Search results for: multimedia information representation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11587

Search results for: multimedia information representation

11167 Deep Learning Approach to Trademark Design Code Identification

Authors: Girish J. Showkatramani, Arthi M. Krishna, Sashi Nareddi, Naresh Nula, Aaron Pepe, Glen Brown, Greg Gabel, Chris Doninger

Abstract:

Trademark examination and approval is a complex process that involves analysis and review of the design components of the marks such as the visual representation as well as the textual data associated with marks such as marks' description. Currently, the process of identifying marks with similar visual representation is done manually in United States Patent and Trademark Office (USPTO) and takes a considerable amount of time. Moreover, the accuracy of these searches depends heavily on the experts determining the trademark design codes used to catalog the visual design codes in the mark. In this study, we explore several methods to automate trademark design code classification. Based on recent successes of convolutional neural networks in image classification, we have used several different convolutional neural networks such as Google’s Inception v3, Inception-ResNet-v2, and Xception net. The study also looks into other techniques to augment the results from CNNs such as using Open Source Computer Vision Library (OpenCV) to pre-process the images. This paper reports the results of the various models trained on year of annotated trademark images.

Keywords: trademark design code, convolutional neural networks, trademark image classification, trademark image search, Inception-ResNet-v2

Procedia PDF Downloads 213
11166 Intellectual Property in Digital Environment

Authors: Balamurugan L.

Abstract:

Artificial intelligence (AI) and its applications in Intellectual Property Rights (IPR) has been significantly growing in recent years. In last couple of years, AI tools for Patent Research and Patent Analytics have been well-stabilized in terms of accuracy of references and representation of identified patent insights. However, AI tools for Patent Prosecution and Patent Litigation are still in the nascent stage and there may be a significant potential if such market is explored further. Our research is primarily focused on identifying potential whitespaces and schematic algorithms to automate the Patent Prosecution and Patent Litigation Process of the Intellectual Property. The schematic algorithms may assist leading AI tool developers, to explore such opportunities in the field of Intellectual Property. Our research is also focused on identification of pitfalls of the AI. For example, Information Security and its impact in IPR, and Potential remediations to sustain the IPR in the digital environment.

Keywords: artificial intelligence, patent analytics, patent drafting, patent litigation, patent prosecution, patent research

Procedia PDF Downloads 53
11165 The Role of Online Videos in Undergraduate Casual-Leisure Information Behaviors

Authors: Nei-Ching Yeh

Abstract:

This study describes undergraduate casual-leisure information behaviors relevant to online videos. Diaries and in-depth interviews were used to collect data. Twenty-four undergraduates participated in this study (9 men, 15 women; all were aged 18–22 years). This study presents a model of casual-leisure information behaviors and contributes new insights into user experience in casual-leisure settings, such as online video programs, with implications for other information domains.

Keywords: casual-leisure information behaviors, information behavior, online videos, role

Procedia PDF Downloads 291
11164 Logic Programming and Artificial Neural Networks in Pharmacological Screening of Schinus Essential Oils

Authors: José Neves, M. Rosário Martins, Fátima Candeias, Diana Ferreira, Sílvia Arantes, Júlio Cruz-Morais, Guida Gomes, Joaquim Macedo, António Abelha, Henrique Vicente

Abstract:

Some plants of genus Schinus have been used in the folk medicine as topical antiseptic, digestive, purgative, diuretic, analgesic or antidepressant, and also for respiratory and urinary infections. Chemical composition of essential oils of S. molle and S. terebinthifolius had been evaluated and presented high variability according with the part of the plant studied and with the geographic and climatic regions. The pharmacological properties, namely antimicrobial, anti-tumoural and anti-inflammatory activities are conditioned by chemical composition of essential oils. Taking into account the difficulty to infer the pharmacological properties of Schinus essential oils without hard experimental approach, this work will focus on the development of a decision support system, in terms of its knowledge representation and reasoning procedures, under a formal framework based on Logic Programming, complemented with an approach to computing centered on Artificial Neural Networks and the respective Degree-of-Confidence that one has on such an occurrence.

Keywords: artificial neuronal networks, essential oils, knowledge representation and reasoning, logic programming, Schinus molle L., Schinus terebinthifolius Raddi

Procedia PDF Downloads 525
11163 Interoperable Design Coordination Method for Sharing Communication Information Using Building Information Model Collaboration Format

Authors: Jin Gang Lee, Hyun-Soo Lee, Moonseo Park

Abstract:

The utilization of BIM and IFC allows project participants to collaborate across different areas by consistently sharing interoperable product information represented in a model. Comments or markups generated during the coordination process can be categorized as communication information, which can be shared in less standardized manner. It can be difficult to manage and reuse such information compared to the product information in a model. The present study proposes an interoperable coordination method using BCF (the BIM Collaboration Format) for managing and sharing the communication information during BIM based coordination process. A management function for coordination in the BIM collaboration system is developed to assess its ability to share the communication information in BIM collaboration projects. This approach systematically links communication information during the coordination process to the building model and serves as a type of storage system for retrieving knowledge created during BIM collaboration projects.

Keywords: design coordination, building information model, BIM collaboration format, industry foundation classes

Procedia PDF Downloads 405
11162 Investment Projects Selection Problem under Hesitant Fuzzy Environment

Authors: Irina Khutsishvili

Abstract:

In the present research, a decision support methodology for the multi-attribute group decision-making (MAGDM) problem is developed, namely for the selection of investment projects. The objective of the investment project selection problem is to choose the best project among the set of projects, seeking investment, or to rank all projects in descending order. The project selection is made considering a set of weighted attributes. To evaluate the attributes in our approach, expert assessments are used. In the proposed methodology, lingual expressions (linguistic terms) given by all experts are used as initial attribute evaluations, since they are the most natural and convenient representation of experts' evaluations. Then lingual evaluations are converted into trapezoidal fuzzy numbers, and the aggregate trapezoidal hesitant fuzzy decision matrix will be built. The case is considered when information on the attribute weights is completely unknown. The attribute weights are identified based on the De Luca and Termini information entropy concept, determined in the context of hesitant fuzzy sets. The decisions are made using the extended Technique for Order Performance by Similarity to Ideal Solution (TOPSIS) method under a hesitant fuzzy environment. Hence, a methodology is based on a trapezoidal valued hesitant fuzzy TOPSIS decision-making model with entropy weights. The ranking of alternatives is performed by the proximity of their distances to both the fuzzy positive-ideal solution (FPIS) and the fuzzy negative-ideal solution (FNIS). For this purpose, the weighted hesitant Hamming distance is used. An example of investment decision-making is shown that clearly explains the procedure of the proposed methodology.

Keywords: In the present research, a decision support methodology for the multi-attribute group decision-making (MAGDM) problem is developed, namely for the selection of investment projects. The objective of the investment project selection problem is to choose the best project among the set of projects, seeking investment, or to rank all projects in descending order. The project selection is made considering a set of weighted attributes. To evaluate the attributes in our approach, expert assessments are used. In the proposed methodology, lingual expressions (linguistic terms) given by all experts are used as initial attribute evaluations since they are the most natural and convenient representation of experts' evaluations. Then lingual evaluations are converted into trapezoidal fuzzy numbers, and the aggregate trapezoidal hesitant fuzzy decision matrix will be built. The case is considered when information on the attribute weights is completely unknown. The attribute weights are identified based on the De Luca and Termini information entropy concept, determined in the context of hesitant fuzzy sets. The decisions are made using the extended Technique for Order Performance by Similarity to Ideal Solution (TOPSIS) method under a hesitant fuzzy environment. Hence, a methodology is based on a trapezoidal valued hesitant fuzzy TOPSIS decision-making model with entropy weights. The ranking of alternatives is performed by the proximity of their distances to both the fuzzy positive-ideal solution (FPIS) and the fuzzy negative-ideal solution (FNIS). For this purpose, the weighted hesitant Hamming distance is used. An example of investment decision-making is shown that clearly explains the procedure of the proposed methodology.

Procedia PDF Downloads 107
11161 The Effect of Information Technologies on Business Performance: An Application on Small Hotels

Authors: Abdullah Karaman, Kursad Sayin

Abstract:

In this research, which information technologies are used in small hotel businesses, and the information technologies-performance perception of the managers are pointed out. During the research, the questionnaire was prepared and the small scale hotel managers were interviewed face to face and they filled out the questionnaire and the answers acquired were evaluated. As the result of the research, it was obtained that the managers do not care much about the information technologies usage in practice even though they accepted that the information technologies are important in terms of performance.

Keywords: information technologies, managers, performance, small hotels

Procedia PDF Downloads 468
11160 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms

Authors: Mohammad Besharatloo

Abstract:

Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.

Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree

Procedia PDF Downloads 70
11159 Media Diplomacy in the Age of Social Networks towards a Conceptual Framework for Understanding Diplomatic Cyber Engagement

Authors: Mohamamd Ayish

Abstract:

This study addresses media diplomacy as an integral component of public diplomacy which emerged in the United States in the post-World War II era and found applications in other countries around the world. The study seeks to evolve a conceptual framework for understanding the practice of public diplomacy through social networks, often referred to as social engagement diplomacy. This form of diplomacy is considered far more ahead of the other two forms associated with both government controlled and independent media. The cases of the Voice of America Arabic Service and the 1977 CBS interviews with the late Egyptian President Anwar Sadat and Israeli Prime Minister Menachem Begin are cited in this study as reflecting the two traditional models. The new social engagement model sees public diplomacy as an act of communication that seeks to effect changes in target audiences through a process of persuasion shaped by discourse orientations and technological features. The proposed conceptual framework for social, diplomatic engagement draws on an open communication environment, an empowered audience, an interactive and symmetrical process of communication, multimedia-based flows of information, direct and credible feedback, distortion and high risk. The writer believes this study would be helpful in providing appropriate knowledge pertaining to our understanding of social diplomacy and furnishing concrete insights into how diplomats could harness virtual space to maximize their goals in the global environment.

Keywords: diplomacy, engagement, social, globalization

Procedia PDF Downloads 259
11158 Improving Public Service Delivery by E-Governance

Authors: Aneri Mehta, Neeti Chaudhary

Abstract:

Governments of the countries around the world have started utilizing the potential of technology to deliver online information and services to their citizens. Using ICT in the form of e-governance could yield great benefits in the reform and modernization of the public sector. The experience of e-governance in a number of developed and developing countries has shown that ICT can be a tool for greater service delivery with the goal of improving service quality. E-governance can also promote ‘good governance’, greater civic engagement can increase opportunities for direct representation and voice, and support for increased democracy. This paper discusses and presents the survey findings that seek to test the role of e-governance in improving service delivery by altering the principal-agent relationship. It further seeks to elucidate the quality aspects of public service. Strong leadership is required to implement e-governance to capture and internalize the benefits of quality services and satisfied citizens.

Keywords: public service, service delivery, e-governance, good governance

Procedia PDF Downloads 451
11157 Freedom of Information and Freedom of Expression

Authors: Amin Pashaye Amiri

Abstract:

Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.

Keywords: freedom of information, freedom of expression, human rights, government information

Procedia PDF Downloads 530
11156 The Quality of Accounting Information of Private Companies in the Czech Republic

Authors: Kateřina Struhařová

Abstract:

The paper gives the evidence of quality of accounting information of Czech private companies. In general the private companies in the Czech Republic do not see the benefits of providing accounting information of high quality. Based on the research of financial statements of entrepreneurs and companies in Zlin region it was confirmed that the quality of accounting information differs among the private entities and that the major impact on the accounting information quality has the fact if the financial statements are audited as well as the size of the entity. Also the foreign shareholders and lenders have some impact on the accounting information quality.

Keywords: accounting information quality, financial statements, Czech Republic, private companies

Procedia PDF Downloads 285
11155 From Myth to Screen: A Cultural Criticism of the Adaptation of Nordic Mythology in Marvel Cinematic Universe’s Thor Trilogy

Authors: Vathya Anindita Putri, Henny Saptatia Drajati Nugrahani

Abstract:

This research aims to explore the representation of Nordic mythology in the commercial film titled “Thor” produced by the Marvel Cinematic Universe. First, the Nordic mythology adaptation and representation in “Thor” compared to other media. Second, the importance of using the mise en scene technique, the comprehensive portrayal of Nordic mythology and the audience's experiences in enjoying the film. This research is conducted using qualitative methods. The two research questions are analyzed using three theories: Adaptation theory by Robert Stam, Mise en Scene theory by Jean-Luc Godard, and Cultural Criticism theory by Michel Foucault. Robert Stam emphasizes the importance of social and historical in understanding film adaptations. Film adaptations always occur in a specific cultural and historical context; therefore, authors and producers must consider these factors when creating a successful adaptation. Jean-Luc Godard uses the “politiques des auteurs” approach to understand that films are not just cultural products made for entertainment, but they are works of art by authors and directors. It is important to explore how authors and directors convey their ideas and emotions in their films, in this case, a film set in Nordic mythology. Foucault takes an approach to analyzing power that considers how power operates and influences social relationships in a specific context. Foucault’s theory is used to analyze how the representation of Nordic mythology is used as an instrument of power by the Marvel Cinematic Universe to influence how the audience views Nordic mythology. The initial findings of this research are that the fusion of Nordic mythology with modern superhero storytelling in the film “Thor” produced by Marvel, is successful. The film contains conflicts in the modern world and represents the symbolism of Nordic mythology. The rich and interesting atmosphere of Nordic mythology is presented through epic battle scenes, captivating character roles, and the use of visual effects that make the film more vivid and real.

Keywords: adaptation theory, cultural criticism theory, film criticism, Marvel cinematic universe, Mise en Scene theory, Nordic mythology

Procedia PDF Downloads 67
11154 The Impact of Information and Communication Technology on the Performance of Office Technology Managers

Authors: Sunusi Tijjani

Abstract:

Information and communication technology is an indispensable tool in the performance of office technology managers. Today's offices are automated and equipped with modern office machines that enhances and improve the work of office managers. However, today's office technology managers can process, evaluate, manage and communicate all forms of information using technological devices. Information and Communication Technology is viewed as the process of processing, storing ad dissemination information while office technology managers are trained professional who can effectively operate modern office machines, perform administrative duties and attend meetings to take dawn minute of meetings. This paper examines the importance of information and communication technology toward enhancing the work of office managers. It also stresses the importance of information and communication technology toward proper and accurate record management.

Keywords: communication, information, technology, managers

Procedia PDF Downloads 460
11153 Representation of Female Experiences by Upcoming African Women Writers: A Case Study of Three Post-2000 South African Narratives

Authors: Liberty Takudzwa Nyete

Abstract:

This paper examines the feminine representation of women’s experiences in relation to womanhood as depicted by selected three South African female authors:. The study examines the challenges, difficulties and strategies used by various female characters’ to deal with situations in a typical apartheid and post-apartheid society. It also explores the way in which gender, race and class discourses are treated in the selected texts. The three authors, born and bred at the peak of the anti-apartheid movement and women’s protest against patriarchy, witnessed the effects of apartheid on both their families and societies at large which could perhaps have influenced their writing. The study is informed by both the feminist and womanist ideologies postulated by different theorists. In particular, the study of Not Woman Enough considers issues of motherhood, womanhood and racism; while that of Shameless focuses on the importance of women’s narration of their own stories, sexuality and racism; and the depiction of sexual violence, class, and women’s roles in the fight against oppression is explored with regard to This Book Betrays My Brother. Thus, the study concludes on the social makeovers that include women in all the spheres of life, such as education and the economy, which were largely dominated by men but are no longer defined by economic status, physical attributes, class nor sexuality.

Keywords: apartheid, feminism, prostitution, sexual violence, womanism, womanhood

Procedia PDF Downloads 223
11152 Visual Aid and Imagery Ramification on Decision Making: An Exploratory Study Applicable in Emergency Situations

Authors: Priyanka Bharti

Abstract:

Decades ago designs were based on common sense and tradition, but after an enhancement in visualization technology and research, we are now able to comprehend the cognitive ability involved in the decoding of the visual information. However, many fields in visuals need intense research to deliver an efficient explanation for the events. Visuals are an information representation mode through images, symbols and graphics. It plays an impactful role in decision making by facilitating quick recognition, comprehension, and analysis of a situation. They enhance problem-solving capabilities by enabling the processing of more data without overloading the decision maker. As research proves that, visuals offer an improved learning environment by a factor of 400 compared to textual information. Visual information engages learners at a cognitive level and triggers the imagination, which enables the user to process the information faster (visuals are processed 60,000 times faster in the brain than text). Appropriate information, visualization, and its presentation are known to aid and intensify the decision-making process for the users. However, most literature discusses the role of visual aids in comprehension and decision making during normal conditions alone. Unlike emergencies, in a normal situation (e.g. our day to day life) users are neither exposed to stringent time constraints nor face the anxiety of survival and have sufficient time to evaluate various alternatives before making any decision. An emergency is an unexpected probably fatal real-life situation which may inflict serious ramifications on both human life and material possessions unless corrective measures are taken instantly. The situation demands the exposed user to negotiate in a dynamic and unstable scenario in the absence or lack of any preparation, but still, take swift and appropriate decisions to save life/lives or possessions. But the resulting stress and anxiety restricts cue sampling, decreases vigilance, reduces the capacity of working memory, causes premature closure in evaluating alternative options, and results in task shedding. Limited time, uncertainty, high stakes and vague goals negatively affect cognitive abilities to take appropriate decisions. More so, theory of natural decision making by experts has been understood with far more depth than that of an ordinary user. Therefore, in this study, the author aims to understand the role of visual aids in supporting rapid comprehension to take appropriate decisions during an emergency situation.

Keywords: cognition, visual, decision making, graphics, recognition

Procedia PDF Downloads 256
11151 Narrating 1968: Felipe Cazals’ Canoa (1976) and Images of Massacre

Authors: Nancy Elizabeth Naranjo Garcia

Abstract:

Canoa (1976) by Felipe Cazals is a film that exposes the consequences of power that the Mexican State exercised over the 1968 student movement. The film, in this particular way, approaches the Tlatelolco Massacre from a point of view that takes into consideration the events that led up to it. Nonetheless, the reference to the political tension in Canoa remains ambiguous. Thus, the cinematographic representation refers to an event that leaves space for reflection, and as a consequence leaves evidence of an image that signals the notion of survival as Georges Didi-Huberman points out. In addition to denouncing the oppressive force by the Mexican State, the images in Canoa also emphasize what did not happen in Tlatelolco and its condensation with the student activists. To observe the images that Canoa offers in a new light, this work proposes further exploration with the following questions; How do the images in Canoa narrate? How are the images inserted in the film? In this fashion, a more profound comprehension of the objective and the essence of the images becomes feasible. As a result, it is possible to analyze the images of Canoa with the real killing at San Miguel Canoa in literature. The film visualizes a testimony of the event that once seemed unimaginable, an image that anticipates and structures the proceeding event. Therefore, this study takes a second look at how Canoa considers not only the killing at San Miguel Canoa and the Tlatlelolco Massacre, but goes further on contextualize an unimaginable image.

Keywords: cinematographic representation, student movement, Tlatelolco Massacre, unimaginable image

Procedia PDF Downloads 196
11150 Mental Health Representation in Video Games

Authors: Leonid Rybakovski

Abstract:

Contemporary media offer a variety of themes for the diverse tastes of their audiences. The Digital games medium was mostly perceived as an instrument of entertainment. But being a part of global trends while constantly pushing the boundaries of storytelling in virtual reality and standing on the edge of technology also brings huge responsibility for game designers around the globe. A very recent emerging topic over the last years was an individual's mental state. In recent years there has been a shift in mental problems representations in commercial game releases such as Hell blade: Senua's Sacrifice and Sea of Solitude. The aim of this study is to research the approach of mental illness representation in media and digital games over the years and to suggest alternatives for putting characters who suffer from mental illness at the forefront of the storyline. This study traces dominant representations of characters with mental illness in digital games, reflecting the major change of the game industry toward inclusiveness. At the same time, the research embraces a hybrid approach to the academic study of digital games and includes the development of a game that follows a post-traumatic young girl, forcing the users to live her life through her eyes. The game prototype was developed as part of the Mdes Game Design and Development program and consisted of academic research and game development practices.

Keywords: framing analysis, mental condition, up keying, game mechanics

Procedia PDF Downloads 160
11149 Design, Development and Evaluation of a Portable Recording System to Capture Dynamic Presentations using the Teacher´s Tablet PC

Authors: Enrique Barra, Abel Carril, Aldo Gordillo, Joaquin Salvachua, Juan Quemada

Abstract:

Computers and multimedia equipment have improved a lot in the last years. They have reduced costs and size while at the same time has increased their capabilities. These improvements allowed us to design and implement a portable recording system that also integrates the teacher´s tablet PC to capture what he/she writes on the slides and all that happens in it. This paper explains this system in detail and the validation of the recordings that we did after using it to record all the lectures of a course in our university called “Communications Software”. The results show that pupils used the recordings for different purposes and consider them useful for a variety of things, especially after missing a lecture.

Keywords: recording system, capture dynamic presentations, lecture recording

Procedia PDF Downloads 347
11148 Technological Affordances: Guidelines for E-Learning Design

Authors: Clement Chimezie Aladi, Itamar Shabtai

Abstract:

A review of the literature in the last few years reveals that little attention has been paid to technological affordances in e-learning designs. However, affordances are key to engaging students and enabling teachers to actualize learning goals. E-learning systems (software and artifacts) need to be designed in such a way that the features facilitate perceptions of the affordances with minimal cognition. This study aimed to fill this gap in the literature and encourage further research in this area. It provides guidelines for facilitating the perception of affordances in e-learning design and advances Technology Affordance and Constraints Theory by incorporating the affordance-based design process, the principles of multimedia learning, e-learning design philosophy, and emotional and cognitive affordances.

Keywords: e-learning, technology affrodances, affordance based design, e-learning design

Procedia PDF Downloads 43
11147 Role of Academic Library in/for Information Literacy

Authors: Veena Rani

Abstract:

This paper presents the role of academic library in information literacy in the present time. Information is the very important aspect for the growth of any country. In this context information literacy is an essential tool in the development of various fields. Academic library is an essential part of university as well as of an institution. In Academic library we can include university library, college library as well as school library. Academic libraries are playing an important role for information literacy. Academic libraries provide excellent services for the benefit of students, teachers, researchers, and all those who are interested in education. All over the world many of the schemes, policies and services provide for information literacy.

Keywords: information literacy, academic library, tool literacy, higher education

Procedia PDF Downloads 345
11146 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 525
11145 An Explanatory Study into the Information-Seeking Behaviour of Egyptian Beggars

Authors: Essam Mansour

Abstract:

The key purpose of this study is to provide first-hand information about beggars in Egypt, especially from the perspective of their information seeking behaviour including their information needs. The researcher tries to investigate the information-seeking behaviour of Egyptian beggars with regard to their thoughts, perceptions, motivations, attitudes, habits, preferences as well as challenges that may impede their use of information. The research methods used were an adapted form of snowball sampling of a heterogeneous demographic group of participants in the beggary activity in Egypt. This sampling was used to select focus groups to explore a range of relevant issues. Data on the demographic characteristics of the Egyptian beggars showed that they tend to be men, mostly with no formal education, with an average age around 30s, labeled as low-income persons, mostly single and mostly Muslims. A large number of Egyptian beggars were seeking for information to meet their basic needs as well as their daily needs, although some of them were not able to identify their information needs clearly. The information-seeking behaviour profile of a very large number of Egyptian beggars indicated a preference for informal sources of information over formal ones to solve different problems and meet the challenges they face during their beggary activity depending on assistive devices, such as mobile phones. The high degree of illiteracy and the lack of awareness about the basic rights of information as well as information needs were the most important problems Egyptian beggars face during accessing information. The study recommended further research to be conducted about the role of the library in the education of beggars. It also recommended that beggars’ awareness about their information rights should be promoted through educational programs that help them value the role of information in their life.

Keywords: user studies, information-seeking behaviour, information needs, information sources, beggars, Egypt

Procedia PDF Downloads 300
11144 SIM (Subscriber Identity Module) Banking

Authors: Okanta Andrew, Richmond Kweku Frempong

Abstract:

As mobile networks are upgraded with technologies like WAP, GPRS and UMTS to deliver next-generation multimedia services, so are the banks and other financial institutions also getting ready to unleash the financial products on the mobile platform to meet growing demand for mobile based application services. Hence, the onset of Unstructured Supplementary Services (USSD) Banking which would make banking services available at anywhere, anytime through a string of interactive SMS sessions between a mobile device and an application server of a service provider. The aim of this studies was to find out whether the public will accept the sim banking service when it is implemented. Our target group includes: Working class. E. g. Businessmen/women, office workers, fishermen, market women, teachers etc. Nonworking class. E. g. Students (Tertiary, Senior High School), housewives. etc. The survey was in the form of a questionnaire and a verbal interview (video) which was to investigate their idea about the current banking system and the yet to be introduced sim banking concept. Meanwhile, some challenges accompanied the progression of data gathering because some populace showed reluctance in freeing their information. One other suggestion was that government should put measures against foremost challenges obstructing sim banking in Ghana counter to computers hackers. Government and individual have a key role to undertake to give suitable support to facelift the sim banking industry in the country. It was also suggested that Government put strong regulations on the use of sim banking products and services to streamline all the activities and also create awareness of the need for sim banking and emphasize its relevance in the aspect of national GDP.

Keywords: banking, mobile banking, SIM banking, mobile banking in Ghana

Procedia PDF Downloads 466
11143 The Making of a Male: Narrative Analysis of the Protagonist in Cholera District

Authors: Behre O. Ozalp

Abstract:

Cinema is a reflection of the society, as much as it captures the social codes. These codes are learned within the society; and through movies these practices of the gender order are reproduced as well. One of the best examples engendering these codes is a modern classic of Turkish cinema, Cholera District (1997), originally Ağır Roman in Turkish. It is a coming of age movie of a teenage boy in an old neighborhood of Istanbul, where he learns to be a 'man' through the hegemonic masculinity codes of the society. The corporal and verbal practices that are used in the representation of the male protagonist's portrayal is based on his performativity. This paper, through narrative analysis of the aforementioned movie, reviews how gender and narrative are intertwined within the context of queer theory. The methodology follows the protagonist's object of desire while evaluating his heterosexuality which requires affirmative performances. The framework of the study firstly focuses on the protagonist's own life and his interactions with the males of his kinship. Later, the focus gravitates towards his interactions with the female object of desire while evaluating how this relationship shapes his status in society. Lastly, the study focuses on the relationship between the protagonist and non-relative males of the neighborhood. The journey of a young male becoming a man by copying the other males delivers a clear representation of how heterosexuality is favored in terms of gender order.

Keywords: hegemonic masculinity, performativity, queer theory, Turkish cinema

Procedia PDF Downloads 177
11142 Policy Compliance in Information Security

Authors: R. Manjula, Kaustav Bagchi, Sushant Ramesh, Anush Baskaran

Abstract:

In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful.

Keywords: information technology, information security, involvement theory, policies, social bond theory

Procedia PDF Downloads 352
11141 Research and Development of Net-Centric Information Sharing Platform

Authors: Wang Xiaoqing, Fang Youyuan, Zheng Yanxing, Gu Tianyang, Zong Jianjian, Tong Jinrong

Abstract:

Compared with traditional distributed environment, the net-centric environment brings on more demanding challenges for information sharing with the characteristics of ultra-large scale and strong distribution, dynamic, autonomy, heterogeneity, redundancy. This paper realizes an information sharing model and a series of core services, through which provides an open, flexible and scalable information sharing platform.

Keywords: net-centric environment, information sharing, metadata registry and catalog, cross-domain data access control

Procedia PDF Downloads 548
11140 Privacy-Preserving Model for Social Network Sites to Prevent Unwanted Information Diffusion

Authors: Sanaz Kavianpour, Zuraini Ismail, Bharanidharan Shanmugam

Abstract:

Social Network Sites (SNSs) can be served as an invaluable platform to transfer the information across a large number of individuals. A substantial component of communicating and managing information is to identify which individual will influence others in propagating information and also whether dissemination of information in the absence of social signals about that information will be occurred or not. Classifying the final audience of social data is difficult as controlling the social contexts which transfers among individuals are not completely possible. Hence, undesirable information diffusion to an unauthorized individual on SNSs can threaten individuals’ privacy. This paper highlights the information diffusion in SNSs and moreover it emphasizes the most significant privacy issues to individuals of SNSs. The goal of this paper is to propose a privacy-preserving model that has urgent regards with individuals’ data in order to control availability of data and improve privacy by providing access to the data for an appropriate third parties without compromising the advantages of information sharing through SNSs.

Keywords: anonymization algorithm, classification algorithm, information diffusion, privacy, social network sites

Procedia PDF Downloads 303
11139 Prediction of Dubai Financial Market Stocks Movement Using K-Nearest Neighbor and Support Vector Regression

Authors: Abdulla D. Alblooshi

Abstract:

The stock market is a representation of human behavior and psychology, such as fear, greed, and discipline. Those are manifested in the form of price movements during the trading sessions. Therefore, predicting the stock movement and prices is a challenging effort. However, those trading sessions produce a large amount of data that can be utilized to train an AI agent for the purpose of predicting the stock movement. Predicting the stock market price action will be advantageous. In this paper, the stock movement data of three DFM listed stocks are studied using historical price movements and technical indicators value and used to train an agent using KNN and SVM methods to predict the future price movement. MATLAB Toolbox and a simple script is written to process and classify the information and output the prediction. It will also compare the different learning methods and parameters s using metrics like RMSE, MAE, and R².

Keywords: KNN, ANN, style, SVM, stocks, technical indicators, RSI, MACD, moving averages, RMSE, MAE

Procedia PDF Downloads 151
11138 Interactive Multiple Functions User Interface

Authors: Manjit Singh Sidhu, Waleed Maqableh, Jee Geak Ying

Abstract:

Tangible user interfaces (TUI) that employ markers in the augmented reality (AR) environment has hampered the interactivity between the user and the software application. This is because the user lacks focus on visualizing the contents due to the interaction mechanisms whereby multiple markers may need to be used to perform a particular function. In this research, we have designed a novel TUI user interface where multiple functions could be triggered similar to a natural keyboard thus allowing user to focus more on its digital contents such as 2D/3D, text input, animation and sound. Test results of the user interface with potential users and HCI experts revealed that the multiple functions user interface was new, preferred and appreciated more as opposed to marker based user interface.

Keywords: multimedia, augmented reality, engineering, user interface, visualization

Procedia PDF Downloads 431