Search results for: social media security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13186

Search results for: social media security

12496 Exploring the Dark Side of IT Security: Delphi Study on Business’ Influencing Factors

Authors: Tizian Matschak, Ilja Nastjuk, Stephan Kühnel, Simon Trang

Abstract:

We argue that besides well-known primary effects of information security controls (ISCs), namely confidentiality, integrity, and availability, ISCs can also have secondary effects. For example, while IT can add business value through impacts on business processes, ISCs can be a barrier and distort the relationship between IT and organizational value through the impact on business processes. By applying the Delphi method with 28 experts, we derived 27 business process influence dimensions of ISCs. Defining and understanding these mechanisms can change the common understanding of the cost-benefit valuation of IT security investments and support managers' effective and efficient decision-making.

Keywords: business process dimensions, dark side of information security, Delphi study, IT security controls

Procedia PDF Downloads 107
12495 Effect of National Sovereignty of Non-Citizens Human Rights Standards: Mediterranean Irregular Immigrants Case

Authors: Azin Karami, Bahareh Heydari

Abstract:

There is a difference between national sovereignty ( national security guarantee) and human rights standards (human security guarantee). Under the pretext of providing security for the majority, Governments violate human rights standards and lead to populism. This paper illustrates despite the human rights standards of non-citizens, they mostly confront different practical and social realities. (a large gap between the reality and the truth). This paper has focused on one of vulnerable irregular non-citizens immigrants from Mediterranean . In addition, it has considered challenges of the basic and primary human rights standards of this group. It shows how government policies affect the flow of irregular immigration. This paper is based upon UN data about Mediterranean immigrants and polls answered by 68 people who intended to migrate from Mediterranean (28 female and 40 male people, the average age of 30 to 40). The model is supposed to be a convenient one to present objective, real evidence of irregular immigrants and discusses the challenges that this group of immigrants confront them .This paper shows clear concept of immigrants.

Keywords: human rights, human security, national sovereignty, irregular immigrants

Procedia PDF Downloads 175
12494 Generation-Based Travel Decision Analysis in the Post-Pandemic Era

Authors: Hsuan Yu Lai, Hsuan Hsuan Chang

Abstract:

The consumer decision process steps through problems by weighing evidence, examining alternatives, and choosing a decision path. Currently, the COVID 19 made the tourism industry encounter a huge challenge and suffer the biggest amount of economic loss. It would be very important to reexamine the decision-making process model, especially after the pandemic, and consider the differences among different generations. The tourism industry has been significantly impacted by the global outbreak of COVID-19, but as the pandemic subsides, the sector is recovering. This study addresses the scarcity of research on travel decision-making patterns among generations in Taiwan. Specifically targeting individuals who frequently traveled abroad before the pandemic, the study explores differences in decision-making at different stages post-outbreak. So this study investigates differences in travel decision-making among individuals from different generations during/after the COVID-19 pandemic and examines the moderating effects of social media usage and individuals' perception of health risks. The study hypotheses are “there are significant differences in the decision-making process including travel motivation, information searching preferences, and criteria for decision-making” and that social-media usage and health-risk perception would moderate the results of the previous study hypothesis. The X, Y, and Z generations are defined and categorized based on a literature review. The survey collected data including their social-economic background, travel behaviors, motivations, considerations for destinations, travel information searching preferences, and decision-making criteria before/after the pandemic based on the reviews of previous studies. Data from 656 online questionnaires were collected between January to May 2023 and from Taiwanese travel consumers who used to travel at least one time abroad before Covid-19. SPSS is used to analyze the data with One-Way ANOVA and Two-Way ANOVA. The analysis includes demand perception, information gathering, alternative comparison, purchase behavior, and post-travel experience sharing. Social media influence and perception of health risks are examined as moderating factors. The findings show that before the pandemic, the Y Generation preferred natural environments, while the X Generation favored historical and cultural sites compared to the Z Generation. However, after the outbreak, the Z Generation displayed a significant preference for entertainment activities. This study contributes to understanding changes in travel decision-making patterns following COVID-19 and the influence of social media and health risks. The findings have practical implications for the tourism industry.

Keywords: consumer decision-making, generation study, health risk perception, post-pandemic era, social media

Procedia PDF Downloads 55
12493 Commericializing Fashion Goods in the Digital Age

Authors: Jianli Hu

Abstract:

The internet has fundamentally revolutionized access to data and ushered new ways of creating and accessing information for commercializing products. Digital media such as computer programs, software, apps, websites, and social media have allowed the proliferation of information and ideas to grow exponentially. In recent years, a new wave of innovative e-commerce formats has begun to emerge in the fashion marketplace, responding to the ever-greater need for transparency and connectivity. For example, many fashion wholesalers and retailers have modified their operations using software systems that enable brands to cost, track, and analyze products and client orders, sales tools that connect buyers and brands to create a more dynamic market-place, as well as retailer-end apps designed to drive traffic back to brick-and-mortar stores. In this paper, we review the recently developed tools and applications of commercializing fashion, and present results of several field studies and interviews with fashion producers and buyers.

Keywords: fashion, digital media, commercializing products, internet

Procedia PDF Downloads 374
12492 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey

Abstract:

Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.

Keywords: food security, migrants, strategies, inferential statistics

Procedia PDF Downloads 521
12491 Effect of Extraction Method, Soil Media on Germination and Seedling Establishment of Chrysophyllum Albidum

Authors: Peace Nnadi

Abstract:

This research was aimed at using seed extraction methods, soil media and planting density to enhance seed germination and seedling growth of Chrysophyllum albidum commonly known as star apple. The experiment was conducted in two stages, mature, healthy ripe fruits were used and the seeds were extracted from the fruits. The experiment involves the extraction of uniform number of seeds of pulpled and depulped, planted into the various soil media. Result on planting density also showed that Depulped seeds/ seedlings at (p=0.05), recorded significant increase in germination percentage and seedling growth. The finding shows that when seeds are depulped, they enhance germination percentage and addition of poultry manure to the soil media encourages plant growth.

Keywords: germination, seedling, soil media, extraction

Procedia PDF Downloads 314
12490 Media Framing of Media Regulators in Ghana: A Content Analysis of Selected News Articles on Four Ghanaian Online Newspapers

Authors: Elizabeth Owusu Asiamah

Abstract:

The Ghanaian news media play a crucial role in shaping people's thinking patterns through the nature of the coverage they give to issues, events and personalities. Since the media do not work in a vacuum but within a broader spectrum, which is society, whatever stories they cover and the nature of frames used to narrate such stories go a long way to influence how citizens perceive issues in the country. Consequently, the National Media Commission and the National Communications Authority were instituted to monitor and direct the activities of the media to ensure professionalism that prioritizes society's interest over commercial interest. As the two media regulators go about their routine task of monitoring the operations of the media, they receive coverage from various media outlets (newspapers, radio, television and online). Some people believe that the kind of approach the regulators adopt depends on the nature of coverage the media give them in their reportage. This situation demands an investigation into how the media, regulated by these regulatory bodies, are representing the regulators in the public's eye and the issues arising from such coverage. Extant literature indicates that studies on media framing have centered on politics, environmental issues, public health issues, conflict and wars, etc. However, there appear to be no studies on media framing of media regulators, especially in the Ghanaian context. Since online newspapers have assumed more mainstream positions in the Ghanaian media and have attracted more audiences in recent times, this study investigates the nature of coverage given to media regulators by four purposively sampled online newspapers in Ghana. 96 news articles are extracted from the websites of the Daily Graphic, Ghanaian Times, Daily Guide and Chronicle newspapers within a five-year period to identify the prominence given to stories about the two media regulators and the frames used to narrate stories about them. Data collected are thematically analyzed through the lens of agenda-setting and media-framing theories. The findings of the study revealed that the two regulators were not given much coverage by way of frequency; however, much prominence was given to them in terms of enhancements such as images. The study further disclosed that most of the news articles framed the regulators as weak and incompetent, which is likely to affect how the public also views the regulators. The study concludes that since frames around the supportive nature of the regulators to issues of the media were not hammered by the online newspapers, the public will not perceive the regulators as playing their roles effectively. Thus, a need for more positive frames to be used to narrate stories about the National Media Commission and the National Communication Authority to promote a cordial relationship between the two institutions and a good image to the public.

Keywords: agenda setting, media framing, media regulators, online newspapers

Procedia PDF Downloads 59
12489 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure

Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed

Abstract:

This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.

Keywords: information security management system, information security behaviour, information security governance, information security culture

Procedia PDF Downloads 201
12488 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 94
12487 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 325
12486 Using the Theory of Reasoned Action and Parental Mediation Theory to Examine Cyberbullying Perpetration among Children and Adolescents

Authors: Shirley S. Ho

Abstract:

The advancement and development of social media have inadvertently brought about a new form of bullying – cyberbullying – that transcends across physical boundaries of space. Although extensive research has been conducted in the field of cyberbullying, most of these studies have taken an overwhelmingly empirical angle. Theories guiding cyberbullying research are few. Furthermore, very few studies have explored the association between parental mediation and cyberbullying, with majority of existing studies focusing on cyberbullying victimization rather than perpetration. Therefore, this present study investigates cyberbullying perpetration from a theoretical angle, with a focus on the Theory of Reasoned Action and the Parental Mediation Theory. More specifically, this study examines the direct effects of attitude, subjective norms, descriptive norms, injunctive norms and active mediation and restrictive mediation on cyberbullying perpetration on social media among children and adolescents in Singapore. Furthermore, the moderating role of age on the relationship between parental mediation and cyberbullying perpetration on social media are examined. A self-administered paper-and-pencil nationally-representative survey was conducted. Multi-stage cluster random sampling was used to ensure that schools from all the four (North, South, East, and West) regions of Singapore were equally represented in the sample used for the survey. In all 607 upper primary school children (i.e., Primary 4 to 6 students) and 782 secondary school adolescents participated in our survey. The total average response rates were 69.6% for student participation. An ordinary least squares hierarchical regression analysis was conducted to test the hypotheses and research questions. The results revealed that attitude and subjective norms were positively associated with cyberbullying perpetration on social media. Descriptive norms and injunctive norms were not found to be significantly associated with cyberbullying perpetration. The results also showed that both parental mediation strategies were negatively associated with cyberbullying perpetration on social media. Age was a significant moderator of both parental mediation strategies and cyberbullying perpetration. The negative relationship between active mediation and cyberbullying perpetration was found to be greater in the case of children than adolescents. Children who received high restrictive parental mediation were less likely to perform cyberbullying behaviors, while adolescents who received high restrictive parental mediation were more likely to be engaged in cyberbullying perpetration. The study reveals that parents should apply active mediation and restrictive mediation in different ways for children and adolescents when trying to prevent cyberbullying perpetration. The effectiveness of active parental mediation for reducing cyberbullying perpetration was more in the case of children than for adolescents. Younger children were found to be more likely to respond more positively toward restrictive parental mediation strategies, but in the case of adolescents, overly restrictive control was found to increase cyberbullying perpetration. Adolescents exhibited less cyberbullying behaviors when under low restrictive strategies. Findings highlight that the Theory of Reasoned Action and Parental Mediation Theory are promising frameworks to apply in the examination of cyberbullying perpetration. The findings that different parental mediation strategies had differing effectiveness, based on the children’s age, bring about several practical implications that may benefit educators and parents when addressing their children’s online risk.

Keywords: cyberbullying perpetration, theory of reasoned action, parental mediation, social media, Singapore

Procedia PDF Downloads 247
12485 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 395
12484 Young Adults’ Media Addiction Coping Strategies: A Longitudinal Study

Authors: Johanna Lindstrom, Jacob Mickelsson

Abstract:

Changes in the current media environment are transforming peoples’ everyday media consumption patterns all over the world. Digital media have become a natural, almost unavoidable, part of everyday lives of humans. While this has led to many positive consequences, there is also a growing concern for harmful effects. This paper contributes to knowledge about “the dark side” of media use by considering the topic of media addiction and subsequent coping strategies among young adults. The paper draws on a longitudinal media diary study conducted among young university students between the years 2013 and 2021. A total of 1029 diaries have been collected (approximately 100 each year), aiming at capturing the students’ everyday media behavior. In this paper, reflective narratives in the diaries have been analyzed, aiming at answering the following questions: Which of their own media behaviors do the students perceive as particularly destructive, addictive or problematic? How do they cope with such behaviors? Results from the study indicate a noticeable increase in reflections on addictive media behavior over the years. For example, compared to earlier years, the amount of such reflections significantly started to increase in the diaries in 2016 and 2017, and this trend has continued ever since. Furthermore, the nature of these reflections has changed, displaying a growing concern for one’s own excessive media use and general wellbeing. Media addiction seems particularly difficult to cope with as digital media is literally everywhere and media use in general is described as consistent and habitual, in terms of regularly repeated routines that are fragmented but performed continuously and often unintentionally throughout the day. Reflections on “the dark side” of everyday media consumption become particularly prominent in times of the Covid -19 pandemic. However, this trend was noticeable well before the pandemic started. The study also identifies a countertrend regarding reflections on how to deal and cope with problematic media behavioral patterns. This countertrend portrays a general development of increased awareness of factors that may trigger compulsive behavior and how to avoid or handle such trigger points. The countertrend is particularly evident in recent years, despite the ongoing pandemic and subsequent increases in time spent using media. Addictive media behavior may lead to severe consequences for students’ learning processes and general well-being. Increased awareness of this growing trend and coping strategies are needed on an individual as well as a broader educational level.

Keywords: coping strategies, media addiction, media behavior, well-being

Procedia PDF Downloads 195
12483 Environmental Refugees in Africa: A Case Study of Sahel Region

Authors: Ahlem Setrallah

Abstract:

Environment has become a phenomenon directly linked to security in recent decades. This security aspect of environment is justified by the challenges that environment problems can have on human life and thus security especially within the scope of human security that is based mainly on the individual rather than on the state. Because Africa is not safe from the global warming and all its consequences on environment, this continent has witnessed many crises related to environment and that have had direct impact on security in Africa. One of those crises is environmental displacement or immigration which was caused by natural disasters like draught, desertification and food shortage to name but a few. This paper aims at shedding light at some important cases in the Africa focusing mainly on the Sahel region. The main research questions that we are trying to answer are the following: 1-What is the relationship between environment and forced immigration in the Sahel region? 2-What is the impact of environmental immigration on Security in the region? 3-How have the states in this region reacted to this crisis? 4-Is the measures taken by those states adequate or not? 5- How to remedy for the limitations of those measures? The paper is based on case study methodology as a way to better understand the relationship between security and environment using library research for data collection and analysis. This paper aims also at presenting some suggesting regarding possible ways of reducing the negative impact of environmental immigration.

Keywords: environment, refugees, Sahel region, security

Procedia PDF Downloads 468
12482 Balancing Act: Political Dynamics of Economic and Climatological Security in the Politics of the Middle East

Authors: Zahra Bakhtiari

Abstract:

Middle East countries confront a multitude of main environmental challenges which are inevitable. The unstable economic and political structure which dominates numerous middle East countries makes it difficult to react effectively to unfavorable climate change impacts. This study applies a qualitative methodology and relies on secondary literature aimed to investigate how countries in the Middle East are balancing economic security and climatic security in terms of budgeting, infrastructure investment, political engagement (domestically through discourses or internationally in terms of participation in international organizations or bargaining, etc.) There has been provided an outline of innovative measures in both economic and environmental fields that are in progress in the Middle East countries and what capacity they have for economic development and environmental adaptation, as well as what has already been performed. The primary outcome is that countries that rely more on infrastructure investment such as negative emissions technologies (NET) through green social capital enterprises and political engagement, especially nationally determined contributions (NDCs) commitments and United Nations Framework Convention on Climate Change (UNFCCC), experience more economic and climatological security balance in the Middle East. Since implementing these measures is not the same in all countries in the region, we see different levels of balance between climate security and economic security. The overall suggestion is that the collaboration of both the bottom-up and top-down approaches helps create strategic environmental strategies which are in line with the economic circumstances of each country and creates the desired balance.

Keywords: climate change, economic growth, sustainability, the Middle East, green economy, renewable energy

Procedia PDF Downloads 74
12481 Dancing in Bullets and in Brokenness: Metaphor in Terracotta on Canvas

Authors: Jonathan Okewu

Abstract:

Socio-economic occurrences and developments in any society is usually a thing of concern especially when this is been jeopardised as a result of insecurity of all sorts. There are numerous channels that such issues are brought to the fore for attention. Among this channels are the art media and more precisely the ceramic art media. Renown ceramic artists in Nigeria have taken to the medium of expression (clay) to contribute to succinct issues as it affects the society. This study takes advantage of a unique form of ceramic press moulding termed clay palm press. This uncommon production technique has been developed in this study to interrogate socio-economic insecurity in the form of ceramic art titled; “dancing in bullets and in brokenness”. This work was made possible through a ceramic medium that has been termed “terracotta on canvas”. Extensive studio practice was carried out to generate the terracotta forms for this study. Findings from this study indicates that the medium and mode of execution of the art work shows a unique side of working with clay that negates tactile or three dimensionality of inured ceramic practice. Additionally, the process of clay palm press in this study indicates that it could be therapeutical against medical conditions of muscles of the palm. This is because the process tightens and develops the muscles of the palm further. Dancing in bullets and in brokenness as portrayed through the medium of terracotta on canvas that social and security challenges are not a limiting factor to a resolute Nigerian, despite all, the strong will of Nigerians keeps persisting and overcoming challenges.

Keywords: canvas, dancing in bullets and in brokenness, metaphor, terracotta, palm press

Procedia PDF Downloads 125
12480 Blue Eyes and Blonde Hair in Mass Media: A News Discourse Analysis of Western Media on the News Coverage of Ukraine

Authors: Zahra Mehrabbeygi

Abstract:

This research is opted to analyze and survey discourse variety and news image-making in western media regarding the news coverage of the Russian army intrusion into Ukraine. This research will be done on the news coverage of Ukraine in a period from February 2022 to May 2022 in five western media, "BBC, CBS, NBC, Al Jazeera, and Telegraph." This research attempts to discover some facts about the news policies of the five western news agencies during the circumstances of the Ukraine-Russia war. Critical theories in the news, such as Framing, Media Imperialism of News, Image Making, Discourse, and Ideology, were applied to achieve this goal. The research methodology uses Van Dijk's discourse exploration method based on discourse analysis. The research's statistical population is related to all the news about racial discrimination during the mentioned period. After a statistical population survey with Targeted Sampling, the researcher randomly selected ten news cases for exploration. The research findings show that the western media have similarities in their texts via lexical items, polarization, citations, persons, and institutions. The research findings also imply pre-suppositions, connotations, and components of consensus agreement and underlying predicates in the outset, middle, and end events. The reaction of some western media not only shows their bewilderment but also exposes their prejudices rooted in racism.

Keywords: news discourse analysis, western media, racial discrimination, Ukraine-Russia war

Procedia PDF Downloads 91
12479 Going Viral: Expanding a Student-Run COVID-19 Journal Club to Social Media

Authors: Joseph Dodson, Robert Roth, Alexander Hodakowski, Leah Greenfield, Melissa Porterhouse, Natalie Maltby, Rachel Sadowsky

Abstract:

Introduction: Throughout the COVID-19 pandemic, countless research publications were released regarding SARS-CoV-2 and its variants, suggested treatments, and vaccine safety and efficacy. Daily publication of research became overwhelming for health professionals and the general public to stay informed. To address this problem, a group of 70 students across the four colleges at Rush University created the “Rush University COVID-19 Journal Club.” To broaden the available audience, the journal club then expanded to social media. Methods: Easily accessible and understandable summaries of the research were written by students and sent to faculty sponsors for feedback. Following the revision, summaries were published weekly on the Rush University COVID-19 Journal Club website for clinicians and students to use for reference. An Instagram page was then created, and information was further condensed into succinct posts to address COVID-19 “FAQs.” Next, a survey was distributed to followers of the Instagram page with questions meant to assess the effectiveness of the platform and gain feedback. A 5-point Likert scale was used as the primary question format. Results: The Instagram page accrued 749 followers and posted 52 unique posts over a 2 year period. Preliminary results from the surveys demonstrate that over 80% of respondents strongly agree that the Instagram posts 1) are an effective platform for the public presentation of factual COVID-19-related information; 2) provide relevant and valuable information; 3) provide information that is clear, concise, and can be easily understood. Conclusion: These results suggest that the Rush COVID-19 Journal Club was able to successfully create a social media presence and convey information without sacrificing scholarly integrity. Other academic institutions may benefit from the application of this model to help students and clinicians with the interpretation and evaluation of research topics with large bodies of evidence.

Keywords: SARS-CoV-2, COVID-19, public health, social media, SARS-CoV-2 vaccine, SARS-CoV-2 variants

Procedia PDF Downloads 120
12478 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology

Procedia PDF Downloads 454
12477 Engaging with Security and State from a Gendered Lens in the South Asian Context: Indian State’s Construction of Internal Security and State Responses

Authors: Pooja Bakshi

Abstract:

In the following paper, an attempt would be made to engage with the relationship between the state and the imperatives of security from a gendered lens. This will be juxtaposed with the feminist engagement with International Law. Theorizations from the literature on South Asian politics and Global politics would be applied to the manner in which the Indian state has defined and proposed to deal with concerns of internal security pertaining to the ‘Left Wing Extremism’ in 2010-2011. It would be argued that the state needs to be disaggregated into the legislature, executive and the judiciary; since there are times when some institutional parts of the state provide space for progressive democratic engagement whilst other institutions don’t. The specific contours of violence faced by women and children at the hands of the state, in the above-mentioned discourse would also be examined. In the end, implications of the security state discourse on debates in International Law would be elaborated.

Keywords: feminist engagement, human rights, state response to left extremism, security studies in South Asia

Procedia PDF Downloads 489
12476 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model

Authors: Wang Xue, Fan Liwei

Abstract:

The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.

Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model

Procedia PDF Downloads 91
12475 Teaching English for Specific Purposes to Business Students through Social Media

Authors: Candela Contero Urgal

Abstract:

Using realia to teach English for Specific Purposes (ESP) is a must, as it is thought to be designed to meet the students’ real needs in their professional life. Teachers are then expected to offer authentic materials and set students in authentic contexts where their learning outcomes can be highly meaningful. One way of engaging students is using social networks as a way to bridge the gap between their everyday life and their ESP learning outcomes. It is in ESP, particularly in Business English teaching, that our study focuses, as the ongoing process of digitalization is leading firms to use social media to communicate with potential clients. The present paper is aimed at carrying out a case study in which different digital tools are employed as a way to offer a collection of formats businesses are currently using so as to internationalize and advertise their products and services. A secondary objective of our study will then be to progress on the development of multidisciplinary competencies students are to acquire during their degree. A two-phased study will be presented. The first phase will cover the analysis of course tasks accomplished by undergraduate students at the University of Cadiz (Spain) in their third year of the Degree in Business Management and Administration by comparing the results obtained during the years 2019 to 2021. The second part of our study will present a survey conducted to these students in 2021 and 2022 so as to verify their interest in learning new ways to digitalize as well as internationalize their future businesses. Findings will confirm students’ interest in working with updated realia in their Business English lessons, as a consequence of their strong belief in the necessity to have authentic contexts and didactic resources. Despite the limitations social media can have as a means to teach business English, students will still find it highly beneficial since it will foster their familiarisation with the digital tools they will need to use when they get to the labour market.

Keywords: English for specific purposes, business English, internationalization of higher education, foreign language teaching

Procedia PDF Downloads 105
12474 An Exploration of Anti-Terrorism Laws in Nigeria

Authors: Sani Mohammed Adam

Abstract:

This work seeks to review the security challenges facing Nigeria and explore the relevance of laws and policies in tackling the menace. The work looks at the adequacy of available legislations and the functionality of relevant institutions such as the Armed Forces, the Nigeria Police Force, the State Security Service, the Defence Intelligence Agency and the Nigerian Intelligence Agency etc. Comparisons would be made with other jurisdictions, such as inter alia, the Homeland Security in the USA and Counter Terrorism Laws of the United Kingdom. Recommendations would be made on how to strengthen both institutions and laws to curtail the growth of Terrorism in Nigeria.

Keywords: legislations, Nigeria, security, terrorism

Procedia PDF Downloads 672
12473 Circulating Public Perception on Agroforestry: Discourse Networks Analysis Using Social Media and Online News Media in Four Countries of the Sahel Region

Authors: Luisa Müting, Wisnu Harto Adiwijoyo

Abstract:

Agroforestry systems transform the agricultural landscapes in the Sahel region of Africa, providing food and farming products consumed for subsistence or sold for income. In the incrementally dry climate of the Sahel region, the spreading of agroforestry practices is integral for policymaker efforts to counteract land degradation and provide soil restoration in the region. Several measures on agroforestry practices have been implemented in the region by governmental and non-governmental institutions in recent years. However, despite the efforts, past research shows that awareness of how policies and interventions are being consumed and perceived by the public remains low. Therefore, interpreting public policy dilemmas by analyzing the public perception regarding agroforestry concepts and practices is necessary. Public perceptions and discourses can be an essential driver or constraint for the adoption of agroforestry practices in the region. Thus, understanding the public discourse behavior of crucial stakeholders could assist policymakers in developing inclusive and contextual policies that are relevant to the context of agroforestry adoption in Sahel region. To answer how information about agroforestry spreads and is perceived by the public. As internet usage increased drastically over the past decade, reaching a share of 33 percent of the population being connected to the internet, this research is based on online conversation data. Social media data from Facebook are gathered daily between April 2021 and April 2022 in Djibouti, Senegal, Mali, and Nigeria based on their share of active internet users compared to other countries in the Sahel region. A systematic methodology was applied to the extracted social media using discourse network analysis (DNA). This study then clustered the data by the types of agroforestry practices, sentiments, and country. Additionally, this research extracted the text data from online news media during the same period to pinpoint events related to the topic of agroforestry. The preliminary result indicates that tree management, crops, and livestock integration, diversifying species and genetic resources, and focusing on interactions and productivity across the agricultural system; are the most notable keywords in agroforestry-related conversations within the four countries in the Sahel region. Additionally, approximately 84 percent of the discussions were still dominated by big actors, such as NGO or government actors. Furthermore, as a subject of communication within agroforestry discourse, the Great Green Wall initiative generates almost 60 percent positive sentiment within the captured social media data, effectively having a more significant outreach than general agroforestry topics. This study provides an understanding for scholars and policymakers with a springboard for further research or policy design on agroforestry in the four countries of the Sahel region with systematically uncaptured novel data from the internet.

Keywords: sahel, djibouti, senegal, mali, nigeria, social networks analysis, public discourse analysis, sentiment analysis, content analysis, social media, online news, agroforestry, land restoration

Procedia PDF Downloads 95
12472 Assessment of Households' Food Security and Hunger Level across Communities in Ile-Ife, Southwestern Nigeria

Authors: Adebayo-Victoria Tobi Dada, Dada Emmanuel

Abstract:

This study assessed households’ food security and hunger levels among different communities with varying educational and economic background in Ile-Ife, Nigeria, and its environment. It also examined the impacts of varying demography on the household food security level in the area. This was with a view to providing information on the food security status of the subjects within the study area. Ten different communities with varying demography (Parakin, Mokuro, Ilare, Obafemi Awolowo University (OAU) Staff Quarters, Ibadan Road, Aba-Iya Gani, Eleweran, Iraye, Boosa, and Eku-Isobo) were identified within the study area. Fieldwork was then carried out from 7th to 14th of March, 2016 in each of these communities through survey of market prices of food stuff, diet, and nutrition, social well-being, food accessibility and affordability as well as price fluctuation and variation in household’s social background. Selection of households for the survey was done using stratified random sampling method. Key informants included community heads, landlords, tenants, and household heads. Similarly, information on food security levels with respect to demographic backgrounds was obtained from the use of modified Food and Hunger Insecurity Module (FHIM) structured questionnaire. The questionnaire was administered to one percent of the households’ population per community. The results showed that communities such as Parakin and OAU Senior Staff Quarters were dominated by civil servants, while community such as Boosa was dominated by artisans. Respondents earning between ₦11,000 and ₦20,000 per month, during the study period, had the highest percentage across the selected communities. The household food security indices showed that about 41% of the investigated respondents could not guarantee their household food for a month, while 18% reduced or skipped meals. There were positive significant relationships between monthly income (F-value = 132.04), educational status (F-value = 102.30), occupation (F-value = 104.05) and food budget (F-value = 122.09), all at p < 0.05. However, there was no significant relationship between the monthly food budget and household sizes (t-value = -1.4074, p > 0.05). Food secured households’ had the household heads with a higher level of educational attainment. The study concluded that large variations which existed between socio-economic and educational background among the communities had significant effects on households’ food security level in the study area.

Keywords: food security, households, hunger level, market prices

Procedia PDF Downloads 205
12471 Objectifying Media and Preadolescents' Media Internalization: A Developmental Perspective

Authors: Ann Rousseau, Steven Eggermont

Abstract:

The current study sought to explain pre-adolescents’ differential susceptibility to the internalization of mediated appearance ideals, using a three-wave panel survey of preadolescent girls and boys (N = 973, Mage = 11.14). Based on the premises of objectification theory and sexual script theory, we proposed a double role for pubertal timing and cross-sex interactions in preadolescents’ media internalization. More specifically, we expected pubertal timing and cross-sex interactions to (a) trigger higher levels of media internalization, directly and indirectly via body surveillance, and (b) positively moderate the relationship between objectifying media exposure and girls’ and boys’ media internalization. A first cross-lagged model tested whether the pubertal timing and cross-sex interactions could trigger preadolescents media internalization and body surveillance. Structural equation analysis indicated that pubertal timing (Wave1) positively predicted body surveillance and media internalization (both Wave3). Cross-sex involvement (Wave1) was positively linked to media internalization (Wave2), but body surveillance (Wave2) was not associated with cross-sex interactions. Results also showed a reciprocal interaction between media internalization (Wave 2 and 3) and body surveillance (Wave2 and 3). Multiple group analysis showed that the observed relationships did not vary by gender. A second moderated moderation model examined whether (a) the relationship between objectifying media exposure (television and magazines, both Wave1) and media internalization (Wave3) depended on pubertal timing (Wave1), and (b) the two-way interaction between objectifying media exposure (Wave1) and pubertal timing (Wave1) varied depending on cross-sex interactions (Wave1). Results revealed that cross-sex interactions functioned as a buffer against media internalization. For preadolescents who had fewer cross-sex interactions, early puberty (relative to peers) positively moderated the relationship between magazine exposure and the internalization of mediated appearance ideals. No significant relationships were found for television. Again, no gender difference could be observed. The present study suggests a double role for pubertal timing and cross-sex interactions in preadolescents media internalization, and indicate that early developers with few cross-sex experiences are particularly vulnerable for media internalization. Additionally, the current findings suggest that there is relative gender equity in magazines’ ability to cultivate media internalization among preadolescents.

Keywords: cross-sex interactions, media effects, objectification theory, pubertal timing

Procedia PDF Downloads 326
12470 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 449
12469 Offloading Knowledge-Keeping to Digital Technology and the Attrition of Socio-Cultural Life

Authors: Sophia Melanson Ricciardone

Abstract:

Common vexations concerning the impact of contemporary media technology on our daily lives tend to conjure mental representations of digital specters that surreptitiously invade the privacy of our most intimate spaces. While legitimacy assuredly sustains these concerns, examining them in isolation from other attributable phenomena to the problems created by our hyper-mediated conditions does not supply a complete account of the deleterious cost of integrating digital affordances into the banal cadence of our shared socio-cultural realities. As we continue to subconsciously delegate facets of our social and cognitive lives to digital technology, the very faculties that have enabled our species to thrive and invent technology in the first place are at risk of attrition – namely our capacity to sustain attention while synthesizing information in working memory to produce creative and inventive constructions for our shared social existence. Though the offloading of knowledge-keeping to fellow social agents belonging to our family and community circles is an enduring intuitive phenomenon across human societies – what social psychologists refer to as transactive memory – in offloading our various socio-cognitive faculties to digital technology, we may plausibly be supplanting the visceral social connections forged by transactive memory. This paper will present related research and literature produced across the disciplines of sociobiology, socio-cultural anthropology, social psychology, cognitive semiotics and communication and media studies that directly and indirectly address the social precarity cultivated by digital technologies. This body of scholarly work will then be situated within common areas of interest belonging to digital anthropology, including the groundbreaking work of Pavel Curtis, Christopher Kelty, Lynn Cherny, Vincent Duclos, Nick Seaver, and Sherry Turkle. It is anticipated that in harmonizing these overlapping areas of intradisciplinary interest, this paper can weave together the disparate connections across spheres of knowledge that help delineate the conditions of our contemporary digital existence.

Keywords: cognition, digital media, knowledge keeping, transactive memory

Procedia PDF Downloads 130
12468 Three Decades of the Fourth Estate in Ghana: Issues, Challenges and the Way Forward

Authors: Samuel Pimpong

Abstract:

In most liberal and constitutional democracies, the media serves as a dominant power in the construction of the fundamental building blocks for the consolidation of democratic governance. However, the extent to which the media can enhance democratic consolidation in a country depends to a large extent on the independence of the media, the robustness of legislative frameworks and the safety of journalists in discharging their duties without fear or favor. This study sought to examine pertinent issues, practices and challenges facing the media in Ghana’s Fourth Republic and attempts to make recommendations regarding the way forward. The work adopted a qualitative study approach. A total of sixteen (16) participants were purposively selected for face-to-face interviews. The study hinges on the democratic participant media theory and the development media theory. Primary data was analyzed via thematic analysis procedure. The study revealed that although Ghana has repealed its criminal libel laws, nonetheless other statutory Acts, such as the Electronic Communications Act 2008 (ACT 775) and the Criminal and other offences Act 1960 (Act 29), among others continue to stifle freedom of expression. On the other hand, press freedom is being abused by the use of fake content publication. Further, the study revealed that the absence of a comprehensive regulatory structure impedes the activities carried out by the media. Consequently, the study recommends a regulatory structure to oversee media activities and content, as the National Media Commission (NMC) lacks the authority to do so. In this direction, the study recommends a limitation on the role of the National Communications Authority (NCA) to administer broadcasting signals and transfer its licensing and sanctioning powers to the NMC in order to create one sole and completely independent media regulatory authority that deals with all media related issues.

Keywords: media, constitutional democracy, democratic consolidation, fourth republic

Procedia PDF Downloads 66
12467 Analysis of Threats in Interoperability of Medical Devices

Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar

Abstract:

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.

Keywords: interoperability, threats, attacks, medical devices

Procedia PDF Downloads 325