Search results for: Shannon information theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14586

Search results for: Shannon information theory

13656 Aligning Cultural Practices through Information Exchange: A Taxonomy in Global Manufacturing Industry

Authors: Hung Nguyen

Abstract:

With the rise of global supply chain network, the choice of supply chain orientation is critical. The alignment between cultural similarity and supply chain information exchange could help identify appropriate supply chain orientations, which would differentiate the stronger competitors and performers from the weaker ones. Through developing a taxonomy, this study examined whether the choices of action programs and manufacturing performance differ depending on the levels of attainment cultural similarity and information exchange. This study employed statistical tests on a large-scale dataset consisting of 680 manufacturing plants from various cultures and industries. Firms need to align cultural practices with the level of information exchange in order to achieve good overall business performance. There appeared to be consistent three major orientations: the Proactive, the Initiative and the Reactive. Firms are experiencing higher payoffs from various improvements are the ones successful alignment in both information exchange and cultural similarity The findings provide step-by-step decision making for supply chain information exchange and offer guidance especially for global supply chain managers. In including both cultural similarity and information exchange, this paper adds greater comprehensiveness and richness to the supply chain literature.

Keywords: culture, information exchange, supply chain orientation, similarity

Procedia PDF Downloads 343
13655 Lyapunov and Input-to-State Stability of Stochastic Differential Equations

Authors: Arcady Ponosov, Ramazan Kadiev

Abstract:

Input-to-State Stability (ISS) is widely used in deterministic control theory but less known in the stochastic case. Roughly speaking, the theory explains when small perturbations of the right-hand sides of the system on the entire semiaxis cause only small changes in the solutions of the system, again on the entire semiaxis. This property is crucial in many applications. In the report, we explain how to define and study ISS for systems of linear stochastic differential equations with or without delays. The central result connects ISS with the property of Lyapunov stability. This relationship is well-known in the deterministic setting, but its stochastic version is new. As an application, a method of studying asymptotic Lyapunov stability for stochastic delay equations is described and justified. Several examples are provided that confirm the efficiency and simplicity of the framework.

Keywords: asymptotic stability, delay equations, operator methods, stochastic perturbations

Procedia PDF Downloads 158
13654 Indecisiveness in 'The Road Not Taken' by Robert Frost: An Expressive Critical Analysis

Authors: Kurt S. Candilas

Abstract:

This expressive critical study is an effort to bring in light new interpretation of Robert Frost poem 'The Road Not Taken' as a reflection of his indecisiveness in life. Specifically, it aims at examining Frost’s inner being, emphasizing his own self and experiences in the poem or text. The study employs the qualitative research design which made use of discourse analysis using the critical theory of expressivism as the main guide. In acquiring the data of the study, the art of historiography is used such as autobiographical and/or biographical notes, sources documents, and web information. In executing the methods involved in this study, it is observed that the poem shows a naturalist implicatures, expressing Frost’s strong feelings and emotions being devoid of free will and a narrow bit of confusions and ambiguities with his indecisions in life.

Keywords: The Road Not Taken, expressivism, indecisiveness, naturalist implicatures

Procedia PDF Downloads 329
13653 Realization of Autonomous Guidance Service by Integrating Information from NFC and MEMS

Authors: Dawei Cai

Abstract:

In this paper, we present an autonomous guidance service by combining the position information from NFC and the orientation information from a 6 axis acceleration and terrestrial magnetism sensor. We developed an algorithm to calculate the device orientation based on the data from acceleration and terrestrial magnetism sensor. If visitors want to know some explanation about an exhibit in front of him, what he has to do is just lift up his mobile device. The identification program will automatically identify the status based on the information from NFC and MEMS, and start playing explanation content for him. This service may be convenient for old people or disables or children.

Keywords: NFC, ubiquitous computing, guide sysem, MEMS

Procedia PDF Downloads 392
13652 Multidimensional Item Response Theory Models for Practical Application in Large Tests Designed to Measure Multiple Constructs

Authors: Maria Fernanda Ordoñez Martinez, Alvaro Mauricio Montenegro

Abstract:

This work presents a statistical methodology for measuring and founding constructs in Latent Semantic Analysis. This approach uses the qualities of Factor Analysis in binary data with interpretations present on Item Response Theory. More precisely, we propose initially reducing dimensionality with specific use of Principal Component Analysis for the linguistic data and then, producing axes of groups made from a clustering analysis of the semantic data. This approach allows the user to give meaning to previous clusters and found the real latent structure presented by data. The methodology is applied in a set of real semantic data presenting impressive results for the coherence, speed and precision.

Keywords: semantic analysis, factorial analysis, dimension reduction, penalized logistic regression

Procedia PDF Downloads 424
13651 Using the Theory of Reasoned Action and Parental Mediation Theory to Examine Cyberbullying Perpetration among Children and Adolescents

Authors: Shirley S. Ho

Abstract:

The advancement and development of social media have inadvertently brought about a new form of bullying – cyberbullying – that transcends across physical boundaries of space. Although extensive research has been conducted in the field of cyberbullying, most of these studies have taken an overwhelmingly empirical angle. Theories guiding cyberbullying research are few. Furthermore, very few studies have explored the association between parental mediation and cyberbullying, with majority of existing studies focusing on cyberbullying victimization rather than perpetration. Therefore, this present study investigates cyberbullying perpetration from a theoretical angle, with a focus on the Theory of Reasoned Action and the Parental Mediation Theory. More specifically, this study examines the direct effects of attitude, subjective norms, descriptive norms, injunctive norms and active mediation and restrictive mediation on cyberbullying perpetration on social media among children and adolescents in Singapore. Furthermore, the moderating role of age on the relationship between parental mediation and cyberbullying perpetration on social media are examined. A self-administered paper-and-pencil nationally-representative survey was conducted. Multi-stage cluster random sampling was used to ensure that schools from all the four (North, South, East, and West) regions of Singapore were equally represented in the sample used for the survey. In all 607 upper primary school children (i.e., Primary 4 to 6 students) and 782 secondary school adolescents participated in our survey. The total average response rates were 69.6% for student participation. An ordinary least squares hierarchical regression analysis was conducted to test the hypotheses and research questions. The results revealed that attitude and subjective norms were positively associated with cyberbullying perpetration on social media. Descriptive norms and injunctive norms were not found to be significantly associated with cyberbullying perpetration. The results also showed that both parental mediation strategies were negatively associated with cyberbullying perpetration on social media. Age was a significant moderator of both parental mediation strategies and cyberbullying perpetration. The negative relationship between active mediation and cyberbullying perpetration was found to be greater in the case of children than adolescents. Children who received high restrictive parental mediation were less likely to perform cyberbullying behaviors, while adolescents who received high restrictive parental mediation were more likely to be engaged in cyberbullying perpetration. The study reveals that parents should apply active mediation and restrictive mediation in different ways for children and adolescents when trying to prevent cyberbullying perpetration. The effectiveness of active parental mediation for reducing cyberbullying perpetration was more in the case of children than for adolescents. Younger children were found to be more likely to respond more positively toward restrictive parental mediation strategies, but in the case of adolescents, overly restrictive control was found to increase cyberbullying perpetration. Adolescents exhibited less cyberbullying behaviors when under low restrictive strategies. Findings highlight that the Theory of Reasoned Action and Parental Mediation Theory are promising frameworks to apply in the examination of cyberbullying perpetration. The findings that different parental mediation strategies had differing effectiveness, based on the children’s age, bring about several practical implications that may benefit educators and parents when addressing their children’s online risk.

Keywords: cyberbullying perpetration, theory of reasoned action, parental mediation, social media, Singapore

Procedia PDF Downloads 240
13650 Discourse Analysis and Semiotic Researches: Using Michael Halliday's Sociosemiotic Theory

Authors: Deyu Yuan

Abstract:

Discourse analysis as an interdisciplinary approach has more than 60-years-history since it was first named by Zellig Harris in 'Discourse Analysis' on Language in 1952. Ferdinand de Saussure differentiated the 'parole' from the 'langue' that established the principle of focusing on language but not speech. So the rising of discourse analysis can be seen as a discursive turn for the entire language research that closely related to the theory of Speech act. Critical discourse analysis becomes the mainstream of contemporary language research through drawing upon M. A. K. Halliday's socio-semiotic theory and Foucault, Barthes, Bourdieu's views on the sign, discourse, and ideology. So in contrast to general semiotics, social semiotics mainly focuses on parole and the application of semiotic theories to some applicable fields. The article attempts to discuss this applicable sociosemiotics and show the features of it that differ from the Saussurian and Peircian semiotics in four aspects: 1) the sign system is about meaning-generation resource in the social context; 2) the sign system conforms to social and cultural changes with the form of metaphor and connotation; 3) sociosemiotics concerns about five applicable principles including the personal authority principle, non-personal authority principle, consistency principle, model demonstration principle, the expertise principle to deepen specific communication; 4) the study of symbolic functions is targeted to the characteristics of ideational, interpersonal and interactional function in social communication process. Then the paper describes six features which characterize this sociosemiotics as applicable semiotics: social, systematic, usable interdisciplinary, dynamic, and multi-modal characteristics. Thirdly, the paper explores the multi-modal choices of sociosemiotics in the respects of genre, discourse, and style. Finally, the paper discusses the relationship between theory and practice in social semiotics and proposes a relatively comprehensive theoretical framework for social semiotics as applicable semiotics.

Keywords: discourse analysis, sociosemiotics, pragmatics, ideology

Procedia PDF Downloads 321
13649 Impact of Newspaper Coverage of 2015 General Elections in Nigeria

Authors: Shola H. Adeosun, Lekan M. Togunwa, Kolawole Z. Amos

Abstract:

This paper appraises ‘Newspaper Coverage of 2015 General Election: A study of The Punch and Guardian Newspapers’. The objectives of the study were to examine how credible newspaper reports of 2015 election were and to examine the significant role Nigeria Newspapers played in the 2015 general elections. Also this study examined the extent at which the print media contributed to the success of 2015 general election and to ascertain the extent at which print media reports serve as a tool for sensitizing the masses. The research questions that guided this research include: How credible was newspaper report of 2015 general election? To what extent did the print media contributed to the success of 2015 general elections? To what extent did the print media reports serve as a tool for sensitizing the masses? The research work was given solid theoretical foundation with the review of Agenda-setting theory, Media System Dependency Theory and Normative theories. This study was given solid theoretical foundation with the review of Agenda-setting theory, Media Dependency Theory and Normative theories. The theory was conducted using content analysis method of research and 30 publications of both The Guardian and Punch Newspaper between January 1st and March 30, 2015 forms the population for this research work. Selection of the dates and editions of Newspaper under study were done using the composite week sampling technique. All the days of the week were used for the newspapers because they (The Punch and The Guardian) are published all the days of the week. Coding sheet was the tool of data collection for the content analysis of this study. Findings of the study revealed that by the Punch newspaper and Guardian has played a significant role in eradicating election malpractices in Nigeria. It therefore concludes that media is metaphoric when we termed it to be a watchdog of the nation as well the mirror through which the nation see and recognize itself. The study also recommends that Nigerian media should strike balance between entertainment stories, crisis stories, economic stories, law story, education stories, terrorism stories, health stories, sport stories, metropolitan stories instead of portraying the country as being crime oriented.

Keywords: newspaper, coverage, general elections, impact

Procedia PDF Downloads 298
13648 Foreign News Coverage in Conservative and Liberal U.S. Newspapers: A Case Study of Saudi Arabia

Authors: Mohammed Huraysi

Abstract:

This research will investigate the historical coverage of foreign issues in U.S. newspapers. The study will focus on three main areas, which are coverage of wars, foreign leaders, and human rights in foreign countries, and analyze them by applying the framing theory to news stories about Saudi Arabia, used as a case study, within two different newspapers over some time Wall Street Journal and The New York Times will be investigated and representative of two distinct newspaper orientations, which are conservative and liberal ideological orientations. By the end of this research study, comprehensive coverage of these topics in U.S. newspapers from past to present will be provided, leading to an ability to discover consistency or lack thereof, explain the present, and devise future expectations.

Keywords: framing theory, US newspapers, historical research, Saudi Arabia

Procedia PDF Downloads 72
13647 Comparing the Motion of Solar System with Water Droplet Motion to Predict the Future of Solar System

Authors: Areena Bhatti

Abstract:

The geometric arrangement of planet and moon is the result of a self-organizing system. In our solar system, the planets and moons are constantly orbiting around the sun. The aim of this theory is to compare the motion of a solar system with the motion of water droplet when poured into a water body. The basic methodology is to compare both motions to know how they are related to each other. The difference between both systems will be that one is extremely fast, and the other is extremely slow. The role of this theory is that by looking at the fast system we can conclude how slow the system will get to an end. Just like ripples are formed around water droplet that move away from the droplet and water droplet forming those ripples become small in size will tell us how solar system will behave in the same way. So it is concluded that large and small systems can work under the same process but with different motions of time, and motion of the solar system is the slowest form of water droplet motion.

Keywords: motion, water, sun, time

Procedia PDF Downloads 132
13646 Fish Diversity of Two Lacustrine Wetlands of the Upper Benue Basin, Nigeria

Authors: D. L. David, J. A. Wahedi, Q. T. Zaku

Abstract:

A study was conducted at River Mayo Ranewo and River Lau, Taraba State Nigeria. The two rivers empty into the Upper Benue Basin. A survey of visual encounter was conducted within the two wetlands from June to August, 2014. The fish record was based entirely on landings of fishermen, number of canoes that land fish was counted, types of nets and baits used on each sampling day. Fishes were sorted into taxonomic groups, identified to family/ species level, counted and weighed in groups by species. Other aquatic organisms captured by the fishermen were scallops, turtles and frogs. The relative species abundance was determined by dividing the number of species from a site by the total number of species from all tributaries/sites. The fish were preserved in 2% formaldehyde solution and taken to the laboratory, were identified through keys of identification to African fishes and field guides. Shannon-Wieiner index of species diversity indicated that the diversity was highest at River Mayo Ranewo than River Lau. Results showed that at River Mayo Ranewo, the family Mochokidae recorded the highest (23.15%), followed by Mormyridae (22.64%) and the least was the family Lepidosirenidae (0.04%). While at River Lau, the family Mochokidae recorded the highest occurrence of (24.1%), followed by Bagridae (20.20%), and then Mormyridae, which also was the second highest in River Lau, with 18.46% occurrence. There was no occurrence of Malapteruridae and Osteoglossidae (0%) in River Lau, but the least occurrence was the family Gymnarchidae (0.04%). According to the result from the t-test, the fish composition was not significantly different (p≤0.05).

Keywords: Diversity Index, Lau, Mayo Ranewo, Wetlands

Procedia PDF Downloads 346
13645 Biomedical Definition Extraction Using Machine Learning with Synonymous Feature

Authors: Jian Qu, Akira Shimazu

Abstract:

OOV (Out Of Vocabulary) terms are terms that cannot be found in many dictionaries. Although it is possible to translate such OOV terms, the translations do not provide any real information for a user. We present an OOV term definition extraction method by using information available from the Internet. We use features such as occurrence of the synonyms and location distances. We apply machine learning method to find the correct definitions for OOV terms. We tested our method on both biomedical type and name type OOV terms, our work outperforms existing work with an accuracy of 86.5%.

Keywords: information retrieval, definition retrieval, OOV (out of vocabulary), biomedical information retrieval

Procedia PDF Downloads 476
13644 Using Geographic Information Systems in the Desertification Risk’s Cartography: Case South of the Aurès Region, Algeria

Authors: Benmessaoud Hassen

Abstract:

The sensitivity to the desertification map of the south of Aurès region has been elaborated by the crossing of four thematic layers capable to have an impact on the process of desertification. The following step is inspired of MEDALUS (Mediterranean desertification and land Use), which use qualitative index to define the environment zones sensitive to the desertification. The cartographical information of vegetation, the climate, the soil and the socioeconomic state descended from cartographic data transformed to numerical data then seized on, structured and managed by an algorithm dedicated to a geographical information system. In step with information, each layer makes object of 3 or 4 classes, the geometrical median of the four layers used are leaded to sensitivity classes (ISD) of different mapped environment.

Keywords: information systems, thematic layers, the sensitivity to the desertification map, concept MEDALUS, South of Aurès

Procedia PDF Downloads 408
13643 Determining the Information Technologies Usage and Learning Preferences of Construction

Authors: Naci Büyükkaracığan, Yıldırım Akyol

Abstract:

Information technology is called the technology which provides transmission of information elsewhere regardless of time, location, distance. Today, information technology is providing the occurrence of ground breaking changes in all areas of our daily lives. Information can be reached quickly to millions of people with help of information technology. In this Study, effects of information technology on students for educations and their learning preferences were demonstrated with using data obtained from questionnaires administered to students of 2015-2016 academic year at Selcuk University Kadınhanı Faik İçil Vocational School Construction Department. The data was obtained by questionnaire consisting of 30 questions that was prepared by the researchers. SPSS 21.00 package programme was used for statistical analysis of data. Chi-square tests, Mann-Whitney U test, Kruskal-Wallis and Kolmogorov-Smirnov tests were used in the data analysis for Descriptiving statistics. In a study conducted with the participation of 61 students, 93.4% of students' reputation of their own information communication device (computer, smart phone, etc.) That have been shown to be at the same rate and to the internet. These are just a computer of itself, then 45.90% of the students. The main reasons for the students' use of the Internet, social networking sites are 85.24%, 13.11% following the news of the site, as seen. All student assignments in information technology, have stated that they use in the preparation of the project. When students acquire scientific knowledge in the profession regarding their preferred sources evaluated were seen exactly when their preferred internet. Male students showed that daily use of information technology while compared to female students was statistically significantly less. Construction Package program where students are eager to learn about the reputation of 72.13% and 91.80% identified in the well which they agreed that an indispensable element in the professional advancement of information technology.

Keywords: information technologies, computer, construction, internet, learning systems

Procedia PDF Downloads 284
13642 A New Framework for ECG Signal Modeling and Compression Based on Compressed Sensing Theory

Authors: Siavash Eftekharifar, Tohid Yousefi Rezaii, Mahdi Shamsi

Abstract:

The purpose of this paper is to exploit compressed sensing (CS) method in order to model and compress the electrocardiogram (ECG) signals at a high compression ratio. In order to obtain a sparse representation of the ECG signals, first a suitable basis matrix with Gaussian kernels, which are shown to nicely fit the ECG signals, is constructed. Then the sparse model is extracted by applying some optimization technique. Finally, the CS theory is utilized to obtain a compressed version of the sparse signal. Reconstruction of the ECG signal from the compressed version is also done to prove the reliability of the algorithm. At this stage, a greedy optimization technique is used to reconstruct the ECG signal and the Mean Square Error (MSE) is calculated to evaluate the precision of the proposed compression method.

Keywords: compressed sensing, ECG compression, Gaussian kernel, sparse representation

Procedia PDF Downloads 444
13641 Cognitive Semantics Study of Conceptual and Metonymical Expressions in Johnson's Speeches about COVID-19

Authors: Hussain Hameed Mayuuf

Abstract:

The study is an attempt to investigate the conceptual metonymies is used in political discourse about COVID-19. Thus, this study tries to analyze and investigate how the conceptual metonymies in Johnson's speech about coronavirus are constructed. This study aims at: Identifying how are metonymies relevant to understand the messages in Boris Johnson speeches and to find out how can conceptual blending theory help people to understand the messages in the political speech about COVID-19. Lastly, it tries to Point out the kinds of integration networks are common in political speech. The study is based on the hypotheses that conceptual blending theory is a powerful tool for investigating the intended messages in Johnson's speech and there are different processes of blending networks and conceptual mapping that enable the listeners to identify the messages in political speech. This study presents a qualitative and quantitative analysis of four speeches about COVID-19; they are said by Boris Johnson. The selected data have been tackled from the cognitive-semantic perspective by adopting Conceptual Blending Theory as a model for the analysis. It concludes that CBT is applicable to the analysis of metonymies in political discourse. Its mechanisms enable listeners to analyze and understand these speeches. Also the listener can identify and understand the hidden messages in Biden and Johnson's discourse about COVID-19 by using different conceptual networks. Finally, it is concluded that the double scope networks are the most common types of blending of metonymies in the political speech.

Keywords: cognitive, semantics, conceptual, metonymical, Covid-19

Procedia PDF Downloads 107
13640 Historical Geography of Lykaonia Region

Authors: Asuman Baldiran, Erdener Pehlivan

Abstract:

In this study, the root of the name Lykaonia and the geographical area defined as Lykaonia Region are mentioned. In this context, information concerning the settlements of Paleolithic Age, Neolithic Age and Chalcolithic Age are given place. Particularly the settlements belonging to Classical Age are localized and brief information about the history of these settlements is provided. In the light of this information, roads of Antique period in the region are evaluated.

Keywords: ancient cities, central anatolia, historical geography, Lykaonia region

Procedia PDF Downloads 366
13639 Computing Some Topological Descriptors of Single-Walled Carbon Nanotubes

Authors: Amir Bahrami

Abstract:

In the fields of chemical graph theory, molecular topology, and mathematical chemistry, a topological index or a descriptor index also known as a connectivity index is a type of a molecular descriptor that is calculated based on the molecular graph of a chemical compound. Topological indices are numerical parameters of a graph which characterize its topology and are usually graph invariant. Topological indices are used for example in the development of quantitative structure-activity relationships (QSARs) in which the biological activity or other properties of molecules are correlated with their chemical structure. In this paper some descriptor index (descriptor index) of single-walled carbon nanotubes, is determined.

Keywords: chemical graph theory, molecular topology, molecular descriptor, single-walled carbon nanotubes

Procedia PDF Downloads 314
13638 AI Peer Review Challenge: Standard Model of Physics vs 4D GEM EOS

Authors: David A. Harness

Abstract:

Natural evolution of ATP cognitive systems is to meet AI peer review standards. ATP process of axiom selection from Mizar to prove a conjecture would be further refined, as in all human and machine learning, by solving the real world problem of the proposed AI peer review challenge: Determine which conjecture forms the higher confidence level constructive proof between Standard Model of Physics SU(n) lattice gauge group operation vs. present non-standard 4D GEM EOS SU(n) lattice gauge group spatially extended operation in which the photon and electron are the first two trace angular momentum invariants of a gravitoelectromagnetic (GEM) energy momentum density tensor wavetrain integration spin-stress pressure-volume equation of state (EOS), initiated via 32 lines of Mathematica code. Resulting gravitoelectromagnetic spectrum ranges from compressive through rarefactive of the central cosmological constant vacuum energy density in units of pascals. Said self-adjoint group operation exclusively operates on the stress energy momentum tensor of the Einstein field equations, introducing quantization directly on the 4D spacetime level, essentially reformulating the Yang-Mills virtual superpositioned particle compounded lattice gauge groups quantization of the vacuum—into a single hyper-complex multi-valued GEM U(1) × SU(1,3) lattice gauge group Planck spacetime mesh quantization of the vacuum. Thus the Mizar corpus already contains all of the axioms required for relevant DeepMath premise selection and unambiguous formal natural language parsing in context deep learning.

Keywords: automated theorem proving, constructive quantum field theory, information theory, neural networks

Procedia PDF Downloads 158
13637 An Analysis of the Dominance of Migrants in the South African Spaza and Retail market: A Relationship-Based Network Perspective

Authors: Meron Okbandrias

Abstract:

The South African formal economy is rule-based economy, unlike most African and Asian markets. It has a highly developed financial market. In such a market, foreign migrants have dominated the small or spaza shops that service the poor. They are highly competitive and capture significant market share in South Africa. This paper analyses the factors that assisted the foreign migrants in having a competitive age. It does that by interviewing Somali, Bangladesh, and Ethiopian shop owners in Cape Town analysing the data through a narrative analysis. The paper also analyses the 2019 South African consumer report. The three migrant nationalities mentioned above dominate the spaza shop business and have significant distribution networks. The findings of the paper indicate that family, ethnic, and nationality based network, in that order of importance, form bases for a relationship-based business network that has trust as its mainstay. Therefore, this network ensures the pooling of resources and abiding by certain principles outside the South African rule-based system. The research identified practises like bulk buying within a community of traders, sharing information, buying from a within community distribution business, community based transportation system and providing seed capital for people from the community to start a business is all based on that relationship-based system. The consequences of not abiding by the rules of these networks are social and economic exclusion. In addition, these networks have their own commercial and social conflict resolution mechanisms aside from the South African justice system. Network theory and relationship based systems theory form the theoretical foundations of this paper.

Keywords: migrant, spaza shops, relationship-based system, South Africa

Procedia PDF Downloads 117
13636 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: private information, value, users, perceived risk, online information privacy, attributes

Procedia PDF Downloads 221
13635 Pro Grow Business Partnerships: Unlocking the Potential of SMEs Indonesia With Resource Advantage Theory of Competition Approach

Authors: Kesi Widjajanti

Abstract:

To develop the growth of small and medium enterprises (SMEs), it is important to unlock potential resources that can improve their performance. Business Partnerships (BP) are currently an interesting topic of strategy to use to expand markets and maximize financial and marketing performance. However, many business partnerships have not quite a role among small and medium companies in the creative industry in the Batik Craft sector in Indonesia. This study is rooted in the Resource Advantage Theory of Competition ( RAToC), which emphasizes that the advantage of company resources can be sourced from organizational and relational resources. With the basis of this theory, SMEs can optimize the allocation of relational resources and organizational goals, improve operational efficiency, and gain a strategic advantage in the market. Companies that are able to actualize organizational and relational resources better than other market players can be used for the process of increasing their superior performance. This study explores key elements from the RAToC perspective and shows how Business Partnerships have the potential to drive SMEs' growth. By aligning visions, and organizational resources, sharing knowledge and leveraging complementary relational resources, SMEs can increase their competitiveness, enter new markets, and achieve superior performance. The theoretical contribution of RAToC in small companies is due to the role of Pro-Grow Business Partnership strength as an important antecedent for improving SMEs' performance. The benefits (scenarios) of a Business Partnership to grow together are directed at optimizing resources that can create additional value for customers so that they can outperform competitors. Furthermore, managerial implications for SMEs who wish to unlock their resource potential can encourage the role of Pro-Grow Business Partnerships, which have specific characteristics, can absorb experience/knowledge capacity and utilize this knowledge for the development of "together" business ventures.

Keywords: pro grow business partnership, performance, SMEs, resources advantage theory of competition, industry kreatif batik handycraft indonesia

Procedia PDF Downloads 57
13634 A Survey on Protests Against Compulsory Hejab in Iran From Iranian Women’s Point of View After Mahsa Amini`S Death: A Grounded Theory Approach

Authors: Shirin Arefi

Abstract:

In Iran, women and girls are treated as second class citizens and suffer from many discrimination and inequality such as compulsory Hejab, a phenomena which has required all women to wear the hijab head-covering since the 1979 Islamic revolution. Now, the crackdown of new government has caused a massive uproar in the country. The morality police also continue to curb the choices of women, and the latest unfortunate incidents accelerate the hardened rules. The author is going to survey the views and of women against compulsory Hejab and morality and chastity police arrests. The methodology is a qualitative one in which narratives of them are coded based on grounded theory and horizons of the process is explained by phenomenological research as well. The findings and results will show the current attitudes of women of Hejab and their reactions against morality police behaviors.

Keywords: compulsory hejab, morality police, people, arrest

Procedia PDF Downloads 92
13633 Determinants of Corporate Social Responsibility in Indonesia

Authors: Bela Sulistyaguna, Yuli Chomsatu Samrotun, Endang Masitoh Wahyuningsih

Abstract:

The purpose of this research was to analyze the influence of company size, liquidity, profitability, leverage, company age, industry type, board of director, board of commissioner, audit committee and public ownership on the corporate social responsibility disclosure. The grand theories of this research are agency theory, stakeholders theory, and legitimacy theory. Analysis of data using multiple linear regression method with SPSS 22.0 for mac. The sample consists of companies listed on the Indonesia Stock Exchange (IDX) and disclosed the Global Reporting Initiative (GRI) sustainability reports from 2013 to 2018. The final sample of this research was 19 companies that obtained by purposive sampling. The results of the research showed that, simultaneously, company size, liquidity, profitability, leverage, company age, industry type, board of director, board of commissioner, audit committee and public ownership has an influence on the corporate social responsibility disclosure. Partially, the results showed that liquidity and leverage has an influence on the corporate social responsibility disclosure. Meanwhile, company size, profitability, company age, industry type, board of director, board of commissioner, audit committee and public ownership has no influence on corporate social responsibility disclosure.

Keywords: corporate social responsibility, CSR disclosure, Indonesia

Procedia PDF Downloads 134
13632 A Theoretical Framework on Using Social Stories with the Creative Arts for Individuals on the Autistic Spectrum

Authors: R. Bawazir, P. Jones

Abstract:

Social Stories are widely used to teach social and communication skills or concepts to individuals on the autistic spectrum. This paper presents a theoretical framework for using Social Stories in conjunction with the creative arts. The paper argues that Bandura’s social learning theory can be used to explain the mechanisms behind Social Stories and the way they influence changes in response, while Gardner’s multiple intelligences theory can be used simultaneously to demonstrate the role of the creative arts in learning. By using Social Stories with the creative arts for individuals on the autistic spectrum, the aim is to meet individual needs and help individuals with autism to develop in different areas of learning and communication.

Keywords: individuals on the autistic spectrum, social stories, the creative arts, theoretical framework

Procedia PDF Downloads 302
13631 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 281
13630 Methodology for Obtaining Static Alignment Model

Authors: Lely A. Luengas, Pedro R. Vizcaya, Giovanni Sánchez

Abstract:

In this paper, a methodology is presented to obtain the Static Alignment Model for any transtibial amputee person. The proposed methodology starts from experimental data collected on the Hospital Militar Central, Bogotá, Colombia. The effects of transtibial prosthesis malalignment on amputees were measured in terms of joint angles, center of pressure (COP) and weight distribution. Some statistical tools are used to obtain the model parameters. Mathematical predictive models of prosthetic alignment were created. The proposed models are validated in amputees and finding promising results for the prosthesis Static Alignment. Static alignment process is unique to each subject; nevertheless the proposed methodology can be used in each transtibial amputee.

Keywords: information theory, prediction model, prosthetic alignment, transtibial prosthesis

Procedia PDF Downloads 240
13629 Statistical Mechanical Approach in Modeling of Hybrid Solar Cells for Photovoltaic Applications

Authors: A. E. Kobryn

Abstract:

We present both descriptive and predictive modeling of structural properties of blends of PCBM or organic-inorganic hybrid perovskites of the type CH3NH3PbX3 (X=Cl, Br, I) with P3HT, P3BT or squaraine SQ2 dye sensitizer, including adsorption on TiO2 clusters having rutile (110) surface. In our study, we use a methodology that allows computing the microscopic structure of blends on the nanometer scale and getting insight on miscibility of its components at various thermodynamic conditions. The methodology is based on the integral equation theory of molecular liquids in the reference interaction site representation/model (RISM) and uses the universal force field. Input parameters for RISM, such as optimized molecular geometries and charge distribution of interaction sites, are derived with the use of the density functional theory methods. To compare the diffusivity of the PCBM in binary blends with P3HT and P3BT, respectively, the study is complemented with MD simulation. A very good agreement with experiment and the reports of alternative modeling or simulation is observed for PCBM in P3HT system. The performance of P3BT with perovskites, however, seems as expected. The calculated nanoscale morphologies of blends of P3HT, P3BT or SQ2 with perovskites, including adsorption on TiO2, are all new and serve as an instrument in rational design of organic/hybrid photovoltaics. They are used in collaboration with experts who actually make prototypes or devices for practical applications.

Keywords: multiscale theory and modeling, nanoscale morphology, organic-inorganic halide perovskites, three dimensional distribution

Procedia PDF Downloads 137
13628 The Use of Self-Determination Theory to Assess the Opportunities and Challenges for Blended E-Learning in Egypt: An Analysis of the Motivations of Logistics Lecturers

Authors: Aisha Tarek Noour, Nick Hubbard

Abstract:

Blended e-Learning (BL) is proving to be an effective pedagogical tool in many areas of business and management education, but there remains a number of barriers to overcome before its implementation. This paper seeks to analyse the views of lecturers towards BL according to Self-Determination Theory (SDT), and identifies the opportunities and challenges for using BL in Logistics Education in an Egyptian higher education establishment. SDT is approached from a different perspective and the relationship between intrinsic motivation (IM), extrinsic motivation (EM), and amotivation (AM) is analysed and related to the opportunities and challenges of the BL method. The case study methodology comprises of a series of interviews with lecturers employed at three Colleges of International Transport and Logistics (CITLs) at the Arab Academy for Science, Technology, Maritime and Transport (AAST&MT) in Egypt. A structured face-to-face interview was undertaken with 61 interviewees across all faculty positions: Deans, Associate Professors, Assistant Professor, Department Heads, Part-time instructors, Teaching Assistants, and Graduate Teaching Assistants. The findings were based on "content analysis" of the interview transcripts and use of the NVivo10 software program. The research contributes to the application of SDT within the field of BL through an analysis of the views of lecturers towards the opportunities and challenges that BL offers to logistics educators in Egypt.

Keywords: intrinsic motivation, extrinsic motivation, amotivation, autonomy, competence, relatedness, self-determination theory and blended e-learning

Procedia PDF Downloads 421
13627 The Potential Benefits of Multimedia Information Representation in Enhancing Students’ Critical Thinking and History Reasoning

Authors: Ang Ling Weay, Mona Masood

Abstract:

This paper discusses the potential benefits of an interactive multimedia information representation in enhancing students’ critical thinking aligned with history reasoning in learning history between Secondary School students in Malaysia. Two modes of multimedia information representation implemented which are chronological and thematic information representation. A qualitative study of an unstructured interview was conducted among two history teachers, one history education lecturer, two i-think expert and program trainers and five form 4 secondary school students. The interview was to elicit their opinions on the implementation of thinking maps and interactive multimedia information representation in history learning. The key elements of interactive multimedia (e.g. multiple media, user control, interactivity, and use of timelines and concept maps) were then considered to improve the learning process. Findings of the preliminary investigation reveal that the interactive multimedia information representations have the potential benefits to be implemented as instructional resource in enhancing students’ higher order thinking skills (HOTs). This paper concludes by giving suggestions for future work.

Keywords: multimedia information representation, critical thinking, history reasoning, chronological and thematic information representation

Procedia PDF Downloads 334