Search results for: behavioral insights
2443 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process
Authors: Itai Kohavi, Wojciech Nowiak
Abstract:
This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation
Procedia PDF Downloads 3052442 Synthesis of Metal Curcumin Complexes with Iron(III) and Manganese(II): The Effects on Alzheimer's Disease
Authors: Emel Yildiz, Nurcan Biçer, Fazilet Aksu, Arash Alizadeh Yegani
Abstract:
Plants provide the wealth of bioactive compounds, which exert a substantial strategy for the treatment of neurological disorders such as Alzheimer's disease. Recently, a lot of studies have explored the medicinal properties of curcumin, including antitumoral, antimicrobial, anti-inflammatory, antioxidant, antiviral, and anti-Alzheimer's disease effects. Metal complexes of curcumin (1,7-bis(4-hydroxy-3-methoxyphenyl)-1,6-heptadiene-3,5-dione) were synthesized with Mn(II) and Fe(III). The structures of synthesized metal complexes have been characterized by using spectroscopic and analytic methods such as elemental analysis, magnetic susceptibility, FT-IR, AAS, TG and argentometric titration. It was determined that the complexes have octahedral geometry. The effects of the metal complexes on the disorder of memory, which is an important symptom of Alzheimer's Disease were studied on lab rats with Plus-Maze Tests at Behavioral Pharmacology Laboratory.Keywords: curcumin, Mn(II), Fe(III), Alzheimer disease, beta amyloid 25-35
Procedia PDF Downloads 3012441 The Display of Environmental Information to Promote Energy Saving Practices: Evidence from a Massive Behavioral Platform
Authors: T. Lazzarini, M. Imbiki, P. E. Sutter, G. Borragan
Abstract:
While several strategies, such as the development of more efficient appliances, the financing of insulation programs or the rolling out of smart meters represent promising tools to reduce future energy consumption, their implementation relies on people’s decisions-actions. Likewise, engaging with consumers to reshape their behavior has shown to be another important way to reduce energy usage. For these reasons, integrating the human factor in the energy transition has become a major objective for researchers and policymakers. Digital education programs based on tangible and gamified user interfaces have become a new tool with potential effects to reduce energy consumption4. The B2020 program, developed by the firm “Économie d’Énergie SAS”, proposes a digital platform to encourage pro-environmental behavior change among employees and citizens. The platform integrates 160 eco-behaviors to help saving energy and water and reducing waste and CO2 emissions. A total of 13,146 citizens have used the tool so far to declare the range of eco-behaviors they adopt in their daily lives. The present work seeks to build on this database to identify the potential impact of adopted energy-saving behaviors (n=62) to reduce the use of energy in buildings. To this end, behaviors were classified into three categories regarding the nature of its implementation (Eco-habits: e.g., turning-off the light, Eco-actions: e.g., installing low carbon technology such as led light-bulbs and Home-Refurbishments: e.g., such as wall-insulation or double-glazed energy efficient windows). General Linear Models (GLM) disclosed the existence of a significantly higher frequency of Eco-habits when compared to the number of home-refurbishments realized by the platform users. While this might be explained in part by the high financial costs that are associated with home renovation works, it also contrasts with the up to three times larger energy-savings that can be accomplished by these means. Furthermore, multiple regression models failed to disclose the expected relationship between energy-savings and frequency of adopted eco behaviors, suggesting that energy-related practices are not necessarily driven by the correspondent energy-savings. Finally, our results also suggested that people adopting more Eco-habits and Eco-actions were more likely to engage in Home-Refurbishments. Altogether, these results fit well with a growing body of scientific research, showing that energy-related practices do not necessarily maximize utility, as postulated by traditional economic models, and suggest that other variables might be triggering them. Promoting home refurbishments could benefit from the adoption of complementary energy-saving habits and actions.Keywords: energy-saving behavior, human performance, behavioral change, energy efficiency
Procedia PDF Downloads 2012440 The influence of Personality Traits on Appearance Evaluation among Chinese Teenagers
Authors: Yichen Liu, Gexing Ding
Abstract:
Past research seeking to understand our ability to update social impressions in light of behavioral inconsistencies has shown that morality is more dominant in impression formation and updating than ability (e.g. friendly vs. efficient). In this study, we aim to test whether this pattern holds among the teenage population in an eastern society. Our findings revealed that competency and moral judgments go beyond impression formation in social cognition by influencing physical attractiveness evaluation. Moreover, our results confirmed that moral description has a leading role over the other basic dimensions of human social cognition (i.e., competency) in driving the impression formation process in an eastern society. However, competency information was generally perceived as more favorable than moral information, regardless of valence. Further investigation is needed to understand the mechanism of such effects.Keywords: impression formation, social cognition, moral judgment, cross-cultural
Procedia PDF Downloads 2162439 sing Eye Tracking to Measure the Impact of Persuasion Principles in Phishing Emails
Authors: Laura Bishop, Isabel Jones, Linn Halvorsen, Angela Smith
Abstract:
Phishing emails are a form of social engineering where attackers deceive email users into revealing sensitive information or installing malware such as ransomware. Scammers often use persuasion techniques to influence email users to interact with malicious content. This study will use eye-tracking equipment to analyze how participants respond to and process Cialdini’s persuasion principles when utilized within phishing emails. Eye tracking provides insights into what is happening on the subconscious level of the brain that the participant may not be aware of. An experiment is conducted to track participant eye movements, whilst interacting with and then filing a series of persuasive emails delivered at random. Eye tracking metrics will be analyzed in relation to whether a malicious email has been identified as phishing (filed as ‘suspicious’) or not phishing (filed in any other folder). This will help determine the most influential persuasion techniques and those 'areas of interest' within an email that require intervention. The results will aid further research on how to reduce the effects of persuasion on human decision-making when interacting with phishing emails.Keywords: cybersecurity, human-centric, phishing, psychology
Procedia PDF Downloads 852438 Nudging the Criminal Justice System into Listening to Crime Victims in Plea Agreements
Authors: Dana Pugach, Michal Tamir
Abstract:
Most criminal cases end with a plea agreement, an issue whose many aspects have been discussed extensively in legal literature. One important feature, however, has gained little notice, and that is crime victims’ place in plea agreements following the federal Crime Victims Rights Act of 2004. This law has provided victims some meaningful and potentially revolutionary rights, including the right to be heard in the proceeding and a right to appeal against a decision made while ignoring the victim’s rights. While victims’ rights literature has always emphasized the importance of such right, references to this provision in the general literature about plea agreements are sparse, if existing at all. Furthermore, there are a few cases only mentioning this right. This article purports to bridge between these two bodies of legal thinking – the vast literature concerning plea agreements and victims’ rights research– by using behavioral economics. The article will, firstly, trace the possible structural reasons for the failure of this right to be materialized. Relevant incentives of all actors involved will be identified as well as their inherent consequential processes that lead to the victims’ rights malfunction. Secondly, the article will use nudge theory in order to suggest solutions that will enhance incentives for the repeat players in the system (prosecution, judges, defense attorneys) and lead to the strengthening of weaker group’s interests – the crime victims. Behavioral psychology literature recognizes that the framework in which an individual confronts a decision can significantly influence his decision. Richard Thaler and Cass Sunstein developed the idea of ‘choice architecture’ - ‘the context in which people make decisions’ - which can be manipulated to make particular decisions more likely. Choice architectures can be changed by adjusting ‘nudges,’ influential factors that help shape human behavior, without negating their free choice. The nudges require decision makers to make choices instead of providing a familiar default option. In accordance with this theory, we suggest a rule, whereby a judge should inquire the victim’s view prior to accepting the plea. This suggestion leaves the judge’s discretion intact; while at the same time nudges her not to go directly to the default decision, i.e. automatically accepting the plea. Creating nudges that force actors to make choices is particularly significant when an actor intends to deviate from routine behaviors but experiences significant time constraints, as in the case of judges and plea bargains. The article finally recognizes some far reaching possible results of the suggestion. These include meaningful changes to the earlier stages of criminal process even before reaching court, in line with the current criticism of the plea agreements machinery.Keywords: plea agreements, victims' rights, nudge theory, criminal justice
Procedia PDF Downloads 3232437 An Experimental Study on Some Conventional and Hybrid Models of Fuzzy Clustering
Authors: Jeugert Kujtila, Kristi Hoxhalli, Ramazan Dalipi, Erjon Cota, Ardit Murati, Erind Bedalli
Abstract:
Clustering is a versatile instrument in the analysis of collections of data providing insights of the underlying structures of the dataset and enhancing the modeling capabilities. The fuzzy approach to the clustering problem increases the flexibility involving the concept of partial memberships (some value in the continuous interval [0, 1]) of the instances in the clusters. Several fuzzy clustering algorithms have been devised like FCM, Gustafson-Kessel, Gath-Geva, kernel-based FCM, PCM etc. Each of these algorithms has its own advantages and drawbacks, so none of these algorithms would be able to perform superiorly in all datasets. In this paper we will experimentally compare FCM, GK, GG algorithm and a hybrid two-stage fuzzy clustering model combining the FCM and Gath-Geva algorithms. Firstly we will theoretically dis-cuss the advantages and drawbacks for each of these algorithms and we will describe the hybrid clustering model exploiting the advantages and diminishing the drawbacks of each algorithm. Secondly we will experimentally compare the accuracy of the hybrid model by applying it on several benchmark and synthetic datasets.Keywords: fuzzy clustering, fuzzy c-means algorithm (FCM), Gustafson-Kessel algorithm, hybrid clustering model
Procedia PDF Downloads 5152436 Strategies of Spatial Optimization for Open Space in the Old-Age Friendly City: An Investigation of the Behavior of the Elderly in Xicheng Square in Hangzhou
Authors: Yunxiang Fang
Abstract:
With the aging trend continuing to accelerate, open space is important for the daily life of the elderly, and its old-age friendliness is worthy of attention. Based on behavioral observation and literature research, this paper studies the behavior of the elderly in urban open space. Through the investigation, classification and quantitative analysis of the activity types, time characteristics and spatial behavior order of the elderly in Xicheng Square in Hangzhou, it summarizes the square space suitable for the psychological needs, physiology and activity needs of the elderly, combined with the basis of literature research. Finally, the suggestions for the improvement of the old-age friendship of Xicheng Square are put forward, from the aspects of microclimate, safety and accessibility, space richness and service facility quality.Keywords: behavior characteristics, old-age friendliness, open space, square
Procedia PDF Downloads 1692435 Some Observations on the Analysis of Four Performances of the Allemande from J.S. Bach's Partita for Solo Flute (BWV 1013) in Terms of Zipf's Law
Authors: Douglas W. Scott
Abstract:
The Allemande from J. S. Bach's Partita for solo flute (BWV 1013) presents many unique challenges for any flautist, especially in terms of segmentation analysis required to select breathing places in the first half. Without claiming to identify a 'correct' solution to this problem, this paper analyzes the section in terms of a set of techniques based around a statistical property commonly (if not ubiquitously) found in music, namely Zipf’s law. Specifically, the paper considers violations of this expected profile at various levels of analysis, an approach which has yielded interesting insights in previous studies. The investigation is then grounded by considering four actual solutions to the problem found in recordings made by different flautists, which opens up the possibility of expanding Zipfian analysis to include a consideration of inter-onset-intervals (IOIs). It is found that significant deviations from the expected Zipfian distributions can reveal and highlight stylistic choices made by different performers.Keywords: inter-onset-interval, Partita for solo flute, BWV 1013, segmentation analysis, Zipf’s law
Procedia PDF Downloads 1842434 Examining Criminology via Diverse Philosophical Paradigms: Considering the Nomological-Deductive Model of Science versus the Humanistic Tradition
Authors: William R. Crawley
Abstract:
The current paper provides an examination of the primary conceptual and historical foundations leading to contemporary perspectives in criminological theory. This subject area involves the examination of theory that is vast and highly interdisciplinary but must, at its core, consider several postulates. The following areas of consideration will be the focus of this examination: presentation of various definitions of criminology as a discipline and attention to a dialogue which inquires as to whether criminological modes of explanation can be regarded as scientific with respect to focus, methods, and findings – e.g., conceptualization, operationalization, measurement strategies, analytical techniques, etc. Specifically, two opposing philosophical frameworks—naturalistic and anti-naturalistic philosophy—are examined by means of conceptual analysis for their necessary and sufficient conditions. Like all academic disciplines, for practitioners and students of criminology to understand and effectively use insights and discoveries, it is imperative that disciplinary axioms and methodologies are critically scrutinized. This paper provides a primer to this critique.Keywords: anti-naturalistic philosophy, humanistic tradition, is criminology a science, naturalistic philosophy, nomological-deductive model
Procedia PDF Downloads 692433 Inclusive Business Development: A Case Study of Developing Community-Operated Business Venture
Authors: Paula Linna
Abstract:
During the recent years interest in inclusive business has increased. Still, research on inclusive business development is at infancy. This study provides empirical evidence on inclusive business development of mini-grid solution for the rural African communities. This study tests how well the insights of creation theory can explain inclusive business development process which often occurs under uncertainty due to demands for developing new technology, new business model and establishing business in new market. These several uncertain elements of business development impact what kind of business strategies the entrepreneur can practice and what kind of decision making tools to use. In addition, community engagement is essential for the successful operative management of a mini-grid solution. This study advances the understanding of inclusive business development and can be used as the foundation for future work to facilitate the process of new business venture creation at the BOP particularly when developing community-operated entrepreneurship model.Keywords: creation theory, base of the pyramid (BOP), community-operated entrepreneurship, rural African communities
Procedia PDF Downloads 5032432 The Impact of Political Polarization on the COVID-19 Vaccine Hesitancy in the United States: A Qualitative Study
Authors: Peiran Ma
Abstract:
This study explored the role of political polarization in an individual's decision of receiving the COVID-19 vaccine. A total of 15 participants participated in individual interviews and focus group discussions about the relationships among domestic political polarization, vaccine hesitancy, and behavioral responses to the COVID-19 pandemic. Political affiliation affected an individual’s decision on the COVID-19 vaccination, such that people who identified as Liberals and Democrats were more accepting of the vaccine. On the other hand, the level of influence declined over time (2020-2022) when the general conception of COVID-19 immunization shifted from political to personal. Results provided qualitative support to the previously identified positive relationship between divided political opinions and COVID-19 vaccine hesitancy and highlighted the decreasing trend in the power of political polarization in vaccination and the existence of other factors.Keywords: COVID-19, vaccine hesitancy, political polarization, partisanship, ideology
Procedia PDF Downloads 862431 Solanum tuberosum Ammonium Transporter Gene: Some Bioinformatics Insights
Authors: A. T. Adetunji, F. B. Lewu, R. Mundembe
Abstract:
Plants require nitrogen (N) to support desired production levels. Nitrogen is available to plants in the form of nitrate or ammonium, which are transported into the cell with the aid of various transport proteins. Ammonium transporters (AMTs) play a role in the uptake of ammonium, the form in which nitrogen is preferentially absorbed by plants. Solanum tuberosum AMT1 (StAMT1) was characterized using molecular biology and bioinformatics methods. Nucleotide database sequences were used to design AMT1-specific primers which were used to amplify the AMT1 internal regions. Nucleotide sequencing, alignment and phylogenetic analysis assigned StAMT1 to the AMT1 family. The deduced amino acid sequences showed that StAMT1 is 92%, 83% and 76% similar to Solanum lycopersicum LeAMT1.1, Lotus japonicus LjAMT1.1 and Solanum lycopersicum LeAMT1.2 respectively. StAMT1 fragments were shown to correspond to the 5th - 10th trans-membrane domains. Residue StAMT1 D15 is predicted to be essential for ammonium transport, while mutations of StAMT1 S76A may further enhance ammonium transport.Keywords: ammonium transporter, bioinformatics, nitrogen, primers, Solanum tuberosum
Procedia PDF Downloads 2502430 Liturgical Elements and Symbolism of Light in Christian Sacred Space
Authors: Zorana Sokol Gojnik, Igor Gojnik, Marina Simunic Bursic
Abstract:
The light is one of the major themes of theology of sacred space. Christian theology, but also architecture in its complexity, is permeated by the symbolism of light from its beginning. The aim of this paper is to deeply analyse the symbolism of light in every single element of contemporary Christian sacred space such as altar, ambo, baptistery, tabernacle, confessionals, stations of the cross, etc. The research will be carried out using the methodology of research of literature and comparatively observation of contemporary examples of sacred architecture. The research will use the insights of analyzed literature and examples of sacred architecture in order to describe the background of the problem as well as to complement the received results with the reliable scientific findings. The paper will highlight the importance of symbolic and theological points of view in contemporary church design using the light as a building part of every single part of sacred architecture as there is an insight that, in contemporary sacred architecture, there is a lack of understanding of symbolic and theological aspect of light while designing new sacred spaces.Keywords: architecture, liturgy, sacred architecture, theology of space
Procedia PDF Downloads 1912429 Grammatical Parallelism in the Qurʼān
Authors: Yehudit Dror
Abstract:
Parallelism¬, or as it is called in Arabic, al-muqābala, occupies a central position in the rhetorical discipline of ʻilm al-bayān. Parallelism is used as a figure of textual ornamentation or embellishment and can be divided into several types that are based on the semantics of parallelism and its formative structure. Parallelism in Arabic has received a considerable amount of attention from the Arab rhetorician, which enables understanding the essence of parallelism in Arabic – its types, structure and meaning. However, there are some lacunae in their descriptions concerning the function and thematic restrictions of parallelism in the Qur’ān. In my presentation, which focuses on grammatical parallelism where the two stichos of the parallelism are the same with respect to syntax and morphology, I will show that parallelism has some important roles in the textual arrangement; it may, for example, conclude a thematic section, indicate a turning point in the text or to clarify what has been said previously. In addition, it will be shown that parallelism is not used randomly in the Qurʼān but rather is restricted to repeated themes which carry the most important messages of the Qurʼān, such as God's Might or behavioral patterns of the believers and the non-believers; or it can be used as a stylistic device.Keywords: grammatical parallelism, half-line, symmetry, Koran
Procedia PDF Downloads 3352428 Recovering Cultural Heritage: Historical Insights into Ethiopia’s Unique Approach and Present Challenges
Authors: Mengistie Zewdu
Abstract:
Ethiopia is an un-colonized African state with rich cultural and natural heritage resources. Due to different reasons, Ethiopia has various cultural heritage resources residing in different countries. Started in the second half of the 19th century, different Ethiopian regimes have been working to recover the country’s cultural heritage treasures. Thus, the purpose of this article is to explore the endeavours that have been exerted to recover the cultural heritage of Ethiopia to their original place. As this article reveals, differed from other African countries’ endeavour for the restitution of their looted cultural treasures, Ethiopia’s approach to recover its cultural heritage is somewhat unique. This paper also argues that, although Ethiopia has been working for a century and a half to restitute its cultural heritages, the endeavours of Ethiopian governments to recover Ethiopia’s priceless cultural heritage have still been minimal. The efforts to recover Ethiopian cultural heritage have shown progress with increasing magnitude. However, large-scale endeavors are still needed to bring back the priceless cultural heritage resources to their country of origin.Keywords: Ethiopia, cultural heritage, plundered heritage, recovering cultural heritage, endeavor to recover cultural heritage
Procedia PDF Downloads 832427 Hydration Behavior of Belitic Cement in the Presence of Na₂CO₃, NaOH, KOH, and Water Glass
Authors: F. Amor, A. Bouregba, N. El Fami, A. Diouri
Abstract:
This study provides insights into the role of alkalis in modifying the hydration kinetics and microstructural development of β-dicalcium silicate, highlighting potential pathways for enhancing the performance of belite-based cements in various construction applications. It investigates the behavior of β-dicalcium silicates (β-Ca₂SiO₄) when hydrated in various alkaline environments, including deionized water and solutions containing 2M concentrations of Na₂CO₃, NaOH, KOH, and water glass. The dicalcium silicate was synthesized with laboratory reagents, calcium carbonate, and gel silica. The hydration process was carried out over different periods, ranging from 7 to 90 days. The hydrated samples were characterized using X-ray diffraction, infrared spectroscopy, and scanning electron microscopy, while the mechanical strength tests were performed at 28 and 90 days. The results indicate that the presence of alkalis significantly influences the hydration of belite cement. Early hydration is accelerated, which is evident from the faster dissolution of C₂S, a decrease in C₂S peaks, and the formation of C-S-H products, including sodium-containing C-(N)-S-H and potassium-containing C-(K)-S-H.Keywords: dicalcium silicate, alkali activator, hydration, water glass, Na₂CO₃, NaOH, KOH
Procedia PDF Downloads 172426 The Determinants of Voluntary Disclosure in Croatia
Authors: Zeljana Aljinovic Barac, Marina Granic, Tina Vuko
Abstract:
Study investigates the level and extent of voluntary disclosure practice in Croatia. The research was conducted on the sample of 130 medium and large companies. Findings indicate that two thirds of the companies analysed disclose below-average number of additional information. The explanatory analyses has shown that firm size, listing status and industrial sector significantly and positively affect the level and extent of voluntary disclosure in the annual report of Croatian companies. On the other hand, profitability and ownership structure were found statistically insignificant. Unlike previous studies, this paper deals with level of voluntary disclosure of medium and large companies, as well as companies whose shares are not listed on the organized capital market, which can be found as our contribution. Also, the research makes contribution by providing the insights into voluntary disclosure practices in Croatia, as a case of macro-oriented accounting system economy, i.e. bank oriented economy with an emerging capital market.Keywords: annual report, Croatian companies, disclosure index, voluntary disclosure
Procedia PDF Downloads 3302425 Exploring the Gap between Coverage, Access, Utilization of Long Lasting Insecticidal Nets (LLINs) among the People of Malaria Endemic Districts in Bangladesh
Authors: Fouzia Khanam, Tridib Chowdhury, Belal Hossain, Sajedur Rahman, Mahfuzar Rahman
Abstract:
Introduction: Over the last decades, the world has achieved a noticeable success in preventing malaria. Nevertheless, malaria, a vector-borne infectious disease, remains a major public health burden globally as well as in Bangladesh. To achieve the goal of eliminating malaria, BRAC, a leading organization of Bangladesh in collaboration with government, is distributing free LLIN to the 13 endemic districts of the country. The study was conducted with the aim of assessing the gap between coverage, access, and utilization of LLIN among the people of the 13 malaria endemic districts of Bangladesh. Methods: This baseline study employed a community cross-sectional design triangulated with qualitative methods to measure households’ ownership, access and use of 13 endemic districts. A multistage cluster random sampling was employed for the quantitative part and for qualitative part a purposive sampling strategy was done. Thus present analysis included 2640 households encompassing a total of 14475 populations. Data were collected using a pre-tested structured questionnaire through one on one face-to-face interview with respondents. All analyses were performed using STATA (Version 13.0). For the qualitative part participant observation, in-depth interview, focus group discussion, key informant interview and informal interview was done to gather the contextual data. Findings: According to our study, 99.8% of households possessed at least one-bed net in both study areas. 77.4% households possessed at least two LLIN and 43.2% households had access to LLIN for all the members. So the gap between coverage and access is 34%. 91.8% people in the 13 districts and 95.1% in Chittagong Hill Tracts areas reported having had slept under a bed net the night before interviewed. And despite the relatively low access, in 77.8% of households, all the members were used the LLIN the previous night. This higher utilization compared to access might be due to the increased awareness among the community people regarding LLIN uses. However, among those people with sufficient access to LLIN, 6% of them still did not use the LLIN which reflects the behavioral failure that needs to be addressed. The major reasons for not using LLIN, identified by both qualitative and quantitative findings, were insufficient access, sleeping or living outside the home, migration, perceived low efficacy of LLIN, fear of physical side effects or feeling uncomfortable. Conclusion: Given that LLIN access and use was a bit short of the targets, it conveys important messages to the malaria control program. Targeting specific population segments and groups for achieving expected LLIN coverage is very crucial. And also, addressing behavior failure by well-designed behavioral change interventions is mandatory.Keywords: long lasting insecticide net, malaria, malaria control programme, World Health Organisation
Procedia PDF Downloads 1922424 Michel Foucault’s Docile Bodies and The Matrix Trilogy: A Close Reading Applied to the Human Pods and Growing Fields in the Films
Authors: Julian Iliev
Abstract:
The recent release of The Matrix Resurrections persuaded many film scholars that The Matrix trilogy had lost its appeal and its concepts were largely outdated. This study examines the human pods and growing fields in the trilogy. Their functionality is compared to Michel Foucault’s concept of docile bodies: linking fictional and contemporary worlds. This paradigm is scrutinized through surveillance literature. The analogy brings to light common elements of hidden surveillance practices in technologies. The comparison illustrates the effects of body manipulation portrayed in the movies and their relevance with contemporary surveillance practices. Many scholars have utilized a close reading methodology in film studies (J.Bizzocchi, J.Tanenbaum, P.Larsen, S. Herbrechter, and Deacon et al.). The use of a particular lens through which media text is examined is an indispensable factor that needs to be incorporated into the methodology. The study spotlights both scenes from the trilogy depicting the human pods and growing fields. The functionality of the pods and the fields compare directly with Foucault’s concept of docile bodies. By utilizing Foucault’s study as a lens, the research will unearth hidden components and insights into the films. Foucault recognizes three disciplines that produce docile bodies: 1) manipulation and the interchangeability of individual bodies, 2) elimination of unnecessary movements and management of time, and 3) command system guaranteeing constant supervision and continuity protection. These disciplines can be found in the pods and growing fields. Each body occupies a single pod aiding easier manipulation and fast interchangeability. The movement of the bodies in the pods is reduced to the absolute minimum. Thus, the body is transformed into the ultimate object of control – minimum movement correlates to maximum energy generation. Supervision is exercised by wiring the body with numerous types of cables. This ultimate supervision of body activity reduces the body’s purpose to mere functioning. If a body does not function as an energy source, then it’s unplugged, ejected, and liquefied. The command system secures the constant supervision and continuity of the process. To Foucault, the disciplines are distinctly different from slavery because they stop short of a total takeover of the bodies. This is a clear difference from the slave system implemented in the films. Even though their system might lack sophistication, it makes up for it in the elevation of functionality. Further, surveillance literature illustrates the connection between the generation of body energy in The Matrix trilogy to the generation of individual data in contemporary society. This study found that the three disciplines producing docile bodies were present in the portrayal of the pods and fields in The Matrix trilogy. The above comparison combined with surveillance literature yields insights into analogous processes and contemporary surveillance practices. Thus, the constant generation of energy in The Matrix trilogy can be equated to the consistent data generation in contemporary society. This essay shows the relevance of the body manipulation concept in the Matrix films with contemporary surveillance practices.Keywords: docile bodies, film trilogies, matrix movies, michel foucault, privacy loss, surveillance
Procedia PDF Downloads 932423 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability
Procedia PDF Downloads 1072422 Big Data-Driven Smart Policing: Big Data-Based Patrol Car Dispatching in Abu Dhabi, UAE
Authors: Oualid Walid Ben Ali
Abstract:
Big Data has become one of the buzzwords today. The recent explosion of digital data has led the organization, either private or public, to a new era towards a more efficient decision making. At some point, business decided to use that concept in order to learn what make their clients tick with phrases like ‘sales funnel’ analysis, ‘actionable insights’, and ‘positive business impact’. So, it stands to reason that Big Data was viewed through green (read: money) colored lenses. Somewhere along the line, however someone realized that collecting and processing data doesn’t have to be for business purpose only, but also could be used for other purposes to assist law enforcement or to improve policing or in road safety. This paper presents briefly, how Big Data have been used in the fields of policing order to improve the decision making process in the daily operation of the police. As example, we present a big-data driven system which is sued to accurately dispatch the patrol cars in a geographic environment. The system is also used to allocate, in real-time, the nearest patrol car to the location of an incident. This system has been implemented and applied in the Emirate of Abu Dhabi in the UAE.Keywords: big data, big data analytics, patrol car allocation, dispatching, GIS, intelligent, Abu Dhabi, police, UAE
Procedia PDF Downloads 4912421 Contemporary Paradoxical Expectations of the Nursing Profession and Revisiting the ‘Nurses’ Disciplinary Boundaries: India’s Historical and Gendered Perspective
Authors: Neha Adsul, Rohit Shah
Abstract:
Background: The global history of nursing is exclusively a history of deep contradictions as it seeks to negotiate inclusion in an already gendered world. Although a powerful 'clinical gaze exists, nurses have toiled to re-negotiate and subvert the 'medical gaze' by practicing the 'therapeutic gaze' to tether back 'care into nursing practice.' This helps address the duality of the 'body' and 'mind' wherein the patient is not just limited to being an object of medical inquiry. Nevertheless, there has been a consistent effort to fit 'nursing' into being an art or an emerging science over the years. Especially with advances in hospital-based techno-centric medical practices, the boundaries between technology and nursing practices are becoming more blurred as the technical process becomes synonymous with nursing, eroding the essence of nursing care. Aim: This paper examines the history of nursing and offers insights into how gendered relations and the ideological belief of 'nursing as gendered work' have propagated to the subjugation of the nursing profession. It further aims to provide insights into the patriarchally imbibed techno-centrism that negates the gendered caregiving which lies at the crux of a nurse's work. Method: A literature search was carried out using Google Scholar, Web of Science and PubMed databases. Search words included: technology and nursing, medical technology and nursing, history of nursing, sociology and nursing and nursing care. The history of nursing is presented in a discussion that weaves together the historical events of the 'Birth of the Clinic' and the shift from 'bed-side medicine' to 'hospital-based medicine' that legitimizes exploitation of the bodies of patients to the 'medical gaze while the emergence of nursing as acquiescent to instrumental, technical, positivist and dominant views of medicine. The resultant power asymmetries, wherein in contemporary nursing, the constant struggle of nurses to juggle between being the physicians "operational right arm" to harboring that subjective understanding of the patients to refrain from de-humanizing nursing-care. Findings: The nursing profession suffers from being rendered invisible due to gendered relations having patrifocal societal roots. This perpetuates a notion rooted in the idea that emphasizes empiricism and has resulted in theoretical and epistemological fragmentation of the understanding of body and mind as separate entities. Nurses operate within this structure while constantly being at the brink of being pushed beyond the legitimate professional boundaries while being labeled as being 'unscientific' as the work does not always corroborate and align with the existing dominant positivist lines of inquiries. Conclusion: When understood in this broader context of how nursing as a practice has evolved over the years, it provides a particularly crucial testbed for understanding contemporary gender relations. Not because nurses like to live in a gendered work trap but because the gendered relations at work are written in a covert narcissistic patriarchal milieu that fails to recognize the value of intangible yet utmost necessary 'caring work in nursing. This research urges and calls for preserving and revering the humane aspect of nursing care alongside the emerging tech-savvy expectations from nursing work.Keywords: nursing history, technocentric, power relations, scientific duality
Procedia PDF Downloads 1462420 Leveraging Digital Cyber Technology for Self-Care and Improved Management of DMPA-SC Clients
Authors: Oluwaseun Adeleke, Grace Amarachi Omenife, Jennifer Adebambo, Mopelola Raji, Anthony Nwala, Mogbonjubade Adesulure
Abstract:
Introduction: The incorporation of digital technology in healthcare systems is instrumental in transforming the delivery, management, and overall experience of healthcare and holds the potential to scale up access through over 200 million active mobile phones used in Nigeria. Digital tools enable increased access to care, stronger client engagement, progress in research and data-driven insights, and more effective promotion of self-care and do-it-yourself practices. The Delivering Innovation in Self-Care (DISC) project 2021 has played a pivotal role in granting women greater autonomy over their sexual and reproductive health (SRH) through a variety of approaches, including information and training to self-inject contraception (DMPA-SC). To optimize its outcomes, the project also leverages digital technology platforms like social media: Facebook, Instagram, and Meet Tina (Chatbot) via WhatsApp, Customer Relationship Management (CRM) applications Freshworks, and Viamo. Methodology: The project has been successful at optimizing in-person digital cyberspace interaction to sensitize individuals effectively about self-injection and provide linkages to SI services. This platform employs the Freshworks CRM software application, along with specially trained personnel known as Cyber IPC Agents and DHIS calling centers. Integration of Freshworks CRM software with social media allows a direct connection with clients to address emerging issues, schedule follow-ups, send reminders to improve compliance with self-injection schedules, enhance the overall user experience for self-injection (SI) clients, and generate comprehensive reports and analytics on client interactions. Interaction covers a range of topics, including – How to use SI, learning more about SI, side-effects and its management, accessing services, fertility, ovulation, other family planning methods, inquiries related to Sexual Reproductive Health as well as uses an address log to connect them with nearby facilities or online pharmaceuticals. Results: Between the months of March to September, a total of 5,403 engagements were recorded. Among these, 4,685 were satisfactorily resolved. Since the program's inception, digital advertising has created 233,633,075 impressions, reached 12,715,582 persons, and resulted in 3,394,048 clicks. Conclusion: Leveraging digital technology has proven to be an invaluable tool in client management and improving client experience. The use of Cyber technology has enabled the successful development and maintenance of client relationships, which have been effective at providing support, facilitating delivery and compliance with DMPA-SC self-injection services, and ensuring overall client satisfaction. Concurrently, providing qualitative data, including user experience feedback, has enabled the derivation of crucial insights that inform the decision-making process and guide in normalizing self-care behavior.Keywords: selfcare, DMPA-SC self-injection, digital technology, cyber technology, freshworks CRM software
Procedia PDF Downloads 672419 Mechanical Properties of ECAP-Biomedical Titanium Materials: A Review
Authors: Mohsin Talib Mohammed, Zahid A. Khan, Arshad N. Siddiquee
Abstract:
The wide use of titanium (Ti) materials in medicine gives impetus to a search for development new techniques with elevated properties such as strength, corrosion resistance and Young's modulus close to that of bone tissue. This article presents the most recent state of the art on the use of equal channel angular pressing (ECAP) technique in evolving mechanical characteristics of the ultrafine-grained bio-grade Ti materials. Over past few decades, research activities in this area have grown enormously and have produced interesting results, including achieving the combination of conflicting properties that are desirable for biomedical applications by severe plastic deformation (SPD) processing. A comprehensive review of the most recent work in this area is systematically presented. The challenges in processing ultrafine-grained Ti materials are identified and discussed. An overview of the biomedical Ti alloys processed with ECAP technique is given in this review, along with a summary of their effect on the important mechanical properties that can be achieved by SPD processing. The paper also offers insights in the mechanisms underlying SPD.Keywords: mechanical properties, ECAP, titanium, biomedical applications
Procedia PDF Downloads 4522418 Neurodiversity in Post Graduate Medical Education: A Rapid Solution to Faculty Development
Authors: Sana Fatima, Paul Sadler, Jon Cooper, David Mendel, Ayesha Jameel
Abstract:
Background: Neurodiversity refers to intrinsic differences between human minds and encompasses dyspraxia, dyslexia, attention deficit hyperactivity disorder, dyscalculia, autism spectrum disorder, and Tourette syndrome. There is increasing recognition of neurodiversity in relation to disability/diversity in medical education and the associated impact on training, career progression, and personal and professional wellbeing. In addition, documented and anecdotal evidence suggests that medical educators and training providers in all four nations (UK) are increasingly concerned about understanding neurodiversity and identifying and providing support for neurodivergent trainees. Summary of Work: A national Neurodiversity Task and Finish group were established to survey Health Education England local office Professional Support teams about insights into infrastructure, training for educators, triggers for assessment, resources, and intervention protocols. This group drew from educational leadership, professional and personal neurodiverse expertise, occupational medicine, employer human resource, and trainees. An online, exploratory survey was conducted to gather insights from supervisors and trainers across England using the Professional Support Units' platform. Summary of Results: This survey highlighted marked heterogeneity in the identification, assessment, and approaches to support and management of neurodivergent trainees and highlighted a 'deficit' approach to neurodiversity. It also demonstrated a paucity of educational and protocol resources for educators and supervisors in supporting neurodivergent trainees. Discussions and Conclusions: In phase one, we focused on faculty development. An educational repository for all supervising trainees using a thematic approach was formalised. This was guided by our survey findings specific for neurodiversity and took a triple 'A' approach: awareness, assessment, and action. This is further supported by video material incorporating stories in training as well as mobile workshops for trainers for more immersive learning. The subtle theme from both the survey and Task and finish group suggested a move away from deficit-focused methods toward a positive holistic, interdisciplinary approach within a biopsychosocial framework. Contributions: 1. Faculty Knowledge and basic understanding of neurodiversity are key to supporting trainees with known or underlying Neurodiverse conditions. This is further complicated by challenges around non-disclosure, varied presentations, stigma, and intersectionality. 2. There is national (and international) inconsistency in the approach to how trainees are managed once a neurodiverse condition is suspected or diagnosed. 3. A carefully constituted and focussed Task and Finish group can rapidly identify national inconsistencies in neurodiversity and implement rapid educational interventions. 4. Nuanced findings from surveys and discussion can reframe the approach to neurodiversity; from a medical model to a more comprehensive, asset-based, biopsychosocial model of support, fostering a cultural shift, accepting 'diversity' in all its manifestations, visible and hidden.Keywords: neurodiversity, professional support, human considerations, workplace wellbeing
Procedia PDF Downloads 912417 A Study on the Overall Enhancement Strategy of Mountainous Urban Stairway Space Based on Environmental Behavioral Science: Taking the Shibati as an Example
Authors: Hao Fu
Abstract:
Mountain city stairway space is a unique spatial form of mountainous cities represented by Chongqing,this form of space is caused by the topography of high and low in the city, people mainly regarded it as a transportation space initially, but with the progress of the society and the rapid development of the city, people's demand for space is more composite, and at the same time, the function of the mountain city stairway space is also constantly transforming and integrating to become more comprehensive and diversified. The Shibati(eighteen stairs in Chinese) located in Chongqing Yuzhong Peninsula is one of the typical representatives. As a typical stairway space in Chongqing, the Shibati has precious historical significance and cultural value. Due to the change of time, the Shibati has gone through several repairs and renovations, and due to the dilapidated houses and inconvenient transportation, more than 90% of the original inhabitants have long been relocated, and the vast majority of the original buildings have been bulldozed and demolished, leaving only a few historical buildings. In 2021, a Beijing-based design company completed the renovation of the core buildings of the Shibati in Chongqing, and a large number of various kinds of catering and entertainment businesses have been introduced into the building, which has become a representative staircase space of the central part of the Chongqing district. Through the field research, the author personally experienced and perceived the spatial vitality of the Shibati, marveled at the rich commercial atmosphere, but still found many problems, such as the lack of traditional memories of the Shibati caused by the large-scale demolition and construction, the internal commercial space and form of the stairway space is “Netflix”-like and uniform, the lack of regional characteristics, the incomplete spatial sequence, insufficient open space, etc. The author also found that the space of the stairway space is very similar to the traditional space of the Shibati, and that there is a lack of traditional commercial spaces. The space sequence is incomplete, and the open space is insufficient. Based on this kind of phenomenon, the author carries out research and discussion in this paper, through the technical route of “raising problems → analyzing problems → solving problems”, collating existing theoretical information, combining the results of field research, and finally arriving at a series of measures for the inheritance of spatial memories and spatial vitality enhancement of eighteen ladders, and hoping to provide some references for the renewal and renovation design of similar ladders in the mountainous city. It is hoped to provide some references for the design of similar mountain city stairways in terms of renewal and renovation.Keywords: spatial memory, environmental behavioral science, mountain cities, stairway space, spatial enhancement
Procedia PDF Downloads 22416 Investigation into the Role of Leadership in the Management of Digital Transformation for Small and Medium Enterprises
Authors: Francesco Coraci, Abdul-Hadi G. Abulrub
Abstract:
Digital technology is transforming the landscape of the industrial sector at a precedential level by connecting people, processes, and machines in real-time. It represents the means for a new pathway to achieve innovative, dynamic competitive advantages, deliver unique customers’ values, and sustain critical relationships. Thus, success in a constantly changing environment is governed by the ability of an organization to revolutionize their business models, deliver innovative solutions, and capture values from big data analytics and insights. Businesses need to re-strategize operations and develop extra capabilities to cope with the necessity for additional flexibility and agility. The traditional “command and control” leadership style is structurally and operationally incompatible with the digital era. In this paper, the authors discuss how transformational leaders can act as a glue in the social, organizational context, which is crucial to enable the workforce and develop a psychological attachment to the digital vision.Keywords: internet of things, strategy, change leadership, dynamic competitive advantage, digital transformation
Procedia PDF Downloads 1292415 Enhance the Power of Sentiment Analysis
Authors: Yu Zhang, Pedro Desouza
Abstract:
Since big data has become substantially more accessible and manageable due to the development of powerful tools for dealing with unstructured data, people are eager to mine information from social media resources that could not be handled in the past. Sentiment analysis, as a novel branch of text mining, has in the last decade become increasingly important in marketing analysis, customer risk prediction and other fields. Scientists and researchers have undertaken significant work in creating and improving their sentiment models. In this paper, we present a concept of selecting appropriate classifiers based on the features and qualities of data sources by comparing the performances of five classifiers with three popular social media data sources: Twitter, Amazon Customer Reviews, and Movie Reviews. We introduced a couple of innovative models that outperform traditional sentiment classifiers for these data sources, and provide insights on how to further improve the predictive power of sentiment analysis. The modelling and testing work was done in R and Greenplum in-database analytic tools.Keywords: sentiment analysis, social media, Twitter, Amazon, data mining, machine learning, text mining
Procedia PDF Downloads 3532414 Activating Psychological Resources of DUI (Drivers under the Influence of Alcohol) Using the Traffic Psychology Intervention (IFT Course), Germany
Authors: Parichehr Sharifi, Konrad Reschke, Hans-Liudger Dienel
Abstract:
Psychological intervention generally targets changes in attitudes and behavior. Working with DUIs is part of traffic psychologists’ work. The primary goal of this field is to reduce the probability of re-conspicuous of the delinquent driver. One of these measurements in Germany is IFT courses for DUI s. The IFT course was designed by the Institute for Therapy Research. Participants are drivers who have fallen several times or once with a blood alcohol concentration of 1.6 per mill and who have completed a medical-psychological assessment (MPU) with the result of the course recommendation. The course covers four sessions of 3.5 hours each (1 hour / 60 m) and in a period of 3 to 4 weeks in the group discussion. This work analyzes interventions for the rehabilitation of DUI (Drunk Drivers offenders) offenders in groups under the aspect of activating psychological resources. From the aspect of sustainability, they should also have long-term consequences for the maintenance of unproblematic driving behavior in terms of the activation of resources. It is also addressing a selected consistency-theory-based intervention effect, activating psychological resources. So far, this has only been considered in the psychotherapeutic field but never in the field of traffic psychology. The methodology of this survey is one qualitative and three quantitative. In four sub-studies, it will be examined which measurements can determine the resources and how traffic psychological interventions can strengthen resources. The results of the studies have the following implications for traffic psychology research and practice: (1) In the field of traffic psychology intervention for the restoration of driving fitness, it can be stated that aspects of resource activation in this work have been investigated for the first time by qualitative and quantitative methods. (2) The resource activation could be confirmed based on the determined results as an effective factor of traffic psychological intervention. (3) Two sub-studies show a range of resources and resource activation options that must be given greater emphasis in traffic psychology interventions: - Social resource activation - improvement of the life skills of participants - Reactivation of existing social support options - Re-experiencing self-esteem, self-assurance, and acceptance of traffic-related behaviors. (4) In revising the IFT-§70 course, as well as other courses on recreating aptitude for DUI, new traffic-specific resource-enabling interventions against alcohol abuse should be developed to further enhance the courses through motivational, cognitive, and behavioral effects of resource activation, Resource-activating interventions can not only be integrated into behavioral group interventions but can also be applied in psychodynamic, psychodynamic (individual psychological) and other contexts of individual traffic psychology. The results are indicative but clearly show that personal resources can be strengthened through traffic psychology interventions. In the research, practice, training, and further education of traffic psychology, the aspect of primary resource activation (Grawe, 1999), therefore, always deserves the greatest attention for the rehabilitation of DUIs and Traffic safety.Keywords: traffic safety, psychological resources, activating of resources, intervention programs for alcohol offenders, empowerment
Procedia PDF Downloads 80