disclosed.

Keywords: semi-supervised learning, clustering, recall, coverage

Procedia PDF Downloads 107
2670 An Exploration of the Experiences of Women in Polygamous Marriages: A Case Study of Matizha Village, Masvingo, Zimbabwe

Authors: Flora Takayindisa, Tsoaledi Thobejane, Thizwilondi Mudau

Abstract:

This study highlights what people in polygamous marriages face on a daily basis. It argues that there are more disadvantages for women in polygamous marriages than their counterparts in monogamous relationships. The study further suggests that the patriarchal power structure seems to take a powerful and effective role on polygamous marriages in our societies, particularly in Zimbabwe where this study took place. The study explored the intricacies of polygamous marriages and how these dominances can be resolved. The research is therefore presented through the ‘lived realities’ of the affected women in polygamous marriages in Gutu District located in Masvingo Province of Zimbabwe. Polygamous marriages are practised in different societies. Some women who are practising a polygamous lifestyle are emotionally and physically abused in their relationships. Evidence also suggests children from polygamous marriages also suffer psychologically when their fathers take other wives. Relationships within the family are very difficult because of the husband’s seeming favouritism for one wife. Children are mostly affected by disputes between co-wives and they often lack quality time with their fathers. There are mixed feelings about polygamous marriages. There are some people who condemn it saying inhumane. However, considerations must be made of what it might mean to other people who do not have choices of any other form of marriage. The other factor that has to be noted is that polygamous marriages are not always negative. There are some positive things that result from the polygamous marriages. The study was conducted in a village called Matizha. In the study, a qualitative research approach was employed to stimulate awareness of the social, cultural, religious and the effect of economic factors in polygamous marriages. This approach facilitates a unique understanding of the experiences of women in polygamous marriages, their experiences being both negative and positive. The qualitative type of research method enabled the respondents to have an open minded when they were being asked questions. The researcher utilised the feminist theory in the study. The researcher employed guide interviews to acquire information from the participants. The chapter focuses on the participants who took part in the study, how the participants were selected, ethical considerations, data collection, the interview process, the research instruments and the summary. The data was obtained using a guided interview for all the respondents ranging from all ages who are in polygamous marriages. The researcher presented the demographic information of the participants. Thereafter, the researcher presented other aspects of the data collection like social factors, economic factors and also religious affiliation. The conclusions and recommendations are made from the four main themes that came up from the discussions. The recommendations were made for the women, the policies and laws affecting women, and finally, recommendations for future research. It is believed that the overall objectives of the study have been met and research questions have been answered based on the findings of the study discussed.

Keywords: co-wives, egalitarianism, experiences, polyandry, polygamy, woman

Procedia PDF Downloads 244
2669 Maxillofacial Trauma: A Case of Diacapitular Condylar Fracture

Authors: Krishna Prasad Regmi, Jun-Bo Tu, Cheng-Qun Hou, Li-Feng Li

Abstract:

Maxillofacial trauma in a pediatric group of patients is particularly challenging, as these patients have significant differences from adults as far as the facial skeleton is concerned. Mandibular condylar fractures are common presentations to hospitals across the globe and remain the most important cause of temporomandibular joint (TMJ) ankylosis. The etiology and epidemiology of pediatric trauma involving the diacapitular condylar fractures (DFs) have been reported in a large series of patients. Nevertheless, little is known about treatment protocols for DFs in children. Accordingly, the treatment modalities for the management of pediatric fractures also differ. We suggest following the PDA and intracapsular ABC classification of condylar fracture to increase the overall postoperative satisfaction level that bypasses the change of subjective feelings of patients’ from preoperative to the postoperative condition. At the same time, use of 3-D technology and surgical navigation may also increase treatment accuracy.

Keywords: maxillofacial trauma, diacapitular fracture, condylar fracture, PDA classification

Procedia PDF Downloads 252
2668 E-Learning in Life-Long Learning: Best Practices from the University of the Aegean

Authors: Chryssi Vitsilaki, Apostolos Kostas, Ilias Efthymiou

Abstract:

This paper presents selected best practices on online learning and teaching derived from a novel and innovating Lifelong Learning program through e-Learning, which has during the last five years been set up at the University of the Aegean in Greece. The university, capitalizing on an award-winning, decade-long experience in e-learning and blended learning in undergraduate and postgraduate studies, recently expanded into continuous education and vocational training programs in various cutting-edge fields. So, in this article we present: (a) the academic structure/infrastructure which has been developed for the administrative, organizational and educational support of the e-Learning process, including training the trainers, (b) the mode of design and implementation based on a sound pedagogical framework of open and distance education, and (c) the key results of the assessment of the e-learning process by the participants, as they are used to feedback on continuous organizational and teaching improvement and quality control.

Keywords: distance education, e-learning, life-long programs, synchronous/asynchronous learning

Procedia PDF Downloads 317
2667 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 274
2666 Effect of Different Local Anesthetic Agents on Physiological Parameters and Vital Signs during Extraction in Children

Authors: Rasha F. Sharaf

Abstract:

Administration of local anesthesia for a child is considered a painful procedure, which affects his vital signs, physiological parameters, and his further attitude in the dental clinic. During the extraction of mandibular molars, the nerve block technique is the most commonly used for the administration of local anesthesia; however, this technique requires deep penetration of the needle, which causes pain and discomfort for the child. Therefore, the inferior alveolar nerve block technique can be substituted with an infiltration technique which is not painful if a potent anesthetic solutions will be used. In the current study, the effect of Articaine 4% will be compared to Mepivacaine 2%, and their influence on the vital signs of the child, as well as their ability to control pain during extraction, will be assessed.

Keywords: anesthesia, articaine, pain control, extraction

Procedia PDF Downloads 106
2665 The Power of Words: A Corpus Analysis of Campaign Speeches of President Donald J. Trump

Authors: Aiza Dalman

Abstract:

Words are powerful when these are used wisely and strategically. In this study, twelve (12) campaign speeches of President Donald J. Trump were analyzed as to frequently used words and ethos, pathos and logos being employed. The speeches were read thoroughly, analyzed and interpreted. With the use of Word Counter Tool and Text Analyzer software accessible online, it was found out that the word ‘will’ has the highest frequency of 121, followed by Hillary (58), American (38), going (35), plan and Clinton (32), illegal (30), government (28), corruption (26) and criminal (24). When the speeches were analyzed as to ethos, pathos and logos, on the other hand, it revealed that these were all employed in his speeches. The statements under these pointed out against Hillary or in his favor. The unique strategy of President Donald J. Trump as to frequently used words and ethos, pathos and logos in persuading people perhaps lead the way to his victory.

Keywords: campaign speeches, corpus analysis, ethos, logos and pathos, power of words

Procedia PDF Downloads 266
2664 Providing Support On-Time: Need to Establish De-Radicalization Hotlines

Authors: Ashir Ahmed

Abstract:

Peacekeeping is a collective responsibility of governments, law enforcement agencies, communities, families, and individuals. Moreover, the complex nature of peacekeeping activities requires a holistic and collaborative approach where various community sectors work together to form collective strategies that are likely to be more effective than strategies designed and delivered in isolation. Similarly, it is important to learn from past programs to evaluate the initiatives that have worked well and the areas that need further improvement. Review of recent peacekeeping initiatives suggests that there have been tremendous efforts and resources put in place to deal with the emerging threat of terrorism, radicalization and violent extremism through number of de-radicalization programs. Despite various attempts in designing and delivering successful programs for deradicalization, the threat of people being radicalized is growing more than ever before. This research reviews the prominent de-radicalization programs to draw an understanding of their strengths and weaknesses. Some of the weaknesses in the existing programs include. Inaccessibility: Limited resources, geographical location of potential participants (for offline programs), inaccessibility or inability to use various technologies (for online programs) makes it difficult for people to participate in de-radicalization programs. Timeliness: People might need to wait for a program on a set date/time to get the required information and to get their questions answered. This is particularly true for offline programs. Lack of trust: The privacy issues and lack of trust between participants and program organizers are another hurdle in the success of de-radicalization programs. The fear of sharing participants information with organizations (such as law enforcement agencies) without their consent led them not to participate in these programs. Generalizability: Majority of these programs are very generic in nature and do not cater the specific needs of an individual. Participants in these programs may feel that the contents are irrelevant to their individual situations and hence feel disconnected with purpose of the programs. To address the above-mentioned weaknesses, this research developed a framework that recommends some improvements in de-radicalization programs. One of the recommendations is to offer 24/7, secure, private and online hotline (also referred as helpline) for the people who have any question, concern or situation to discuss with someone who is qualified (a counsellor) to deal with people who are vulnerable to be radicalized. To make these hotline services viable and sustainable, the existing organizations offering support for depression, anxiety or suicidal ideation could additionally host these services. These helplines should be available via phone, the internet, social media and in-person. Since these services will be embedded within existing and well-known services, they would likely to get more visibility and promotion. The anonymous and secure conversation between a person and a counsellor would ensure that a person can discuss the issues without being afraid of information sharing with any third party – without his/her consent. The next stage of this project would include the operationalization of the framework by collaborating with other organizations to host de-radicalization hotlines and would assess the effectiveness of such initiatives.

Keywords: de-radicalization, framework, hotlines, peacekeeping

Procedia PDF Downloads 195
2663 From Mimetic to Mnemonic: On the Simultaneous Rise of Language and Religion

Authors: Dmitry Usenco

Abstract:

The greatest paradox about the origin of language is the fact that, while language is always taught by adults to children, it can never be learnt properly unless its acquisition occurs during childhood. The question that naturally arises in that respect is as follows: How could language be taught for the first time by a non-speaker, i.e., by someone who did not have the opportunity to master it as a child? Yet the above paradox will appear less unresolvable if we hypothesise that language was originally introduced not as a means of communication but as a relatively modest training/playing technique that was used to develop the learners’ mimetic skills. Its communicative and expressive properties could have been discovered and exploited later – upon the learners’ reaching their adulthood. The importance of mimesis in children’s development is universally recognised. The most common forms of it are onomatopoeia and mime, which consist in reproducing sounds and imitating shapes/movements of externally observed objects. However, in some cases, neither of these exercises can be adequate to the task. An object, especially an inanimate one, may emit no characteristic sounds, making onomatopoeia problematic. In other cases, it may have no easily reproduceable shape, while its movements may depend on the specific way of our interacting with it. On such occasions, onomatopoeia and mime can perhaps be supplemented, or even replaced, by movements of the tongue which can metonymically represent certain aspects of our interaction with the object. This is especially evident with consonants: e.g., a fricative sound can designate the subject’s relatively slow approach to the object or vice versa, while a plosive one can express the relatively abrupt process of grabbing/sticking or parrying/bouncing. From that point of view, a protoword can be regarded as a sophisticated gesture of the tongue but also as a mnemonic sequence that contains encoded instructions about the way to handle the object. When this originally subjective link between the object and its mimetic/mnemonic representation eventually installs itself in the collective mind (however small at first the community might be), the initially nameless object acquires a name, and the first word is created. (Discussing the difference between proper and common names is out of the scope of this paper). In its very beginning, this word has two major applications. It can be used for interhuman communication because it allows us to invoke the presence of a currently absent object. It can also be used for designing, expressing, and memorising our interaction with the object itself. The first usage gives rise to language, the second to religion. By the act of naming, we attach to the object a mental (‘spiritual’) dimension which has an independent existence in our collective mind. By referring to the name (idea/demon/soul) of the object, we perform our first act of spirituality, our first religious observance. This is the beginning of animism – arguably, the most ancient form of religion. To conclude: the rise of religion is simultaneous with the the emergence of language in human evolution.

Keywords: language, religion, origin, acquisition, childhood, adulthood, play, represntation, onomatopoeia, mime, gesture, consonant, simultaneity, spirituality, animism

Procedia PDF Downloads 58
2662 Advertising Campaigns for a Sustainable Future: The Fight against Plastic Pollution in the Ocean

Authors: Mokhlisur Rahman

Abstract:

Ocean inhibits one of the most complex ecosystems on the planet that regulates the earth's climate and weather by providing us with compatible weather to live. Ocean provides food by extending various ways of lifestyles that are dependent on it, transportation by accommodating the world's biggest carriers, recreation by offering its beauty in many moods, and home to countless species. At the essence of receiving various forms of entertainment, consumers choose to be close to the ocean while performing many fun activities. Which, at some point, upsets the stomach of the ocean by threatening marine life and the environment. Consumers throw the waste into the ocean after using it. Most of them are plastics that float over the ocean and turn into thousands of micro pieces that are hard to observe with the naked eye but easily eaten by the sea species. Eventually, that conflicts with the natural consumption process of any living species, making them sick. This information is not known by most consumers who go to the sea or seashores occasionally to spend time, nor is it widely discussed, which creates an information gap among consumers. However, advertising is a powerful tool to educate people about ocean pollution. This abstract analyzes three major ocean-saving advertisement campaigns that use innovative and advanced technology to get maximum exposure. The study collects data from the selected campaigns' websites and retrieves all available content related to messages, videos, and images. First, the SeaLegacy campaign uses stunning images to create awareness among the people; they use social media content, videos, and other educational content. They create content and strategies to build an emotional connection among the consumers that encourage them to move on an action. All the messages in their campaign empower consumers by using powerful words. Second, Ocean Conservancy Campaign uses social media marketing, events, and educational content to protect the ocean from various pollutants, including plastics, climate change, and overfishing. They use powerful images and videos of marine life. Their mission is to create evidence-based solutions toward a healthy ocean. Their message includes the message regarding the local communities along with the sea species. Third, ocean clean-up is a campaign that applies strategies using innovative technologies to remove plastic waste from the ocean. They use social media, digital, and email marketing to reach people and raise awareness. They also use images and videos to evoke an emotional response to take action. These tree advertisements use realistic images, powerful words, and the presence of living species in the imagery presentation, which are eye-catching and can grow emotional connection among the consumers. Identifying the effectiveness of the messages these advertisements carry and their strategies highlights the knowledge gap of mass people between real pollution and its consequences, making the message more accessible to the mass of people. This study aims to provide insights into the effectiveness of ocean-saving advertisement campaigns and their impact on the public's awareness of ocean conservation. The findings from this study help shape future campaigns.

Keywords: advertising-campaign, content-creation, images ocean-saving technology, videos

Procedia PDF Downloads 62
2661 Anti-Western Sentiment amongst Arabs and How It Drives Support for Russia against Ukraine

Authors: Soran Tarkhani

Abstract:

A glance at social media shows that Russia's invasion of Ukraine receives considerable support among Arabs. This significant support for the Russian invasion of Ukraine is puzzling since most Arab leaders openly condemned the Russian invasion through the UN ES‑11/4 Resolution, and Arabs are among the first who experienced the devastating consequences of war firsthand. This article tries to answer this question by using multiple regression to analyze the online content of Arab responses to Russia's invasion of Ukraine on seven major news networks: CNN Arabic, BBC Arabic, Sky News Arabic, France24 Arabic, DW, Aljazeera, and Al-Arabiya. The article argues that the underlying reason for this Arab support is a reaction to the common anti-Western sentiments among Arabs. The empirical result from regression analysis supports the central arguments and uncovers the motivations behind the endorsement of the Russian invasion of Ukraine and the opposing Ukraine by many Arabs.

Keywords: Ukraine, Russia, Arabs, Ukrainians, Russians, Putin, invasion, Europe, war

Procedia PDF Downloads 56
2660 Genetic Diversity of Cord Blood of the National Center of Blood Transfusion, Mexico (NCBT)

Authors: J. Manuel Bello-López, Julieta Rojo-Medina

Abstract:

Introduction: The transplant of Umbilical Cord Blood Units (UCBU) are a therapeutic possibility for patients with oncohaematological disorders, especially in children. In Mexico, 48.5% of oncological diseases in children 1-4 years old are leukemias; whereas in patients 5-14 and 15-24 years old, lymphomas and leukemias represent the second and third cause of death in these groups respectively. Therefore it is necessary to have more registries of UCBU in order to ensure genetic diversity in the country; the above because the search for appropriate a UCBU is increasingly difficult for patients of mixed ethnicity. Objective: To estimate the genetic diversity (polymorphisms) of Human Leucocyte Antigen (HLA) Class I (A, B) and Class II (DRB1) in UCBU cryopreserved for transplant at Cord Blood Bank of the NCBT. Material and Methods: HLA typing of 533 UCBU for transplant was performed from 2003-2012 at the Histocompatibility Laboratory from the Research Department (evaluated by Los Angeles Ca. Immunogenetics Center) of the NCBT. Class I HLA-A, HLA-B and Class II HLA-DRB1 typing was performed using medium resolution Sequence-Specific Primer (SSP). In cases of an ambiguity detected by SSP; Sequence-Specific Oligonucleotide (SSO) method was carried out. A strict analysis of populations genetic parameters were done in 5 representative UCBU populations. Results: 46.5% of UCBU were collected from Mexico City, State of Mexico (30.95%), Puebla (8.06%), Morelos (6.37%) and Veracruz (3.37%). The remaining UCBU (4.75%) are represented by other states. The identified genotypes correspond to Amerindian origins (HLA-A*02, 31; HLA-B*39, 15, 48), Caucasian (HLA-A*02, 68, 01, 30, 31; HLA-B*35, 15, 40, 44, 07 y HLA-DRB1*04, 08, 07, 15, 03, 14), Oriental (HLA-A*02, 30, 01, 31; HLA-B* 35, 39, 15, 40, 44, 07,48 y HLA-DRB1*04, 07,15, 03) and African (HLA-A*30 y HLA-DRB1*03). The genetic distances obtained by Cavalli-Sforza analysis of the five states showed significant genetic differences by comparing genetic frequencies. The shortest genetic distance exists between Mexico City and the state of Puebla (0.0039) and the largest between Veracruz and Morelos (0.0084). In order to identify significant differences between this states, the ANOVA test was performed. This demonstrates that UCBU is significantly different according to their origin (P <0.05). This is shown by the divergence between arms at the Dendogram of Neighbor-Joining. Conclusions: The NCBT provides UCBU in patients with oncohaematological disorders in all the country. There is a group of patients for which not compatible UCBU can be find due to the mixed ethnic origin. For example, the population of northern Mexico is mostly Caucasian. Most of the NCBT donors are of various ethnic origins, predominantly Amerindians and Caucasians; although some ethnic minorities like Oriental, African and pure Indian ethnics are not represented. The NCBT is, therefore, establishing agreements with different states of Mexico to promote the altruistic donation of Umbilical Cord Blood in order to enrich the genetic diversity in its files.

Keywords: cord blood, genetic diversity, human leucocyte antigen, transplant

Procedia PDF Downloads 371
2659 Structural Analysis of Username Segment in E-Mail Addresses of Engineering Institutes of Gujarat State of India

Authors: Jatinderkumar R. Saini

Abstract:

E-mail has become a key mechanism of electronic communication. This is truer for professional organizations that like to communicate with their subjects online and are slowly shifting to paper-less office. The current paper focuses specifically on academic institutions offering Engineering course in Gujarat state and attempts for textual analysis of the usernames of the institutional e-mail addresses. We found that the institutions tend to design the username segment of their e-mail addresses by choosing words or combination of words from specific categories. The paper also highlights the use of special characters, digits and random words in designing the usernames. On the sidelines, the paper lists the style of employing department names and designations for the design process. To the best of our knowledge, this is the first formal attempt to analyze the selection of words employed for designing username segment of e-mail addresses of Engineering institutions.

Keywords: e-mail address, institute, engineering, username

Procedia PDF Downloads 323
2658 Reproduction of New Media Art Village around NTUT: Heterotopia of Visual Culture Art Education

Authors: Yu Cheng-Yu

Abstract:

‘Heterotopia’, ‘Visual Cultural Art Education’ and ‘New Media’ of these three subjects seemingly are irrelevant. In fact, there are synchronicity and intertextuality inside. In addition to visual culture, art education inspires students the ability to reflect on popular culture image through visual culture teaching strategies in school. We should get involved in the community to construct the learning environment that conveys visual culture art. This thesis attempts to probe the heterogeneity of space and value from Michel Foucault and to research sustainable development strategy in ‘New Media Art Village’ heterogeneity from Jean Baudrillard, Marshall McLuhan's media culture theory and social construction ideology. It is possible to find a new media group that can convey ‘Visual Culture Art Education’ around the National Taipei University of Technology in this commercial district that combines intelligent technology, fashion, media, entertainment, art education, and marketing network. Let the imagination and innovation of ‘New Media Art Village’ become ‘implementable’ and new media Heterotopia of inter-subjectivity with the engagement of big data and digital media. Visual culture art education will also bring aesthetics into the community by New Media Art Village.

Keywords: social construction, heterogeneity, new media, big data, visual culture art education

Procedia PDF Downloads 225
2657 Managing and Sustaining Strategic Relationships with Distributors by Electronic Agencies in Jordan

Authors: Abdallah Q. Bataineh

Abstract:

The electronics market in Jordan is facing extraordinary expectations from consumers, whose opinions are progressively more essential and have effective power on the overall marketing strategy preparation and execution by electronics agents. This research aimed to explore the effect of price volatile, follow-up, maintenance and warranty policy on distributor’s retention. Focus group, in-depth interviews, and self-administered questionnaire were held with a total sample of 50 electronics distribution stores who have a direct contact and purchase frequently from electronic agencies. By using descriptive statistics and multiple regression tests, the main findings of this research is that there is an impact of price volatile, follow-up, maintenance and warranty policy on distributor’s retention, and the key predictor variable was price volatile. Thus, the researcher recommended flat rate pricing strategy to ensure that all distributors will sell the product on the same pricing base, regardless of the generated margin by each one of them. Moreover, conclusion and future research were also discussed.

Keywords: distributors retention, follow-up, maintenance, price volatile, warranty policy

Procedia PDF Downloads 224
2656 Code-Switching in Facebook Chatting Among Maldivian Teenagers

Authors: Aaidha Hammad

Abstract:

This study examines the phenomenon of code switching among teenagers in the Maldives while they carry out conversations through Facebook in the form of “Facebook Chatting”. The current study aims at evaluating the frequency of code-switching and it investigates between what languages code-switching occurs. Besides the study identifies the types of words that are often codeswitched and the triggers for code switching. The methodology used in this study is mixed method of qualitative and quantitative approach. In this regard, the chat log of a group conversation between 10 teenagers was collected and analyzed. A questionnaire was also administered through online to 24 different teenagers from different corners of the Maldives. The age of teenagers ranged between 16 and 19 years. The findings of the current study revealed that while Maldivian teenagers chat in Facebook they very often code switch and these switches are most commonly between Dhivehi and English, but some other languages are also used to some extent. It also identified the different types of words that are being often code switched among the teenagers. Most importantly it explored different reasons behind code switching among the Maldivian teenagers in Facebook chatting.

Keywords: code-switching, Facebook, Facebook chatting Maldivian teenagers

Procedia PDF Downloads 230
2655 A Framework for Review Spam Detection Research

Authors: Mohammadali Tavakoli, Atefeh Heydari, Zuriati Ismail, Naomie Salim

Abstract:

With the increasing number of people reviewing products online in recent years, opinion sharing websites has become the most important source of customers’ opinions. Unfortunately, spammers generate and post fake reviews in order to promote or demote brands and mislead potential customers. These are notably destructive not only for potential customers but also for business holders and manufacturers. However, research in this area is not adequate, and many critical problems related to spam detection have not been solved to date. To provide green researchers in the domain with a great aid, in this paper, we have attempted to create a high-quality framework to make a clear vision on review spam-detection methods. In addition, this report contains a comprehensive collection of detection metrics used in proposed spam-detection approaches. These metrics are extremely applicable for developing novel detection methods.

Keywords: fake reviews, feature collection, opinion spam, spam detection

Procedia PDF Downloads 395