Search results for: emerging risks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3483

Search results for: emerging risks

2433 Building Knowledge Society: The Imperative Role of Library and Information Centres (LICs) in Developing Countries

Authors: Desmond Chinedu Oparaku, Oyemike Victor Benson, Ifeyinwa A. Ariole

Abstract:

A critical examination of the emerging knowledge society reveals that library and information centres have a significant role to play in the building of knowledge society. The major highlights of this paper include: the conceptual analysis of knowledge society, overview of library and information centres in developing countries, role of libraries and information centre in building up of knowledge society, library and information professionals as factor in building knowledge, challenges faced by Library and Information Centres (LICs) in building knowledge society, strategies for building knowledge society. The position of this paper is that in spite of the influx of varied information and communication technologies in the information industry which is the driving force of knowledge society, there is a dire need for Libraries and Information Centres (LIC) to contribute positively to the migration and transition processes from the information society to knowledge-based society.

Keywords: information and communication technology (ICT), information centres, information industry, information society

Procedia PDF Downloads 371
2432 Exploring Suicidal Behaviors among Transgender and Gender Nonconforming Youth in China

Authors: Krystal Wang, Chongzheng Wei, Runsen Chen, Shufang Sun

Abstract:

Suicide is a global public mental health issue and is the tenth leading cause of death globally. Approximately 75% of suicides occur in low- and middle-income countries (LMIC). Compared to the general population, transgender and gender nonconforming (TGNC) young people have higher suicidal risks. Research has shown that the prevalence of suicidal behaviors among TGNC populations was high in both the United States and China. However, studies were mostly embedded within Western cultures. Limited data and research were available to assess suicidal behaviors among TGNC youth in LMIC countries and to consider various types of TGNC youth. The goal of the current project is to 1) investigate the prevalence of lifetime and past-year suicidal ideations, plans, and attempts among Chinese TGNC youth, 2) explore the relationship between gender identity and suicidal outcomes among TGNC youth in China, 3) identify individual, school, and family level risk and protective factors for suicidal behaviors. The study used data from a cross-sectional survey conducted by Beijing LGBTQ Center in 2021. The survey was the largest TGNC population study in China to understand the health conditions of TGNC individuals. Of the 7612 individuals who completed the survey, a total of 5632 youth (aged 10 to 19) was included in the final analysis. 2259 (40.11%) participants were categorized as transfeminine youth, 1034 (18.36%) as transmasculine youth, 1169 (20.76%) as nonbinary youth AFAB, 568 (10.09%) as nonbinary youth AMAB, 344 (6.11%) as questioning youth AFAB and 258 (4.58%) as questioning youth AMAB. Suicidal behaviors were assessed by asking about lifetime suicidal ideation and attempts, past 12 months suicidal ideation, plan and attempts, and suicidal methods. To achieve the aims, we conducted statistical analysis in Stata/SE 17.0 to 1) describe the prevalence of suicidal outcomes and 2) assess the relationship between gender identity and suicidal outcomes by performing crosstabs, bivariate and multivariate logistic regressions, and adjusting for covariates. The lifetime prevalence of suicidal ideations and attempts for the whole sample was 85.13% and 51.7%. Transfeminine youth had a significantly higher risk for lifetime suicidal ideations (Odds Ratios (OR) = 1.67, CI:1.28,2.18) and attempts than transmasculine youth (OR=1.66, CI: 1.35,2.03), adjusting for age and past year binge drinking, known risk factors of suicide behavior. Past-year prevalence of suicidal behaviors was also high among TGNC youth, with 75.69% in suicidal ideation, 88.77% in suicidal plans, and 57.96% in suicidal attempts. Transfeminine youth, among six subgroups, had the highest risk for past-year suicidal ideations and attempts compared to transmasculine youth. Non-binary youth, regardless of sex assigned at birth, also had a significantly higher risk for suicidal ideations. The prevalence of lifetime and past-year suicidal behaviors was alarming among TGNC youth in China. Among different categories of TGNC youth, transfeminine youth reported the most elevated suicidal risk. The findings indicated a compelling need for researchers and practitioners to address the mental health risks for this specific group and target interventions for TGNC youth in China.

Keywords: child and adolescent mental health, gender minority health, cross-cultural perspective, preventing suicide in youth

Procedia PDF Downloads 73
2431 Name and Essence of “A Pound of Flesh”: On Identity Anxiety in The Merchant of Venice

Authors: Xiu Zhang

Abstract:

The Merchant of Venice focuses on identity anxiety through the contract of “a pound of flesh” and refers to the economic, legal and religious issues related to identity. The development of the emerging capitalist economy in Venetian society prompted Shylock to become a usurer. The social identity of Shylock’s lender enabled him to use the power of money to consolidate the interdependent relationship with Christians and strive for his position and living space in Venetian society. However, there have long been economical and religious conflicts between Jews and Christians. Therefore, in order to take vengeance on Antonio and take his life, so as to revenge the whole Christian society, Shylock insists on taking a pound of Antonio’s flesh in the name of abiding by the contract and the law. The choice of “a pound of flesh” is essentially the representation of human materialization and commercialization under the background of the rise of capitalism and economic transformation. At the same time, it also symbolizes Shylock’s efforts and attempts to reshape himself and his racial identity.

Keywords: merchant of Venice, ethical choices, Shylock, a pound of flesh, identity anxiety

Procedia PDF Downloads 137
2430 Ready Student One! Exploring How to Build a Successful Game-Based Higher Education Course in Virtual Reality

Authors: Robert Jesiolowski, Monique Jesiolowski

Abstract:

Today more than ever before, we have access to new technologies which provide unforeseen opportunities for educators to pursue in online education. It starts with an idea, but that needs to be coupled with the right team of experts willing to take big risks and put in the hard work to build something different. An instructional design team was empowered to reimagine an Introduction to Sociology university course as a Game-Based Learning (GBL) experience utilizing cutting edge Virtual Reality (VR) technology. The result was a collaborative process that resulted in a type of learning based in Game theory, Method of Loci, and VR Immersion Simulations to promote deeper retention of core concepts. The team deconstructed the way that university courses operated, in order to rebuild the educational process in a whole learner-centric manner. In addition to a review of the build process, this paper will explore the results of in-course surveys completed by student participants.

Keywords: higher education, innovation, virtual reality, game-based learning, loci method

Procedia PDF Downloads 90
2429 Parameters Influencing the Output Precision of a Lens-Lens Beam Generator Solar Concentrator

Authors: M. Tawfik, X. Tonnellier, C. Sansom

Abstract:

The Lens-Lens Beam Generator (LLBG) is a Fresnel-based optical concentrating technique which provides flexibility in selecting the solar receiver location compared to conventional techniques through generating a powerful concentrated collimated solar beam. In order to achieve that, two successive lenses are used and followed by a flat mirror. Hence the generated beam emerging from the LLBG has a high power flux which impinges on the target receiver, it is important to determine the precision of the system output. In this present work, mathematical investigation of different parameters affecting the precision of the output beam is carried out. These parameters include: Deflection in sun-facing lens and its holding arm, delay in updating the solar tracking system, and the flat mirror surface flatness. Moreover, relationships that describe the power lost due to the effect of each parameter are derived in this study.

Keywords: Fresnel lens, LLBG, solar concentrator, solar tracking

Procedia PDF Downloads 213
2428 Visualize Global Warming and Its Consequences Using Augmented Reality

Authors: K. R. Parvathy, R. Rao Bhavani , M. L. McLain, Kamal Bijlani, R. Jayakrishnan

Abstract:

Augmented Reality (AR) technology is considered to be an important emerging technology used in education today. One potentially key use of AR in education is to teach socio-scientific issues (SSI), topics that inure students towards social conscience and critical thinking. This work uses multiple markers and virtual buttons that interact with each other, creating a life-like visual spectacle. Learning about issues such as global warming by using AR technology, students will have an increased sense of experiencing immersion, immediacy, and presence, thereby enhancing their learning as well as likely improving their ability to make better informed decisions about considerations of such issues. Another advantage of AR is that it is a low cost technology, making it advantageous for educators to adapt to their classrooms. Also in this work we compare the effectiveness of AR versus ordinary video by polling a group of students to assess the content understandability, effectiveness and interaction of both the delivery methods.

Keywords: augmented reality, global warming, multiple markers, virtual buttons

Procedia PDF Downloads 398
2427 A Review on Modeling and Optimization of Integration of Renewable Energy Resources (RER) for Minimum Energy Cost, Minimum CO₂ Emissions and Sustainable Development, in Recent Years

Authors: M. M. Wagh, V. V. Kulkarni

Abstract:

The rising economic activities, growing population and improving living standards of world have led to a steady growth in its appetite for quality and quantity of energy services. As the economy expands the electricity demand is going to grow further, increasing the challenges of the more generation and stresses on the utility grids. Appropriate energy model will help in proper utilization of the locally available renewable energy sources such as solar, wind, biomass, small hydro etc. to integrate in the available grid, reducing the investments in energy infrastructure. Further to these new technologies like smart grids, decentralized energy planning, energy management practices, energy efficiency are emerging. In this paper, the attempt has been made to study and review the recent energy planning models, energy forecasting models, and renewable energy integration models. In addition, various modeling techniques and tools are reviewed and discussed.

Keywords: energy modeling, integration of renewable energy, energy modeling tools, energy modeling techniques

Procedia PDF Downloads 340
2426 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 199
2425 Financial Portfolio Optimization in Electricity Markets: Evaluation via Sharpe Ratio

Authors: F. Gökgöz, M. E. Atmaca

Abstract:

Electricity plays an indispensable role in human life and the economy. It is a unique product or service that must be balanced instantaneously, as electricity is not stored, generation and consumption should be proportional. Effective and efficient use of electricity is very important not only for society, but also for the environment. A competitive electricity market is one of the best ways to provide a suitable platform for effective and efficient use of electricity. On the other hand, it carries some risks that should be carefully managed by the market players. Risk management is an essential part in market players’ decision making. In this paper, risk management through diversification is applied with the help of Markowitz’s Mean-variance, Down-side and Semi-variance methods for a case study. Performance of optimal electricity sale solutions are measured and evaluated via Sharpe-Ratio, and the optimal portfolio solutions are improved. Two years of historical weekdays’ price data of the Turkish Day Ahead Market are used to demonstrate the approach.

Keywords: electricity market, portfolio optimization, risk management in electricity market, sharpe ratio

Procedia PDF Downloads 360
2424 Effect of Low Level Laser Therapy versus Ultrasound on Musculoskeletal Conditions

Authors: Andrew Anis Fakhrey Mosaad

Abstract:

This Musculoskeletal (MSK) conditions are a major contributing factor in disability. This becomes more challenging as the world population is witnessing an increase in the geriatric population. Various treatment strategies are being researched to provide the most effective and non-invasive approach. To date, low-level laser therapy (LLLT) is one of the emerging modalities to treat different musculoskeletal conditions in physical therapy practice. Physical therapy practice uses different modalities to control pain and inflammation. LLLT has been under research for the last two decades and has shown varying results. This literature review focuses on the effectiveness of LLLT in different musculoskeletal conditions. Using search engines of PubMed and Google Scholar, a number of articles have been reviewed based on the inclusion and exclusion criteria. LLLT shows promising results in treating different musculoskeletal conditions. However, clinicians need to ensure to follow the recommended dosage parameters for specific musculoskeletal conditions.

Keywords: musculoskeletal conditions, low level laser therapy, ultrasound, wavelength, pain and inflammation

Procedia PDF Downloads 105
2423 Detection of Adulterants in Milk Using IoT

Authors: Shaik Mohammad Samiullah Shariff, Siva Sreenath, Sai Haripriya, Prathyusha, M. Padma Lalitha

Abstract:

The Internet of Things (IoT) is the emerging technology that has been utilized to extend the possibilities for smart dairy farming (SDF). Milk consumption is continually increasing due to the world's growing population. As a result, some providers are prone to using dishonest measures to close the supply-demand imbalance, such as adding adulterants to milk. To identify the presence of adulterants in milk, traditional testing methods necessitate the use of particular chemicals and equipment. While efficient, this method has the disadvantage of yielding difficult and time-consuming qualitative results. Furthermore, same milk sample cannot be tested for other adulterants later. As a result, this study proposes an IoT-based approach for identifying adulterants in milk by measuring electrical conductivity (EC) or Total Dissolved Solids (TDS) and PH. In order to achieve this, an Arduino UNO microcontroller is used to assess the contaminants. When there is no adulteration, the pH and TDS values of milk range from 6.45 to 6.67 and 750 to 780ppm, respectively, according to this study. Finally, the data is uploaded to the cloud via an IoT device attached to the Ubidot web platform.

Keywords: internet of things (IoT), pH sensor, TDS sensor, EC sensor, industry 4.0

Procedia PDF Downloads 76
2422 India’s Role in Afghanistan in the Post 9/11 Era

Authors: Fayiz Saifurahman

Abstract:

Afghanistan's geopolitically and geo-strategically location has remained the attention of Indian policy. On 11 September 2001, the terrorist attacks in the United States and the announcement of the United States, fight for international war against the Taliban in November 2001 provided India a chance to pursue its foreign policy goals of achieving a good position in the region and emerging as an international power. Therefore, post-9/11, India strengthened its efforts to re-establish its power in Afghanistan. The objectives of this study are to study the India-Afghanistan relation in the post 9/11 and to discuss the initial role of India in Afghanistan. The research method was conducted on a qualitative method based on descriptive. The research findings propose that; Indian foreign policy should be analyzed and increase its soft power. Afghanistan has definitely provided a significant occasion for India to increase its power in Afghanistan. In this linkage, Indian determinations have been to intrude all parts in Afghanistan to make them reliant on Indian cooperation.

Keywords: Afghanistan, war, power, policy.

Procedia PDF Downloads 230
2421 The Nexus between Counter Terrorism and Human Rights with a Perspective on Cyber Terrorism

Authors: Allan Munyao Mukuki

Abstract:

The nexus between terrorism and human rights has become a big challenge in the fight against terrorism globally. This is hinged on the fact that terrorism and human rights are interrelated to the extent that, when the former starts, the latter is violated. This direct linkage was recognised in the Vienna Declaration and Programme of Action as adopted by the World Conference on Human Rights in Vienna on 25 June 1993 which agreed that acts of terrorism in all its forms and manifestations are aimed at the destruction of human rights. Hence, terrorism constitutes an assault on our most basic human rights. To this end, the first part of this paper will focus on the nexus between terrorism and human rights and endeavors to draw a co-relation between these two concepts. The second part thereafter will analyse the emerging concept of cyber-terrorism and how it takes place. Further, an analysis of cyber counter-terrorism balanced as against human rights will also be undertaken. This will be done through the analysis of the concept of ‘securitisation’ of human rights as well as the need to create a balance between counterterrorism efforts as against the protection of human rights at all costs. The paper will then concludes with recommendations on how to balance counter-terrorism and human rights in the modern age.

Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation

Procedia PDF Downloads 398
2420 Traced Destinies: A Study on the Migration of Brazilian Children for Switzerland

Authors: Flavia Schuler Gomes, Cristina Brito Dias, Emily Schuler

Abstract:

One of the emerging themes in modern society is migration. What in the past was a route mostly traveled by men, is currently carried out by women and even children. In this sense, the objective of this research was to understand the experiences and repercussions of the migration in the life of young Brazilians who went to Switzerland. The specific objectives were: to know the causes and consequences of migration; how was the adaptation in the country in emotional and educational terms; as how the interviewees feel the impact of living with two cultures simultaneously. The research had a qualitative methodology. The participants were eight young men and women, between the ages of 18 and 25, who migrated to Switzerland as a child. The instrument used was interview technique of life history. The collected data were analyzed through the thematic content analysis. The results indicate that the young people migrated to accompany their mothers; in terms of nationality, two participants feel completely Swiss, and six believe they share Swiss and Brazilian aspects. None of the participants followed an academic career, having secondary education.

Keywords: adaptation, children, culture, migration

Procedia PDF Downloads 175
2419 Islamic Equity Markets Response to Volatility of Bitcoin

Authors: Zakaria S. G. Hegazy, Walid M. A. Ahmed

Abstract:

This paper examines the dependence structure of Islamic stock markets on Bitcoin’s realized volatility components in bear, normal, and bull market periods. A quantile regression approach is employed, after adjusting raw returns with respect to a broad set of relevant global factors and accounting for structural breaks in the data. The results reveal that upside volatility tends to exert negative influences on Islamic developed-market returns more in bear than in bull market conditions, while downside volatility positively affects returns during bear and bull conditions. For emerging markets, we find that the upside (downside) component exerts lagged negative (positive) effects on returns in bear (all) market regimes. By and large, the dependence structures turn out to be asymmetric. Our evidence provides essential implications for investors.

Keywords: cryptocurrency markets, bitcoin, realized volatility measures, asymmetry, quantile regression

Procedia PDF Downloads 183
2418 Health and Greenhouse Gas Emission Implications of Reducing Meat Intakes in Hong Kong

Authors: Cynthia Sau Chun Yip, Richard Fielding

Abstract:

High meat and especially red meat intakes are significantly and positively associated with a multiple burden of diseases and also high greenhouse gas (GHG) emissions. This study investigated population meat intake patterns in Hong Kong. It quantified the burden of disease and GHG emission outcomes by modeling to adjust Hong Kong population meat intakes to recommended healthy levels. It compared age- and sex-specific population meat, fruit and vegetable intakes obtained from a population survey among adults aged 20 years and over in Hong Kong in 2005-2007, against intake recommendations suggested in the Modelling System to Inform the Revision of the Australian Guide to Healthy Eating (AGHE-2011-MS) technical document. This study found that meat and meat alternatives, especially red meat intakes among Hong Kong males aged 20+ years and over are significantly higher than recommended. Red meat intakes among females aged 50-69 years and other meat and alternatives intakes among aged 20-59 years are also higher than recommended. Taking the 2005-07 age- and sex-specific population meat intake as baselines, three counterfactual scenarios of adjusting Hong Kong adult population meat intakes to AGHE-2011-MS and Pre-2011 AGHE recommendations by the year 2030 were established. Consequent energy intake gaps were substituted with additional legume, fruit and vegetable intakes. To quantify the consequent GHG emission outcomes associated with Hong Kong meat intakes, Cradle-to-ready-to-eat lifecycle assessment emission outcome modelling was used. Comparative risk assessment of burden of disease model was used to quantify the health outcomes. This study found adjusting meat intakes to recommended levels could reduce Hong Kong GHG emission by 17%-44% when compared against baseline meat intake emissions, and prevent 2,519 to 7,012 premature deaths in males and 53 to 1,342 in females, as well as multiple burden of diseases when compared to the baseline meat intake scenario. Comparing lump sum meat intake reduction and outcome measures across the entire population, and using emission factors, and relative risks from individual studies in previous co-benefit studies, this study used age- and sex-specific input and output measures, emission factors and relative risks obtained from high quality meta-analysis and meta-review respectively, and has taken government dietary recommendations into account. Hence evaluations in this study are of better quality and more reflective of real life practices. Further to previous co-benefit studies, this study pinpointed age- and sex-specific population and meat-type-specific intervention points and leverages. When compared with similar studies in Australia, this study also showed that intervention points and leverages among populations in different geographic and cultural background could be different, and that globalization also globalizes meat consumption emission effects. More regional and cultural specific evaluations are recommended to promote more sustainable meat consumption and enhance global food security.

Keywords: burden of diseases, greenhouse gas emissions, Hong Kong diet, sustainable meat consumption

Procedia PDF Downloads 308
2417 Investigation on Properties and Applications of Graphene as Single Layer of Carbon Atoms

Authors: Ali Ashjaran

Abstract:

Graphene is undoubtedly emerging as one of the most promising materials because of its unique combination of superb properties, which opens a way for its exploitation in a wide spectrum of applications ranging from electronics to optics, sensors, and biodevices. In addition, Graphene-based nanomaterials have many promising applications in energy-related areas. Graphene a single layer of carbon atoms, combines several exceptional properties, which makes it uniquely suited as a coating material: transparency, excellent mechanical stability, low chemical reactivity, Optical, impermeability to most gases, flexibility, and very high thermal and electrical conductivity. Graphene is a material that can be utilized in numerous disciplines including, but not limited to: bioengineering, composite materials, energy technology and nanotechnology, biological engineering, optical electronics, ultrafiltration, photovoltaic cells. This review aims to provide an overiew of graphene structure, properties and some applications.

Keywords: graphene, carbon, anti corrosion, optical and electrical properties, sensors

Procedia PDF Downloads 273
2416 Iran’s Dual Geopolitical Approach towards African States

Authors: Dragos Ardeleanu, Silviu-Valentin Petre

Abstract:

Written to satisfy the needs of Western powers, classical geopolitics bore the stint of Eurocentrism. Both Mackinder’s heartland and Nicholas Spykman’s rimland were intellectual creations set for the purpose of the Anglophone nations dealing with Eurasia. However, while today’s world is moving towards multipolarity, other emerging regional actors are following their own interests using a different geospatial map. Such is the case of Iran which has developed an engagement pattern in Africa, directed mostly towards costal states, in order to break the rimland grip of Arab states and also the international pressure established against Tehran’s nascent nuclear program. Capitalizing on literature review and analysing statements from key public figures, our paper argues that Iranian African geopolitics displays a dual message: on the one hand, it uses tiers-mondiste rhetoric to garner the support of different coastal African states and, on the other hand, it employs Shiism to gain a foothold in strategic parts of the black continent.

Keywords: African geopolitics, Iran, Shiism, tiers-mondisme

Procedia PDF Downloads 214
2415 Management of Intellectual Property Rights: Strategic Patenting

Authors: Waheed Oseni

Abstract:

This article reviews emergent global trends in intellectual property protection and identifies patenting as a strategic initiative. Recent developments in software and method of doing business patenting are fast transforming the e‐business landscape. The article discusses the emergent global regulatory framework concerning intellectual property rights and the strategic value of patenting. Important features of a corporate patenting portfolio are described. Superficially, the e‐commerce landscape appears to be dominated by dotcom start-ups or the “dotcomization” of existing brick and mortar companies. But, in reality, at its very bedrock is intellectual property (IP). In this connection, the recent avalanche of patenting of software and method‐of‐doing‐business (MDB) in the USA is a very significant development with regard to rules governing IP rights and, therefore, e‐commerce. Together with the World Trade Organization’s (WTO) IP rules, there is an emerging global regulatory framework for IP rights, an understanding of which is necessary for designing effective e‐commerce strategies.

Keywords: intellectual property, patents, methods, computer software

Procedia PDF Downloads 523
2414 The Analysis of Computer Crimes Act 1997 in the Circumvention and Prevention of Computer Crimes in Malaysia

Authors: Nooraneda Mutalip Laidey

Abstract:

Computer Crimes Act 1997 (CCA 1997) was conceded by Malaysia’s legislative body in 1997 and the Act was enforced in June 2000. The purpose of CCA 1997 is to provide for offences related to misuse of computers such as hacking, cracking and phishing. CCA 1997 was modelled after United Kingdom’s Computer Misuses Act 1990 as a response to the emerging computer crimes. This legislation is divided into three parts and 12 Sections. The first part outlines preliminary matters that include short title and relevant definitions, second part provides for the offenses related to misuse of computers and specifies penalties for each offences, and the last part deals with ancillary provisions such as jurisdictional and investigational issues of cybercrime. The main objective of this paper is to discuss the development of computer crimes and its deterrence in Malaysia. Specific sections of CCA 1997 will be analysed in details and detail assessment on the prevention and prosecution of computer crimes in Malaysia will be accessed to determine whether CCA 1997 is so far adequate in preventing computer crimes in Malaysia.

Keywords: computer, computer crimes, CCA 1997, circumvention, deterrence

Procedia PDF Downloads 336
2413 Individualism/Collectivism and Extended Theory of Planned Behavior

Authors: Ela Ari, Aysi̇ma Findikoglu

Abstract:

Consumers’ switching GSM operators’ has been an important research issue since the rise of their competitive offers. Recent research has looked at consumer switching behavior through the theory of planned behavior, but not yet extended the theory with identity, psycho-social and cultural influences within the service context. This research explores an extended version of the theory of planned behavior including social and financial risks and brand loyalty. Moreover, the role of individualism and collectivism at the individual level is investigated in a collectivistic culture that moves toward to individualism due to changing family relationships, use of technology and education. Our preliminary analysis showed that financial risk and vertical individualism prove to be a significant determinant of intention to switch. The study also investigates social risk and intention, subjective norm, perceived behavioral control relationship. The effect of individualism and collectivism and attitudes relationship has been also examined within a service industry. Implications for marketing managers and scholars are also discussed.

Keywords: attitude, individualism, intention, subjective norm

Procedia PDF Downloads 454
2412 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 84
2411 Investigating the Expression of NR1/NR2 Receptors in Boys Between 6 to 16 with ADHD Compared to a Healthy Controlled Group

Authors: Sajad Haghshenas

Abstract:

Emerging evidence from clinical, genetic, and animal model studies suggests that the N-methyl-D-aspartate (NMDA) glutamate receptors (NMDAR) may contribute to the pathophysiology and aetiology of neurological and psychiatric disorders and the patients with impaired NMDR receptors experience psychological symptoms. Therefore, we hypothesised that NMDAR receptors play a key role in the development of attention deficit hyperactivity disorder (ADHD). In this comparative analytical study, we utilized western blotting method to assay the expression levels of NMDA subunits NR1 and NR2 in the blood plasma of 50 male individuals diagnosed with ADHD in comparison to 20 healthy controls. The findings from the western blotting analysis provide support for the hypothesis that individuals with ADHD exhibit significantly lower levels of NR1/2 receptors compared to those without the disorder. Further research is needed to explore the potential causal relationship between reduced NR1/NR2 receptor levels and the development of ADHD.

Keywords: expression, glutamate receptors, NR1, NR2, ADHD

Procedia PDF Downloads 70
2410 Impact on Soil Irrigated with Municipal and Industrial Wastewater from Korangi Drain near IoBM, Karachi

Authors: Farhan Ali

Abstract:

Use of wastewater for growing vegetables has become a common practice around big cities. Wastewater contains organic material and inorganic elements essential for plant growth but also contain heavy metals, which may be lethal for animals and humans if their concentration increases than permissible limit. To monitor this situation, a survey was conducted to ascertain the addition of heavy metals into agricultural fields through wastewater irrigation and their translocation in to the edible parts of the vegetables. The study highlighted that there is a large accumulation of heavy metals in the soil, which is irrigated with industrial wastewater Laden and people consume vegetables grown in soil irrigated with sewage water to absorb a large amount of these metals. This accumulation of heavy metals in food cause possible health risks for the consumer. Regular monitoring of the levels of pathogens and heavy metals from the waste water drain which effluent are used for growing vegetables and other foodstuffs is essential to monitor excessive accumulation of these metals in the food chain.

Keywords: pathogens, wastewater, concentration, effluent

Procedia PDF Downloads 293
2409 The Roles of Pay Satisfaction and Intent to Leave on Counterproductive Work Behavior among Non-Academic University Employees

Authors: Abiodun Musbau Lawal, Sunday Samson Babalola, Uzor Friday Ordu

Abstract:

Issue of employees counterproductive work behavior in government owned organization in emerging economies has continued to be a major concern. This study investigated the factors of pay satisfaction, intent to leave and age as predictors of counterproductive work behavior among non-academic employee in a Nigerian federal government owned university. A sample of 200 non-academic employees completed questionnaires. Hierarchical multiple regression was conducted to determine the contribution of each of the predictor variables on the criterion variable on counterproductive work behavior. Results indicate that age of participants (β = -.18; p < .05) significantly independently predicted CWB by accounting for 3% of the explained variance. Addition of pay satisfaction (β = -.14; p < .05) significantly accounted for 5% of the explained variance, while intent to leave (β = -.17; p < .05) further resulted in 8% of the explained variance in counterproductive work behavior. The importance of these findings with regards to reduction in counterproductive work behavior is highlighted.

Keywords: counterproductive, work behaviour, pay satisfaction, intent to leave

Procedia PDF Downloads 376
2408 Molding Properties of Cobalt-Chrome-Based Feedstocks Used in Low-Pressure Powder Injection Molding

Authors: Ehsan Gholami, Vincent Demers

Abstract:

Low-pressure powder injection molding is an emerging technology for cost-effectively producing complex shape metallic parts with the proper dimensional tolerances, either in high or in low production volumes. In this study, the molding properties of cobalt-chrome-based feedstocks were evaluated for use in a low-pressure powder injection molding process. The rheological properties of feedstock formulations were obtained by mixing metallic powder with a proprietary wax-based binder system. Rheological parameters such as reference viscosity, shear rate sensitivity index, and activation energy for viscous flow, were extracted from the viscosity profiles and introduced into the Weir model to calculate the moldability index. Feedstocks were experimentally injected into a spiral mold cavity to validate the injection performance calculated with the model.

Keywords: binder, feedstock, moldability, powder injection molding, viscosity

Procedia PDF Downloads 271
2407 Cooperative Spectrum Sensing Using Hybrid IWO/PSO Algorithm in Cognitive Radio Networks

Authors: Deepa Das, Susmita Das

Abstract:

Cognitive Radio (CR) is an emerging technology to combat the spectrum scarcity issues. This is achieved by consistently sensing the spectrum, and detecting the under-utilized frequency bands without causing undue interference to the primary user (PU). In soft decision fusion (SDF) based cooperative spectrum sensing, various evolutionary algorithms have been discussed, which optimize the weight coefficient vector for maximizing the detection performance. In this paper, we propose the hybrid invasive weed optimization and particle swarm optimization (IWO/PSO) algorithm as a fast and global optimization method, which improves the detection probability with a lesser sensing time. Then, the efficiency of this algorithm is compared with the standard invasive weed optimization (IWO), particle swarm optimization (PSO), genetic algorithm (GA) and other conventional SDF based methods on the basis of convergence and detection probability.

Keywords: cognitive radio, spectrum sensing, soft decision fusion, GA, PSO, IWO, hybrid IWO/PSO

Procedia PDF Downloads 464
2406 Peer-To-Peer Lending and Macroeconomics: Searching for a Link

Authors: Asror Nigmonov Asqar Ogli, Sitora Inoyatova Amonovna

Abstract:

It has been a decade when the crowdfunding and P2P lending opportunities were created. Today, the market of these modern alternative investments is becoming increasingly complex to navigate. There are overwhelming amount of peer-to-peer lending platforms both in developed and emerging economies. This study looks into this market via the cross country empirical study. In this respect, it tests the effect of various macroeconomic factors on P2P loan lending. Based on the existing literature that largely lacks empirical investigations, it builds regression model that aims to explore the relationship between economy and P2P lending. Though the author found it extremely difficult to compare the findings with earlier studies, this paper had identified certain tendencies in the data and had certain policy implications. However, the paper could not find any significant effect of economic variables on P2P lending. The paper can be considered as a starting point in empirical investigation of P2P lending and highlights room further research based on limitations of the study.

Keywords: peer-to-peer lending, crowdfunding, marketplace lending, alternative finance, fintech

Procedia PDF Downloads 191
2405 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 86
2404 Users’ Information Disclosure Determinants in Social Networking Sites: A Systematic Literature Review

Authors: Wajdan Al Malwi, Karen Renaud, Lewis Mackenzie

Abstract:

The privacy paradox describes a phenomenon whereby there is no connection between stated privacy concerns and privacy behaviours. We need to understand the underlying reasons for this paradox if we are to help users to preserve their privacy more effectively. In particular, the Social Networking System (SNS) domain offers a rich area of investigation due to the risks of unwise information disclosure decisions. Our study thus aims to untangle the complicated nature and underlying mechanisms of online privacy-related decisions in SNSs. In this paper, we report on the findings of a Systematic Literature Review (SLR) that revealed a number of factors that are likely to influence online privacy decisions. Our deductive analysis approach was informed by Communicative Privacy Management (CPM) theory. We uncovered a lack of clarity around privacy attitudes and their link to behaviours, which makes it challenging to design privacy-protecting SNS platforms and to craft legislation to ensure that users’ privacy is preserved.

Keywords: privacy paradox, self-disclosure, privacy attitude, privacy behavior, social networking sites

Procedia PDF Downloads 151