Search results for: internet users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3776

Search results for: internet users

3356 The Analysis of One Million Reddit Confessions Corpus: The Use of Emotive Verbs and First Person Singular Pronoun as Linguistic Psychotherapy Features

Authors: Natalia Wojarnik

Abstract:

The paper aims to present the analysis of a Reddit confessions corpus. The interpretation focuses on the use of emotional language, in particular emotive verbs, in the context of personal pronouns. The analysis of the linguistic properties answers the question of what the Reddit users confess about and who is the subject of confessions. The study reveals that the specific language patterns used in Reddit confessions reflect the language of depression and the language used by patients during different stages of their psychotherapy sessions. The paper concludes that Reddit users are more willing to confess about their own experiences, not rarely very private and intimate, extensively using the first person singular pronoun I. It indicates that the Reddit users use the language of depression and the language used by psychotherapy patients. The language they use is very emotionally impacted and includes many emotive verbs such as want, feel, need, hate, love. This finding in Reddit confessions correlates with the extensive use of stative affective verbs in the first stages of the psychotherapy sessions. Lastly, the paper refers to the positive and negative lexicon and helps determine how online posts can serve as a depression detector and “talking cure” for the users.

Keywords: confessions, emotional language, emotive verbs, pronouns, first person pronoun, language of depression, depression detection, psychotherapy language

Procedia PDF Downloads 101
3355 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 369
3354 Context Detection in Spreadsheets Based on Automatically Inferred Table Schema

Authors: Alexander Wachtel, Michael T. Franzen, Walter F. Tichy

Abstract:

Programming requires years of training. With natural language and end user development methods, programming could become available to everyone. It enables end users to program their own devices and extend the functionality of the existing system without any knowledge of programming languages. In this paper, we describe an Interactive Spreadsheet Processing Module (ISPM), a natural language interface to spreadsheets that allows users to address ranges within the spreadsheet based on inferred table schema. Using the ISPM, end users are able to search for values in the schema of the table and to address the data in spreadsheets implicitly. Furthermore, it enables them to select and sort the spreadsheet data by using natural language. ISPM uses a machine learning technique to automatically infer areas within a spreadsheet, including different kinds of headers and data ranges. Since ranges can be identified from natural language queries, the end users can query the data using natural language. During the evaluation 12 undergraduate students were asked to perform operations (sum, sort, group and select) using the system and also Excel without ISPM interface, and the time taken for task completion was compared across the two systems. Only for the selection task did users take less time in Excel (since they directly selected the cells using the mouse) than in ISPM, by using natural language for end user software engineering, to overcome the present bottleneck of professional developers.

Keywords: natural language processing, natural language interfaces, human computer interaction, end user development, dialog systems, data recognition, spreadsheet

Procedia PDF Downloads 288
3353 The Impact of the Fitness Center Ownership Structure on the Service Quality Perception in the Fitness in Serbia

Authors: Dragan Zivotic, Mirjana Ilic, Aleksandra Perovic, Predrag Gavrilovic

Abstract:

As with the provision of other services, the service quality perception is one of the key factors that the modern manager must pay attention to. Countries in which the state regulation is in transition also have specific features in providing fitness services. Identification of the dimensions in which the most significant different service quality perception between different types of fitness centers, enables managers to profile the offer according to the wishes and expectations of users. The aim of the paper was the comparison of the quality of services perception in the field of fitness in Serbia between three categories of fitness centers: the privately owned centers, the publicly owned centers, and the Public-private partnership centers. For this research 350 respondents of both genders (174 men and 176 women) were interviewed, aged between 18 and 68 years, being beneficiaries of fitness services for at least 1 year. Administered questionnaire with 100 items provided information about the 15 basic areas in which they expressed the service quality perception in the gym. The core sample was composed of 212 service users in private fitness centers, 69 service users in public fitness centers and 69 service users in the public-private partnership. Sub-samples were equal in representation of women and men, as well as by age and length of use of fitness services. The obtained results were subject of univariate analysis with the Kruskal-Wallis non-parametric analysis of variance. Significant differences between the analyzed sub-samples were not found solely in the areas of rapid response and quality outcomes. In the multivariate model, the results were processed by backward stepwise discriminant analysis that extracted 3 areas that maximize the differences between sub-samples: material and technical basis, secondary facilities and coaches. By applying the classification function 93.87% of private centers services users, 62.32% of public centers services users and 85.51% of the public-private partnership centers users of services were correctly classified (total 86.00%). These results allow optimizing the allocation of the necessary resources in profiling offers of a fitness center in order to optimally adjust it to the user’s needs and expectations.

Keywords: fitness, quality perception, management, public ownership, private ownership, public-private partnership, discriminative analysis

Procedia PDF Downloads 272
3352 Prevalence and Pattern of Drug Usage among Youth in Ogbomoso, Nigeria

Authors: Samson F. Agberotimi, Rachel B. Asagba, Choja Oduaran

Abstract:

Disturbing rate of use of different substances such as cannabis, alcohol, as well as pharmaceutical drugs among Nigerian youth in recent times has been affirmed in the literature. There is, however, a paucity of literature addressing the pattern of usage of such drugs, especially for clinical relevance and intervention planning. The present study investigated the prevalence and pattern of drug usage among youth in Ogbomoso, Nigeria. A cross-sectional survey involving 92 purposively selected participants comprising of 82 males and 10 females aged between 15 and 24 years was conducted. A measure of drug involvement and demographic characteristics was administered to the participants. Descriptive analysis was done using the SPSS v.21. Cannabis (79.4%), alcohol (77.2%), codeine (70.7%), tobacco (65.2%) and tramadol (47.8%) are the five most frequently used substances. However, the majority of the users of tobacco (68.3%) and alcohol (62.0%) are casual users indicating a mild level of use of the substances among the participants. On the other hand, 49.2% of the codeine users, 27.3% of the tramadol users, and 21.9% of the cannabis users reported harmful/intensive levels of use. Furthermore, the results revealed individuals at the pathological level of use as 28.8% for cannabis, 25.0% for tramadol, and 21.6% for codeine, and thus require clinical/therapeutic intervention. In conclusion, cannabis remains the most frequently used substance among youths. However, there appears to be a shift from the use of conventional psychoactive substances to pharmaceutical/prescription drugs such as codeine and tramadol. The findings of this study raised the need for both preventive and therapeutic interventions addressing the problem of substance use disorder among youth in contemporary society.

Keywords: Ogbomoso, pattern of drug use, prevalence of drug use, youth

Procedia PDF Downloads 149
3351 Load Balancing Algorithms for SIP Server Clusters in Cloud Computing

Authors: Tanmay Raj, Vedika Gupta

Abstract:

For its groundbreaking and substantial power, cloud computing is today’s most popular breakthrough. It is a sort of Internet-based computing that allows users to request and receive numerous services in a cost-effective manner. Virtualization, grid computing, and utility computing are the most widely employed emerging technologies in cloud computing, making it the most powerful. However, cloud computing still has a number of key challenges, such as security, load balancing, and non-critical failure adaption, to name a few. The massive growth of cloud computing will put an undue strain on servers. As a result, network performance will deteriorate. A good load balancing adjustment can make cloud computing more productive and in- crease client fulfillment execution. Load balancing is an important part of cloud computing because it prevents certain nodes from being overwhelmed while others are idle or have little work to perform. Response time, cost, throughput, performance, and resource usage are all parameters that may be improved using load balancing.

Keywords: cloud computing, load balancing, computing, SIP server clusters

Procedia PDF Downloads 103
3350 An Application of a Machine Monitoring by Using the Internet of Things to Improve a Preventive Maintenance: Case Study of an Automated Plastic Granule-Packing Machine

Authors: Anek Apipatkul, Paphakorn Pitayachaval

Abstract:

Preventive maintenance is a standardized procedure to control and prevent risky problems affecting production in order to increase work efficiency. Machine monitoring also routinely works to collect data for a scheduling maintenance period. This paper is to present the application of machine monitoring by using the internet of things (IOTs) and a lean technique in order to manage with complex maintenance tasks of an automated plastic granule packing machine. To organize the preventive maintenance, there are several processes that the machine monitoring was applied, starting with defining a clear scope of the machine, establishing standards in maintenance work, applying a just-in-time (JIT) technique for timely delivery in the maintenance work, solving problems on the floor, and also improving the inspection process. The result has shown that wasted time was reduced, and machines have been operated as scheduled. Furthermore, the efficiency of the scheduled maintenance period was increased by 95%.

Keywords: internet of things, preventive maintenance, machine monitoring, lean technique

Procedia PDF Downloads 80
3349 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 76
3348 E-Book Market In Vietnam: Great Potential, Many Barriers

Authors: Zakir Hossain

Abstract:

Nowadays reading e-books on laptops, smartphones, and tablets have become a new leisure activity for Vietnamese youth. Since 2011 the copyrighted e-book market began to develop in Vietnam with the participation of five local enterprises. Over the last five years, thousands of e-books were published including the first online early education book series for children from 0 to 6 years old. Research shows that 61% Vietnamese find reading e-books is comfortable, and 45% feel convenient buying books online. More than half of the Vietnamese consider reading online far better than buying printed books, and surprisingly people over age 30 desire reading online while those under 18 prefer reading printed books. Hence with a market of more than 40 million regular internet users including 22 million smartphone users, Vietnam has ample opportunities to develop the e-book market and contribute a great deal to the diversity of the local reading culture which is essential for Building a Lifelong Learning Society, a state ambition of Vietnam by 2020. However, the e-book market in Vietnam is still in its infancy and is growing far too slowly than e-book producers had expected. All five e-book enterprises are facing numerous challenges. While the big profit that e-book technology can bring has been clearly recognised in other countries, e-books in Vietnam only make up less than 1% share of the book market. The objective of the study is to identify the difficulties and barriers to the development of the e-book market in Vietnam through an extensive literature review available in English. The study revealed that illegal e-books due to copyright infringement and an inconvenient payment system to purchase e-books are the major obstacles. The great potential of e-books in Vietnam is a reality but requires government enforcement of copyright protection laws, a new area of focus for the e-book market. Furthermore, Vietnamese readers should change their habits from using free and illegal e-books to develop the e-publishing industry in Vietnam.

Keywords: copyright, e-book, e-book reading, e-publishing, Vietnam

Procedia PDF Downloads 207
3347 Analysis and Forecasting of Bitcoin Price Using Exogenous Data

Authors: J-C. Leneveu, A. Chereau, L. Mansart, T. Mesbah, M. Wyka

Abstract:

Extracting and interpreting information from Big Data represent a stake for years to come in several sectors such as finance. Currently, numerous methods are used (such as Technical Analysis) to try to understand and to anticipate market behavior, with mixed results because it still seems impossible to exactly predict a financial trend. The increase of available data on Internet and their diversity represent a great opportunity for the financial world. Indeed, it is possible, along with these standard financial data, to focus on exogenous data to take into account more macroeconomic factors. Coupling the interpretation of these data with standard methods could allow obtaining more precise trend predictions. In this paper, in order to observe the influence of exogenous data price independent of other usual effects occurring in classical markets, behaviors of Bitcoin users are introduced in a model reconstituting Bitcoin value, which is elaborated and tested for prediction purposes.

Keywords: big data, bitcoin, data mining, social network, financial trends, exogenous data, global economy, behavioral finance

Procedia PDF Downloads 341
3346 End-Users Tools to Empower and Raise Awareness of Behavioural Change towards Energy Efficiency

Authors: G. Calleja-Rodriguez, N. Jimenez-Redondo, J. J. Peralta Escalante

Abstract:

This research work aims at developing a solution to take advantage of the potential energy saving related to occupants behaviour estimated in between 5-30 % according to existing studies. For that purpose, the following methodology has been followed: 1) literature review and gap analysis, 2) define concept and functional requirements, 3) evaluation and feedback by experts. As result, the concept for a tool-box that implements continuous behavior change interventions named as engagement methods and based on increasing energy literacy, increasing energy visibility, using bonus system, etc. has been defined. These engagement methods are deployed through a set of ICT tools: Building Automation and Control System (BACS) add-ons services installed in buildings and Users Apps installed in smartphones, smart-TVs or dashboards. The tool-box called eTEACHER identifies energy conservation measures (ECM) based on energy behavioral change through a what-if analysis that collects information about the building and its users (comfort feedback, behavior, etc.) and carry out cost-effective calculations to provide outputs such us efficient control settings of building systems. This information is processed and showed in an attractive way as tailored advice to the energy end-users. Therefore, eTEACHER goal is to change the behavior of building´s energy users towards energy efficiency, comfort and better health conditions by deploying customized ICT-based interventions taking into account building typology (schools, residential, offices, health care centres, etc.), users profile (occupants, owners, facility managers, employers, etc.) as well as cultural and demographic factors. One of the main findings of this work is the common failure when technological interventions on behavioural change are done to not consult, train and support users regarding technological changes leading to poor performance in practices. As conclusion, a strong need to carry out social studies to identify relevant behavioural issues and to identify effective pro-evironmental behavioral change strategies has been identified.

Keywords: energy saving, behavioral bhange, building users, engagement methods, energy conservation measures

Procedia PDF Downloads 152
3345 Motivational Factors for the Practice of Exercise in a Sample of Portuguese Fitness Center Users

Authors: N. Sena, C. Vasconcelos

Abstract:

Portugal has a lower rate of people who exercise. Fitness centers are a widely recognized context for the performance of an exercise. Thus, the objective of this study is to analyze the motivational factors for the practice of exercise in a sample of Portuguese fitness center users. The sample consists of 34 users (23 men and 11 women), aged between 16 and 60 years old (24.7 ± 11,5 years old). The instrument used for data collection was the Motivation Questionnaire for Exercise (version translated and validated into Portuguese), consisting of forty-nine items grouped into ten motivational factors. Responses to the Exercise Motivation Questionnaire are given on a 6-point Likert scale (0="not at all true for me" to 5="completely true for me"). With regard to the results, it is possible to verify that the motivational factors considered most relevant by the sample of our study were “Well-being” (4.44 ± 0.28), followed by “Health” (4.29 ± 0.57) and “Stress Management” (4.06 ± 0.54). The factors “Affiliation” (3.11 ± 0.49) “Personal Appreciation” (2.26 ± 0.59) and “Medical History” (1.71 ± 0.74) were considered by the respondents to be the least important factors for performing the exercise. The conclusion of this study is that in the sample of this study, the factors that most motivated the practice of exercise were “Well-being”, “Health” and “Stress Management”. In the opposite direction, the factors that least motivated the individuals in this sample to practice exercise were “Affiliation”, “Personal Appreciation” and “Medical History”.

Keywords: exercise, fitness center users, motivational factors, Portugal

Procedia PDF Downloads 71
3344 Quality Assurance for the Climate Data Store

Authors: Judith Klostermann, Miguel Segura, Wilma Jans, Dragana Bojovic, Isadora Christel Jimenez, Francisco Doblas-Reyees, Judit Snethlage

Abstract:

The Climate Data Store (CDS), developed by the Copernicus Climate Change Service (C3S) implemented by the European Centre for Medium-Range Weather Forecasts (ECMWF) on behalf of the European Union, is intended to become a key instrument for exploring climate data. The CDS contains both raw and processed data to provide information to the users about the past, present and future climate of the earth. It allows for easy and free access to climate data and indicators, presenting an important asset for scientists and stakeholders on the path for achieving a more sustainable future. The C3S Evaluation and Quality Control (EQC) is assessing the quality of the CDS by undertaking a comprehensive user requirement assessment to measure the users’ satisfaction. Recommendations will be developed for the improvement and expansion of the CDS datasets and products. User requirements will be identified on the fitness of the datasets, the toolbox, and the overall CDS service. The EQC function of the CDS will help C3S to make the service more robust: integrated by validated data that follows high-quality standards while being user-friendly. This function will be closely developed with the users of the service. Through their feedback, suggestions, and contributions, the CDS can become more accessible and meet the requirements for a diverse range of users. Stakeholders and their active engagement are thus an important aspect of CDS development. This will be achieved with direct interactions with users such as meetings, interviews or workshops as well as different feedback mechanisms like surveys or helpdesk services at the CDS. The results provided by the users will be categorized as a function of CDS products so that their specific interests will be monitored and linked to the right product. Through this procedure, we will identify the requirements and criteria for data and products in order to build the correspondent recommendations for the improvement and expansion of the CDS datasets and products.

Keywords: climate data store, Copernicus, quality, user engagement

Procedia PDF Downloads 131
3343 Patterns of Positive Feedback Formation in the System of Online Action

Authors: D. Gvozdikov

Abstract:

The purpose of this study is an attempt to describe an online action as a system that combines disjointed events and behavioral chains into a whole. The research focuses on patterns of naturally-formed chains of actions united by an orientation towards the online environment. A key characteristic of the system of online action is that it acts as an attractor for separate actions and chains of behavioral repertoire accumulating time and efforts made by users. The article demonstrates how the chains of online-offline actions are combined into a single pattern due to a simple identifiable mechanism, a positive feedback system. Using methods of digital ethnography and analyzing the content of the Instagram application and media blogs, the research reveals how through the positive feedback mechanism the entire system of online action acquires stability and can expand involving new spheres of human activity.

Keywords: digital anthropology, internet studies, systems theory, social media

Procedia PDF Downloads 118
3342 User Selections on Social Network Applications

Authors: C. C. Liang

Abstract:

MSN used to be the most popular application for communicating among social networks, but Facebook chat is now the most popular. Facebook and MSN have similar characteristics, including usefulness, ease-of-use, and a similar function, which is the exchanging of information with friends. Facebook outperforms MSN in both of these areas. However, the adoption of Facebook and abandonment of MSN have occurred for other reasons. Functions can be improved, but users’ willingness to use does not just depend on functionality. Flow status has been established to be crucial to users’ adoption of cyber applications and to affects users’ adoption of software applications. If users experience flow in using software application, they will enjoy using it frequently, and even change their preferred application from an old to this new one. However, no investigation has examined choice behavior related to switching from Facebook to MSN based on a consideration of flow experiences and functions. This investigation discusses the flow experiences and functions of social-networking applications. Flow experience is found to affect perceived ease of use and perceived usefulness; perceived ease of use influences information ex-change with friends, and perceived usefulness; information exchange influences perceived usefulness, but information exchange has no effect on flow experience.

Keywords: consumer behavior, social media, technology acceptance model, flow experience

Procedia PDF Downloads 335
3341 The Effects of Parent Psycho-Education Program on Problem-Solving Skills of Parents

Authors: Tuba Bagatarhan, Digdem Muge Siyez

Abstract:

The aim of this research is to examine the effects of the psycho-education program on problem-solving skills of parents of high school students in the risk group for Internet addiction. A quasi-experimental design based on the pre-test, post-test and follow up test including experimental and control groups was used in the research. The independent variable of the study was the parent psycho-education program on problem-solving skills; the dependent variable was the problem-solving skills of parents. The research was conducted with the parents of 52 tenth-grade students in the risk group for Internet addiction from two high schools and volunteer to participate research on evaluation of the effectiveness of internet addiction prevention psycho-education program within the scope of another study. In this study, as 26 students were in the experimental groups in the first-high school, the parents of these 26 students were asked if they would like to participate in the parent psycho-education program on parental problem-solving skills. The parents were volunteer to participate in parent psycho-education program assigned experimental group (n=13), the other parents assigned control group 1 (n=13) in the first high school. The parents of the 26 students were randomly assigned to the control group 2 (n=13) and control group 3 (n=13) in the second high school. The data of the research was obtained via the problem behavior scale - coping - parents form and demographic questionnaire. Four-session parent psycho-education program to cope with Internet addiction and other problem behaviors in their children was applied to the experimental group. No program was applied to the control group 1, control group 2 and control group 3. In addition, an internet addiction prevention psycho-education program was applied to the children of the parents in experimental group and control group 1 within the scope of another study. In the analysis of the obtained data, two-factor variance analysis for repeated measures on one factor was used. Bonferroni post-hoc test was used to find the source of intergroup difference. According to the findings, the psycho-education program significantly increases parents’ problem-solving abilities, and the increase has continued throughout the follow-up test.

Keywords: internet addiction, parents, prevention, psyho-education

Procedia PDF Downloads 165
3340 Keynote Talk: The Role of Internet of Things in the Smart Cities Power System

Authors: Abdul-Rahman Al-Ali

Abstract:

As the number of mobile devices is growing exponentially, it is estimated to connect about 50 million devices to the Internet by the year 2020. At the end of this decade, it is expected that an average of eight connected devices per person worldwide. The 50 billion devices are not mobile phones and data browsing gadgets only, but machine-to-machine and man-to-machine devices. With such growing numbers of devices the Internet of Things (I.o.T) concept is one of the emerging technologies as of recently. Within the smart grid technologies, smart home appliances, Intelligent Electronic Devices (IED) and Distributed Energy Resources (DER) are major I.o.T objects that can be addressable using the IPV6. These objects are called the smart grid internet of things (SG-I.o.T). The SG-I.o.T generates big data that requires high-speed computing infrastructure, widespread computer networks, big data storage, software, and platforms services. A company’s utility control and data centers cannot handle such a large number of devices, high-speed processing, and massive data storage. Building large data center’s infrastructure takes a long time, it also requires widespread communication networks and huge capital investment. To maintain and upgrade control and data centers’ infrastructure and communication networks as well as updating and renewing software licenses which collectively, requires additional cost. This can be overcome by utilizing the emerging computing paradigms such as cloud computing. This can be used as a smart grid enabler to replace the legacy of utilities data centers. The talk will highlight the role of I.o.T, cloud computing services and their development models within the smart grid technologies.

Keywords: intelligent electronic devices (IED), distributed energy resources (DER), internet, smart home appliances

Procedia PDF Downloads 305
3339 Improving Search Engine Performance by Removing Indexes to Malicious URLs

Authors: Durga Toshniwal, Lokesh Agrawal

Abstract:

As the web continues to play an increasing role in information exchange, and conducting daily activities, computer users have become the target of miscreants which infects hosts with malware or adware for financial gains. Unfortunately, even a single visit to compromised web site enables the attacker to detect vulnerabilities in the user’s applications and force the downloading of multitude of malware binaries. We provide an approach to effectively scan the so-called drive-by downloads on the Internet. Drive-by downloads are result of URLs that attempt to exploit their visitors and cause malware to be installed and run automatically. To scan the web for malicious pages, the first step is to use a crawler to collect URLs that live on the Internet, and then to apply fast prefiltering techniques to reduce the amount of pages that are needed to be examined by precise, but slower, analysis tools (such as honey clients or antivirus programs). Although the technique is effective, it requires a substantial amount of resources. A main reason is that the crawler encounters many pages on the web that are legitimate and needs to be filtered. In this paper, to characterize the nature of this rising threat, we present implementation of a web crawler on Python, an approach to search the web more efficiently for pages that are likely to be malicious, filtering benign pages and passing remaining pages to antivirus program for detection of malwares. Our approaches starts from an initial seed of known, malicious web pages. Using these seeds, our system generates search engines queries to identify other malicious pages that are similar to the ones in the initial seed. By doing so, it leverages the crawling infrastructure of search engines to retrieve URLs that are much more likely to be malicious than a random page on the web. The results shows that this guided approach is able to identify malicious web pages more efficiently when compared to random crawling-based approaches.

Keywords: web crawler, malwares, seeds, drive-by-downloads, security

Procedia PDF Downloads 217
3338 Earnings Management and Tone Management: Evidence from the UK

Authors: Salah Kayed Kayed, Jessica Hong Yang

Abstract:

This study investigates, whether earnings management in the audited financial statements is associated with tone management in the narrative sections of the annual report in the UK. Earnings management and narrative disclosure are communication strategies used from managers to communicate with investors or other users. Because earnings management and narrative disclosure stem from managers, they can exploit this by doing manipulation in their earnings, and simultaneously disclosing qualitative text (narrative information) in their reports as a tone of words, which will affect users’ perception, and hence users will be misinformed. The association between earnings and tone management can be explained by the self-serving, through cognitive reference points, theory. The sample period lasts from 2010 to 2015, and the sample comprises all non-financial firms that consider under FTSE 350 in any year during the sample period. A list of words from previous research is used to measure the tone in the narrative sections of the annual report. Because this study focuses on the managerial strategic choice and the subjective issues that come from management, it uses the abnormal tone to capture the managerial discretion on tone, and a number of different discretionary accruals proxies to measure earnings management, where accruals management is considered as a manipulation tool from managers to change the users' perception. This research is motivated to fulfil the literature gap by examining the association between earnings and tone management. Moreover, if firms that apply earnings management use tone management to mislead investors, it is beneficial for investors, policy makers, standard setters, or other users to know whether there is an association between earnings management and tone management. Clearly, we believe that this study is fundamental in the accounting context, where it evaluates the communication strategies that are used in firms' financial reports. Consistent with prior research, it is expected that tone management is positively associated with earnings management. This means that firms that use earnings management have incentives to manipulate in their narrative disclosure through tone of words, to reflect a good perception for users, which will conceal the earnings management techniques used in their reporting.

Keywords: earnings management, FTSE 350, narrative disclosure, tone management

Procedia PDF Downloads 240
3337 DOS and DDOS Attacks

Authors: Amin Hamrahi, Niloofar Moghaddam

Abstract:

Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet.

Keywords: denial of service, distributed denial of service, traffic, flooding

Procedia PDF Downloads 374
3336 An Analysis Study of a Participatory Design Workshop from the Perspectives of Communication Strategies and Tools

Authors: Meng-Yu Wun, Jiunde Lee

Abstract:

Participatory design transfers the role of design team becoming the facilitator who manages to work collaboratively with the 'partners of innovation': users. This facilitator role not just concerns the users’ behaviors or insights under the common practice of user-centered design, it emphasizes the importance of communication experience conducted by various strategies and tools in a workshop session which could profoundly impact the quality of the co-creation process. To investigate the communication experience in the participatory design, this study proposed a qualitative research to analyze communication strategies and tools. A participatory design workshop and following in-depth interviews were carried out to explore how participants (facilitators, users) might apply different strategies and tools to enhance the communication process. The major study findings are as follows: (a) roles had influence on communication experience; facilitators’ principles and methods influenced the usage of facilitation strategies in various situations, while users put more emphasis on communication activities and goals aimed to complete the design tasks, (b) communication tools should be both fixed and changeable: participants had fixed cognition on different forms of communication tools; with the fundamental cognition, they could choose and make use of tools according to their needs, (c) the management of workshop communication should be flexible: controlling the schedule, stimulating innovations, and creating the space for conversation are crucial to facilitate in a participatory workshop.

Keywords: communication experience, facilitation, participatory design, workshop

Procedia PDF Downloads 142
3335 An Analysis of Twitter Use of Slow Food Movement in the Context of Online Activism

Authors: Kubra Sultan Yuzuncuyil, Aytekin İsman, Berkay Bulus

Abstract:

With the developments of information and communication technologies, the forms of molding public opinion have changed. In the presence of Internet, the notion of activism has been endowed with digital codes. Activists have engaged the use of Internet into their campaigns and the process of creating collective identity. Activist movements have been incorporating the relevance of new communication technologies for their goals and opposition. Creating and managing activism through Internet is called Online Activism. In this main, Slow Food Movement which was emerged within the philosophy of defending regional, fair and sustainable food has been engaging Internet into their activist campaign. This movement supports the idea that a new food system which allows strong connections between plate and planet is possible. In order to make their voices heard, it has utilized social networks and develop particular skills in the framework online activism. This study analyzes online activist skills of Slow Food Movement (SFM) develop and attempts to measure its effectiveness. To achieve this aim, it adopts the model proposed by Sivitandies and Shah and conduct both qualitiative and quantiative content analysis on social network use of Slow Food Movement. In this regard, the sample is chosen as the official profile and analyzed between in a three month period respectively March-May 2017. It was found that SFM develops particular techniques that appeal to the model of Sivitandies and Shah. The prominent skill in this regard was found as hyperlink abbreviation and use of multimedia elements. On the other hand, there are inadequacies in hashtag and interactivity use. The importance of this study is that it highlights and discusses how online activism can be engaged into a social movement. It also reveals current online activism skills of SFM and their effectiveness. Furthermore, it makes suggestions to enhance the related abilities and strengthen its voice on social networks.

Keywords: slow food movement, Twitter, internet, online activism

Procedia PDF Downloads 260
3334 A Reading Light That Can Adjust Indoor Light Intensity According to the Activity and Person for Improve Indoor Visual Comfort of Occupants and Tested using Post-occupancy Evaluation Techniques for Sri Lankan Population

Authors: R.T.P. De Silva, T. K. Wijayasiriwardhane, B. Jayawardena

Abstract:

Most people nowadays spend their time indoor environment. Because of that, a quality indoor environment needs for them. This study was conducted to identify how to improve indoor visual comfort using a personalized light system. Light intensity, light color, glare, and contrast are the main facts that affect visual comfort. The light intensity which needs to perform a task is changed according to the task. Using necessary light intensity and we can improve the visual comfort of occupants. The hue can affect the emotions of occupants. The preferred light colors and intensity change according to the occupant's age and gender. The research was conducted to identify is there any relationship between personalization and visual comfort. To validate this designed an Internet of Things-based reading light. This light can work according to the standard light levels and personalized light levels. It also can measure the current light intensity of the environment and maintain continuous light levels according to the task. The test was conducted by using 25 undergraduates, and 5school students, and 5 adults. The feedbacks are gathered using Post-occupancy evaluation (POE) techniques. Feedbacks are gathered in three steps, It was done without any light control, with standard light level, and with personalized light level Users had to spend 10 minutes under each condition. After finishing each step, collected their feedbacks. According to the result gathered, 94% of participants rated a personalized light system as comfort for them. The feedbacks show stay under continuous light level help to keep their concentrate. Future research can be conducted on how the color of indoor light can affect for indoor visual comfort of occupants using a personalized light system. Further proposed IoT based can improve to change the light colors according to the user's preference.

Keywords: indoor environment quality, internet of things based light system, post occupancy evaluation, visual comfort

Procedia PDF Downloads 143
3333 Tinder, Image Merchandise and Desire: The Configuration of Social Ties in Today's Neoliberalism

Authors: Daniel Alvarado Valencia

Abstract:

Nowadays, the market offers us solutions for everything, creating the idea of an immediate availability of anything we could desire, and the Internet is the mean through which to obtain all this. The proposal of this conference is that this logic puts the subjects in a situation of self-exploitation, and considers the psyche as a productive force by configuring affection and desire from a neoliberal value perspective. It uses Tinder, starting from ethnographical data from Mexico City users, as an example for this. Tinder is an application created to get dates, have sexual encounters and find a partner. It works from the creation and management of a digital profile. It is an example of how futuristic and lonely the current era can be since we got used to interact with other people through screens and images. However, at the same time, it provides solutions to loneliness, since technology transgresses, invades and alters social practices in different ways. Tinder fits into this contemporary context, it is a concrete example of the processes of technification in which social bonds develop through certain devices offered by neoliberalism, through consumption, and where the search of love and courtship are possible through images and their consumption.

Keywords: desire, image, merchandise, neoliberalism

Procedia PDF Downloads 104
3332 A Hybrid Approach for Thread Recommendation in MOOC Forums

Authors: Ahmad. A. Kardan, Amir Narimani, Foozhan Ataiefard

Abstract:

Recommender Systems have been developed to provide contents and services compatible to users based on their behaviors and interests. Due to information overload in online discussion forums and users diverse interests, recommending relative topics and threads is considered to be helpful for improving the ease of forum usage. In order to lead learners to find relevant information in educational forums, recommendations are even more needed. We present a hybrid thread recommender system for MOOC forums by applying social network analysis and association rule mining techniques. Initial results indicate that the proposed recommender system performs comparatively well with regard to limited available data from users' previous posts in the forum.

Keywords: association rule mining, hybrid recommender system, massive open online courses, MOOCs, social network analysis

Procedia PDF Downloads 275
3331 Healthcare Workers' Attitudes Towards People Living With Hiv And Drug Users

Authors: Delband Yekta Moazami

Abstract:

Background: For proper care and treatment of HIV patients and drug users, the medical staff and physicians must have a correct and positive attitude and knowledge towards such patients. We aimed to assess the attitudes in a sample of health care workers (HCW) working in different hospitals and clinics and medical students in Georgia towards HIV infected people and drug users in Tbilisi. Method: We conducted a cross-sectional study to assess attitudes of health care workers towards people living with HIV and drug users in hospitals and clinics in Tbilisi. The study was carried out from 1st of May 2020 till 30th of September 2020. Data were collected using a self-administered structured online questionnaire. With this tool we evaluated four facets of attitudes: Discrimination, Acceptance of HIV/AIDS patients, Acceptance of drug users and Fear. All data were imported and analyzed with the software SPSS 22 for windows. Results: In total data was collected from168 respondents, that among them 107 (65%) were women and majority of the participants were medical doctors. Women had more acceptance attitudes rather than men towards drug abusers. We found significant differences regarding expressing negative attitudes among HCW who were more than 50 years old comparing with other age groups in all four aspects. Medical doctors expressed more acceptances towards people with HIV and drug users comparing two other groups. Also our study revealed that the group with working experience 21 years and more, showed more discriminatory attitudes comparing other groups. Conclusion: Based on our study findings, there are significant differences regarding respondent’s attitudes based on gender, medical specialty and working experience in health care system. People struggling with HIV and drug use need nonjudgmental and positive behaviors from health care workers and physicians in order to help them for harm reduction and receiving appropriate treatment.

Keywords: hiv, addiction, attitudes, healthcare workers

Procedia PDF Downloads 61
3330 Comparison of Power Consumption of WiFi Inbuilt Internet of Things Device with Bluetooth Low Energy

Authors: Darshana Thomas, Edward Wilkie, James Irvine

Abstract:

The Internet of things (IoT) is currently a highly researched topic, especially within the context of the smart home. These are small sensors that are capable of gathering data and transmitting it to a server. The majority of smart home products use protocols such as ZigBee or Bluetooth Low Energy (BLE). As these small sensors are increasing in number, the need to implement these with much more capable and ubiquitous transmission technology is necessary. The high power consumption is the reason that holds these small sensors back from using other protocols such as the most ubiquitous form of communication, WiFi. Comparing the power consumption of existing transmission technologies to one with WiFi inbuilt, would provide a better understanding for choosing between these technologies. We have developed a small IoT device with WiFi capability and proven that it is much more efficient than the first protocol, 433 MHz. We extend our work in this paper and compare WiFi power consumption with the other most widely used protocol BLE. The experimental results in this paper would conclude whether the developed prototype is capable in terms of power consumption to replace the existing protocol BLE with WiFi.

Keywords: bluetooth, internet of things (IoT), power consumption, WiFi

Procedia PDF Downloads 254
3329 Evaluating Global ‘Thing’ Security of Consumer Products

Authors: Achutha Raman

Abstract:

Today's brave new world features a bonanza of digitally interconnected products, or ‘things,’ that improve convenience, possibilities, and in some cases efficiency for consumers. Nonetheless, even as the market accelerates, this Internet of ‘things’ is subject to substantial leakage of consumer personal data. First defining the fluid concept of ‘things,’ this paper subsequently uses case studies taken from the EU, Asia, and the US, to highlight large gaps and comprehensively evaluate the state of security for consumer ‘things.’ Ultimately, this paper offers several ways of improving the present status quo, and especially focuses on an evaluative approach that augments the standard mechanism of Firmware Over the Air Updates, and ought to be easily implementable.

Keywords: cybersecurity, FOTA, Internet of Things, transnational privacy

Procedia PDF Downloads 200
3328 Integrating ICT in Teaching and Learning English in the Algerian Classroom

Authors: A. Tahar Djebbar

Abstract:

Modern technologies have penetrated all spheres of human life, education being one of them. This paper focuses the attention on the integration of technology-based education in the Algerian classroom in teaching foreign languages. It sheds light on a specific area of ICT application: ICT in English learning and teaching. Some Algerian teachers or tutors of English face many challenges among which the lack of teaching materials which are indispensable for transmitting knowledge to learners. Thus, they find themselves compelled to use online e-books or download them in PDF form to support their lessons. Teachers even download such teaching materials like pictures, videos, audios, podcasts, and flash cards from the internet and store them in their Flash USBs to shape up the teaching-learning conditions. They use computers, data shows, and the internet so as to facilitate the teaching–learning process in the classroom. Hence, technology has become a must in the Algerian classroom especially in teaching English which has become a very important language in a national and an international level. This study aims at showing that Algerian tutors/teachers who take up the challenge of getting involved in the technology-enhanced language learning and teaching in the Algerian schools and universities face many obstacles.

Keywords: computer, communication, English, internet, learners, language acquisition, teaching, technology

Procedia PDF Downloads 614
3327 Evaluation of Computer Usage and Related Health Hazards

Authors: B. O. Adegoke, B. O. Ola, D. T. Ademiluyi

Abstract:

This paper examines the use of computer and its related health hazard among computer users in South-Western zone of Nigeria. Two hundred and eighteen (218) computer users constituted the population used to evaluate association between posture, extensive computer use and related health hazard. The instruments for the study are a questionnaire on demographics, lifestyle, body features and work ability index while mean rating, standard deviation and t test were used for data analysis. Identified health related hazard include damages to the eyesight, bad posture, arthritis, musculoskeletal disorders, headache, stress and so on. The results showed that factors such as work demand, posture, closeness to computer screen and excessive working hours on computers constitute health hazards in both old and young computer users of various gender. It is therefore recommended that total number of hours spent with computer should be monitored and controlled.

Keywords: computer-related health hazard, musculoskeletal disorders, computer usage, work ability index

Procedia PDF Downloads 470