Search results for: oblivious information exchange
11592 Numerical Study for Improving Performance of Air Cooled Proton Exchange Membrane Fuel Cell on the Cathode Channel
Authors: Mohamed Hassan Gundu, Jaeseung Lee, Muhammad Faizan Chinannai, Hyunchul Ju
Abstract:
In this study, we present the effects of bipolar plate design to control the temperature of the cell and ensure effective water management under an excessive amount of air flow and low humidification conditions in the proton exchange membrane fuel cell (PEMFC). The PEMFC model developed and applied to consider a three type of bipolar plate that is defined by ratio of inlet channel width to outlet channel width. Simulation results show that the design which has narrow gas inlet channel and wide gas outlet channel width (wide coolant inlet channel and narrow coolant outlet channel width) make the relative humidity and water concentration increase in the channel and the catalyst layer. Therefore, this study clearly demonstrates that the dehydration phenomenon can be decreased by using design of bipolar plate with narrow gas inlet channel and wide gas outlet channel width (wide coolant inlet channel and narrow coolant outlet channel width).Keywords: PEMFC, air-cooling, relative humidity, water management, water concentration, oxygen concentration
Procedia PDF Downloads 29411591 Criminal Laws Associated with Cyber-Medicine and Telemedicine in Current Law Systems in the World
Authors: Shahryar Eslamitabar
Abstract:
Currently, the internet plays an important role in the various scientific, commercial and service practices. Thanks to information and communication technology, the healthcare industry via the internet, generally known as cyber-medicine, can offer professional medical service in a wider geographical area. Having some appealing benefits such as convenience in offering healthcare services, improved accessibility to the services, enhanced information exchange, cost-effectiveness, time-saving, etc. Tele-health has increasingly developed innovative models of healthcare delivery. However, it presents many potential hazards to cyber-patients, inherent in the use of the system. First, there are legal issues associated with the communication and transfer of information on the internet. These include licensure, malpractice, liabilities and jurisdictions as well as privacy, confidentiality and security of personal data as the most important challenge brought about by this system. Additional items of concern are technological and ethical. Although, there are some rules to deal with pitfalls associated with cyber-medicine practices in the USA and some European countries, yet for all developments, it is being practiced in a legal vacuum in many countries. In addition to the domestic legislations to deal with potential problems arisen from the system, it is also imperative that some international or regional agreement should be developed to achieve the harmonization of laws among countries and states. This article discusses some implications posed by the practice of cyber-medicine in the healthcare system according to the experience of some developed countries using a comparative study of laws. It will also review the status of tele-health laws in Iran. Finally, it is intended to pave the way to outline a plan for countries like Iran, with newly-established judicial system for health laws, to develop appropriate regulations through providing some recommendations.Keywords: tele-health, cyber-medicine, telemedicine, criminal laws, legislations, time-saving
Procedia PDF Downloads 66111590 COVID-19 in Nigeria: An external Analysis from the perspective of social media
Authors: Huseyin Arasli, Maryam Abdullahi, Tugrul Gunay
Abstract:
One of the prominence elements used by the destination marketing organization (DMO) as a marketing strategy is the application of Social media tools. During the current spread of coronavirus disease (COVID-19), travel restriction was placed in most countries of the world, leading to the closure of borders movement. It should be noted that most tourism travelers depend on social media to obtain and exchange different kinds of information about COVID-19 in an unprecedented scale. The situational information people received is valued, which calls for the response of the tourism industry on the epidemic. Therefore, it is highly important to recognize such situational information and to understand how people spread this propaganda on social media platforms so that suitable information that relates the COVID-19 epidemic is available in a manner that will not tarnish the marketing strategies, festival planners. Data for this research study was collected from the desk review, which is a secondary source data, online blogs, and interview through social media chat. The results of this research show that the widespread of COVID-19 pandemics led to rapid lockdown in states and cities all over Nigeria, causing declining demands in hotels, airlines, recreation, and tourism centers. Additionally, billions of dollars lost has been recorded in the high increase of hotels and travel bookings cancellations which caused hundreds and thousands of job loss in the country. The result of this research also revealed that COVID-19 is causing more havoc on the unemployment rate indices of the country. Similarly, the over-dependence of government on petroleum has further caused considerable revenue loss, thereby raising a high poverty rate among less privileged Nigerians. Based on this result, the study suggested that there is an urgent need for the government to diversify its economy by looking at other different sectors such as tourism and agricultural farm produce to harmonize other commercial trades sectors in the country.Keywords: social media, destination marketing organizations, DMOs, cultural COVID-19, coronavirus, hospitality, travel tour, tourism
Procedia PDF Downloads 9811589 Public-Private Partnership in Tourism Development: Kuwait Experience within 2035 Vision
Authors: Obaid Alotaibi
Abstract:
Tourism and recreation have become one of the important and influential sectors in most of the modern economies. This sector has been accepted as one of the alternative sources of national income, employment, and foreign exchange. Kuwait has many potentialities in tourism and recreation, and exploitation of this leads to more diversification of the economy besides augmenting its contribution to the GDP. It is an import-oriented economy; it requires hard currencies (foreign exchange) to meet the import costs as well as to maintain stability in the international market. To compensate for the revenue fall stemmed from fluctuations in oil prices -where the agriculture, fisheries, and industrial sectors are too immune and inelastic- the only alternative solution is the regeneration of the tourism and recreation to surface. This study envisages the characteristics of tourism and recreation, the economic and social importance for the society, the physical and human endowments, as well as the tourist pattern and plans for promoting and sustaining tourism in the country. The study summarizes many recommendations, including the necessity of establishing authority or a council for tourism, linking the planning of tourism development with the comprehensive planning for economic and social development in Kuwait in the shadow of 2035 vision, and to encourage the investors to develop new tourist and recreation projects.Keywords: Kuwait, public-private, partnership, tourism, 2035 vision
Procedia PDF Downloads 12611588 Organisational Disclosure: Threats to Individuals' Privacy
Authors: N. A. Badrul
Abstract:
People are concerned that they are vulnerable as a result of what is exposed about them on the internet. Users are increasingly aware of their privacy and are making various efforts to protect their personal information. However, besides individuals themselves, organisations are also exposing personal information of their staff to the general public by publishing it on their official website. This practice may put individuals at risk and particularly vulnerable to threats. This preliminary study explores explicitly the amount and types of personal information disclosure from organisational websites. Threats and risks related to the disclosures are discussed. In general, all the examined organisational websites discloses personal information with varies identifiable degree of data.Keywords: personal information, privacy, e-government, information disclosure
Procedia PDF Downloads 31811587 Performance Analysis of Three Absorption Heat Pump Cycles, Full and Partial Loads Operations
Authors: B. Dehghan, T. Toppi, M. Aprile, M. Motta
Abstract:
The environmental concerns related to global warming and ozone layer depletion along with the growing worldwide demand for heating and cooling have brought an increasing attention toward ecological and efficient Heating, Ventilation, and Air Conditioning (HVAC) systems. Furthermore, since space heating accounts for a considerable part of the European primary/final energy use, it has been identified as one of the sectors with the most challenging targets in energy use reduction. Heat pumps are commonly considered as a technology able to contribute to the achievement of the targets. Current research focuses on the full load operation and seasonal performance assessment of three gas-driven absorption heat pump cycles. To do this, investigations of the gas-driven air-source ammonia-water absorption heat pump systems for small-scale space heating applications are presented. For each of the presented cycles, both full-load under various temperature conditions and seasonal performances are predicted by means of numerical simulations. It has been considered that small capacity appliances are usually equipped with fixed geometry restrictors, meaning that the solution mass flow rate is driven by the pressure difference across the associated restrictor valve. Results show that gas utilization efficiency (GUE) of the cycles varies between 1.2 and 1.7 for both full and partial loads and vapor exchange (VX) cycle is found to achieve the highest efficiency. It is noticed that, for typical space heating applications, heat pumps operate over a wide range of capacities and thermal lifts. Thus, partially, the novelty introduced in the paper is the investigation based on a seasonal performance approach, following the method prescribed in a recent European standard (EN 12309). The overall result is a modest variation in the seasonal performance for analyzed cycles, from 1.427 (single-effect) to 1.493 (vapor-exchange).Keywords: absorption cycles, gas utilization efficiency, heat pump, seasonal performance, vapor exchange cycle
Procedia PDF Downloads 10911586 Electrokinetic Application for the Improvement of Soft Clays
Authors: Abiola Ayopo Abiodun, Zalihe Nalbantoglu
Abstract:
The electrokinetic application (EKA), a relatively modern chemical treatment has a potential for in-situ ground improvement in an open field or under existing structures. It utilizes a low electrical gradient to transport electrolytic chemical ions between bespoke electrodes inserted in the fine-grained, low permeable soft soils. The paper investigates the efficacy of the EKA as a mitigation technique for the soft clay beds. The laboratory model of the EKA comprises of rectangular plexiglass test tank, electrolytes compartments, geosynthetic electrodes and direct electric current supply. Within this setup, the EK effects resulted from the exchange of ions between anolyte (anodic) and catholyte (cathodic) ends through the tested soil were examined by basic experimental laboratory testing methods. As such, the treated soft soil properties were investigated as a function of the anode-to-cathode distances and curing periods. The test results showed that there have been some changes in the physical and engineering properties of the treated soft soils. The significant changes in the physicochemical and electrical properties suggested that their corresponding changes can be utilized as a monitoring technique to evaluate the improvement in the engineering properties EK treated soft clay soils.Keywords: electrokinetic, electrolytes, exchange ions, geosynthetic electrodes, soft soils
Procedia PDF Downloads 31411585 Forensic Investigation Into the Variation of Geological Properties of Soils Bintulu, Sarawak
Authors: Jaithish John
Abstract:
In this paper a brief overview is provided of the developments in interdisciplinary knowledge exchange with use of soil and geological (earth) materials in the search for evidence. The aim is to provide background information on the role and value of understanding ‘earth materials’ from the crime scene through to microscopic scale investigations to support law enforcement agencies in solving criminal and environmental concerns and investigations. This involves the sampling, analysis, interpretation and explanation presentation of all these evidences. In this context, field and laboratory methods are highlighted for the controlled / referenced sample, alibi sample and questioned sample. The aim of forensic analyses of earth materials is to associate these samples taken from a questioned source to determine if there are similar and outstanding characteristics features of earth materials crucial to support the investigation to the questioned earth materials and compare it to the controlled / referenced sample and alibi samples.Keywords: soil, texture, grain, microscopy
Procedia PDF Downloads 8411584 A Pattern Practise for Awareness Educations on Information Security: Information Security Project
Authors: Fati̇h Apaydin
Abstract:
Education technology is an area which constantly changes and creates innovations. As an inevitable part of the changing circumstances, the societies who have a tendency to the improvements keep up with these innovations by using the methods and strategies which have been designed for education technology. At this point, education technology has taken the responsibility to help the individuals improve themselves and teach the effective teaching methods by filling the airs in theoretical information, information security and the practice. The technology which comes to the core of our lives by raising the importance of it day by day and it enforced its position in computer- based environments. As a result, ‘being ready for technological innovations, improvement on computer-based talent, information, ability and attitude’ doctrines have to be given. However, it is today quite hard to deal with the security and reinforcement of this information. The information which is got illegally gives harm to society from every aspect, especially education. This study includes how and to what extent to use these innovative appliances such as computers and the factor of information security of these appliances in computer-based education. As the use of computer is constantly becoming prevalent in our country, both education and computer will never become out of date, so how computer-based education affects our lives and the study of information security for this type of education are important topics.Keywords: computer, information security, education, technology, development
Procedia PDF Downloads 59411583 Information Retrieval for Kafficho Language
Authors: Mareye Zeleke Mekonen
Abstract:
The Kafficho language has distinct issues in information retrieval because of its restricted resources and dearth of standardized methods. In this endeavor, with the cooperation and support of linguists and native speakers, we investigate the creation of information retrieval systems specifically designed for the Kafficho language. The Kafficho information retrieval system allows Kafficho speakers to access information easily in an efficient and effective way. Our objective is to conduct an information retrieval experiment using 220 Kafficho text files, including fifteen sample questions. Tokenization, normalization, stop word removal, stemming, and other data pre-processing chores, together with additional tasks like term weighting, were prerequisites for the vector space model to represent each page and a particular query. The three well-known measurement metrics we used for our word were Precision, Recall, and and F-measure, with values of 87%, 28%, and 35%, respectively. This demonstrates how well the Kaffiho information retrieval system performed well while utilizing the vector space paradigm.Keywords: Kafficho, information retrieval, stemming, vector space
Procedia PDF Downloads 5711582 Potential of Aerodynamic Feature on Monitoring Multilayer Rough Surfaces
Authors: Ibtissem Hosni, Lilia Bennaceur Farah, Saber Mohamed Naceur
Abstract:
In order to assess the water availability in the soil, it is crucial to have information about soil distributed moisture content; this parameter helps to understand the effect of humidity on the exchange between soil, plant cover and atmosphere in addition to fully understanding the surface processes and the hydrological cycle. On the other hand, aerodynamic roughness length is a surface parameter that scales the vertical profile of the horizontal component of the wind speed and characterizes the surface ability to absorb the momentum of the airflow. In numerous applications of the surface hydrology and meteorology, aerodynamic roughness length is an important parameter for estimating momentum, heat and mass exchange between the soil surface and atmosphere. It is important on this side, to consider the atmosphere factors impact in general, and the natural erosion in particular, in the process of soil evolution and its characterization and prediction of its physical parameters. The study of the induced movements by the wind over soil vegetated surface, either spaced plants or plant cover, is motivated by significant research efforts in agronomy and biology. The known major problem in this side concerns crop damage by wind, which presents a booming field of research. Obviously, most models of soil surface require information about the aerodynamic roughness length and its temporal and spatial variability. We have used a bi-dimensional multi-scale (2D MLS) roughness description where the surface is considered as a superposition of a finite number of one-dimensional Gaussian processes each one having a spatial scale using the wavelet transform and the Mallat algorithm to describe natural surface roughness. We have introduced multi-layer aspect of the humidity of the soil surface, to take into account a volume component in the problem of backscattering radar signal. As humidity increases, the dielectric constant of the soil-water mixture increases and this change is detected by microwave sensors. Nevertheless, many existing models in the field of radar imagery, cannot be applied directly on areas covered with vegetation due to the vegetation backscattering. Thus, the radar response corresponds to the combined signature of the vegetation layer and the layer of soil surface. Therefore, the key issue of the numerical estimation of soil moisture is to separate the two contributions and calculate both scattering behaviors of the two layers by defining the scattering of the vegetation and the soil blow. This paper presents a synergistic methodology, and it is for estimating roughness and soil moisture from C-band radar measurements. The methodology adequately represents a microwave/optical model which has been used to calculate the scattering behavior of the aerodynamic vegetation-covered area by defining the scattering of the vegetation and the soil below.Keywords: aerodynamic, bi-dimensional, vegetation, synergistic
Procedia PDF Downloads 26911581 Information Overload, Information Literacy and Use of Technology by Students
Authors: Elena Krelja Kurelović, Jasminka Tomljanović, Vlatka Davidović
Abstract:
The development of web technologies and mobile devices makes creating, accessing, using and sharing information or communicating with each other simpler every day. However, while the amount of information constantly increasing it is becoming harder to effectively organize and find quality information despite the availability of web search engines, filtering and indexing tools. Although digital technologies have overall positive impact on students’ lives, frequent use of these technologies and digital media enriched with dynamic hypertext and hypermedia content, as well as multitasking, distractions caused by notifications, calls or messages; can decrease the attention span, make thinking, memorizing and learning more difficult, which can lead to stress and mental exhaustion. This is referred to as “information overload”, “information glut” or “information anxiety”. Objective of this study is to determine whether students show signs of information overload and to identify the possible predictors. Research was conducted using a questionnaire developed for the purpose of this study. The results show that students frequently use technology (computers, gadgets and digital media), while they show moderate level of information literacy. They have sometimes experienced symptoms of information overload. According to the statistical analysis, higher frequency of technology use and lower level of information literacy are correlated with larger information overload. The multiple regression analysis has confirmed that the combination of these two independent variables has statistically significant predictive capacity for information overload. Therefore, the information science teachers should pay attention to improving the level of students’ information literacy and educate them about the risks of excessive technology use.Keywords: information overload, computers, mobile devices, digital media, information literacy, students
Procedia PDF Downloads 27711580 A Review of Information Systems Development in Developing Countries
Authors: B. N. Asare, O. A. Ajigini
Abstract:
Information systems (IS) are highly important in the operation of private and public organisations in developing and developed countries. Developing countries are saddled with many project failures during the implementation of information systems. However, successful information systems are greatly needed in developing countries in order to enhance their economies. This paper is highly important in view of the high failure rate of information systems in developing countries which needs to be reduced to minimum acceptable levels by means of recommended interventions. This paper centres on a review of IS development in developing countries. The paper presents evidences of the IS successes and failures in developing countries and posits a model to address the IS failures. The proposed model can then be utilised by developing countries to reduce their IS project implementation failure rate. A comparison is drawn between IS development in developing countries and developed countries. The paper provides valuable information to assist in reducing IS failure, and developing IS models and theories on IS development for developing countries.Keywords: developing countries, information systems, IS development, information systems failure, information systems success, information systems success model
Procedia PDF Downloads 37811579 A Multi-Agent Intelligent System for Monitoring Health Conditions of Elderly People
Authors: Ayman M. Mansour
Abstract:
In this paper, we propose a multi-agent intelligent system that is used for monitoring the health conditions of elderly people. Monitoring the health condition of elderly people is a complex problem that involves different medical units and requires continuous monitoring. Such expert system is highly needed in rural areas because of inadequate number of available specialized physicians or nurses. Such monitoring must have autonomous interactions between these medical units in order to be effective. A multi-agent system is formed by a community of agents that exchange information and proactively help one another to achieve the goal of elderly monitoring. The agents in the developed system are equipped with intelligent decision maker that arms them with the rule-based reasoning capability that can assist the physicians in making decisions regarding the medical condition of elderly people.Keywords: fuzzy logic, inference system, monitoring system, multi-agent system
Procedia PDF Downloads 60611578 Enterprise Security Architecture: Approaches and a Framework
Authors: Amir Mohtarami, Hadi Kandjani
Abstract:
The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.Keywords: enterprise architecture, architecture framework, security architecture, information systems
Procedia PDF Downloads 70411577 Standardized Description and Modeling Methods of Semiconductor IP Interfaces
Authors: Seongsoo Lee
Abstract:
IP reuse is an effective design methodology for modern SoC design to reduce effort and time. However, description and modeling methods of IP interfaces are different due to different IP designers. In this paper, standardized description and modeling methods of IP interfaces are proposed. It consists of 11 items such as IP information, model provision, data type, description level, interface information, port information, signal information, protocol information, modeling level, modeling information, and source file. The proposed description and modeling methods enables easy understanding, simulation, verification, and modification in IP reuse.Keywords: interface, standardization, description, modeling, semiconductor IP
Procedia PDF Downloads 50211576 Advancing Customer Service Management Platform: Case Study of Social Media Applications
Authors: Iseoluwa Bukunmi Kolawole, Omowunmi Precious Isreal
Abstract:
Social media has completely revolutionized the ways communication used to take place even a decade ago. It makes use of computer mediated technologies which helps in the creation of information and sharing. Social media may be defined as the production, consumption and exchange of information across platforms for social interaction. The social media has become a forum in which customer’s look for information about companies to do business with and request answers to questions about their products and services. Customer service may be termed as a process of ensuring customer’s satisfaction by meeting and exceeding their wants. In delivering excellent customer service, knowing customer’s expectations and where they are reaching out is important in meeting and exceeding customer’s want. Facebook is one of the most used social media platforms among others which also include Twitter, Instagram, Whatsapp and LinkedIn. This indicates customers are spending more time on social media platforms, therefore calls for improvement in customer service delivery over the social media pages. Millions of people channel their issues, complaints, complements and inquiries through social media. This study have being able to identify what social media customers want, their expectations and how they want to be responded to by brands and companies. However, the applied research methodology used in this paper was a mixed methods approach. The authors of d paper used qualitative method such as gathering critical views of experts on social media and customer relationship management to analyse the impacts of social media on customer's satisfaction through interviews. The authors also used quantitative such as online survey methods to address issues at different stages and to have insight about different aspects of the platforms i.e. customer’s and company’s perception about the effects of social media. Thereby exploring and gaining better understanding of how brands make use of social media as a customer relationship management tool. And an exploratory research approach strategy was applied analysing how companies need to create good customer support using social media in order to improve good customer service delivery, customer retention and referrals. Therefore many companies have preferred social media platform application as a medium of handling customer’s queries and ensuring their satisfaction, this is because social media tools are considered more transparent and effective in its operations when dealing with customer relationship management.Keywords: brands, customer service, information, social media
Procedia PDF Downloads 26811575 'Systems' and Its Impact on Virtual Teams and Electronic Learning
Authors: Shavindrie Cooray
Abstract:
It is vital that students are supported in having balanced conversations about topics that might be controversial. This process is crucial to the development of critical thinking skills. This can be difficult to attain in e-learning environments, with some research finding students report a perceived loss in the quality of knowledge exchange and performance. This research investigated if Systems Theory could be applied to structure the discussion, improve information sharing, and reduce conflicts when students are working in online environments. This research involved 160 participants across four categories of student groups at a college in the Northeastern US. Each group was provided with a shared problem, and each group was expected to make a proposal for a solution. Two groups worked face-to-face; the first face to face group engaged with the problem and each other with no intervention from a facilitator; a second face to face group worked on the problem using Systems tools to facilitate problem structuring, group discussion, and decision-making. There were two types of virtual teams. The first virtual group also used Systems tools to facilitate problem structuring and group discussion. However, all interactions were conducted in a synchronous virtual environment. The second type of virtual team also met in real time but worked with no intervention. Findings from the study demonstrated that the teams (both virtual and face-to-face) using Systems tools shared more information with each other than the other teams; additionally, these teams reported an increased level of disagreement amongst their members, but also expressed more confidence and satisfaction with the experience and resulting decision compared to the other groups.Keywords: e-learning, virtual teams, systems approach, conflicts
Procedia PDF Downloads 13711574 Earnings-Related Information, Cognitive Bias, and the Disposition Effect
Authors: Chih-Hsiang Chang, Pei-Shan Kao
Abstract:
This paper discusses the reaction of investors in the Taiwan stock market to the most probable unknown earnings-related information and the most probable known earnings-related information. As compared with the previous literature regarding the effect of an official announcement of earnings forecast revision, this paper further analyzes investors’ cognitive bias toward the unknown and known earnings-related information, and the role of media during the investors' reactions to the foresaid information shocks. The empirical results show that both the unknown and known earnings-related information provides useful information content for a stock market. In addition, cognitive bias and disposition effect are the behavioral pitfalls that commonly occur in the process of the investors' reactions to the earnings-related information. Finally, media coverage has a remarkable influence upon the investors' trading decisions.Keywords: cognitive bias, role of media, disposition effect, earnings-related information, behavioral pitfall
Procedia PDF Downloads 22411573 CNC Milling-Drilling Machine Cutting Tool Holder
Authors: Hasan Al Dabbas
Abstract:
In this paper, it is addressed that the mechanical machinery captures a major share of innovation in drilling and milling chucks technology. Users demand higher speeds in milling because they are cutting more aluminum and are relying on higher speeds to eliminate secondary finishing operations. To meet that demand, milling-machine builders have enhanced their machine’s rigidity. Moreover, faster cutting has caught up with boring mills. Cooling these machine’s internal components is a challenge at high speeds. Another trend predicted that it is more use of controlled axes to let the machines do many more operations on 5 sides without having to move or re-fix the work. Advances of technology in mechanical engineering have helped to make high-speed machining equipment. To accompany these changes in milling and drilling machines chucks, the demand of easiest software is increased. An open architecture controller is being sought that would allow flexibility and information exchange.Keywords: drilling, milling, chucks, cutting edges, tools, machines
Procedia PDF Downloads 57211572 Hybrid Incentives for Excellent Abroad Students Study for High Education Degrees
Authors: L. Sun, C. Hardacre, A. Garforth, N. Zhang
Abstract:
Higher Education (HE) degrees in the UK are attractive for international students. The recognized reputation of the HE and the world-leading researchers in some areas in the UK imply that the HE degree from the UK might be a passport to a successful career for abroad students. However, it is a challenge to inspire outstanding students applying for the universities in the UK. The incentives should be country-specific for undergraduates and postgraduates. The potential obstacles to stop students applying for the study in the UK mainly lie in these aspects: different HE systems between the UK and other countries, such as China; less information for the application procedures; worries for the study in English for those non-native speakers; and expensive international tuition fees. The hybrid incentives have been proposed by the efforts from the institutions, stuffs, and students themselves. For example, excellent students from top universities would join us based on the abroad exchange programs or ‘2+2 programme’ with discount tuition. They are potential PhD candidates in the further study in the UK. Diversity promotions are implemented to share information and answer queries for potential students and their guardians. Face to face presentations, workshops, and seminars deliver chances for students to admire teaching and learning in the UK, and give students direct answers for their confusions. WeChat official account and Twitter as the online information platform are set up to post messages of recruitment, the guidance for the application procedures, and international collaboration in teaching and research as well. Students who are studying in the UK and the alumni would share their experiences in the study and lives in the UK and their careers after obtaining the HE degree would play as a positive stimulus to our potential students. Short term modules in the UK with exchangeable credits in summer holidays would give abroad students firsthand experiences of the study in the reputable schools with excellent academics, different cultures and the network with international students. Successful cases at the University of Manchester illustrated the effectiveness of these presented methodologies.Keywords: abroad students, degree study, high education, hybrid incentives
Procedia PDF Downloads 16611571 What Is the Matter of Identity to Leadership Behavior: Leader-Subordinate Relational Identity and Paternalistic Leadership
Authors: Sung-Chun Tsai, Li-Fang Chou, Chun-Jung Tseng
Abstract:
How relational identity of leader-subordinate relationship affects behavior of both parties is getting more and more attentions in recent years. Different from past studies on leader-subordinate relationship taking viewpoint of self-concept or interaction between categories, we took perspective of social cognitive schema with special focus on the cognition structure and category content of the vertical leader-subordinate relationship. This study firstly clarified the dimensions and contents of cognitive structure of vertical leader-subordinate relationship. By using two dimensions of “equal/unequal” and “close/distant”, the contents of the leader-subordinate relational identity (LSRI) are classified into four categories: communal affection RI (equal and close), instrumental exchange RI (equal but distant), care-repay RI (unequal but close), and authority-obedience RI (unequal and distant). Furthermore, according to the four dimensions of leader-subordinate relational identity, we explored: (1) how a leader’s LSRI leads to paternalistic leadership; and (2) how paternalistic leadership affects subordinate’s LSRI. Using 59 work group as sample (59 leaders and 251 subordinates), the results of HLM and regression analysis showed: (1) leader’s LSRI significantly affects leadership behavior: instrumental exchange RI is positively relates to authoritarian leadership behavior, but significantly has negative relationship with benevolent leadership; care-repay RI has significantly positive relationship with authoritative leadership; authority-obedience RI has significantly positive relationship with authoritarian leadership; (2) paternalistic leadership is significantly related to subordinates’ LSRI: benevolent leadership is positively related to subordinate’s communal affection and care-repay RI; authoritative leadership has significantly positive relationship with care-repay and authority-obedience RI; authoritarian leadership has significantly positive relationship with subordinate’s instrumental exchange RI. Finally, the main findings, contributions and limits, future research directions, and implications were also discussed.Keywords: relational identity, leader-subordinate relational identity (LSRI), relational schema, paternalistic leadership
Procedia PDF Downloads 55211570 Management and Agreement Protocol in Computer Security
Authors: Abdulameer K. Hussain
Abstract:
When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).Keywords: agreement parameters, key agreement, key exchange, security management
Procedia PDF Downloads 42111569 Problems concerning Formation of Institutional Framework for Electronic Democracy in Georgia
Authors: Giorgi Katamadze
Abstract:
Open public service and accountability towards citizens is an important feature of democratic state based on rule of law. Effective use of electronic resources simplifies bureaucratic procedures, makes direct communications, helps exchange information, ensures government’s openness and in general helps develop electronic/digital democracy. Development of electronic democracy should be a strategic dimension of Georgian governance. Formation of electronic democracy, its functional improvement should become an important dimension of the state’s information policy. Electronic democracy is based on electronic governance and implies modern information and communication systems, their adaptation to universal standards. E-democracy needs involvement of governments, voters, political parties and social groups in an electronic form. In the last years the process of interaction between the citizen and the state becomes simpler. This process is achieved by the use of modern technological systems which gives to a citizen a possibility to use different public services online. For example, the website my.gov.ge makes interaction between the citizen, business and the state more simple, comfortable and secure. A higher standard of accountability and interaction is being established. Electronic democracy brings new forms of interactions between the state and the citizen: e-engagement – participation of society in state politics via electronic systems; e-consultation – electronic interaction among public officials, citizens and interested groups; e-controllership – electronic rule and control of public expenses and service. Public transparency is one of the milestones of electronic democracy as well as representative democracy as only on mutual trust and accountability can democracy be established. In Georgia, institutional changes concerning establishment and development of electronic democracy are not enough. Effective planning and implementation of a comprehensive and multi component e-democracy program (central, regional, local levels) requires telecommunication systems, institutional (public service, competencies, logical system) and informational (relevant conditions for public involvement) support. Therefore, a systematic project of formation of electronic governance should be developed which will include central, regional, municipal levels and certain aspects of development of instrumental basis for electronic governance.Keywords: e-democracy, e-governance, e-services, information technology, public administration
Procedia PDF Downloads 33711568 The Presence of Investor Overconfidence in the South African Exchange Traded Fund Market
Authors: Damien Kunjal, Faeezah Peerbhai
Abstract:
Despite the increasing popularity of exchange-traded funds (ETFs), ETF investment choices may not always be rational. Excess trading volume, misevaluations of securities, and excess return volatility present in financial markets can be attributed to the influence of the overconfidence bias. Whilst previous research has explored the overconfidence bias in stock markets; this study focuses on trading in ETF markets. Therefore, the objective of this study is to investigate the presence of investor overconfidence in the South African ETF market. Using vector autoregressive models, the lead-lag relationship between market turnover and the market return is examined for the market of South African ETFs tracking domestic benchmarks and for the market of South African ETFs tracking international benchmarks over the period November 2000 till August 2019. Consistent with the overconfidence hypothesis, a positive relationship between current market turnover and lagged market return is found for both markets, even after controlling for market volatility and cross-sectional dispersion. This relationship holds for both market and individual ETF turnover suggesting that investors are overconfident when trading in South African ETFs tracking domestic benchmarks and South African ETFs tracking international benchmarks since trading activity depends on past market returns. Additionally, using the global recession as a structural break, this study finds that investor overconfidence is more pronounced after the global recession suggesting that investors perceive ETFs as risk-reducing assets due to their diversification benefits. Overall, the results of this study indicate that the overconfidence bias has a significant influence on ETF investment choices, therefore, suggesting that the South African ETF market is inefficient since investors’ decisions are based on their biases. As a result, the effect of investor overconfidence can account for the difference between the fair value of ETFs and its current market price. This finding has implications for policymakers whose responsibility is to promote the efficiency of the South African ETF market as well as ETF investors and traders who trade in the South African ETF market.Keywords: exchange-traded fund, market return, market turnover, overconfidence, trading activity
Procedia PDF Downloads 16411567 Determinants of the Users Intention of Social-Local-Mobile Applications
Authors: Chia-Chen Chen, Mu-Yen Chen
Abstract:
In recent years, with the vigorous growth of hardware and software technologies of smart mobile devices coupling with the rapid increase of social network influence, mobile commerce also presents the commercial operation mode of the future mainstream. For the time being, SoLoMo has become one of the very popular commercial models, its full name and meaning mainly refer to that users can obtain three key service types through smart mobile devices (Mobile) and omnipresent network services, and then link to the social (Social) web site platform to obtain the information exchange, again collocating with position and situational awareness technology to get the service suitable for the location (Local), through anytime, anywhere and any personal use of different mobile devices to provide the service concept of seamless integration style, and more deriving infinite opportunities of the future. The study tries to explore the use intention of users with SoLoMo mobile application formula, proposing research model to integrate TAM, ISSM, IDT and network externality, and with questionnaires to collect data and analyze results to verify the hypothesis, results show that perceived ease-of-use (PEOU), perceived usefulness (PU), and network externality have significant impact on the use intention with SoLoMo mobile application formula, and the information quality, relative advantages and observability have impacts on the perceived usefulness, and further affecting the use intention.Keywords: SoLoMo (social, local, and mobile), technology acceptance model, innovation diffusion theory, network externality
Procedia PDF Downloads 52811566 An Interpretative Phenomenological Analysis of the Death Practices and Rituals of the Isneg People in Apayao
Authors: Ivy Angelique Malit, Marion Nicole Dela Vega, Marjorie Mae Mendoza
Abstract:
Death practices and rituals of the Philippines is rich with facts about our history mostly on our beliefs of the afterlife before the arrival of the western culture which is still being practiced by the indigenous people of the Philippines. The death practices and rituals are acts of showing the inner thoughts, and feelings towards the person who died. The meanings behind those practices and rituals become the reason why the indigenous people still treasure these death practices and rituals as a part of their culture. This study seeks to know the experiences of the death practices and rituals of one of the Indigenous groups in Apayao, the Isnegs and the meaning of those experiences. The researchers aimed to look at it on a psychological lens. In which the researchers aim (1) to know their experiences of their death practices from the perspective of their thoughts, feelings and actions, and (2) to seek the meaning behind their death rituals. The design used in the research is a qualitative design and Interpretative Phenomenological Analysis. The participants were gathered by using purposive sampling. The researchers gathered the data from a form of a semi-structured interview with guide questions. The researchers used Thematic Analysis to analyze the verbatim transcriptions from the interview. The experiences of death practices and rituals of the Isneg people have been presented in the aspects of their thoughts, feelings and behavior. The experiences were presented with 7 superordinate themes namely, (1) Refusal of Reality (2) Feelings of mixed emotions (3) Oblivious Acts of the participants (4) Conflict with self and culture (5) Negative thinking of the participants (6) Process of Acceptance (8) Act of Love. The make meaning behind the death practices and rituals of the Isneg people have been presented with 2 superordinate themes, (1) Act of Respect and (2) Act of Loyalty. The results of the research show that the experiences and meaning behind their death practices and burials were being based more by their own beliefs. In their culture, which has been passed through by their ancestors and becomes the foundation of their beliefs and their newly found religion which was introduced by the travelling missionaries. Doing those death practices and rituals is their way to show their affections, like respect and loyalty towards the person who died.Keywords: death practices, interpretative phenomenological analysis, isneg people, rituals, theory of grieving
Procedia PDF Downloads 25411565 The Positive Effects of Top-Sharing: A Case Study
Authors: Maike Andresen, Georg Dochtmann
Abstract:
Due to political, social, and societal changes in labor organization, top-sharing, defined as job-sharing in leading positions, becomes more important in HRM. German companies are looking for practical and economically meaningful solutions that allow to enduringly increase women’s ratio in management, not only because of a recently implemented quota. Furthermore, supporting employees in achieving work-life balance is perceived as an important goal for a sustainable HRM to gain competitive advantage. Top-sharing is seen as being suitable to reach both goals. To evaluate determinants leading to effective top-sharing, a case study of a newly implemented top-sharing tandem in a large German enterprise was conducted over a period of 15 months. In this company, a full leadership position was split into two 60%-part-time positions held by an experienced female leader in her late career and a female college who took over her first leadership position (mid-career). We assumed a person-person fit in terms of a match of the top sharing partners’ personality profiles (Big Five) and their leadership motivations to be important prerequisites for an effective collaboration between them. We evaluated the person-person fit variables once before the tandem started to work. Both leaders were expected to learn from each other (mentoring, competency development). On an operational level, they were supposed to lead together the same employees in an effective manner (leader-member exchange), presupposing an effective cooperation between both (handing over information). To see developments over time, these processes were evaluated three times over the span of the project. Top-Sharing and the underlined processes are expected to positively influence the tandem’s performance which has been evaluated twice, at the beginning and the end of the project, to assess its development over time as well. The evaluation of the personality and the basic motives suggests that both executives can be a successful top-sharing tandem. The competency evaluations (supervisor as well as self-assessment) increased over the time span. Although the top sharing tandem worked on equal terms, they implemented rather classical than peer-mentoring due to different career ambitions of the tandem partners. Thus, opportunities were not used completely. Team-member exchange scores proved the good cooperation between the top-sharers. Although the employees did not evaluate the leader-member-exchange between them and the two leaders of the tandem homogeneously, the top-sharing tandem itself did not have the impression that the employees’ task performance depended on whom of the tandem was responsible for the task. Furthermore, top-sharing did not negatively influence the performance of both leaders. During qualitative interviews with the top-sharers and their team, we found that the top-sharers could focus more easily on their tasks. The results suggest positive outcomes of top-sharing (e.g. competency improvement, learning from each other through mentoring). Top-Sharing does not hamper performance. Thus, further research and practical implementations are suggested. As part-time jobs are still more often a female solution to increase their work-life- and work-family-balance, top-sharing may be a suitable solution to increase the woman’s ratio in leadership positions as well as to sustainable increase work-life-balance of executives.Keywords: mentoring, part-time leadership, top-sharing, work-life-balance
Procedia PDF Downloads 26511564 Conceptual Model for Massive Open Online Blended Courses Based on Disciplines’ Concepts Capitalization and Obstacles’ Detection
Authors: N. Hammid, F. Bouarab-Dahmani, T. Berkane
Abstract:
Since its appearance, the MOOC (massive open online course) is gaining more and more intention of the educational communities over the world. Apart from the current MOOCs design and purposes, the creators of MOOC focused on the importance of the connection and knowledge exchange between individuals in learning. In this paper, we present a conceptual model for massive open online blended courses where teachers over the world can collaborate and exchange their experience to get a common efficient content designed as a MOOC opened to their students to live a better learning experience. This model is based on disciplines’ concepts capitalization and the detection of the obstacles met by their students when faced with problem situations (exercises, projects, case studies, etc.). This detection is possible by analyzing the frequently of semantic errors committed by the students. The participation of teachers in the design of the course and the attendance by their students can guarantee an efficient and extensive participation (an important number of participants) in the course, the learners’ motivation and the evaluation issues, in the way that the teachers designing the course assess their students. Thus, the teachers review, together with their knowledge, offer a better assessment and efficient connections to their students.Keywords: massive open online course, MOOC, online learning, e-learning
Procedia PDF Downloads 26811563 Developing a Systems Dynamics Model for Security Management
Authors: Kuan-Chou Chen
Abstract:
This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.Keywords: system thinking, information security systems, security management, simulation
Procedia PDF Downloads 429