Search results for: marketing communication tools internet
8848 Polycode Texts in Communication of Antisocial Groups: Functional and Pragmatic Aspects
Authors: Ivan Potapov
Abstract:
Background: The aim of this paper is to investigate poly code texts in the communication of youth antisocial groups. Nowadays, the notion of a text has numerous interpretations. Besides all the approaches to defining a text, we must take into account semiotic and cultural-semiotic ones. Rapidly developing IT, world globalization, and new ways of coding of information increase the role of the cultural-semiotic approach. However, the development of computer technologies leads also to changes in the text itself. Polycode texts play a more and more important role in the everyday communication of the younger generation. Therefore, the research of functional and pragmatic aspects of both verbal and non-verbal content is actually quite important. Methods and Material: For this survey, we applied the combination of four methods of text investigation: not only intention and content analysis but also semantic and syntactic analysis. Using these methods provided us with information on general text properties, the content of transmitted messages, and each communicants’ intentions. Besides, during our research, we figured out the social background; therefore, we could distinguish intertextual connections between certain types of polycode texts. As the sources of the research material, we used 20 public channels in the popular messenger Telegram and data extracted from smartphones, which belonged to arrested members of antisocial groups. Findings: This investigation let us assert that polycode texts can be characterized as highly intertextual language unit. Moreover, we could outline the classification of these texts based on communicants’ intentions. The most common types of antisocial polycode texts are a call to illegal actions and agitation. What is more, each type has its own semantic core: it depends on the sphere of communication. However, syntactic structure is universal for most of the polycode texts. Conclusion: Polycode texts play important role in online communication. The results of this investigation demonstrate that in some social groups using these texts has a destructive influence on the younger generation and obviously needs further researches.Keywords: text, polycode text, internet linguistics, text analysis, context, semiotics, sociolinguistics
Procedia PDF Downloads 1328847 Reduction of Defects Using Seven Quality Control Tools for Productivity Improvement at Automobile Company
Authors: Abdul Sattar Jamali, Imdad Ali Memon, Maqsood Ahmed Memon
Abstract:
Quality of production near to zero defects is an objective of every manufacturing and service organization. In order to maintain and improve the quality by reduction in defects, Statistical tools are being used by any organizations. There are many statistical tools are available to assess the quality. Keeping in view the importance of many statistical tools, traditional 7QC tools has been used in any manufacturing and automobile Industry. Therefore, the 7QC tools have been successfully applied at one of the Automobile Company Pakistan. Preliminary survey has been done for the implementation of 7QC tool in the assembly line of Automobile Industry. During preliminary survey two inspection points were decided to collect the data, which are Chassis line and trim line. The data for defects at Chassis line and trim line were collected for reduction in defects which ultimately improve productivity. Every 7QC tools has its benefits observed from the results. The flow charts developed for better understanding about inspection point for data collection. The check sheets developed for helps for defects data collection. Histogram represents the severity level of defects. Pareto charts show the cumulative effect of defects. The Cause and Effect diagrams developed for finding the root causes of each defects. Scatter diagram developed the relation of defects increasing or decreasing. The P-Control charts developed for showing out of control points beyond the limits for corrective actions. The successful implementation of 7QC tools at the inspection points at Automobile Industry concluded that the considerable amount of reduction on defects level, as in Chassis line from 132 defects to 13 defects. The total 90% defects were reduced in Chassis Line. In Trim line defects were reduced from 157 defects to 28 defects. The total 82% defects were reduced in Trim Line. As the Automobile Company exercised only few of the 7 QC tools, not fully getting the fruits by the application of 7 QC tools. Therefore, it is suggested the company may need to manage a mechanism for the application of 7 QC tools at every section.Keywords: check sheet, cause and effect diagram, control chart, histogram
Procedia PDF Downloads 3268846 Factors Effecting the Success and Failure of Social Enterprise in Thailand
Authors: Jatuporn Juyjingam, Pitak Siriwong
Abstract:
This paper presents a study of factors effecting the success and failure of social enterprise in Thailand identifying communication as one of the criteria for measuring the social impact of social enterprise. The study focused on the communication driver of the SCALERS model. The research examines how communication is viewed in Thailand social enterprise. The research aims to determine how selected social enterprise uses communication in their operations. More specifically, the study aims to 1) describe the profile of social enterprise in Thailand, 2) identify the different roles of communication in the operation of social enterprise in Thailand, 3) determine Thailand social enterprise concept of communication. The study made use of the case study and cross case study research designs. For the profiling of the social enterprises, the case study was used. The researchers made use of the cross-case research design in identifying trends across the ten social enterprises and in determining the social entrepreneurs’ concept of communication. Key informant interviews were conducted with the heads or representatives of selected social enterprises, a three-part interview schedule was used to facilitate data gathering. The three parts included are 1) Profile of social enterprise in Thailand 2) How social enterprises apply communication in their operations 3) What is the key success in using communication among social enterprise in Thailand. This study is an exploratory research.Keywords: communication, social entrepreneurship, social enterprise, sustainability development
Procedia PDF Downloads 5038845 Web Proxy Detection via Bipartite Graphs and One-Mode Projections
Authors: Zhipeng Chen, Peng Zhang, Qingyun Liu, Li Guo
Abstract:
With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies.Keywords: bipartite graph, one-mode projection, clustering, web proxy detection
Procedia PDF Downloads 2458844 Investigation of the Influencing Factors of Functional Communication Assessment for Adults with Aphasia
Authors: Yun-Ching Tu, Yu-Chun Chih
Abstract:
People with aphasia (PWA) may have communicative difficulties in their daily lives, but research on functional communication in aphasia is still limited in Taiwan. The aim of the study was to investigate the impact of aphasia-related factors on functional communication assessment. This study adopted a convenience sampling method. Thirty aphasic participants participated in the study. During the test, the examiner would ask questions that are encountered in daily life and record the participant‘s responses. Some questions would provide pictures to simulate situations in daily life. The results showed that the non-fluent aphasia group performed significantly worse than the fluent aphasia group. In addition, patients with severe aphasia performed significantly lower scores than patients with moderate aphasia and mild aphasia. However, group differences in the chronic stage and acute stage were not significant. In sum, since communication in daily life is diverse and language is still needed in the communication process, patients with aphasia who have better language ability may have relatively better functional communication. In contrast, the more severely impaired the language ability of a patient with aphasia is, the more functional communication will be affected, resulting in poor communication performance in daily life.Keywords: adult, aphasia, assessment, functional communication
Procedia PDF Downloads 758843 Using Cooperation without Communication in a Multi-Agent Unpredictable Dynamic Real-Time Environment
Authors: Abbas Khosravi
Abstract:
This paper discusses the use of cooperation without communication in a multi-agent, unpredictable, dynamic real-time environment. The architecture of the Persian Gulf agent consists of three layers: fixed rule, low level, and high level layers, allowing for cooperation without direct communication. A scenario is presented to each agent in the form of a file, specifying each player's role and actions in the game. The scenario helps in cases of miscommunication, improving team performance. Cooperation without communication enhances reliability and coordination among agents, leading to better results in challenging situations.Keywords: multi-agent systems, communication, Robocop, software engineering
Procedia PDF Downloads 348842 Multi-National Corporations and International Communication. An Analysis of Arçelik globals’ Online Presences
Authors: Aisha Iddrsiu
Abstract:
Public Relations (PR) has rapidly evolved around the world, just as companies have expanded to reach other parts of the world. With most multinational corporations conducting businesses in more than one country, only a few of these Multinational Corporations (MNC’s) are actual public relations firms, many have public relations departments or divisions that conduct public relations practices internationally. Hence international public relations is seen as a fast-growing specialty in the field of Public Relations. Multinational companies have devised strategies to effectively communicate and execute their roles within and between foreign publics and other cultures in which they operate through various means including the internet which is among the major inventions that have enabled corporations to establish their presents while targeting anonymous and diverse publics from varied cultures. International public relations practitioners rely on strategies coupled with internet use to communicate among and with foreign publics. Corporate websites and various social media handles have served as an important channel for public relations activities targeting both internal and international publics. In an incessant expansion of corporations and interactions with the publics from different cultures, it has become eminent to understand the public relation strategies used by MNCs in their international communication. This study therefore seeks to establish the international public relation strategies or models employed by Multinational Corporations specifically Arcelik Global in the management of its subsidiaries and communicating with international public. This study analyses both Arçelik global’s (one of the largest multinational companies in Turkey) website and social media accounts to understand the management strategy used with it subsidiary as well as strategies used to communicate with its global and local publics. Other underlying objective of this study are, 1. To examine the dominant international public relations models used by Multinational Corporations (Arcelik global). 2. To understand how Multinational Corporations manage (Arcelik global) its subsidiaries. 3. To understand how Multinational Corporations (Arcelik global) communicate with international or global publics. Research Questions 1. The main global PR strategies employed by multinational corporations (Arcelik global) 2. How subsidiaries of multinational corporations like Arcelik Global are managed. 3. How multinational corporations, like Arcelik worldwide, interact with international publics.Keywords: multinational corporation, ethnocentric model, polycentric model, international public relations
Procedia PDF Downloads 858841 The Effect of Technology in Improving Tourism Cluster Competitiveness
Authors: Michael Safwat Kotit Istemalek
Abstract:
In this study, a project on a small project called Zeytinseli, which plays an important role from the beginning to the end of olive oil and olive oil production, is presented with the help of tourism companies that play an important role in the tourism sector. In the study, first of all, a framework of ideas about travel agency, tourism, specific tourism agency and rural tourism was created and tourism knowledge in the modern world was emphasized. After this, the "olive", which had an important place in both mythology and the religion of God, disappeared in the field of rural tourism. Since Didim Zeytinseli is the Aydın district, accommodation prices were calculated within the scope of the project and a 15-day factory tour was given at the end of the project. It can be said that the study is an original study as it covers not only environmental and agricultural tourism but also cultural tourism and non-traditional tourism98.Keywords: financial problems, the problems of tourism businesses, tourism businesses, internet, marketing, tourism, tourism management economic competitiveness, enhancing competitiveness
Procedia PDF Downloads 308840 Feasibility of On-Demand Transport Systems (ODT) in Oran Wilaya: Geomatics Study
Authors: Brahmia Nadjet
Abstract:
The growing needs of displacements led advanced countries in this field install new specific transport systems, able to palliate any deficiencies, especially when regular public transport does not adequately meet the requests of users. In this context, on-demand transport systems (ODT) are very efficient; they rely on techniques based on the location of trip generators which should be assured effectively with the use of operators responsible of the advance reservation, planning and organization, and studying the different ODT criteria (organizational, technical, geographical, etc.). As the advanced countries in the field of transport, some developing countries are involved in the adaptation of the new technologies to reduce the deficit in their communication system. This communication presents the study of an ODT implementation in the west of Algeria, by developing the Geomatics side of the study. This part requires the use of specific systems (such as GIS, RDBMS), so we developed the process through an application in an environment of mobility by using the computer tools dedicated to the management of the entities related to the transport field.Keywords: ODT, geomatics, GIS, transport systems
Procedia PDF Downloads 5028839 Viability of On-Demand Transportation (ODT) in Oran Wilaya: Geomatics Study
Authors: Nadjet Brahmia
Abstract:
The growing needs of displacements led advanced countries in this field install new specific transport systems, able to palliate any deficiencies, especially when regular public transport does not adequately meet the requests of users. In this context, on-demand transportation (ODT) are very efficient; they rely on techniques based on the location of trip generators which should be assured effectively with the use of operators responsible of the advance reservation, planning and organization, and studying the different ODT criteria (organizational, technical, geographical, etc.). As the advanced countries in the field of transport, some developing countries are involved in the adaptation of the new technologies to reduce the deficit in their communication system. This communication presents the study of an ODT implementation in the west of Algeria, by developing the Geomatics side of the study. This part requires the use of specific systems (such as GIS, RDBMS…), so we developed the process through an application in an environment of mobility by using the computer tools dedicated to the management of the entities related to the transport field.Keywords: ODT, geomatics, GIS, transport systems
Procedia PDF Downloads 5578838 Combining Experiments and Surveys to Understand the Pinterest User Experience
Authors: Jolie M. Martin
Abstract:
Running experiments while logging detailed user actions has become the standard way of testing product features at Pinterest, as at many other Internet companies. While this technique offers plenty of statistical power to assess the effects of product changes on behavioral metrics, it does not often give us much insight into why users respond the way they do. By combining at-scale experiments with smaller surveys of users in each experimental condition, we have developed a unique approach for measuring the impact of our product and communication treatments on user sentiment, attitudes, and comprehension.Keywords: experiments, methodology, surveys, user experience
Procedia PDF Downloads 3128837 Influence of Information and Communication Technology on Dress Culture among Senior Secondary School Students in Ife East Local Government, Osun State, Nigeria
Authors: Idowu J. Diyaolu, Ebenezer O. Obayomi, Taiwo A. Bamidele
Abstract:
Information and Communication Technology (ICT) has been observed to have influence on the lifestyle of youths in general. Dressing styles, fashion consciousness and choice of role model are some of the areas of influence. The study was carried out to examine the perception and influence of ICT on the clothing culture of selected Senior Secondary School Students in Ife-East Local government area of Osun State, Nigeria. Two hundred Senior Secondary School Students from public and private schools were randomly selected. Data was collected using structured questionnaire. The result showed that 79.0% were computer literate, 64.5% have facebook account and 93.5% browse with phones. Based on their perception on the influence of ICT, 74.5% of the respondents agreed that frequent use of ICT has increased their level of fashion consciousness while 60.5% were motivated by the images and dressing pattern in magazines, on TV and the internet. Also, large proportions (60.5%) were influenced by the dressing styles of their friends on social media. Male students were significantly more engaged in ICT related activities than females (t = 1.29, P < 0.05), whereas there is no significant difference in the involvement in ICT activities between private and public school students (t = 0.325, P > 0.05). Since ICT has influence on dressing, appropriate dressing pattern should be encouraged on mass media.Keywords: dress culture, information and communication technology, fashion trend, role model
Procedia PDF Downloads 4638836 The Impact of Information and Communication Technology on the Performance of Office Technology Managers
Authors: Sunusi Tijjani
Abstract:
Information and communication technology is an indispensable tool in the performance of office technology managers. Today's offices are automated and equipped with modern office machines that enhances and improve the work of office managers. However, today's office technology managers can process, evaluate, manage and communicate all forms of information using technological devices. Information and Communication Technology is viewed as the process of processing, storing ad dissemination information while office technology managers are trained professional who can effectively operate modern office machines, perform administrative duties and attend meetings to take dawn minute of meetings. This paper examines the importance of information and communication technology toward enhancing the work of office managers. It also stresses the importance of information and communication technology toward proper and accurate record management.Keywords: communication, information, technology, managers
Procedia PDF Downloads 4858835 Sustainable Landscape Development Assessment Tools
Authors: Nur Azemah Aminludin, Osman Mohd Tahir
Abstract:
A dynamic landscape development is important for providing healthy ecosystem which supports all life. Nowadays, many initiatives towards sustainable development have been published. They lead to better living and more efficient use of natural resources in sustaining long-term ecological, economics and social benefits. To date, many assessment tools related to built environment have been established and practiced in this region, which mostly has the purpose assessing the environment performance of buildings. Hence, an assessment tool focusing on the sustainable landscape development itself is a necessity. This paper reviews the assessment criteria and indicators that are suitable for sustainable landscape development practices. The local and global assessment tools for landscape development are investigated, analyzed and discussed critically. Consideration also is given to the integration of the assessment tools with the surrounding environmental, social, and economical aspects. In addition, the assessment criteria and indicators for assessing the landscape development in Malaysia are also reviewed and discussed. In conclusion, this paper reviews, analyzes and discusses on available local and global landscape development assessment tools for sustainability.Keywords: assessment tool, sustainable landscape development, assessment criteria, assessment indicator
Procedia PDF Downloads 3918834 COVID-19 Impact on Online Digital Marketing Business Activities
Authors: Balwinder Singh, Veerpaul Kaur Mann
Abstract:
The COVID-19 had a dramatic impact on several countries across the world. National governments have imposed widespread restrictions to prevent the growth of this pandemic. The new health competitive scenario induced by the COVID-19 crisis raised many issues on how business activities should be reorganized due to the difficulties of physical interactions with distributors, suppliers and customers. The pandemic has particularly affected the whole marketing processes because of the relevant issues emerged in managing physical sale channels and interactions with one another, both in the Business-to-Consumer and in the Business-to-Business markets. Recent research about the appropriate actions and strategies that could help firms overcome the crisis has highlighted the key role of digital technologies that may ensure connections and, thus, help business activities to run smoothly. This could be true, especially with the emergence of strong limitations on physical interactions during the COVID-19 pandemic. In such a scenario, the online channel becomes the most important conducive for online customers to get in contact with the firm and carry out online purchasing activities.Keywords: COVID-19, business, digital marketing, online customers
Procedia PDF Downloads 568833 Using the Semantic Web Technologies to Bring Adaptability in E-Learning Systems
Authors: Fatima Faiza Ahmed, Syed Farrukh Hussain
Abstract:
The last few decades have seen a large proportion of our population bending towards e-learning technologies, starting from learning tools used in primary and elementary schools to competency based e-learning systems specifically designed for applications like finance and marketing. The huge diversity in this crowd brings about a large number of challenges for the designers of these e-learning systems, one of which is the adaptability of such systems. This paper focuses on adaptability in the learning material in an e-learning course and how artificial intelligence and the semantic web can be used as an effective tool for this purpose. The study proved that the semantic web, still a hot topic in the area of computer science can prove to be a powerful tool in designing and implementing adaptable e-learning systems.Keywords: adaptable e-learning, HTMLParser, information extraction, semantic web
Procedia PDF Downloads 3398832 Benchmarking of Pentesting Tools
Authors: Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
Abstract:
The benchmarking of tools for dynamic analysis of vulnerabilities in web applications is something that is done periodically, because these tools from time to time update their knowledge base and search algorithms, in order to improve their accuracy. Unfortunately, the vast majority of these evaluations are made by software enthusiasts who publish their results on blogs or on non-academic websites and always with the same evaluation methodology. Similarly, academics who have carried out this type of analysis from a scientific approach, the majority, make their analysis within the same methodology as well the empirical authors. This paper is based on the interest of finding answers to questions that many users of this type of tools have been asking over the years, such as, to know if the tool truly test and evaluate every vulnerability that it ensures do, or if the tool, really, deliver a real report of all the vulnerabilities tested and exploited. This kind of questions have also motivated previous work but without real answers. The aim of this paper is to show results that truly answer, at least on the tested tools, all those unanswered questions. All the results have been obtained by changing the common model of benchmarking used for all those previous works.Keywords: cybersecurity, IDS, security, web scanners, web vulnerabilities
Procedia PDF Downloads 3198831 Factors Influencing University Students' Online Disinhibition Behavior: The Moderating Effects of Deterrence and Social Identity
Authors: Wang, Kuei-Ing, Jou-Fan Shih
Abstract:
This study adopts deterrence theory as well as social identities as moderators, and explores their moderating affects on online toxic disinhibition. Survey and Experimental methodologies are applied to test the research model and four hypotheses are developed in this study. The controllability of identity positively influenced the behavior of toxic disinhibition both in experimental and control groups while the fluidity of the identity did not have significant influences on online disinhibition. Punishment certainty, punishment severity as well as social identity negatively moderated the relation between the controllability of the identity and the toxic disinhibition. The result of this study shows that internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the inappropriate behavior will be found and punished severely, the inappropriate behavior then will be weakened.Keywords: seductive properties of internet, online disinhibition, punishment certainty, punishment severity, social identity
Procedia PDF Downloads 5088830 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 3458829 Exploring the Success of Live Streaming Commerce in China: A Literature Analysis
Authors: Ming Gao, Matthew Tingchi Liu, Hoi Ngan Loi
Abstract:
Live streaming refers to the video contents generated by broadcasters and shared with viewers in real-time by uploading them to short-video platforms. In recent years, individual KOL broadcasters have successfully made use of live streams to sell a large amount of goods to the consumers. For example, Wei Ya, the Number 1 broadcaster in Taobao Live, sold products worth RMB 2.7 billion (USD 0.38 billion) in 2018. Regarding the success of live streaming commerce (LSC) in China, this study explores the elements of the booming LSC industry and attempts to explain the reasons behind its prosperity. A systematic review of industry reports and academic papers was conducted to summarize the latest findings in this field. And the results of this investigation showed that a live streaming eco-system has been established by the LSC players, namely, the platform, the broadcaster, the product supplier, and the viewer. In this eco-system, all players have complementary advantages and needs, and their close cooperation leads to a win-win situation. For instance, platforms and broadcasters have abundant internet traffic, which needs to be monetized, while product suppliers have mature supply chains and the need of promoting the products. In addition, viewers are attached to the LSC platforms to get product information, bargains, and entertainment. This study highlights the importance of the mass-personal hybrid communication nature of live streaming because its interpersonal communication feature increases consumers’ positive experiences, while its mass media broadcasting feature facilitates product promotion. Another innovative point of this study lies in its inclusion of the special characteristic of Chinese Internet culture - entertainment. The entertaining genres of the live streams created by broadcasters serve as down-to-earth approaches to reach their audiences easily. Further, the nature of video, i.e., the dynamic and salient stimulus, is emphasized in this study. Since video is more engaging, it can attract viewers in a quick and easy way. Meanwhile, the abundant, interesting, high-quality, and free short videos have added “stickiness” to platforms by retaining users and prolonging their staying time on the platforms. In addition, broadcasters’ important characters, such as physical attractiveness, humor, sex appeal, kindness, communication skills, and interactivity, are also identified as important factors that influence consumers’ engagement and purchase intention. In conclusion, all players have their own proper places in this live streaming eco-system, in which they work seamlessly to give full play to their respective advantages, with each player taking what it needs and offering what it has. This has contributed to the success of live streaming commerce in China.Keywords: broadcasters, communication, entertainment, live streaming commerce, viewers
Procedia PDF Downloads 1228828 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions
Authors: Behnam Zahednejad, Saeed Kosari
Abstract:
Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif
Procedia PDF Downloads 1028827 A Survey of Online User Perspectives and Age Profile in an Undergraduate Fundamental Business Technology Course
Authors: Danielle Morin, Jennifer D. E. Thomas, Raafat G. Saade, Daniela Petrachi
Abstract:
Over the past few decades, more and more students choose to enroll in online classes instead of attending in-class lectures. While past studies consider students’ attitudes towards online education and how their grades differed from in-class lectures, the profile of the online student remains a blur. To shed light on this, an online survey was administered to about 1,500 students enrolled in an undergraduate Fundamental Business Technology course at a Canadian University. The survey was comprised of questions on students’ demographics, their reasons for choosing online courses, their expectations towards the course, the communication channels they use for the course with fellow students and with the instructor. This paper focused on the research question: Do the perspectives of online students concerning the online experience, in general, and in the course in particular, differ according to age profile? After several statistical analyses, it was found that age does have an impact on the reasons why students select online classes instead of in-class. For example, it was found that the perception that an online course might be easier than in-class delivery was a more important reason for younger students than for older ones. Similarly, the influence of friends is much more important for younger students, than for older students. Similar results were found when analyzing students’ expectation about the online course and their use of communication tools. Overall, the age profile of online users had an impact on reasons, expectations and means of communication in an undergraduate Fundamental Business Technology course. It is left to be seen if this holds true across other courses, graduate and undergraduate.Keywords: communication channels, fundamentals of business technology, online classes, pedagogy, user age profile, user perspectives
Procedia PDF Downloads 2508826 From Service to Ritual: Preliminary Development on Conceptual Framework for Designing Ritual
Authors: Yi-Jing Lee
Abstract:
Prior to the development of ritual design tool and framework, this paper establishes a systematic review on the studies related to ritual and ritual design across anthropology, consumer culture, marketing, and design. It is found that following symbolic anthropologists, the ethnographic approach was adapted by consumer culture researchers to study modern rituals and marketers to enhance consumption. In the domain of design, although there are already designers aware of the importance of ritualistic dimension of human interaction, there are little frameworks for conceptualizing and developing rituals. The conceptualized framework and developing tools is proposed and suggestions of applying it is made in the end of the paper.Keywords: ritual, ritual design, service design, symbolic interaction
Procedia PDF Downloads 1938825 Ethical Concerns in the Internet of Things and Smart Devices: Case Studies and Analysis
Authors: Mitchell Browe, Oriehi Destiny Anyaiwe, Zahraddeen Gwarzo
Abstract:
The Internet of Things (IoT) is a major evolution of technology and of the internet, which has the power to revolutionize the way people live. IoT has the power to change the way people interact with each other and with their homes; It has the ability to give people new ways to interact with and monitor their health; It can alter socioeconomic landscapes by providing new and efficient methods of resource management, saving time and money for both individuals and society as a whole; It even has the potential to save lives through autonomous vehicle technology and smart security measures. Unfortunately, nearly every revolution bears challenges which must be addressed to minimize harm by the new technology upon its adopters. IoT represents an internet technology revolution which has the potential to risk privacy, safety, and security of its users, should devices be developed, implemented, or utilized improperly. This article examines past and current examples of these ethical faults in an attempt to highlight the importance of consumer awareness of potential dangers of these technologies in making informed purchasing and utilization decisions, as well as to reveal how deficiencies and limitations of IoT devices should be better addressed by both companies and by regulatory bodies. Aspects such as consumer trust, corporate transparency, and misuse of individual data are all factors in the implementation of proper ethical boundaries in the IoT.Keywords: IoT, ethical concerns, privacy, safety, security, smart devices
Procedia PDF Downloads 858824 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 878823 Managing Food Waste Behaviour in Saudi Arabia: Investigating the Role of Social Marketing
Authors: Suliman Al Balawi
Abstract:
Food waste is a significant problem in the Kingdom of Saudi Arabia (KSA). About SR13 billion worth of food is wasted per year in the KSA. From moral, social, and economic perspectives, it is essential to reduce the wastage of food. Although studies have identified the amount of food waste in the KSA, there is a lack of research on why people in the KSA waste food; thus, it is difficult to design efficient intervention programs to reduce food waste. This research investigates the key factors that influence the food waste behavior of the people of the KSA. A food waste behavior model is proposed in this study that has moral disengagement at the center of the model. Following a literature survey, it is hypothesised that religiosity, hedonic value, frugality, and trait cynicism are the antecedents of moral disengagement that are likely to impact the food waste behavior of the people of the KSA. The study further posits that an intervention strategy in the form of a social marketing campaign that focuses on lowering the level of moral disengagement could reduce the food waste behavior of the people of the KSA. This study will apply a pre-test/post-test experimental design (control group). A random sampling method will be used to select participants from the (employees of a chosen firm) in the KSA. The social marketing campaign will be run for six months through the Corporate Social Responsibility Department of the Company, and to analyse the experimental data, structural equation modeling (SEM) will be used. The outcomes of the study will demonstrate the effectiveness of a social marketing campaign for improving the food waste behavior of the people of the KSA and will ultimately lay the foundation for designing efficient intervention programs in the future. This study will contribute to the knowledge on food waste behavior by testing a newly proposed food waste behavior model in the KSA.Keywords: food waste, social marketing, Saudi Arabia, moral disengagement
Procedia PDF Downloads 1828822 Social Media Marketing in Indonesian Social Enterprise: The Effect of Members' Level of Participation on Brand Trust and Brand Commitment
Authors: Irsanti Hasyim, Christian Wibisono, Angela Teressia
Abstract:
Social enterprises, as one of the way of doing business are on the rise and emerging from the innovations of decades of social initiatives. In simple way, social enterprises use the business platform to achieve social and/or environmental objectives whilst simultaneously seeking a financial return. In Indonesia, the number of social enterprises rapidly grows and most of them were using social media as their business platform. Social Media are perceived as tools for creating online communities of users who share interests, activities, and objectives. Many companies view the use of online communities in social media as a profitable marketing tool from which they can derive several benefits. Through social media, consumers share experiences with and suggest ideas to others while developing new relationships within their communities. Therefore, this study intends to identify the benefits that participants in online communities seek and examine the relationships between members’ levels of participation, brand trust, and brand commitment. Using convenience sampling method, 236 fully answered questioner was collected and used as a sample of this research. The sample of this research consisted of member or follower in several social media from selected social enterprise in Indonesia. Data collected in this research were process by using Partial Least Square and came up with the result that functional benefit and monetary benefit, are only two from five benefits that proposed were the only variable that has significant result even though from APC, ARS and AARS outcomes show that the model can be claimed to be significant.Keywords: brand trust, brand commitment, social enterprise, social media
Procedia PDF Downloads 2358821 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network
Authors: Kimaya Subhash Gaikwad, S. B. Waykar
Abstract:
The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.Keywords: communication, MANET, OLSR, QoS
Procedia PDF Downloads 4508820 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University
Authors: Wipada Chaiwchan
Abstract:
This research aims to study behaviors in using social networks of Corporate personnel of Suan Sunandha Rajabhat University. The sample used in the study were two groups: 1) Academic Officer 70 persons and 2) Operation Officer 143 persons were used in this study. The tools in this research consisted of questionnaire which the data were analyzed by using percentage, average (X) and Standard deviation (S.D.) and Independent Sample T-Test to test the difference between the mean values obtained from two independent samples, and One-way anova to analysis of variance, and Multiple comparisons to test that the average pair of different methods by Fisher’s Least Significant Different (LSD). The study result found that the most of corporate personnel have purpose in using social network to information awareness aspect was knowledge and online conference with social media. By using the average more than 3 hours per day in everyday. Using time in working in one day and there are computers connected to the Internet at home, by using the communication in the operational processes. Behaviors using social networks in relation to gender, age, job title, department, and type of personnel. Hypothesis testing, and analysis of variance for the effects of this analysis is divided into three aspects: The use of online social networks, the attitude of the users and the security analysis has found that Corporate Personnel of Suan Sunandha Rajabhat University. Overall and specifically at the high level, and considering each item found all at a high level. By sorting of the social network (X=3.22), The attitude of the users (X= 3.06) and the security (X= 3.11). The overall behaviors using of each side (X=3.11).Keywords: social network, behaviors, social media, computer information systems
Procedia PDF Downloads 3948819 Attracting the North Holidaymaker to Ireland Using Social Media Channels: An Irish Marketing Strategy
Authors: Colm Barcoe, Garvan Whelan
Abstract:
In tourism, engagement has been found to boost awareness of a destination and subsequently increase visits. Customer engagement in this industry is now facilitated by social media. This phenomenon is not very well researched in relation to Ireland and the North American tourism market. The objective of this paper is to present research findings on two related topics; the first is an investigation into the effectiveness of social media channels as components of a digital marketing campaign when promoting Ireland as a brand in North America. Secondly, this study reveals how Irish marketers have embraced social media platforms and channels with an innovative strategy that has successfully attracted growing numbers of US and Canadian holidaymakers to Ireland. A range of methodological approaches was applied in order to achieve the study’s objective. The methods used were both quantitative and qualitative, and the data was obtained from both Irish marketers and North American holidaymakers. Surveys of these holidaymakers in the pre, during and post-trip phases revealed their attitudes towards social media and Ireland as a destination. Semi-structured interviews with those responsible for implementing relationship marketing strategies for this segment provide insight into the effectiveness of social media when used to capitalise on the cultural link between Ireland and North America. Further analysis involved using Nvivo 11+ software to investigate the activities of the Irish destination marketer (DMO) and the engagement of the US and Canadian audiences through a detailed study of social media platform content. The findings from this investigation will extend an under-researched body of literature pertaining to Ireland as a destination and the successful digital marketing campaigns that have achieved exponential growth in this sector over the past five years. The empirical evidence presented also illustrates how the innovative use of social media has assisted the DMO to engage with the North American holidaymaker as part of an effective digital marketing strategy.Keywords: channels, digital, engagement, marketing, strategies
Procedia PDF Downloads 156