Search results for: information and communication technology.
18193 The Impact of E-Marketing on Consumer Satisfaction
Authors: Nadia Fatima Zahra Malki
Abstract:
The world has witnessed a great revolution in to field of technology and communication, especially after the opening of markets (globalization). This has led to a change from traditional marketing, which depends on direct selling and buying, to electronic marketing; consequently, different corporations have adopted this new concept so as to gain time, effort and money for the sake of the customer’s satisfaction. The main reason for this study is to know the impact of electronic marketing on consumer satisfaction in the fields of communication through practical studies of Ooredoo customers, where the descriptive analytical method was used with statistics to analyze the results of the survey. It concluded that e-marketing effectively contributes to customer satisfaction.Keywords: e-marketing, consumer, consumer behavior, satisfaction
Procedia PDF Downloads 5018192 The Use Management of the Knowledge Management and the Information Technologies in the Competitive Strategy of a Self-Propelling Industry
Authors: Guerrero Ramírez Sandra, Ramos Salinas Norma Maricela, Muriel Amezcua Vanesa
Abstract:
This article presents the beginning of a wider study that intends to demonstrate how within organizations of the automotive industry from the city of Querétaro. Knowledge management and technological management are required, as well as people’s initiative and the interaction embedded at the interior of it, with the appropriate environment that facilitates information conversion with wide information technologies management (ITM) range. A company was identified for the pilot study of this research, where descriptive and inferential research information was obtained. The results of the pilot suggest that some respondents did noted entity the knowledge management topic, even if staffs have access to information technology (IT) that serve to enhance access to knowledge (through internet, email, databases, external and internal company personnel, suppliers, customers and competitors) data, this implicates that there are Knowledge Management (KM) problems. The data shows that academically well-prepared organizations normally do not recognize the importance of knowledge in the business, nor in the implementation of it, which at the end is a great influence on how to manage it, so that it should guide the company to greater in sight towards a competitive strategy search, given that the company has an excellent technological infrastructure and KM was not exploited. Cultural diversity is another factor that was observed by the staff.Keywords: Knowledge Management (KM), Technological Knowledge Management (TKM), Technology Information Management (TI), access to knowledge
Procedia PDF Downloads 50118191 The Importance of Science and Technology Education in Skill Acquisition for Self Dependence
Authors: Olaje Monday Olaje
Abstract:
Science and technology has been prove to be the back bone for economic development of any country, and for Nigeria, it has more critical role to play. This paper examines the importance of science and technology education for national development and self dependence for Nigerian citizens. A historical overview of the interconnectivity of science and technology and self dependence is heighted. The current situation and challenges facing science and technology education are also highlighted to bring out the theoretical importance of science and technology education for self dependence which actually has not been practically achieved. Recommendations are also made at the of the study so as to skill acquisition through science and technology for self dependence.Keywords: acquisition, education, self-dependence, science, technology
Procedia PDF Downloads 50518190 The Information-Seeking Behaviour of Kuwaiti Judges (KJs)
Authors: Essam Mansour
Abstract:
The key purpose of this study is to show information-seeking behaviour of Kuwaiti Judges (KJs). Being one of the few studies about the information needs and information-seeking behaviour conducted in Arab and developing countries, this study is a pioneer one among many studies conducted in information seeking, especially with this significant group of information users. The authors tried to investigate this seeking behavior in terms of KJs' thoughts, perceptions, motivations, techniques, preferences, tools and barriers met when seeking information. The authors employed a questionnaire, with a response rate 77.2 percent. This study showed that most of KJs were likely to be older, educated and with a work experience ranged from new to old experience. There is a statistically reliable significant difference between KJs' demographic characteristics and some sources of information, such as books, encyclopedias, references and mass media. KJs were using information moderately to make a decision, to be in line with current events, to collect statistics and to make a specific/general research. The office and home were the most frequent location KJs were accessing information from. KJs' efficiency level of the English language is described to be moderately good, and a little number of them confirmed that their efficiency level of French was not bad. The assistance provided by colleagues, followed by consultants, translators, sectaries and librarians were found to be most strong types of assistance needed when seeking information. Mobile apps, followed by PCs, information networks (the Internet) and information databases were the highest technology tool used by KJs. Printed materials, followed by non-printed and audiovisual materials were the most preferred information formats KJs use. The use of languages, the recency of information and the place of information, the deficit role of the library to deliver information were at least significant barriers to KJs when seeking information.Keywords: information users, information-seeking behaviour, information needs, judges, Kuwait
Procedia PDF Downloads 30718189 Definition, Structure, and Core Functions of the State Image
Authors: Rosa Nurtazina, Yerkebulan Zhumashov, Maral Tomanova
Abstract:
Humanity is entering an era when 'virtual reality' as the image of the world created by the media with the help of the Internet does not match the reality in many respects, when new communication technologies create a fundamentally different and previously unknown 'global space'. According to these technologies, the state begins to change the basic technology of political communication of the state and society, the state and the state. Nowadays, image of the state becomes the most important tool and technology. Image is a purposefully created image granting political object (person, organization, country, etc.) certain social and political values and promoting more emotional perception. Political image of the state plays an important role in international relations. The success of the country's foreign policy, development of trade and economic relations with other countries depends on whether it is positive or negative. Foreign policy image has an impact on political processes taking place in the state: the negative image of the countries can be used by opposition forces as one of the arguments to criticize the government and its policies.Keywords: image of the country, country's image classification, function of the country image, country's image components
Procedia PDF Downloads 43518188 Selection of New Business in Brazilian Companies Incubators through Hierarchical Methodology
Authors: Izabel Cristina Zattar, Gilberto Passos Lima, Guilherme Schünemann de Oliveira
Abstract:
In Brazil, there are several institutions committed to the development of new businesses based on product innovation. Among them are business incubators, universities and science institutes. Business incubators can be defined as nurseries for new companies, which may be in the technology segment, discussed in this article. Business incubators provide services related to infrastructure, such as physical space and meeting rooms. Besides these services, incubators also offer assistance in the form of information and communication, access to finance, relationship networks and business monitoring and mentoring processes. Business incubators support not all technology companies. One of the business incubators tasks is to assess the nature and feasibility of new business proposals. To assist this goal, this paper proposes a methodology for evaluating new business using the Analytic Hierarchy Process (AHP). This paper presents the concepts used in the assessing methodology application for new business, concepts that have been tested with positive results in practice. This study counts on three main steps: first, a hierarchy was built, based on new business manuals used by the business incubators. These books and manuals relate business selection requirements, such as the innovation status and other technological aspects. Then, a questionnaire was generated, in order to guide incubator experts in the parity comparisons at all hierarchy levels. The weights of each requirement are calculated from information obtained from the questionnaire responses. Finally, the proposed method was applied to evaluate five new business proposals, which were applying to be part of a company incubator. The main result is the classification of these new businesses, which helped the incubator experts to decide what companies were more eligible to work with. This classification may also be helpful to the decision-making process of business incubators in future selection processes.Keywords: Analytic Hierarchy Process (AHP), Brazilian companies incubators, technology companies, incubator
Procedia PDF Downloads 37318187 Communicating Safety: A Digital Ethnography Investigating Social Media Use for Workplace Safety
Authors: Kelly Jaunzems
Abstract:
Social media is a powerful instrument of communication, enabling the presentation of information in multiple forms and modes, amplifying the interactions between people, organisations, and stakeholders, and increasing the range of communication channels available. Younger generations are highly engaged with social media and more likely to use this channel than any other to seek information. Given this, it may appear extraordinary that occupational safety and health professionals have yet to seriously engage with social media for communicating safety messages to younger audiences who, in many industries, might be statistically more likely to encounter more workplace harm or injury. Millennials, defined as those born between 1981-2000, have distinctive characteristics that also impact their interaction patterns rendering many traditional occupational safety and health communication channels sub-optimal or near obsolete. Used to immediate responses, 280-character communication, shares, likes, and visual imagery, millennials struggle to take seriously the low-tech, top-down communication channels such as safety noticeboards, toolbox meetings, and passive tick-box online inductions favoured by traditional OSH professionals. This paper draws upon well-established communication findings, which argue that it is important to know a target audience and reach them using their preferred communication pathways, particularly if the aim is to impact attitudes and behaviours. Health practitioners have adopted social media as a communication channel with great success, yet safety practitioners have failed to follow this lead. Using a digital ethnography approach, this paper examines seven organisations’ Facebook posts from two one-month periods one year apart, one in 2018 and one in 2019. Each of the years informs organisation-based case studies. Comparing, contrasting, and drawing upon these case studies, the paper discusses and evaluates the (non) use of social media communication of safety information in terms of user engagement, shareability, and overall appeal. The success of health practitioners’ use of social media provides a compelling template for the implementation of social media into organisations’ safety communication strategies. Highly visible content such as that found on social media allows an organization to become more responsive and engage in two-way conversations with their audience, creating more engaged and participatory conversations around safety. Further, using social media to address younger audiences with a range of tonal qualities (for example, the use of humour) can achieve cut through in a way that grim statistics fail to do. On the basis of 18 months of interviews, filed work, and data analysis, the paper concludes with recommendations for communicating safety information via social media. It proposes exploration of the social media communication formula that, when utilised by safety practitioners, may create an effective social media presence. It is anticipated that such social media use will increase engagement, expand the number of followers and reduce the likelihood and severity of safety-related incidents. The tools offered may provide a path for safety practitioners to reach a disengaged generation of workers to build a cohesive and inclusive conversation around ways to keep people safe at work.Keywords: social media, workplace safety, communication strategies, young workers
Procedia PDF Downloads 11718186 Communication Experience and the Perception of Media Richness among Parents Working Overseas and Their Children Left-behind in the Philippines
Authors: Dennis Caasi
Abstract:
This study analyzed four knowledge-building elements of channel expansion theory namely: communication media, communication content, communication partner, and communication influence vis-à- vis media richness dimensions among parents working overseas and their left-behind children in the Philippines. Results reveal that both parents and children consumed four out of six mediated communications tested in this research, spent one to four days a week connecting, between 30 minutes to 3 hours per engagement, and media consumption is dependent on the message content and media literacy of parents. Family, academic, household, and health were the common communication topics and parents dictate which channel to use. All six medium tested received high ratings based on the media richness constructs.Keywords: channel expansion theory, computer-mediated communication, media richness theory, overseas Filipino worker
Procedia PDF Downloads 34118185 An Analysis Study of a Participatory Design Workshop from the Perspectives of Communication Strategies and Tools
Authors: Meng-Yu Wun, Jiunde Lee
Abstract:
Participatory design transfers the role of design team becoming the facilitator who manages to work collaboratively with the 'partners of innovation': users. This facilitator role not just concerns the users’ behaviors or insights under the common practice of user-centered design, it emphasizes the importance of communication experience conducted by various strategies and tools in a workshop session which could profoundly impact the quality of the co-creation process. To investigate the communication experience in the participatory design, this study proposed a qualitative research to analyze communication strategies and tools. A participatory design workshop and following in-depth interviews were carried out to explore how participants (facilitators, users) might apply different strategies and tools to enhance the communication process. The major study findings are as follows: (a) roles had influence on communication experience; facilitators’ principles and methods influenced the usage of facilitation strategies in various situations, while users put more emphasis on communication activities and goals aimed to complete the design tasks, (b) communication tools should be both fixed and changeable: participants had fixed cognition on different forms of communication tools; with the fundamental cognition, they could choose and make use of tools according to their needs, (c) the management of workshop communication should be flexible: controlling the schedule, stimulating innovations, and creating the space for conversation are crucial to facilitate in a participatory workshop.Keywords: communication experience, facilitation, participatory design, workshop
Procedia PDF Downloads 15718184 A Qualitative Study of Parents' Recommendations for Improving the Notification Process and Communication between Health Professionals and Families for New Diagnosis of Cystic Fibrosis
Authors: Mohammad S. Razai, Jan Williams, Rachel Nestel, Dermot Dalton
Abstract:
Purpose: This descriptive qualitative study aimed to obtain parents recommendations for improving the notification process and communication of positive newborn screening result for cystic fibrosis (CF). Methods: Thematic analysis of semi-structured open-ended interviews with 11 parents of 7 children with confirmed diagnosis of CF between 2 months — 2 years of age. Results: Parents preferred face to face disclosure of positive NBS results by a pediatrician with CF professional qualification. They trusted a pediatrician more than any other professional in providing accurate, credible and comprehensive information about the diagnosis and its implications. Parents recommended that health professionals be knowledgeable and provide clear, succinct and understandable information. Providers should also explore parents concerns and acknowledge feelings and emotions. Most parents reported that they preferred to be notified immediately as soon as the results were available. Several parents preferred to be told once the diagnosis was certain. Most parents regarded open access to CF team as the most significant part of care coordination. In addition to health professionals, most parents used internet as an important source of information, interaction and exchange of experiences. Most parents also used social networking sites such as Facebook groups and smart phone apps. Conclusion: This study provides significant new evidence from parental perspective in emphasizing the pivotal role of good communication skills deployed by a knowledgeable CF specialist in person. Parents use of social media and internet has replaced some traditional methods of information exchange and may reduce the need for professional input for newly diagnosed CF patients.Keywords: care coordination, cystic fibrosis, newborn screening, notification process, parental preferences, professional-paren communication
Procedia PDF Downloads 39818183 Communicative and Artistic Machines: A Survey of Models and Experiments on Artificial Agents
Authors: Artur Matuck, Guilherme F. Nobre
Abstract:
Machines can be either tool, media, or social agents. Advances in technology have been delivering machines capable of autonomous expression, both through communication and art. This paper deals with models (theoretical approach) and experiments (applied approach) related to artificial agents. On one hand it traces how social sciences' scholars have worked with topics such as text automatization, man-machine writing cooperation, and communication. On the other hand it covers how computer sciences' scholars have built communicative and artistic machines, including the programming of creativity. The aim is to present a brief survey on artificially intelligent communicators and artificially creative writers, and provide the basis to understand the meta-authorship and also to new and further man-machine co-authorship.Keywords: artificial communication, artificial creativity, artificial writers, meta-authorship, robotic art
Procedia PDF Downloads 29218182 Communication in a Heterogeneous Ad Hoc Network
Authors: C. Benjbara, A. Habbani
Abstract:
Wireless networks are getting more and more used in every new technology or feature, especially those without infrastructure (Ad hoc mode) which provide a low cost alternative to the infrastructure mode wireless networks and a great flexibility for application domains such as environmental monitoring, smart cities, precision agriculture, and so on. These application domains present a common characteristic which is the need of coexistence and intercommunication between modules belonging to different types of ad hoc networks like wireless sensor networks, mesh networks, mobile ad hoc networks, vehicular ad hoc networks, etc. This vision to bring to life such heterogeneous networks will make humanity duties easier but its development path is full of challenges. One of these challenges is the communication complexity between its components due to the lack of common or compatible protocols standard. This article proposes a new patented routing protocol based on the OLSR standard in order to resolve the heterogeneous ad hoc networks communication issue. This new protocol is applied on a specific network architecture composed of MANET, VANET, and FANET.Keywords: Ad hoc, heterogeneous, ID-Node, OLSR
Procedia PDF Downloads 21518181 Types of Communication Strategies in Jainism: A Study of Jain Mendicants, Educators and Lay Persons
Authors: Bhumi Shah
Abstract:
The aim of the study is to create understanding of communication strategies followed by Jain mendicants, educators, and lay persons. Second objective of the study is to see ancient means of communication have reformed in this digital generation. For these purposes of the study, research was carried out among Jain lay persons, educators and mendicants. To understand how traditional methods of communication affect the understanding of Jain religion. The paper attempts further elaborate and analyse various degrees of involvement and expectations of Jain Lay persons and mendicants in the process of religious discourse. In doing so the paper would provide an in- depth debate and discussion about communication patterns and the actual impact to the original meaning of the religion. The study was carried out in the city of Ahmedabad India, where Jains are concentrated in urban settings. In depth interviews were carried out as to understand different communication strategies followed by them.Keywords: customs, ethics, Jainism, Jain mendicants, religious communication, traditions, rituals
Procedia PDF Downloads 12718180 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria
Authors: Okike Benjamin
Abstract:
Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria
Procedia PDF Downloads 26118179 Design of Personal Job Recommendation Framework on Smartphone Platform
Authors: Chayaporn Kaensar
Abstract:
Recently, Job Recommender Systems have gained much attention in industries since they solve the problem of information overload on the recruiting website. Therefore, we proposed Extended Personalized Job System that has the capability of providing the appropriate jobs for job seeker and recommending some suitable information for them using Data Mining Techniques and Dynamic User Profile. On the other hands, company can also interact to the system for publishing and updating job information. This system have emerged and supported various platforms such as web application and android mobile application. In this paper, User profiles, Implicit User Action, User Feedback, and Clustering Techniques in WEKA libraries have gained attention and implemented for this application. In additions, open source tools like Yii Web Application Framework, Bootstrap Front End Framework and Android Mobile Technology were also applied.Keywords: recommendation, user profile, data mining, web and mobile technology
Procedia PDF Downloads 31318178 Test Research on Damage Initiation and Development of a Concrete Beam Using Acoustic Emission Technology
Authors: Xiang Wang
Abstract:
In order to validate the efficiency of recognizing the damage initiation and development of a concrete beam using acoustic emission technology, a concrete beam is built and tested in the laboratory. The acoustic emission signals are analyzed based on both parameter and wave information, which is also compared with the beam deflection measured by displacement sensors. The results indicate that using acoustic emission technology can detect damage initiation and development effectively, especially in the early stage of the damage development, which can not be detected by the common monitoring technology. Furthermore, the positioning of the damage based on the acoustic emission signals can be proved to be reasonable. This job can be an important attempt for the future long-time monitoring of the real concrete structure.Keywords: acoustic emission technology, concrete beam, parameter analysis, wave analysis, positioning
Procedia PDF Downloads 14118177 Ethical Enhancement Strategies for Development of Mass Media Profession Conducted for the Ethical Promotion of Undergraduate Students in Communication Science
Authors: Supranee Wattanasin
Abstract:
This research study was a qualitative documentary research by using an in-depth interview with many experts in the field who has both knowledge and experience to provide information to create a strategic plan to enhance the students’ ethics. The findings revealed that there were five areas that require an attention. The five areas included honesty, accurate fact, human right, speed, and responsibility. The development of the strategic plan to enhance the ethics for students who major in communication arts can be concluded as follows. First, the government, private, and religion sectors need to come up together and set up the activities to promote the ethical standard in schools, universities, and organizations. Second, it is important to cultivate the knowledge that ethics is important of the professional jobs, especially in the mass communication and media. Third, the Philosophy of Sufficiency Economy should be brought to explain to students in order for them to have some immunity to the negative attitude such as drinking alcohol, gambling, cut classes, and cheating at exams. Fourth, experts in the field of ethics should be found to provide more knowledge to students and allow students to participate in activities that will increase their experience and knowledge of the real world problem.Keywords: communication arts, ethics, mass communication, media, strategy
Procedia PDF Downloads 33718176 Modular Data and Calculation Framework for a Technology-based Mapping of the Manufacturing Process According to the Value Stream Management Approach
Authors: Tim Wollert, Fabian Behrendt
Abstract:
Value Stream Management (VSM) is a widely used methodology in the context of Lean Management for improving end-to-end material and information flows from a supplier to a customer from a company’s perspective. Whereas the design principles, e.g. Pull, value-adding, customer-orientation and further ones are still valid against the background of an increasing digitalized and dynamic environment, the methodology itself for mapping a value stream is characterized as time- and resource-intensive due to the high degree of manual activities. The digitalization of processes in the context of Industry 4.0 enables new opportunities to reduce these manual efforts and make the VSM approach more agile. The paper at hand aims at providing a modular data and calculation framework, utilizing the available business data, provided by information and communication technologies for automizing the value stream mapping process with focus on the manufacturing process.Keywords: lean management 4.0, value stream management (VSM) 4.0, dynamic value stream mapping, enterprise resource planning (ERP)
Procedia PDF Downloads 15018175 Using Hierarchical Methodology to Assist the Selection of New Business in Brazilian Companies Incubators
Authors: Izabel Cristina Zattar, Gilberto Passos Lima, Guilherme Schünemann de Oliveira
Abstract:
In Brazil, there are several institutions committed to the development of new businesses based on product innovation. Among them are business incubators, universities and science institutes. Business incubators can be defined as nurseries for new companies, which may be in the technology segment, discussed in this article. Business incubators provide services related to infrastructure, such as physical space and meeting rooms. Besides these services, incubators also offer assistance in the form of information and communication, access to finance, relationship networks and business monitoring and mentoring processes. Business incubators support not all technology companies. One of the business incubators tasks is to assess the nature and feasibility of new business proposals. To assist in this goal, this paper proposes a methodology for evaluating new business using the Analytic Hierarchy Process (AHP). This paper presents the concepts used in the assessing methodology application for new business, concepts that have been tested with positive results in practice. This study counts on three main steps: first, a hierarchy was built, based on new business manuals used by the business incubators. These books and manuals relate business selection requirements, such as the innovation status and other technological aspects. Then, a questionnaire was generated, in order to guide incubator experts in the parity comparisons at all hierarchy levels. The weights of each requirement are calculated from information obtained from the questionnaire responses. Finally, the proposed method was applied to evaluate five new business proposals, which were applying to be part of a company incubator. The main result is the classification of these new businesses, which helped the incubator experts to decide what companies were more eligible to work with. This classification may also be helpful to the decision-making process of business incubators in future selection processes.Keywords: Analytic Hierarchy Process (AHP), Brazilian companies incubators, technology companies, incubator
Procedia PDF Downloads 40218174 The Mediatization of Political Communication in Sub-Saharan Africa: The Cases of Cameroon and Ghana in a Comparative Perspective
Authors: Christian Nounkeu Tatchou
Abstract:
The concept of mediatization of politics describes changes with regards to media and politics, as the political sphere is increasingly shaped by the media and conforms to its logic. The mediatization of politics in established democracies of the West has been the object of several researches. However, there is an overwhelming paucity of literature on this reconfiguration of the political life around the media in the emerging democracies of the Sub-Saharan Africa. A majority of Sub-Saharan countries have been progressively experiencing the modernization of their societies and significant developments with respect to political communication since the early 1990s. This has been facilitated by factors such as the adoption of democratic reforms, the development of mass media, the advent of social media and the rapid spread of new information and communication technologies. Thus, this paper investigates the extent to which political communication in Sub-Saharan Africa is mediatized, especially with regards to the social media. Through in-depths interviews with twenty political leaders and political observers in Cameroon and Ghana, this article argues that the social media has become the main arena of voters’ mobilization and political participation in Sub-Saharan Africa. However, a greater extent of freedom for political activism on social media is observed in the new democracy of Ghana, unlike in the enduring authoritarian political system of Cameroon where the government attempts to control the use and content of political discourse on social media.Keywords: mediatization, political communication, social media, sub-saharan africa
Procedia PDF Downloads 35218173 July 15 Coup Attempt and the Use of New Communication Technologies
Authors: Yasemin Gulsen Yilmaz, Suleyman Hakan Yilmaz, Muhammet Erbay
Abstract:
The new communication technologies have gradually improved its efficiency in all fields of life and made its presence irreplaceable. These technologies which appear in every aspect of life differently showed itself during the failed coup attempt in Turkey too. The evening of July 15, 2016, have already taken its place in the Turkish political history. In the evening of July 15, Turkish nation confronted to a coup attempted by a group within the Turkish Armed Forces. That evening, the scene of the confrontation between the coup attempters and the resisting civilians were watched minute-by-minute by the people using the new communication technologies. Pro-coup soldiers and the resisting groups that came face to face in the streets of metropolitan cities, made their in-group communications by using new media tools very actively. New media turned into the most important weapon both for coup plotters and for those who resisted. In the morning of next day, whoever used these tools better had the upper hand. The civilians were successful in protecting democracy not only by resisting against tanks and bullets but also by following the internet, organising in social media, sharing information-photos on the net and telling large masses their experiences through these technologies. In this study, we focused on and analysed the use of new media both by coup soldiers and resisting civilians during the failed coup attempt in July 15. Within the scope of this study, coup attempt news that took place in printed media within one week were examined; the information about the use of new media tools during the night of failed coup were compiled; and it was determined how, to what extend and what for these tools were used and how effective they were.Keywords: communication, July 15, new media, media
Procedia PDF Downloads 24518172 Cybersecurity Challenges and Solutions in ICT Management at the Federal Polytechnic, Ado-Ekiti: A Quantitative Study
Authors: Innocent Uzougbo Onwuegbuzie, Siene Elizabeth Eke
Abstract:
This study investigates cybersecurity challenges and solutions in managing Information and Communication Technology (ICT) at the Federal Polytechnic, Ado-Ekiti, South-West Nigeria. The rapid evolution of ICT has revolutionized organizational operations and impacted various sectors, including education, healthcare, and finance. While ICT advancements facilitate seamless communication, complex data analytics, and strategic decision-making, they also introduce significant cybersecurity risks such as data breaches, ransomware, and other malicious attacks. These threats jeopardize the confidentiality, integrity, and availability of information systems, necessitating robust cybersecurity measures. The primary aim of this research is to identify prevalent cybersecurity challenges in ICT management, evaluate their impact on the institution's operations, and assess the effectiveness of current cybersecurity solutions. Adopting a quantitative research approach, data was collected through surveys and structured questionnaires from students, staff, and IT professionals at the Federal Polytechnic, Ado-Ekiti. The findings underscore the critical need for continuous investment in cybersecurity technologies, employee and student training, and regulatory compliance to mitigate evolving cyber threats. This research contributes to bridging the knowledge gap in cybersecurity management and provides valuable insights into effective strategies and technologies for safeguarding ICT systems in educational institutions. The study's objectives are to enhance the security posture of the Federal Polytechnic, Ado-Ekiti, in an increasingly digital world by identifying and addressing the cybersecurity challenges faced by its ICT management.Keywords: cybersecurity challenges, cyber threat mitigation, federal polytechnic Ado-Ekiti, ICT management
Procedia PDF Downloads 4018171 ICT in Education – A Quest for Quality Learning in the 21st Century
Authors: Adam Johnbull
Abstract:
The paper discusses ICT in Education as a quest for quality learning in the 21st century. Education is the key that unlock the door to development, without adequate education of the citizenry, the development of a nation becomes a sham. Information Communication Technologies (ICTs) has revolutionized the way people work today and are now transforming education systems. As a result, if schools train children in yesterday’s skills and technologies they may not be effective and fit in tomorrow’s world. This is a sufficient reason for ICT’s to win global recognition and attention and thus ensure desire quality in our school system. Thus, the purpose of the paper is to discuss amongst others, what is ICT. The roles of ICT’s in education, limitation and key challenges of integrating ICT to education in the enhancement of student learning and experiences in other to encourage policy makers, school administrators and teachers pay the required attention to integrate this technology in the education system. The paper concludes that regardless of all the limitation characterizing it. ICT benefit education system to provide quality education in the 21st century.Keywords: ICTs, quest, information, global, sham, century
Procedia PDF Downloads 42618170 Working Mode and Key Technology of Thermal Vacuum Test Software for Spacecraft Test
Authors: Zhang Lei, Zhan Haiyang, Gu Miao
Abstract:
A universal software platform is developed for improving the defects in the practical one. This software platform has distinct advantages in modularization, information management, and the interfaces. Several technologies such as computer technology, virtualization technology, network technology, etc. are combined together in this software platform, and four working modes are introduced in this article including single mode, distributed mode, cloud mode, and the centralized mode. The application area of the software platform is extended through the switch between these working modes. The software platform can arrange the thermal vacuum test process automatically. This function can improve the reliability of thermal vacuum test.Keywords: software platform, thermal vacuum test, control and measurement, work mode
Procedia PDF Downloads 41418169 Developing a Systems Dynamics Model for Security Management
Authors: Kuan-Chou Chen
Abstract:
This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.Keywords: system thinking, information security systems, security management, simulation
Procedia PDF Downloads 43018168 A Methodology for Developing New Technology Ideas to Avoid Patent Infringement: F-Term Based Patent Analysis
Authors: Kisik Song, Sungjoo Lee
Abstract:
With the growing importance of intangible assets recently, the impact of patent infringement on the business of a company has become more evident. Accordingly, it is essential for firms to estimate the risk of patent infringement risk before developing a technology and create new technology ideas to avoid the risk. Recognizing the needs, several attempts have been made to help develop new technology opportunities and most of them have focused on identifying emerging vacant technologies from patent analysis. In these studies, the IPC (International Patent Classification) system or keywords from text-mining application to patent documents was generally used to define vacant technologies. Unlike those studies, this study adopted F-term, which classifies patent documents according to the technical features of the inventions described in them. Since the technical features are analyzed by various perspectives by F-term, F-term provides more detailed information about technologies compared to IPC while more systematic information compared to keywords. Therefore, if well utilized, it can be a useful guideline to create a new technology idea. Recognizing the potential of F-term, this paper aims to suggest a novel approach to developing new technology ideas to avoid patent infringement based on F-term. For this purpose, we firstly collected data about F-term and then applied text-mining to the descriptions about classification criteria and attributes. From the text-mining results, we could identify other technologies with similar technical features of the existing one, the patented technology. Finally, we compare the technologies and extract the technical features that are commonly used in other technologies but have not been used in the existing one. These features are presented in terms of “purpose”, “function”, “structure”, “material”, “method”, “processing and operation procedure” and “control means” and so are useful for creating new technology ideas that help avoid infringing patent rights of other companies. Theoretically, this is one of the earliest attempts to adopt F-term to patent analysis; the proposed methodology can show how to best take advantage of F-term with the wealth of technical information. In practice, the proposed methodology can be valuable in the ideation process for successful product and service innovation without infringing the patents of other companies.Keywords: patent infringement, new technology ideas, patent analysis, F-term
Procedia PDF Downloads 26918167 Electronic Tongue as an Innovative Non-Destructive Tool for the Quality Monitoring of Fruits
Authors: Mahdi Ghasemi-Varnamkhasti, Ayat Mohammad-Razdari, Seyedeh-Hoda Yoosefian
Abstract:
Taste is an important sensory property governing acceptance of products for administration through mouth. The advent of artificial sensorial systems as non-destructive tools able to mimic chemical senses such as those known as electronic tongue (ET) has open a variety of practical applications and new possibilities in many fields where the presence of taste is the phenomenon under control. In recent years, electronic tongue technology opened the possibility to exploit information on taste attributes of fruits providing real time information about quality and ripeness. Electronic tongue systems have received considerable attention in the field of sensor technology during the last two decade because of numerous applications in diverse fields of applied sciences. This paper deals with some facets of this technology in the quality monitoring of fruits along with more recent its applications.Keywords: fruit, electronic tongue, non-destructive, taste machine, horticultural
Procedia PDF Downloads 25618166 Exploring the Relationships between Cyberbullying Perceptions and Facebook Attitudes of Turkish Students
Authors: Yavuz Erdoğan, Hidayet Çiftçi
Abstract:
Cyberbullying, a phenomenon among adolescents, is defined as actions that use information and communication technologies such as social media to support deliberate, repeated, and hostile behaviour by an individual or group. With the advancement in communication and information technology, cyberbullying has expanded its boundaries among students in schools. Thus, parents, psychologists, educators, and lawmakers must become aware of the potential risks of this phenomenon. In the light of these perspectives, this study aims to investigate the relationships between cyberbullying perception and Facebook attitudes of Turkish students. A survey method was used for the study and the data were collected by “Cyberbullying Perception Scale”, “Facebook Attitude Scale” and “Personal Information Form”. For this purpose, study has been conducted during 2014-2015 academic year, with a total of 748 students with 493 male (%65.9) and 255 female (%34.1) from randomly selected high schools. In the analysis of data Pearson correlation and multiple regression analysis, multivariate analysis of variance (MANOVA) and Scheffe post hoc test has been used. At the end of the study, the results displayed a negative correlation between Turkish students’ Facebook attitudes and cyberbullying perception (r=-.210; p<0.05). In order to identify the predictors of students’ cyberbullying perception, multiple regression analysis was used. As a result, significant relations were detected between cyberbullying perception and independent variables (F=5.102; p<0.05). Independent variables together explain 11.0% of the total variance in cyberbullying scores. The variables that significantly predict the students’ cyberbullying perception are Facebook attitudes (t=-5.875; p<0.05), and gender (t=3.035; p<0.05). In order to calculate the effects of independent variables on students’ Facebook attitudes and cyberbullying perception MANOVA was conducted. The results of the MANOVA indicate that the Facebook attitudes and cyberbullying perception were significantly differed according to students’ gender, age, educational attainment of the mother, educational attainment of the father, income of the family and daily usage of internet.Keywords: facebook, cyberbullying, attitude, internet usage
Procedia PDF Downloads 40218165 Contextualizing Communication through Culture and Social Structure: An Exploration of Media Life
Authors: Jyoti Ranjan Sahoo
Abstract:
Communication is a social phenomenon which mediates to our everyday life and it creates, maintains, builds, circulates, and propagates for a common identity the society. The symbolic forms of communication such as aural, sounds, oral expressions, signs, and language as means of communication are being used in everyday life in helping to identify as construction of social reality. These symbolic forms of communication are treated as the social process in everyday life. Therefore, there is an intrinsic relationship between communication and culture to understand media life for village communities. Similarly, the interface of communication with social life is reflected upon it’s formulation of the notions of social structure and culture. It has been observed that there is an overlapping and new phenomenonal change of media life among marginalized communities in general and village communities in particular. Therefore, this paper is an outcome of decadal stock of literature and an empirical investigation on understanding of communication in a tribal village in India. It has examined the idea of American scientist Edward T. Hall “the culture is communication, and the communication is culture” in village society on understanding media life. Thus, the Harold Innis’s theoretical idea of “communication” has been critically examined in these contexts since author tries to explore and understand the inter-disciplinarity on understanding media life through communication and culture which is embedded in socio-cultural life bearing on epistemological and ontological implications. The paper tries to explore and understand the inter-disciplinary and historical trajectories of communication embedded with other social science disciplines; and also tries to map these studies relevant for the future directions and engagement which would have bearing on epistemological and ontological implications in the field of media and communication.Keywords: culture, communication, history, media, oral, tradition
Procedia PDF Downloads 36118164 Using Information Theory to Observe Natural Intelligence and Artificial Intelligence
Authors: Lipeng Zhang, Limei Li, Yanming Pearl Zhang
Abstract:
This paper takes a philosophical view as axiom, and reveals the relationship between information theory and Natural Intelligence and Artificial Intelligence under real world conditions. This paper also derives the relationship between natural intelligence and nature. According to communication principle of information theory, Natural Intelligence can be divided into real part and virtual part. Based on information theory principle that Information does not increase, the restriction mechanism of Natural Intelligence creativity is conducted. The restriction mechanism of creativity reveals the limit of natural intelligence and artificial intelligence. The paper provides a new angle to observe natural intelligence and artificial intelligence.Keywords: natural intelligence, artificial intelligence, creativity, information theory, restriction of creativity
Procedia PDF Downloads 386