Search results for: information use behaviour
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12301

Search results for: information use behaviour

11641 Multi-Generational Analysis of Perception and Acceptance of Mental Illnesses: Current Indian Context

Authors: Anvi Kumar

Abstract:

This paper explores the attitudes and awareness of multiple generations ranging from Boomers I to GenZ (i.e. from 1954 to 2012) towards mental health issues. A convenient sample of 191 people was gathered in India aged 11-77. 20 people each were considered from 5 generational cohorts, namely- Boomers I, Boomers II, Gen X, Millennials, and Gen Z. The study tool comprised a survey that included demographic questions and the Community Attitude towards Mental Illness (CAMI) scale by Taylor & Dear (1981). Descriptive statistics, ANOVA, and Bonferonni’s post-hoc analysis have been used to perform the analysis. The findings reveal that the level of kindness towards those who struggle with mental health varies through certain age groups. An overall sense of exclusion of those struggling with mental health is prevalent among all age groups. GenZ’s awareness of mental health issues is primarily via social media, as against the rest of the generations seeking it from close relatives and friends. The study’s findings suggest a need to investigate further the quality of mental health knowledge content and its consumption pattern. Understanding the dynamics of information sharing and the potential for biases requires further discovery.

Keywords: attitude, behaviour, mental illness, Gen Z, millennials, Gen Y, multi-generations, generational differences

Procedia PDF Downloads 71
11640 'Spare the Rod and Spoil the Child': The Criminal Career of an Armed Robber

Authors: Mahlogonolo Stephina Thobane

Abstract:

The aim of the study upon which this article is based was “to evaluate the possibility of using criminal career research in the development and evaluation of crime control strategies, particularly for armed robberies.” The research employed a concurrent triangulation mixed-method approach where quantitative and qualitative data were collected concurrently but analysed separately through the use of SPSS and Atlas.ti respectively. Forty offenders incarcerated at six correctional centres around the Gauteng province of South Africa for robbery with aggravating circumstances were interviewed as research participants. Since the researcher had no prior information on the total number of the population, purposive sampling (i.e. snowballing) was executed to draw the sample. This research found that offenders launched their criminal career at a very young age of, 11 years, by committing petty crimes such as theft and then, as they grew older, they progressed to more serious and violent crimes such as vehicle hijacking and Cash-in-Transit (CIT) robberies. Thus, it is pivotal that those responsible for developing crime prevention policies focus on interrupting the root causes of crime in the early stages of one’s life in order to prevent continuation of delinquent behaviour from childhood to adolescence and adulthood.

Keywords: criminal career, robbery with aggravating circumstances, cash-in-transit robbery, criminal career research

Procedia PDF Downloads 440
11639 Making Good Samaritans: An Exploration of Criminal Liability for Failure to Rescue in England and Wales

Authors: Usmaan Siddiqui

Abstract:

In England and Wales, there is no duty to rescue strangers. We will be investigating whether this is correct, and whether we should introduce a Good Samaritan law. In order to explore this, firstly, we will be exploring the nature of our moral duties. How far do our moral duties extend? Do they extend only to our family and friends, or do they also extend to strangers? Secondly, even if there does exist a moral duty, should this duty be enforced by criminal law? To what extent should the criminal law reflect morality? Under English criminal law, the consensus is, that it is not the job of the English criminal law to perfect human behaviour, and whilst the law should prevent us from causing harm, it should not force us to be good. This approach is radically different from many other European countries that actually do have a Good Samaritan law. If there are compelling in principle reasons to introduce a Good Samaritan law how would we deal with the pragmatic institutional constraints? Such a law has been stated as being unworkable in practice and difficult in defining its limits. In order to verify this, we shall carry out a comparative analysis between England and selected states in the US to gauge how successful the Good Samaritan law has been in dealing with these institutional constraints. In terms of methodology, as well as a comparative analysis, we shall also be carrying out a doctrinal analysis exploring what the English criminal law’s position is regarding Omissions. In conclusion, the findings so far are, whilst it is not the job of the law to perfect human behaviour, both respect for the law and the level of social co-operation will be greatly improved if the law encourages morally desirable conduct. Whilst it is possible for society to exist without a duty to assist the distressed, a society which ignores the vulnerable is cold, callous, and uncaring. After all, we all need to face up to the possibility that we may be one day be vulnerable and in need of urgent aid, and it is about time English criminal law, catches up with the majority of Europe and protects the vulnerable.

Keywords: criminal, law, omissions, philosophy

Procedia PDF Downloads 228
11638 The Portland Cement Limestone: Silica Fume System as an Alternative Cementitious Material

Authors: C. S. Paglia, E. Ginercordero, A. Jornet

Abstract:

Environmental pollution, along with the depletion of natural resources, is among the most serious global challenges in our times. The construction industry is one of the sectors where a relevant reduction of the environmental impact can be achieved. Thus, the cement production will play a key role in sustainability, by reducing the CO₂ emissions and energy consumption and by increasing the durability of the structures. A large number of investigations have been carried out on blended cements, but it exists a lack of information on the Portland cement limestone - silica fume system. Mortar blends are optimized in the mix proportions for the different ingredients, in particular for the dosage of the silica fume. Portland cement and the new binder-based systems are compared with respect to the fresh mortar properties, the mechanical and the durability behaviour of the hardened specimens at 28 and 90 days. The use of this new binder combination exhibits an interesting hydration development with time and maintain the conventional characteristics of Portland cementitious material. On the other hand, it will be necessary to reproduce the Portland Limestone Cement-silica fume system within the concrete. A reduction of the CO₂ production, energy consumption, and a reasonable service life of the concrete structures, including a maintenance free period, will all contribute to a better environment.

Keywords: binder, cement, limestone, silica fume

Procedia PDF Downloads 116
11637 Importance of Human Resources Training in an Information Age

Authors: A. Serap Fırat

Abstract:

The aim of this study is to display conceptually the relationship and interaction between matter of human resources training and the information age. Fast development from industrial community to an information community has occurred and organizations have been seeking ways to overcome this change. Human resources policy and human capital with enhanced competence will have direct impact on work performance; therefore, this paper deals with the increased importance of human resource management due to the fact that it nurtures human capital. Researching and scanning are used as a method in this study. Both local and foreign literature and expert views are employed -as much as one could be- in the making of the theoretical framework of this study.

Keywords: human resources, information age, education, organization, occupation

Procedia PDF Downloads 368
11636 Knowledge and Information Sharing in the Opinion of the Polish Academic Community

Authors: Marzena Świgoń

Abstract:

The purpose of this paper is to describe the perceptions of knowledge and information sharing by the Polish academic community. An electronic questionnaire was used to gather opinions of respondents. The presented results are a part of the findings of empirical studies carried out amongst academics from various types of universities and academia located throughout Poland.

Keywords: academics, information sharing, knowledge sharing, scholarly communication

Procedia PDF Downloads 408
11635 Determination of Complexity Level in Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 339
11634 Application of Blockchain on Manufacturing Process Control and Pricing Policy

Authors: Chieh Lee

Abstract:

Today, supply chain managers face extensive disruptions in raw material pricing, transportation block, and quality issue due to product complexity. While digitalization might help managers to mitigate the disruption risk and increase supply chain resilience by sharing information between sellers and buyers through the supply chain, entities are reluctant to build such a system. The main reason is it is not clear what information should be shared and who has access to the stored information. In this research, we propose a smart contract built by blockchain technology. This contract helps both buyer and seller to identify the type of information, the access to the information, and how to trace the information. This contract helps managers control their orders through the supply chain and address any disruption they see fit. Furthermore, with the same smart contract, the supplier can track the production process of an order and increase production efficiency by eliminating waste.

Keywords: blockchain, production process, smart contract, supply chain resilience

Procedia PDF Downloads 76
11633 Information Literacy Skills of Legal Practitioners in Khyber Pakhtunkhwa-Pakistan: An Empirical Study

Authors: Saeed Ullah Jan, Shaukat Ullah

Abstract:

Purpose of the study: The main theme of this study is to explore the information literacy skills of the law practitioners in Khyber Pakhtunkhwa-Pakistan under the heading "Information Literacy Skills of Legal Practitioners in Khyber Pakhtunkhwa-Pakistan: An Empirical Study." Research Method and Procedure: To conduct this quantitative study, the simple random sample approach is used. An adapted questionnaire is distributed among 254 lawyers of Dera Ismail Khan through personal visits and electronic means. The data collected is analyzed through SPSS (Statistical Package for Social Sciences) software. Delimitations of the study: The study is delimited to the southern district of Khyber Pakhtunkhwa: Dera Ismael Khan. Key Findings: Most of the lawyers of District Dera Ismail Khan of Khyber Pakhtunkhwa can recognize and understand the needed information. A large number of lawyers are capable of presenting information in both written and electronic forms. They are not comfortable with different legal databases and using various searching and keyword techniques. They have less knowledge of Boolean operators for locating online information. Conclusion and Recommendations: Efforts should be made to arrange refresher courses and training workshops on the utilization of different legal databases and different search techniques for retrieval of information sources. This practice will enhance the information literacy skills of lawyers, which will ultimately result in a better legal system in Pakistan. Practical implication(s): The findings of the study will motivate the policymakers and authorities of legal forums to restructure the information literacy programs to fulfill the lawyers' information needs. Contribution to the knowledge: No significant work has been done on the lawyers' information literacy skills in Khyber Pakhtunkhwa-Pakistan. It will bring a clear picture of the information literacy skills of law practitioners and address the problems faced by them during the seeking process.

Keywords: information literacy-Pakistan, infromation literacy-lawyers, information literacy-lawyers-KP, law practitioners-Pakistan

Procedia PDF Downloads 143
11632 A Conceptual Framework for the Adoption of Information and Communication Technology for Anti-Corruption in the DR Congo

Authors: Itulelo Matiyabu Imaja, Patrick Ndayizigamiye, Manoj Maharaj

Abstract:

There are many catalysts of corruption. These include amongst others, lack of effective control measures to deter or detect corrupt behaviour. Literature suggests that ICT could assist in curbing corruption through the implementation of automated systems, citizens engagement through e-government and online media to name a few. In the Democratic Republic of Congo, lack of transparency and accountability in public funds collection and allocation contribute to corruption in funds mismanagement. Using the accountability theory and available literature, this paper analyses how Democratic Republic of Congo (DRC) institutions could be strengthened through ICT in order to deter instances of corruption. Findings reveal that DRC lacks reliable control, monitoring and evaluation mechanisms that could identify potentially corrupt behavior. In addition, citizens and civil society organizations who are meant to hold the institutions accountable are not given secure platform to express their views and potentially flag any corrupt behavior. Hence, the paper presents a preliminary conceptual framework that depicts how ICT could be used to strengthen current institutions to potentially deter corrupt behavior in public funds management in Congo.

Keywords: corruption, ICT adoption, transparency, DR Congo

Procedia PDF Downloads 181
11631 Grid and Market Integration of Large Scale Wind Farms using Advanced Predictive Data Mining Techniques

Authors: Umit Cali

Abstract:

The integration of intermittent energy sources like wind farms into the electricity grid has become an important challenge for the utilization and control of electric power systems, because of the fluctuating behaviour of wind power generation. Wind power predictions improve the economic and technical integration of large amounts of wind energy into the existing electricity grid. Trading, balancing, grid operation, controllability and safety issues increase the importance of predicting power output from wind power operators. Therefore, wind power forecasting systems have to be integrated into the monitoring and control systems of the transmission system operator (TSO) and wind farm operators/traders. The wind forecasts are relatively precise for the time period of only a few hours, and, therefore, relevant with regard to Spot and Intraday markets. In this work predictive data mining techniques are applied to identify a statistical and neural network model or set of models that can be used to predict wind power output of large onshore and offshore wind farms. These advanced data analytic methods helps us to amalgamate the information in very large meteorological, oceanographic and SCADA data sets into useful information and manageable systems. Accurate wind power forecasts are beneficial for wind plant operators, utility operators, and utility customers. An accurate forecast allows grid operators to schedule economically efficient generation to meet the demand of electrical customers. This study is also dedicated to an in-depth consideration of issues such as the comparison of day ahead and the short-term wind power forecasting results, determination of the accuracy of the wind power prediction and the evaluation of the energy economic and technical benefits of wind power forecasting.

Keywords: renewable energy sources, wind power, forecasting, data mining, big data, artificial intelligence, energy economics, power trading, power grids

Procedia PDF Downloads 512
11630 Aligning Cultural Practices through Information Exchange: A Taxonomy in Global Manufacturing Industry

Authors: Hung Nguyen

Abstract:

With the rise of global supply chain network, the choice of supply chain orientation is critical. The alignment between cultural similarity and supply chain information exchange could help identify appropriate supply chain orientations, which would differentiate the stronger competitors and performers from the weaker ones. Through developing a taxonomy, this study examined whether the choices of action programs and manufacturing performance differ depending on the levels of attainment cultural similarity and information exchange. This study employed statistical tests on a large-scale dataset consisting of 680 manufacturing plants from various cultures and industries. Firms need to align cultural practices with the level of information exchange in order to achieve good overall business performance. There appeared to be consistent three major orientations: the Proactive, the Initiative and the Reactive. Firms are experiencing higher payoffs from various improvements are the ones successful alignment in both information exchange and cultural similarity The findings provide step-by-step decision making for supply chain information exchange and offer guidance especially for global supply chain managers. In including both cultural similarity and information exchange, this paper adds greater comprehensiveness and richness to the supply chain literature.

Keywords: culture, information exchange, supply chain orientation, similarity

Procedia PDF Downloads 350
11629 Time Domain Dielectric Relaxation Microwave Spectroscopy

Authors: A. C. Kumbharkhane

Abstract:

Time domain dielectric relaxation microwave spectroscopy (TDRMS) is a term used to describe a technique of observing the time dependant response of a sample after application of time dependant electromagnetic field. A TDRMS probes the interaction of a macroscopic sample with a time dependent electrical field. The resulting complex permittivity spectrum, characterizes amplitude (voltage) and time scale of the charge-density fluctuations within the sample. These fluctuations may arise from the reorientation of the permanent dipole moments of individual molecules or from the rotation of dipolar moieties in flexible molecules, like polymers. The time scale of these fluctuations depends on the sample and its relative relaxation mechanism. Relaxation times range from some picoseconds in low viscosity liquids to hours in glasses, Therefore the TDRS technique covers an extensive dynamical process. The corresponding frequencies range from 10-4 Hz to 1012 Hz. This inherent ability to monitor the cooperative motion of molecular ensemble distinguishes dielectric relaxation from methods like NMR or Raman spectroscopy, which yield information on the motions of individual molecules. Recently, we have developed and established the TDR technique in laboratory that provides information regarding dielectric permittivity in the frequency range 10 MHz to 30 GHz. The TDR method involves the generation of step pulse with rise time of 20 pico-seconds in a coaxial line system and monitoring the change in pulse shape after reflection from the sample placed at the end of the coaxial line. There is a great interest to study the dielectric relaxation behaviour in liquid systems to understand the role of hydrogen bond in liquid system. The intermolecular interaction through hydrogen bonds in molecular liquids results in peculiar dynamical properties. The dynamics of hydrogen-bonded liquids have been studied. The theoretical model to explain the experimental results will be discussed.

Keywords: microwave, time domain reflectometry (TDR), dielectric measurement, relaxation time

Procedia PDF Downloads 332
11628 Realization of Autonomous Guidance Service by Integrating Information from NFC and MEMS

Authors: Dawei Cai

Abstract:

In this paper, we present an autonomous guidance service by combining the position information from NFC and the orientation information from a 6 axis acceleration and terrestrial magnetism sensor. We developed an algorithm to calculate the device orientation based on the data from acceleration and terrestrial magnetism sensor. If visitors want to know some explanation about an exhibit in front of him, what he has to do is just lift up his mobile device. The identification program will automatically identify the status based on the information from NFC and MEMS, and start playing explanation content for him. This service may be convenient for old people or disables or children.

Keywords: NFC, ubiquitous computing, guide sysem, MEMS

Procedia PDF Downloads 404
11627 Needs for Primary Prevention in Families with Mentally Ill Parents

Authors: Patricia Wahl, Dirk Bruland, Albert Lenz

Abstract:

Children of mentally ill parents are a large high risk group for mental disorders which is hardly reached by preventive programs. The children inherit a heightened risk to develop a mental disorder themselves during their lifetime, but they and their parents are often rejecting to seek help. To elicit the factors determining this prevention dilemma, an explorative qualitative interview study is conducted in 25 families with mentally ill parents and yet unaffected children. Inclusion criteria are the children’s age (7 to 14 years old) and that these children live together with the affected parent. With regard to the concept of Mental Health Literacy the following research questions are leading the Qualitative Content Analysis: What are the needs of families with mentally ill parents? How can their help-seeking behaviour be described? What are their subjective illness theories? And which influences do gender, ethnicity and socio-economic status have on needs, help-seeking and illness theories? Mental Health Literacy relates to the knowledge and attitudes towards mental disorders influencing the recognition, management or prevention of these disorders. The concept seems to be an interesting starting point for our analysis with the aim to understand antecedences and processes in the families more deeply. Results of an extensive literature review serve as deductive framework for our analysis, first findings from the interviews will be available up to the time of the conference and can be presented. They hopefully will give inside in the families’ living environment and help to adapt/develop interventions and in the long term reduce health inequalities. The project at hand is part of the Health Literacy in Childhood and Adolescence (HLCA) Research Consortium financed by the German Federal Ministry of Education and Research (BMBF).

Keywords: children of mentally ill parents, help-seeking behaviour, mental health literacy, prevention dilemma

Procedia PDF Downloads 404
11626 Biomedical Definition Extraction Using Machine Learning with Synonymous Feature

Authors: Jian Qu, Akira Shimazu

Abstract:

OOV (Out Of Vocabulary) terms are terms that cannot be found in many dictionaries. Although it is possible to translate such OOV terms, the translations do not provide any real information for a user. We present an OOV term definition extraction method by using information available from the Internet. We use features such as occurrence of the synonyms and location distances. We apply machine learning method to find the correct definitions for OOV terms. We tested our method on both biomedical type and name type OOV terms, our work outperforms existing work with an accuracy of 86.5%.

Keywords: information retrieval, definition retrieval, OOV (out of vocabulary), biomedical information retrieval

Procedia PDF Downloads 489
11625 Using Geographic Information Systems in the Desertification Risk’s Cartography: Case South of the Aurès Region, Algeria

Authors: Benmessaoud Hassen

Abstract:

The sensitivity to the desertification map of the south of Aurès region has been elaborated by the crossing of four thematic layers capable to have an impact on the process of desertification. The following step is inspired of MEDALUS (Mediterranean desertification and land Use), which use qualitative index to define the environment zones sensitive to the desertification. The cartographical information of vegetation, the climate, the soil and the socioeconomic state descended from cartographic data transformed to numerical data then seized on, structured and managed by an algorithm dedicated to a geographical information system. In step with information, each layer makes object of 3 or 4 classes, the geometrical median of the four layers used are leaded to sensitivity classes (ISD) of different mapped environment.

Keywords: information systems, thematic layers, the sensitivity to the desertification map, concept MEDALUS, South of Aurès

Procedia PDF Downloads 417
11624 Determining the Information Technologies Usage and Learning Preferences of Construction

Authors: Naci Büyükkaracığan, Yıldırım Akyol

Abstract:

Information technology is called the technology which provides transmission of information elsewhere regardless of time, location, distance. Today, information technology is providing the occurrence of ground breaking changes in all areas of our daily lives. Information can be reached quickly to millions of people with help of information technology. In this Study, effects of information technology on students for educations and their learning preferences were demonstrated with using data obtained from questionnaires administered to students of 2015-2016 academic year at Selcuk University Kadınhanı Faik İçil Vocational School Construction Department. The data was obtained by questionnaire consisting of 30 questions that was prepared by the researchers. SPSS 21.00 package programme was used for statistical analysis of data. Chi-square tests, Mann-Whitney U test, Kruskal-Wallis and Kolmogorov-Smirnov tests were used in the data analysis for Descriptiving statistics. In a study conducted with the participation of 61 students, 93.4% of students' reputation of their own information communication device (computer, smart phone, etc.) That have been shown to be at the same rate and to the internet. These are just a computer of itself, then 45.90% of the students. The main reasons for the students' use of the Internet, social networking sites are 85.24%, 13.11% following the news of the site, as seen. All student assignments in information technology, have stated that they use in the preparation of the project. When students acquire scientific knowledge in the profession regarding their preferred sources evaluated were seen exactly when their preferred internet. Male students showed that daily use of information technology while compared to female students was statistically significantly less. Construction Package program where students are eager to learn about the reputation of 72.13% and 91.80% identified in the well which they agreed that an indispensable element in the professional advancement of information technology.

Keywords: information technologies, computer, construction, internet, learning systems

Procedia PDF Downloads 292
11623 Influence of BaTiO₃ on the Biological Behaviour of Hydroxyapatite: Collagen Composites

Authors: Cristina Busuioc, Georgeta Voicu, Sorin-Ion Jinga

Abstract:

The human bone presents in its dry form piezoelectric properties, which means that a mechanical stress results in electric polarization and an applied electric field causes strain. The immediate consequence was the revealing of piezoelectricity role in bone remodelling, as well as the integration of ceramic materials with piezoelectric behaviour in the composition of unitary or composite biomaterials. Thus, we prepared hydroxyapatite - collagen hybrid materials with barium titanate addition in order to achieve a better osseointegration. Barium titanate powder synthesized by a combined sol-gel-hydrothermal method, commercial hydroxyapatite and laboratory extracted collagen gel were employed as starting materials. Before the composites, fabrication, the powder with piezoelectric features was characterized in detail from the compositional, structural, morphological and electrical point of view. The next step was to elucidate the influence of barium titanate presence especially on the biological properties of the final materials. The biocompatibility of the hybrid supports without or with piezoelectric addition was investigated on mouse osteoblast cells through LDH cytotoxicity assay, LIVE/DEAD cell viability assay, and MTT cell proliferation assay. All results indicated that the analysed materials do not exert cytotoxic effects and present the ability to sustain cell survival and to promote their proliferation. In conclusion, barium titanate nanoparticles exhibit a good biocompatibility and osteoinductive properties, while the derived composite materials based on hydroxyapatite as oxide phase and collagen as polymeric phase can be successfully used for tissue engineering applications.

Keywords: barium titanate, hybrid composites, piezoelectricity, tissue engineering

Procedia PDF Downloads 318
11622 Historical Geography of Lykaonia Region

Authors: Asuman Baldiran, Erdener Pehlivan

Abstract:

In this study, the root of the name Lykaonia and the geographical area defined as Lykaonia Region are mentioned. In this context, information concerning the settlements of Paleolithic Age, Neolithic Age and Chalcolithic Age are given place. Particularly the settlements belonging to Classical Age are localized and brief information about the history of these settlements is provided. In the light of this information, roads of Antique period in the region are evaluated.

Keywords: ancient cities, central anatolia, historical geography, Lykaonia region

Procedia PDF Downloads 375
11621 Between Efficacy and Danger: Narratives of Female University Students about Emergency Contraception Methods

Authors: Anthony Idowu Ajayi, Ezebunwa Ethelbert Nwokocha, Wilson Akpan, Oladele Vincent Adeniyi

Abstract:

Studies on emergency contraception (EC) mostly utilise quantitative methods and focus on medically approved drugs for the prevention of unwanted pregnancies. This methodological bias necessarily obscures insider perspectives on sexual behaviour, particularly on why specific methods are utilized by women who seek to prevent unplanned pregnancies. In order to privilege this perspective, with a view to further enriching the discourse and policy on the prevention and management of unplanned pregnancies, this paper brings together the findings from several focus groups and in-depth interviews conducted amongst unmarried female undergraduate students in two Nigerian universities. The study found that while the research participants had good knowledge of the consequences of unprotected sexual intercourses - with abstinence and condom widely used - participants’ willingness to rely only on medically sound measures to prevent unwanted pregnancies was not always mediated by such knowledge. Some of the methods favored by participants appeared to be those commonly associated with people of low socio-economic status in the society where the study was conducted. Medically unsafe concoctions, some outright dangerous, were widely believed to be efficacious in preventing unwanted pregnancy. Furthermore, respondents’ narratives about their sexual behaviour revealed that inadequate sex education, socio-economic pressures, and misconceptions about the efficacy of “crude” emergency contraception methods were all interrelated. The paper therefore suggests that these different facets of the unplanned pregnancy problem should be the focus of intervention.

Keywords: unplanned pregnancy, unsafe abortion, emergency contraception, concoctions

Procedia PDF Downloads 417
11620 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: private information, value, users, perceived risk, online information privacy, attributes

Procedia PDF Downloads 232
11619 Synthesis of Polystyrene Grafted Filler Nanoparticles: Effect of Grafting on Mechanical Reinforcement

Authors: M. Khlifa, A. Youssef, A. F. Zaed, A. Kraft, V. Arrighi

Abstract:

A series of PS-nanoparticles were prepared by grafting PS from both aggregated silica and colloidally silica using atom-transfer radical polymerisation (ATRP). The mechanical behaviour of the nanocomposites have been examined by differential scanning calorimetry (DSC)and dynamic mechanical thermal analysis (DMTA).

Keywords: ATRP, nanocomposites, polystyrene, reinforcement

Procedia PDF Downloads 617
11618 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 296
11617 The Potential Benefits of Multimedia Information Representation in Enhancing Students’ Critical Thinking and History Reasoning

Authors: Ang Ling Weay, Mona Masood

Abstract:

This paper discusses the potential benefits of an interactive multimedia information representation in enhancing students’ critical thinking aligned with history reasoning in learning history between Secondary School students in Malaysia. Two modes of multimedia information representation implemented which are chronological and thematic information representation. A qualitative study of an unstructured interview was conducted among two history teachers, one history education lecturer, two i-think expert and program trainers and five form 4 secondary school students. The interview was to elicit their opinions on the implementation of thinking maps and interactive multimedia information representation in history learning. The key elements of interactive multimedia (e.g. multiple media, user control, interactivity, and use of timelines and concept maps) were then considered to improve the learning process. Findings of the preliminary investigation reveal that the interactive multimedia information representations have the potential benefits to be implemented as instructional resource in enhancing students’ higher order thinking skills (HOTs). This paper concludes by giving suggestions for future work.

Keywords: multimedia information representation, critical thinking, history reasoning, chronological and thematic information representation

Procedia PDF Downloads 346
11616 Information Retrieval from Internet Using Hand Gestures

Authors: Aniket S. Joshi, Aditya R. Mane, Arjun Tukaram

Abstract:

In the 21st century, in the era of e-world, people are continuously getting updated by daily information such as weather conditions, news, stock exchange market updates, new projects, cricket updates, sports and other such applications. In the busy situation, they want this information on the little use of keyboard, time. Today in order to get such information user have to repeat same mouse and keyboard actions which includes time and inconvenience. In India due to rural background many people are not much familiar about the use of computer and internet also. Also in small clinics, small offices, and hotels and in the airport there should be a system which retrieves daily information with the minimum use of keyboard and mouse actions. We plan to design application based project that can easily retrieve information with minimum use of keyboard and mouse actions and make our task more convenient and easier. This can be possible with an image processing application which takes real time hand gestures which will get matched by system and retrieve information. Once selected the functions with hand gestures, the system will report action information to user. In this project we use real time hand gesture movements to select required option which is stored on the screen in the form of RSS Feeds. Gesture will select the required option and the information will be popped and we got the information. A real time hand gesture makes the application handier and easier to use.

Keywords: hand detection, hand tracking, hand gesture recognition, HSV color model, Blob detection

Procedia PDF Downloads 283
11615 Information on Financial Statements for Loan Decision-Making of Commercial Banks in Vietnam

Authors: Mai Hoang Minh

Abstract:

Financial statements (FS) are tools which provide information to users for making business decisions. This article is going to present the survey which clarifies the role of financial statement to Commercial Banks’ loan decisions in Vietnam. Moreover, this also discusses about financial statement’s quality currently, thereby making suggestions for enterprises to enhance the usefulness of accounting information in borrowing activities.

Keywords: usefulness of financial statement, accounting information quality, loan decisions

Procedia PDF Downloads 273
11614 A Virtual Reality Simulation Tool for Reducing the Risk of Building Content during Earthquakes

Authors: Ali Asgary, Haopeng Zhou, Ghassem Tofighi

Abstract:

Use of virtual (VR), augmented reality (AR), and extended reality technologies for training and education has increased in recent years as more hardware and software tools have become available and accessible to larger groups of users. Similarly, the applications of these technologies in earthquake related training and education are on the rise. Several studies have reported promising results for the use of VR and AR for evacuation behaviour and training under earthquake situations. They simulate the impacts that earthquake has on buildings, buildings’ contents, and how building occupants and users can find safe spots or open paths to outside. Considering that considerable number of earthquake injuries and fatalities are linked to the behaviour, our goal is to use these technologies to reduce the impacts of building contents on people. Building on our artificial intelligence (AI) based indoor earthquake risk assessment application that enables users to use their mobile device to assess the risks associated with building contents during earthquakes, we develop a virtual reality application to demonstrate the behavior of different building contents during earthquakes, their associate moving, spreading, falling, and collapsing risks, and their risk mitigation methods. We integrate realistic seismic models, building contents behavior with and without risk mitigation measures in virtual reality environment. The application can be used for training of architects, interior design experts, and building users to enhance indoor safety of the buildings that can sustain earthquakes. This paper describes and demonstrates the application development background, structure, components, and usage.

Keywords: virtual reality, earthquake damage, building content, indoor risks, earthquake risk mitigation, interior design, unity game engine, oculus

Procedia PDF Downloads 97
11613 Predictive Analysis of Personnel Relationship in Graph Database

Authors: Kay Thi Yar, Khin Mar Lar Tun

Abstract:

Nowadays, social networks are so popular and widely used in all over the world. In addition, searching personal information of each person and searching connection between them (peoples’ relation in real world) becomes interesting issue in our society. In this paper, we propose a framework with three portions for exploring peoples’ relations from their connected information. The first portion focuses on the Graph database structure to store the connected data of peoples’ information. The second one proposes the graph database searching algorithm, the Modified-SoS-ACO (Sense of Smell-Ant Colony Optimization). The last portion proposes the Deductive Reasoning Algorithm to define two persons’ relationship. This study reveals the proper storage structure for connected information, graph searching algorithm and deductive reasoning algorithm to predict and analyze the personnel relationship from peoples’ relation in their connected information.

Keywords: personnel information, graph storage structure, graph searching algorithm, deductive reasoning algorithm

Procedia PDF Downloads 446
11612 An Approach for Pattern Recognition and Prediction of Information Diffusion Model on Twitter

Authors: Amartya Hatua, Trung Nguyen, Andrew Sung

Abstract:

In this paper, we study the information diffusion process on Twitter as a multivariate time series problem. Our model concerns three measures (volume, network influence, and sentiment of tweets) based on 10 features, and we collected 27 million tweets to build our information diffusion time series dataset for analysis. Then, different time series clustering techniques with Dynamic Time Warping (DTW) distance were used to identify different patterns of information diffusion. Finally, we built the information diffusion prediction models for new hashtags which comprise two phrases: The first phrase is recognizing the pattern using k-NN with DTW distance; the second phrase is building the forecasting model using the traditional Autoregressive Integrated Moving Average (ARIMA) model and the non-linear recurrent neural network of Long Short-Term Memory (LSTM). Preliminary results of performance evaluation between different forecasting models show that LSTM with clustering information notably outperforms other models. Therefore, our approach can be applied in real-world applications to analyze and predict the information diffusion characteristics of selected topics or memes (hashtags) in Twitter.

Keywords: ARIMA, DTW, information diffusion, LSTM, RNN, time series clustering, time series forecasting, Twitter

Procedia PDF Downloads 389