Search results for: social code of ethics
10775 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme
Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe
Abstract:
The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code
Procedia PDF Downloads 4510774 OpenMP Parallelization of Three-Dimensional Magnetohydrodynamic Code FOI-PERFECT
Authors: Jiao F. Huang, Shi Chen, Shu C. Duan, Gang H. Wang
Abstract:
Due to its complex spatial structure as well as dynamic temporal evolution, an analytic solution of an X-pinch process is out of question, and numerical simulation becomes an important tool in X-pinch studies. Intrinsically, simulations of X-pinch are three-dimensional (3D) because of the specific structure of its load. Furthermore, in order to resolve both its μm-scales and ns-durations, fine spatial mesh grid and short time steps are usually adopted. The resulting large computational scales make the parallelization of codes a vital problem to be solved if any practical simulations are to be carried out. In this work, we report OpenMP parallelization of our 3D magnetohydrodynamic (MHD) code FOI-PERFECT. Results of test runs confirm that computational efficiency has been improved after parallelization, and both the sequential and parallel versions give the same physical results under the same initial conditions.Keywords: MHD simulation, OpenMP, parallelization, X-pinch
Procedia PDF Downloads 34010773 Social Enterprises in Rural Canada
Authors: Prescott C. Ensign
Abstract:
Social enterprises play a vital role in Canada’s rural and northern communities. Most operate as non-profit organizations, use market approaches, and generate revenue from services or goods to support goals that address social, cultural, and environmental issues. As provincial and federal governments make reductions to programs providing social services to local communities, rural and northern residents who already have fewer resources from which to draw will be especially affected. Social enterprises will be called on to take up the slack. The aim of this paper is to provide a more comprehensive picture of the social enterprise as an organization and to understand the impact that context/ecosystem has on a social enterprise as it develops.Keywords: social enterprises, structuration, embeddedness, ecosystem
Procedia PDF Downloads 13210772 Applications for Accounting of Inherited Object-Oriented Class Members
Authors: Jehad Al Dallal
Abstract:
A class in an Object-Oriented (OO) system is the basic unit of design, and it encapsulates a set of attributes and methods. In OO systems, instead of redefining the attributes and methods that are included in other classes, a class can inherit these attributes and methods and only implement its unique attributes and methods, which results in reducing code redundancy and improving code testability and maintainability. Such mechanism is called Class Inheritance. However, some software engineering applications may require accounting for all the inherited class members (i.e., attributes and methods). This paper explains how to account for inherited class members and discusses the software engineering applications that require such consideration.Keywords: class flattening, external quality attribute, inheritance, internal quality attribute, object-oriented design
Procedia PDF Downloads 27510771 Code-Switching among Local UCSI Stem and N-Stem Undergraduates during Knowledge Sharing
Authors: Adeela Abu Bakar, Minder Kaur, Parthaman Singh
Abstract:
In the Malaysian education system, a formal setting of English language learning takes place in a content-based classroom (CBC). Until recently, there is less study in Malaysia, which researched the effects of code-switching (CS) behaviour towards the students’ knowledge sharing (KS) with their peers. The aim of this study is to investigate the frequency, reasons, and effect that CS, from the English language to Bahasa Melayu, has among local STEM and N-STEM undergraduates towards KS in a content-based classroom. The study implies a mixed-method research design with questionnaire and interviews as the instruments. The data is collected through distribution of questionnaires and interviews with the undergraduates. The quantitative data is analysed using SPSS in simple frequencies and percentages, whereas qualitative data involves organizing the data into themes, followed by analysis. Findings found that N-STEM undergraduates code-switch more as compared to STEM undergraduates. In addition to that, both the STEM and N-STEM undergraduates agree that CS acts as a catalyst towards KS in a content-based classroom. However, they also acknowledge that excess use of CS can be a hindrance towards KS. The findings of the study can benefit STEM and N-STEM undergraduates, education policymakers, language teachers, university educators, and students with significant insights into the role of CS towards KS in a content-based classroom. Some of the recommendations that can be applied for future studies are that the number of participants can be increased, an observation to be included for the data collection.Keywords: switching, content-based classroom, content and language integrated learning, knowledge sharing, STEM and N-STEM undergraduates
Procedia PDF Downloads 13710770 Prisoners for Sexual Offences: Custodial Regime, Prison Experience and Reintegration Interventions
Authors: Nikolaos Koulouris, Anna Kasapoglou, Dimitris Koros
Abstract:
The paper aims to present the course of ongoing research concerning the treatment of pretrial detainees, convicted or released prisoners for sexual offenses, an area that has not received much attention in Greece in terms of the prison experience and the reintegration potentials regarding this specific category of prisoners. The study plan provides for the use of a combination of research methods (focus groups with prisoners, structured individual interviews with prisoners and prison staff). Also, interviews with ex-prisoners detained regarding sexual offenses will take place. In Greece, there are no special provisions for the treatment of sexual offenders in prison, nor are there any special programs in place for their rehabilitation. Sexual offenders are usually separated from other prisoners, as the informal code of the social organization of the prison community dictates, despite no relevant legal framework. The study aims to explore the reasons for the separate detention of sexual offenders and discuss their special (non) treatment from different points of view, namely the legality and legitimacy of this discriminatory practice in terms of prisoners’ protection, safety, stigmatization, and possible social exclusion, as well as their post-release expectations and social reintegration potentials. The purpose of the research is the exploration of the prison experience of sexual offenders, the exercise of their legal rights, their adjustment to the demands of social life in prison, as well as the role of prison officers and various interventions aiming to their preparation for reentry to society. The study will take into consideration the European and international prison/penitentiary standards and best practices in order to examine the issue comparatively, while the contribution of the United Nations and the Council of Europe and its standards will be used to assess the treatment of sexual offenders in terms of its compatibility to international and European model-rules and trends. The outcome will be utilized to form main directions and propositions for a coherent and consistent human rights-based and social integration-oriented penal policy regarding the treatment of persons accused or convicted of sexual offenses in Greece.Keywords: prisoners’ treatment, sex offenders, social exclusion, social reintegration
Procedia PDF Downloads 15610769 Using TRACE and SNAP Codes to Establish the Model of Maanshan PWR for SBO Accident
Authors: B. R. Shen, J. R. Wang, J. H. Yang, S. W. Chen, C. Shih, Y. Chiang, Y. F. Chang, Y. H. Huang
Abstract:
In this research, TRACE code with the interface code-SNAP was used to simulate and analyze the SBO (station blackout) accident which occurred in Maanshan PWR (pressurized water reactor) nuclear power plant (NPP). There are four main steps in this research. First, the SBO accident data of Maanshan NPP were collected. Second, the TRACE/SNAP model of Maanshan NPP was established by using these data. Third, this TRACE/SNAP model was used to perform the simulation and analysis of SBO accident. Finally, the simulation and analysis of SBO with mitigation equipments was performed. The analysis results of TRACE are consistent with the data of Maanshan NPP. The mitigation equipments of Maanshan can maintain the safety of Maanshan in the SBO according to the TRACE predictions.Keywords: pressurized water reactor (PWR), TRACE, station blackout (SBO), Maanshan
Procedia PDF Downloads 19410768 An Ab Initio Study of Delafossite Transparent Conductive Oxides Cu(In, Ga)O2 and Absorbers Films Cu(In, Ga)S2 in Solar-Cell
Authors: Mokdad Sakhri, Youcef Bouhadda
Abstract:
Thin film chalcopyrite technology is thus nowadays a solid candidate for photovoltaic cells. The currently used window layer for the solar cell Cu(In,Ga)S2 is our interest point in this work. For this purpose, we have performed a first-principles study of structural, electronic and optical properties for both delafossite transparent conductive oxides Cu (In, Ga)O2 and absorbers films Cu(In,Ga)S2. The calculations have been carried out within the local density functional (LDA) and generalized gradient approximations (GGA) combined with the hubbard potential using norm-conserving pseudopotentials and a plane-wave basis with ABINIT code. We have found the energy gap is :1.6, 2.53, 3.6, 3.8 eV for CuInS2, CuGaS2, CuInO2 and CuGaO2 respectively. The results are in good agreement with experimental results.Keywords: ABINIT code, DFT, electronic and optical properties, solar-cell absorbers, delafossite transparent conductive oxides
Procedia PDF Downloads 57010767 [Keynote Speech]: Evidence-Based Outcome Effectiveness Longitudinal Study on Three Approaches to Reduce Proactive and Reactive Aggression in Schoolchildren: Group CBT, Moral Education, Bioneurological Intervention
Authors: Annis Lai Chu Fung
Abstract:
While aggression had high stability throughout developmental stages and across generations, it should be the top priority of researchers and frontline helping professionals to develop prevention and intervention programme for aggressive children and children at risk of developing aggressive behaviours. Although there is a substantial amount of anti-bullying programmes, they gave disappointingly small effect sizes. The neglectful practical significance could be attributed to the overly simplistic categorisation of individuals involved as bullies or victims. In the past three decades, the distinction between reactive and proactive aggression has been well-proved. As children displaying reactively aggressive behaviours have distinct social-information processing pattern with those showing proactively aggressive behaviours, it is critical to identify the unique needs of the two subtypes accordingly when designing an intervention. The onset of reactive aggression and proactive aggression was observed at earliest in 4.4 and 6.8 years old respectively. Such findings called for a differential early intervention targeting these high-risk children. However, to the best of the author’s knowledge, the author was the first to establish an evidence-based intervention programme against reactive and proactive aggression. With the largest samples in the world, the author, in the past 10 years, explored three different approaches and their effectiveness against aggression quantitatively and qualitatively with longitudinal design. The three approaches presented are (a) cognitive-behavioral approach, (b) moral education, with Chinese marital arts and ethics as the medium, and (c) bioneurological measures (omega-3 supplementation). The studies adopted a multi-informant approach with repeated measures before and after the intervention, and follow-up assessment. Participants were recruited from primary and secondary schools in Hong Kong. In the cognitive-behavioral approach, 66 reactive aggressors and 63 proactive aggressors, aged from 11 to 17, were identified from 10,096 secondary-school children with questionnaire and subsequent structured interview. Participants underwent 10 group sessions specifically designed for each subtype of aggressor. Results revealed significant declines in aggression levels from the baseline to the follow-up assessment after 1 year. In moral education through the Chinese martial arts, 315 high-risk aggressive children, aged 6 to 12 years, were selected from 3,511 primary-school children and randomly assigned into four types of 10-session intervention group, namely martial-skills-only, martial-ethics-only, both martial-skills-and-ethics, and physical fitness (placebo). Results showed only the martial-skills-and-ethics group had a significant reduction in aggression after treatment and 6 months after treatment comparing with the placebo group. In the bioneurological approach, 218 children, aged from 8 to 17, were randomly assigned to the omega-3 supplement group and the placebo group. Results revealed that compared with the placebo group, the omega-3 supplement group had significant declines in aggression levels at the 6-month follow-up assessment. All three approaches were effective in reducing proactive and reactive aggression. Traditionally, intervention programmes against aggressive behaviour often adapted the cognitive and/or behavioural approach. However, cognitive-behavioural approach for children was recently challenged by its demanding requirement of cognitive ability. Traditional cognitive interventions may not be as beneficial to an older population as in young children. The present study offered an insightful perspective in aggression reduction measures.Keywords: intervention, outcome effectiveness, proactive aggression, reactive aggression
Procedia PDF Downloads 22210766 Legal Provisions on Child Pornography in Bangladesh: A Comparative Study on South Asian Landscape
Authors: Monira Nazmi Jahan, Nusrat Jahan Nishat
Abstract:
'Child Pornography' is a sex crime that portrays illegal images and videos of a minor over the Internet and now has become a social concern with the increase of commission of this crime. The major objective of this paper is to identify and examine the laws relating to child pornography in Bangladesh and to compare this with other South Asian countries. In Bangladesh to prosecute under child pornography, provisions have been made in ‘Digital Security Act, 2018’ where it has been defined as involving child in areas of child sexuality or in sexuality and whoever commits the crime will be punished for 10 years imprisonment or 10 lac taka fine. In India, the crime is dealt with ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) where the offenders for commission of this crime has been divided separately and has provision for punishments starting from three years to rigorous life imprisonment and shall also be liable to fine. In the Maldives, there is ‘Special Provisions Act to Deal with Child Sex Abuse Offenders, Act number 12/2009’. In this act it has been provided that a person is guilty of such an act if intentionally runs child prostitution, involves child in the creation of pornography or displays child’s sexual organ in pornography then shall be punished between 20 to 25 years of imprisonment. Nepal prosecutes this crime through ‘Act Relating to Children, 2018’ and the conviction of using child in prostitution or sexual services is imprisonment up to fifteen years and fine up to one hundred fifty thousand rupees. In Pakistan, child pornography is prosecuted with ‘Pakistan Penal Code Child Abuse Amendment Act, 2016’. This provides that one is guilty of this offence if he involves child with or without consent in such activities. It provides punishment for two to seven years of imprisonment or fine from two hundred thousand to seven hundred thousand rupees. In Bhutan child pornography is not explicitly addressed under the municipal laws. The Penal Code of Bhutan penalizes all kinds of pornography including child pornography under the provisions of computer pornography and the offence shall be a misdemeanor. Child Pornography is also prohibited under the ‘Child Care and Protection Act’. In Sri Lanka, ‘The Penal Code’ de facto criminalizes child prohibition and has a penalty of two to ten years and may also be liable to fine. The most shocking scenario exists in Afghanistan. There is no specific law for the protection of children from pornography, whereas this serious crime is present there. This paper will be conducted through a qualitative research method that is, the primary sources will be laws, and secondary sources will be journal articles and newspapers. The conclusion that can be drawn is except Afghanistan all other South Asian countries have laws for controlling this crime but still have loopholes. India has the most amended provisions. Nepal has no provision for fine, and Bhutan does not mention any specific punishment. Bangladesh compared to these countries, has a good piece of law; however, it also has space to broaden the laws for controlling child pornography.Keywords: child abuse, child pornography, life imprisonment, penal code, South Asian countries
Procedia PDF Downloads 22910765 Influence of Psychosocial Factors on Physical Activity Level among Individuals with Asthma
Authors: Awotidebe Taofeek, Oyinsuyi Oluwafunmbi
Abstract:
Psychosocial factors play a significant role in physical activity participation in diseased conditions and the general population. However, little is known about the role of exercise self-efficacy (ESE), exercise perceived barriers (EPB), and social support (SOS) in patients with asthma. This study investigated the influence of psychosocial factors on physical activity participation in patients with asthma in ile-ife. This cross-sectional study involved 130 patients with asthma. They were recruited from the Chest Clinic of the Obafemi Awolowo University Teaching Hospitals Complex, Ile-ife using purposive sampling technique. Ethical approval was obtained from the Ethics and Research Committee of the Obafemi Awolowo University Teaching Hospitals Complex, Ile-ife, Nigeria. Socio-demographic characteristics of respondents were recorded. Information on ESE, EPB, and SOS were obtained using Exercise Self-Efficacy, Exercise Benefit, and Barrier and Medical Outcome Social Support Scales respectively. Physical activity level was assessed in the last 7 days using international physical activity questionnaire. Descriptive and inferential statistics were used to analyze the data. Alpha level was set at p<0.5. The mean age of the respondents was 25.15 ± 9.38, and a majority, 110 (84.60%), engaged in low physical activity, 69(53%) had low exercise self-efficacy. However, less than two-third 80 (62.20%) reported high social support, with the majority of 95 (73.10%) reported high exercise perceived barriers. The means of ESE for male and femalerespondents were 29.01 ± 20.62 and 24.35 ± 17.36, respectively. The means of SOS formale and female respondents were 49.52 ± 22.22 and 61.87 ± 22.66, respectively. Themeans of EPB for male and female respondents were 53.37 ± 10.23 and 57.43 ± 9.65, respectively. The respondents were comparable in exercise self-efficacy and physicalactivity level (p>0.05). However, there were significant differences in social support (t=-2.791; p=0.006) and exercise perceived barriers (t=-2.108, p=0.037).Theresultsshowthattherewasasignificantrelationshipbetweenexerciseperceivedbarriersandlowphysicalactivitylevel(r=-0.216;p=0.023).TherewasasignificantassociationbetweenExerciseself-efficacyandmarried individuals(OR=0.967;95%CI=0.936-0.998;p= 0.037). Similarly, However,thereweresignificantassociationsbetweensocialsupport Andagegroup35-54years(OR=1.036;95%CI=1.007-1.067;p=0.014),females(OR= 1.024;95%CI=1.006;p=0.009)andmarriedindividuals(OR=1.049;95%CI=1.020-1.079. p=0.001).Therewasasignificantassociationbetweenexerciseperceivedbarriersand females(OR=1.043;95%CI=1.002-1.085;p=0.040).However, thereweresignificant associationsbetweenexerciseperceivedbarriersandoccupationgroup;civilservants (OR=1.092;95%CI=1.009-1.182;p=0.028),retiree(OR=1.092;95%CI=1.040-1.469;p= 0.016)andstudents(OR=1.110;95%CI=1.040;p=0.002). Inconclusion,agreaterpercentageofpatientswithasthmahadlowphysicalactivityleveland it was associatedwithhighexerciseperceivedbarriers,whileexerciseself-efficacyandsocialsupportwerenot.Keywords: asthma, psychosocial factors, physical activity, physical fitness
Procedia PDF Downloads 12610764 Didacticization of Code Switching as a Tool for Bilingual Education in Mali
Authors: Kadidiatou Toure
Abstract:
Mali has started experimentation of teaching the national languages at school through the convergent pedagogy in 1987. Then, it is in 1994 that it will become widespread with eleven of the thirteen former national languages used at primary school. The aim was to improve the Malian educational system because the use of French as the only medium of instruction was considered a contributing factor to the significant number of student dropouts and the high rate of repetition. The Convergent pedagogy highlights the knowledge acquired by children at home, their vision of the world and especially the knowledge they have of their mother tongue. That pedagogy requires the use of a specific medium only during classroom practices and teachers have been trained in this sense. The specific medium depends on the learning content, which sometimes is French, other times, it is the national language. Research has shown that bilingual learners do not only use the required medium in their learning activities, but they code switch. It is part of their learning processes. Currently, many scholars agree on the importance of CS in bilingual classes, and teachers have been told about the necessity of integrating it into their classroom practices. One of the challenges of the Malian bilingual education curriculum is the question of ‘effective languages management’. Theoretically, depending on the classrooms, an average have been established for each of the involved language. Following that, teachers make use of CS differently, sometimes, it favors the learners, other times, it contributes to the development of some linguistic weaknesses. The present research tries to fill that gap through a tentative model of didactization of CS, which simply means the practical management of the languages involved in the bilingual classrooms. It is to know how to use CS for effective learning. Moreover, the didactization of CS tends to sensitize the teachers about the functional role of CS so that they may overcome their own weaknesses. The overall goal of this research is to make code switching a real tool for bilingual education. The specific objectives are: to identify the types of CS used during classroom activities to present the functional role of CS for the teachers as well as the pupils. to develop a tentative model of code-switching, which will help the teachers in transitional classes of bilingual schools to recognize the appropriate moment for making use of code switching in their classrooms. The methodology adopted is a qualitative one. The study is based on recorded videos of teachers of 3rd year of primary school during their classroom activities and interviews with the teachers in order to confirm the functional role of CS in bilingual classes. The theoretical framework adopted is the typology of CS proposed by Poplack (1980) to identify the types of CS used. The study reveals that teachers need to be trained on the types of CS and the different functions they assume and on the consequences of inappropriate use of language alternation.Keywords: bilingual curriculum, code switching, didactization, national languages
Procedia PDF Downloads 7210763 Ethical Finance and Islamic Finance: Particularities, Possible Convergence and Potential Development
Authors: Safa Ougoujil, Sidi Mohamed Rigar
Abstract:
Economics is not an exact science. It cannot be from the moment it is a social science that concerns society organization, a human science that depends on the behavior of the men and women who make a part of this society. Therefore, it cannot ignore morality, the instinctive sense of good and evil, the natural order which place us between certain values, and which religion often sheds light on. In terms of finance, the reference to ethics is becoming more popular than ever. This is naturally due to the growing financial crises. Finance is less and less ethical, but some financial practices have continued to do so. This is the case of ethical finance and Islamic finance. After attempting to define the concepts of ethical finance and Islamic finance, in a period when financial innovation seeks to encourage differentiation in order to create more profit margins, this article attempts to expose the particularities, the convergences and the potentialities of development of these two sensibilities.Keywords: convergences, ethical finance, Islamic finance, potential development
Procedia PDF Downloads 19610762 Teachers’ Perceptions of the Efficacy of Social Stories in the Development of Social Skills for Students with Autism in Saudi Arabia
Authors: Faihan Alotaibi
Abstract:
This study explores Saudi teachers’ perceptions of the efficacy of social stories in the development of social skills in students with autism in Riyadh, Saudi Arabia in two phases. Data were collected in sequential quantitative and qualitative phases. Participants in this study were 100 teachers in the quantitative phase and 15 teachers were interviewed. In this poster, the researcher will present the data result in the qualitative second phase in which an understanding of teachers’ experiences was deepened by conducting semi-structured interviews with a purposeful sample of fifteen teachers of diverse experience, covering six initial themes: the social story concept, sources of social stories, the effectiveness of social stories in improving social skills in students with autism, barriers to using social stories for students with autism, cultural consideration and context of social stories, and factors which contribute to the best use of social stories to developing of social skills for students with autism.Keywords: autism, social storyteachers’ perceptions, intervention, social skills
Procedia PDF Downloads 38210761 The Challenge of Assessing Social AI Threats
Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi
Abstract:
The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.Keywords: social threats, artificial Intelligence, mitigation, social experiment
Procedia PDF Downloads 6610760 The Social Origin Pay Gap in the UK Household Longitudinal Study
Authors: Michael Vallely
Abstract:
This paper uses data from waves 1 to 10 (2009-2019) of the UK Household Longitudinal Study to examine the social origin pay gap in the UK labour market. We find that regardless of how we proxy social origin, whether it be using the dominance approach, total parental occupation, parental education, total parental education, or the higher parental occupation and higher parental education, the results have one thing in common; in all cases, we observe a significant social origin pay gap for those from the lower social origins with the largest pay gap observed for those from the ‘lowest’ social origin. The results may indicate that when we consider the occupational status and education of both parents, previous estimates of social origin pay gaps and the number of individuals affected may have been underestimated. We also observe social origin pay gaps within educational attainment groups, such as degree holders, and within professional and managerial occupations. Therefore, this paper makes a valuable contribution to the social origin pay gap literature as it provides empirical evidence of a social origin pay gap using a large-scale UK dataset and challenges the argument that education is the great ‘social leveller’.Keywords: social class, social origin, pay gaps, wage inequality
Procedia PDF Downloads 14410759 Contactless Attendance System along with Temperature Monitoring
Authors: Nalini C. Iyer, Shraddha H., Anagha B. Varahamurthy, Dikshith C. S., Ishwar G. Kubasad, Vinayak I. Karalatti, Pavan B. Mulimani
Abstract:
The current scenario of the pandemic due to COVID-19 has led to the awareness among the people to avoid unneces-sary contact in public places. There is a need to avoid contact with physical objects to stop the spreading of infection. The contactless feature has to be included in the systems in public places wherever possible. For example, attendance monitoring systems with fingerprint biometric can be replaced with a contactless feature. One more important protocol followed in the current situation is temperature monitoring and screening. The paper describes an attendance system with a contactless feature and temperature screening for the university. The system displays a QR code to scan, which redirects to the student login web page only if the location is valid (the location where the student scans the QR code should be the location of the display of the QR code). Once the student logs in, the temperature of the student is scanned by the contactless temperature sensor (mlx90614) with an error of 0.5°C. If the temperature falls in the range of the desired value (range of normal body temperature), then the attendance of the student is marked as present, stored in the database, and the door opens automatically. The attendance is marked as absent in the other case, alerted with the display of temperature, and the door remains closed. The door is automated with the help of a servomotor. To avoid the proxy, IR sensors are used to count the number of students in the classroom. The hardware system consisting of a contactless temperature sensor and IR sensor is implemented on the microcontroller, NodeMCU.Keywords: NodeMCU, IR sensor, attendance monitoring, contactless, temperature
Procedia PDF Downloads 18810758 Initial Concept of Islamic Social Entrepreneurship: Identification of Research Gap from Existing Model
Authors: Mohd Adib Abd Muin
Abstract:
Social entrepreneurship has become a new phenomenon in a country in order to reduce social problems and eradicate poverty communities. However, the study based on Islamic social entrepreneurship from the social entrepreneurial activity is still new especially in the Islamic perspective. In addition, this research found that is lacking of model on social entrepreneurship that focus on Islamic perspective. Therefore, the objective of this paper is to identify the issues and research gap based on Islamic perspective from existing models and to develop a concept of Islamic social entrepreneurship according to Islamic perspective and Maqasid Shari’ah. The research method used in this study is literature review and comparative analysis from 11 existing models of social entrepreneurship. The research finding shows that 11 existing models on social entrepreneurship has been analyzed and it shows that the existing models on social entrepreneurship do not emphasize on Islamic perspective.Keywords: component, social entrepreneurship, Islamic perspective, research gap
Procedia PDF Downloads 44910757 The Contribution of Buddhist-Based Mindfulness Practices on Ethical Leadership: A Qualitative Study of Organizational Leaders in Thailand
Authors: Kunkanit Sutamchai, Kate E. Rowlands
Abstract:
Recent public ethical scandals in many organizations around the world have raised concern about organizational ethics, which have, in turn, made ethical behaviors and conducts on the part of leaders become more critical topics in organizational studies. However, current research on the benefits of mindfulness within the workplace contexts has predominantly focused on stress reduction and work performance enhancement, while the aspects of ethical behavior development have been far less investigated in mindfulness research in the organizational and management fields. Only recently has there been an emerging call for organizational researchers and practitioners to study mindfulness concepts and practices from the original Buddhist perspectives given that ethics is regarded as a foundation for Buddhist mindfulness. Yet little, if any, empirical research on the contributions of mindfulness practices to ethical leadership has been done in Eastern Buddhist contexts. Therefore, this study aims to explore the extent to which and how Buddhist-based mindfulness practices can influence organizational leaders’ ethical values and practices. On this basis, Thailand was selected as a context of study due to a predominantly Buddhist society and culture. Qualitative data were gathered through in-depth semi-structured interviews with twenty executive leaders from various private organizations in Thailand, who practice Buddhist-based mindfulness meditation regularly. The findings from this study shed light on the role Buddhist-based mindfulness practices can play in promoting ethical behavior among executive leaders in Thailand. The results also suggest that ethical values and practices influenced by Buddhist-based mindfulness practices are well aligned with the elements appeared in the inter-disciplinary and cross-cultural ethical leadership framework, namely: humane, justice, sustainability and responsibility, and moderation. This study concludes that the integration of ethical dimensions to mindfulness practices may provide promising opportunities for ethical leadership development, particularly in the context of Thailand. This could contribute significantly to the future development of both organizations and society at large. The study also suggests that mindfulness interventions in organizational contexts should place more explicit emphasis on ethics. This may be done by relating the ethical principles underlying Buddhist-based mindfulness to other ethical systems in different contexts and cultures where they can be aligned.Keywords: Buddhism, ethical leadership, leadership development, mindfulness, Thailand, training
Procedia PDF Downloads 17310756 The Ethical Influence in the Political Configuration of Society: An Articulation between Phanomenologie Des Geistes and the Grundlinien Der Philosophie Des Rechts
Authors: Joao Gouveia
Abstract:
This is a study about Hegelian political and moral philosophy. Our aim is to understand the relevance that Hegel attributes to ethics in the concrete political configuration of society. But our analysis isn’t limited to Hegel’s most known political work (the Grundlinien der Philosophie des Rechts). Instead, we also analyze the Phänomenologie des Geistes and establish a comparison between them. In the Moralität of the Grundlinien der Philosophie des Rechts, consciousness acquires the disposition that allows it to see any determination as its own (the certainty about itself or Gewissen). This certainty is the essential disposition that makes itself felt throughout all Sittlichkeit –the dispositions of family member and citizen (Bürger) are only configurations of it. Although consciousness is alienated in these dispositions, it doesn’t lose the certainty about itself that it reached in the Moralität. As our major finding, we point out that it is the moral learning that allows consciousness to resist the temptation of focusing so intensely on specific content that it excludes all the others (a temptation that is stimulated by the very intensity with which each content presents itself to consciousness). As the world of Bildung of the Phänomenologie des Geistes isn’t preceded by a sphere of Moralität, consciousness is thrown into a frenzy of destruction of all the powers of objectivity, and it ends up having to withdraw from the concrete contents and to focus in an abstract whole, where it doesn’t find opposite determinacies. The evidence supporting our thesis is the fact that the transition from abstraction into particularity, that we see in the Grundlinien der Philosophie des Rechts, allows the preservation of abstraction (it isn’t lost as we penetrate in particularity). On the other hand, the transition we find in the Phänomenologie des Geistes is a transition from particularity to abstraction, which takes every particularity to be eliminated in the war with others. While in the Phänomenologie des Geistes, the state may only be seen as a moment or facet of the object (it is only Staatsmacht); in the Grundlinien der Philosophie des Rechts, it is seen as a whole that contains various moments in itself (Staat). Therefore, the element of the Phänomenologie des Geistes that is closer to the State of the Grundlinien der Philosophie des Rechts is language (or the language of perversion) –something that can’t be defined as an individuality. This way, we want to show that, between the Phänomenologie des Geistes and the Grundlinien der Philosophie des Rechts, there is truly no remarkable evolution to report in Hegel’s ethical thought. What the difference in the structure of the two works show is a specific thesis respecting the influence of ethics in the configuration of society, and this thesis has implications at various levels, including in the philosophy of history.Keywords: Grundlinien der Philosophie des Rechts, Hegelian ethics, Hegelian politics, Phänomenologie des Geistes
Procedia PDF Downloads 9710755 Numerical Analysis of 3D Electromagnetic Fields in Annular Induction Plasma
Authors: Abderazak Guettaf
Abstract:
The mathematical models of the physical phenomena interacting in inductive plasma were described by the physics equations of the continuous mediums. A 3D model based on magnetic potential vector and electric scalar potential (A, V) formulation is used. The finished volume method is applied to electromagnetic equation, to obtain the field distribution inside the plasma. The numerical results of the method developed on a basic model designed starting from a real three-dimensional model were exposed. From the mathematical model 3D spreading assumptions and boundary conditions, we evaluated the electric field in the load and we have developed a numerical code made under the MATLAB environment, all verifying the effectiveness and validity of this code.Keywords: electric field, 3D magnetic potential vector and electric scalar potential (A, V) formulation, finished volumes, annular plasma
Procedia PDF Downloads 49410754 A Novel Approach to Design of EDDR Architecture for High Speed Motion Estimation Testing Applications
Authors: T. Gangadhararao, K. Krishna Kishore
Abstract:
Motion Estimation (ME) plays a critical role in a video coder, testing such a module is of priority concern. While focusing on the testing of ME in a video coding system, this work presents an error detection and data recovery (EDDR) design, based on the residue-and-quotient (RQ) code, to embed into ME for video coding testing applications. An error in processing Elements (PEs), i.e. key components of a ME, can be detected and recovered effectively by using the proposed EDDR design. The proposed EDDR design for ME testing can detect errors and recover data with an acceptable area overhead and timing penalty.Keywords: area overhead, data recovery, error detection, motion estimation, reliability, residue-and-quotient (RQ) code
Procedia PDF Downloads 43210753 An Examination of the Relationship between Adolescents' Social Media Use and Social Appearance Anxiety
Authors: Aynur Bütün Ayhan, Utku Beyazıt
Abstract:
Adolescents can be heavily influenced by social media content as they develop their identities and body images. Therefore, the intensive use of social media platforms may have important effects on their body image beliefs. In this context, the objective of the present study was to assess the relationship between adolescents' social media use and their body image concerns. The study included 265 adolescents (133 girls and 132 boys) between the ages of 15 and 17 who were attending a high school in Ankara, Türkiye. In the study, the adolescents were administered the Social Media Addiction Scale to assess their level of social media use and the Social Appearance Anxiety Scale to assess their social appearance anxiety. Prior to analysis, a normality test was applied, and it was determined that the data displayed a non-parametric distribution. As a result, a significant positive relationship (r=.322, p<.01) was found between adolescents' level of social use and social appearance anxiety. It was also determined that social media addiction and social appearance anxiety significantly differed (p<.05) according to adolescents' opinions about their own bodies, being influenced by body images they see on social media and weight perceptions. The findings suggest that social media use should be managed carefully for adolescents to develop a healthy body image.Keywords: social media, adolescent, social appearence, anxiety
Procedia PDF Downloads 2610752 Sociolinguistic and Classroom Functions of Using Code-Switching in CLIL Context
Authors: Khatuna Buskivadze
Abstract:
The aim of the present study is to investigate the sociolinguistic and classroom functions and frequency of Teacher’s Code Switching (CS) in the Content and Language Integrated (CLIL) Lesson. Nowadays, Georgian society struggles to become the part of the European world, the English language itself plays a role in forming new generations with European values. Based on our research conducted in 2019, out of all 114 private schools in Tbilisi, full- programs of CLIL are taught in 7 schools, while only some subjects using CLIL are conducted in 3 schools. The goal of the former research was to define the features of Content and Language Integrated learning (CLIL) methodology within the process of teaching English on the Example of Georgian private high schools. Taking the Georgian reality and cultural features into account, the modified version of the questionnaire, based on the classification of using CS in ESL Classroom proposed By Ferguson (2009) was used. The qualitative research revealed students’ and teacher’s attitudes towards teacher’s code-switching in CLIL lesson. Both qualitative and quantitative research were conducted: the observations of the teacher’s lessons (Recording of T’s online lessons), interview and the questionnaire among Math’s T’s 20 high school students. We came to the several conclusions, some of them are given here: Math’s teacher’s CS behavior mostly serves (1) the conversational function of interjection; (2) the classroom functions of introducing unfamiliar materials and topics, explaining difficult concepts, maintaining classroom discipline and the structure of the lesson; The teacher and 13 students have negative attitudes towards using only Georgian in teaching Math. The higher level of English is the more negative is attitude towards using Georgian in the classroom. Although all the students were Georgian, their competence in English is higher than in Georgian, therefore they consider English as an inseparable part of their identities. The overall results of the case study of teaching Math (Educational discourse) in one of the private schools in Tbilisi will be presented at the conference.Keywords: attitudes, bilingualism, code-switching, CLIL, conversation analysis, interactional sociolinguistics.
Procedia PDF Downloads 16210751 Ethical Decision-Making by Healthcare Professionals during Disasters: Izmir Province Case
Authors: Gulhan Sen
Abstract:
Disasters could result in many deaths and injuries. In these difficult times, accessible resources are limited, demand and supply balance is distorted, and there is a need to make urgent interventions. Disproportionateness between accessible resources and intervention capacity makes triage a necessity in every stage of disaster response. Healthcare professionals, who are in charge of triage, have to evaluate swiftly and make ethical decisions about which patients need priority and urgent intervention given the limited available resources. For such critical times in disaster triage, 'doing the greatest good for the greatest number of casualties' is adopted as a code of practice. But there is no guide for healthcare professionals about ethical decision-making during disasters, and this study is expected to use as a source in the preparation of the guide. This study aimed to examine whether the qualities healthcare professionals in Izmir related to disaster triage were adequate and whether these qualities influence their capacity to make ethical decisions. The researcher used a survey developed for data collection. The survey included two parts. In part one, 14 questions solicited information about socio-demographic characteristics and knowledge levels of the respondents on ethical principles of disaster triage and allocation of scarce resources. Part two included four disaster scenarios adopted from existing literature and respondents were asked to make ethical decisions in triage based on the provided scenarios. The survey was completed by 215 healthcare professional working in Emergency-Medical Stations, National Medical Rescue Teams and Search-Rescue-Health Teams in Izmir. The data was analyzed with SPSS software. Chi-Square Test, Mann-Whitney U Test, Kruskal-Wallis Test and Linear Regression Analysis were utilized. According to results, it was determined that 51.2% of the participants had inadequate knowledge level of ethical principles of disaster triage and allocation of scarce resources. It was also found that participants did not tend to make ethical decisions on four disaster scenarios which included ethical dilemmas. They stayed in ethical dilemmas that perform cardio-pulmonary resuscitation, manage limited resources and make decisions to die. Results also showed that participants who had more experience in disaster triage teams, were more likely to make ethical decisions on disaster triage than those with little or no experience in disaster triage teams(p < 0.01). Moreover, as their knowledge level of ethical principles of disaster triage and allocation of scarce resources increased, their tendency to make ethical decisions also increased(p < 0.001). In conclusion, having inadequate knowledge level of ethical principles and being inexperienced affect their ethical decision-making during disasters. So results of this study suggest that more training on disaster triage should be provided on the areas of the pre-impact phase of disaster. In addition, ethical dimension of disaster triage should be included in the syllabi of the ethics classes in the vocational training for healthcare professionals. Drill, simulations, and board exercises can be used to improve ethical decision making abilities of healthcare professionals. Disaster scenarios where ethical dilemmas are faced should be prepared for such applied training programs.Keywords: disaster triage, medical ethics, ethical principles of disaster triage, ethical decision-making
Procedia PDF Downloads 24910750 Variables for Measuring the Impact of the Social Enterprises in the Field of Community Development
Authors: A. Irudaya Veni Mary, M. Victor Louis Anthuvan, P. Christie, A. Indira
Abstract:
In India, social enterprises are working to create social value in various fields including education; health; women and child development; environment protection and community development. Although social enterprises have brought about tremendous changes in the lives of beneficiaries, the importance of their works is not understood thoroughly. One of the ways to prove themselves is to measure the impact, which in recent times has received much attention. This paper focuses on the study of social value created by the social enterprises in the field of community development. It also aims to put forth a research tool for measuring the social value created by the social enterprises in the field of community development. A close-ended interview schedule was prepared to measure the social value creation and it was administered among 60 beneficiaries of two social enterprises who work in the field of community development. The study results show that the social enterprises have brought four types of impact in the life of their beneficiaries; economic impact, social impact, political impact and cultural impact. This study is limited to the social enterprises those who work towards community development. This empirical finding will enable the reader to understand various types of social value created by the social enterprises working in the field of community development. This study will also serve as guide for social enterprises in community development activities to measure their impact and thereby improve their operation towards the betterment of the society. This paper is derived from an empirical research carried out to describe the different types of social value created by the social enterprises in India.Keywords: social enterprise, social entrepreneurs, social impact, social value, tool for social impact measurement
Procedia PDF Downloads 27510749 Corporate Governance and Corporate Social Responsibility: Research on the Interconnection of Both Concepts and Its Impact on Non-Profit Organizations
Authors: Helene Eller
Abstract:
The aim of non-profit organizations (NPO) is to provide services and goods for its clientele, with profit being a minor objective. By having this definition as the basic purpose of doing business, it is obvious that the goal of an organisation is to serve several bottom lines and not only the financial one. This approach is underpinned by the non-distribution constraint which means that NPO are allowed to make profits to a certain extent, but not to distribute them. The advantage is that there are no single shareholders who might have an interest in the prosperity of the organisation: there is no pie to divide. The gained profits remain within the organisation and will be reinvested in purposeful projects. Good governance is mandatory to support the aim of NPOs. Looking for a measure of good governance the principals of corporate governance (CG) will come in mind. The purpose of CG is direction and control, and in the field of NPO, CG is enlarged to consider the relationship to all important stakeholders who have an impact on the organisation. The recognition of more relevant parties than the shareholder is the link to corporate social responsibility (CSR). It supports a broader view of the bottom line: It is no longer enough to know how profits are used but rather how they are made. Besides, CSR addresses the responsibility of organisations for their impact on society. When transferring the concept of CSR to the non-profit area it will become obvious that CSR with its distinctive features will match the aims of NPOs. As a consequence, NPOs who apply CG apply also CSR to a certain extent. The research is designed as a comprehensive theoretical and empirical analysis. First, the investigation focuses on the theoretical basis of both concepts. Second, the similarities and differences are outlined and as a result the interconnection of both concepts will show up. The contribution of this research is manifold: The interconnection of both concepts when applied to NPOs has not got any attention in science yet. CSR and governance as integrated concept provides a lot of advantages for NPOs compared to for-profit organisations which are in a steady justification to show the impact they might have on the society. NPOs, however, integrate economic and social aspects as starting point. For NPOs CG is not a mere concept of compliance but rather an enhanced concept integrating a lot of aspects of CSR. There is no “either-nor” between the concepts for NPOs.Keywords: business ethics, corporate governance, corporate social responsibility, non-profit organisations
Procedia PDF Downloads 24210748 Pushover Analysis of Reinforced Concrete Buildings Using Full Jacket Technics: A Case Study on an Existing Old Building in Madinah
Authors: Tarek M. Alguhane, Ayman H. Khalil, M. N. Fayed, Ayman M. Ismail
Abstract:
The retrofitting of existing buildings to resist the seismic loads is very important to avoid losing lives or financial disasters. The aim at retrofitting processes is increasing total structure strength by increasing stiffness or ductility ratio. In addition, the response modification factors (R) have to satisfy the code requirements for suggested retrofitting types. In this study, two types of jackets are used, i.e. full reinforced concrete jackets and surrounding steel plate jackets. The study is carried out on an existing building in Madinah by performing static pushover analysis before and after retrofitting the columns. The selected model building represents nearly all-typical structure lacks structure built before 30 years ago in Madina City, KSA. The comparison of the results indicates a good enhancement of the structure respect to the applied seismic forces. Also, the response modification factor of the RC building is evaluated for the studied cases before and after retrofitting. The design of all vertical elements (columns) is given. The results show that the design of retrofitted columns satisfied the code's design stress requirements. However, for some retrofitting types, the ductility requirements represented by response modification factor do not satisfy KSA design code (SBC- 301).Keywords: concrete jackets, steel jackets, RC buildings, pushover analysis, non-Linear analysis
Procedia PDF Downloads 36710747 Formulation Policy of Criminal Sanction in Indonesian Criminal Justice System
Authors: Dini Dewi Heniarti
Abstract:
This One of criminal sanctions that are often imposed by the judge is imprisonment. The issue on the imposition of imprisonment has been subject of contentious debate and criticism among various groups for a long time. In practice, the problematics of imprisonment lead to complicated problems. The impact of the reckless imposition of the imprisonment includes among others overcapacity of the correctional institution and increasing crimes within the correctional facilities. Therefore, there is a need for renewal of the existing condemnation paradigm, considering the developing phenomena associated with the penal imposition. Imprisonment as one element of the Indonesian penal system is an important and integral part of the other elements. The philosophy of the current penal system, which still refers to the Criminal Code, still carries the values of retaliation and fault-finding toward the offender. Therefore, it is important to reconstruct a new thought in order to realize a penal system that is represented in the formulation of a more humanistic criminal sanctionKeywords: criminal code, criminal sanction, Indonesian legal system, reconstruction of thought
Procedia PDF Downloads 22610746 Thermal and Hydraulic Design of Shell and Tube Heat Exchangers
Authors: Ahmed R. Ballil
Abstract:
Heat exchangers are devices used to transfer heat between two fluids. These devices are utilized in many engineering and industrial applications such as heating, cooling, condensation and boiling processes. The fluids might be in direct contact (mixed), or they separated by a solid wall to avoid mixing. In the present paper, interactive computer-aided design of shell and tube heat exchangers is developed using Visual Basic computer code as a framework. This design is based on the Bell-Delaware method, which is one of the very well known methods reported in the literature for the design of shell and tube heat exchangers. Physical properties for either the tube or the shell side fluids are internally evaluated by calling on an enormous data bank composed of more than a hundred fluid compounds. This contributes to increase the accuracy of the present design. The international system of units is considered in the developed computer program. The present design has an added feature of being capable of performing modification based upon a preset design criterion, such that an optimum design is obtained at satisfying constraints set either by the user or by the method itself. Also, the present code is capable of giving an estimate of the approximate cost of the heat exchanger based on the predicted surface area of the exchanger evaluated by the program. Finally, the present thermal and hydraulic design code is tested for accuracy and consistency against some of existed and approved designs of shell and tube heat exchangers.Keywords: bell-delaware method, heat exchangers, shell and tube, thermal and hydraulic design
Procedia PDF Downloads 149