Search results for: mobile online social networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14381

Search results for: mobile online social networks

9581 Non-Standard Forms of Reporting Domestic Violence: Analysis of the Phenomenon in the Perception of Operators of the Polish Emergency Number 112 and Polish Society

Authors: Joanna Kufel-Orlowska

Abstract:

Domestic violence is a social threat to public safety and order. It poses a threat not only to the family members of the perpetrator but also disturbs the functioning of society and even the state. In a situation of danger, an individual either defends himself or/and calls for help by contacting an appropriate institution whose aim is to ensure civil security. Most often, such contact takes place through a telephone conversation, which is aimed at diagnosing the problem and prompt intervention. People in different situations and in different ways, despite the general reporting standards, try to inform about the need for help. The article aims to present the results of research on non-standard forms of reporting domestic violence in the opinion of the Polish society and operators of the Polish emergency number 112 (911). The research was conducted in the form of a survey technique on a sample of 160 operators (purposeful selection) and 300 people living in Poland (random selection). The research was conducted in the form of online surveys. The study found that in Poland: 1. emergency number operators often receive reports of domestic violence although they are not always able to diagnose whether the case is strictly about violence; 2. non-standard reports of domestic violence are received by about 30% of emergency number operators. Non-standard should be understood as reports of violence that deviate from the norm, are unusual, or are reported by a non-victim. 3. The most common forms of reporting violence not directly are: pretending to talk to a friend, calling a cab, making an appointment with a dentist/doctor, calling a store and helping with the selection of goods, asking about the bank's hotline, not speaking (in order for the emergency number operator to hear what is going on). 4. Emergency number operators in Poland are properly trained and are able to recognize the threatening situation of the reporting party and conduct the conversation in a safe manner for the reporting party. On the other hand, Polish people support the ability to report violence in a non-standard way and would do so themselves in the event of a threat to their own life, health, or property, thus expecting the emergency number operator to recognize a report and help us.

Keywords: domestic violence, operator of the emergency number 112 (911), emergency call center, reporting domestic violence

Procedia PDF Downloads 84
9580 The Relationship between the Content of Inner Human Experience and Well-Being: An Experience Sampling Study

Authors: Xinqi Guo, Karen R. Dobkins

Abstract:

Background and Objectives: Humans are probably the only animals whose minds are constantly filled with thoughts, feelings and emotions. Previous studies have investigated human minds from different dimensions, including its proportion of time for not being present, its representative format, its personal relevance, its temporal locus, and affect valence. The current study aims at characterizing human mind by employing Experience Sampling Methods (ESM), a self-report research procedure for studying daily experience. This study emphasis on answering the following questions: 1) How does the contents of the inner experience vary across demographics, 2) Are certain types of inner experiences correlated with level of mindfulness and mental well-being (e.g., are people who spend more time being present happier, and are more mindful people more at-present?), 3) Will being prompted to report one’s inner experience increase mindfulness and mental well-being? Methods: Participants were recruited from the subject pool of UC San Diego or from the social media. They began by filling out two questionnaires: 1) Five Facet Mindfulness Questionnaire-Short Form, and 2) Warwick-Edinburgh Mental Well-being Scale, and demographic information. Then they participated in the ESM part by responding to the prompts which contained questions about their real-time inner experience: if they were 'at-present', 'mind-wandering', or 'zoned-out'. The temporal locus, the clarity, and the affect valence, and the personal importance of the thought they had the moment before the prompt were also assessed. A mobile app 'RealLife Exp' randomly delivered these prompts 3 times/day for 6 days during wake-time. After the 6 days, participants completed questionnaire (1) and (2) again. Their changes of score were compared to a control group who did not participate in the ESM procedure (yet completed (1) and (2) one week apart). Results: Results are currently preliminary as we continue to collect data. So far, there is a trend that participants are present, mind-wandering and zoned-out, about 53%, 23% and 24% during wake-time, respectively. The thoughts of participants are ranked to be clearer and more neutral if they are present vs. mind-wandering. Mind-wandering thoughts are 66% about the past, consisting 80% of inner speech. Discussion and Conclusion: This study investigated the subjective account of human mind by a tool with high ecological validity. And it broadens the understanding of the relationship between contents of mind and well-being.

Keywords: experience sampling method, meta-memory, mindfulness, mind-wandering

Procedia PDF Downloads 120
9579 The Antecedents of Customer-to-Customer Interaction to Brand and Communication Strategy: A Marketer’s Perspective

Authors: Kartina Sury Kariman

Abstract:

Brand-to-customer (B2C) engagement has been well established through the traditional platform such as direct sales, advertising, customer service center, customer hotline as well as brand usage experiences. Increasingly, interest to B2C has evolved to include customer-to-customer (C2C) interaction analysis aligned with the vast growth of web 2.0. Hence, discussion on C2C interaction and brand strategy have captured social media as it enables brands and C2C interaction to be connected in various ways, providing opportunities for marketers to shape their brand engagement strategy while reaching C2C as the targeted outcomes. The objective here is to provide a preliminary review of C2C interaction consisting the antecedents and consequences while highlighting areas of research interest within the context from marketers perspective and the business outcomes. This paper discusses how C2C interaction defines marketers’ brand and communication strategy and how social media trend shapes the strategy when promoting the awareness of life insurance industry and educating the target market.

Keywords: social media, brand engagement, customer interaction, customer engagement, brand strategy, life insurance

Procedia PDF Downloads 449
9578 Youth Voices on Experiences of (Dis)Advantage: A Case Study at a South African University

Authors: Oliver T. Gore

Abstract:

Social inequalities and inequity of outcomes in higher education (HE) persist in South Africa despite the government introducing policy that seeks to address social injustices brought about by previous apartheid policies. In addressing these social injustices, HE policy conceptualises inequalities under the concept of historical ‘disadvantage’ which is understood to be primarily race-based. The study adds on to the existing knowledge on inequalities through developing the dimensions of (dis)advantage, which have the potential to inform the South African HE policy on providing equal opportunities amongst diverse students to participate and succeed in their studies. Drawing from the capabilities approach, this study argues that (dis)advantage can be richly understood in terms of students’ capabilities, functionings and agency as opposed to a sole focus on race. The study argues that limited freedoms, lack of effective opportunities, and reduced agency for students to turn university resources into real achievements such as personal development, economic skills and social responsibility amounts to disadvantage, while the converse is also true. The study draws from qualitative interview data with honours students, university staff and Student Representative Council members from five different university departments at one South African university. This presentation uses results from 20 students and reveals what their university experiences tell us regarding students’ unfreedoms in relation to: the inability to make decisions, poor schooling backgrounds, inadequate finances, emotional stress, lack of social support, inability to understand the language of instruction, lack of safe transport and accommodation issues. Despite these unfreedoms, the data shows that the students aspired and persevered with their studies. Using theory and empirical data in conversation, the paper shows that there is a need to nuance the definition of (dis)advantage, particularly by focusing on how different forms of disadvantage intersect with each other.

Keywords: capabilities approach, (dis)advantage, higher education, social justice

Procedia PDF Downloads 132
9577 Assessment of the CSR of Telecom Operators in Cote d’Ivoire

Authors: Odile Amoncou, Djedje-Kossu Zahui

Abstract:

The integration of a Corporate Social Responsibility (CSR) approach within a company appears nowadays as a fundamental system of response to the different problems that threaten our planet. The abusive exploitation of natural resources, social inequalities, discrimination and poverty are some examples. Thus, faced with these different global problems, each company must include in its operating system measures or actions with the aim not only of achieving Sustainable Development Goals (SDGs) but also for the improvement of its performance and its brand internationally. The objective of this article is to assess the implementation of CSR by telecommunication companies. It is our belief that given its high energy consumption and proximity to society, the telecom sector must pay particular attention to environmental and social issues. Our study examines the CSR of three Ivorian telecom operators, namely ORANGE CI, MOOV Africa and MTN, by applying a series of performance indicators related to CSR management. We hope that our study will raise awareness about sustainability issues for all other Ivorian companies but also sub-Sahara African companies in general in order to encourage CEOs to make CSR concept a top priority.

Keywords: CSR, telecom, SDGs, cote d’Ivoire

Procedia PDF Downloads 66
9576 An Analysis of Millennials Using Secondhand Clothing as an Ongoing Fashion Trend

Authors: Patricia Sumod

Abstract:

There is a unique movement of fashion that features a trend around secondhand clothing. This is especially observed in the lifestyles of the millennials, where the concept of reusing apparel and accessories is noticeable and, therefore, slowly diminishing the high consumption of fast fashion and generating environmental awareness. This paper will focus on how this clothing trend influences and engages consumers in buying secondhand clothing and creating fashionable looks simultaneously. To further examine the millennials’ motivation towards consumption and using secondhand fashion, a concept as a trendsetter, this paper will take a closer look at their idea of concern for the environment. Considering second-hand clothing is a sustainable consumption practice, it will investigate the role of social influencers, trendsetters, and millennials in overall fashion consumption in this context. This study aims to understand how secondhand clothing and millennials differ from other consumers regarding the perception of fast-depleting natural resources, price sensitivity, vintage attachments, and psychographics. Secondly, the paper will also present the connection of emotion between millennials and secondhand clothing that may not be necessarily purchased but received. This study will reflect on the already identified influences in increased purchase behavior and an uncharted positive relationship between the consumer and the products. This behavior will further formulate into a habit by consumer segments, creating an expanded market for secondhand clothing. There is no definite indication that fast fashion will cease to exist, but slowing its rapid movement is an attempt to work toward a sustainable future. The conclusion will present possibilities for consumers to engage in C2C online interaction, thereby reinforcing a notable change in consumer behavior and attitude in contradiction to today’s extreme consumerism and willingness to be adaptable to a minimalist way of life. Fashion brands will then begin a new forecast to actively accommodate the new millennial concept of fashion that will advertise more concern than insatiability. The research will be with literature from various authors, insights provided by researchers on this new wave of consumers, and a qualitative approach with face-to-face interviews with a sample group who are in the practice of secondhand clothing consumption.

Keywords: second-hand clothing, millennials, sustainability, consumption practice, fashion environment.

Procedia PDF Downloads 51
9575 The Application of Participatory Social Media in Collaborative Planning: A Systematic Review

Authors: Yujie Chen , Zhen Li

Abstract:

In the context of planning transformation, how to promote public participation in the formulation and implementation of collaborative planning has been the focused issue of discussion. However, existing studies have often been case-specific or focused on a specific design field, leaving the role of participatory social media (PSM) in urban collaborative planning generally questioned. A systematic database search was conducted in December 2019. Articles and projects were eligible if they reported a quantitative empirical study applying participatory social media in the collaborative planning process (a prospective, retrospective, experimental, longitudinal research, or collective actions in planning practices). Twenty studies and seven projects were included in the review. Findings showed that social media are generally applied in public spatial behavior, transportation behavior, and community planning fields, with new technologies and new datasets. PSM has provided a new platform for participatory design, decision analysis, and collaborative negotiation most widely used in participatory design. Findings extracted several existing forms of PSM. PSM mainly act as three roles: the language of decision-making for communication, study mode for spatial evaluation, and decision agenda for interactive decision support. Three optimization content of PSM were recognized, including improving participatory scale, improvement of the grass-root organization, and promotion of politics. However, basically, participants only could provide information and comment through PSM in the future collaborative planning process, therefore the issues of low data response rate, poor spatial data quality, and participation sustainability issues worth more attention and solutions.

Keywords: participatory social media, collaborative planning, planning workshop, application mode

Procedia PDF Downloads 118
9574 Subsidiary Entrepreneurial Orientation, Trust in Headquarters and Performance: The Mediating Role of Autonomy

Authors: Zhang Qingzhong

Abstract:

Though there exists an increasing number of research studies on the headquarters-subsidiary relationship, and within this context, there is a focus on subsidiaries' contributory role to multinational corporations (MNC), subsidiary autonomy, and the conditions under which autonomy exerts an effect on subsidiary performance still constitute a subject of debate in the literature. The objective of this research is to study the MNC subsidiary autonomy and performance relationship and the effect of subsidiary entrepreneurial orientation and trust on subsidiary autonomy in the China environment, a phenomenon that has not yet been studied. The research addresses the following three questions: (i) Is subsidiary autonomy associated with MNC subsidiary performance in the China environment? (ii) How do subsidiary entrepreneurship and its trust in headquarters affect the level of subsidiary autonomy and its relationship with subsidiary performance? (iii) Does subsidiary autonomy have a mediating effect on subsidiary performance with subsidiary’s entrepreneurship and trust in headquarters? In the present study, we have reviewed literature and conducted semi-structured interviews with multinational corporation (MNC) subsidiary senior executives in China. Building on our insights from the interviews and taking perspectives from four theories, namely the resource-based view (RBV), resource dependency theory, integration-responsiveness framework, and social exchange theory, as well as the extant articles on subsidiary autonomy, entrepreneurial orientation, trust, and subsidiary performance, we have developed a model and have explored the direct and mediating effects of subsidiary autonomy on subsidiary performance within the framework of the MNC. To test the model, we collected and analyzed data based on cross-industry two waves of an online survey from 102 subsidiaries of MNCs in China. We used structural equation modeling to test measurement, direct effect model, and conceptual framework with hypotheses. Our findings confirm that (a) subsidiary autonomy is positively related to subsidiary performance; (b) subsidiary entrepreneurial orientation is positively related to subsidiary autonomy; (c) subsidiary’s trust in headquarters has a positive effect on subsidiary autonomy; (d) subsidiary autonomy mediates the relationship between entrepreneurial orientation and subsidiary performance; (e) subsidiary autonomy mediates the relationship between trust and subsidiary performance. Our study highlights the important role of subsidiary autonomy in leveraging the resource of subsidiary entrepreneurial orientation and its trust relationship with headquarters to achieve high performance. We discuss the theoretical and managerial implications of the findings and propose directions for future research.

Keywords: subsidiary entrepreneurial orientation, trust, subsidiary autonomy, subsidiary performance

Procedia PDF Downloads 175
9573 The Use of the Social Media as a Propaganda Tool from the Political Parties in Europe against the Immigrants

Authors: Gülbuğ Erol, Caner Çakı

Abstract:

In Europe, it is seen that the immigrant population has increased in recent years. The rapid increase in the immigrant population has led to that some extreme right-wing parties increased their harsh discourse against the immigrants in Europe. In particular, it is seen that some right-wing parties in some European countries have demanded that the immigrant population could be controlled in the countries they are in, and even those immigrants should be removed from their countries. In this process, it is seen that these parties have effectively used social media platforms in the propaganda activities carried out for immigrants in recent years. In particular, the social media has great advantages in that these parties can address to the entire population in the country, apart from the limited masses that political parties address. How these political parties benefit from these advantages has great importance for the political parties to demonstrate their influence in political arena. In this study, it was tried to investigate how and why the extreme right-wing parties in Europe have used social media in their propaganda activities towards immigrant populations in Europe. For this purpose, the political parties of the three German-speaking countries in Europe were elected; Die Nationaldemokratische Partei Deutschlands (NPD) from Germany, Die Freiheitliche Partei Österreichs (FPÖ) from Austria, Die Schweizerische Volkspartei (SVP) from Switzerland. As social media platform, only their Facebook accounts were analyzed in this study. Accounts The political parties selected were examined with content analysis, and that social media was effectively used by extreme right-wing parties for propaganda purposes towards immigrants in Europe revealed.In this process, it is seen that these parties have effectively used social media platforms in the propaganda activities carried out for immigrants in recent years. In particular, the social media has great advantages in that these parties can address to the entire population in the country, apart from the limited masses that political parties address. How these political parties benefit from these advantages has great importance for the political parties to demonstrate their influence in political arena. In Europe, it is seen that the immigrant population has increased in recent years. The rapid increase in the immigrant population has led to that some extreme right-wing parties increased their harsh discourse against the immigrants in Europe. In particular, it is seen that some right-wing parties in some European countries have demanded that the immigrant population should be controlled in the countries they are in, and even those immigrants should be removed from their countries. In this process, it is seen that these parties have effectively used social media platforms in the propaganda activities carried out for immigrants in recent years. In particular, the social media has great advantages in that these parties can address to the entire population in the country, apart from the limited masses that political parties address. How these political parties benefit from these advantages has great importance for the political parties to demonstrate their influence in political arena. In this study, it was tried to investigate how and why the extreme right-wing parties in Europe have used social media in their propaganda activities towards immigrant populations in Europe. For this purpose, the political parties of the three German-speaking countries in Europe were elected; Die Nationaldemokratische Partei Deutschlands (NPD) from Germany, Die Freiheitliche Partei Österreichs (FPÖ) from Austria, Die Schweizerische Volkspartei (SVP) from Switzerland. As social media platform, only their Facebook accounts were analyzed in this study. Accounts The political parties selected were examined with content analysis and that social media was effectively used by extreme right-wing parties for propaganda purposes towards immigrants in Europe revealed.

Keywords: content analysis, political parties, propaganda, social media

Procedia PDF Downloads 398
9572 Social Strategeries for HIV and STDs Prevention

Authors: Binu Sahayam

Abstract:

HIV/AIDS epidemic is in its third decade and has become a virulent disease that threatens the world population. Many countless efforts had been made yet this has become a social and developmental concern. According to UNAIDS 2013 Report, In India around 2.4 million people are currently living with HIV and third in the infection rate. As every country is facing this health issue, this has become a social and developmental concern for India. In country like India, open discussion on sex and sexuality is not possible due to its conventional culture. Educational institution like schools and colleges can create awareness on sex education, life skill education, information on HIV and STD which is lacking. It is very clear that preventive knowledge remains low and this leads to increase in the HIV/AIDS infection rate. HIV/AIDS is a disease which is not curable but preventable, keeping this in mind religious leaders of various have come forward in addressing the issue of HIV/AIDS using various social strategies. The study has been focused on three main India religious teachings Hinduism, Christianity and Islam in addressing the issue of HIV/AIDS and its possible intervention in dealing with HIV/AIDS prevention. The study is important because it highlights the health issues, stigma discrimination, psychological disturbances and insecurity faced by the infected and affected persons. Therefore, this study privileges the role of religious leadership in the efforts and processes of preventing HIV/AIDS, caring and providing support to People living with HIV/AIDS and argues that intervention of religious leadership is an effective measure to confront many of the barriers associated with HIV/AIDS.

Keywords: HIV and AIDS, STDs, religion and religious organisation

Procedia PDF Downloads 381
9571 Gender-Based Violence Public Art Projects: An Analysis of the Value of Including Social Justice Topics in Tertiary Courses

Authors: F. Saptouw

Abstract:

This paper will examine the value of introducing social justice issues into the tertiary fine art curriculum at a first-year level. The paper will present detail of the conceptual impetus and the logistics related to the execution of a collaborative teaching project. The cohort of students was registered for the Fine Art Foundation course at the Michaelis School of Fine Art at the University of Cape Town. The course is dedicated to the development of critical thinking, communication skills, and varied approaches to knowledge construction within the first-year cohort. A core component of the course is the examination of the representation of gender, identity, politics, and power. These issues are examined within a range of public and private representations like art galleries, museum spaces, and contemporary popular culture. This particular project was a collaborative project with the Office of Inclusivity and Change, and the project leaders were Fabian Saptouw and Gabriel Khan. The paper will conclude by presenting an argument for the importance of such projects within the tertiary environment.

Keywords: art, education, gender-based violence, social responsiveness

Procedia PDF Downloads 125
9570 The Challenge of Assessing Social AI Threats

Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi

Abstract:

The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.

Keywords: social threats, artificial Intelligence, mitigation, social experiment

Procedia PDF Downloads 51
9569 Support for and Participation in 'Spontaneous' Mass Protest in Iceland: The Moderating Effects of Biographical Availability, Critical Mass, and Social Embeddedness

Authors: Jon Gunnar Bernburg

Abstract:

The present study addresses a topic that is fundamental to social movement theory, namely, the contingent link between movement support and movement participation. Usually, only a small fraction of those who agree with the cause of a social movement is mobilized into participating in it (a pattern sometimes referred to as 'the collective action problem'). However, historical moments sometimes emerge when many supporters become mobilized to participate in the movement, greatly enhancing the chance of movement success. By studying a case in point, this paper addresses the limited work on how support and participation are related at such critical moments. Specifically, the paper examines the association between supporting and participating in a huge 'pro-democracy' protest in Iceland in April 2016, in the wake of the global Panama Papers scandal. Organized via social media by only a handful of activists, but supported by a majority of Icelanders, the protest attracted about a fourth of the urban population, leading to a snap election and government change. Surveying Iceland’s urban population, this paper tests hypotheses about the processes mobilizing supporters to participate in the protest. The findings reveal how variables derived from the theories of biographical availability (males vs. females, working class vs. professionals), critical mass (expectations, prior protest success), and social embeddedness (close ties with protesters) moderate the association between protest support and participation. The study helps to account for one of the largest protests in Iceland’s history while contributing to the theory about how historical contexts shape the behavior of movement supporters.

Keywords: Iceland, crisis, protest support vs. participation, theories of mass mobilization

Procedia PDF Downloads 222
9568 The Role of ICT in Engaging Youth in Agricultural Transformation of Africa

Authors: Adebola Adedugbe

Abstract:

Agriculture is the mainstay of most countries in Africa. It employs up to 90 percent of the rural workforce, who are mostly youth and women. Engaging youths in Information and Communications Technology (ICT) in agriculture is critical to economic and agricultural development of the African continent. The objective of this paper is to identify and mobilize the potentials of young Africans in agriculture through ICT and recognize their role as the dominant driver for sustainable agricultural development in Africa. This paper identifies the role of ICT as a tool for attracting youths to agriculture. The development of ICT is important in stimulating youths in SME’s to compete favorably and effectively as a way to fight poverty through job and wealth creation. It is one of the strategies for promoting entrepreneurship by increasing the availability and diversity of online information.

Keywords: Africa, agriculture, ICT, tool, youth

Procedia PDF Downloads 435
9567 Perceived Stigma, Perception of Burden and Psychological Distress among Parents of Intellectually Disable Children: Role of Perceived Social Support

Authors: Saima Shafiq, Najma Iqbal Malik

Abstract:

This study was aimed to explore the relationship of perceived stigma, perception of burden and psychological distress among parents of intellectually disabled children. The study also aimed to explore the moderating role of perceived social support on all the variables of the study. The sample of the study comprised of (N = 250) parents of intellectually disabled children. The present study utilized the co-relational research design. It consists of two phases. Phase-I consisted of two steps which contained the translation of two scales that were used in the present study and tried out on the sample of parents (N = 70). The Affiliated Stigma Scale and Care Giver Burden Inventory were translated into Urdu for the present study. Phase-1 revealed that translated scaled entailed satisfactory psychometric properties. Phase -II of the study was carried out in order to test the hypothesis. Correlation, linear regression analysis, and t-test were computed for hypothesis testing. Hierarchical regression analysis was applied to study the moderating effect of perceived social support. Findings revealed that there was a positive relationship between perceived stigma and psychological distress, perception of burden and psychological distress. Linear regression analysis showed that perceived stigma and perception of burden were positive predictors of psychological distress. The study did not show the moderating role of perceived social support among variables of the present study. The major limitation of the study is the sample size and the major implication is awareness regarding problems of parents of intellectually disabled children.

Keywords: perceived stigma, perception of burden, psychological distress, perceived social support

Procedia PDF Downloads 200
9566 Role of Social Workers in Juvenile Justice Board as a Child Protection Mechanism for Children in Conflict with Law

Authors: Ida D. Souza, Lena Ashok

Abstract:

Every child has a fundamental right to be protected and it is only a safe, supported child who can effectively cope with difficult circumstances and lead a happy childhood. The vulnerability of children has increased due to emerging lifestyles, raising cost of living, higher expectations from adults, parental and care-giver stress /burn-out and a general raise in demand for services for children. A major area of concern is the rise of juvenile crimes in the overall crimes committed in the country. The UNCRC 1989 and JJ Act 2000 enables the structures to handle the juvenile children in care and concern in its real terms. One of the mechanisms to protect the children is the JJB a justice system. The aim is to hold a child culpable (guilty) for offence they committed, not through punishment, but counseling the child to understand their actions and persuade them away from such deviated activities in the future. The JJB consists of two social workers and a judicial magistrate and one of whom should be a woman. This study aims at understanding the role of social workers in best practices in deciding the best course of action for the rehabilitation of the child. Two case studies were carried out through in-depth interviews with the social worker member of the JJB of two Udupi and Mangalore districts. The best practices reported in which children are being allowed to express themselves in a child friendly environment and in the best interest of the child. The study highlighted team work to be very effective in understanding the child in their reformation.

Keywords: child protection, best practices, juvenile justice, reformation teamwork

Procedia PDF Downloads 356
9565 Universal Design Implementation in a Private University; Investment, Decision Making, Perceptions and the Value of Social Capital

Authors: Sridara Tipian, Henry Skates Jr., Antika Sawadsri

Abstract:

It is widely recognized that universal design should be implemented as broadly as possible to benefit as many groups and sub groups of people within a society. In Thailand, public buildings such as public universities are obvious places where the benefits of universal design principles are easily appreciated and applied, but there are other building types such as private universities where the benefits may not be just as obvious. In these buildings, the implementation of universal design is not always achieved. There are many reasons given for this among which is the perceived additional cost of implementation. This paper argues that social capital should be taken into consideration when such decisions are being made. The paper investigates the background, principles and theories pertaining to universal design and using a case study of a private university, investigates the implementation of universal design against the background of current legislation and the perceptions of the private university administrators. The study examines the physical facilities of the case study university in the context of current theories and principles of universal design alongside the legal requirements for same. A survey of building users evaluates knowledge of and attitudes to universal design. The research shows that although administrators perceive the initial cost of investment to be prohibitive in the short term, in the long term, changes in societal values in relation to social inclusiveness are changing and that the social capital of investing in universal design should not be underestimated. The results of this study should provide greater incentive for the enforcement of the legal requirements for universal design in Thailand.

Keywords: public buildings, physical facilities, social capital private university, investment, decision making, value, enforcement, legal requirements

Procedia PDF Downloads 261
9564 Predicting Personality and Psychological Distress Using Natural Language Processing

Authors: Jihee Jang, Seowon Yoon, Gaeun Son, Minjung Kang, Joon Yeon Choeh, Kee-Hong Choi

Abstract:

Background: Self-report multiple choice questionnaires have been widely utilized to quantitatively measure one’s personality and psychological constructs. Despite several strengths (e.g., brevity and utility), self-report multiple-choice questionnaires have considerable limitations in nature. With the rise of machine learning (ML) and Natural language processing (NLP), researchers in the field of psychology are widely adopting NLP to assess psychological constructs to predict human behaviors. However, there is a lack of connections between the work being performed in computer science and that psychology due to small data sets and unvalidated modeling practices. Aims: The current article introduces the study method and procedure of phase II, which includes the interview questions for the five-factor model (FFM) of personality developed in phase I. This study aims to develop the interview (semi-structured) and open-ended questions for the FFM-based personality assessments, specifically designed with experts in the field of clinical and personality psychology (phase 1), and to collect the personality-related text data using the interview questions and self-report measures on personality and psychological distress (phase 2). The purpose of the study includes examining the relationship between natural language data obtained from the interview questions, measuring the FFM personality constructs, and psychological distress to demonstrate the validity of the natural language-based personality prediction. Methods: The phase I (pilot) study was conducted on fifty-nine native Korean adults to acquire the personality-related text data from the interview (semi-structured) and open-ended questions based on the FFM of personality. The interview questions were revised and finalized with the feedback from the external expert committee, consisting of personality and clinical psychologists. Based on the established interview questions, a total of 425 Korean adults were recruited using a convenience sampling method via an online survey. The text data collected from interviews were analyzed using natural language processing. The results of the online survey, including demographic data, depression, anxiety, and personality inventories, were analyzed together in the model to predict individuals’ FFM of personality and the level of psychological distress (phase 2).

Keywords: personality prediction, psychological distress prediction, natural language processing, machine learning, the five-factor model of personality

Procedia PDF Downloads 70
9563 Socio-Economic Impact of Education on Urban Women in Pakistan

Authors: Muhammad Ali Khan

Abstract:

Education is a word has been derived from Latin word "Educare", means to train. Therefore, the harmonious growth of the potentialities for achieving the qualities desirable and useful in the human society is called education. It is claimed that by educating women we can develop our economy, family health and decrease population growth. To explore the socio-economic impact of education on urban women. A prospective study design was used. Over a period of six months 50 respondents were randomly selected from Hayat Abad, an urban city in the North West of Pakistan. A questionnaire was used to explore marital, educational, occupational, social, economical and political status of urban women. Of the total, 50% (25) were employed, where 56% were married and 44% unmarried. Of the employed participants, 56% were teachers fallowed by social worker 16%. Monthly income was significantly high (p=001) of women with master degree. Understanding between wife and husband was also very significant in women with masters. . 78% of employed women replied that Parda (Hija) should be on choice not imposed. 52% of educated women replied participation in social activates, such as parties, shopping etc. Education has a high impact on urban women because it is directly related to employment, decision of power, economy and social life. Urban women with high education have significant political awareness and empowerment. Improving women educational level in rural areas of Pakistan is the key for economic growth and political empowerment

Keywords: women, urban, Pakistan, socio economic

Procedia PDF Downloads 88
9562 Analysis of Digital Transformation in Banking: The Hungarian Case

Authors: Éva Pintér, Péter Bagó, Nikolett Deutsch, Miklós Hetényi

Abstract:

The process of digital transformation has a profound influence on all sectors of the worldwide economy and the business environment. The influence of blockchain technology can be observed in the digital economy and e-government, rendering it an essential element of a nation's growth strategy. The banking industry is experiencing significant expansion and development of financial technology firms. Utilizing developing technologies such as artificial intelligence (AI), machine learning (ML), and big data (BD), these entrants are offering more streamlined financial solutions, promptly addressing client demands, and presenting a challenge to incumbent institutions. The advantages of digital transformation are evident in the corporate realm, and firms that resist its adoption put their survival at risk. The advent of digital technologies has revolutionized the business environment, streamlining processes and creating opportunities for enhanced communication and collaboration. Thanks to the aid of digital technologies, businesses can now swiftly and effortlessly retrieve vast quantities of information, all the while accelerating the process of creating new and improved products and services. Big data analytics is generally recognized as a transformative force in business, considered the fourth paradigm of science, and seen as the next frontier for innovation, competition, and productivity. Big data, an emerging technology that is shaping the future of the banking sector, offers numerous advantages to banks. It enables them to effectively track consumer behavior and make informed decisions, thereby enhancing their operational efficiency. Banks may embrace big data technologies to promptly and efficiently identify fraud, as well as gain insights into client preferences, which can then be leveraged to create better-tailored products and services. Moreover, the utilization of big data technology empowers banks to develop more intelligent and streamlined models for accurately recognizing and focusing on the suitable clientele with pertinent offers. There is a scarcity of research on big data analytics in the banking industry, with the majority of existing studies only examining the advantages and prospects associated with big data. Although big data technologies are crucial, there is a dearth of empirical evidence about the role of big data analytics (BDA) capabilities in bank performance. This research addresses a gap in the existing literature by introducing a model that combines the resource-based view (RBV), the technical organization environment framework (TOE), and dynamic capability theory (DC). This study investigates the influence of Big Data Analytics (BDA) utilization on the performance of market and risk management. This is supported by a comparative examination of Hungarian mobile banking services.

Keywords: big data, digital transformation, dynamic capabilities, mobile banking

Procedia PDF Downloads 40
9561 Unconscious Bias in Judicial Decisions: Legal Genealogy and Disgust in Cases of Private, Adult, Consensual Sexual Acts Leading to Injury

Authors: Susanna Menis

Abstract:

‘Unconscious’ bias is widespread, affecting society on all levels of decision-making and beyond. Placed in the law context, this study will explore the direct effect of the psycho-social and cultural evolution of unconscious bias on how a judicial decision was made. The aim of this study is to contribute to socio-legal scholarship by examining the formation of unconscious bias and its influence on the creation of legal rules that judges believe reflect social solidarity and protect against violence. The study seeks to understand how concepts like criminalization and unlawfulness are constructed by the common law. The study methodology follows two theoretical approaches: historical genealogy and emotions as sociocultural phenomena. Both methods have the ‘tracing back’ of the original formation of a social way of seeing and doing things in common. The significance of this study lies in the importance of reflecting on the ways unconscious bias may be formed; placing judges’ decisions under this spotlight forces us to challenge the status quo, interrogate justice, and seek refinement of the law.

Keywords: legal geneology, emotions, disgust, criminal law

Procedia PDF Downloads 50
9560 Determination of 1-Deoxynojirimycin and Phytochemical Profile from Mulberry Leaves Cultivated in Indonesia

Authors: Yasinta Ratna Esti Wulandari, Vivitri Dewi Prasasty, Adrianus Rio, Cindy Geniola

Abstract:

Mulberry is a plant that widely cultivated around the world, mostly for silk industry. In recent years, the study showed that the mulberry leaves have an anti-diabetic effect which mostly comes from the compound known as 1-deoxynojirimycin (DNJ). DNJ is a very potent α-glucosidase inhibitor. It will decrease the degradation rate of carbohydrates in digestive tract, leading to slower glucose absorption and reducing the post-prandial glucose level significantly. The mulberry leaves also known as the best source of DNJ. Since then, the DNJ in mulberry leaves had received a considerable attention, because of the increased number of diabetic patients and the raise of people awareness to find a more natural cure for diabetic. The DNJ content in mulberry leaves varied depend on the mulberry species, leaf’s age, and the plant’s growth environment. Few of the mulberry varieties that were cultivated in Indonesiaare Morus alba var. kanva-2, M. alba var. multicaulis, M. bombycis var. lembang, and M. cathayana. The lack of data concerning phytochemicals contained in the Indonesian mulberry leaves are restraining their use in the medicinal field. The aim of this study is to fully utilize the use of mulberry leaves cultivated in Indonesia as a medicinal herb in local, national, or global community, by determining the DNJ and other phytochemical contents in them. This study used eight leaf samples which are the young leaves and mature leaves of both Morus alba var. kanva-2, M. alba var. multicaulis, M. bombycis var. lembang, and M. cathayana. The DNJ content was analyzed using reverse phase high performance liquid chromatography (HPLC). The stationary phase was silica C18 column and the mobile phase was acetonitrile:acetic acid 0.1% 1:1 with elution rate 1 mL/min. Prior to HPLC analysis the samples were derivatized with FMOC to ensure the DNJ detectable by VWD detector at 254 nm. Results showed that the DNJ content in samples are ranging from 2.90-0.07 mg DNJ/ g leaves, with the highest content found in M. cathayana mature leaves (2.90 ± 0.57 mg DNJ/g leaves). All of the mature leaf samples also found to contain higher amount of DNJ from their respective young leaf samples. The phytochemicals in leaf samples was tested using qualitative test. Result showed that all of the eight leaf samples contain alkaloids, phenolics, flavonoids, tannins, and terpenes. The presence of this phytochemicals contribute to the therapeutic effect of mulberry leaves. The pyrolysis-gas chromatography-mass spectrometry (Py-GC-MS) analysis was also performed to the eight samples to quantitatively determine their phytochemicals content. The pyrolysis temperature was set at 400 °C, with capillary column Phase Rtx-5MS 60 × 0.25 mm ID stationary phase and helium gas mobile phase. Few of the terpenes found are known to have anticancer and antimicrobial properties. From all the results, all of four samples of mulberry leaves which are cultivated in Indonesia contain DNJ and various phytochemicals like alkaloids, phenolics, flavonoids, tannins, and terpenes which are beneficial to our health.

Keywords: Morus, 1-deoxynojirimycin, HPLC, Py-GC-MS

Procedia PDF Downloads 314
9559 Recurrent Neural Networks for Classifying Outliers in Electronic Health Record Clinical Text

Authors: Duncan Wallace, M-Tahar Kechadi

Abstract:

In recent years, Machine Learning (ML) approaches have been successfully applied to an analysis of patient symptom data in the context of disease diagnosis, at least where such data is well codified. However, much of the data present in Electronic Health Records (EHR) are unlikely to prove suitable for classic ML approaches. Furthermore, as scores of data are widely spread across both hospitals and individuals, a decentralized, computationally scalable methodology is a priority. The focus of this paper is to develop a method to predict outliers in an out-of-hours healthcare provision center (OOHC). In particular, our research is based upon the early identification of patients who have underlying conditions which will cause them to repeatedly require medical attention. OOHC act as an ad-hoc delivery of triage and treatment, where interactions occur without recourse to a full medical history of the patient in question. Medical histories, relating to patients contacting an OOHC, may reside in several distinct EHR systems in multiple hospitals or surgeries, which are unavailable to the OOHC in question. As such, although a local solution is optimal for this problem, it follows that the data under investigation is incomplete, heterogeneous, and comprised mostly of noisy textual notes compiled during routine OOHC activities. Through the use of Deep Learning methodologies, the aim of this paper is to provide the means to identify patient cases, upon initial contact, which are likely to relate to such outliers. To this end, we compare the performance of Long Short-Term Memory, Gated Recurrent Units, and combinations of both with Convolutional Neural Networks. A further aim of this paper is to elucidate the discovery of such outliers by examining the exact terms which provide a strong indication of positive and negative case entries. While free-text is the principal data extracted from EHRs for classification, EHRs also contain normalized features. Although the specific demographical features treated within our corpus are relatively limited in scope, we examine whether it is beneficial to include such features among the inputs to our neural network, or whether these features are more successfully exploited in conjunction with a different form of a classifier. In this section, we compare the performance of randomly generated regression trees and support vector machines and determine the extent to which our classification program can be improved upon by using either of these machine learning approaches in conjunction with the output of our Recurrent Neural Network application. The output of our neural network is also used to help determine the most significant lexemes present within the corpus for determining high-risk patients. By combining the confidence of our classification program in relation to lexemes within true positive and true negative cases, with an inverse document frequency of the lexemes related to these cases, we can determine what features act as the primary indicators of frequent-attender and non-frequent-attender cases, providing a human interpretable appreciation of how our program classifies cases.

Keywords: artificial neural networks, data-mining, machine learning, medical informatics

Procedia PDF Downloads 114
9558 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 305
9557 Opportunities and Challenges of Digital Diplomacy in the Public Diplomacy of the Islamic Republic of Iran

Authors: Somayeh Pashaee

Abstract:

The ever-increasing growth of the Internet and the development of information and communication technology have prompted the politicians of different countries to use virtual networks as an efficient tool for their foreign policy. The communication of governments and countries, even in the farthest places from each other, through electronic networks, has caused vast changes in the way of statecraft and governance. Importantly, in the meantime, diplomacy, which is always based on information and communication, has been affected by the new prevailing conditions and new technologies more than other areas and has faced greater changes. The emergence of virtual space and the formation of new communication tools in the field of public diplomacy has led to the redefinition of the framework of diplomacy and politics in the international arena and the appearance of a new aspect of diplomacy called digital diplomacy. Digital diplomacy is in the concept of changing relations from a face-to-face and traditional way to a non-face-to-face and new way, and its purpose is to solve foreign policy issues using virtual space. Digital diplomacy, by affecting diplomatic procedures and its change, explains the role of technology in the visualization and implementation of diplomacy in different ways. The purpose of this paper is to investigate the position of digital diplomacy in the public diplomacy of the Islamic Republic of Iran. The paper tries to answer these two questions in a descriptive-analytical way, considering the progress of communication and the role of virtual space in the service of diplomacy, what is the approach of the Islamic Republic of Iran towards digital diplomacy and the use of a new way of establishing foreign relations in public diplomacy? What capacities and damages are facing the country after the use of this type of new diplomacy? In this paper, various theoretical concepts in the field of public diplomacy and modern diplomacy, including Geoff Berridge, Charles Kegley, Hans Tuch and Ronald Peter Barston, as well as the theoretical framework of Marcus Holmes on digital diplomacy, will be used as a conceptual basis to support the analysis. As a result, in order to better achieve the political goals of the country, especially in foreign policy, the approach of the Islamic Republic of Iran to public diplomacy with a focus on digital diplomacy should be strengthened and revised. Today, only emphasizing on advancing diplomacy through traditional methods may weaken Iran's position in the public opinion level from other countries.

Keywords: digital diplomacy, public diplomacy, islamic republic of Iran, foreign policy, opportunities and challenges

Procedia PDF Downloads 101
9556 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: private information, value, users, perceived risk, online information privacy, attributes

Procedia PDF Downloads 222
9555 Enquiry Based Approaches to Teaching Grammar and Differentiation in the Senior Japanese Classroom

Authors: Julie Devine

Abstract:

This presentation will look at the approaches to teaching grammar taken over two years with students studying Japanese in the last two years of high school. The main focus is an enquiry based approach to grammar introduction and a three tier system using videos and online support material to allow for differentiation and personalised learning in the classroom. The aim is to create space for motivated students to do some higher order activities using the target pattern to solve problems and create scenarios. Less motivated students have time to complete basic exercises and struggling students have some time with the teacher in smaller groups.

Keywords: differentiation, digital technologies, personalised learning plans, student engagement

Procedia PDF Downloads 151
9554 Bayesian Networks Scoping the Climate Change Impact on Winter Wheat Freezing Injury Disasters in Hebei Province, China

Authors: Xiping Wang,Shuran Yao, Liqin Dai

Abstract:

Many studies report the winter is getting warmer and the minimum air temperature is obviously rising as the important climate warming evidences. The exacerbated air temperature fluctuation tending to bring more severe weather variation is another important consequence of recent climate change which induced more disasters to crop growth in quite a certain regions. Hebei Province is an important winter wheat growing province in North of China that recently endures more winter freezing injury influencing the local winter wheat crop management. A winter wheat freezing injury assessment Bayesian Network framework was established for the objectives of estimating, assessing and predicting winter wheat freezing disasters in Hebei Province. In this framework, the freezing disasters was classified as three severity degrees (SI) among all the three types of freezing, i.e., freezing caused by severe cold in anytime in the winter, long extremely cold duration in the winter and freeze-after-thaw in early season after winter. The factors influencing winter wheat freezing SI include time of freezing occurrence, growth status of seedlings, soil moisture, winter wheat variety, the longitude of target region and, the most variable climate factors. The climate factors included in this framework are daily mean and range of air temperature, extreme minimum temperature and number of days during a severe cold weather process, the number of days with the temperature lower than the critical temperature values, accumulated negative temperature in a potential freezing event. The Bayesian Network model was evaluated using actual weather data and crop records at selected sites in Hebei Province using real data. With the multi-stage influences from the various factors, the forecast and assessment of the event-based target variables, freezing injury occurrence and its damage to winter wheat production, were shown better scoped by Bayesian Network model.

Keywords: bayesian networks, climatic change, freezing Injury, winter wheat

Procedia PDF Downloads 395
9553 Voluntary Information of Intellectual Capital Disclosed Online by Public Spanish Universities

Authors: Yolanda Ramírez, Ángel Tejada, Agustín Baidez

Abstract:

The purpose of this paper is to examine the quality of voluntary intellectual capital disclosure by public Spanish universities on their websites. To this end, a content analysis was used to analyze the websites of 50 public Spanish universities i 2016. The results of this study show that human capital was the most disclosed category with relational capital being the least frequently disclosed in Spain. However, the quality of structural capital disclosures was higher than relational and human capital. Finally, most IC disclosures were narrative in nature.

Keywords: intellectual capital, quality disclosure, websites, universities, Spain

Procedia PDF Downloads 216
9552 Hybrid Approach for Country’s Performance Evaluation

Authors: C. Slim

Abstract:

This paper presents an integrated model, which hybridized data envelopment analysis (DEA) and support vector machine (SVM) together, to class countries according to their efficiency and performance. This model takes into account aspects of multi-dimensional indicators, decision-making hierarchy and relativity of measurement. Starting from a set of indicators of performance as exhaustive as possible, a process of successive aggregations has been developed to attain an overall evaluation of a country’s competitiveness.

Keywords: Artificial Neural Networks (ANN), Support vector machine (SVM), Data Envelopment Analysis (DEA), Aggregations, indicators of performance

Procedia PDF Downloads 325