Search results for: internet of things vulnerabilities
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2316

Search results for: internet of things vulnerabilities

1266 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 138
1265 The Challenges of Security Sector Governance in West African Democracies-The Ecowas Response Mechanism

Authors: Adamu Buba

Abstract:

As West Africa gradually recovers from the cost of more than a decade of civil conflicts in Liberia, Sierra Leone and Côte d’Ivoire, ECOWAS has continued to place prominence on peace consolidation and the prevention of conflict in the West African Sub-Region. Of particular interest is the recent political uprising in Mali and in this regard, ECOWAS has been repositioning their existing machineries to manage this dispensation more effectively by improving their early warning and mediation capabilities. This paper firstly seeks among other things to provide a conceptual understanding of what security sector governance is, and also highlight the overview of ECOWAS and to closely examine the benchmark for assessing progress in the promotion of democracy and political governance within the sub-region as well as conflict prevention techniques. The views and analysis expressed in this paper is based on secondary method of data collection alone and do not in any way represent the views of the institutions or their representatives involved in this assignment in one way or the other.

Keywords: challenges, security, governance, ecowas, response

Procedia PDF Downloads 248
1264 A Method for Allocation of Smart Intersections Using Traffic Information

Authors: Sang-Tae Ji, Jeong-Woo Park, Jun-Ho Park, Kwang-Woo Nam

Abstract:

This study aims is to suggest the basic factors by considering the priority of intersection in the diffusion project of Smart intersection. Busan Metropolitan City is conducting a smart intersection project for efficient traffic management. The smart intersection project aims to make breakthrough improvement of the intersection congestion by optimizing the signal system using CCTV (closed-circuit television camera) image analysis technology. This study investigated trends of existing researches and analyzed by setting three things of traffic volume, characteristics of intersection road, and whether or not to conduct the main arterial road as factors for selecting new intersection when spreading smart intersection. Using this, we presented the priority of the newly installed intersection through the present situation and analysis for the Busan Metropolitan City which is the main destination of the spreading project of the smart intersection. The results of this study can be used as a consideration in the implementation of smart intersection business.

Keywords: CCTV, GIS, ICT, Smart City, smart intersection

Procedia PDF Downloads 382
1263 The Application on Interactivity of Light in New Media Art

Authors: Yansong Chen

Abstract:

In the age of media convergence, new media technology is constantly impacting, changing, and even reshaping the limits of Art. From the technological ontology of the new media art, the concept of interaction design has always been dominated by I/O (Input/Output) systems through the ages, which ignores the content of systems and kills the aura of art. Light, as a fusion media, basically comes from the extension of some human feelings and can be the content of the input or the effect of output. In this paper, firstly, on the basis of literature review, the interaction characteristics research was conducted on light. Secondly, starting from discourse patterns of people and machines, people and people, people, and imagining things, we propose three light modes: object-oriented interaction, Immersion interaction, Tele-Presence interaction. Finally, this paper explains how to regain the aura of art through light elements in new media art and understand multiple levels of 'Interaction design'. In addition, the new media art, especially the light-based interaction art, enriches the language patterns and motivates emerging art forms to be more widespread and popular, which achieves its aesthetics growth.

Keywords: new media art, interaction design, light art, immersion

Procedia PDF Downloads 232
1262 “I” on the Web: Social Penetration Theory Revised

Authors: Dr. Dionysis Panos Dpt. Communication, Internet Studies Cyprus University of Technology

Abstract:

The widespread use of New Media and particularly Social Media, through fixed or mobile devices, has changed in a staggering way our perception about what is “intimate" and "safe" and what is not, in interpersonal communication and social relationships. The distribution of self and identity-related information in communication now evolves under new and different conditions and contexts. Consequently, this new framework forces us to rethink processes and mechanisms, such as what "exposure" means in interpersonal communication contexts, how the distinction between the "private" and the "public" nature of information is being negotiated online, how the "audiences" we interact with are understood and constructed. Drawing from an interdisciplinary perspective that combines sociology, communication psychology, media theory, new media and social networks research, as well as from the empirical findings of a longitudinal comparative research, this work proposes an integrative model for comprehending mechanisms of personal information management in interpersonal communication, which can be applied to both types of online (Computer-Mediated) and offline (Face-To-Face) communication. The presentation is based on conclusions drawn from a longitudinal qualitative research study with 458 new media users from 24 countries for almost over a decade. Some of these main conclusions include: (1) There is a clear and evidenced shift in users’ perception about the degree of "security" and "familiarity" of the Web, between the pre- and the post- Web 2.0 era. The role of Social Media in this shift was catalytic. (2) Basic Web 2.0 applications changed dramatically the nature of the Internet itself, transforming it from a place reserved for “elite users / technical knowledge keepers" into a place of "open sociability” for anyone. (3) Web 2.0 and Social Media brought about a significant change in the concept of “audience” we address in interpersonal communication. The previous "general and unknown audience" of personal home pages, converted into an "individual & personal" audience chosen by the user under various criteria. (4) The way we negotiate the nature of 'private' and 'public' of the Personal Information, has changed in a fundamental way. (5) The different features of the mediated environment of online communication and the critical changes occurred since the Web 2.0 advance, lead to the need of reconsideration and updating the theoretical models and analysis tools we use in our effort to comprehend the mechanisms of interpersonal communication and personal information management. Therefore, is proposed here a new model for understanding the way interpersonal communication evolves, based on a revision of social penetration theory.

Keywords: new media, interpersonal communication, social penetration theory, communication exposure, private information, public information

Procedia PDF Downloads 366
1261 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 91
1260 Risk Management and Resiliency: Evaluating Walmart’s Global Supply Chain Leadership Using the Supply Chain Resilience Assessment and Management Framework

Authors: Meghan Biallas, Amanda Hoffman, Tamara Miller, Kimmy Schnibben, Janaina Siegler

Abstract:

This paper assesses Walmart’s supply chain resiliency amidst continuous supply chain disruptions. It aims to evaluate how Walmart can use supply chain resiliency theory to retain its status as a global supply chain leader. The Bloomberg terminal was used to organize Walmart’s 754 Tier-1 suppliers by the size of their relationship to Walmart. Additional data from IBISWorld and Statista was also used in the analysis. This research focused on the top ten Tier-1 suppliers, with the greatest percentage of their revenue attributed to Walmart. This paper also applied the firm’s information to the Supply Chain Resilience Assessment and Management (SCRAM) framework for supply chain resiliency to evaluate the firm’s capabilities, vulnerabilities, and gaps. A rubric was created to quantify Walmart’s risks using four pillars: flexibility, velocity, visibility, and collaboration. Information and examples were reported from Walmart’s 10k filing. For each example, a rating of 1 indicated “high” resiliency, 0 indicated “medium” resiliency, and -1 indicated “low” resiliency. Findings from this study include the following: (1) Walmart has maintained its leadership through its ability to remain resilient with regard to visibility, efficiency, capacity, and collaboration. (2) Walmart is experiencing increases in supply chain costs due to internal factors affecting the company and external factors affecting its suppliers. (3) There are a number of emerging supply chain risks with Walmart’s suppliers, which could cause issues for Walmart to remain a supply chain leader in the future. Using the SCRAM framework, this paper assesses how Walmart measures up to the Supply Chain Resiliency Theory, identifying areas of strength as well as areas where Walmart can improve in order to remain a global supply chain leader.

Keywords: supply chain resiliency, zone of balanced resilience, supply chain resilience assessment and management, supply chain theory.

Procedia PDF Downloads 117
1259 Premarital Sex, HIV and Use of Condom among Youths in Nigeria

Authors: Okechukwu Odinaka Ajaegbu

Abstract:

In the recent past, discussing about sex among children and youths was frowned at by traditional norms and as such sexual discussions and behavior were approached with great respect. Things are actually falling apart with the increasing number of young people that engage in premarital sex. Due to lack of experience and sex education, many young people are becoming increasingly exposed to the risk of HIV infection. In the light of the above, this study discussed premarital sex, HIV and use of condom among youths in Nigeria. Data for this study came from 2013 Nigeria Demographic and Health Survey and other secondary data. The survey revealed that only 18.5 percent of young women that had sex in the 12 months preceding the survey used condom. Out of 3306 never-married sexually active men and women, 1728 representing 52 percent live in urban areas and 43 percent of them did not use condom during sexual intercourse in the 12 months preceding the survey. This study concludes that for there to be reduction in prevalence of HIV/AIDS among Nigerian youths, there is need for concerted effort to be made towards educating youths on the expedient of the use of condom during sexual intercourse.

Keywords: condom, HIV, Nigeria, premarital sex, youths

Procedia PDF Downloads 241
1258 Empirical Study on Factors Influencing SEO

Authors: Pakinee Aimmanee, Phoom Chokratsamesiri

Abstract:

Search engine has become an essential tool nowadays for people to search for their needed information on the internet. In this work, we evaluate the performance of the search engine from three factors: the keyword frequency, the number of inbound links, and the difficulty of the keyword. The evaluations are based on the ranking position and the number of days that Google has seen or detect the webpage. We find that the keyword frequency and the difficulty of the keyword do not affect the Google ranking where the number of inbound links gives remarkable improvement of the ranking position. The optimal number of inbound links found in the experiment is 10.

Keywords: SEO, information retrieval, web search, knowledge technologies

Procedia PDF Downloads 280
1257 Climate Change Impacts, Vulnerability, and Adaptation among Rural Households in Ethiopia

Authors: Birtukan Atinkut Asmare

Abstract:

Climate change disproportionately affects many Africans who heavily rely on climate-exposed sectors such as rain-fed agriculture and fishing, rendering them highly vulnerable. Gender plays a significant role, as men and women experience unequal impacts and vulnerabilities due to gender norms, labor divisions, resource access, and power dynamics. Drawing on an integrated framework, this study sheds light on the gendered impacts of climate change on household’s livelihood, their vulnerability, and adaptation in rural Ethiopia's Lake Tana Basin. This study utilized mixed research methods, integrating diverse qualitative techniques such as focus group discussions, key informant interviews, and field observations, along with quantitative data gathered through household surveys. The findings reveal that women-headed households were more vulnerable to climate change than male-headed households. Flood was the major climate-induced hazards in the area that threatened the lives and livelihoods of households. In response to climate change, households undertook different adaptation measures such as agroforestry practices, crop diversification, seasonal migration, petty trading, charcoal and fuel wood sales. However, the adaptation strategies were slightly varied based on the gender of the household head. Women-headed households specifically engaged in fuelwood collection and selling and petty trading activities. The main constraints for adaptation were limited access to technologies, extension services, information, and financial services. Therefore, this research urges attention from research, policy, and advisory services on rural households who are trying to survive in the face of climate change.

Keywords: agriculture, climate change impacts, ethiopia, gender

Procedia PDF Downloads 56
1256 Building Transparent Supply Chains through Digital Tracing

Authors: Penina Orenstein

Abstract:

In today’s world, particularly with COVID-19 a constant worldwide threat, organizations need greater visibility over their supply chains more than ever before, in order to find areas for improvement and greater efficiency, reduce the chances of disruption and stay competitive. The concept of supply chain mapping is one where every process and route is mapped in detail between each vendor and supplier. The simplest method of mapping involves sourcing publicly available data including news and financial information concerning relationships between suppliers. An additional layer of information would be disclosed by large, direct suppliers about their production and logistics sites. While this method has the advantage of not requiring any input from suppliers, it also doesn’t allow for much transparency beyond the first supplier tier and may generate irrelevant data—noise—that must be filtered out to find the actionable data. The primary goal of this research is to build data maps of supply chains by focusing on a layered approach. Using these maps, the secondary goal is to address the question as to whether the supply chain is re-engineered to make improvements, for example, to lower the carbon footprint. Using a drill-down approach, the end result is a comprehensive map detailing the linkages between tier-one, tier-two, and tier-three suppliers super-imposed on a geographical map. The driving force behind this idea is to be able to trace individual parts to the exact site where they’re manufactured. In this way, companies can ensure sustainability practices from the production of raw materials through the finished goods. The approach allows companies to identify and anticipate vulnerabilities in their supply chain. It unlocks predictive analytics capabilities and enables them to act proactively. The research is particularly compelling because it unites network science theory with empirical data and presents the results in a visual, intuitive manner.

Keywords: data mining, supply chain, empirical research, data mapping

Procedia PDF Downloads 171
1255 Performance Analysis of Scalable Secure Multicasting in Social Networking

Authors: R. Venkatesan, A. Sabari

Abstract:

Developments of social networking internet scenario are recommended for the requirements of scalable, authentic, secure group communication model like multicasting. Multicasting is an inter network service that offers efficient delivery of data from a source to multiple destinations. Even though multicast has been very successful at providing an efficient and best-effort data delivery service for huge groups, it verified complex process to expand other features to multicast in a scalable way. Separately, the requirement for secure electronic information had become gradually more apparent. Since multicast applications are deployed for mainstream purpose the need to secure multicast communications will become significant.

Keywords: multicasting, scalability, security, social network

Procedia PDF Downloads 289
1254 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 434
1253 Research and Design of Functional Mixed Community: A Model Based on the Construction of New Districts in China

Authors: Wu Chao

Abstract:

The urban design of the new district in China is different from other existing cities at the city planning level, including Beijing, Shanghai, Guangzhou, etc. And the urban problems of these super-cities are same as many big cities around the world. The goal of the new district construction plan is to enable people to live comfortably, to improve the well-being of residents, and to create a way of life different from that of other urban communities. To avoid the emergence of the super community, the idea of "decentralization" is taken as the overall planning idea, and the function and form of each community are set up with a homogeneous allocation of resources so that the community can grow naturally. Similar to the growth of vines in nature, each community groups are independent and connected through roads, with clear community boundaries that limit their unlimited expansion. With a community contained 20,000 people as a case, the community is a mixture for living, production, office, entertainment, and other functions. Based on the development of the Internet, to create more space for public use, and can use data to allocate resources in real time. And this kind of shared space is the main part of the activity space in the community. At the same time, the transformation of spatial function can be determined by the usage feedback of all kinds of existing space, and the use of space can be changed by the changing data. Take the residential unit as the basic building function mass, take the lower three to four floors of the building as the main flexible space for use, distribute functions such as entertainment, service, office, etc. For the upper living space, set up a small amount of indoor and outdoor activity space, also used as shared space. The transformable space of the bottom layer is evenly distributed, combined with the walking space connected the community, the service and entertainment network can be formed in the whole community, and can be used in most of the community space. With the basic residential unit as the replicable module, the design of the other residential units runs through the idea of decentralization and the concept of the vine community, and the various units are reasonably combined. At the same time, a small number of office buildings are added to meet the special office needs. The new functional mixed community can change many problems of the present city in the future construction, at the same time, it can keep its vitality through the adjustment function of the Internet.

Keywords: decentralization, mixed functional community, shared space, spatial usage data

Procedia PDF Downloads 117
1252 Identifying Effective Strategies to Promote Vietnamese Fashion Brands in an Internationally Dominated Market

Authors: Lam Hong Lan, Gabor Sarlos

Abstract:

It is hard to search for best practices in promotion for local fashion brands in Vietnam as the industry is still very young. Local fashion start-ups have grown quickly in the last five years, thanks in part to the internet and social media. However, local designer/owners can face a huge challenge when competing with international brands in the Vietnamese market – and few local case studies are available for guidance. In response, this paper studied how local small- to medium-sized enterprises (SMEs) promote to their target customers in order to compete with international brands. Knowledge of both successful and unsuccessful approaches generated by this study is intended to both contribute to the academic literature on local fashion in Vietnam as well as to help local designers to learn from and improve their brand-building strategy. The primary study featured qualitative data collection via semi-structured depth interviews. Transcription and data analysis were conducted manually in order to identify success factors that local brands should consider as part of their promotion strategy. Purposive sampling of SMEs identified five designers in Ho Chi Minh City (the biggest city in Vietnam) and three designers in Hanoi (the second biggest) as interviewees. Participant attributes included: born in the 1980s or 1990s; familiar with internet and social media; designer/owner of a successful local fashion brand in the key middle market and/or mass market segments (which are crucial to the growth of local brands). A secondary study was conducted using social listening software to gather further qualitative data on what were considered to be successful or unsuccessful approaches to local fashion brand promotion on social media. Both the primary and secondary studies indicated that local designers had maximized their promotion budget by using owned media and earned media instead of paid media. Findings from the qualitative interviews indicate that internet and social media have been used as effective promotion platforms by local fashion start-ups. Facebook and Instagram were the most popular social networks used by the SMEs interviewed, and these social platforms were believed to offer a more affordable promotional strategy than traditional media such as TV and/or print advertising. Online stores were considered an important factor in helping the SMEs to reach customers beyond the physical store. Furthermore, a successful online store allowed some SMEs to reduce their business rental costs by maintaining their physical store in a cheaper, less central city area as opposed to a more traditional city center store location. In addition, the small comparative size of the SMEs allowed them to be more attentive to their customers, leading to higher customer satisfaction and rate of return. In conclusion, this study found that these kinds of cost savings helped the SMEs interviewed to focus their scarce resources on producing unique, high-quality collections in order to differentiate themselves from international brands. Facebook and Instagram were the main platforms used for promotion and brand-building. The main challenge to this promotion strategy identified by the SMEs interviewed was to continue to find innovative ways to maximize the impact of a limited marketing budget.

Keywords: Vietnam, SMEs, fashion brands, promotion, marketing, social listening

Procedia PDF Downloads 118
1251 On the Study of All Waterloo Automaton Semilattices

Authors: Mikhail Abramyan, Boris Melnikov

Abstract:

The aim is to study the set of subsets of grids of the Waterloo automaton and the set of covering automata defined by the grid subsets. The study was carried out using the library for working with nondeterministic finite automata NFALib implemented by one of the authors (M. Abramyan) in C#. The results are regularities obtained when considering semilattices of covering automata for the Waterloo automaton. A complete description of the obtained semilattices from the point of view of equivalence of the covering automata to the original Waterloo automaton is given, the criterion of equivalence of the covering automaton to the Waterloo automaton in terms of properties of the subset of grids defining the covering automaton is formulated. The relevance of the subject area under consideration is due to the need to research a set of regular languages and, in particular, a description of their various subclasses. Also relevant are the problems that may arise in some subclasses. This will give, among other things, the possibility of describing new algorithms for the equivalent transformation of nondeterministic finite automata.

Keywords: nondeterministic finite automata, universal automaton, grid, covering automaton, equivalent transformation algorithms, the Waterloo automaton

Procedia PDF Downloads 81
1250 Gender Policy in Nigeria: Implications for Sustainable Development in the Fourth Republic

Authors: Adadu Yahaya, Abdullahi Erunke Canice

Abstract:

The study sets out to examine the interface that tends to exist in the relationship between gender policy and Nigeria’s socio-economic development. Despite Nigeria’s ratification of virtually all international instruments on the protection and promotion of gender rights and equality, it appears that the practice is honored in the breach than in observance; hence, these policies have not been adequately domesticated and implemented. The implication of this is that the women folks have generally been isolated from mainstream politics and their political rights and privileges truncated in the scheme of things. The paper observes that gender inequality and marginalization in Nigeria has practically occasioned the unwholesome subjugation of Nigerian women to the background, hence poses more critical questions and challenges to the national question. The consequence of this, to this paper, is that Nigeria’s development process will be adversely affected if this trend is not checked. The paper sums up with appropriate policy options which are believed to have the potentials of giving women the right pride of place in the socio-economic and political dynamics in the 21st century Nigeria and beyond.

Keywords: development, equality, gender, policy

Procedia PDF Downloads 487
1249 The Knowledge-Behavior Gap in the Online Information Seeking Process

Authors: Yen-Mei Lee

Abstract:

The concept of a knowledge-behavior gap has been discussed for several years. It is addressed that an individual’s knowledge does not sufficiently transfer to his or her actual actions. This concept is mostly focused on fields related to medicine or applied to health care issues to explain how people or patients connect their personal knowledge to actual health care behaviors. To our knowledge, seldomly has this research been applied to discuss people’s online information seeking behavior. In the current study, the main purpose is to investigate the relationship between web users’ personal values and their actual performances when seeking information on the Internet. The total number of twenty-eight participants, divided into one experienced group (n=14) and one novice group (n=14), were recruited and asked to complete a self-report questionnaire of fifty items related to information seeking actions and behaviors. During the execution, participants needed to rate the importance level (how important each item is) and the performance level (how often they actually do each item) from 1 to 10 points on each item. In this paper, the mean scores of the importance and the performance level are analyzed and discussed. The results show that there is a gap between web user’s knowledge and their actual online seeking behaviors. Both experienced group and novice group have higher average scores of the importance level (experienced group = 7.57, novice group = 6.01) than the actual performance level (experienced group = 6.89, novice group = 5.00) in terms of the fifty online information seeking actions. On the other hand, the experienced group perceives more importance of the fifty online seeking actions and performs actual behaviors better than the novice group. Moreover, experienced participants express a consistent result between their concept knowledge and actual behaviors. For instance, they feel extending a seeking strategy is important and frequently perform this action when seeking online. However, novice participants do not have a consistency between their knowledge and behaviors. For example, though they perceive browsing and judging information are less important than they get lost in the online information seeking process. However, in the actual behavior rating, the scores show that novices do browsing and judge information more often than they get lost when seeking information online. These results, therefore, help scholars and educators have a better understanding of the difference between experienced and novice web users regarding their concept knowledge and actual behaviors. In future study, figuring out how to narrow down the knowledge-behavior gap and create practical guidance for novice users to increase their online seeking efficiency is crucial. Not only could it help experienced users be aware of their actual information seeking behaviors, but also help the novice become mastery to concisely obtain information on the Internet.

Keywords: experienced web user, information seeking behavior, knowledge-behavior gap, novice, online seeking efficiency

Procedia PDF Downloads 118
1248 Move Analysis of Death Row Statements: An Explanatory Study Applied to Death Row Statements in Texas Department of Criminal Justice Website

Authors: Giya Erina

Abstract:

Linguists have analyzed the rhetorical structure of various forensic genres, but only a few have investigated the complete structure of death row statements. Unlike other forensic text types, such as suicide or ransom notes, the focus of death row statement analysis is not the authenticity or falsity of the text, but its intended meaning and its communicative purpose. As it constitutes their last statement before their execution, there are probably many things that inmates would like to express. This study mainly examines the rhetorical moves of 200 death row statements from the Texas Department of Criminal Justice website using rhetorical move analysis. The rhetorical moves identified in the statements will be classified based on their communicative purpose, and they will be grouped into moves and steps. A move structure will finally be suggested from the most common or characteristic moves and steps, as well as some sub-moves. However, because of some statements’ atypicality, some moves may appear in different parts of the texts or not at all.

Keywords: Death row statements, forensic linguistics, genre analysis, move analysis

Procedia PDF Downloads 294
1247 Sustainable Adaptation: Social Equity and Local-Level Climate Adaptation Planning in U.S. Cities

Authors: Duran Fiack, Jeremy Cumberbatch, Michael Sutherland, Nadine Zerphey

Abstract:

Civic leaders have increasingly relied upon local climate adaptation plans to identify vulnerabilities, prioritize goals, and implement actions in order to prepare cities for the present and projected effects of global climate change. The concept of sustainability is central to these efforts, as climate adaptation discussions are often framed within the context of economic resilience, environmental protection, and the distribution of climate change impacts across various socioeconomic groups. For urban centers, the climate change issue presents unique challenges for each of these dimensions; however, its potential impacts on marginalized populations are extensive. This study draws from the ‘just sustainabilities’ framework to perform a qualitative analysis of climate adaptation plans prepared by 22 of the 100 largest U.S. cities and examine whether, and to what extent, such initiatives prioritize social equity improvements. Past research has found that the integration of sustainability in urban policy and planning often produces outcomes that favor environmental and economic objectives over social equity improvements. We find that social equity is a particularly prominent theme in local-level climate adaptation efforts, relative to environmental quality and economic development. The findings contribute to the literature on climate adaptation and sustainability within the urban context and offer practical insight for local-level stakeholders concerning potential obstacles and opportunities for the integration of social equity initiatives into climate adaptation planning. Given the likelihood that climate changes will continue to impose unique challenges for marginalized communities in urban areas, advancing our understanding of how social equity concerns are integrated into adaptation efforts is likely to become an increasingly critical area of inquiry.

Keywords: climate adaptation plan, climate change, social equity, sustainability

Procedia PDF Downloads 147
1246 Problems Arising in Visual Perception

Authors: K. A. Tharanga, K. H. H. Damayanthi

Abstract:

Perception is an epistemological concept discussed in Philosophy. Perception, in other word, vision, is one of the ways that human beings get empirical knowledge after five senses. However, we face innumerable problems when achieving knowledge from perception, and therefore the knowledge gained through perception is uncertain. what we see in the external world is not real. These are the major issues that we face when receiving knowledge through perception. Sometimes there is no physical existence of what we really see. In such cases, the perception is relative. The following frames will be taken into consideration when perception is analyzed illusions and delusions, the figure of a physical object, appearance and the reality of a physical object, time factor, and colour of a physical object.seeing and knowing become vary according to the above conceptual frames. We cannot come to a proper conclusion of what we see in the empirical world. Because the things that we see are not really there. Hence the scientific knowledge which is gained from observation is doubtful. All the factors discussed in science remain in the physical world. There is a leap from ones existence to the existence of a world outside his/her mind. Indeed, one can suppose that what he/she takes to be real is just anmassive deception. However, depending on the above facts, if someone begins to doubt about the whole world, it is unavoidable to become his/her view a scepticism or nihilism. This is a certain reality.

Keywords: empirical, perception, sceptisism, nihilism

Procedia PDF Downloads 87
1245 Police and Community Crime Prevention in Sweden

Authors: Peter Lindstrom, Caroline Gyberg, Scott Goodwin

Abstract:

The Swedish police organisation was fundamentally reorganized in 2015 when 21 regional police forces were combined into one national police authority divided in 7 larger police regions, 35 police areas, and some 100 local police districts. A central theme for the reform was that local crime prevention policing should be more unified in the country. In this paper, we review crime prevention strategies in Sweden from a criminological and policing perspective focusing, among other things, on differences between urban and rural areas. In the crime prevention field, words such as 'knowledge- and evidence-based', 'collaboration', and 'strategies' are common. Our objective is to investigate the relationship between theoretical and practical knowledge in local crime prevention work. Our research indicate that an elaborated and strategic connection between theoretical and practical perspectives is important for successful local crime prevention work. Universities may provide a platform such knowledge exchange.

Keywords: crime prevention, police reform, urban and rural areas, criminological and policing perspectives

Procedia PDF Downloads 177
1244 The Optical OFDM Equalization Based on the Fractional Fourier Transform

Authors: A. Cherifi, B. S. Bouazza, A. O. Dahman, B. Yagoubi

Abstract:

Transmission over Optical channels will introduce inter-symbol interference (ISI) as well as inter-channel (or inter-carrier) interference (ICI). To decrease the effects of ICI, this paper proposes equalizer for the Optical OFDM system based on the fractional Fourier transform (FrFFT). In this FrFT-OFDM system, traditional Fourier transform is replaced by fractional Fourier transform to modulate and demodulate the data symbols. The equalizer proposed consists of sampling the received signal in the different time per time symbol. Theoretical analysis and numerical simulation are discussed.

Keywords: OFDM, fractional fourier transform, internet and information technology

Procedia PDF Downloads 403
1243 Science Subjects Studied and Relation to Income after University Graduation: An Empirical Analysis in Japan

Authors: Kazuo Nishimura, Junichi Hirata, Tadashi Yagi, Junko Urasaka

Abstract:

This paper is an investigation of the effect of science education during the high school education how science graduates of universities are appreciated in the labor market in Japan. We conducted a survey utilizing the internet and analyzed the subjects they were good at and their annual income. The results confirm that among science graduates, workers adept at physics tend to have higher incomes compared to workers good at other subjects. Generational analysis based on the curriculum guideline amendments reveals that the generational difference is small among science majors who are good at physics.

Keywords: curriculum, income, physics, science

Procedia PDF Downloads 282
1242 Mapping Social and Natural Hazards: A Survey of Potential for Managed Retreat in the United States

Authors: Karim Ahmed

Abstract:

The purpose of this study was to investigate how factoring the impact of natural disasters beyond flooding would affect managed retreat policy eligibility in the United States. For the study design, a correlation analysis method compared weighted measures of flooding and other natural disasters (e.g., wildfires, tornadoes, heatwaves, etc.) to CBSA Populated areas, the prevalence of cropland, and relative poverty on a county level. The study found that the vast majority of CBSAs eligible for managed retreat programs under a policy inclusive of non-flooding events would have already been covered by flood-only managed retreat policies. However, it is noteworthy that a majority of those counties that are not covered by a flood-only managed retreat policy have high rates of poverty and are either heavily populated and/or agriculturally active. The correlation is particularly strong between counties that are subject to multiple natural hazards and those that have both high rates of relative poverty and cropland prevalence. There is currently no managed retreat policy for agricultural land in the United States despite the environmental implications and food supply chain vulnerabilities related to at-risk cropland. The findings of this study suggest both that such a policy should be created and, when it is, that special attention should be paid to non-flood natural disasters affecting agricultural areas. These findings also reveal that, while current flood-based policies in the United States serve many areas that do need access to managed retreat funding and implementation, other vulnerable areas are overlooked by this approach. These areas are often deeply impoverished and are therefore particularly vulnerable to natural disaster; if and when those disasters do occur, these areas are often less financially prepared to recover or retreat from the disaster’s advance and, due to the limitations of the current policies discussed above, are less able to take the precautionary measures necessary to mitigate their risk.

Keywords: flood, hazard, land use, managed retreat, wildfire

Procedia PDF Downloads 122
1241 The Impact of Different Social Networks on the Development of Digital Entrepreneurship

Authors: Mohammad Mehdizadeh, Sara Miri

Abstract:

In today's world, competition is one of the essential components of different markets. Therefore, in addition to economic factors, social factors can also affect the development and prosperity of businesses. In this regard, social networks are of particular importance and play a critical role in the flourishing and development of Internet businesses. The purpose of this article is to investigate the effect of different social networks in promoting digital entrepreneurship. The research method is the descriptive survey. The results show that social networks have a positive and significant impact on digital entrepreneurship development. Among the social networks studied, Instagram and Facebook have the most positive effect on digital entrepreneurship.

Keywords: entrepreneurship, Facebook, Instagram, social media

Procedia PDF Downloads 343
1240 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data

Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda

Abstract:

Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.

Keywords: BGP, BGP hijacking, cybersecurity, detection

Procedia PDF Downloads 71
1239 Evaluation Synthesis of Private Sector Engagement in International Development

Authors: Valerie Habbel, Magdalena Orth, Johanna Richter, Steffen Schimko

Abstract:

Cooperation between development actors and the private sector is becoming increasingly important, as it is expected to mobilize additional resources to achieve the Sustainable Development Goals (SDGs), among other things. However, whether the goals of cooperation are achieved has so far only been explored in evaluations and studies of individual projects and instruments. The evaluation synthesis attempts to close this gap by systematically analyzing existing evidence (evaluations and academic studies) from national and international development cooperation on private sector engagement. Overall, the evaluations and studies considered report mainly positive effects on investors and donors, intermediaries, partner countries, and target groups. However, various analyses, including on the quality of the evaluations, point to a positive bias in the results. The evaluation synthesis makes recommendations on the definition of indicators, the measurement and evaluation of impacts and additionality, knowledge management, and the consideration of transaction costs in cooperation with private actors.

Keywords: evaluation synthesis, private sector engagement, international development, sustainable development

Procedia PDF Downloads 206
1238 Exploring Perceptions of Local Stakeholders in Climate Change Adaptation in Central and Western Terai, Nepal

Authors: Shree Kumar Maharjan

Abstract:

Climate change has varied impacts on diverse livelihood sectors, which is more prominent at the community level. The stakeholders and local institutions have been supporting the communities either by building adaptive capacities and resilience or minimizing the impacts of different adaptation interventions. Some of these interventions are effective, whereas others need further dynamisms and exertions considering the complexity of the risks and vulnerabilities. Hence, consolidated efforts of concerned stakeholders are required to minimize and adapt the present and future impacts. This study digs out and analyses the perceptions of local stakeholders in climate change adaptation in Madi and Deukhuri valleys of Nepal through a questionnaire survey. The study has categorized the local stakeholders into 5 groups in the study sites – Farmers groups and cooperatives, Government, I/NGOs, Development banks and education and other organizations. The local stakeholders revealed flood, drought, cold wave and riverbank erosion as the major climatic risks and hazards found in the sites eventually impacting on the loss of agricultural production, loss of agricultural land and properties, loss of livestock, the emergence of diseases and pest. The stakeholders believed that most of the farmers dealing with these impacts based on their traditional knowledge and practices, followed by with the support of NGOs and with the help of neighbors and community. The major supports of the stakeholders to deal with these impacts were on training and awareness, risk analysis and minimization, livelihood improvement, financial support, coordination and networking and facilitation in policy formulation. The stakeholders emphasized primarily on capacity building, appropriate technologies, community-based planning and monitoring, prioritization to the poor and the marginalized and establishment of community fund respectively for building adaptive capacities.

Keywords: climate change adaptation, local stakeholders, Madi, Deukhuri, Nepal

Procedia PDF Downloads 176
1237 Integrated Decision Support for Energy/Water Planning in Zayandeh Rud River Basin in Iran

Authors: Safieh Javadinejad

Abstract:

In order to make well-informed decisions respecting long-term system planning, resource managers and policy creators necessitate to comprehend the interconnections among energy and water utilization and manufacture—and also the energy-water nexus. Planning and assessment issues contain the enhancement of strategies for declining the water and energy system’s vulnerabilities to climate alteration with also emissions of decreasing greenhouse gas. In order to deliver beneficial decision support for climate adjustment policy and planning, understanding the regionally-specific features of the energy-water nexus, and the history-future of the water and energy source systems serving is essential. It will be helpful for decision makers understand the nature of current water-energy system conditions and capacity for adaptation plans for future. This research shows an integrated hydrology/energy modeling platform which is able to extend water-energy examines based on a detailed illustration of local circumstances. The modeling links the Water Evaluation and Planning (WEAP) and the Long Range Energy Alternatives Planning (LEAP) system to create full picture of water-energy processes. This will allow water managers and policy-decision makers to simply understand links between energy system improvements and hydrological processing and realize how future climate change will effect on water-energy systems. The Zayandeh Rud river basin in Iran is selected as a case study to show the results and application of the analysis. This region is known as an area with large integration of both the electric power and water sectors. The linkages between water, energy and climate change and possible adaptation strategies are described along with early insights from applications of the integration modeling system.

Keywords: climate impacts, hydrology, water systems, adaptation planning, electricity, integrated modeling

Procedia PDF Downloads 288