Search results for: internet ethics
1295 Social Data Aggregator and Locator of Knowledge (STALK)
Authors: Rashmi Raghunandan, Sanjana Shankar, Rakshitha K. Bhat
Abstract:
Social media contributes a vast amount of data and information about individuals to the internet. This project will greatly reduce the need for unnecessary manual analysis of large and diverse social media profiles by filtering out and combining the useful information from various social media profiles, eliminating irrelevant data. It differs from the existing social media aggregators in that it does not provide a consolidated view of various profiles. Instead, it provides consolidated INFORMATION derived from the subject’s posts and other activities. It also allows analysis over multiple profiles and analytics based on several profiles. We strive to provide a query system to provide a natural language answer to questions when a user does not wish to go through the entire profile. The information provided can be filtered according to the different use cases it is used for.Keywords: social network, analysis, Facebook, Linkedin, git, big data
Procedia PDF Downloads 4421294 Stimulating Effects of Media in Improving Quality of Distance Education: A Literature Based Study
Authors: Tahzeeb Mahreen
Abstract:
Distance education refers to giving instruction in which students are remote from the institution and once in a while go to formal demonstration classes, and teaching sessions. Segments of media, for example, radio, TV, PC and Internet and so on are the assets and method for correspondence being utilized as a part of learning material by many open and distance learning institutions. Media has a great part in maximizing the learning opportunities thus enabling distance education, a mode of increased literacy rate of the country. This study goes for analyzing how media had affected distance education through its different mediums. The objectives of the study were (i) to determine the direct impact of media on distance education? (ii) To know how media effects distance education pedagogy (iii) To find out how media works to increase student’s achievement. Literature-based methodology was used, and books, peer-reviewed articles, press reports and internet-based materials were studied as a result. By using descriptive qualitative research analysis, the researcher has interpreted that distance education programs are progressively utilizing mixes of media to convey training that has a positive impact on learning along with a few challenges. In addition, the perception of the researcher varied depending on the programs of distance learning but generally believed that electronic media were moderately more supportive in enhancing the overall performance of the learners. It was concluded that the intellectual style, identity qualities, and self-expectations are the three primary enhanced areas in a student’s educational life in distance education programs. It was portrayed that a comprehension of how individual learners approach learning may make it workable for the distance educator to see an example of learning styles and arrange or modify course presentations through media. Moreover, it is noticed that teaching in distance education address the developing role of the instructor, the requirement for diminishing resistance as conventional teachers utilize remove conveyance frameworks lastly, staff state of mind toward the utilization of innovation. Furthermore, the results showed that media had assumed its part to make distance learning educators more dynamic, capable and concerned about their individual works. The study also indicated a high positive relationship between the media available at study centers and media used by the distance education. The challenge pointed out by the researcher was the clash of distance and time with communication as the life situations of every learner are varied. Recommendations included the realization of the duty of distance learning instructor to help students understand the effective use of media for their study lessons and also to develop online learning communities to be in instant connection with the students.Keywords: distance education, education, media, teaching and learning
Procedia PDF Downloads 1401293 The Role of Humour as a Virtue: From the Perspective of the Sufi's Worldview
Authors: Mohamed Eusuff Amin
Abstract:
In Sufi culture, humour in form of story, expressed as prose or poetry, is used to deliver moral lessons. However, this humour is not limited to telling stories as an educational program. In this paper, an idea is introduced to argue that humour is a virtue from the Sufis’ perspective. This understanding of humour is different than as what has been understood generally in the Western intellectual tradition. For the Western philosophers in general, humour is the indication of the soul’s position in relates to others that signify the relations between different individuals. But for the Sufis, it is more so as a tool for an individual to surpass his/her anger and encourage toleration with others; ultimately it is a form of ‘mercy’. In order to explain this idea, the paper will be worked into three parts as steps to construct the epistemic structure of this claim. The first part, the ethic philosophy of the Sufis will be discussed, and this will be done mostly based on the ideas on ethics that is related to the conception of existence. In the second part, few short Turkish Sufi stories will be looked at to find how the humour is applied in relation to the objective of the stories. After that, how humour can be a principle in ethic will be discussed by making some comparisons with what already taught as philosophy of humour in the West under the groups of incongruity, superiority, and relief theories. Therefore, in the end, we shall argue that to find humour in every situation is a recommended virtue for, providing that it surpassing anger of oneself and encourage toleration for others as an act of mercy.Keywords: epistemology, ethic, sufism, virtue
Procedia PDF Downloads 1811292 Assess the Risk Behaviours and Safer Sex Practices among Male Attendees in a Sexual Health Setting
Authors: B. M. M. D. Mendis, L. I. Rajapaksa, P. S. K. Gunathunga, R. C. Fernando, M. Jayalath
Abstract:
Background / introduction: During the year 2011, 8511 males received services from the sexual health clinics island wide. At present there is only limited information on the risk behaviours of male attendees. Information on risk behaviours related to STI /HIV transmission is helpful in planning suitable prevention interventions. Aim(s)/objectives: The objectives were to determines the sexual partners (other than the marital partner and regular partners) responsible for transmitting STI( Sexually transmitted infections)/ HIV and to understand the practice of safer sex. Methods: Study was a clinic based prospective study conducted for a one year period using an interviewer administered questionnaire. Results: 983 attendees were interviewed. . Mean age was 34.02 years. 75% of the sample had completed GCE O/L (ordinary level examination). Skilled labourers, drivers and forces/police comprised 40% of the sample. 50% admitted sex with a casual female, 12% with a casual male, and 13% with CSW (commercial sex workers) while MSW (male sex workers) exposures were minimal. It was identified that younger males had more contacts with males, and regular female partners while more older males with CSW. Anal sex among males was reported by 11.5%. 20.5% used alcohol frequently and 5.9% used drugs and 1.4% injected. Common STI were genital herpes (7.9%), Non gonococcal urethritis (6.2%) and gonorrhoea (6.2%). Among those who had contacts with FSW 6.7% gonorrhoea (GC), 8.2% non gonococcal urethritis (NGU), 7.5% genital herpes and 0.7% HIV. Non regular partner exposures 3.7% had gonorrhoea, 8.3% NGU, 6.6% genital herpes and 0.8% HIV. Among MSM contacts 10.6% had GC, 4.5% NGU, 5.3% genital herpes, 5.3% secondary syphilis and 0.8% HIV. Only 9.0% used condoms correctly. Friends, doctors, newspapers, internet, and forces were important sources of information on condoms. Non use of condoms were due to worry about satisfaction (24.6%) and faith in the partner (25.6%). Discussion/conclusion: Casual partners for unsafe sex is a concern. MSM and CSW are remained as an important source of infection. Early Syphilis and gonorrhoea infections were mostly seen among MSM exposures. The findings indicate that the male population in the sample had satisfactory education. However, still the unsafe sexual contacts are common. . Newspapers, internet were more important sources of information on condoms. Low condom use remains another concern.. More males contracted STI through casual partners. Therefore strategies used for prevention need to be revisited also emphasizing on general population where casual partners represent. . Increasing awareness of men and women through mass media and primary health care teams may be important strategies that can be used to keep the HIV epidemic in a low level.Keywords: STI, HIV, Males, safe sex practices
Procedia PDF Downloads 3371291 Ranking of Employability Skills from Employers' Perspective against Outcome Based Education Criteria for Engineering Graduates: A Case Study of Pakistan
Authors: Mohammad Pervez Mughal, Huma Shazadi
Abstract:
Pakistan became a full signatory to the Washington Accord in June 2017, with the expectation that undergraduate engineering programs will be recognized by other signatory countries. Pakistan's accrediting body, the Pakistan Engineering Council (PEC), has distributed 12 Program Learning Outcomes (PLOs) under Outcome Based Education (OBE) criteria for engineering institutions in Pakistan to follow. However, no research has been conducted to rank graduates' employability skills in relation to these PLOs from the perspective of potential employers. The current work makes a concerted effort to rank the skills required by employers, which include both technical and non-technical skill sets. A survey was conducted throughout Pakistan to validate the relative importance of employability skills. 198 HR personnel, 1554 graduating students, 1540 alumni, and 267 faculty members provided valid responses, which were analyzed. According to the findings, ethics, communication, and lifelong learning are the most important attributes of engineering graduates' employability in the eyes of employers. Graduating students, alumni, and faculty's differential prospects are also presented and compared to employers' perspectives.Keywords: employability skills, employers' perspective, outcome-based education, engineering graduates, Pakistan
Procedia PDF Downloads 1161290 Complex Event Processing System Based on the Extended ECA Rule
Authors: Kwan Hee Han, Jun Woo Lee, Sung Moon Bae, Twae Kyung Park
Abstract:
ECA (Event-Condition-Action) languages are largely adopted for event processing since they are an intuitive and powerful paradigm for programming reactive systems. However, there are some limitations about ECA rules for processing of complex events such as coupling of event producer and consumer. The objective of this paper is to propose an ECA rule pattern to improve the current limitations of ECA rule, and to develop a prototype system. In this paper, conventional ECA rule is separated into 3 parts and each part is extended to meet the requirements of CEP. Finally, event processing logic is established by combining the relevant elements of 3 parts. The usability of proposed extended ECA rule is validated by a test scenario in this study.Keywords: complex event processing, ECA rule, Event processing system, event-driven architecture, internet of things
Procedia PDF Downloads 5281289 A Non-Invasive Blood Glucose Monitoring System Using near-Infrared Spectroscopy with Remote Data Logging
Authors: Bodhayan Nandi, Shubhajit Roy Chowdhury
Abstract:
This paper presents the development of a portable blood glucose monitoring device based on Near-Infrared Spectroscopy. The system supports Internet connectivity through WiFi and uploads the time series data of glucose concentration of patients to a server. In addition, the server is given sufficient intelligence to predict the future pathophysiological state of a patient given the current and past pathophysiological data. This will enable to prognosticate the approaching critical condition of the patient much before the critical condition actually occurs.The server hosts web applications to allow authorized users to monitor the data remotely.Keywords: non invasive, blood glucose concentration, microcontroller, IoT, application server, database server
Procedia PDF Downloads 2151288 The Evaluation of the Patients Related to Numeric Pain Scales: The Case of Turkey
Authors: Maide Yesilyurt, Saide Faydalı
Abstract:
Patients experience pain at different intensities in postoperative. The diagnosis of the pain, the assessment and the success of the treatment and care make the measurement of this finding compulsory. The aim of the study is to determine the evaluation differences numeric pain scales. The descriptive study was conducted with 360 patients with in postoperative. The data were obtained from questionnaires related to six numeric pain scales most preferred in clinical use, and a face-to-face interview technique was used by the researcher. Regarding to numeric pain scale, questions include forth positive and one negative statement. In evaluating the data; chi-square and Pearson correlation tests were used. For the study, the patients’ informed consents, the institution and the ethics committee received permission. In this study, patients' ages are between 18-80, 95.8% of the patients were not informed about pain assessment. Patients evaluated the 5-item numeric scale as the easy, can be answered quickly, accurate, and appropriate for clinical use and the 101 items numeric scale as complex than other scales. Regarding to numeric pain scales with positive statements between age, marital status, educational status, previous surgery, having chronic disease and getting information about pain assessment significant difference has been detected. All numeric pain scales are correlated to each other. As a result, it was determined that as the items in the numerical scales decreased, the patients were able to perceive the scales better, and the items in the scales increased, the patients were in trouble to understand.Keywords: numeric pain scales, nurse, pain assessment, patient
Procedia PDF Downloads 2891287 Comparison of Analgesic Efficacy of Ropivacaine and Levobupivacaine in Labour Analgesia by Dural Puncture Epidural Technique – A Prospective Double-blinded Randomized Trial
Authors: J. Punj, R. K. Pandey, V. Darlong, K. Thangavel
Abstract:
Background: Dural puncture epidural (DPE) technique has been introduced recently for labour analgesia however, no study has compared ropivacaine and levobupivacaine for the same. Methods: The primary aim of the study was to compare time to onset of the Numerical Pain Rating Score (NPRS) ≤ 1 in labour analgesia with both drugs. After obtaining ethics and patient consent, ASA I and ASA II parturient with single foetus in vertex presentation and cervical dilatation <5.0 cm were included. DPE was performed with 16/ 26 G combined spinal epidural (CSE) technique, and parturients randomized into two groups. In Group R ( Ropivacaine) 20 ml 0.125% ropivacaine+ fentanyl 2µg/ml was injected to a maximum of 20 ml in 20 minutes and in Group L (Levobupivacaine), 20 ml 0.125% levobupivacaine + fentanyl 2µg/ml was injected. Outcomes were assessed at 0.5,2,4,6,8,10,12,14,16,18,20 and 30 minutes, then every 90 minutes until delivery. Appropriate statistical analysis was done, and p value of <0.05 was considered statistically significant. Results: The median time to onset of NPRS ≤1 in both groups was comparable (group R= 16 minutes vs group L= 18 minutes (p = 0.076). Volume of drug for NPR ≤1 in both groups was also comparable (Group R 15.95± 2.03 ml vs Group L 16.35 ± 1.34 ml (p=0.47). Conclusion: DPE with 16 G epidural needle and 26 gauge spinal needle with both 0.125% ropivacaine and 0.125% levobupivacaine results in similar efficacy of labour analgesia.Keywords: dural puncture epidural, labour analgesia, obstetric analgesia, hypotension
Procedia PDF Downloads 851286 Prosperous Digital Image Watermarking Approach by Using DCT-DWT
Authors: Prabhakar C. Dhavale, Meenakshi M. Pawar
Abstract:
In this paper, everyday tons of data is embedded on digital media or distributed over the internet. The data is so distributed that it can easily be replicated without error, putting the rights of their owners at risk. Even when encrypted for distribution, data can easily be decrypted and copied. One way to discourage illegal duplication is to insert information known as watermark, into potentially valuable data in such a way that it is impossible to separate the watermark from the data. These challenges motivated researchers to carry out intense research in the field of watermarking. A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. Digital watermarking is an extension of the same concept. There are two types of watermarks visible watermark and invisible watermark. In this project, we have concentrated on implementing watermark in image. The main consideration for any watermarking scheme is its robustness to various attacksKeywords: watermarking, digital, DCT-DWT, security
Procedia PDF Downloads 4211285 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 281284 Ethical Challenges for Journalists in Times of Fake News and Hate Speech: A Survey with German Journalists
Authors: Laura C. Solzbacher, Caja Thimm
Abstract:
Journalists worldwide have been confronted with a variety of ethical challenges over the last years. Because of massive changes in media technology and the public sphere, especially online journalism has trouble to uphold the fundamental values of journalism. In particular, the increasing amount of fake news and hate speech puts journalists under more and more pressure. In order to understand better how journalists judge this development and how they adapt in their daily work, a survey with journalists in Germany was carried out. 303 professional journalists participated in an online questionnaire. Results show that 65% underline that economic pressure grows and nearly the same number describe a change in the role of journalists in society. Furthermore, 61% agree that they put more time into research to secure their work against accusations of fabricating fake news. Interestingly, over 60% see a change in the role of journalists in society. The majority (85%) confirms that print journalism has to give way for online platforms and that the influence of social media for journalism grows (75%). Half of the surveyed advocate for more personalized public activism on part of journalists, such as appearance in talk shows and public talks. The results of the study will be discussed in light of the ongoing debate on ethical standards as a condition for a sustainable and trustworthy digital public sphere.Keywords: ethics, fake news, journalism, public sphere
Procedia PDF Downloads 2681283 Strategies to Enhance Export Performance of Thai Furniture Industry
Authors: Khomsan Laosillapacharoen
Abstract:
This research paper was aimed to analyze the current situation of the furniture industry and embark a plan to enhance the export volume of Thai furniture. This is a qualitative research which utilized meta-analysis and focus group. A total of 24 experts in both government and private sectors were interviewed. The findings revealed that Thai furniture had some advantages of access to raw material, high quality of labors, and have a unique skill. However, the threat included a tendency to have more foreign competitors in domestic market. In addition, the strategies to enhance the level of export included increase the standard quality of Thai furniture, offer new and modern designs, use marketing on the internet, use modern technology, and gain tax incentive from the government.Keywords: export, furniture, strategies, marketing
Procedia PDF Downloads 3981282 A Review of the Fundamental Principles of the National Transport Policy and Developmental Implementation Programmes
Authors: Charles Asenime, Asaju Joel, Fagbenro Abiola, Adetoyese Oguntimehin, Agosu Rebecca
Abstract:
This paper examines the fundamental principles of the National Transport Policy (NTP) and determined its role in the execution of transport projects, and the establishment of ministries, departments, and agencies. Data used for the paper are from secondary sources of commissioned reports, studies, internet sources, and government releases. Results of the analysis show that the draft NTP has been used to establish transport schemes, master plans, and transport infrastructure. The paper concludes that though, the national transport Policy is still in a draft form, its production, however, has shaped the transport system in Nigeria and has shown how transport has improved the economy through the efficient utilisation of resources, improved mobility, and lifestyle.Keywords: principles, draft, system, resources
Procedia PDF Downloads 1401281 Using Educational Gaming as a Blended Learning Tool in South African Education
Authors: Maroonisha Maharajh
Abstract:
Based on the Black Swan and Disruptive Innovation Theories, this study proposes an educational game based learning model within the context of the traditional classroom learning environment. In the proposed model, the perceived e-learning component is decomposed into accessibility, perceived quality and perceived usability within the traditional rural classroom environment. A sample of 92 respondents took part in this study. The results suggest that users’ continuance intention is determined by both economic and grassroots internet accessibility, which in turn is jointly determined by perceived usefulness, information quality, service quality, system quality, perceived ease of use and cognitive absorption of learning.Keywords: blended learning, flipped classroom, e-learning, gaming
Procedia PDF Downloads 2521280 Information Technology in Assessing Risks and Threats in the Transition of the Brand to the Digital Environment
Authors: Spanova Yerkezhan, Amantay Ayan, Alimzhanova Laura
Abstract:
This article discusses the concept of rebranding and its relationship to cybersecurity. Rebranding is the process of changing the appearance and image of a company or organization in order to appeal to new customers or change the perception of a company. It can be a powerful tool for businesses looking to renew their reputation or expand into new markets. In today's digital age, companies increasingly rely on technology and the internet to conduct business; rebranding can also present significant cybersecurity risks. This is because a rebranding effort can create new vulnerabilities for companies, particularly in terms of their online presence. This article explores the potential hazards associated with rebranding and provides recommendations for mitigating those risks. It also highlights the importance of considering cybersecurity in the rebranding process and how it can be integrated into the overall strategy for a successful and secure rebranding.Keywords: rebranding, cybersecurity, cyberattack, logo, vulnerability
Procedia PDF Downloads 1651279 Leading People in a Digital Era: A Theoretical Study of Challenges and Opportunities of Online Networking Platforms
Authors: Pawel Korzynski
Abstract:
Times where leaders communicate mainly while walking along the hallways have passed away. Currently, millennials, people that were born between the early 1980s and the early 2000s, extensively use applications based on Web 2.0 model that assumes content creation and edition by all Internet users in a collaborative fashion. Leaders who are willing to engage their subordinates in a digital era, increasingly often use above-mentioned applications. This paper discusses challenges and opportunities that are related to leaders’ online networking. First, online networking-related terms that appeared in literature are analyzed. Then, types of online networking platforms for leaders and ways how these platforms can be used are discussed. Finally, several trends in online networking studies and extrapolation of some findings to leadership are explained.Keywords: social media, digital era, leadership, online networking
Procedia PDF Downloads 2921278 An Integrated Approach of Islamic Social Financing for Achieving Sustainable Development Goals (SDGS) Through Crowdfunding: A Model for Sharing Economy for Community Development in Bangladesh
Authors: Md. Abu Yousuf
Abstract:
Islamic social financing (ISF) refers to the fair distribution of wealth and financial dealings and prevents economic exploitation at all levels. ISF instruments include Islamic institutions Zakat (obligatory charity), Sadaqah (voluntary charity) and Waqf (endowment) based on philanthropy such and Qard-al Hasan (beautiful loan), micro takaful (insurance) and social investments through Sukuk (bonds) based on cooperation. ISF contributes to socio-economic development, end poverty, protects environmental sustainability, promotes education, equality, social justice and above all, establishes social well-being since the birth of Islam. ISF tools are instrumental towards achieving sustainable development goals (SDGs) set by United Nations (UN). The present study will explore the scope of ISF for community development in Bangladesh and examine the challenges in implementing ISF tools and will provide the most practical model of ISF. The study will adopt a mixed-method (MM) design in the process of data collection and analysis. The researcher will consider all issues related to ethics, reliability, validity and feasibility while conducting the study.Keywords: Islamic social financing, sustainable development goals, poverty eradication, zakat, waqf, sadaqah, Islamic microfinance
Procedia PDF Downloads 1841277 Usability Evaluation of Four Big e-Commerce Websites in Indonesia
Authors: Harry B. Santoso, Lia Sadita, Firlia Sandyta, Musa Alfatih, Nove Spalo, Nu'man Naufal, Nuryahya P. Utomo, Putu A. Paramatha, Rezka Aufar Leonandya, Tommy Anugrah, Aulia Chairunisa, M. Fadly Uzzaki, Riandy D. Banimahendra
Abstract:
The numbers of Internet active users in Indonesia reach out over 88.1 million, where 48% of them are daily active users. Seeing these numbers, it is the best opportunity for IT companies to grow their business, especially e-Commerce. In fact, the growth of e-Commerce companies in Indonesia is proportional with internet daily active users. This phenomenon shows that competition happening among the e-Commerce companies is raising high. It triggers many e-Commerce companies to improve their services. The authors hypothesized that one of the best ways to improve the services is by improving their usability. So, the authors had done a study to evaluate and find out ways to improve usability of those e-Commerce websites. The authors chose four e-Commerce websites which each of them has different business focus and profiles. Each company is labeled as A, B, C, and D. Company A is a fashion-based e-Commerce services with two-million desktop visits Indonesia. Company B is an international online shopping mall for everyday appliances with 48,3-million desktop visits in Indonesia. Company C is a localized online shopping mall with 3,2-million desktop visits in Indonesia. Company D is an online shopping mall with one-million desktop visits in Indonesia. Writers used popular web traffic analytics platform to gain the numbers. There are some approaches to evaluate the usability of e-Commerce websites. In this study, the authors used usability testing method supported by the User Experience Questionnaire. This method involved the user in interacting directly with the services provided by the e-Commerce company. This study was conducted within two months including preparation, data collection, data analysis, and reporting. We used a pair of computers, a screen-capture video application named Smartboard, and User Experience Questionnaire. A team was built to conduct this study. They consisted of one supervisor, two assistants, four facilitators and four observers. For each e-Commerce, three users aged 17-25 years old were invited to do five task scenarios. Data collected in this study included demographic information of the users, usability testing results, and users’ responses to the questionnaire. Some findings were revealed from the usability testing and the questionnaire. Compared to the other three companies, Company D had the least score for the experiences. One of the most painful issues figured out by the authors from the evaluation was most users claimed feeling confused by user interfaces in these e-Commerce websites. We believe that this study will help e-Commerce companies to improve their services and business in the future.Keywords: e-commerce, evaluation, usability testing, user experience
Procedia PDF Downloads 3161276 The Role of Demographics and Service Quality in the Adoption and Diffusion of E-Government Services: A Study in India
Authors: Sayantan Khanra, Rojers P. Joseph
Abstract:
Background and Significance: This study is aimed at analyzing the role of demographic and service quality variables in the adoption and diffusion of e-government services among the users in India. The study proposes to examine the users' perception about e-Government services and investigate the key variables that are most salient to the Indian populace. Description of the Basic Methodologies: The methodology to be adopted in this study is Hierarchical Regression Analysis, which will help in exploring the impact of the demographic variables and the quality dimensions on the willingness to use e-government services in two steps. First, the impact of demographic variables on the willingness to use e-government services is to be examined. In the second step, quality dimensions would be used as inputs to the model for explaining variance in excess of prior contribution by the demographic variables. Present Status: Our study is in the data collection stage in collaboration with a highly reliable, authentic and adequate source of user data. Assuming that the population of the study comprises all the Internet users in India, a massive sample size of more than 10,000 random respondents is being approached. Data is being collected using an online survey questionnaire. A pilot survey has already been carried out to refine the questionnaire with inputs from an expert in management information systems and a small group of users of e-government services in India. The first three questions in the survey pertain to the Internet usage pattern of a respondent and probe whether the person has used e-government services. If the respondent confirms that he/she has used e-government services, then an aggregate of 15 indicators are used to measure the quality dimensions under consideration and the willingness of the respondent to use e-government services, on a five-point Likert scale. If the respondent reports that he/she has not used e-government services, then a few optional questions are asked to understand the reason(s) behind the same. Last four questions in the survey are dedicated to collect data related to the demographic variables. An indication of the Major Findings: Based on the extensive literature review carried out to develop several propositions; a research model is prescribed to start with. A major outcome expected at the completion of the study is the development of a research model that would help to understand the relationship involving the demographic variables and service quality dimensions, and the willingness to adopt e-government services, particularly in an emerging economy like India. Concluding Statement: Governments of emerging economies and other relevant agencies can use the findings from the study in designing, updating, and promoting e-government services to enhance public participation, which in turn, would help to improve efficiency, convenience, engagement, and transparency in implementing these services.Keywords: adoption and diffusion of e-government services, demographic variables, hierarchical regression analysis, service quality dimensions
Procedia PDF Downloads 2671275 Benefit Sharing of Research Participants in Human Genomic Research: Ethical Concerns and Ramifications
Authors: Tamanda Kamwendo
Abstract:
The concept of benefit sharing has been a prominent global debate in the world, gaining traction in human research ethics. Despite its prevalence, the concept of benefit sharing is not without controversy over its meaning and justification. This is due to the fact that it lacks a broadly accepted definition and many proponents discuss benefit sharing by arguing for its necessity rather than engaging in critical intellectual engagement with technical issues such as what it implies. What is clear in the literature is that the underlying premise of benefit-sharing is that research involving underprivileged and marginalized people is currently unjust and inequitable because these people are denied access to these gains; thus, benefit-sharing arrangements are required for these research projects to be just and equitable. This paper, therefore, investigates the discourses and justifications behind the concept of benefit sharing to human participants, particularly when dealing with human genomics research. Furthermore, considering that benefit sharing is generally viewed as a transaction between research organizations and research participants, it raises ethical concerns concerning the commodification of human material and undermines the sanctity of the human genome. This is predicated on the idea that research sponsors would be compelled to deliver a minimum set of possible benefits to research participants and communities in exchange for their involvement in the study. There is, therefore, need to protect benefit-sharing practices in international health research by developing a governance legal framework. A legal framework of benefit sharing will also dispel the issue of commodification of human material where human genomic research is done.Keywords: benefit sharing, human participants, human genomic research, ethical concerns
Procedia PDF Downloads 761274 Effectiveness of Laughter Yoga in Reducing Anxiety among Pre-Operative Patients for Scheduled Major Surgery
Authors: Denise Allison D. Garcia, Camille C. Garcia, Keanu Raphael Garrido, Crestita B. Tan
Abstract:
Introduction: Anxiety is a common problem among pre-operative patients. Several methods or interventions are being applied in order to relieve anxiety. Laughter yoga, however, is a method that has been used to relieve anxiety but has not yet been tested to pre-operative patients. Therefore, this study determined the effectiveness of laughter yoga in reducing anxiety among pre-operative middle-aged patients scheduled for major surgery. Methods: After Ethics Review Board approval, a quasi-experimental study was conducted among 40 purposely-selected pre-operative patients in two tertiary hospitals. Anxiety level was measured prior to administration of laughter yoga using the State-Trait Anxiety Inventory with a Cronbach alpha of 0.83. After Laughter yoga, anxiety level was then measured again. Gathered data were analyzed in SPSS version 20 using paired and independent t-test and ANCOVA. Results: After analysis of the data gathered, the results showed that there was a significant decrease in the anxiety level of patients in the experimental group. From an anxiety level of 44.00, the rating went down to 36.85. Meanwhile in the control group, the anxiety level at the pretest at 41.25 went up to 42.50. Laughter yoga was an effective non-pharmacologic intervention for reducing anxiety of pre-operative patients. Conclusion: It is therefore concluded that laughter yoga causes a significant decrease in the anxiety level of patients.Keywords: anxiety, laughter yoga, non-pharmacologic, pre-operative
Procedia PDF Downloads 4411273 The Lightener of Love, the World Peace
Authors: Abdul Razzaq Azad, Muhammad Asad Razzaq
Abstract:
The current study reveals that Muslim society losing their basics concepts of courtesy which are the part of Islam. It is known that Muslims played a key role for providing piece in society throughout the history. Humanities always accept the changes through time, ideologies, ethics and traditions, various religious changes, culture, social behaviors and social problems, attitudes, political situations, literature, historical stress, economic clashes, wars and daily routine’s life. It also observed that religious people have their mind set due to their different religious teachings. All the religions have their different religious teachings which have different approaches for their followers. All the religions have same lesson of peace and prosperity. After 09/11 the entire scenario changed, even tried to connect terrorism and extremism with Islam and Muslims. It created a gap among religions and there was not attempt to use for reducing that gap. There were many meetings called at different places of religious scholars in different countries, but not able to get acceptable results. It also created a gap within the country in different religious sects. In the last 15 years there were14000 people have been killed from different religious incidents and even in different sects’ activities. The current study based on survey from 25 Imams and 10 Khatibs from South Punjab. The results show that they knew the word interfaith harmony and the role of Imams and Khatibs for peace in the inter-religious societies.Keywords: Islam, peace religion, terrorism, extremism, freedom, peace, prosperity and society
Procedia PDF Downloads 4941272 African Folklore for Critical Self-Reflection, Reflective Dialogue, and Resultant Attitudinal and Behaviour Change: University Students’ Experiences
Authors: T. M. Buthelezi, E. O. Olagundoye, R. G. L. Cele
Abstract:
This article argues that whilst African folklore has mainly been used for entertainment, it also has an educational value that has power to change young people’s attitudes and behavior. The paper is informed by the findings from the data that was generated from 154 university students who were coming from diverse backgrounds. The qualitative data was thematically analysed. Referring to the six steps of the behaviour change model, we found that African Folklore provides relevant cultural knowledge and instills values that enable young people to engage on self-reflection that eventually leads them towards attitudinal changes and behaviour modification. Using the transformative learning theory, we argue that African Folklore in itself is a pedagogical strategy that integrates cultural knowledge, values with entertainment elements concisely enough to take the young people through a transformative phase which encompasses psychological, convictional and life-style adaptation. During data production stage all ethical considerations were observed including obtaining gatekeeper’s permission letter and ethical clearance certificate from the Ethics Committee of the University. The paper recommends that African Folklore approach should be incorporated into the school curriculum particularly in life skills education with aims to change behaviour.Keywords: African folklore, young people, attitudinal, behavior change, university students
Procedia PDF Downloads 2621271 Insider Theft Detection in Organizations Using Keylogger and Machine Learning
Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.
Abstract:
About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.Keywords: cyber security, machine learning, cyclic process, email notification
Procedia PDF Downloads 561270 Cooperative Communication of Energy Harvesting Synchronized-OOK IR-UWB Based Tags
Authors: M. A. Mulatu, L. C. Chang, Y. S. Han
Abstract:
Energy harvesting tags with cooperative communication capabilities are emerging as possible infrastructure for internet of things (IoT) applications. This paper studies about the \ cooperative transmission strategy for a network of energy harvesting active networked tags (EnHANTs), that is adapted to the available energy resource and identification request. We consider a network of EnHANT-equipped objects to communicate with the destination either directly or by cooperating with neighboring objects. We formulate the the problem as a Markov decision process (MDP) under synchronised On/Off keying (S-OOK) pulse modulation format. The simulation results are provided to show the the performance of the cooperative transmission policy and compared against the greedy and conservative policies of single-link transmission.Keywords: cooperative communication, transmission strategy, energy harvesting, Markov decision process, value iteration
Procedia PDF Downloads 4901269 Online Guidance and Counselling Needs and Preferences of University Undergraduates in a Nigerian University
Authors: Olusegun F. Adebowale
Abstract:
Research has confirmed that the emergence of information technology is significantly reflected in the field of psychology and its related disciplines due to its widespread use at reasonable price and its user-friendliness. It is consequently affecting ordinary life in many areas like shopping, advertising, corresponding and educating. Specifically the innovations of computer technology led to several new forms of communication, all with implications and applicability for counselling and psychotherapy practices. This is premise on which online counselling is based. Most institutions of higher learning in Nigeria have established their presence on the Internet and have deployed a variety of applications through ICT. Some are currently attempting to include counselling services in such applications with the belief that many counselling needs of students are likely to be met. This study therefore explored different challenges and preferences students present in online counselling interaction in a given Nigerian university with the view to guide new universities that may want to invest into these areas as to necessary preparations and referral requirements. The study is a mixed method research incorporating qualitative and quantitative methodologies to sample the preferences and concerns students express in online interaction. The sample comprised all the 876 students who visited the university online counselling platform either voluntarily, by invitation or by referral. The instrument for data collection was the online counselling platform of the university 'OAU Online counsellors'. The period of data collection spanned between January 2011 and October 2012. Data were analysed quantitatively (using percentages and Mann-Whitney U test) and qualitatively (using Interpretative Phenomenological Analysis (IPA)). The results showed that the students seem to prefer real-time chatting as their online medium of communicating with the online counsellor. The majority of students resorted to e-mail when their effort to use real-time chatting were becoming thwarted. Also, students preferred to enter into online counselling relationships voluntarily to other modes of entry. The results further showed that the prevalent counselling needs presented by students during online counselling sessions were mainly in the areas of social interaction and academic/educational concerns. Academic concerns were found to be prevalent, in form of course offerings, studentship matters and academic finance matters. The personal/social concerns were in form of students’ welfare, career related concerns and relationship matters. The study concludes students’ preferences include voluntary entry into online counselling, communication by real-time chatting and a specific focus on their academic concerns. It also recommends that all efforts should be made to encourage students’ voluntary entry into online counselling through reliable and stable internet infrastructure that will be able to support real-time chatting.Keywords: online, counselling, needs, preferences
Procedia PDF Downloads 2891268 Learning Compression Techniques on Smart Phone
Authors: Farouk Lawan Gambo, Hamada Mohammad
Abstract:
Data compression shrinks files into fewer bits than their original presentation. It has more advantage on the internet because the smaller a file, the faster it can be transferred but learning most of the concepts in data compression are abstract in nature, therefore, making them difficult to digest by some students (engineers in particular). This paper studies the learning preference of engineering students who tend to have strong, active, sensing, visual and sequential learning preferences, the paper also studies the three shift of technology-aided that learning has experienced, which mobile learning has been considered to be the feature of learning that will integrate other form of the education process. Lastly, we propose a design and implementation of mobile learning application using software engineering methodology that will enhance the traditional teaching and learning of data compression techniques.Keywords: data compression, learning preference, mobile learning, multimedia
Procedia PDF Downloads 4451267 Exploring the Correlation between Population Distribution and Urban Heat Island under Urban Data: Taking Shenzhen Urban Heat Island as an Example
Authors: Wang Yang
Abstract:
Shenzhen is a modern city of China's reform and opening-up policy, the development of urban morphology has been established on the administration of the Chinese government. This city`s planning paradigm is primarily affected by the spatial structure and human behavior. The subjective urban agglomeration center is divided into several groups and centers. In comparisons of this effect, the city development law has better to be neglected. With the continuous development of the internet, extensive data technology has been introduced in China. Data mining and data analysis has become important tools in municipal research. Data mining has been utilized to improve data cleaning such as receiving business data, traffic data and population data. Prior to data mining, government data were collected by traditional means, then were analyzed using city-relationship research, delaying the timeliness of urban development, especially for the contemporary city. Data update speed is very fast and based on the Internet. The city's point of interest (POI) in the excavation serves as data source affecting the city design, while satellite remote sensing is used as a reference object, city analysis is conducted in both directions, the administrative paradigm of government is broken and urban research is restored. Therefore, the use of data mining in urban analysis is very important. The satellite remote sensing data of the Shenzhen city in July 2018 were measured by the satellite Modis sensor and can be utilized to perform land surface temperature inversion, and analyze city heat island distribution of Shenzhen. This article acquired and classified the data from Shenzhen by using Data crawler technology. Data of Shenzhen heat island and interest points were simulated and analyzed in the GIS platform to discover the main features of functional equivalent distribution influence. Shenzhen is located in the east-west area of China. The city’s main streets are also determined according to the direction of city development. Therefore, it is determined that the functional area of the city is also distributed in the east-west direction. The urban heat island can express the heat map according to the functional urban area. Regional POI has correspondence. The research result clearly explains that the distribution of the urban heat island and the distribution of urban POIs are one-to-one correspondence. Urban heat island is primarily influenced by the properties of the underlying surface, avoiding the impact of urban climate. Using urban POIs as analysis object, the distribution of municipal POIs and population aggregation are closely connected, so that the distribution of the population corresponded with the distribution of the urban heat island.Keywords: POI, satellite remote sensing, the population distribution, urban heat island thermal map
Procedia PDF Downloads 1031266 Online Metacognitive Reading Strategies Use by Postgraduate Libyan EFL Students
Authors: Najwa Alsayed Omar
Abstract:
With the increasing popularity of the Internet, online reading has become an essential source for EFL readers. Using strategies to comprehend information on online reading texts play a crucial role in students’ academic success. Metacognitive reading strategies are effective factors that enhance EFL learners reading comprehension. This study aimed at exploring the use of online metacognitive reading strategies by postgraduate Libyan EFL students. Quantitative data was collected using the Survey of Online Reading Strategies (OSORS). The findings revealed that the participants were moderate users of metacognitive online reading strategies. Problem solving strategies were the most frequently reported used strategies, while support reading strategies were the least. The five most and least frequently reported strategies were identified. Based on the findings, some future research recommendations were presented.Keywords: metacognitive strategies, online reading, online reading strategies, postgraduate students
Procedia PDF Downloads 318