Search results for: social security reform
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11855

Search results for: social security reform

10865 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks

Authors: Sulemana Ibrahim

Abstract:

Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.

Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks

Procedia PDF Downloads 55
10864 The Political Economy of Media Privatisation in Egypt: State Mechanisms and Continued Control

Authors: Mohamed Elmeshad

Abstract:

During the mid-1990's Egypt had become obliged to implement the Economic Reform and Structural Adjustment Program that included broad economic liberalization, expansion of the private sector and a contraction the size of government spending. This coincided as well with attempts to appear more democratic and open to liberalizing public space and discourse. At the same time, economic pressures and the proliferation of social media access and activism had led to increased pressure to open a mediascape and remove it from the clutches of the government, which had monopolized print and broadcast mass media for over 4 decades by that point. However, the mechanisms that governed the privatization of mass media allowed for sustained government control, even through the prism of ostensibly privately owned newspapers and television stations. These mechanisms involve barriers to entry from a financial and security perspective, as well as operational capacities of distribution and access to means of production. The power dynamics between mass media establishments and the state were moulded during this period in a novel way. Power dynamics within media establishments had also formed under such circumstances. The changes in the country's political economy itself somehow mirrored these developments. This paper will examine these dynamics and shed light on the political economy of Egypt's newly privatized mass media in the early 2000's especially. Methodology: This study will rely on semi-structured interviews from individuals involved with these changes from the perspective of the media organizations. It also will map out the process of media privatization by looking at the administrative, operative and legislative institutions and contexts in order to attempt to draw conclusions on methods of control and the role of the state during the process of privatization. Finally, a brief discourse analysis will be necessary in order to aptly convey how these factors ultimately reflected on media output. Findings and conclusion: The development of Egyptian private, “independent” mirrored the trajectory of transitions in the country’s political economy. Liberalization of the economy meant that a growing class of business owners would explore opportunities that such new markets would offer. However the regime’s attempts to control access to certain forms of capital, especially in sectors such as the media affected the structure of print and broadcast media, as well as the institutions that would govern them. Like the process of liberalisation, much of the regime’s manoeuvring with regards to privatization of media had been haphazardly used to indirectly expand the regime and its ruling party’s ability to retain influence, while creating a believable façade of openness. In this paper, we will attempt to uncover these mechanisms and analyse our findings in ways that explain how the manifestations prevalent in the context of a privatizing media space in a transitional Egypt provide evidence of both the intentions of this transition, and the ways in which it was being held back.

Keywords: business, mass media, political economy, power, privatisation

Procedia PDF Downloads 224
10863 Contribution at Dimensioning of the Energy Dissipation Basin

Authors: M. Aouimeur

Abstract:

The environmental risks of a dam and particularly the security in the Valley downstream of it,, is a very complex problem. Integrated management and risk-sharing become more and more indispensable. The definition of "vulnerability “concept can provide assistance to controlling the efficiency of protective measures and the characterization of each valley relatively to the floods's risk. Security can be enhanced through the integrated land management. The social sciences may be associated to the operational systems of civil protection, in particular warning networks. The passage of extreme floods in the site of the dam causes the rupture of this structure and important damages downstream the dam. The river bed could be damaged by erosion if it is not well protected. Also, we may encounter some scouring and flooding problems in the downstream area of the dam. Therefore, the protection of the dam is crucial. It must have an energy dissipator in a specific place. The basin of dissipation plays a very important role for the security of the dam and the protection of the environment against floods downstream the dam. It allows to dissipate the potential energy created by the dam with the passage of the extreme flood on the weir and regularize in a natural manner and with more security the discharge or elevation of the water plan on the crest of the weir, also it permits to reduce the speed of the flow downstream the dam, in order to obtain an identical speed to the river bed. The problem of the dimensioning of a classic dissipation basin is in the determination of the necessary parameters for the dimensioning of this structure. This communication presents a simple graphical method, that is fast and complete, and a methodology which determines the main features of the hydraulic jump, necessary parameters for sizing the classic dissipation basin. This graphical method takes into account the constraints imposed by the reality of the terrain or the practice such as the one related to the topography of the site, the preservation of the environment equilibrium and the technical and economic side.This methodology is to impose the loss of head DH dissipated by the hydraulic jump as a hypothesis (free design) to determine all the others parameters of classical dissipation basin. We can impose the loss of head DH dissipated by the hydraulic jump that is equal to a selected value or to a certain percentage of the upstream total head created by the dam. With the parameter DH+ =(DH/k),(k: critical depth),the elaborate graphical representation allows to find the other parameters, the multiplication of these parameters by k gives the main characteristics of the hydraulic jump, necessary parameters for the dimensioning of classic dissipation basin.This solution is often preferred for sizing the dissipation basins of small concrete dams. The results verification and their comparison to practical data, confirm the validity and reliability of the elaborate graphical method.

Keywords: dimensioning, energy dissipation basin, hydraulic jump, protection of the environment

Procedia PDF Downloads 580
10862 Determining the Materiality of an Undisclosed Fact: An Onerous Duty on the Assured

Authors: Adekemi Adebowale

Abstract:

The duty of disclosure in Nigerian insurance law is in need of reform. The materiality of an undisclosed fact (notwithstanding that it was an honest and innocent non-disclosure) currently entitles insurers to avoid insurance policies, leaving an insured with an uncovered loss. While the test of materiality requires an insured to voluntarily disclose facts that will influence an insurer's decision without proper guidelines from the insurer, the insurer is only expected to prove that the undisclosed fact had influenced its judgment in fixing the premium or determining whether to accept the risk. This problem places an onerous duty on the assured to volunteer to the insurer every material fact even though the insured only has a slight idea about the mind of a hypothetical prudent insurer. This paper explores the modern approach to revisiting the problem of an insured’s pre-contractual obligation to determine material facts in Nigerian insurance law. The aim is to build upon the change in the structure of insurance contract obligations in other common law jurisdictions such as the United Kingdom. The doctrinal and comparative methodology captures the burden imposed on the insured under the existing Nigerian insurance law. It finds that the continued application of the law leaves the insured in the weakest position, and he stands to lose in a contract supposedly created for his benefit. It is apparent that if this problem remains unresolved, the over-all consequence will contribute to a significant decline in the insurance contract, which may affect the Nigerian economy. The paper aims to evaluate the risks of the continuous application of the traditional law, which does not keep with the pace of modern insurance practice. It will ultimately produce a legally compliant reform, along with a significant deviation from the archaic structure that exists in the Nigerian insurance law. This paper forms part of an on-going PhD research on "The insured’s pre-contractual duty of utmost of utmost good faith". The outcome from the research to date finds that the insured bears the burden of the obligation to act in utmost good faith where it concerns disclosure of material facts.

Keywords: disclosure, materiality, Nigeria, United Kingdom, utmost good faith

Procedia PDF Downloads 114
10861 Influencer Endorsement: Consumer Purchase Intention in Social Media Marketing

Authors: Izian Idris, Melissa Ha, Mikkay Wong

Abstract:

Social media marketing, including influencer marketing, is an ongoing phenomenon, and most companies as well as industries, are finding it crucial to implement social media marketing in their marketing strategies. However, social media influencer marketing still needs to be explored, and further research on this area needs to be carried out to fully understand the importance of social media influencer marketing in impacting consumer purchase decisions. Influencer endorsement has become a trend to grab users’ attention these days. Thus, the aim of this research paper is to explore the attributes of social media influencers/influencer as the endorser that impact consumer purchase intentions. The attributes that will be investigated include attitude homophily, physical attractiveness, and social attractiveness. Following this, the elaboration likelihood model from the theory of persuasion is implemented in this research to further examine the influence of social media influencer attributes on consumer purchase intentions. This study will be able to help marketers, businesses, and researchers understand the attributes of social media influencers as endorsers that will impact consumer purchase intentions and allow businesses to enhance their strategies to better cater to their target market.

Keywords: influencer, endorsement, consumer purchase, social media

Procedia PDF Downloads 77
10860 Science Anxiety Levels in Emirati Pre-Service Teachers

Authors: Martina Dickson, Hanadi Kadbey, Melissa Mcminn

Abstract:

Research has shown that anxiety and trepidation towards learning about science is prevalent among elementary school teachers in Western countries. It has also been shown repeatedly that pre-service and in-service teachers who show signs of anxiety towards science are; a) less likely to teach it at all, where they have some autonomy over this, b) less likely to teach it effectively c) ultimately that their students have lower attainment scores in science. It is therefore critically important to gauge pre-service teachers’ science anxiety levels early on whilst there are still possibilities to overturn some of the reasons behind these fears and avert these serious issues occurring later on. This study takes place in the capital of the United Arab Emirates (U.A.E.) in the context of training local elementary school teachers. In the U.A.E., where Emirati teachers are already in the vast minority and attrition rates are high, it is important to offer as much support to pre-service teachers as possible. If pre-service teachers are graduating with high levels of science anxiety unabated, according to the research there is a very real concern that as generalist primary school teachers, their science teaching will be far from optimal. The aims of this research study were to ascertain the science anxiety levels of pre-service elementary teachers and to identify particular areas of their science anxiety, if appropriate. We surveyed 200 Emirati pre-service teachers and found that levels of science anxiety were directly related to their perceptions of performance in science exams, laboratory experiments and inquiry approaches to science learning. Whilst some studies have shown that science anxiety can decrease as students gain confidence in science knowledge by studying courses, we did not see this effect in our study. This is based upon a theoretical framework which holds that in some cases, science anxiety is related to lack of exposure to, or insecurity with science content itself which in some cases is alleviated by the students’ covering of material and greater confidence in the subject. Exploring this variable allowed us to explore whether students educated in schools influenced by the educational reform in Abu Dhabi have differing science anxiety levels from those who were educated prior to the reforms. We discuss the possible implications of these findings to the future teaching of science in Abu Dhabi public schools.

Keywords: pre-service teachers, science anxiety, United Arab Emirates, educational reform

Procedia PDF Downloads 326
10859 Social Inequality and Inclusion Policies in India: Lessons Learned and the Way Forward

Authors: Usharani Rathinam

Abstract:

Although policies directing inclusion of marginalized were in effect, majority of chronically impoverished in India belonged to schedule caste and schedule tribes. Also, taking into account that poverty is gendered; destitute women belonged to lower social order whose need is not largely highlighted at policy level. This paper discusses on social relations poverty which highlights on how social order that existed structurally in the society can perpetuate chronic poverty, followed by a critical review on social inclusion policies of India, its merits and demerits in addressing chronic poverty. Multiple case study design is utilized to address this concern in four districts of India; Jhansi, Tikamgarh, Cuddalore and Anantapur. These four districts were selected by purposive sampling based on the criteria; the district should either be categorized as a backward district or should have a history of high poverty rate. Qualitative methods including eighty in-depth interviews, six focus group discussions, six social mapping procedures and three key informant interviews were conducted in 2011, at each of the locations. Analysis of the data revealed that irrespective of gender, schedule castes and schedule tribe participants were found to be chronically poor in all districts. Caste based discrimination is exhibited at both micro and macro levels; village and institutional levels. At village level, lower caste respondents had lesser access to public resources. Also, within institutional settings, due to confiscation, unequal access to resources is noticed, especially in fund distribution. This study found that half of the budget intended for schedule caste and schedule tribes were confiscated by upper caste administrative staffs. This implies that power based on social hierarchy marginalize lower caste participants from accessing better economic, social, and political benefits, that had led them to suffer long term poverty. This study also explored the traditional ties between caste, social structure and bonded labour as a cause of long-term poverty. Though equal access is being emphasized in constitutional rights, issues at micro level have not been reflected in formulation of these rights. Therefore, it is significant for a policy to consider the structural complexity and then focus on issues such as equal distribution of assets and infrastructural facilities that will reduce exclusion and foster long-term security in areas such as employment, markets and public distribution.

Keywords: caste, inclusion policies, India, social order

Procedia PDF Downloads 203
10858 Informal Governance as Response to Institutional Paralysis

Authors: Stefanie Kasparek

Abstract:

The United Nations Security Council (UNSC) is probably the most recognized international security organization. It is also profoundly misunderstood and undervalued in its effort to promote peace and security. With the rising involvement of non-state actors and the way states fight wars, international governance has become increasingly complex. However, the formal UNSC agenda has long remained static, reflecting states' unwillingness to entertain more conflicts. Nevertheless, resolutions remain the scholarly measure of states' interests and policies, neglecting the significant share of issues the Council entertains informally. This project builds on a rational institutionalism framework. It provides a systematic analysis of how and under what conditions states use informal governance instead of, or in combination with, formal rules at the agenda-setting stage of the policy process. Data for this project comes from elite interviews and a newly created dataset on governance choices. The results show that counter existing arguments, weaker states successfully circumvent formal institutional roadblocks and use informal governance mechanisms to pursue vital interests, thereby countering institutional restrictions and power asymmetries present informal governance settings.

Keywords: agenda-setting, decision-making, international governance, UNSC

Procedia PDF Downloads 187
10857 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 134
10856 Factors Influencing the Adoption of Social Media as a Medium of Public Service Broadcasting

Authors: Seyed Mohammadbagher Jafari, Izmeera Shiham, Masoud Arianfar

Abstract:

The increased usage of Social media for different uses in turn makes it important to develop an understanding of users and their attitudes toward these sites, and moreover, the uses of such sites in a broader perspective such as broadcasting. This quantitative study addressed the problem of factors influencing the adoption of social media as a medium of public service broadcasting in the Republic of Maldives. These powerful and increasingly usable tools, accompanied by large public social media datasets, are bringing in a golden age of social science by empowering researchers to measure social behavior on a scale never before possible. This was conducted by exploring social responses on the use of social media. Research model was developed based on the previous models such as TAM, DOI and Trust combined model. It evaluates the influence of perceived ease of use, perceived usefulness, trust, complexity, compatibility and relative advantage influence on the adoption of social Media. The model was tested on a sample of 365 Maldivian people using survey method via questionnaire. The result showed that perceived usefulness, trust, relative advantage and complexity would highly influence the adoption of social media.

Keywords: adoption, broadcasting, maldives, social media

Procedia PDF Downloads 478
10855 Locket Application

Authors: Farah Al-Fityani, Aljohara Alsowail, Shatha Bindawood, Heba Balrbeah

Abstract:

Locket is a popular app that lets users share spontaneous photos with a close circle of friends. The app offers a unique way to stay connected with loved ones by allowing users to see glimpses of their day through photos displayed on a widget on their home screen. This summary outlines the process of developing an app like Locket, highlighting the importance of user privacy and security. It also details the findings of a study on user engagement with the Locket app, revealing positive sentiment towards its features and concept but also identifying areas for improvement. Overall, the summary portrays Locket as a successful app that is changing the way people connect on social media.

Keywords: locket, app, machine learning, connect

Procedia PDF Downloads 34
10854 Mobile Cloud Computing: How to Improve

Authors: Abdullah Aljumah, Tariq Ahamad

Abstract:

The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.

Keywords: Cloud Computing, MCC, SAAS, computer interaction

Procedia PDF Downloads 369
10853 Artificial Intelligence and Liability within Healthcare: A South African Analysis

Authors: M. Naidoo

Abstract:

AI in healthcare can have a massive positive effect in low-resource states like South Africa, where patients outnumber personnel greatly. However, the complexity and ‘black box’ aspects of these technologies pose challenges for the liability regimes of states. This is currently being discussed at the international level. This research finds that within the South African medical negligence context, the current common law fault-based inquiry proves to be wholly inadequate for patient redress. As a solution to this, this research paper culminates in legal reform recommendations designed to solve these issues.

Keywords: artificial intelligence, law, liability, policy

Procedia PDF Downloads 110
10852 Teacher Agency in Media Literacy: A Qualitative Study of Bolivian Teachers and Their Room to Manoeuvre

Authors: Daniela Lamaison Sepulveda

Abstract:

Critical media literacy teaches people to think analytically about the information they receive through the media. It is heavily influenced by Paulo Freire’s critical pedagogy and the necessity of becoming conscious of one’s reality in order to transform it. This qualitative research examines the case of Bolivia, which experienced dramatic political change after the first indigenous president, Evo Morales, was elected in 2006. In 2010, the government passed an education reform — the Avelino Siñani Elizardo Pérez (ASEP) —that draws heavily on decolonial thought and the Freirean notion of critical consciousness. The extent to which these theories were implemented in practice is evaluated in context of a media literacy project, run by an NGO, that trains secondary school teachers from public schools across Bolivia through yearly workshops ranging from producing media to identifying fake news. This context is examined against the backdrop of the highly contested general elections in October 2019. While there is plenty of literature that outlines the benefits of teaching media literacy in the classroom and different ways to apply it, little research has been done analysing implementation at an institutional level and how to best enable teachers who are motivated to teach the subject. Through semi-structured interviews, document analysis and naturalistic observations, this study aims to identify the struggles faced by teachers who are dedicated to teaching critical media literacy in their classrooms and how they navigate educational spaces while being subject to a demanding national curriculum that supposedly also seeks to promote critical thinking. The interplay between the aspirations of teachers and NGOs in contrast to the top-down discourse and policy of governmental institutions provides for a very enlightening case. By exploring these institutional, cultural, sociopolitical and economic barriers the teachers face, this research attempts to contribute to the debate in media literacy theories concerned with implementing the practice in schools.

Keywords: media literacy, critical pedagogy, teacher agency, misinformation, education reform, Bolivia

Procedia PDF Downloads 122
10851 The Using of Social Marketing Approach for Conducting Anti-Corruption Campaign: A Review of Literature

Authors: Rosidah Rosidah

Abstract:

The paper aims to identify and examine the effectiveness of social marketing as an approach for conducting anti-corruption campaign. Social marketing has been widely used to promote social change for the benefit of individual and society; such as for promoting healthy foods consumption, encouraging breastfeeding, reducing smoking, solving alcohol problem and drunk driving. Therefore, it is believed that this approach can be promising to be used in anti-corruption campaign. It is because social marketing can be useful of prompting people to act in accordance to the existing norms that denounce corruption, or help to establish new norms that more averse to corruption. It has established into evidence and insight based approaches to social campaign that focus on changing people’s behavior. Qualitative approach will be used in this study, with the using of literature review and secondary data analysis as the research methods. This paper is still on preliminary stage, which its results is expected to provide fundamental basis for designing model of intervention (anti-corruption campaign) using social marketing approaches.

Keywords: anti-corruption campaign, behavioral change, social influence, social marketing

Procedia PDF Downloads 326
10850 Climate Change and Food Security in Nigeria: The World Bank Assisted Third National Fadama Development Programme (Nfdp Iii) Approach in Rivers State, Niger Delta, Nigeria

Authors: Temple Probyne Abali

Abstract:

Port Harcourt, Rivers State in the Niger Delta region of Nigeria is bedeviled by the phenomenon of climatechange, posing threat to food security and livelihood. This study examined a 4 decadel (1980-2020) trend of climate change as well as its socio-economic impact on food security in the region. Furthermore, to achieve sustainable food security and livelihood amidst the phenomenon, the study adopted the World Bank Assisted Third National Fadama Development Programme approach. The data source for climate change involved secondary data from Nigeria Meteorological Agency (NIMET). Consequently, the results for climate change over the 4decade period were displayed in tables, charts and maps for the expected changes. Data sources on socio-economic impact of food security and livelihood were acquired through questionnairedesign. A purposive random sampling technique was used in selecting 5 coastal communities inthe region known for viable economic potentials for agricultural development and the resultswere analyzed using Analysis of Variance (ANOVA). The Participatory Rural Appraisal (PRA) technique of the World Bank for needs assessment wasadopted in selecting 5 agricultural sub-project proposals/activities based on groups’ commoneconomic interest from a total of 1,000 farmers each drawn from the 5 communities of differentage groups including men, women, youths and the vulnerable. Based on the farmers’ sub-projectinterests, the various groups’ Strength, Weakness, Opportunities and Threats (SWOT), Problem Listing Matrix, Skill Gap Analysis as well as EIAson their sub-project proposals/activities were analyzed with substantialMonitoring and Evaluation (M & E), using the Specific, Measurable, Attribute, Reliable and Time bound (SMART)approach. Based on the findings from the PRA technique, the farmers recorded considerableincreaseinincomeofover200%withinthe5yearprojectplan(2008-2013).Thestudyrecommends capacity building and advisory services on this PRA innovation. By so doing, there would be a sustainable increase in agricultural production and assured food security in an environmental friendly manner, in line with the United Nation’s Sustainable Development Goals(SDGs).

Keywords: climate change, food security, fadama, world bank, agriculture, sdgs

Procedia PDF Downloads 86
10849 Analyzing the Perception of Students and Faculty Members on Social Media Use in Academic Activities: A Case Study of Beijing Normal University

Authors: Mcjerry A. Bekoe, Emile Uwamahoro

Abstract:

Social media has become the order of the day, in particular among the youth. It is widely used both formally and informally in the university communities with varied definitions both in the academic circles and in the public domain. In simple terms, it is a media upon which social interactions are carried. In this work social media denote mobile phones, and web-base applications use by students and institutions to construct, partake, and distribute both existing and new information in a digital setting through internet communication. The basic aim of conducting this study was to analyze the perception of students and faculty members Beijing Normal University on social media use in the academic setting and to contribute to the understanding of how university students use social media, the advantages and disadvantages of social media in education. The study was qualitative and employed open-ended interview questions developed to seek students’ perception of the effects of social media and administered based on purposive sampling. Document analysis was also done because of triangulation to ensure validity and reliability. The results show there are positive and negative impacts of social media use depending on how one uses it. Social media have the capability to become a priceless asset to aid their educational communication.

Keywords: academics, high education, interactions, social media

Procedia PDF Downloads 332
10848 Empowering Rangatahi: Amplifying Youth Voices on Smartphone and Social Media Use in Aotearoa New Zealand

Authors: Melissa L Gould

Abstract:

The uptick in social media users during the COVID-19 lockdowns has accelerated concerns about cellphone addiction, cyberbullying, and exposure to harmful content, particularly mis- and disinformation and extremist content. The validity of these concerns is synthesized for media technologists to expose the strategies behind social media and search platform technology and explain why they restrict their children from using it. Banning cell phones in schools, increasing age limits on social media accounts, and putting warning labels on social media are some of the solutions proposed to protect young people from smartphones and social media. Largely missing from these conversations are the voices of young people (rangatahi). Instead, their lived experiences are being told and managed by adults. This presentation will outline my research that amplified the voices and lived experiences of young people by positioning them as experts. Using The Social Dilemma as a discussion prompt, the focus groups of rangatahi in Aotearoa, New Zealand, provide a space for young people to articulate their own lived experiences and respond to the dominant narratives on their generation's use of smartphones and social media.

Keywords: social media, smart phones, young people, social dilemma

Procedia PDF Downloads 23
10847 A Study of Social Media Users’ Switching Behavior

Authors: Chiao-Chen Chang, Yang-Chieh Chin

Abstract:

Social media has created a change in the way the network community is clustered, especially from the location of the community, from the original virtual space to the intertwined network, and thus the communication between people will change from face to face communication to social media-based communication model. However, social media users who have had a fixed engagement may have an intention to switch to another service provider because of the emergence of new forms of social media. For example, some of Facebook or Twitter users switched to Instagram in 2014 because of social media messages or image overloads, and users may seek simpler and instant social media to become their main social networking tool. This study explores the impact of system features overload, information overload, social monitoring concerns, problematic use and privacy concerns as the antecedents on social media fatigue, dissatisfaction, and alternative attractiveness; further influence social media switching. This study also uses the online questionnaire survey method to recover the sample data, and then confirm the factor analysis, path analysis, model fit analysis and mediating analysis with the structural equation model (SEM). Research findings demonstrated that there were significant effects on multiple paths. Based on the research findings, this study puts forward the implications of theory and practice.

Keywords: social media, switching, social media fatigue, alternative attractiveness

Procedia PDF Downloads 136
10846 A Fast, Reliable Technique for Face Recognition Based on Hidden Markov Model

Authors: Sameh Abaza, Mohamed Ibrahim, Tarek Mahmoud

Abstract:

Due to the development in the digital image processing, its wide use in many applications such as medical, security, and others, the need for more accurate techniques that are reliable, fast and robust is vehemently demanded. In the field of security, in particular, speed is of the essence. In this paper, a pattern recognition technique that is based on the use of Hidden Markov Model (HMM), K-means and the Sobel operator method is developed. The proposed technique is proved to be fast with respect to some other techniques that are investigated for comparison. Moreover, it shows its capability of recognizing the normal face (center part) as well as face boundary.

Keywords: HMM, K-Means, Sobel, accuracy, face recognition

Procedia PDF Downloads 326
10845 Privacy Policy Prediction for Uploaded Image on Content Sharing Sites

Authors: Pallavi Mane, Nikita Mankar, Shraddha Mazire, Rasika Pashankar

Abstract:

Content sharing sites are very useful in sharing information and images. However, with the increasing demand of content sharing sites privacy and security concern have also increased. There is need to develop a tool for controlling user access to their shared content. Therefore, we are developing an Adaptive Privacy Policy Prediction (A3P) system which is helpful for users to create privacy settings for their images. We propose the two-level framework which assigns the best available privacy policy for the users images according to users available histories on the site.

Keywords: online information services, prediction, security and protection, web based services

Procedia PDF Downloads 352
10844 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies

Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk

Abstract:

Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.

Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)

Procedia PDF Downloads 82
10843 The Idea of Making of Corporate Social Responsibility Compulsory in India

Authors: Jagannath Mohanty, Shiv Nath Sinha

Abstract:

India is the first country in the world, where spending on Corporate Social Responsibily (CSR) has been made mandatory. Predominantly Indian enterprises have been philanthrophic for hundreds of years, where giving back to the society is the religious duty of the rich. Therefore Indian businesses have been voluntarily spending on CSR activities, while several businesses kept spending on non business activities a significant number of entrepreneurs abstained from social spending, leading Government of India to take the lesgislative route by mandating 2% spend of net profit on CSR activities failing which companeis will be dealt legally. While the legislation on suface appers progressive and pro social, yet the consequences of making a rather volutary action a legally binding act is yet to be seen. This paper examines the possible social impact of the legislation and potential response of the corporate to a legislation of this kind.

Keywords: corporate social responsibility (CSR), companies act 2013, corporate citizenship, social spending

Procedia PDF Downloads 372
10842 Democratization, Market Liberalization and the Raise of Vested Interests and Its Impacts on Anti-Corruption Reform in Indonesia

Authors: Ahmad Khoirul Umam

Abstract:

This paper investigates the role of vested interests and its impacts on anti-corruption agenda in Indonesia following the collapse of authoritarian regime in 1998. A pervasive and rampant corruption has been believed as the main cause of the state economy’s fragility. Hence, anti-corruption measures were implemented by applying democratization and market liberalization since the establishment of a consolidated democracy which go hand in hand with a liberal market economy is convinced to be an efficacious prescription for effective anti-corruption. The reform movement has also mandated the establishment of the independent, neutral and professional special anti-corruption agency namely Corruption Eradication Commission (KPK) to more intensify the fight against the systemic corruption. This paper will examine whether these anti-corruption measures have been effective to combat corruption, and investigate to what extend have the anti-corruption efforts, especially those conducted by KPK, been impeded by the emergence of a nexus of vested interests as the side-effect of democratization and market liberalization. Based on interviews with key stakeholders from KPK, other law enforcement agencies, government, prominent scholars, journalists and NGOs in Indonesia, it is found that since the overthrow of Soeharto, anti-corruption movement in the country have become more active and serious. After gradually winning the hearth of people, KPK successfully touched the untouchable corruption perpetrators who were previously protected by political immunity, legal protection and bureaucratic barriers. However, these changes have not necessarily reduced systemic and structural corruption practices. Ironically, intensive and devastating counterattacks were frequently posed by the alignment of business actors, elites of political parties, government, and also law enforcement agencies by hijacking state’s instruments to make KPK deflated, powerless, and surrender. This paper concludes that attempts of democratization, market liberalization and the establishment of anti-corruption agency may have helped Indonesia to reduce corruption. However, it is still difficult to imply that such anti-corruption measures have fostered the more effective anti-corruption works in the newly democratized and weakly regulated liberal economic system.

Keywords: vested interests, democratization, market liberalization, anti-corruption, Indonesia

Procedia PDF Downloads 226
10841 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security

Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna

Abstract:

Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.

Keywords: cipher text, cryptography, plaintext, raaga

Procedia PDF Downloads 284
10840 The Use of Facebook as a Social Media by Political Parties in the June 7 Election in Konya

Authors: Yasemin Gülşen Yılmaz, Süleyman Hakan Yılmaz, Muhammet Erbay

Abstract:

Social media is among the most important means of communication. Social media offers individuals and groups with an opportunity for participatory socialization over the internet, which is free of any time and place restrictions. Social media is a kind of interactive communication and bilateral social network. Various communication contents can be shared and put into mass circulation easily and quickly through social media. These sharings are not only limited to individuals but also happen to groups, institutions, and different constitutions. Their contents consist of any type of written message, audio and video files. We are living in the social media era now. It is not surprising that social media which has extensive communication facilities and massive prevalence is used in politics. Therefore, the use of social media (Facebook) by political parties during the Turkish general elections held on June 7, 2015, has been chosen as our research subject. Four parties namely, AKP, CHP, MHP and HDP who have the majority of votes in Turkey and participate in elections in Konya have been selected for our study. Their provincial centers’ and parliamentary candidates` use of social media (Facebook) on the last three days prior to the election have been examined and subjected to a qualitative analysis by means of content analysis.

Keywords: social media, June 7 general elections, politics, Facebook

Procedia PDF Downloads 395
10839 Novel Fluorescent High Density Polyethylene Composites for Fused Deposition Modeling 3D Printing in Packaging Security Features

Authors: Youssef R. Hassan, Mohamed S. Hasanin, Reda M. Abdelhameed

Abstract:

Recently, innovations in packaging security features become more important to see the originality of packaging in industrial application. Luminescent 3d printing materials have been a promising property which can provides a unique opportunity for the design and application of 3D printing. Lack emission of terbium ions, as a source of green emission, in salt form prevent its uses in industrial applications, so searching about stable and highly emitter material become essential. Nowadays, metal organic frameworks (MOFs) play an important role in designing light emitter material. In this work, fluorescent high density polyethylene (FHDPE) composite filament with Tb-benzene 1,3,5-tricarboxylate (Tb-BTC) MOFs for 3D printing have been successfully developed.HDPE pellets were mixed with Tb-BTC and melting extrustion with single screw extruders. It was found that Tb-BTCuniformly dispersed in the HDPE matrix and significantly increased the crystallinity of PE, which not only maintained the good thermal property but also improved the mechanical properties of Tb-BTC@HDPE composites. Notably, the composite filaments emitted ultra-bright green light under UV lamp, and the fluorescence intensity increased as the content of Tb-BTC increased. Finally, several brightly luminescent exquisite articles could be manufactured by fused deposition modeling (FDM) 3D printer with these new fluorescent filaments. In this context, the development of novel fluorescent Tb-BTC@HDPE composites was combined with 3D printing technology to amplified the packaging Security Features.

Keywords: 3D printing, fluorescent, packaging, security

Procedia PDF Downloads 92
10838 Towards a Goal-Question-Metric Based Approach to Assess Social Sustainability of Software Systems

Authors: Rahma Amri, Narjès Bellamine Ben Saoud

Abstract:

Sustainable development or sustainability is one of the most urgent issues in actual debate in almost domains. Particularly the significant way the software pervades our live should make it in the center of sustainability concerns. The social aspects of sustainability haven’t been well studied in the context of software systems and still immature research field that needs more interest among researchers’ community. This paper presents a Goal-Question-Metric based approach to assess social sustainability of software systems. The approach is based on a generic social sustainability model taken from Social sciences.

Keywords: software assessment approach, social sustainability, goal-question-metric paradigm, software project metrics

Procedia PDF Downloads 382
10837 Novel Marketing Strategy To Increase Sales Revenue For SMEs Through Social Media

Authors: Kruti Dave

Abstract:

Social media marketing is an essential component of 21st-century business. Social media platforms enable small and medium-sized businesses to enhance brand recognition, generate leads and sales. However, the research on social media marketing is still fragmented and focuses on specific topics, such as effective communication techniques. Since the various ways in which social media impacts individuals and companies alike, the authors of this article focus on the origin, impacts, and current state of Social Media, emphasizing their significance as customer empowerment agents. It illustrates their potential and current responsibilities as part of the corporate business strategy and also suggests several methods to engage them as marketing tools. The focus of social media marketing ranges from defenders to explorers, the culture of Social media marketing encompasses the poles of conservatism and modernity, social media marketing frameworks lie between hierarchies and networks, and its management goes from autocracy to anarchy. This research proposes an integrative framework for small and medium-sized businesses through social media, and the influence of the same will be measured. This strategy will help industry experts to understand this new era. We propose an axiom: Social Media is always a function of marketing as a revenue generator.

Keywords: social media, marketing strategy, media marketing, brand awareness, customer engagement, revenue generator, brand recognition

Procedia PDF Downloads 183
10836 “Friction Surfaces” of Airport Emergency Plan

Authors: Jakub Kraus, Vladimír Plos, Peter Vittek

Abstract:

This article focuses on the issue of airport emergency plans, which are documents describing reactions to events with impact on aviation safety or aviation security. The article specifically focuses on the use and creation of emergency plans, where could be found a number of disagreements between different stakeholders, for which the airport emergency plan applies. Those are the friction surfaces of interfaces, which is necessary to identify and ensure them smooth process to avoid dangerous situations or delay.

Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system, friction surfaces of airport emergency plan, interfaces of processes

Procedia PDF Downloads 513