Search results for: casual-leisure information behaviors
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12050

Search results for: casual-leisure information behaviors

11660 The Role of Information Technology in the Supply Chain Management

Authors: Azar Alizadeh, Mohammad Reza Naserkhaki

Abstract:

The application of the IT systems for collecting and analyzing the data can have a significant effect on the performance of any company. In recent decade, different advancements and achievements in the field of information technology have changed the industry compared to the previous decade. The adoption and application of the information technology are one of the ways to achieve a distinctive competitive personality to the companies and their supply chain. The acceptance of the IT and its proper implementation cam reinforce and improve the cooperation between different parts of the supply chain by rapid transfer and distribution of the precise information and the application of the informational systems, leading to the increase in the supply chain efficiency. The main objective of this research is to study the effects and applications of the information technology on and in the supply chain management and to introduce the effective factors on the acceptance of information technology in the companies. Moreover, in order to understand the subject, we will investigate the role and importance of the information and electronic commerce in the supply chain and the characteristics of the supply chain based on the information flow approach.

Keywords: electronic commerce, industry, information technology, management, supply chain, system

Procedia PDF Downloads 485
11659 Interactions on Silent Mode: Parental Smartphone Distractions on Infant Mental Health

Authors: Terry Gomez

Abstract:

This interpretive phenomenological qualitative study explored potential risks related to infant mental health with parental smartphone use while caring for infants. Data were collected through nine online interviews of first-time parents with infants under one-year-old. All parents reported using their smartphone during child-bonding activities such as playtime, feeding, and sleep-time. Results indicated that smartphone distractions appear to influence the synchrony of parent-child interactions. Infants displayed physical, verbal, or emotional reactions to parents’ smartphone distractions, indicating that smartphone use influences infants’ behaviors. Parents shared information on how smartphones helped them with their transition into parenthood. The findings of this study provide insights helpful to inform infant mental health professionals and parents about potential developmental consequences associated with parental technoference and absent presence.

Keywords: absent presence, infant mental health, parental distractions, smartphones, technoference

Procedia PDF Downloads 129
11658 Academic Entitlement And Grade Negotiation Styles Among Ug Students: A Correlation Study

Authors: Athira M., Prakasha G. S.

Abstract:

The rising prevalence of academic entitlement among school and college students necessitates a comprehensive investigation. This study focuses on discovering gender differentials in academic entitlement and their nexus with diverse grade negotiation behaviors within the undergraduate (UG) student cohort. Grade negotiation behaviors, encompassing a range from amicable discussions to more assertive tactics, are influenced by students' perceptions of their academic entitlement. The research delves into the broader significance of academic entitlement, considering its implications for student-teacher conflicts and the dynamics it introduces into the educational field. Employing a quantitative research approach, data from UG students is meticulously analyzed. Mann-Whitney U tests unveil pronounced gender difference in academic entitlement, with females demonstrating higher entitlement levels. Furthermore, the study unearths significant correlations between academic entitlement and specific negotiation styles, notably yielding and forcing strategies, albeit with minimal impact on academic performance. These findings provide a foundational understanding for educators and institutions to foster equitable learning environments and formulate effective conflict resolution strategies, ultimately elevating the quality of the educational experience. Moreover, this study opens avenues for future research, exploring interventions to enhance negotiation skills and diving deeper into the intricate dimensions of academic entitlement within academic life.

Keywords: academic entitlement, grade negotiation, negotiation styles, student-teacher conflict

Procedia PDF Downloads 44
11657 Tools for Transparency: The Role of Civic Technology in Increasing the Transparency of the State

Authors: Rebecca Rumbul

Abstract:

The operation of the state can often appear opaque to citizens wishing to access official information, who have to negotiate a path through numerous levels of bureaucracy rationalized through institutional policy to acquire what information they want. Even where individual states have 'Right to Information' legislation guaranteeing citizen access to information, public sector conformity to such laws vary between states and between state organizations. In response to such difficulties in bringing citizens and information together, many NGO's around the world have begun designing and hosting digital portals to facilitate the requesting and receiving of official information. How then, are these 'civic technology' tools affecting the behavior of the state? Are they increasing the transparency of the state? This study looked at 5 Right to Information civic technology sites in Chile, Uruguay, Ukraine, Hungary and the UK, and found that such sites were providing a useful platform to publish official information, but that states were still reluctant to comply with all requests. It concludes that civic technology can be an important tool in increasing the transparency of the state, but that the state must have an institutional commitment to information rights for this to be fully effective.

Keywords: digital, ICT, transparency, civic technology

Procedia PDF Downloads 662
11656 An Investigation for Information Asymmetry Nexus IPO Under-Pricing: A Case of Pakistan

Authors: Saqib Mehmood, Naveed Iqbal Chaudhry, Asif Mehmood

Abstract:

This study intends to investigate the information asymmetry theories of IPO and under-pricing in Pakistan. The purpose of the study is to validate the information asymmetry about firm value which leads to under-pricing. A total of 55 IPOs listed from 2000-2011 were included in this study. OLS multiple regression was applied to achieve the objectives of this study. The findings of the study confirm the significance of information asymmetry on under-pricing in Pakistan. The findings have implications for issuing firms and prospective investors.

Keywords: information asymmetry, initial public offerings, under-pricing, firm value

Procedia PDF Downloads 481
11655 Modeling the Acquisition of Expertise in a Sequential Decision-Making Task

Authors: Cristóbal Moënne-Loccoz, Rodrigo C. Vergara, Vladimir López, Domingo Mery, Diego Cosmelli

Abstract:

Our daily interaction with computational interfaces is plagued of situations in which we go from inexperienced users to experts through self-motivated exploration of the same task. In many of these interactions, we must learn to find our way through a sequence of decisions and actions before obtaining the desired result. For instance, when drawing cash from an ATM machine, choices are presented in a step-by-step fashion so that a specific sequence of actions must be performed in order to produce the expected outcome. But, as they become experts in the use of such interfaces, do users adopt specific search and learning strategies? Moreover, if so, can we use this information to follow the process of expertise development and, eventually, predict future actions? This would be a critical step towards building truly adaptive interfaces that can facilitate interaction at different moments of the learning curve. Furthermore, it could provide a window into potential mechanisms underlying decision-making behavior in real world scenarios. Here we tackle this question using a simple game interface that instantiates a 4-level binary decision tree (BDT) sequential decision-making task. Participants have to explore the interface and discover an underlying concept-icon mapping in order to complete the game. We develop a Hidden Markov Model (HMM)-based approach whereby a set of stereotyped, hierarchically related search behaviors act as hidden states. Using this model, we are able to track the decision-making process as participants explore, learn and develop expertise in the use of the interface. Our results show that partitioning the problem space into such stereotyped strategies is sufficient to capture a host of exploratory and learning behaviors. Moreover, using the modular architecture of stereotyped strategies as a Mixture of Experts, we are able to simultaneously ask the experts about the user's most probable future actions. We show that for those participants that learn the task, it becomes possible to predict their next decision, above chance, approximately halfway through the game. Our long-term goal is, on the basis of a better understanding of real-world decision-making processes, to inform the construction of interfaces that can establish dynamic conversations with their users in order to facilitate the development of expertise.

Keywords: behavioral modeling, expertise acquisition, hidden markov models, sequential decision-making

Procedia PDF Downloads 252
11654 Anxiety and Change in Eating Habits and Health Behaviors among Adult Women during COVID-19 Pandemic Lockdown in Alexandria, Egypt

Authors: Heba Ahmed Abdelaziz, Doaa Tawfik Mohamed Ibrahim

Abstract:

Background: COVID-19 pandemic is the major health problem facing the world recently, causing variable effects on mental health and eating behavior. Aim of the study: Identifying changes in eating patterns and other health behaviors in relation to the anxiety caused by the COVID-19 pandemic lockdown in adult females in Alexandria, Egypt. Method: 344 adult females (20+ years old), were included in online self-administered questionnaire. Results: Severe anxiety symptoms was among 34.6% of the studied females especially; those aged 25-40 years, married, non-working or student females, females who had change in their work routine (half or full time from home). Homemade pastries and bakery product then beverages followed by fresh fruits and vegetables were frequently consumed by the studied females than before lockdown while fast foods were decreased during lockdown. Overweight and obesity were high among most of the participants with different grades of anxiety symptoms. Females with moderate and severe anxiety symptoms reported increase in appetite and body weight with irregular sleeping during lockdown. Conclusion: the current study concluded that stressful situations like lockdown due to COVID-19 pandemic is associated with anxiety (severe, moderate, mild then minimal, respectively) along with changes in eating habits, physical activity, sleeping pattern and smoking.

Keywords: COVID-19, lockdown, females, anxiety, eating, stress, lifestyle

Procedia PDF Downloads 189
11653 Knowledge and Awareness of HIV/AIDS among Male Prisoners in Kuwait

Authors: Saroj Bala Grover, Al Munther Alhasawi, Prem N. Sharma, P. S. N. Menon

Abstract:

Background: Prisoners are considered one of the high-risk populations for the transmission of human immunodeficiency virus (HIV) infection. Targeting this group is one of the strategies to reduce the incidence of acquired immune deficiency syndrome (AIDS) in the community. Subjects and Methods: A cross-sectional study was conducted among male inmates in Kuwait’s prison by administering three sets of questionnaires to assess the level of their knowledge and awareness about the mode of transmission of HIV/AIDS, their risky personal behavior that may lead to HIV infection, and the presence of any negative attitudes and stigmatization towards HIV infected individuals. Results: The study included 123 male inmates, with a mean ± SD age of 30.9 ± 8.4 years. Most participants had good general knowledge (90%) about the mode of transmission of HIV/AIDS, including sharing contaminated syringes, risky personal behaviors such as having unprotected sex and increased number of extramarital relationships (66%), and the avoidance of the regular use of condoms. The younger age group (< 35 years) had more extramarital relationships than those > 35 years (71.4% Vs. 46.4%; p=0.016). There was a perceived attitude of stigmatization among inmates towards HIV-infected persons. Conclusions: This vulnerable group of prisoners, especially young adults, need educational programs to improve knowledge about the transmission of HIV and to correct and change their risky personal behaviors to protect themselves and the community against HIV transmission.

Keywords: HIV/AIDS, Kuwait, prisoners, knowledge, awareness, personal behavior, extramarital relationships, safe sex, discrimination, stigmatization

Procedia PDF Downloads 78
11652 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 381
11651 The Adoption of Process Management for Accounting Information Systems in Thailand

Authors: Manirath Wongsim

Abstract:

Information Quality (IQ) has become a critical, strategic issue in Accounting Information Systems (AIS) adoption. In order to implement AIS adoption successfully, it is important to consider the quality of information use throughout the adoption process, which seriously impacts the effectiveness of AIS adoption practice and the optimization of AIS adoption decisions. There is a growing need for research to provide insights into issues and solutions related to IQ in AIS adoption. The need for an integrated approach to improve IQ in AIS adoption, as well as the unique characteristics of accounting data, demands an AIS adoption specific IQ framework. This research aims to explore ways of managing information quality and AIS adoption to investigate the relationship between the IQ issues and AIS adoption process. This study has led to the development of a framework for understanding IQ management in AIS adoption. This research was done on 44 respondents as ten organisations from manufacturing firms in Thailand. The findings of the research’s empirical evidence suggest that IQ dimensions in AIS adoption to provide assistance in all process of decision making. This research provides empirical evidence that information quality of AIS adoption affect decision making and suggests that these variables should be considered in adopting AIS in order to improve the effectiveness of AIS.

Keywords: information quality, information quality dimensions, accounting information systems, accounting information system adoption

Procedia PDF Downloads 467
11650 Embracing Our Scars: Self-Harm 101

Authors: Bree Wiles

Abstract:

Self-harm is still a topic that is not talked about enough, especially with the growing concern for the safety of LGBTQIA+ youth. LGBTQIA+ youth are coming out at earlier ages, thus bringing to attention the added risks for this population. Many LGBTQIA+ youth end up engaging in some form of self-destructive behavior from dealing with the stigma and negative socialization around them. Within the LGBTQIA+ youth population, self-harm alongside depression and suicide is especially common. This disparity shows the importance of providing LGBTQIA+ youth with resources that affirm their identities. As professionals and parents, it is important to understand the types of self-harm, the average age range when it can occur, causes, populations, risk factors, and self-harm in connection with mental health and suicide. It is imperative to provide protective factors for LGBTQIA+ youth in helping to replace self-harming behaviors with positive coping strategies. Helping LGBTQIA+ youth in different contexts, including from a professional, parent, and educator perspective, allows unique ways in which each can assist an LGBTQIA+ youth who is self-harming. The stigma, shame, and many misconceptions about self-harming behaviors are discussed in depth including from the lived experience of this author and professional experiences working with queer youth. Most importantly, it is imperative to know how to approach LGBTQIA+ youth who are self-harming, including how to speak in a compassionate and empathy-based framework. Clear interventions and therapeutic techniques based on evidence-based practices on alternatives to self-harm, lived experience, and previous practices with queer youth who are self-harming are provided and discussed.

Keywords: LGBTQ+, mental health, self-harm, depression

Procedia PDF Downloads 52
11649 Influences of Thermal Treatments on Dielectric Behaviors of Carbon Nanotubes-BaTiO₃ Hybrids Reinforced Polyvinylidene Fluoride Composites

Authors: Benhui Fan, Fahmi Bedoui, Jinbo Bai

Abstract:

Incorporated carbon nanotube-BaTiO₃ hybrids (H-CNT-BT) with core-shell structure, a better dispersion of CNTs can be achieved in a semi-crystalline polymeric matrix, polyvinylidene fluoride (PVDF). Carried by BT particles, CNTs are easy to mutually connect which helps to obtain an extremely low percolation threshold (fc). After thermal treatments, the dielectric constants (ε’) of samples further increase which depends on the conditions of thermal treatments such as annealing temperatures, annealing durations and cooling ways. Thus, in order to study more comprehensively about the influence of thermal treatments on composite’s dielectric behaviors, in situ synchrotron X-ray is used to detect re-crystalline behavior of PVDF. Results of wide-angle X-ray diffraction (WAXD) and small-angle X-ray scattering (SAXS) show that after the thermal treatment, the content of β polymorph (the polymorph with the highest ε’ among all the polymorphs of PVDF’s crystalline structure) has increased nearly double times at the interfacial region of CNT-PVDF, and the thickness of amorphous layers (La) in PVDF’s long periods (Lp) has shrunk around 10 Å. The evolution of CNT’s network possibly occurs in the procedure of La shrinkage, where the strong interfacial polarization may be aroused and increases ε’ at low frequency. Moreover, an increase in the thickness of crystalline lamella may also arouse more orientational polarization and improve ε’ at high frequency.

Keywords: dielectric properties, thermal treatments, carbon nanotubes, crystalline structure

Procedia PDF Downloads 324
11648 Adsorption Mechanism of Heavy Metals and Organic Pesticide on Industrial Construction and Demolition Waste and Its Runoff Behaviors

Authors: Sheng Huang, Xin Zhao, Xiaofeng Gao, Tao Zhou, Shijin Dai, Youcai Zhao

Abstract:

Adsorption of heavy metal pollutants (Zn, Cd, Pb, Cr, Cu) and organic pesticide (phorate, dithiophosphate diethyl, triethyl phosphorothioate), along with their multi-contamination on the surface of industrial construction & demolition waste (C&D waste) was investigated. Brick powder was selected as the appropriate waste while its maximum equilibrium adsorption amount of heavy metal under single controlled contamination matrix reached 5.41, 0.81, 0.45, 1.13 and 0.97 mg/g, respectively. Effects of pH and spiking dose of ICDW was also investigated. Equilibrium adsorption amount of organic pesticide varied from 0.02 to 0.97 mg/g, which was negatively correlated to the size distribution and hydrophilism. Existence of organic pesticide on surface of ICDW caused various effects on the heavy metal adsorption, mainly due to combination of metal ions and the floccule formation along with wrapping behaviors by pesticide pollutants. Adsorption of Zn was sharply decreased from 7.1 to 0.15 mg/g compared with clean ICDW and phorate contaminated ICDW, while that of Pb, Cr and Cd experienced an increase- then decrease procedure. On the other hand, runoff of pesticide contaminants was investigated under 25 mm/h simulated rainfall. Results showed that the cumulative runoff amount fitted well with curve obtained from a power function, of which r2=0.95 and 0.91 for 1DAA (1 day between contamination and runoff) and 7DAA, respectively. This study helps provide evaluation of industrial construction and demolition waste contamination into aquatic systems.

Keywords: adsorption mechanism, industrial construction waste, metals, pesticide, runoff

Procedia PDF Downloads 467
11647 Torsional Behavior of Reinforced Concrete (RC) Beams Strengthened by Fiber Reinforced Cementitious Materials– a Review

Authors: Sifatullah Bahij, Safiullah Omary, Francoise Feugeas, Amanullah Faqiri

Abstract:

Reinforced concrete (RC) is commonly used material in the construction sector, due to its low-cost and durability, and allowed the architectures and designers to construct structural members with different shapes and finishing. Usually, RC members are designed to sustain service loads efficiently without any destruction. However, because of the faults in the design phase, overloading, materials deficiencies, and environmental effects, most of the structural elements will require maintenance and repairing over their lifetime. Therefore, strengthening and repair of the deteriorated and/or existing RC structures are much important to extend their life cycle. Various techniques are existing to retrofit and strengthen RC structural elements such as steel plate bonding, external pre-stressing, section enlargement, fiber reinforced polymer (FRP) wrapping, etc. Although these configurations can successfully improve the load bearing capacity of the beams, they are still prone to corrosion damage which results in failure of the strengthened elements. Therefore, many researchers used fiber reinforced cementitious materials due to its low-cost, corrosion resistance, and result in improvement of the tensile and fatigue behaviors. Various types of cementitious materials have been used to strengthen or repair structural elements. This paper has summarized to accumulate data regarding on previously published research papers concerning the torsional behaviors of RC beams strengthened by various types of cementitious materials.

Keywords: reinforced concrete beams, strengthening techniques, cementitious materials, torsional strength, twisting angle

Procedia PDF Downloads 121
11646 A Pilot Study Based on Online Survey Research Assessing the COVID-19 Impact on the Wellbeing of 15 Dogs Involved in Flemish Animal-Assisted Intervention Projects

Authors: L. Meers, L. Contalbrigo, V. Stevens, O. Ulitina, S. Laufer, W. E. Samuels, S. Normando

Abstract:

Since the COVID-19 pandemic started, there has been concern that domestic animals may help spread SARS-Cov-2. This concern also greatly affected human-animal interaction projects such as animal-assisted interventions (AAI). As a result, institutions and AAI practitioners developed new safety protocols and procedures to control the spread of the SARS-Cov-2 virus during AAI sessions and to guarantee safety for their clients and animals. However, little is known yet about the impact on animals' needs and the possible welfare issues due to these lifestyle adaptions. Fifteen therapists in Flanders, Belgium, who were currently conducting canine-assisted interventions, conducted unstructured observations on how their dogs' (11 mixed breeds, 3 Labradors, 1 terrier aged 2 – 12 years) behaviors changed due to institutional COVID-19 safety protocols. Most (80%) of the respondents reported that their dogs showed sniffing or sneezing after smelling disinfected areas. Two (13%) dogs responded with vomiting and gagging, and three (20%) dogs urinated over disinfected areas. All protocols advise social distancing between participants and animals. When held back, eight (53%) dogs showed self-calming behaviors. Respondents reported that most (73%) dogs responded with flight reactions when seeing humans wearing facial masks. When practitioners threw their used masks in open dustbins, five (33%) dogs tried to take them out with their mouths and play with them; two (13%) Labradors tried to eat them. Taking the dogs' temperatures was the most frequently (53%) used method to supervise their health. However, all dogs showed behaviors as ducking the tail, trying to escape, or biting the animal handler during this procedure. We interpret these results to suggest that dogs tended to react with stress and confusion to the changes in AAI practices they're part of. The health and safety protocols that institutions used were largely borne from recommendations made to protect humans. The participating practitioners appeared to use their knowledge of dog behavior and safety to modify them as best they could—but with more significant concern directed towards the other humans. Given their inter-relatedness and mutual importance for welfare, we advocate for integrated human and animal health and welfare assessments and protocols to provide a framework for "One health" approaches in animal-assisted interventions.

Keywords: animal-assisted therapy, COVID-19 protocol, one health, welfare

Procedia PDF Downloads 201
11645 Great Powers’ Proxy Wars in Middle East and Difficulty in Transition from Cold War to Cold Peace

Authors: Arash Sharghi, Irina Dotu

Abstract:

The developments in the Middle East region have activated the involvement of a numerous diverse state and non-state actors in the regional affairs. The goals, positions, ideologies, different, and even contrast policy behaviors had procured the spreading and continuity of crisis. Non-state actors varying from Islamic organizations to takfiri-terrorist movements on one hand and regional and trans- regional actors, from another side, seek to reach their interests in the power struggle. Here, a research worthy question comes on the agenda: taking into consideration actors’ contradictory interests and constraints what are the regional peace and stability perspectives? Therein, different actors’ aims definition, their actions and behaviors, which affect instability, can be regarded as independent variables; whereas, on the contrary, Middle East peace and stability perspective analysis is a dependent variable. Though, this regional peace and war theory based research admits the significant influence of trans-regional actors, it asserts the roots of violence to derive from region itself. Consequently, hot war and conflict prevention and hot peace assurance in the Middle East region cannot be attained only by demands and approaches of trans-regional actors. Moreover, capacity of trans-regional actors is sufficient only for a cold war or cold peace to be reached in the region. Furthermore, within the framework of current conflict (struggle) between regional actors it seems to be difficult and even impossible to turn the cold war into a cold peace in the region.

Keywords: cold peace, cold war, hot war, Middle East, non-state actors, regional and Great powers, war theory

Procedia PDF Downloads 274
11644 Online Information Seeking: A Review of the Literature in the Health Domain

Authors: Sharifah Sumayyah Engku Alwi, Masrah Azrifah Azmi Murad

Abstract:

The development of the information technology and Internet has been transforming the healthcare industry. The internet is continuously accessed to seek for health information and there are variety of sources, including search engines, health websites, and social networking sites. Providing more and better information on health may empower individuals, however, ensuring a high quality and trusted health information could pose a challenge. Moreover, there is an ever-increasing amount of information available, but they are not necessarily accurate and up to date. Thus, this paper aims to provide an insight of the models and frameworks related to online health information seeking of consumers. It begins by exploring the definition of information behavior and information seeking to provide a better understanding of the concept of information seeking. In this study, critical factors such as performance expectancy, effort expectancy, and social influence will be studied in relation to the value of seeking health information. It also aims to analyze the effect of age, gender, and health status as the moderator on the factors that influence online health information seeking, i.e. trust and information quality. A preliminary survey will be carried out among the health professionals to clarify the research problems which exist in the real world, at the same time producing a conceptual framework. A final survey will be distributed to five states of Malaysia, to solicit the feedback on the framework. Data will be analyzed using SPSS and SmartPLS 3.0 analysis tools. It is hoped that at the end of this study, a novel framework that can improve online health information seeking is developed. Finally, this paper concludes with some suggestions on the models and frameworks that could improve online health information seeking.

Keywords: information behavior, information seeking, online health information, technology acceptance model, the theory of planned behavior, UTAUT

Procedia PDF Downloads 274
11643 Emotional Analysis for Text Search Queries on Internet

Authors: Gemma García López

Abstract:

The goal of this study is to analyze if search queries carried out in search engines such as Google, can offer emotional information about the user that performs them. Knowing the emotional state in which the Internet user is located can be a key to achieve the maximum personalization of content and the detection of worrying behaviors. For this, two studies were carried out using tools with advanced natural language processing techniques. The first study determines if a query can be classified as positive, negative or neutral, while the second study extracts emotional content from words and applies the categorical and dimensional models for the representation of emotions. In addition, we use search queries in Spanish and English to establish similarities and differences between two languages. The results revealed that text search queries performed by users on the Internet can be classified emotionally. This allows us to better understand the emotional state of the user at the time of the search, which could involve adapting the technology and personalizing the responses to different emotional states.

Keywords: emotion classification, text search queries, emotional analysis, sentiment analysis in text, natural language processing

Procedia PDF Downloads 141
11642 Formulating Rough Approximations in Information Tables with Possibilistic Information

Authors: Michinori Nakata, Hiroshi Sakai

Abstract:

A rough set, which consists of lower and upper approximations, is formulated in information tables containing possibilistic information. First, lower and upper approximations on the basis of possible world semantics in the same way as Lipski did in the field of incomplete databases are shown in order to clarify fundamentals of rough sets under possibilistic information. Possibility and necessity measures are used, as is done in possibilistic databases. As a result, each object has certain and possible membership degrees to lower and upper approximations, which degrees are the lower and upper bounds. Therefore, the degree that the object belongs to lower and upper approximations is expressed by an interval value. And the complementary property linked with the lower and upper approximations holds, as is valid under complete information. Second, the approach based on indiscernibility relations, which is proposed by Dubois and Prade, are extended in three cases. The first case is that objects used to approximate a set of objects are characterized by possibilistic information. The second case is that objects used to approximate a set of objects with possibilistic information are characterized by complete information. The third case is that objects that are characterized by possibilistic information approximate a set of objects with possibilistic information. The extended approach create the same results as the approach based on possible world semantics. This justifies our extension.

Keywords: rough sets, possibilistic information, possible world semantics, indiscernibility relations, lower approximations, upper approximations

Procedia PDF Downloads 321
11641 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 148
11640 Exploring Symptoms, Causes and Treatments of Feline Pruritus Using Thematic Analysis of Pet Owner Social Media Posts

Authors: Sitira Williams, Georgina Cherry, Andrea Wright, Kevin Wells, Taran Rai, Richard Brown, Travis Street, Alasdair Cook

Abstract:

Social media sources (50) were identified, keywords defined by veterinarians and organised into 6 topics known to be indicative of feline pruritus: body areas, behaviors, symptoms, diagnosis, and treatments. These were augmented using academic literature, a cat owner survey, synonyms, and Google Trends. The content was collected using a social intelligence solution, with keywords tagged and filtered. Data were aggregated and de-duplicated. SL content matching body areas, behaviors and symptoms were reviewed manually, and posts were marked relevant if: posted by a pet owner, identifying an itchy cat and not duplicated. A sub-set of 493 posts published from 2009-2022 was used for reflexive thematic analysis in NVIVO (Burlington, MA) to identify themes. Five themes were identified: allergy, pruritus, additional behaviors, unusual or undesirable behaviors, diagnosis, and treatment. Most (258) posts reported the cat was excessively licking, itching, and scratching. The majority were indoor cats and were less playful and friendly when itchy. Half of these posts did not indicate a known cause of pruritus. Bald spots and scabs (123) were reported, often causing swelling and fur loss, and 56 reported bumps, lumps, and dry patches. Other impacts on the cat’s quality of life were ear mites, cat self-trauma and stress. Seven posts reported their cats’ symptoms caused them ongoing anxiety and depression. Cats with food allergies to poultry (often chicken and beef) causing bald spots featured in 23 posts. Veterinarians advised switching to a raw food diet and/or changing their bowls. Some cats got worse after switching, leaving owners’ needs unmet. Allergic reactions to flea bites causing excessive itching, red spots, scabs, and fur loss were reported in 13 posts. Some (3) posts indicated allergic reactions to medication. Cats with seasonal and skin allergies, causing sneezing, scratching, headshaking, watery eyes, and nasal discharge, were reported 17 times. Eighty-five posts identified additional behaviors. Of these, 13 reported their cat’s burst pimple or insect bite. Common behaviors were headshaking, rubbing, pawing at their ears, and aggressively chewing. In some cases, bites or pimples triggered previously unseen itchiness, making the cat irritable. Twenty-four reported their cat had anxiety: overgrooming, itching, losing fur, hiding, freaking out, breathing quickly, sleeplessness, hissing and vocalising. Most reported these cats as having itchy skin, fleas, and bumps. Cats were commonly diagnosed with an ear infection, ringworm, acne, or kidney disease. Acne was diagnosed in cats with an allergy flare-up or overgrooming. Ear infections were diagnosed in itchy cats with mites or other parasites. Of the treatments mentioned, steroids were most frequently used, then anti-parasitics, including flea treatments and oral medication (steroids, antibiotics). Forty-six posts reported distress following poor outcomes after medication or additional vet consultations. SL provides veterinarians with unique insights. Verbatim comments highlight the detrimental effects of pruritus on pets and owner quality of life. This study demonstrates the need for veterinarians to communicate management and treatment options more effectively to relieve owner frustrations. Data analysis could be scaled up using machine learning for topic modeling.

Keywords: content analysis, feline, itch, pruritus, social media, thematic analysis, veterinary dermatology

Procedia PDF Downloads 191
11639 Studies of the Corrosion Kinetics of Metal Alloys in Stagnant Simulated Seawater Environment

Authors: G. Kabir, A. M. Mohammed, M. A. Bawa

Abstract:

The paper presents corrosion behaviors of Naval Brass, aluminum alloy and carbon steel in simulated seawater under stagnant conditions. The behaviors were characterized on the variation of chloride ions concentration in the range of 3.0wt% and 3.5wt% and exposure time. The weight loss coupon-method immersion technique was employed. The weight loss for the various alloys was measured. Based on the obtained results, the corrosion rate was determined. It was found that the corrosion rates of the various alloys are related to the chloride ions concentrations, exposure time and kinetics of passive film formation of the various alloys. Carbon steel, suffers corrosion many folds more than Naval Brass. This indicated that the alloy exhibited relatively strong resistance to corrosion in the exposure environment of the seawater. Whereas, the aluminum alloy exhibited an excellent and beneficial resistance to corrosion more than the Naval Brass studied. Despite the prohibitive cost, Naval Brass and aluminum alloy, indicated to have beneficial corrosion behavior that can offer wide range of application in seashore operations. The corrosion kinetics parameters indicated that the corrosion reaction is limited by diffusion mass transfer of the corrosion reaction elements and not by reaction controlled.

Keywords: alloys, chloride ions concentration, corrosion kinetics, corrosion rate, diffusion mass transfer, exposure time, seawater, weight loss

Procedia PDF Downloads 302
11638 The Impact of the Information Technologies on the Accounting Department of the Romanian Companies

Authors: Dumitru Valentin Florentin

Abstract:

The need to use high volumes of data and the high competition are only two reasons which make necessary the use of information technologies. The objective of our research is to establish the impact of information technologies on the accounting department of the Romanian companies. In order to achieve it, starting from the literature review we made an empirical research based on a questionnaire. We investigated the types of technologies used, the reasons which led to the implementation of certain technologies, the benefits brought by the use of the information technologies, the difficulties brought by the implementation and the future effects of the applications. The conclusions show that there is an evolution in the degree of implementation of the information technologies in the Romanian companies, compared with the results of other studies conducted a few years before.

Keywords: information technologies, impact, company, Romania, empirical study

Procedia PDF Downloads 424
11637 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 156
11636 Deformation Characteristics of Fire Damaged and Rehabilitated Normal Strength Concrete Beams

Authors: Yeo Kyeong Lee, Hae Won Min, Ji Yeon Kang, Hee Sun Kim, Yeong Soo Shin

Abstract:

Fire incidents have been steadily increased over the last year according to national emergency management agency of South Korea. Even though most of the fire incidents with property damage have been occurred in building, rehabilitation has not been properly done with consideration of structure safety. Therefore, this study aims at evaluating rehabilitation effects on fire damaged normal strength concrete beams through experiments and finite element analyses. For the experiments, reinforced concrete beams were fabricated having designed concrete strength of 21 MPa. Two different cover thicknesses were used as 40 mm and 50 mm. After cured, the fabricated beams were heated for 1hour or 2hours according to ISO-834 standard time-temperature curve. Rehabilitation was done by removing the damaged part of cover thickness and filling polymeric mortar into the removed part. Both fire damaged beams and rehabilitated beams were tested with four point loading system to observe structural behaviors and the rehabilitation effect. To verify the experiment, finite element (FE) models for structural analysis were generated using commercial software ABAQUS 6.10-3. For the rehabilitated beam models, integrated temperature-structural analyses were performed in advance to obtain geometries of the fire damaged beams. In addition to the fire damaged beam models, rehabilitated part was added with material properties of polymeric mortar. Three dimensional continuum brick elements were used for both temperature and structural analyses. The same loading and boundary conditions as experiments were implemented to the rehabilitated beam models and non-linear geometrical analyses were performed. Test results showed that maximum loads of the rehabilitated beams were 8~10% higher than those of the non-rehabilitated beams and even 1~6 % higher than those of the non-fire damaged beam. Stiffness of the rehabilitated beams were also larger than that of non-rehabilitated beams but smaller than that of the non-fire damaged beams. In addition, predicted structural behaviors from the analyses also showed good rehabilitation effect and the predicted load-deflection curves were similar to the experimental results. From this study, both experiments and analytical results demonstrated good rehabilitation effect on the fire damaged normal strength concrete beams. For the further, the proposed analytical method can be used to predict structural behaviors of rehabilitated and fire damaged concrete beams accurately without suffering from time and cost consuming experimental process.

Keywords: fire, normal strength concrete, rehabilitation, reinforced concrete beam

Procedia PDF Downloads 508
11635 Visual Analytics of Higher Order Information for Trajectory Datasets

Authors: Ye Wang, Ickjai Lee

Abstract:

Due to the widespread of mobile sensing, there is a strong need to handle trails of moving objects, trajectories. This paper proposes three visual analytic approaches for higher order information of trajectory data sets based on the higher order Voronoi diagram data structure. Proposed approaches reveal geometrical information, topological, and directional information. Experimental results demonstrate the applicability and usefulness of proposed three approaches.

Keywords: visual analytics, higher order information, trajectory datasets, spatio-temporal data

Procedia PDF Downloads 402
11634 Modeling Route Selection Using Real-Time Information and GPS Data

Authors: William Albeiro Alvarez, Gloria Patricia Jaramillo, Ivan Reinaldo Sarmiento

Abstract:

Understanding the behavior of individuals and the different human factors that influence the choice when faced with a complex system such as transportation is one of the most complicated aspects of measuring in the components that constitute the modeling of route choice due to that various behaviors and driving mode directly or indirectly affect the choice. During the last two decades, with the development of information and communications technologies, new data collection techniques have emerged such as GPS, geolocation with mobile phones, apps for choosing the route between origin and destination, individual service transport applications among others, where an interest has been generated to improve discrete choice models when considering the incorporation of these developments as well as psychological factors that affect decision making. This paper implements a discrete choice model that proposes and estimates a hybrid model that integrates route choice models and latent variables based on the observation on the route of a sample of public taxi drivers from the city of Medellín, Colombia in relation to its behavior, personality, socioeconomic characteristics, and driving mode. The set of choice options includes the routes generated by the individual service transport applications versus the driver's choice. The hybrid model consists of measurement equations that relate latent variables with measurement indicators and utilities with choice indicators along with structural equations that link the observable characteristics of drivers with latent variables and explanatory variables with utilities.

Keywords: behavior choice model, human factors, hybrid model, real time data

Procedia PDF Downloads 152
11633 Exam Stress and Emotional Eating Among Lebanese University Students: A Correlational Study

Authors: Marielle Mansour

Abstract:

Background: Integrating university students into an academic environment can be intense, with significant intellectual and emotional challenges. Stress, particularly during exam periods, plays a crucial role in students' eating habits, often influencing their food choices through mechanisms such as emotional eating. Objective: This study aims to understand the impact of exam stress on emotional eating among university students in Lebanon, Methodology: A cross-sectional study was conducted among 700 students aged 18 to 25 years in Lebanon, using online questionnaires to assess perceived stress using the Perceived Stress Scale (PSS) and emotional eating behaviors with the Dutch Eating Behavior Questionnaire (DEBQ). Data was analyzed to identify correlations between stress and emotional eating. Results: A significant positive correlation was observed between levels of perceived stress and increased emotional eating, with marked differences depending on participants' gender and field of study. This trend highlights the concerning impact of academic stress on students' food choices, including an increased prevalence of emotional eating among women and those studying in demanding disciplines like health sciences and engineering. Conclusion: This research contributes to the understanding of the complex links between academic stress and emotional eating behaviors among university students in Lebanon. To improve the mental and physical health of students, it is essential to implement tailored educational and support initiatives aimed at reducing stress and promoting balanced dietary choices in learning environments.

Keywords: exam stress, emotional eating, university students, stress management, Lebanon

Procedia PDF Downloads 20
11632 Value Relevance of Accounting Information: Empirical Evidence from China

Authors: Ying Guo, Miaochan Li, David Yang, Xiao-Yan Li

Abstract:

This paper examines the relevance of accounting information to stock prices at different periods using manufacturing companies listed in China’s Growth Enterprise Market (GEM). We find that both the average stock price at fiscal year-end and the average stock price one month after fiscal year-end are more relevant to the accounting information than the closing stock price four months after fiscal year-end. This implies that Chinese stock markets react before the public disclosure of accounting information, which may be due to information leak before official announcements. Our findings confirm that accounting information is relevant to stock prices for Chinese listed manufacturing companies, which is a critical question to answer for investors who have interest in Chinese companies.

Keywords: accounting information, response time, value relevance, stock price

Procedia PDF Downloads 96
11631 Building a Model for Information Literacy Education in School Settings

Authors: Tibor Koltay

Abstract:

Among varied new literacies, information literacy is not only the best-known one but displays numerous models and frameworks. Nonetheless, there is still a lack of its complex theoretical model that could be applied to information literacy education in public (K12) education, which often makes use of constructivist approaches. This paper aims to present the main features of such a model. To develop a complex model, the literature and practice of phenomenographic and sociocultural theories, as well as discourse analytical approaches to information literacy, have been reviewed. Besides these constructivist and expressive based educational approaches, the new model is intended to include the innovation of coupling them with a cognitive model that takes developing informational and operational knowledge into account. The convergences between different literacies (information literacy, media literacy, media and information literacy, and data literacy) were taken into account, as well. The model will also make use of a three-country survey that examined secondary school teachers’ attitudes to information literacy. The results of this survey show that only a part of the respondents feel properly prepared to teach information literacy courses, and think that they can teach information literacy skills by themselves, while they see a librarian as an expert in educating information literacy. The use of the resulting model is not restricted to enhancing theory. It is meant to raise the level of awareness about information literacy and related literacies, and the next phase of the model’s development will be a pilot study that verifies the usefulness of the methodology for practical information literacy education in selected Hungarian secondary schools.

Keywords: communication, data literacy, discourse analysis, information literacy education, media and information literacy media literacy, phenomenography, public education, sociocultural theory

Procedia PDF Downloads 147