Search results for: information society
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13680

Search results for: information society

13320 Feminist Revolution and the Quest for Women Emancipation in Public Life in Nigeria: The African Dimension

Authors: Adekunle Saheed Ajisebiyawo, Christie Omoduwa Achime

Abstract:

In Nigerian society, women have very little or no involvement in the decision-making process and this is large because women are objectified as effective means of reproduction and provision of emotional support to the society. Despite the movements and awareness by international, national and local bodies to promote and encourage women's empowerment, there are still many factors daunting to the efforts of women in society. This paper examined the critical role of feminism in the quest for women's emancipation in public life. Guided by African feminism theory, this paper utilizes both historical and descriptive methods to examine these factors. The paper argues that gender bias in Nigeria's public life is often traced to the onset of colonialism in Nigeria. Thus the Western cultural notion of colonialism woven around male superiority is reflected in their relations with Nigerians. The study outlines how women have strategized pathways through patriarchal structures by deploying their femininity. The paper concludes that women are strong, courageous, natural leaders and indeed have a major strategic role to play in public life; thus, women's movements and groups remain an important and necessary means of social cohesion and strength, especially in a country such as Nigeria.

Keywords: African feminism, democratic governance, feminism, patriarchy, women emancipation.

Procedia PDF Downloads 111
13319 The Post-Confucian Korea: Destroying Hierarchies in Kim Yong Ha's "Oppa Came Back"

Authors: Steven D. Capener

Abstract:

The 1997 Asian financial crisis was a watershed event in Korea as it necessitated changes that begin an unravelling of many of the norms and traditions that had served to underpin society. Divorce skyrocketed; the era of lifetime employment was over; women came out the home to become, in many cases, the main breadwinners; competitive forces were exacerbated; and traditional sources of authority began to crumble. All of these changes weekend the power to structure human relations of the Confucian Three Bonds and Five Relationships (삼강오륜). Since then, this “de-confucianization” has only become more pronounced with women increasingly refusing to marry, partly in protest to what they perceive as entrenched gender inequality, married couples eschewing childbirth resulting in the lowest birthrate in the world, and diminishing inheritances eroding the traditionally strong sense of filial piety (효) of children toward parents. The result of all this can be seen in the continued weakening or outright crumbling of the hierarchies codified in the Three Bonds and Five Relationship, which have served as a social template in Korea for centuries. In his 2004 work “Oppa Came Back,” writer Kim Yong Ha depicts what he apparently sees as the “post-Confucian” family in a wickedly funny portrayal of what Korean society could look like if traditional bulwarks of prescriptive values suddenly collapse and are not replaced with tenable alternatives. In the short story, Kim subverts all the traditional hierarchies while leaving the desire to dominate these hierarchies intact. This produces the picture of a Korean family governed by the new values of money and physical power. After lying out what can be identified as major cultural changes in what could be called “traditional” society,” the article uses a close reading of Kim’s story for its implications regarding a possible new, dysfunctional version of Korean society. It seems apparent that Kim’s story is a cautionary tale of the pitfalls that lie athwart the late-modern Korean landscape. These changes have important implications in the areas of education and socio-political philosophy. The conclusion focuses on possible alternatives to this post-Confucian conundrum.

Keywords: post-confucian, three bonds and five relationships, traditional society, hierarchies

Procedia PDF Downloads 73
13318 Students’ Perceptions of Communication Design in Media: Case Study of Portuguese and Spanish Communication Students

Authors: Fátima Gonçalves, Joaquim Brigas, Jorge Gonçalves

Abstract:

The proliferation of mobile devices in society enables the media to disseminate information and knowledge more rapidly. Higher education students access these contents and share them with each other, in the most diverse platforms, allowing the ubiquity in access to information. This article presents the results and respective quantitative analysis of a survey applied to communication students of two higher education institutions: one in Portugal and another in Spain. The results show that, in this sample, higher education students regularly access news content believing traditional news sources to be more credible. Regarding online sources, it was verified that the access was mostly to free news contents. This study intends to promote the knowledge about the changes that occur in the relationship of higher education students with the media, characterizing how news consumption is processed by these students, considering the resulting effects of the digital media evolution. It is intended to present not only the news sources they use, but also to know some of their habits and relationship with the news media.

Keywords: students' perceptions, communication design, mass media, higher education, digital media

Procedia PDF Downloads 251
13317 A Framework Factors Influencing Accounting Information Systems Adoption Success

Authors: Manirath Wongsim

Abstract:

AIS plays an important role in business management, strategic and can provide assistance in all phases of decision making. Thus, many organisations needs to be seen as well adopting AIS, which is critical to a company in order to organise, manage and operate process in all sections. In order to implement AIS successfully, it is important to understand the underlying factors that influence the AIS adoption. Therefore, this research intends to study this perspective of factors influence and impact on AIS adoption’s success. The model has been designed to illustrate factors influences in AIS adoption. It also attempts to identify the critical success factors that organisations should focus on, to ensure the adoption on accounting process. This framework will be developed from case studies by collecting qualitative and quantitative data. Case study and survey methodology were adopted for this research. Case studies in two Thai- organisations were carried out. The results of the two main case studies suggested 9 factors that may have impact on in AIS adoption. Survey instrument was developed based on the findings from case studies. Two large-scale surveys were sent to selected members of Thailand Accountant, and Thailand Computer Society to further develop and test the research framework. The top three critical factors for ensuring AIS adoption were: top management commitment, steering committees, and Technical capability of AIS personnel. That is, it is now clear which factors impact in AIS adoption, and which of those factors are critical success factors for ensuring AIS adoption successes

Keywords: accounting information system, accounting information systems adoption, and inflecting AIS adoption

Procedia PDF Downloads 404
13316 An Examination of Criminology and Cyber Crime in Contemporary Society

Authors: Uche A. Nnawulezi

Abstract:

The evolving global environment has as of late seen formative difficulties bordering on cyber crime and its attendant effects. This paper looks at what constitutes an offense of cyber crime under the tenets of International Law as no nation can lay bona-fide claim in managing cyber crime as a criminal phenomenon. Therefore, there has been a plethora of ideological, conceptual and mental propositions of policies aimed at domesticating cyber crimes – an international crime. These policies were as a result of parochial consideration and social foundations which negate the spirit of internationally accepted procedures. The study also noted that the non-domestication of cyber crime laws by most countries has led to an increase in cyber crimes and its attendant effects have remained unabated. The author has pointed out emerging international rules as a panacea for a sustainable cyber crime-free society. The paper relied on documentary evidence and hence scooped much of the data from secondary sources such as text books, journals, articles and periodicals and more so, opinion papers, emanating from international criminal court. It concludes that the necessary recommendations made in this paper, if fully adopted, shall go a long way in maintaining a cyber crime-free society. Ultimately, the domestic and international law mechanisms capable of dealing with cyber crime offenses should be expanded and be made proactive in order to deal with the demands of modern day challenges.

Keywords: criminology, cyber crime, domestic law, international law

Procedia PDF Downloads 198
13315 Role of Academic Library in/for Information Literacy

Authors: Veena Rani

Abstract:

This paper presents the role of academic library in information literacy in the present time. Information is the very important aspect for the growth of any country. In this context information literacy is an essential tool in the development of various fields. Academic library is an essential part of university as well as of an institution. In Academic library we can include university library, college library as well as school library. Academic libraries are playing an important role for information literacy. Academic libraries provide excellent services for the benefit of students, teachers, researchers, and all those who are interested in education. All over the world many of the schemes, policies and services provide for information literacy.

Keywords: information literacy, academic library, tool literacy, higher education

Procedia PDF Downloads 379
13314 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 546
13313 The Norm of Society in Relation to Dress Codes and Connection with Self-Expression

Authors: Tara T. Y. Yadollahi, Alesandra A. D. Dulic

Abstract:

This paper investigates the intricate relationship between societal norms and self-expression, focusing particularly on the dress codes enforced upon women in restrictive cultures, with a special emphasis on Iran. This study explores how such mandates foster a societal duality, where women must constantly negotiate between public compliance and private authenticity. This dual existence not only influences women’s choice of clothing but also deeply impacts their self-presentation and interaction within society, perpetuating a cycle of vigilance and self-expression. To enhance the discussion, this paper introduces a short video project titled "Be in my Chador," which visually represents these themes and aims to provoke critical reflection on the pervasive impact of societal expectations on individual behavior.

Keywords: feminism, dress code, self-expression, self-censorship

Procedia PDF Downloads 11
13312 The Influence of Leadership Styles on Organizational Performance and Innovation: Empirical Study in Information Technology Sector in Spain

Authors: Richard Mababu Mukiur

Abstract:

Leadership is an important drive that plays a key role in the success and development of organizations, particularly in the current context of digital transformation, highly competitivity and globalization. Leaders are persons that hold a dominant and privileged position within an organization, field, or sector of activities and are able to manage, motivate and exercise a high degree of influence over other in order to achieve the institutional goals. They achieve commitment and engagement of others to embrace change, and to make good decisions. Leadership studies in higher education institutions have examined how effective leaders hold their organizations, and also to find approaches which fit best in the organizations context for its better management, transformation and improvement. Moreover, recent studies have highlighted the impact of leadership styles on organizational performance and innovation capacities, since some styles give better results than others. Effective leadership is part of learning process that take place through day-to-day tasks, responsibilities, and experiences that influence the organizational performance, innovation and engagement of employees. The adoption of appropriate leadership styles can improve organization results and encourage learning process, team skills and performance, and employees' motivation and engagement. In the case of case of Information Technology sector, leadership styles are particularly crucial since this sector is leading relevant changes and transformations in the knowledge society. In this context, the main objective of this study is to analyze managers leadership styles with their relation to organizational performance and innovation that may be mediated by learning organization process and demographic variables. Therefore, it was hypothesized that the transformational and transactional leadership will be the main style adopted in Information Technology sector and will influence organizational performance and innovation capacity. A sample of 540 participants from Information technology sector has been determined in order to achieve the objective of this study. The Multifactor Leadership Questionnaire was administered as the principal instrument, Scale of innovation and Learning Organization Questionnaire. Correlations and multiple regression analysis have been used as the main techniques of data analysis. The findings indicate that leadership styles have a relevant impact on organizational performance and innovation capacity. The transformational and transactional leadership are predominant styles in Information technology sector. The effective leadership style tend to be characterized by the capacity of generating and sharing knowledge that improve organization performance and innovation capacity. Managers are adopting and adapting their leadership styles that respond to the new organizational, social and cultural challenges and realities of contemporary society. Managers who encourage innovation, foster learning process, share experience are useful to the organization since they contribute to its development and transformation. Learning process capacity and demographic variables (age, gender, and job tenure) mediate the relationship between leadership styles, innovation capacity and organizational performance. The transformational and transactional leadership tend to enhance the organizational performance due to their significant impact on team-building, employees' engagement and satisfaction. Some practical implications and future lines of research have been proposed.

Keywords: leadership styles, tranformational leadership, organisational performance, organisational innovation

Procedia PDF Downloads 224
13311 The Use of Whatsapp Platform in Spreading Fake News among Mass Communication Students of Abdu Gusau Polytechnic, Talata Mafara

Authors: Aliyu Damri

Abstract:

In every educational institution, students of mass communication receive training to report events and issues accurately and objectively in accordance with official controls. However, the complex nature of society today made it possible to use WhatsApp platform that revolutionizes the means of sharing information, ideas, and experiences. This paper examined how students in the Department of Mass Communication, Abdu Gusau Polytechnic, Talata Mafara used WhatsApp platform in spreading fake news. It used in depth interview techniques and focus group discussion with students as well as the use of published materials to gather related and relevant data. Also, the paper used procedures involved to analyze long interview content. This procedure includes observation of a useful utterance, development of expanded observation, examination of interconnection of observed comments, collective scrutiny of observation for patterns and themes, and review and analysis of the themes across all interviews for development of thesis. The result indicated that inadequate and absent of official controls guiding the conduct of online information sharing, inaccuracies and poor source verification, lack of gate keeping procedures to ensure ethical and legal provisions, bringing users into the process, sharing all information, availability of misinformation, disinformation and rumor and problem of conversation strongly encouraged the emergence of fake news. Surprisingly, the idea of information as a commodity has increased, and transparency of a source as new ethics emerged.

Keywords: disinformation, fake news, group, mass communication, misinformation, WhatsApp

Procedia PDF Downloads 146
13310 Role of Renewable Energy in Foreign Policy of China

Authors: Alina Gilmanova

Abstract:

China’s dependency on coal for energy is causing pollution in China and abroad. To supply the increasing energy demand and being under the pressure from international society to reduce the emissions, China was pushed to develop renewable energy. The increasing subsidies in Renewable energy sources (RES) led not only to the price-cutting but also affecting the international trade in green technology sector. In order to evaluate the role of RES in foreign policy of China, I am going to give an (i) overview of RES development in China and examine the cooperation between China and (ii) developed, (ii) developing and emerging countries. The conclusive remarks are intended to address the question of how the present Chinese renewable energy development is impacting its foreign policy and international society.

Keywords: renewable energy, China, foreign affairs, brics, cooperation

Procedia PDF Downloads 642
13309 An Explanatory Study into the Information-Seeking Behaviour of Egyptian Beggars

Authors: Essam Mansour

Abstract:

The key purpose of this study is to provide first-hand information about beggars in Egypt, especially from the perspective of their information seeking behaviour including their information needs. The researcher tries to investigate the information-seeking behaviour of Egyptian beggars with regard to their thoughts, perceptions, motivations, attitudes, habits, preferences as well as challenges that may impede their use of information. The research methods used were an adapted form of snowball sampling of a heterogeneous demographic group of participants in the beggary activity in Egypt. This sampling was used to select focus groups to explore a range of relevant issues. Data on the demographic characteristics of the Egyptian beggars showed that they tend to be men, mostly with no formal education, with an average age around 30s, labeled as low-income persons, mostly single and mostly Muslims. A large number of Egyptian beggars were seeking for information to meet their basic needs as well as their daily needs, although some of them were not able to identify their information needs clearly. The information-seeking behaviour profile of a very large number of Egyptian beggars indicated a preference for informal sources of information over formal ones to solve different problems and meet the challenges they face during their beggary activity depending on assistive devices, such as mobile phones. The high degree of illiteracy and the lack of awareness about the basic rights of information as well as information needs were the most important problems Egyptian beggars face during accessing information. The study recommended further research to be conducted about the role of the library in the education of beggars. It also recommended that beggars’ awareness about their information rights should be promoted through educational programs that help them value the role of information in their life.

Keywords: user studies, information-seeking behaviour, information needs, information sources, beggars, Egypt

Procedia PDF Downloads 322
13308 [Keynote Talk]: Let Us Move to Ethical Finance: A Case Study of Takaful

Authors: Syed Ahmed Salman

Abstract:

Ethicality is essential in our daily activities, including personal and commercial activities. This is evidenced by referring to the historical development of the corporate governance and ethical guidelines. The first corporate governance guideline, i.e. Cadbury Report from U.K. focuses the responsibility of board members towards the shareholders only. Gradually, realising the need to take care of the society and community, stakeholders are now concerns of business entities. Consequently, later codes of corporate governance started extending the responsibility to the other stakeholders in addition to the shareholders. One prevailing corporate governance theory, i.e. stakeholder theory, has been widely used in the research to explore the effects of business entities on society. In addition, the Global Reporting Initiative (GRI) is the leading organisation which promotes social care from businesses for sustainable development. Conventionally, history shows that ethics is key to the long term success of businesses. Many organisations, societies, and regulators give full attention and consideration to ethics. Several countries have introduced ethical codes of conduct to direct trade activities. Similarly, Islam and other religions prohibit the practice of interest, uncertainty, and gambling because of its unethical nature. These prohibited practices are not at all good for the society, business, and any organisation especially as it is detrimental to the well-being of society. In order to avoid unethicality in the finance industry, Shari’ah scholars come out with the idea of Islamic finance which is free from the prohibited elements from the Islamic perspective. It can also be termed ethical finance. This paper highlights how Takaful as one of the Islamic finance products offers fair and just products to the contracting parties and the society. Takaful is framed based on ethical guidelines which are extracted from Shari’ah principles and divine sources such as the Quran and Sunnah. Takaful products have been widely offered all over the world, including in both Muslim and non-Muslim countries. It seems that it is gaining acceptance regardless of religion. This is evidence that Takaful is being accepted as an ethical financial product.

Keywords: ethics, insurance, Islamic finance, religion and takaful

Procedia PDF Downloads 275
13307 Software Vulnerability Markets: Discoverers and Buyers

Authors: Abdullah M. Algarni, Yashwant K. Malaiya

Abstract:

Some of the key aspects of vulnerability-discovery, dissemination, and disclosure-have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus are free to disseminate the vulnerabilities they discover in any way they like. As a result, multiple vulnerability markets have emerged. In some of these markets, the exchange is regulated, but in others, there is little or no regulation. In recent vulnerability discovery literature, the vulnerability discoverers have remained anonymous individuals. Although there has been an attempt to model the level of their efforts, information regarding their identities, modes of operation, and what they are doing with the discovered vulnerabilities has not been explored. Reports of buying and selling of the vulnerabilities are now appearing in the press; however, the existence of such markets requires validation, and the natures of the markets need to be analysed. To address this need, we have attempted to collect detailed information. We have identified the most prolific vulnerability discoverers throughout the past decade and examined their motivation and methods. A large percentage of these discoverers are located in Eastern and Western Europe and in the Far East. We have contacted several of them in order to collect first-hand information regarding their techniques, motivations, and involvement in the vulnerability markets. We examine why many of the discoverers appear to retire after a highly successful vulnerability-finding career. The paper identifies the actual vulnerability markets, rather than the hypothetical ideal markets that are often examined. The emergence of worldwide government agencies as vulnerability buyers has significant implications. We discuss potential factors that can impact the risk to society and the need for detailed exploration.

Keywords: risk management, software security, vulnerability discoverers, vulnerability markets

Procedia PDF Downloads 256
13306 Policy Compliance in Information Security

Authors: R. Manjula, Kaustav Bagchi, Sushant Ramesh, Anush Baskaran

Abstract:

In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful.

Keywords: information technology, information security, involvement theory, policies, social bond theory

Procedia PDF Downloads 375
13305 Architecture and Students with Autism: Exploring Strategies for Their Inclusion in Society Mainstream

Authors: Safaa Mahmoud Issa

Abstract:

Architecture, as an art and science of designing, has always been the medium to create environments that fulfill their users’ needs. It could create an inclusive environment that would not isolate any individual regardless of his /her disabilities. It could help, hopefully, in setting the strategies that provide a supportive, educational environment that would allow the inclusion of students with autism. Architects could help in the battle against this neuro-developmental disorder by providing the accommodating environment, at home and at school, in order to prevent institutionalizing these children. Through a theoretical approach and a review of literature, this study will explore and analyze best practices in autism-friendly, supportive, teaching environments. Additionally, it would provide the range of measures, and set the strategies to deal with the students with autism sensory peculiarities, and that, in order to allow them to concentrate in the school environment, and be able to succeed, and to be integrated as an important addition to society and the social mainstream. Architects should take into consideration the general guidelines for an autism-friendly built environment, and apply them to specific buildings systems. And that, as certain design elements have great effect on children’s behavior, by appropriating architecture to provide inclusive accommodating environments, the basis for equalization of opportunities is set allowing these individuals a better, normal, non-institutional life, as the discussion presented in this study would reveal.

Keywords: architecture, inclusion, students with autism, society mainstream

Procedia PDF Downloads 223
13304 Research and Development of Net-Centric Information Sharing Platform

Authors: Wang Xiaoqing, Fang Youyuan, Zheng Yanxing, Gu Tianyang, Zong Jianjian, Tong Jinrong

Abstract:

Compared with traditional distributed environment, the net-centric environment brings on more demanding challenges for information sharing with the characteristics of ultra-large scale and strong distribution, dynamic, autonomy, heterogeneity, redundancy. This paper realizes an information sharing model and a series of core services, through which provides an open, flexible and scalable information sharing platform.

Keywords: net-centric environment, information sharing, metadata registry and catalog, cross-domain data access control

Procedia PDF Downloads 575
13303 Developing Value Chain of Synthetic Methane for Net-zero Carbon City Gas Supply in Japan

Authors: Ryota Kuzuki, Mitsuhiro Kohara, Noboru Kizuki, Satoshi Yoshida, Hidetaka Hirai, Yuta Nezasa

Abstract:

About fifty years have passed since Japan's gas supply industry became the first in the world to switch from coal and oil to LNG as a city gas feedstock. Since the Japanese government target of net-zero carbon emission in 2050 was announced in October 2020, it has now entered a new era of challenges to commit to the requirement for decarbonization. This paper describes the situation that synthetic methane, produced from renewable energy-derived hydrogen and recycled carbon, is a promising national policy of transition toward net-zero society. In November 2020, the Japan Gas Association announced the 'Carbon Neutral Challenge 2050' as a vision to contribute to the decarbonization of society by converting the city gas supply to carbon neutral. The key technologies is methanation. This paper shows that methanation is a realistic solution to contribute to the decarbonization of the whole country at a lower social cost, utilizing the supply chain that already exists, from LNG plants to burner chips. The challenges during the transition period (2030-2050), as CO2 captured from exhaust of thermal power plants and industrial factories are expected to be used, it is proposed that a system of guarantee of origin (GO) for H2 and CO2 should be established and harmonize international rules for calculating and allocating greenhouse gas emissions in the supply chain, a platform is also needed to manage tracking information on certified environmental values.

Keywords: synthetic methane, recycled carbon fuels, methanation, transition period, environmental value transfer platform

Procedia PDF Downloads 111
13302 Privacy-Preserving Model for Social Network Sites to Prevent Unwanted Information Diffusion

Authors: Sanaz Kavianpour, Zuraini Ismail, Bharanidharan Shanmugam

Abstract:

Social Network Sites (SNSs) can be served as an invaluable platform to transfer the information across a large number of individuals. A substantial component of communicating and managing information is to identify which individual will influence others in propagating information and also whether dissemination of information in the absence of social signals about that information will be occurred or not. Classifying the final audience of social data is difficult as controlling the social contexts which transfers among individuals are not completely possible. Hence, undesirable information diffusion to an unauthorized individual on SNSs can threaten individuals’ privacy. This paper highlights the information diffusion in SNSs and moreover it emphasizes the most significant privacy issues to individuals of SNSs. The goal of this paper is to propose a privacy-preserving model that has urgent regards with individuals’ data in order to control availability of data and improve privacy by providing access to the data for an appropriate third parties without compromising the advantages of information sharing through SNSs.

Keywords: anonymization algorithm, classification algorithm, information diffusion, privacy, social network sites

Procedia PDF Downloads 324
13301 The Dao of Political Economy - A Holistic Perspective

Authors: Tao Peng

Abstract:

This paper presents a holistic model of political economy based on Daoism – the foundational philosophy of classical Chinese epistemology. Daoism is both comprehensive and subtle in its manifestations and applications in all aspects of nature and society. Based on Daoist creation theory of the universe, life theory and five element functioning theory, a holistic model in economics with minimal assumptions and independent of ideology are constructed. Under this framework, different schools of economics, such as neo-liberal, Marxism, and Austrian school, are explored and shed new light on. Economic and financial predictions can be realized in applications to Qi Men Dun Jia. This framework can provide guidelines and inspirations to economic modelling, economic policies formulation and strategy development and guide society towards a more sustainable future.

Keywords: daoism, economics, holistic, philosophy

Procedia PDF Downloads 93
13300 The Misuse of Social Media in Order to Exploit "Generation Y"; The Tactics of IS

Authors: Ali Riza Perçin, Eser Bingül

Abstract:

Internet technologies have created opportunities with which people share their ideologies, thoughts and products. This virtual world, named social media has given the chance of gathering individual users and people from the world's remote locations and establishing an interaction between them. However, to an increasingly higher degree terrorist organizations today use the internet and most notably social-network media to create the effects they desire through a series of on-line activities. These activities, designed to support their activities, include information collection (intelligence), target selection, propaganda, fundraising and recruitment to name a few. Meanwhile, these have been used as the most important tool for recruitment especially from the different region of the world, especially disenfranchised youth, in the West in order to mobilize support and recruit “foreign fighters.” The recruits have obtained the statue, which is not accessible in their society and have preferred the style of life that is offered by the terrorist organizations instead of their current life. Like other terrorist groups, for a while now the terrorist organization Islamic State (IS) in Iraq and Syria has employed a social-media strategy in order to advance their strategic objectives. At the moment, however, IS seems to be more successful in their on-line activities than other similar organizations. IS uses social media strategically as part of its armed activities and for the sustainability of their military presence in Syria and Iraq. In this context, “Generation Y”, which could exist at the critical position and undertake active role, has been examined. Additionally, the explained characteristics of “Generation Y” have been put forward and the duties of families and society have been stated as well.

Keywords: social media, "generation Y", terrorist organization, islamic state IS

Procedia PDF Downloads 430
13299 Effects on Spiritual Intelligence on Young Adult Muslim Female: Integration of Planned Behaviour Theory in Predicting Consumer Attitude towards Halal Cosmetic

Authors: Azreen Jihan Che Mohd Hashim, Rosidah Musa

Abstract:

Although 'Spiritual Intelligence' (SI) is hard to measure, it is impossible without a noble value that may affect the attitude in purchasing behavior process, so this paper aims to report on a pilot study analysis results in order to evaluate the degree of SI towards consumers’ attitude in purchasing halal cosmetics and, in turn, to reaffirm intention to purchase by using Theory Planned Behaviour (TPB). It is a descriptive cross-sectional study among the Muslim women as the subjects, working and staying in Klang valley area in Malaysia. The purpose of the study is to develop a new measurement scale to unravel and decompose the underlying dimensions of SI from the perspective of the Muslim deemed imperative. About 200 respondents of users and non-users of halal cosmetics are selected. The structure equation modeling (SEM) was conducted to examine the relationships among god, society and self, which are the dimensions of SI. A finding indicates that, in influencing attitude, those who obligate high spiritual intelligence have a good relationship with god, society and self which may influence them to purchase halal cosmetic product. This study offers important findings and implications for future research as it presents a framework on the importance of SI.

Keywords: spiritual intelligence, god, society, self, young adult Muslim female

Procedia PDF Downloads 374
13298 A Critical Analysis of the Current Concept of Healthy Eating and Its Impact on Food Traditions

Authors: Carolina Gheller Miguens

Abstract:

Feeding is, and should be, pleasurable for living beings so they desire to nourish themselves while preserving the continuity of the species. Social rites usually revolve around the table and are closely linked to the cultural traditions of each region and social group. Since the beginning, food has been closely linked with the products each region provides, and, also, related to the respective seasons of production. With the globalization and facilities of modern life we are able to find an ever increasing variety of products at any time of the year on supermarket shelves. These lifestyle changes end up directly influencing food traditions. With the era of uncontrolled obesity caused by the dazzle with the large and varied supply of low-priced to ultra-processed industrial products now in the past, today we are living a time when people are putting aside the pleasure of eating to exclusively eat food dictated by the media as healthy. Recently the medicalization of food in our society has become so present in daily life that almost without realizing we make food choices conditioned to the studies of the properties of these foods. The fact that people are more attentive to their health is interesting. However, when this care becomes an obsessive disorder, which imposes itself on the pleasure of eating and extinguishes traditional customs, it becomes dangerous for our recognition as citizens belonging to a culture and society. This new way of living generates a rupture with the social environment of origin, possibly exposing old traditions to oblivion after two or three generations. Based on these facts, the presented study analyzes these social transformations that occur in our society that triggered the current medicalization of food. In order to clarify what is actually a healthy diet, this research proposes a critical analysis on the subject aiming to understand nutritional rationality and relate how it acts in the medicalization of food. A wide bibliographic review on the subject was carried out followed by an exploratory research in online (especially social) media, a relevant source in this context due to the perceived influence of such media in contemporary eating habits. Finally, this data was crossed, critically analyzing the current situation of the concept of healthy eating and medicalization of food. Throughout this research, it was noticed that people are increasingly seeking information about the nutritional properties of food, but instead of seeking the benefits of products that traditionally eat in their social environment, they incorporate external elements that often bring benefits similar to the food already consumed. This is because the access to information is directed by the media and exalts the exotic, since this arouses more interest of the population in general. Efforts must be made to clarify that traditional products are also healthy foods, rich in history, memory and tradition and cannot be replaced by a standardized diet little concerned with the construction of taste and pleasure, having a relationship with food as if it were a Medicinal product.

Keywords: food traditions, food transformations, healthy eating, medicalization of food

Procedia PDF Downloads 335
13297 Organisational Disclosure: Threats to Individuals' Privacy

Authors: N. A. Badrul

Abstract:

People are concerned that they are vulnerable as a result of what is exposed about them on the internet. Users are increasingly aware of their privacy and are making various efforts to protect their personal information. However, besides individuals themselves, organisations are also exposing personal information of their staff to the general public by publishing it on their official website. This practice may put individuals at risk and particularly vulnerable to threats. This preliminary study explores explicitly the amount and types of personal information disclosure from organisational websites. Threats and risks related to the disclosures are discussed. In general, all the examined organisational websites discloses personal information with varies identifiable degree of data.

Keywords: personal information, privacy, e-government, information disclosure

Procedia PDF Downloads 322
13296 Judicial Institutions in a Post-Conflict Society: Gaining Legitimacy through a Holistic Reform

Authors: Abdul Salim Amin

Abstract:

This paper focuses on how judiciaries in post-conflict society gain legitimacy through reformation. Legitimacy plays a pivotal role in shaping peoples’ behavior to submit to the law and verifies the rightfulness of an organ for taking binding decisions. Among various dynamics, judicial independence, access to justice and behavioral changes of the judicial officials broadly contribute in legitimation of judiciary in general, and the court in particular. Increasing the independence of judiciary through reform limits the interference of governmental branches in judicial issues and protects basic rights of the citizens. Judicial independence does not only matter in institutional terms, individual independence also influences the impartiality and integrity of judges, which can be increased through education and better administration of justice. Finally, access to justice as an intertwined concept both at the legal and moral spectrum of judicial reform avails justice to the citizen and increases the level of public trust and confidence. Efficient legal decisions on fostering such elements through holistic reform create a rule of law atmosphere. Citizens do not accept illegitimate judiciary and do not trust its decisions. Lack of such tolerance and confidence deters the rule of law and, thus, undermines the democratic development of a society.

Keywords: legitimacy, judicial reform, judicial independence, access to justice, legal training, informal justice, rule of law

Procedia PDF Downloads 505
13295 In Stemming Out Societal Depravity: Existentialism, Realism, and Contrapuntal Criticism in Nigerian Arabic Poetry: Ibn Yusuf’s Anthology as Paradigm

Authors: Izzudeen Adetunji

Abstract:

The intrinsic nexus between man and society is apparently unknown to many people despite understanding the real responsibility and immense roles in society. Amongst the in-depth roles of a man as an agent of the societal reformer is to be a driven force towards installing normalcy and socio-cultural change in society. The paradoxical attitudes of man in engaging in social vices, illicit characters, and unwanted attitudes have given birth to decay and ill-society. However, the need for social change or socio-cultural evolution might be necessary to install normalcy and social order. Nigerian Arabic poets since the 19th century have tremendously engaged in utilizing their poetry for social change through socio-cultural, religious, economic, scientific, or technological forces. This engagement has hitherto yielded a positive outcome for societal reform. The anthology of Ibn Yusuf is one of the compendiums of poetries revealing societal depravity, man’s social vices, and atrocities; which later called to flawlessness. The theoretical framework would be examined through the Heraclitan model, focusing on a parallel to that of a living organism, which, in order to remain alive, must constantly change. Therefore, the thrust of this paper is to examine the societal maladies as elucidated in Ibn Yusuf’s anthology and proffer a contrapuntal criticism of it. Before delving into the main discussion, the paper will examine the concepts of existentialism and realism as a philosophical interface. Likewise, the issues of man and social change, an overview of Nigerian Arabic poetry, will be discussed. Ibn Yusuf’s biography and scholarship and the review of his anthology will be studied. The paper will conclude by critically examining the contrapuntal criticism of societal maladies through Ibn Yusuf’s anthology.

Keywords: societal depravity, existentialism, realism, Nigeria Arabic poetry, Ibn Yusuf’s anthology, contrapuntal criticism

Procedia PDF Downloads 35
13294 The Lightener of Love, the World Peace

Authors: Abdul Razzaq Azad, Muhammad Asad Razzaq

Abstract:

The current study reveals that Muslim society losing their basics concepts of courtesy which are the part of Islam. It is known that Muslims played a key role for providing piece in society throughout the history. Humanities always accept the changes through time, ideologies, ethics and traditions, various religious changes, culture, social behaviors and social problems, attitudes, political situations, literature, historical stress, economic clashes, wars and daily routine’s life. It also observed that religious people have their mind set due to their different religious teachings. All the religions have their different religious teachings which have different approaches for their followers. All the religions have same lesson of peace and prosperity. After 09/11 the entire scenario changed, even tried to connect terrorism and extremism with Islam and Muslims. It created a gap among religions and there was not attempt to use for reducing that gap. There were many meetings called at different places of religious scholars in different countries, but not able to get acceptable results. It also created a gap within the country in different religious sects. In the last 15 years there were14000 people have been killed from different religious incidents and even in different sects’ activities. The current study based on survey from 25 Imams and 10 Khatibs from South Punjab. The results show that they knew the word interfaith harmony and the role of Imams and Khatibs for peace in the inter-religious societies.

Keywords: Islam, peace religion, terrorism, extremism, freedom, peace, prosperity and society

Procedia PDF Downloads 500
13293 Reclaiming Corporate Social Responsibility: A Research Agenda for Socio-Industrial Interdependence

Authors: Leah Ritchie

Abstract:

By many accounts, the most recent economic recession and subsequent lack-luster recovery has demonstrated that corporate social responsibility is in a state of crisis. This crisis represents an opportunity for CSR scholars to play a role in restoring long-term economic growth and consumer confidence. In its current state however, CSR may not be in a position to facilitate positive change. In an attempt to remain relevant, the field has shifted toward a performance-based agenda that demonstrates in practical terms, how CSR can positively affect the financial and strategic performance of the firm. This paper argues that if CSR is to play a central role in helping to create a more equitable balance of power between industry and society, it must demonstrate the symbiotic nature of the relationship between these two entities, not just in terms of compartmentalized strategic and financial gain for the firm, but also toward maintaining a 'do no harm' imperative. Given the evidence that harm done to society is ultimately turned back on the firm, this is not simply a moralistic imperative. In order to affect change, CSR must also create an activist agenda to raise consciousness among the general citizenry toward mobilizing, uncovering, and repairing breeches in the implicit social contract between business and society.

Keywords: corporate social responsibility, multiple stakeholder view, economic recession, housing crisis

Procedia PDF Downloads 218
13292 Information Retrieval for Kafficho Language

Authors: Mareye Zeleke Mekonen

Abstract:

The Kafficho language has distinct issues in information retrieval because of its restricted resources and dearth of standardized methods. In this endeavor, with the cooperation and support of linguists and native speakers, we investigate the creation of information retrieval systems specifically designed for the Kafficho language. The Kafficho information retrieval system allows Kafficho speakers to access information easily in an efficient and effective way. Our objective is to conduct an information retrieval experiment using 220 Kafficho text files, including fifteen sample questions. Tokenization, normalization, stop word removal, stemming, and other data pre-processing chores, together with additional tasks like term weighting, were prerequisites for the vector space model to represent each page and a particular query. The three well-known measurement metrics we used for our word were Precision, Recall, and and F-measure, with values of 87%, 28%, and 35%, respectively. This demonstrates how well the Kaffiho information retrieval system performed well while utilizing the vector space paradigm.

Keywords: Kafficho, information retrieval, stemming, vector space

Procedia PDF Downloads 60
13291 Information Overload, Information Literacy and Use of Technology by Students

Authors: Elena Krelja Kurelović, Jasminka Tomljanović, Vlatka Davidović

Abstract:

The development of web technologies and mobile devices makes creating, accessing, using and sharing information or communicating with each other simpler every day. However, while the amount of information constantly increasing it is becoming harder to effectively organize and find quality information despite the availability of web search engines, filtering and indexing tools. Although digital technologies have overall positive impact on students’ lives, frequent use of these technologies and digital media enriched with dynamic hypertext and hypermedia content, as well as multitasking, distractions caused by notifications, calls or messages; can decrease the attention span, make thinking, memorizing and learning more difficult, which can lead to stress and mental exhaustion. This is referred to as “information overload”, “information glut” or “information anxiety”. Objective of this study is to determine whether students show signs of information overload and to identify the possible predictors. Research was conducted using a questionnaire developed for the purpose of this study. The results show that students frequently use technology (computers, gadgets and digital media), while they show moderate level of information literacy. They have sometimes experienced symptoms of information overload. According to the statistical analysis, higher frequency of technology use and lower level of information literacy are correlated with larger information overload. The multiple regression analysis has confirmed that the combination of these two independent variables has statistically significant predictive capacity for information overload. Therefore, the information science teachers should pay attention to improving the level of students’ information literacy and educate them about the risks of excessive technology use.

Keywords: information overload, computers, mobile devices, digital media, information literacy, students

Procedia PDF Downloads 283