Search results for: social security reform
6902 The Stereotypes of Female Roles in TV Drama of Taiwan and Japan
Authors: Ya Ting Tang
Abstract:
Social learning theory has told us that the cognitions of gender roles come from learning. Thus, the images of gender roles which media describes will shape our cognitions. Taiwan and Japan are both in the East Asian cultural Sphere, and more or less influenced by the traditional Chinese culture. But our social structure and changes must be different. Others, the study also concerns that, with the rise of female consciousness in society, whether the female stereotype in drama of Taiwan and Japan are improved. This research first uses content analysis to analyze drama of Taiwan and Japan in 2003 and 2013 on how to shape female roles. Then use text analysis to conduct a qualitative analysis. Result of this study showed that drama on how to depict women indeed have changed, women are no longer just talk about love, but can serve as president or doctor, and show its mettle in the workplace. In Japanese drama, the female roles have diverse occupation than Taiwanese drama, and not just a background character set. But in most Taiwanese drama, female roles are given a career, but it always put emphasis on women emotionally. To include, although the stereotype in the drama of Taiwan and Japan are improved, female will still be derided due to their ages, love or marriage situations. Taiwanese drama must depict the occupation of female more diverse and let the female roles have more space to play, rather than focusing on romance which women of any occupation can have.Keywords: female images, stereotype, TV drama, gender roles
Procedia PDF Downloads 2766901 CSR Health Programs: A Supplementary Tool of a Government’s Role in a Developing Nation
Authors: Kristine Demilou Santiago
Abstract:
In a context of a developing nation, how important is the role of Corporate Social Responsibility health programs? Is there a possibility that this will render a large impact in a society where health benefits are insufficient? The Philippine government has been in an unceasing battle to provide its citizens competitive health benefits through launching various health programs. As the efforts are being claimed by the government, the numbers just show that all the health benefits being offered such as PhilHealth health cards, medical missions and other subsidized government health benefits are not effective and sufficient at the minimum level. This is a major characteristic of a developing nation which the Philippine government is focusing on addressing as it becomes a national concern under the effects of poverty. Industrial companies, through Corporate Social Responsibility, are playing an important role in the aspiration to resolve this problem on health programs as supposed to be basic services to citizens of the Philippine government. The rise of commitment by these industrial companies to render health programs to communities as part of their corporate citizenship has covered a large portion of the basic health services that the Filipino citizens are supposed to be receiving. This is the most salient subject that a developing nation should focus on determining the important contribution of industrial companies present in their country as part of the citizens’ access to basic health services. The use of survey forms containing quantitative and qualitative questions which aim to give numerical figures and support answers as to the role of CSR Health programs in helping the communities receive the basic health services they need was the methodological procedure followed in this research. A sample population in a community where the largest industrial company in a province of the Philippines was taken through simple random sampling. The assumption is that this sample population which represents the whole of the community has the highest opportunities to access both the government health services and the CSR health program services of the industrial company located in their community. Results of the research have shown a significant level of participation by industrial companies through their CSR health programs in the attainment of basic health services that should be rendered by the Philippine government to its citizens as part of the state’s health benefits. In a context of a developing nation such as the Philippines, the role of Corporate Social Responsibility is beyond the expectation of initiating to resolve environmental and social issues. It is moving deeper in the concept of the corporate industries being a pillar of the government in catering the support needed by the individuals in the community for its development. As such, the concept of the presence of an industrial company in a community is said to be a parallel progress: by which when an industrial company expands because it is becoming more profitable, so is the community gaining the same step of progress in terms of socioeconomic development.Keywords: basic health services, CSR health program, health services in a developing nation, Philippines health benefits
Procedia PDF Downloads 2076900 Reduction of Energy Consumption Using Smart Home Techniques in the Household Sector
Authors: Ahmed Al-Adaileh, Souheil Khaddaj
Abstract:
Outcomes of exhaustion of natural resources started influencing each spirit on this planet. Energy is an essential factor in this aspect. To restore the circumstance to the appropriate track, all attempts must focus on two fundamental branches: producing electricity from clean and renewable reserves and decreasing the overall unnecessary consumption of energy. The focal point of this paper will be on lessening the power consumption in the household's segment. This paper is an attempt to give a clear understanding of a framework called Reduction of Energy Consumption in Household Sector (RECHS) and how it should help householders to reduce their power consumption by substituting their household appliances, turning-off the appliances when stand-by modus is detected, and scheduling their appliances operation periods. Technically, the framework depends on utilizing Z-Wave compatible plug-ins which will be connected to the usual house devices to gauge and control them remotely and semi-automatically. The suggested framework underpins numerous quality characteristics, for example, integrability, scalability, security and adaptability.Keywords: smart energy management systems, internet of things, wireless mesh networks, microservices, cloud computing, big data
Procedia PDF Downloads 1936899 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine
Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour
Abstract:
Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.Keywords: decision tree, feature selection, intrusion detection system, support vector machine
Procedia PDF Downloads 2636898 The Link between Corporate Governance and EU Competition Law Enforcement: A Conditional Logistic Regression Analysis of the Role of Diversity, Independence and Corporate Social Responsibility
Authors: Jeroen De Ceuster
Abstract:
This study is the first empirical analysis of the link between corporate governance and European Union competition law. Although competition law enforcement is often studied through the lens of competition law, we offer an alternative perspective by looking at a number of corporate governance factor at the level of the board of directors. We find that undertakings where the Chief Executive Officer is also chairman of the board are twice as likely to violate European Union competition law. No significant relationship was found between European Union competition law infringements and gender diversity of the board, the size of the board, the percentage of directors appointed after the Chief Executive Officer, the percentage of independent directors, or the presence of corporate social responsibility (CSR) committee. This contribution is based on a 1-1 matched peer study. Our sample includes all ultimate parent companies with a board that have been sanctioned by the European Commission for either anticompetitive agreements or abuse of dominance for the period from 2004 to 2018. These companies were matched to a company with headquarters in the same country, belongs to the same industry group, is active in the European Economic Area, and is the nearest neighbor to the infringing company in terms of revenue. Our final sample includes 121 pairs. As is common with matched peer studies, we use CLR to analyze the differences within these pairs. The only statistically significant independent variable after controlling for size and performance is CEO/Chair duality. The results indicate that companies whose Chief Executive Officer also functions as chairman of the board are twice as likely to infringe European Union competition law. This is in line with the monitoring theory of the board of directors, which states that its primary function is to monitor top management. Since competition law infringements are mostly organized by management and hidden from board directors, the results suggest that a Chief Executive Officer who is also chairman is more likely to be either complicit in the infringement or less critical towards his day-to-day colleagues and thus impedes proper detection by the board of competition law infringements.Keywords: corporate governance, competition law, board of directors, board independence, ender diversity, corporate social responisbility
Procedia PDF Downloads 1386897 Collateral Impact of Water Resources Development in an Arsenic Affected Village of Patna District
Authors: Asrarul H. Jeelani
Abstract:
Arsenic contamination of groundwater and its’ health implications in lower Gangetic plain of Indian states started reporting in the 1980s. The same period was declared as the first water decade (1981-1990) to achieve ‘water for all.’ To fulfill the aim, the Indian government, with the support of international agencies installed millions of hand-pumps through water resources development programs. The hand-pumps improve the accessibility if the groundwater, but over-extraction of it increases the chances of mixing of trivalent arsenic which is more toxic than pentavalent arsenic of dug well water in Gangetic plain and has different physical manifestations. Now after three decades, Bihar (middle Gangetic plain) is also facing arsenic contamination of groundwater and its’ health implications. Objective: This interdisciplinary research attempts to understand the health and social implications of arsenicosis among different castes in Haldi Chhapra village and to find the association of ramifications with water resources development. Methodology: The Study used concurrent quantitative dominant mix method (QUAN+qual). The researcher had employed household survey, social mapping, interviews, and participatory interactions. However, the researcher used secondary data for retrospective analysis of hand-pumps and implications of arsenicosis. Findings: The study found 88.5% (115) household have hand-pumps as a source of water however 13.8% uses purified supplied water bottle and 3.6% uses combinations of hand-pump, bottled water and dug well water for drinking purposes. Among the population, 3.65% of individuals have arsenicosis, and 2.72% of children between the age group of 5 to 15 years are affected. The caste variable has also emerged through quantitative as well as geophysical locations analysis as 5.44% of arsenicosis manifested individual belong to scheduled caste (SC), 3.89% to extremely backward caste (EBC), 2.57% to backward caste (BC) and 3% to other. Among three clusters of arsenic poisoned locations, two belong to SC and EBC. The village as arsenic affected is being discriminated, whereas the affected individual is also facing discrimination, isolation, stigma, and problem in getting married. The forceful intervention to install hand-pumps in the first water decades and later restructuring of the dug well destroyed a conventional method of dug well cleaning. Conclusion: The common manifestation of arsenicosis has increased by 1.3% within six years of span in the village. This raised the need for setting up a proper surveillance system in the village. It is imperative to consider the social structure for arsenic mitigation program as this research reveals caste as a significant factor. The health and social implications found in the study; retrospectively analyzed as the collateral impact of water resource development programs in the village.Keywords: arsenicosis, caste, collateral impact, water resources
Procedia PDF Downloads 1086896 Challenges for Persons with Disabilities During COVID-19 Pandemic in Thailand
Authors: Tavee Cheausuwantavee
Abstract:
: COVID-19 pandemic significantly has impacted everyone’s life. Persons with disabilities (PWDs) in Thailand have been also effected by COVID-19 situation in many aspects of their lives, while there have been no more appropriate services of the government and providers. Research projects had been only focused on health precaution and protection. Rapid need assessments on populations and vulnerable groups were limited and conducted via social media and an online survey. However, little is known about the real problems and needs of Thai PWDs during the COVID-19 pandemic for an effective plan and integral services for those PWDs. Therefore, this study aims to explore the diverse problems and needs of Thai PWDs in the COVID -19 pandemic. Results from the study can be used by the government and other stakeholders for further effective services. Methods: This study was used a mixed-method design that consisted of both quantitative and qualitative measures. In terms of the quantitative approach, there were 744 PWDs and caregivers of all types of PWDs selected by proportional multistage stratified random sampling according to their disability classification and geographic location. Questionnaires with 59 items regarding participant characteristics, problems, and needs in health, education, employment, and other social inclusion, were distributed to all participants and some caregivers completed questionnaires when PWDs were not able to due to limited communication and/or literacy skills. Completed questionnaires were analyzed by descriptive statistics. For qualitative design, 62 key informants who were PWDs or caregivers were selected by purposive sampling. Ten focus groups, each consisting of 5-6 participants and 7 in-depth interviews from all the groups identified above, were conducted by researchers across five regions. Focus group and in-depth interview guidelines with 6 items regarding problems and needs in health, education, employment, other social inclusion, and their coping during COVID -19 pandemic. Data were analyzed using a modification of thematic content analysis. Results: Both quantitative and qualitative studies showed that PWDs and their caregivers had significant problems and needs all aspects of their life, including income and employment opportunity, daily living and social inclusion, health, and education, respectively. These problems and needs were related to each other, forming a vicious cycle. Participants also learned from negative pandemic to more positive life aspects, including their health protection, financial plan, family cohesion, and virtual technology literacy and innovation. Conclusion and implications: There have been challenges facing all life aspects of PWDs in Thailand during the COVID -19 pandemic, particularly incomes and daily living. All challenges have been the vicious cycle and complicated. There have been also a positive lesson learned of participants from the pandemic. Recommendations for government and stakeholders in the COVID-19 pandemic for PWDs are the following. First, the health protection strategy and policy of PWDs should be promoted together with other quality of life development including income generation, education and social inclusion. Second, virtual technology and alternative innovation should be enhanced for proactive service providers. Third, accessible information during the pandemic for all PWDs must be concerned. Forth, lesson learned from the pandemic should be shared and disseminated for crisis preparation and a positive mindset in the disruptive world.Keywords: challenge, COVID-19, disability, Thailand
Procedia PDF Downloads 766895 Torture, Inhuman and Degrading Treatment in Nigeria: A Time for Legislative Intervention
Authors: Kolawole Oyekan
Abstract:
Torture, cruel, inhuman and degrading treatment is one of the issues dealt with by the United Nations in its development of human rights standard. Torture and other ill -treatments is banned at all times in all places including in times of war. There is no justification for torture, cruel, inhuman and degrading treatment under any law in Nigeria. All statutes; local, regional and international on human rights prohibits all forms of degrading treatment. This paper examines the definition of torture, inhuman and degrading treatment and the prevalence of confessional statements obtain through torture by security agencies during the interrogation of crime suspects and are mostly relied upon during trial even in cases involving capital punishment. The paper further reviews the Violence against Persons Prohibition Act 2015 which prohibits torture and other forms of ill-treatment. Presently, the Act is applicable only to the federal Federal Capital Territory, Abuja. Consequently, the paper concludes that the Act should be adopted as a matter of urgency by the 36 states of the Federation of Nigeria and in addition, cogent steps must be taken to ensure that the provisions of the Act are strictly complied with in order to eliminate torture, cruel and inhuman degrading treatment in Nigeria.Keywords: confessional statement, human rights, torture, United Nations
Procedia PDF Downloads 3026894 Non-Contact Human Movement Monitoring Technique for Security Control System Based 2n Electrostatic Induction
Authors: Koichi Kurita
Abstract:
In this study, an effective non-contact technique for the detection of human physical activity is proposed. The technique is based on detecting the electrostatic induction current generated by the walking motion under non-contact and non-attached conditions. A theoretical model for the electrostatic induction current generated because of a change in the electric potential of the human body is proposed. By comparing the obtained electrostatic induction current with the theoretical model, it becomes obvious that this model effectively explains the behavior of the waveform of the electrostatic induction current. The normal walking motions are recorded using a portable sensor measurement located in a passageway of office building. The obtained results show that detailed information regarding physical activity such as a walking cycle can be estimated using our proposed technique. This suggests that the proposed technique which is based on the detection of the walking signal, can be successfully applied to the detection of human walking motion in a secured building.Keywords: human walking motion, access control, electrostatic induction, alarm monitoring
Procedia PDF Downloads 3566893 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection
Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim
Abstract:
As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).Keywords: intrusion detection, supervised learning, traffic classification, computer networks
Procedia PDF Downloads 3486892 Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies
Authors: Alec Wells, Aminu Bello Usman, Justin McKeown
Abstract:
The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analysed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.Keywords: direct voice input, risk, security, technology, trust
Procedia PDF Downloads 1906891 Polish Operational Plans During Cold War as Part of Warsaw Pact Strategic Culture
Authors: Wiktor Stypczyński
Abstract:
During the Cold War, both sides of the conflict developed advanced operational plans in case of a Third World War outbreak. In the Warsaw Pact, Soviet generals in Moscow chose targets for each army, but each country's General Staff had to create specific plans for their nation. This led to the creation of a Strategic Culture within the Warsaw Pact that was reflected in the plans of each army. This paper aims to showcase the Strategic Culture of the Warsaw Pact by using the plans of the People's Polish Army as an example. Examining one army at a time will allow for a more detailed and unique perspective on the matter. Understanding the past Strategic Culture is crucial in comprehending the current post-Soviet strategic situation in Eastern Europe, especially with the current situation in Ukraine. This paper is based on Benon Miśkiewicz's classic methodology of military history. While this methodology is the foundation, the research findings will also draw on the Strategic Studies methodology and the accomplishments of war and military science. Additionally, the Security and Political Studies methodology will be a crucial element in constructing the narrative.Keywords: cold war, operetional plans, strategic culture, polish people's army
Procedia PDF Downloads 716890 Preserving a Nation Oversea: Galician Folklore Music and Identity in the Americas. Analysis of Galician Migrant Music in the Latin American Context
Authors: Santiago Guerra Fernández
Abstract:
Abstract—This study is focused on exploring the conditions for the development of Galician music in the communities of Latin America after the massive arrival of Galician immigrants in the late nineteenth and early twentieth centuries, fleeing from hunger and misery in Spain. Migration would be accentuated after 1936 with the arrival of refugees from the Spanish Civil War due to their Republican political militancy fleeing fascism. The aim of this paper is to investigate the part that miscegenation with other local musical traditions has played within Galician expat music, helping to understand the complexity of contemporary Galician identity. Through archival work, the focus is set on examining the different traditional dances (such as the ‘muiñeira’), folk instruments (bagpipes, ‘pandeireta’), and poetic forms (‘cantiga’, ‘copla’) that were exported to Argentina and Cuba. Although research about migrant Galician music has been conducted in Spanish scholarship, there is a gap in the English literature on the topic that this paper intends to fill in. The results show how these musical traditions have played an essential role in shaping the social life and customs of Galician emigrants. By virtue of its malleability and blending properties, music serves here as an indicator of social cohesion.Keywords: folk, Galicia, migration, identity
Procedia PDF Downloads 726889 University Curriculum Policy Processes in Chile: A Case Study
Authors: Victoria C. Valdebenito
Abstract:
Located within the context of accelerating globalization in the 21st-century knowledge society, this paper focuses on one selected university in Chile at which radical curriculum policy changes have been taking place, diverging from the traditional curriculum in Chile at the undergraduate level as a section of a larger investigation. Using a ‘policy trajectory’ framework, and guided by the interpretivist approach to research, interview transcripts and institutional documents were analyzed in relation to the meso (university administration) and the micro (academics) level. Inside the case study, participants from the university administration and academic levels were selected both via snow-ball technique and purposive selection, thus they had different levels of seniority, with some participating actively in the curriculum reform processes. Guided by an interpretivist approach to research, documents and interview transcripts were analyzed to reveal major themes emerging from the data. A further ‘bigger picture’ analysis guided by critical theory was then undertaken, involving interrogation of underlying ideologies and how political and economic interests influence the cultural production of policy. The case-study university was selected because it represents a traditional and old case of university setting in the country, undergoing curriculum changes based on international trends such as the competency model and the liberal arts. Also, it is representative of a particular socioeconomic sector of the country. Access to the university was gained through email contact. Qualitative research methods were used, namely interviews and analysis of institutional documents. In all, 18 people were interviewed. The number was defined by when the saturation criterion was met. Semi-structured interview schedules were based on the four research questions about influences, policy texts, policy enactment and longer-term outcomes. Triangulation of information was used for the analysis. While there was no intention to generalize the specific findings of the case study, the results of the research were used as a focus for engagement with broader themes, often evident in global higher education policy developments. The research results were organized around major themes in three of the four contexts of the ‘policy trajectory’. Regarding the context of influences and the context of policy text production, themes relate to hegemony exercised by first world countries’ universities in the higher education field, its associated neoliberal ideology, with accountability and the discourse of continuous improvement, the local responses to those pressures, and the value of interdisciplinarity. Finally, regarding the context of policy practices and effects (enactment), themes emerged around the impacts of the curriculum changes on university staff, students, and resistance amongst academics. The research concluded with a few recommendations that potentially provide ‘food for thought’ beyond the localized settings of this study, as well as possibilities for further research.Keywords: curriculum, global-local dynamics, higher education, policy, sociology of education
Procedia PDF Downloads 776888 [Keynote]: No-Trust-Zone Architecture for Securing Supervisory Control and Data Acquisition
Authors: Michael Okeke, Andrew Blyth
Abstract:
Supervisory Control And Data Acquisition (SCADA) as the state of the art Industrial Control Systems (ICS) are used in many different critical infrastructures, from smart home to energy systems and from locomotives train system to planes. Security of SCADA systems is vital since many lives depend on it for daily activities and deviation from normal operation could be disastrous to the environment as well as lives. This paper describes how No-Trust-Zone (NTZ) architecture could be incorporated into SCADA Systems in order to reduce the chances of malicious intent. The architecture is made up of two distinctive parts which are; the field devices such as; sensors, PLCs pumps, and actuators. The second part of the architecture is designed following lambda architecture, which is made up of a detection algorithm based on Particle Swarm Optimization (PSO) and Hadoop framework for data processing and storage. Apache Spark will be a part of the lambda architecture for real-time analysis of packets for anomalies detection.Keywords: industrial control system (ics, no-trust-zone (ntz), particle swarm optimisation (pso), supervisory control and data acquisition (scada), swarm intelligence (SI)
Procedia PDF Downloads 3436887 Empirical Study of Health Behaviors of Employees in Information Technology and Business Process Outsourcing
Authors: Yogesh Pawar
Abstract:
The purpose of this paper is to investigate the behaviors of information technology (IT) and business process outsourcing (BPO) employees in relation to diet, exercise, sleep, stress, and social habits. This was a qualitative research study, using in-depth,semi-structured interviews. Descriptive data were collected from a two-stage purposive sample of 28 IT-BPO employees from two IT companies and one BPOs in Pune. The majority of interviewees reported having an unhealthy diet and/or sedentary lifestyle. Lack of time due to demanding work schedules was the largest barrier to diet and exercise. Given the qualitative study design and limited sampling frame, results may not be generalizable. However, the qualitative data suggests that Pune’s young IT-BPO employees may be at greater risk of lifestyle-related diseases than the general population. The data also suggests that interventions incorporating social influence may be a promising solution, particularly at international call centers. The results from this study provide qualitative insight on the motives for health behaviors of IT-BPO employees, as well as the barriers and facilitators for leading a healthy lifestyle in this industry. The findings provide the framework for future workplace wellness interventions.Keywords: exercise, information technology, qualitative research, wellness
Procedia PDF Downloads 3326886 Governance and Public Policy: The Perception of Civil Society Participation in Brazil and South Africa
Authors: Paulino V. Tavares, Ana L. Romao
Abstract:
Public governance, in general, is essential to qualify and educate, pedagogically, the decision-making process of the government in relation to the management of resources and the provision of public services, with transparency and active participation of individuals and citizens for the development of a more democratic environment, besides stimulating control and social empowerment, aiming at the development of the collectivity. In this context, the participation of society in the elaboration, execution, and control of public policies is prominent to strengthen public governance itself. With this, using a multidimensional approach with the application of two questionnaires to a universe of twenty Counselors of the Courts of Auditors (Brazil), twenty professionals of public administration (Brazil), twenty Government/Provincial Counselors (South Africa), and twenty South African professionals of public administration, the preliminary results indicate that the participation of civil society, for both countries, is very low in the elaboration, execution, and control of public policies. At the same time, about 70% of the answers obtained indicate, on average, three possible paths to increase the participation of civil society. With this, it is delineated that developing new horizons to strengthen both public policies how social participation is necessary, but, for both, it is important that governments and civil society, in their respective countries, have an awareness of the effective importance of this interaction.Keywords: Brazil, civil society, participation, South Africa
Procedia PDF Downloads 1436885 Keyloggers Prevention with Time-Sensitive Obfuscation
Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee
Abstract:
Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.Keywords: authentication, computer security, keylogger, privacy, information leakage
Procedia PDF Downloads 1216884 Study on the Characteristics of Victims and Victimizers of Intimate Partner Violence in Spain and Its Impact on Criminal Intervention
Authors: María José Benitez Jimenez
Abstract:
This research is based on the hypothesis that, despite being found that the problem of violence against the female partner occurs in all social classes, the criminal intervention falls, above all, on victims and aggressors with sociodemographic characteristics of the most excluded social groups. The methodology used in this study has been a collection of information through Spanish official statistics from 2004 to 2016: population, police, judicial and penitentiary data from Ministry of Interior, Ministry of Justice and statistics National Institute. The data provided show that women victims and aggressors who come into contact with criminal intervention bodies for filing a complaint or having been reported, respectively, show a very high percentage, usually well above 50%, only primary studies or even that. Their employment situation is also precarious, in a percentage that could also be around 70%. The percentage distribution of these two variables is clearly above that which occurs in the whole of the Spanish population, in a particularly marked way as regards the employment situation. Immigrants triple, as victims or as aggressors of gender violence, the percentages of the Spanish population in terms of their contact with the organs of criminal intervention. Also the rate of foreign inmates in prisons for violence against the female couple doubles that of Spanish inmates.Keywords: inmigrants, intimate partner violence, Spain, sociodemographic characteristics
Procedia PDF Downloads 1996883 The Social Aspects of Code-Switching in Online Interaction: The Case of Saudi Bilinguals
Authors: Shirin Alabdulqader
Abstract:
This research aims to investigate the concept of code-switching (CS) between English, Arabic, and the CS practices of Saudi online users via a Translanguaging (TL) lens for more inclusive view towards the nature of the data from the study. It employs Digitally Mediated Communication (DMC), specifically the WhatsApp and Twitter platforms, in order to understand how the users employ online resources to communicate with others on a daily basis. This project looks beyond language and considers the multimodal affordances (visual and audio means) that interlocutors utilise in their online communicative practices to shape their online social existence. This exploratory study is based on a data-driven interpretivist epistemology as it aims to understand how meaning (reality) is created by individuals within different contexts. This project used a mixed-method approach, combining a qualitative and a quantitative approach. In the former, data were collected from online chats and interview responses, while in the latter a questionnaire was employed to understand the frequency and relations between the participants’ linguistic and non-linguistic practices and their social behaviours. The participants were eight bilingual Saudi nationals (both men and women, aged between 20 and 50 years old) who interacted with others online. These participants provided their online interactions, participated in an interview and responded to a questionnaire. The study data were gathered from 194 WhatsApp chats and 122 Tweets. These data were analysed and interpreted according to three levels: conversational turn taking and CS; the linguistic description of the data; and CS and persona. This project contributes to the emerging field of analysing online Arabic data systematically, and the field of multimodality and bilingual sociolinguistics. The findings are reported for each of the three levels. For conversational turn taking, the CS analysis revealed that it was used to accomplish negotiation and develop meaning in the conversation. With regard to the linguistic practices of the CS data, the majority of the code-switched words were content morphemes. The third level of data interpretation is CS and its relationship with identity; two types of identity were indexed; absolute identity and contextual identity. This study contributes to the DMC literature and bridges some of the existing gaps. The findings of this study are that CS by its nature, and most of the findings, if not all, support the notion of TL that multiliteracy is one’s ability to decode multimodal communication, and that this multimodality contributes to the meaning. Either this is applicable to the online affordances used by monolinguals or multilinguals and perceived not only by specific generations but also by any online multiliterates, the study provides the linguistic features of CS utilised by Saudi bilinguals and it determines the relationship between these features and the contexts in which they appear.Keywords: social media, code-switching, translanguaging, online interaction, saudi bilinguals
Procedia PDF Downloads 1306882 Nature Manifestations: An Archetypal Analysis of Selected Nightwish Songs
Authors: Suzanne Strauss, Leandi Steenkamp
Abstract:
The Finnish symphonic metal band Nightwish is the brainchild of songwriter and lyricist TuomasHolopainen and the band recorded their first demonstration recording in 1996. The band has since produced nine full-length studio albums, the most recent being the 2020 album Human. :||: Nature., and has reached massive international success. The band is well known for songs about fantasy and escapism and employs many sonic, visual and branding tools and techniques to communicate these constructs to the audience. Among these, is the band’s creation of the so-called “Nightwish world and mythology” with a set of recurring characters and narratives which, in turn, creates a psychological anchor and safe space for Nightwish fans around the globe. Nature and the reverence of nature are central themes in Nightwish’s self-created mythology.Swiss psychologist Carl Jung’s theory of the collective unconscious identified a mysterious reservoir of psychological constructs common to all people, being derived from ancestral memory and experience, common to all humankind, and distinct from the individual’s personal unconscious. Furthermore, he defined archetypes as timeless collective patterns and images that springs forth from the collective unconscious. Archetypes can be actualized when they enter consciousness as images in interaction with the outside world. Archetypal patterns or images can manifest in different ways across world cultures, but follow common patterns, also known as archetypal themes and symbols. The Jungian approach to the psyche places great emphasis on nature, positing a direct link betweenthe concept of wholeness and responsible care for nature and the environment.In our proposed paper, we examine, by means of thematic content analysis, how Nightwish makes use of archetypal themes and symbols referring to nature and the environment in selected songs from their ninth full-length album Human. II Nature. Furthermore, we argue that the longing for and reverence of nature in selected Nightwish songs may serve as a type of “social intervention” and social critique on modern capitalist society. The type of social critique that the band offers is generally connoted intertextually and is not equally explicit in their songs. The band uses a unique combination of escapism, fantasy, and nature narratives to inspire a sense of wonder, enchantment, and magic in the listener. In this way, escapism, fantasy, and nature serve as postmodern frames of reference that aim to “re-enchant” the disenchanted and de-spiritualized. In this way, re-enchantment could also refer to spiritual and/or psychological healing and rebirth.Keywords: archetypes, metal music, nature, Nightwish, social interventions
Procedia PDF Downloads 1106881 The Role of Situational Factors in User Experience during Human-Robot Interaction
Authors: Da Tao, Tieyan Wang, Mingfu Qin
Abstract:
While social robots have been increasingly developed and rapidly applied in our daily life, how robots should interact with humans is still an urgent problem to be explored. Appropriate use of interactive behavior is likely to create a good user experience in human-robot interaction situations, which in turn can improve people’s acceptance of robots. This paper aimed to systematically and quantitatively examine the effects of several important situational factors (i.e., interaction distance, interaction posture, and feedback style) on user experience during human-robot interaction. A three-factor mixed designed experiment was adopted in this study, where subjects were asked to interact with a social robot in different interaction situations by combinations of varied interaction distance, interaction posture, and feedback style. A set of data on users’ behavioral performance, subjective perceptions, and eye movement measures were tracked and collected, and analyzed by repeated measures analysis of variance. The results showed that the three situational factors showed no effects on behavioral performance in tasks during human-robot interaction. Interaction distance and feedback style yielded significant main effects and interaction effects on the proportion of fixation times. The proportion of fixation times on the robot is higher for negative feedback compared with positive feedback style. While the proportion of fixation times on the robot generally decreased with the increase of the interaction distance, it decreased more under the positive feedback style than under the negative feedback style. In addition, there were significant interaction effects on pupil diameter between interaction distance and posture. As interaction distance increased, mean pupil diameter became smaller in side interaction, while it became larger in frontal interaction. Moreover, the three situation factors had significant interaction effects on user acceptance of the interaction mode. The findings are helpful in the underlying mechanism of user experience in human-robot interaction situations and provide important implications for the design of robot behavioral expression and for optimal strategies to improve user experience during human-robot interaction.Keywords: social robots, human-robot interaction, interaction posture, interaction distance, feedback style, user experience
Procedia PDF Downloads 1306880 Materialized View Effect on Query Performance
Authors: Yusuf Ziya Ayık, Ferhat Kahveci
Abstract:
Currently, database management systems have various tools such as backup and maintenance, and also provide statistical information such as resource usage and security. In terms of query performance, this paper covers query optimization, views, indexed tables, pre-computation materialized view, query performance analysis in which query plan alternatives can be created and the least costly one selected to optimize a query. Indexes and views can be created for related table columns. The literature review of this study showed that, in the course of time, despite the growing capabilities of the database management system, only database administrators are aware of the need for dealing with archival and transactional data types differently. These data may be constantly changing data used in everyday life, and also may be from the completed questionnaire whose data input was completed. For both types of data, the database uses its capabilities; but as shown in the findings section, instead of repeating similar heavy calculations which are carrying out same results with the same query over a survey results, using materialized view results can be in a more simple way. In this study, this performance difference was observed quantitatively considering the cost of the query.Keywords: cost of query, database management systems, materialized view, query performance
Procedia PDF Downloads 2776879 Affective Communities of Women in the Classic Spanish-Mexican-Argentinian Cinema. A Comparative Perspective from a South-South Gaze
Authors: Invernizzi Agostina
Abstract:
From the 1930s, it is possible to find a phenomenon that persists through to the sixties in the national filmographies of different southern latitudes (Spain, Mexico, Argentina): the proliferation of ensemble films of groups of women who serve base to elaborate broader social conflicts and to construct imaginaries of the nation and of genders. This paper will address the modes of figuration of some affective imaginaries among women where the forms of sociability and the bonds of sisterhood are determined by the spaces in which the women are grouped. In these films, there are forms of affectivity that dispute the meanings of the patriarchal order of the time. One of the hypotheses is that these films formulate communities of women that carry out a reconfiguration of affective and transnational spaces. This research presents a multidisciplinary approach that simultaneously combines film and audiovisual studies, gender studies, decolonial feminist theories, and affects theories. The study of this phenomenon will provide us with keys for articulating with current problematics, such as the genealogies of women's movements, of which the cinema offers echoes and is a privileged medium for reflection and social change, as well as the international contact flows between these three geographical points, their migratory processes and cultural exchanges, transnationalism and integration.Keywords: affects, feminisms, film studies, gender
Procedia PDF Downloads 1066878 Perception and Usage of Academic Social Networks among Scientists: A Cross-Sectional Study of North Indian Universities
Authors: Anita Chhatwal
Abstract:
Purpose: The purpose of this paper is to evaluate and investigate the scope of usage of Academic Social Networking Websites (ASNs) by the Science faculty members across universities of North India, viz. Panjab University, Punjabi University and University of Delhi, Delhi. Design/Methodology/Approach: The present study is based upon the primary data collected from 81 science faculty participants from three universities of North India. Questionnaire method was used as an instrument for survey. The study is descriptive and research-based to investigate the popular ASNs amongst the participants from three sample universities and the purpose for which they use them along with the problems they encounter while using ASNs. Findings: The findings of the study revealed that majority of the participants were using ASNs for their academic needs. It was observed that majority of the participants (78%) used ASNs to access scientific papers, while 73.8% of the participants used them to share their research publications. ResearchGate (60.5%) and Google Scholar (59.7%) were the top two most preferred and widely used ASNs by the participants. The critical analysis of the data shows that laptops (86.3%) emerged as major tools for accessing ASNs. Shortage of computers was found to be the chief obstacle in accessing ASNs by the participants. Results of the study demonstrate that 56.3% of participants suggested conduct of seminars and training as the most effective method to increase the awareness of ASNs. Research Limitations/Implications: The study in hand absorbed the 81 faculty (Assistant Professors) members from 15 Science teaching departments across three sample universities of North India. The findings of this study will help the Government of India to regulate and simultaneously make effort to develop and enhance ASNs usage among faculty, researchers, and students. The present study will add to the existing library and information science literature and will be advantageous for all the information professionals as well. Originality/Value: This study is original survey based on primary data investigate the usage of ASNs by the academia. This study will be useful for research scholars, academicians and students all over the world.Keywords: academic social networks, awareness and usage, North India, scholarly communication, web 2.0
Procedia PDF Downloads 1176877 Preference and Perspective for Gift Over-packaging Solution: A Case Study of Consumers in Shanghai, China
Authors: Heping Wang
Abstract:
Social interaction has increased as a result of rapid economic expansion. Particularly in China, gift exchanges have developed into a social tradition of showing gratitude. Most gifts, on the other hand, are lavishly presented or overpacked to impress or demonstrate respect to the gift receiver. Overpackaging wastes enormous resources and produces a lot of municipal solid waste (MSW), which can seriously harm the environment if it is not handled properly. The purpose of this study is to investigate consumers' perceptions, preferences, and perspectives regarding gifts overpackaging in order to identify potential solutions for reducing gifts overpackaging to achieve sustainable packaging objectives. The research was conducted by means of an online survey focusing on residents in Shanghai, China, and the data was quantitatively analyzed by SPSS software. According to research, consumers' perception of excessive packaging is approximately 3.5 points out of 5, and this perception has a significant impact on consumers' behavioral intentions; The preferences of givers and receivers for gift packaging are significantly different in three aspects; Customers prefer incentives for eco-packaging when it comes to measures to reduce gift overpackaging. Finally, the study also identifies suitable gift packaging options for customers.Keywords: gift packaging, consumer perception, consumer preference, consumer perspective, overpackaging, solutions
Procedia PDF Downloads 636876 Consumer Behaviour Model for Apparel E-Tailers Using Structural Equation Modelling
Authors: Halima Akhtar, Abhijeet Chandra
Abstract:
The paper attempts to analyze the factors that influence the Consumer Behavior to purchase apparel through the internet. The intentions to buy apparels online were based on in terms of user style, orientation, size and reputation of the merchant, social influence, perceived information utility, perceived ease of use, perceived pleasure and attractiveness and perceived trust and risk. The basic framework used was Technology acceptance model to explain apparels acceptance. A survey was conducted to gather the data from 200 people. The measures and hypotheses were analyzed using Correlation testing and would be further validated by the Structural Equation Modelling. The implications of the findings for theory and practice could be used by marketers of online apparel websites. Based on the values obtained, we can conclude that the factors such as social influence, Perceived information utility, attractiveness and trust influence the decision for a user to buy apparels online. The major factors which are found to influence an online apparel buying decision are ease of use, attractiveness that a website can offer and the trust factor which a user shares with the website.Keywords: E-tailers, consumer behaviour, technology acceptance model, structural modelling
Procedia PDF Downloads 1856875 Jesus’ Approach in Liberation of the Poor, Luke 4:18-19: Lesson for Nigerian Leaders
Authors: Aboekwe, Mary Emilia
Abstract:
Jesus’ mission was not only a religious one but had social and political implications. From the birth to the death of Jesus, God’s message of liberation is proclaimed in and through Jesus. This work studied Jesus’ inaugural mission in Luke 4: 18 -19 in the context of Nigerian leaders. A theological interpretation was adopted and it was discovered that Luke 4: 18-19 unfolded Jesus’ mission statement. This mission statement centered in preaching the good news to the poor, the release of the captives, healing the sick, liberation to the oppressed, and favour and abundance in the land. Related to the Jewish-Roman world of Jesus and the Nigerian nation, it was discovered that most of the maladies enumerated in Jesus’ inaugural mission statement were prevalent in Nigerian society. Maladies like poverty, oppression, violence, sickness and diseases are widespread in Nigeria. Poverty affects all, irrespective of gender, religion, or ethnicity. There is insecurity everywhere. Unemployment bites harder on Nigeria’s youthful population, and they are unable to find a job at the prevailing wage rate. To this effect, therefore, this study proposes Jesus’ liberative technique as a solution to these maladies prevalent in the country. The work equally challenged the Nigerian leaders to emulate Jesus’ mission statement and take proactive measures in fighting against these social challenges resident in Nigeria today.Keywords: liberation, leadership, maladies, poverty
Procedia PDF Downloads 756874 The Relationship Between Teachers’ Attachment Insecurity and Their Classroom Management Efficacy
Authors: Amber Hatch, Eric Wright, Feihong Wang
Abstract:
Research suggests that attachment in close relationships affects one’s emotional processes, mindfulness, conflict-management behaviors, and interpersonal interactions. Attachment insecurity is often associated with maladaptive social interactions and suboptimal relationship qualities. Past studies have considered how the nature of emotion regulation and mindfulness in teachers may be related to student or classroom outcomes. Still, no research has examined how the relationship between such internal experiences and classroom management outcomes may also be related to teachers’ attachment insecurity. This study examined the interrelationships between teachers’ attachment insecurity, mindfulness tendencies, emotion regulation abilities, and classroom management efficacy as indexed by students’ classroom behavior and teachers’ response effectiveness. Teachers’ attachment insecurity was evaluated using the global ECRS-SF, which measures both attachment anxiety and avoidance. The present study includes a convenient sample of 357 American elementary school teachers who responded to a survey regarding their classroom management efficacy, attachment in/security, dispositional mindfulness, emotion regulation strategies, and difficulties in emotion regulation, primarily assessed via pre-existing instruments. Good construct validity was demonstrated for all scales used in the survey. Sample demographics, including gender (94% female), race (92% White), age (M = 41.9 yrs.), years of teaching experience (M = 15.2 yrs.), and education level were similar to the population from which it was drawn, (i.e., American elementary school teachers). However, white women were slightly overrepresented in our sample. Correlational results suggest that teacher attachment insecurity is associated with poorer classroom management efficacy as indexed by students’ disruptive behavior and teachers’ response effectiveness. Attachment anxiety was a much stronger predictor of adverse student behaviors and ineffective teacher responses to adverse behaviors than attachment avoidance. Mindfulness, emotion regulation abilities, and years of teaching experience predicted positive classroom management outcomes. Attachment insecurity and mindfulness were more strongly related to frequent adverse student behaviors, while emotion regulation abilities were more strongly related to teachers’ response effectiveness. The teaching experience was negatively related to attachment insecurity and positively related to mindfulness and emotion regulation abilities. Although the data were cross-sectional, path analyses revealed that attachment insecurity is directly related to classroom management efficacy. Through two routes, this relationship is further mediated by emotion regulation and mindfulness in teachers. The first route of indirect effect suggests double mediation by teacher’s emotion regulation and then teacher mindfulness in the relationship between teacher attachment insecurity and classroom management efficacy. The second indirect effect suggests mindfulness directly mediated the relationship between attachment insecurity and classroom management efficacy, resulting in improved model fit statistics. However, this indirect effect is much smaller than the double mediation route through emotion regulation and mindfulness in teachers. Given the significant predication of teacher attachment insecurity, mindfulness, and emotion regulation on teachers’ classroom management efficacy both directly and indirectly, the authors recommend improving teachers’ classroom management efficacy via a three-pronged approach aiming at enhancing teachers’ secure attachment and supporting their learning adaptive emotion regulation strategies and mindfulness techniques.Keywords: Classroom management efficacy, student behavior, teacher attachment, teacher emotion regulation, teacher mindfulness
Procedia PDF Downloads 846873 Navigating States of Emergency: A Preliminary Comparison of Online Public Reaction to COVID-19 and Monkeypox on Twitter
Authors: Antonia Egli, Theo Lynn, Pierangelo Rosati, Gary Sinclair
Abstract:
The World Health Organization (WHO) defines vaccine hesitancy as the postponement or complete denial of vaccines and estimates a direct linkage to approximately 1.5 million avoidable deaths annually. This figure is not immune to public health developments, as has become evident since the global spread of COVID-19 from Wuhan, China in early 2020. Since then, the proliferation of influential, but oftentimes inaccurate, outdated, incomplete, or false vaccine-related information on social media has impacted hesitancy levels to a degree described by the WHO as an infodemic. The COVID-19 pandemic and related vaccine hesitancy levels have in 2022 resulted in the largest drop in childhood vaccinations of the 21st century, while the prevalence of online stigma towards vaccine hesitant consumers continues to grow. Simultaneously, a second disease has risen to global importance: Monkeypox is an infection originating from west and central Africa and, due to racially motivated online hate, was in August 2022 set to be renamed by the WHO. To better understand public reactions towards two viral infections that became global threats to public health no two years apart, this research examines user replies to threads published by the WHO on Twitter. Replies to two Tweets from the @WHO account declaring COVID-19 and Monkeypox as ‘public health emergencies of international concern’ on January 30, 2020, and July 23, 2022, are gathered using the Twitter application programming interface and user mention timeline endpoint. Research methodology is unique in its analysis of stigmatizing, racist, and hateful content shared on social media within the vaccine discourse over the course of two disease outbreaks. Three distinct analyses are conducted to provide insight into (i) the most prevalent topics and sub-topics among user reactions, (ii) changes in sentiment towards the spread of the two diseases, and (iii) the presence of stigma, racism, and online hate. Findings indicate an increase in hesitancy to accept further vaccines and social distancing measures, the presence of stigmatizing content aimed primarily at anti-vaccine cohorts and racially motivated abusive messages, and a prevalent fatigue towards disease-related news overall. This research provides value to non-profit organizations or government agencies associated with vaccines and vaccination programs in emphasizing the need for public health communication fitted to consumers' vaccine sentiments, levels of health information literacy, and degrees of trust towards public health institutions. Considering the importance of addressing fears among the vaccine hesitant, findings also illustrate the risk of alienation through stigmatization, lead future research in probing the relatively underexamined field of online, vaccine-related stigma, and discuss the potential effects of stigma towards vaccine hesitant Twitter users in their decisions to vaccinate.Keywords: social marketing, social media, public health communication, vaccines
Procedia PDF Downloads 98