Search results for: intention of repeat transactions
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1197

Search results for: intention of repeat transactions

657 Using Focus Group Method to Identify Citizen Requirements to Saudi Mobile Government Services

Authors: S. Alotaibi, D. Roussinov

Abstract:

Mobile government services implementation faces several challenges in developing countries. This paper studies some of those challenges in the context of Saudi Arabia. The study aims to investigate factors affecting m-government acceptance in Saudi Arabia, including ease of use, usefulness, service quality, trust, intention to use and users’ satisfaction. Our investigation will help in integrating the m-government services in citizens’ everyday life. We collected and analyzed our data from focus groups. These focus groups are from King Saud University and Imam Muhammed Bin Saud University, so the samples size are five and seven participants, respectively. We found that there are some factors to identifying citizen requirements to Saudi mobile government services. These services should be easy to use and not require too much effort. Also, these services must be fully trusted.

Keywords: e-government, m-government, focus group, Saudi mobile government services

Procedia PDF Downloads 297
656 Leveraging NFT Secure and Decentralized Lending: A Defi Solution

Authors: Chandan M. S., Darshan G. A., Vyshnavi, Abhishek T.

Abstract:

In the evolving world of technology and digital assets, non-fungible tokens (NFTs) have emerged as the latest advancement. These digital assets represent ownership of intangible items and hold significant value. Unlike cryptocurrencies, like Ethereum or Bitcoin, NFTs cannot be exchanged due to their nature. Each NFT has an indivisible value. NFTs not only pave the way for financial services but also open up fresh opportunities for creators, buyers and artists. To revolutionize financing in the DeFi space, this proposed approach utilizes NFTs generated from digital arts. By eliminating intermediaries, this innovative method ensures trust and security in transactions. The idea entails automating borrower-lender interactions through contracts while securely storing data using blockchain technology. Borrowers can obtain funding by leveraging assets such as estate, artwork and collectibles that are often illiquid. The key component of this system is contracts that independently execute lending agreements and collateral transfers within predefined parameters. By leveraging the Ethereum blockchain, this project aims to provide consumers with access to a platform offering a wide range of financial services. The demonstration illustrates how NFT lending and borrowing is managed through contracts, providing a secure and trustworthy transaction environment.

Keywords: blockchain, defi, NFT, ethereum, marketplace

Procedia PDF Downloads 53
655 Offline Signature Verification Using Minutiae and Curvature Orientation

Authors: Khaled Nagaty, Heba Nagaty, Gerard McKee

Abstract:

A signature is a behavioral biometric that is used for authenticating users in most financial and legal transactions. Signatures can be easily forged by skilled forgers. Therefore, it is essential to verify whether a signature is genuine or forged. The aim of any signature verification algorithm is to accommodate the differences between signatures of the same person and increase the ability to discriminate between signatures of different persons. This work presented in this paper proposes an automatic signature verification system to indicate whether a signature is genuine or not. The system comprises four phases: (1) The pre-processing phase in which image scaling, binarization, image rotation, dilation, thinning, and connecting ridge breaks are applied. (2) The feature extraction phase in which global and local features are extracted. The local features are minutiae points, curvature orientation, and curve plateau. The global features are signature area, signature aspect ratio, and Hu moments. (3) The post-processing phase, in which false minutiae are removed. (4) The classification phase in which features are enhanced before feeding it into the classifier. k-nearest neighbors and support vector machines are used. The classifier was trained on a benchmark dataset to compare the performance of the proposed offline signature verification system against the state-of-the-art. The accuracy of the proposed system is 92.3%.

Keywords: signature, ridge breaks, minutiae, orientation

Procedia PDF Downloads 146
654 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 88
653 Application of the Quantile Regression Approach to the Heterogeneity of the Fine Wine Prices

Authors: Charles-Olivier Amédée-Manesme, Benoit Faye, Eric Le Fur

Abstract:

In this paper, the heterogeneity of the Bordeaux Legends 50 wine market price segment is addressed. For this purpose, quantile regression is applied – with market segmentation based on wine bottle price quantile – and the hedonic price of wine attributes is computed for various price segments of the market. The approach is applied to a major privately held data set which consists of approximately 30,000 transactions over the 2003–2014 period. The findings suggest that the relative hedonic prices of several wine attributes differ significantly among deciles. In particular, the elasticity coefficient of the expert ratings shows strong variation among prices. If - as suggested in the literature - expert ratings have a positive influence on wine price on average, they have a clearly decreasing impact over the quantiles. Finally, the lower the wine price, the higher the potential for price appreciation over time. Other variables such as chateaux or vintage are also shown to vary across the distribution of wine prices. While enhancing our understanding of the complex market dynamics that underlie Bordeaux wines’ price, this research provides empirical evidence that the QR approach adequately captures heterogeneity among wine price ranges, which simultaneously applies to wine stock, vintage and auctions’ house.

Keywords: hedonics, market segmentation, quantile regression, heterogeneity, wine economics

Procedia PDF Downloads 340
652 The Big Bang Was Not the Beginning, but a Repeating Pattern of Expansion and Contraction of the Spacetime

Authors: Amrit Ladhani

Abstract:

The cyclic universe theory is a model of cosmic evolution according to which the universe undergoes endless cycles of expansion and cooling, each beginning with a “big bang” and ending in a “big crunch”. In this paper, we propose a unique property of Space-time. This particular and marvelous nature of space shows us that space can stretch, expand, and shrink. This property of space is caused by the size of the universe change over time: growing or shrinking. The observed accelerated expansion, which relates to the stretching of Shrunk space for the new theory, is derived. This theory is based on three underlying notions: First, the Big Bang is not the beginning of Space-time, but rather, at the very beginning fraction of a second, there was an infinite force of infinite Shrunk space in the cosmic singularity that force gave rise to the big bang and caused the rapidly growing of space, and all other forms of energy are transformed into new matter and radiation and a new period of expansion and cooling begins. Second, there was a previous phase leading up to it, with multiple cycles of contraction and expansion that repeat indefinitely. Third, the two principal long-range forces are the gravitational force and the repulsive force generated by shrink space. They are the two most fundamental quantities in the universe that govern cosmic evolution. They may provide the clockwork mechanism that operates our eternal cyclic universe. The universe will not continue to expand forever; no need, however, for dark energy and dark matter. This new model of Space-time and its unique properties enables us to describe a sequence of events from the Big Bang to the Big Crunch.

Keywords: dark matter, dark energy, cosmology, big bang and big crunch

Procedia PDF Downloads 78
651 Effect of Social Media on Online Buyer Behavior

Authors: Zebider Asire Munyelet, Yibeltal Chanie Manie

Abstract:

In the modern digital landscape, the increase of social media platforms has become identical to the evolution of online consumer behavior. This study investigates the complicated relationship between social media and the purchasing decisions of online buyers. Through an extensive review of existing literature and empirical research, the aim is to comprehensively analyze the multidimensional impact that social media exerts on the various stages of the online buyer's journey. The investigation encompasses the exploration of how social media platforms serve as influential channels for information dissemination, product discovery, and consumer engagement. Additionally, the study investigates the psychological aspects underlying the role of social media in shaping buyer preferences, perceptions, and trust in online transactions. The methodologies employed include both quantitative and qualitative analyses, incorporating surveys, interviews, and data analytics to derive meaningful insights. Statistical models are applied to distinguish patterns in online buyer behavior concerning product awareness, brand loyalty, and decision-making processes. The expected outcomes of this research contribute not only to the academic understanding of the dynamic interplay between social media and online buyer behavior but also offer practical implications for marketers, e-commerce platforms, and policymakers.

Keywords: social platforms, buyer behavior, consumer behavior, digital era

Procedia PDF Downloads 77
650 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 218
649 Cognitive Behaviour Hypnotherapy as an Effective Intervention for Nonsuicidal Self Injury Disorder

Authors: Halima Sadia Qureshi, Urooj Sadiq, Noshi Eram Zaman

Abstract:

The goal of this study was to see how cognitive behavior hypnotherapy affected nonsuicidal self-injury. DSM 5 invites the researchers to explore the newly added condition under the chapter of conditions under further study named Nonsuicidal self-injury disorder. To date, no empirical sound intervention has been proven effective for NSSI as given in DSM 5. Nonsuicidal self-injury is defined by DSM 5 as harming one's self physically, without suicidal intention. Around 7.6% of teenagers are expected to fulfill the NSSI disorder criteria. 3 Adolescents, particularly university students, account for around 87 percent of self-harm studies. Furthermore, one of the risks associated with NSSI is an increased chance of suicide attempts, and in most cases, the cycle repeats again. 6 The emotional and psychological components of the illness might lead to suicide, either intentionally or unintentionally. 7 According to a research done at a Pakistani military hospital, over 80% of participants had no intention of committing suicide. Furthermore, it has been determined that improvements in NSSI prevention and intervention are necessary as a stand-alone strategy. The quasi-experimental study took place in Islamabad and Rawalpindi, Pakistan, from May 2019 to April 2020 and included students aged 18 to 25 years old from several institutions and colleges in the twin cities. According to the Diagnostic and Statistical Manual of Mental Disorders 5th edition, the individuals were assessed for >2 episodes without suicidal intent using the intentional self-harm questionnaire. The Clinician Administered Nonsuicidal Self-Injury Disorder Index (CANDI) was used to assess the individual for NSSI condition. Symptom checklist-90 (SCL-90) was used to screen the participants for differential diagnosis. Mclean Screening Instrument for Borderline Personality Disorder (MSI-BPD) was used to rule out the BPD cases. The selected participants, n=106 from the screening sample of 600, were selected. They were further screened to meet the inclusion and exclusion criteria, and the total of n=71 were split into two groups: intervention and control. The intervention group received cognitive behavior hypnotherapy for the next three months, whereas the control group received no treatment. After the period of three months, both the groups went through the post assessment, and after the three months’ period, follow-up assessment was conducted. The groups were evaluated, and SPSS 25 was used to analyse the data. The results showed that each of the two groups had 30 (50 percent) of the 60 participants. There were 41 males (68 percent) and 19 girls (32 percent) in all. The bulk of the participants were between the ages of 21 and 23. (48 percent). Self-harm events were reported by 48 (80 percent) of the pupils, and suicide ideation was found in 6 (ten percent). In terms of pre- and post-intervention values (d=4.90), post-intervention and follow-up assessment values (d=0.32), and pre-intervention and follow-up values (d=5.42), the study's effect size was good. The comparison of treatment and no-treatment groups revealed that treatment was more successful than no-treatment, F (1, 58) = 53.16, p.001. The results reveal that the treatment manual of CBH is effective for Nonsuicidal self-injury disorder.

Keywords: NSSI, nonsuicidal self injury disorder, self-harm, self-injury, Cognitive behaviour hypnotherapy, CBH

Procedia PDF Downloads 182
648 Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card

Authors: Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi

Abstract:

In today's world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is ‘proof of existence’, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on ‘blockchain’ technology, which is a 'decentralized system'. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to ‘have everything with nothing’. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends.

Keywords: blockchain, decentralized system, fingerprint impression, identity management, iris scan

Procedia PDF Downloads 128
647 Factors of Social Media Platforms on Consumer Behavior

Authors: Zebider Asire Munyelet, Yibeltal Chanie Manie

Abstract:

In the modern digital landscape, the increase of social media platforms has become identical to the evolution of online consumer behavior. This study investigates the complicated relationship between social media and the purchasing decisions of online buyers. Through an extensive review of existing literature and empirical research, the aim is to comprehensively analyze the multidimensional impact that social media exerts on the various stages of the online buyer's journey. The investigation encompasses the exploration of how social media platforms serve as influential channels for information dissemination, product discovery, and consumer engagement. Additionally, the study investigates into the psychological aspects underlying the role of social media in shaping buyer preferences, perceptions, and trust in online transactions. The methodologies employed include both quantitative and qualitative analyses, incorporating surveys, interviews, and data analytics to derive meaningful insights. Statistical models are applied to distinguish patterns in online buyer behavior concerning product awareness, brand loyalty, and decision-making processes. The expected outcomes of this research contribute not only to the academic understanding of the dynamic interplay between social media and online buyer behavior but also offer practical implications for marketers, e-commerce platforms, and policymakers.

Keywords: consumer Behavior, social media, online purchasing, online transaction

Procedia PDF Downloads 75
646 Government Credit Card in State Financial Management: Public Sector Innovation in Indonesia

Authors: Paramita Nur Kurniati, Stanislaus Riyanta

Abstract:

In the midst of the heightened usage of electronic money (e-money), Indonesian government expenditure is yet governed through cash-basis transactions. This conventional system brings about a number of potential risks and obstacles to operational conduct, including state financial liquidity issue. Consequently, Ministry of Finance is currently establishing the cashless payment methods for State Budget (APBN). Included in those advance methods is credit card facility as a government expenditure payment scheme. This policy is one of the innovations within the public sector learned from other countries’ best practices. Moreover, this particular method is already prominent within the private-sector realm. Qualitative descriptive analysis technique is implemented to evaluate the contemporary innovation of using government credit card in the path towards cashless society. This approach is expected to generate several benefits for the government, particularly in minimizing corruption within the state financial management. Effective coordination among policy makers and policy implementers is essential for the success of this policy’s exercise, without neglecting prudence and public transparency aspects. Government credit card usage shall be the potent resolution for enhancing the government’s overall public service performance.

Keywords: cashless basis, cashless society, government credit card, public sector innovation

Procedia PDF Downloads 149
645 The Beauty and the Cruel: The Price of Ethics

Authors: Camila Lee Park, Mauro Fracarolli Nunes

Abstract:

Understood as the preference for products and services that do not involve moral dilemmas, ethical consumption has been increasingly discussed by scholars, practitioners, and consumers. Among its diverse trends, the defense of animal rights and welfare seems to have gained particular momentum in past decades. Not surprisingly, companies, governments, ideologues, and virtually any institution or group interested in (re)shaping society invest in the building of narratives oriented to influence consumption behavior. The animal rights movement, for example, is devoted to the elimination of the use of animals in science, as well as of commercial animal agriculture and hunting activities. Although advances in ethical consumption may be observed in practice, it still seems more popular as rhetoric. Diverse scholars have addressed the disparities between self-professed ethical consumers and their actual purchase patterns, with differences being attributed to factors such as price sensitivity, lack of information, quality, cynicism, and limited availability. The gap is also linked to the 'consumer sovereignty myth', according to which consumers are only able to choose from a pre-determined range of choices made before products reach them. On the other hand, academics also debate ethical consumption behavior as more likely to occur when it assumes compliance with social norms. As sustainability becomes a permanent issue, customers may tend to adhere to ethical consumption, either because of an individual value or due to a social one. Regardless of these efforts, the actual value attributed to ethical businesses remains unclear. Likewise, the power of stakeholders’ initiatives to influence corporate strategies is dubious. In search to offer new perspectives on these matters, the present study concentrates on the following research questions: Do customers value products/companies that respect animal rights? If so, does such enhanced value convert into actions from the part of the companies? Broadly, we aim to understand if customers’ perception holds performative traits (i.e., are capable of either trigger or contribute to changes in organizational behaviour around the respect for animal rights). In addressing these issues, two preliminary behavioral vignette-based experiments were conducted, with the perspectives of 307 participants being assessed. Building on a case of the cosmetics industry, social, emotional, and functional values were hypothesized as directly impacting positive word-of-mouth, which, in turn, would carry direct effects on purchase intention. A first structural equation model was analyzed with the combined samples of studies I and II. Results suggest that emotional value strongly impacts both positive word-of-mouth and purchase intention. Data confirms initial expectations on customers valuing products and companies that comply with ethical postures concerning animals, especially if social-oriented practices are also present.

Keywords: animal rights, business ethics, emotional value, ethical consumption

Procedia PDF Downloads 119
644 Electronic Government Services Adoption from Multi-Nationalities Perspectives

Authors: Isaac Kofi Mensah, Jianing Mi, Cheng Feng

Abstract:

Electronic government is the application of Information and Communication Technologies (ICTs) by the government to improve public service delivery to citizens and businesses. The purpose of this study is to investigate factors influencing the adoption and use of e-government services from different nationalities perspectives. The Technology Acceptance Model (TAM) will be used as the theoretical framework for the study. A questionnaire would be developed and administered to 500 potential respondents who are students from different nationalities in China. Predictors such as perceived usefulness, perceived ease of use, computer self-efficacy, trust in both the internet and government, social influence and perceived service quality would be examined with regard to their impact on the intention to use e-government services. This research is currently at the design and implementation stage. The completion of this study will provide useful insights into understanding factors impacting the decision to use e-government services from a cross and multi nationalities perspectives.

Keywords: different nationalities, e-government, e-government services, technology acceptance model (TAM)

Procedia PDF Downloads 429
643 Applying Concurrent Development Process for the Web Using Aspect-Oriented Approach

Authors: Hiroaki Fukuda

Abstract:

This paper shows a concurrent development process for modern web application, called Rich Internet Application (RIA), and describes its effect using a non-trivial application development. In the last years, RIAs such as Ajax and Flex have become popular based mainly on high-speed network. RIA provides sophisticated interfaces and user experiences, therefore, the development of RIA requires two kinds of engineer: a developer who implements business logic, and a designer who designs interface and experiences. Although collaborative works are becoming important for the development of RIAs, shared resources such as source code make it difficult. For example, if a design of interface is modified after developers have finished business logic implementations, they need to repeat the same implementations, and also tests to verify application’s behavior. MVC architecture and Object-oriented programming (OOP) enables to dividing an application into modules such as interfaces and logic, however, developers and/or designers have to write pieces of code (e.g., event handlers) that make these modules work as an application. On the other hand, Aspect-oriented programming (AOP) is ex- pected to solve complexity of application software development nowadays. AOP provides methods to separate crosscutting concerns that are scattered pieces of code from primary concerns. In this paper, we provide a concurrent development process for RIAs by introducing AOP concept. This process makes it possible to reduce shared resources between developers and designers, therefore they can perform their tasks concurrently. In addition, we describe experiences of development for a practical application using our proposed development process to show its availability.

Keywords: aspect-oriented programming, concurrent, development process, rich internet application

Procedia PDF Downloads 301
642 The Utilization of Big Data in Knowledge Management Creation

Authors: Daniel Brian Thompson, Subarmaniam Kannan

Abstract:

The huge weightage of knowledge in this world and within the repository of organizations has already reached immense capacity and is constantly increasing as time goes by. To accommodate these constraints, Big Data implementation and algorithms are utilized to obtain new or enhanced knowledge for decision-making. With the transition from data to knowledge provides the transformational changes which will provide tangible benefits to the individual implementing these practices. Today, various organization would derive knowledge from observations and intuitions where this information or data will be translated into best practices for knowledge acquisition, generation and sharing. Through the widespread usage of Big Data, the main intention is to provide information that has been cleaned and analyzed to nurture tangible insights for an organization to apply to their knowledge-creation practices based on facts and figures. The translation of data into knowledge will generate value for an organization to make decisive decisions to proceed with the transition of best practices. Without a strong foundation of knowledge and Big Data, businesses are not able to grow and be enhanced within the competitive environment.

Keywords: big data, knowledge management, data driven, knowledge creation

Procedia PDF Downloads 116
641 The Effect of Customs Commission Customer Satisfaction

Authors: Menelik Tilahun Alemu

Abstract:

Customs administrations are now increasingly regarded as the key border agencies responsible for all transactions related to issues arising from the border crossings of goods and people. Raising revenue has traditionally been high on the agenda of governments, represented by the Ministry of Finance (MOF), because of the critical importance of import duties as a source of budget revenue for many developing countries. Most of these functions are undertaken in close cooperation with other national agencies. Due to the need to make structural reforms that consider the nature of business activities in the world and the needs of consumers, the institution was previously divided into the Ministry of Revenue and the Customs Commission. Accordingly, the Ministry of Revenue is primarily responsible for administering and collecting local taxes, while the Customs Commission is responsible for administering customs matters; It supports exports and collects revenue from it. The National Import and Export Trade Service System is working to make the world more transparent and standardized and adapt to the current situation by formulating various guidelines, rules and procedures to provide a clear, simple, predictable and accessible service to customers. As a result, the commission will be able to streamline the business process by enabling Paperless customer service to support the service delivery technology and eliminate the customer iteration without having to incur unnecessary costs and inconveniences.

Keywords: business, consumers, adapt, transparent

Procedia PDF Downloads 50
640 Analytical Study of Data Mining Techniques for Software Quality Assurance

Authors: Mariam Bibi, Rubab Mehboob, Mehreen Sirshar

Abstract:

Satisfying the customer requirements is the ultimate goal of producing or developing any product. The quality of the product is decided on the bases of the level of customer satisfaction. There are different techniques which have been reported during the survey which enhance the quality of the product through software defect prediction and by locating the missing software requirements. Some mining techniques were proposed to assess the individual performance indicators in collaborative environment to reduce errors at individual level. The basic intention is to produce a product with zero or few defects thereby producing a best product quality wise. In the analysis of survey the techniques like Genetic algorithm, artificial neural network, classification and clustering techniques and decision tree are studied. After analysis it has been discovered that these techniques contributed much to the improvement and enhancement of the quality of the product.

Keywords: data mining, defect prediction, missing requirements, software quality

Procedia PDF Downloads 467
639 The Criteria of the Aesthetic Quality of Art: Contemporary Photography

Authors: Artem Surkov

Abstract:

This work is devoted to a problem of aesthetic quality determinism in the context of contemporary art. The object of study is photography regarding as a kind of art which demands specific system of quality marking. Objective: To define aesthetic criteria in photography art. For current searching different kind of texts by such powerful authors like Clement Greenberg and Rosalind Krauss, Theodor Adorno and Herbert Marcuse, Charlott Cotton and Boris Groys, Viktor Miziano and Ekaterina Degot' were analyzed. Before all, there are two different kinds of photography: the classic art photography (by Ansel Adams) and the photography as kind of art (by Andreas Gursky). In this text we are talking about the photography as kind of art. The main principle of current searching is synthesis of two different approaches: modernism and postmodernism. This method helps us to define uniform criteria of aesthetic quality in photography as kind of art. The criteria mentioned in conclusion paragraph are: aesthetic rationality, aesthetic economy, awareness (using photographic technics or references), and intention to go beyond form, practice and method.

Keywords: aesthetic, art, criteria of quality, photography, visually

Procedia PDF Downloads 418
638 Predicting Mobile Payment System Adoption in Nigeria: An Empirical Analysis

Authors: Aminu Hamza

Abstract:

This study examines the factors that play vital role in the adoption of mobile payment system among consumers in Nigeria. Technology Acceptance Model (TAM) was used with two additional variables to form the conceptual model. The study was conducted in three Universities in Kano state, Nigeria. Convenience sampling method was used with a total valid 202 respondents which involved the students of Bayero University Kano (BUK), Northwest University, and Kano University of Science and Technology (KUST) Wudil, Kano, Nigeria. Results of the regression analysis revealed that Perceived ease of use (PEOU) and Perceived usefulness (PU) have significant and positive correlation with the behavioral intention to adopt mobile payment system. The findings of this study would be useful to the policy makers Central Bank of Nigeria (CBN), mobile network operators and providers of the services.

Keywords: mobile payment system, Nigeria, technology adoption, technology acceptance model

Procedia PDF Downloads 305
637 A Practice Model for Quality Improvement in Concrete Block Mini Plants Based on Merapi Volcanic Sand

Authors: Setya Winarno

Abstract:

Due to abundant Merapi volcanic sand in Yogyakarta City, many local people have utilized it for mass production of concrete blocks through mini plants although their products are low in quality. This paper presents a practice model for quality improvement in this situation in order to supply the current customer interest in good quality of construction material. The method of this research was to investigate a techno economic evaluation through laboratory test and interview. Samples of twenty existing concrete blocks made by local people had only 19.4 kg/cm2 in average compression strength which was lower than the minimum Indonesian standard of 25 kg/cm2. Through repeat testing in laboratory for fulfilling the standard, the concrete mix design of water cement ratio should not be more than 0.64 by weight basis. The proportion of sand as aggregate content should not be more than 9 parts to 1 part by volume of Portland cement. Considering the production cost, the basic price was Rp 1,820 for each concrete block, comparing to Rp 2,000 as a normal competitive market price. At last, the model describes (a) maximum water cement ratio is 0.64, (b) maximum proportion of sand and cement is 1:9, (c) the basic price is about Rp. 1,820.00 and (d) strategies to win the competitive market on mass production of concrete blocks are focus in quality, building relationships with consumer, rapid respond to customer need, continuous innovation by product diversification, promotion in social media, and strict financial management.

Keywords: concrete block, good quality, improvement model, diversification

Procedia PDF Downloads 514
636 Effects of Animal Metaphor on Consumer Response to Product Advertising

Authors: Wen-Hsien Huang, Hsu-Ting Hsu

Abstract:

While advertisers often use animal metaphors to promote product performance, representing through the use of a product image together with an animal-like messenger to imply the undesirable health states of not using the product, the effect of such metaphors on persuasion remains unclear. The current research addresses this issue by investigating how consumers perceive and react to animal metaphor advertising in the context of product promotion. Three studies are carried out using field and experimental data. The findings demonstrate that animal metaphor ads are less persuasive than non-metaphor ads and that ads with animal-like messengers (as opposed to human messengers) activate stronger dehumanization perceptions, which in turn lead to lower product choice, product evaluation and purchase intention, regardless of whether the animal metaphors are presented visually in the picture or verbally in the headline. Furthermore, when the metaphorical pairing includes a more disliked animal, consumer reaction was less favorable. The implications of the findings for advertisers considering the use of animalized messengers are discussed.

Keywords: animal metaphor, dehumanization, product evaluation, health communication

Procedia PDF Downloads 82
635 The Experiences of Claiming Welfare Benefits for People with Disabilities in the UK

Authors: Jennifer McNeill

Abstract:

Over the years UK Governments have extended the use of welfare conditionality to more marginalised groups. Whereas in the past, disabled people’s rights to unconditional welfare were defended, significant numbers of disabled people have in recent years been re-classified as ‘fit for work’ as a result of this policy shift towards increased conditionality targeting more welfare service user groups. This paper discusses findings from a five-year project exploring the ethics and efficacy of welfare conditionality. Drawing on repeat interviews over three years with 58 disabled welfare service users across England and Scotland, the paper explores the experience of, and impact of conditionality upon, disabled participants. In particular, participants described the process of claiming disability-related benefits as stigmatising, with some describing the medical assessments as demeaning, traumatic and even painful. The medical assessments are conducted by private contractors and participants felt they were treated unfairly, under suspicion and under surveillance. This finding is important in line with a recent UN report concerned with the practice of such assessments. The findings reveal that notions of ‘deservedness’ are embedded in this system as disabled recipients argue for their entitlement to welfare claims relative to what are deemed to be less deserving groups of benefit claimants. This indicates an increasing competition ethic within different sections of the most marginalised social groups that facilitate further forms of social fragmentation, particularly in relation to opposition to benefit cuts and other changes requiring concerted and organised forms of resistance. The impact of media and political scapegoating of the most marginal has generated divisions within even those who position themselves as legitimate recipients.

Keywords: disability, medical assessments, stigma, welfare conditionality

Procedia PDF Downloads 202
634 Positive Affect, Negative Affect, Organizational and Motivational Factor on the Acceptance of Big Data Technologies

Authors: Sook Ching Yee, Angela Siew Hoong Lee

Abstract:

Big data technologies have become a trend to exploit business opportunities and provide valuable business insights through the analysis of big data. However, there are still many organizations that have yet to adopt big data technologies especially small and medium organizations (SME). This study uses the technology acceptance model (TAM) to look into several constructs in the TAM and other additional constructs which are positive affect, negative affect, organizational factor and motivational factor. The conceptual model proposed in the study will be tested on the relationship and influence of positive affect, negative affect, organizational factor and motivational factor towards the intention to use big data technologies to produce an outcome. Empirical research is used in this study by conducting a survey to collect data.

Keywords: big data technologies, motivational factor, negative affect, organizational factor, positive affect, technology acceptance model (TAM)

Procedia PDF Downloads 362
633 Identification of Bayesian Network with Convolutional Neural Network

Authors: Mohamed Raouf Benmakrelouf, Wafa Karouche, Joseph Rynkiewicz

Abstract:

In this paper, we propose an alternative method to construct a Bayesian Network (BN). This method relies on a convolutional neural network (CNN classifier), which determinates the edges of the network skeleton. We train a CNN on a normalized empirical probability density distribution (NEPDF) for predicting causal interactions and relationships. We have to find the optimal Bayesian network structure for causal inference. Indeed, we are undertaking a search for pair-wise causality, depending on considered causal assumptions. In order to avoid unreasonable causal structure, we consider a blacklist and a whitelist of causality senses. We tested the method on real data to assess the influence of education on the voting intention for the extreme right-wing party. We show that, with this method, we get a safer causal structure of variables (Bayesian Network) and make to identify a variable that satisfies the backdoor criterion.

Keywords: Bayesian network, structure learning, optimal search, convolutional neural network, causal inference

Procedia PDF Downloads 176
632 Factors Affecting the Profitability of Commercial Banks: An Empirical Study of Indian Banking Sector

Authors: Neeraj Gupta, Jitendra Mahakud

Abstract:

The banking system plays a major role in the Indian economy. Banking system is the payment gateway of most of the financial transactions. Banking has gone a major transition that is still in progress. Recent banking reforms after liberalization in 1991 have led to the establishment of the foreign banks in the country. The foreign banks are not listed in the Indian stock markets and have increased the competition leading to the capture of the significant share in the revenue from the public sector banks which are still the major players in the Indian banking sector. The performance of the banking sector depends on the internal (bank specific) as well as the external (market specific and macroeconomic) factors. Profitability in banking sector is affected by numerous factors which can be internal or external. The present study examines these internal and external factors which are likely to effect the profitablilty of the Indian banks. The sample consists of a panel dataset of 64 commercial banks in India, consisting of 1088 observations over the years from 1998 to 2016. The GMM dynamic panel estimation given by Arellano and Bond has been used. The study revealed that the variables capital adequacy ratio, deposit, age, labour productivity, non-performing asset, inflation and concentration have significant effect on performance measured.

Keywords: banks in India, bank performance, bank productivity, banking management

Procedia PDF Downloads 272
631 Confusion on the Definition of Terrorism and Difficulty in Criminalizing Terrorist Financing

Authors: Hamed Tofangsaz

Abstract:

In the absence of an internationally agreed definition of terrorism, the question which needs to be posed is whether there is a clear and common understanding of what constitutes terrorism, terrorist acts and terrorist groups, the financing of which needs to be stopped. That is, from a criminal law perspective, whether the Terrorist Financing Convention, as the backbone of the counter-terrorist financing regime, clarifies what types of conduct, by who, in what circumstances and when, against whom (targets or victims) and with what intention or motivation should be considered terrorism? It will be explained how and why it has been difficult to reach an agreement on the definition of terrorism. The endeavour of the drafters of the Terrorist Financing Convention and others involved in countering terrorist financing to establish a general definition of terrorism will be examined. The record of attempts to define the elements of terrorism proves that it is hardly possible to reach an agreement on a generic definition of terrorism because the concept of terrorism is elusive and subject to various understandings. Even the definition provided by the Terrorist Financing Convention, is not convincing. With regard to the findings, this paper calls for further research on the legal consequences of the implementation of the terrorist financing-counter measures while the scope of terrorism, terrorist acts and terrorist organizations have been left vague.

Keywords: terrorism, terrorist financing, crime, convention

Procedia PDF Downloads 568
630 Patterns and Effects of International Trade in Technology: Firm-Level Evidence

Authors: Heeyong Noh, Seongryong Kang, Sungjoo Lee

Abstract:

As the world becomes increasingly interconnected, firms have tried to explore market opportunities not only in the domestic market but also abroad. In particular, transactions of intangible assets in the global market now take on great importance. Accordingly, technology transfer activities such as patent licensing, copyright transfer, or workforce trainings which are considered significant to leverage an organization’s internal capabilities, are occurring more frequently and briskly across the world than ever before. Though a number of studies have addressed the issues regarding technology transfer, most of them have focused on university-industry technology transfer. Of course, some have investigated international technology transfer phenomenon but used patent citations data as a proxy. In order to understand the phenomena more clearly, it would be necessary to collect and analyze data that can measure technology transfer activities between firms more directly. Therefore, this study aims to examine the patterns of international trade in technology by employing data about international technology in-licensing activities in Korean firms. We also investigate the effect of international technology in-licensing strategy on a firm’s innovation performance. The research findings are expected to help R&D managers understand how firms have absorbed technological knowledge from foreign firms in the form of licensing and further develop effective international collaboration strategies. In addition, significant implications can be offered for political decision-making regarding technology trade within increasing international interconnections.

Keywords: international technology trade, technology trade effect, technology transfer, R&D managers

Procedia PDF Downloads 378
629 Information Society-Education Space

Authors: Monica Lia

Abstract:

This paper has set the objective of researching how education is influenced by the information society. The first step was to define more precisely the information space. Second step was to identify how information space intersects the family space and institutional space educational levels represented by pre-school / school and pre-university (kindergarten, at elementary / middle school / high school). Interrelationship between the above-mentioned areas was another objective of the research. All these elements have been investigated through the original intention to identify how the information space can become an educational tool to support for the family space, education and institutional space. In addition, the aim of this research is to offer some solutions in this regard. Often the educational efforts appear to be blocked by the existence of this space. However, this paper demonstrates that Informational space can be an enemy of the educational system or be support systems if we know the internal structure and mechanisms. We can make the Informational Space to work for accomplish the educational objectives.

Keywords: informational space, education, educational tool, social diagram, information, information structure, lessons

Procedia PDF Downloads 334
628 Molecular Characterization of Polyploid Bamboo (Dendrocalamus hamiltonii) Using Microsatellite Markers

Authors: Rajendra K. Meena, Maneesh S. Bhandari, Santan Barthwal, Harish S. Ginwal

Abstract:

Microsatellite markers are the most valuable tools for the characterization of plant genetic resources or population genetic analysis. Since it is codominant and allelic markers, utilizing them in polyploid species remained doubtful. In such cases, the microsatellite marker is usually analyzed by treating them as a dominant marker. In the current study, it has been showed that despite losing the advantage of co-dominance, microsatellite markers are still a powerful tool for genotyping of polyploid species because of availability of large number of reproducible alleles per locus. It has been studied by genotyping of 19 subpopulations of Dendrocalamus hamiltonii (hexaploid bamboo species) with 17 polymorphic simple sequence repeat (SSR) primer pairs. Among these, ten primers gave typical banding pattern of microsatellite marker as expected in diploid species, but rest 7 gave an unusual pattern, i.e., more than two bands per locus per genotype. In such case, genotyping data are generally analyzed by considering as dominant markers. In the current study, data were analyzed in both ways as dominant and co-dominant. All the 17 primers were first scored as nonallelic data and analyzed; later, the ten primers giving standard banding patterns were analyzed as allelic data and the results were compared. The UPGMA clustering and genetic structure showed that results obtained with both the data sets are very similar with slight variation, and therefore the SSR marker could be utilized to characterize polyploid species by considering them as a dominant marker. The study is highly useful to widen the scope for SSR markers applications and beneficial to the researchers dealing with polyploid species.

Keywords: microsatellite markers, Dendrocalamus hamiltonii, dominant and codominant, polyploids

Procedia PDF Downloads 143