Search results for: science and technology policy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12682

Search results for: science and technology policy

11542 Identifying Business Opportunities Based on Patent and Trademark Portfolios: a Technology-Based Service Industry Case

Authors: Mingook Lee, Sungjoo Lee

Abstract:

As technology-based service industries grow drastically worldwide; companies are recognizing the importance of market preoccupancy and have made an effort to capture a large market to gain the upper hand. To this end, a focus on patents can be used to determine the properties of a technology, as well as to capture advantages in technical skills, in comparison with the firm’s competitors. However, technology-based services largely depend not only on their technological value but also their economic value, due to the recognized worth that is passed to a plurality of users. Thus, it is important to determine whether there are any competitors in the target areas and what services they provide in any field. Despite this importance, little effort has been made to systematically benchmark competitors in order to identify business opportunities. Thus, this study aims to not only identify each position of technology-centered service companies in complex market dynamics, but also to discover new business opportunities. For this, we try to consider both technology and market environments simultaneously by utilizing patent data as a representative proxy for technology and trademark dates as an index for a firm’s target goods and services. Theoretically, this is one of the earliest attempts to combine patent data and trademark data to analyze corporate strategies. In practice, the research results are expected to be used as a decision criterion to diagnose the economic value that companies can obtain by entering the market, as well as the technological value to be passed onto their customers. Thus, the proposed approach can be useful to support effective technology and business strategies in a firm.

Keywords: business opportunity, patent, Portfolio analysis, trademark

Procedia PDF Downloads 278
11541 How Does Improving the Existing DSL Infrastructure Influences the Expansion of Fiber Technology?

Authors: Peter Winzer, Erik Massarczyk

Abstract:

Experts, enterprises and operators expect that the bandwidth request will increase up to rates of 100 to 1,000 Mbps within several years. Therefore the most important question is, which technology shall satisfy the future consumer broadband demands. Currently the consensus is, that the fiber technology has the best technical characteristics to achieve such the high bandwidth rates. But fiber technology is so far very cost-intensive and resource consuming. To avoid these investments, operators are concentrating to upgrade the existing copper and hybrid fiber coax infrastructures. This work presents a comparison of the copper and fiber technologies including an overview about the current German broadband market. Both technologies are reviewed in the terms of demand, willingness to pay and economic efficiency in connection with the technical characteristics.

Keywords: broadband customer demand, fiber development, g.fast, vectoring, willingness to pay for broadband services

Procedia PDF Downloads 458
11540 Defining the Push and Pull Factors to Adopt Health Information Technologies by Health Entrepreneurs

Authors: Elaheh Ezami, Behzad Mohammadian, Elham Aznab

Abstract:

Health service design will need to change due to bringing in new digital health tools. This highlights the importance of innovation in adopting Health Information Technology (HIT). It can be argued that innovation in the health sector correlates with entrepreneurship. Various reasons exist for health entrepreneurs to advocate increased investment in HIT to compensate for shortcomings in the health sector and improve the quality of healthcare. Furthermore, every innovative program presents challenges and motivations for entrepreneurs that may distract or encourage the adoption of technology. Our study used a systematic literature review to identify relevant articles that defined the frustrations and promotions of using health information technology in organizations or enterprises. A meta-analysis of the articles was conducted to identify the factors driving or pulling entrepreneurs to use HIT.

Keywords: health information technology, health entrepreneurship, health enterprise, health entrepreneurs' innovation

Procedia PDF Downloads 96
11539 The Selectivities of Pharmaceutical Spending Containment: Social Profit, Incentivization Games and State Power

Authors: Ben Main Piotr Ozieranski

Abstract:

State government spending on pharmaceuticals stands at 1 trillion USD globally, promoting criticism of the pharmaceutical industry's monetization of drug efficacy, product cost overvaluation, and health injustice. This paper elucidates the mechanisms behind a state-institutional response to this problem through the sociological lens of the strategic relational approach to state power. To do so, 30 expert interviews, legal and policy documents are drawn on to explain how state elites in New Zealand have successfully contested a 30-year “pharmaceutical spending containment policy”. Proceeding from Jessop's notion of strategic “selectivity”, encompassing analyses of the enabling features of state actors' ability to harness state structures, a theoretical explanation is advanced. First, a strategic context is described that consists of dynamics around pharmaceutical dealmaking between the state bureaucracy, pharmaceutical pricing strategies (and their effects), and the industry. Centrally, the pricing strategy of "bundling" -deals for packages of drugs that combine older and newer patented products- reflect how state managers have instigated an “incentivization game” that is played by state and industry actors, including HTA professionals, over pharmaceutical products (both current and in development). Second, a protective context is described that is comprised of successive legislative-judicial responses to the strategic context and characterized by the regulation and the societalisation of commercial law. Third, within the policy, the achievement of increased pharmaceutical coverage (pharmaceutical “mix”) alongside contained spending is conceptualized as a state defence of a "social profit". As such, in contrast to scholarly expectations that political and economic cultures of neo-liberalism drive pharmaceutical policy-making processes, New Zealand's state elites' approach is shown to be antipathetic to neo-liberals within an overall capitalist economy. The paper contributes an analysis of state pricing strategies and how they are embedded in state regulatory structures. Additionally, through an analysis of the interconnections of state power and pharmaceutical value Abrahams's neo-liberal corporate bias model for pharmaceutical policy analysis is problematised.

Keywords: pharmaceutical governance, pharmaceutical bureaucracy, pricing strategies, state power, value theory

Procedia PDF Downloads 55
11538 A Study on Waste Management Policy in Minamata City Kumamoto Prefecture Japan

Authors: Qiannan Zhuo, Wanglin Yan

Abstract:

Minamata City and its citizens have been suffered from Minamata Disease, one of the worst environmental problems in Japan, since 1956. To mitigate the bad images brought by Minamata Disease, Minamata City has started a series of environmental friendly activities from 60 years ago. Garbage separation is the very beginning one. It has been already done for more than 20 years since Minamata citizens started to separate their garbage into more than 20 categories. In this research, the author evaluated the effectiveness of the waste management policy in Minamata city by analyzing the recycle rate and the landfill amount., and also pointed out the problems brought by it through the qualitative survey.

Keywords: Minamata City, households waste, garbage separation, recycle reduce reuse

Procedia PDF Downloads 224
11537 Examining Cyber Crime and Its Impacts on E-Banking in Nigeria

Authors: Auwal Nata'ala

Abstract:

The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective.

Keywords: cyber crimes, e-banking, policies, ICT

Procedia PDF Downloads 397
11536 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 143
11535 The Intersection of Art and Technology: Innovations in Visual Communication Design

Authors: Sareh Enjavi

Abstract:

In recent years, the field of visual communication design has seen a significant shift in the way that art is created and consumed, with the advent of new technologies like virtual reality, augmented reality, and artificial intelligence. This paper explores the ways in which technology is changing the landscape of visual communication design, and how designers are incorporating new technological tools into their artistic practices. The primary objective of this research paper is to investigate the ways in which technology is influencing the creative process of designers and artists in the field of visual communication design. The paper also aims to examine the challenges and limitations that arise from the intersection of art and technology in visual communication design, and to identify strategies for overcoming these challenges. Drawing on examples from a range of fields, including advertising, fine art, and digital media, this paper highlights the exciting innovations that are emerging as artists and designers use technology to push the boundaries of traditional artistic expression. The paper argues that embracing technological innovation is essential for the continued evolution of visual communication design. By exploring the intersection of art and technology, designers can create new and exciting visual experiences that engage and inspire audiences in new ways. The research also contributes to the theoretical and methodological understanding of the intersection of art and technology, a topic that has gained significant attention in recent years. Ultimately, this paper emphasizes the importance of embracing innovation and experimentation in the field of visual communication design, and highlights the exciting innovations that are emerging as a result of the intersection of art and technology, and emphasizes the importance of embracing innovation and experimentation in the field of visual communication design.

Keywords: visual communication design, art and technology, virtual reality, interactive art, creative process

Procedia PDF Downloads 95
11534 The Roles, Strategic Coordination, and Alignment of CTOs: A Systematic Literature Review

Authors: Shailendra Natraj, Kristin Paetzold, B. R. Katzy

Abstract:

The significant role of technology in strategic business decisions has created the need for executives who understand technology and recognize profitable applications to products, services and processes. The role of CTO’s is very complex within technology-based firms, which stretches from the technology aspects to the strategic goal and vision of the firm. Often the roles of CTOs scales from as functional leaders, strategic leaders or supera- functional leaders. In most of the companies the roles are unclear and fuzzy. We in our research are trying to explore each of the orientation and link between leadership types (functional, strategic and super functional) of CTOs, responsibilities, credibility and strategic and conceptual responsibilities. Approach: We conducted a comprehensive literature review with the available databank sources. Results: From the conducted literature review we could identify that most of the research work conducted so far were mainly distributed between roles and responsibilities of CTOs. The available sources pointed were limited to roles of CTOs as functional leaders. Contribution: In our findings based on the literature review, we could identify that apart from the conducted research what so far has not been focused yet are (a) The leadership types (mainly) strategic and super-functional leaders) of CTOs, (b) the responsibilities and credibility of CTOs and (c) the strategic and conceptual responsibilities of CTOs.

Keywords: CTO, chief technology officer, strategy, technology leaders

Procedia PDF Downloads 500
11533 Challenges of eradicating neglected tropical diseases

Authors: Marziye Hadian, Alireza Jabbari

Abstract:

Background: Each year, tropical diseases affect large numbers of tropical or subtropical populations and give rise to irreparable financial and human damage. Among these diseases, some are known as Neglected Tropical Disease (NTD) that may cause unusual dangers; however, they have not been appropriately accounted for. Taking into account the priority of eradication of the disease, this study explored the causes of failure to eradicate neglected tropical diseases. Method: This study was a systematized review that was conducted in January 2021 on the articles related to neglected tropical diseases on databases of Web of Science, PubMed, Scopus, Science Direct, Ovid, Pro-Quest, and Google Scholar. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines as well as Critical Appraisal Skills Program (CASP) for articles and AACODS (Authority, Accuracy, Coverage, Objectivity, Date, Significance) for grey literature (provides five criteria for judging the quality of grey information) were integrated. Finding: The challenges in controlling and eradicating neglected tropical diseases in four general themes are as follows: shortcomings in disease management policies and programs, environmental challenges, executive challenges in policy disease and research field and 36 sub-themes. Conclusion: To achieve the goals of eradicating forgotten tropical diseases, it seems indispensable to free up financial, human and research resources, proper management of health infrastructure, attention to migrants and refugees, clear targeting, prioritization appropriate to local conditions and special attention to political and social developments. Reducing the number of diseases should free up resources for the management of neglected tropical diseases prone to epidemics as dengue, chikungunya and leishmaniasis. For the purpose of global support, targeting should be accurate.

Keywords: neglected tropical disease, NTD, preventive, eradication

Procedia PDF Downloads 118
11532 Bridging the Gap through New Media Technology Acceptance: Exploring Chinese Family Business Culture

Authors: Farzana Sharmin, Mohammad Tipu Sultan

Abstract:

Emerging new media technology such as social media and social networking sites have changed the family business dynamics in Eastern Asia. The family business trends in China has been developed at an exponential rate towards technology. In the last two decades, many of this family business has succeeded in becoming major players in the Chinese and world economy. But there are a very few availabilities of literature on Chinese context regarding social media acceptance in terms of the family business. Therefore, this study has tried to cover the gap between culture and new media technology to understand the attitude of Chinese young entrepreneurs’ towards the family business. This paper focused on two cultural dimensions (collectivism, long-term orientation), which are adopted from Greet Hofstede’s. Additionally perceived usefulness and ease of use adopted from the Technology Acceptance Model (TAM) to explore the actual behavior of technology acceptance for the family business. A quantitative survey method (n=275) used to collect data Chinese family business owners' in Shanghai. The inferential statistical analysis was applied to extract trait factors, and verification of the model, respectively. The research results found that using social media for family business promotion has highly influenced by cultural values (collectivism and long-term orientation). The theoretical contribution of this research may also assist policymakers and practitioners of other developing countries to advertise and promote the family business through social media.

Keywords: China, cultural dimensions, family business, technology acceptance model, TAM

Procedia PDF Downloads 127
11531 Electronic Payment Recording with Payment History Retrieval Module: A System Software

Authors: Adrian Forca, Simeon Cainday III

Abstract:

The Electronic Payment Recording with Payment History Retrieval Module is developed intendedly for the College of Science and Technology. This system software innovates the manual process of recording the payments done in the department through the development of electronic payment recording system software shifting from the slow and time-consuming procedure to quick yet reliable and accurate way of recording payments because it immediately generates receipts for every transaction. As an added feature to its software process, generation of recorded payment report is integrated eliminating the manual reporting to a more easy and consolidated report. As an added feature to the system, all recorded payments of the students can be retrieved immediately making the system transparent and reliable payment recording software. Viewing the whole process, the system software will shift from the manual process to an organized software technology because the information will be stored in a logically correct and normalized database. Further, the software will be developed using the modern programming language and implement strict programming methods to validate all users accessing the system, evaluate all data passed into the system and information retrieved to ensure data accuracy and reliability. In addition, the system will identify the user and limit its access privilege to establish boundaries of the specific access to information allowed for the store, modify, and update making the information secure against unauthorized data manipulation. As a result, the System software will eliminate the manual procedure and replace with an innovative modern information technology resulting to the improvement of the whole process of payment recording fast, secure, accurate and reliable software innovations.

Keywords: collection, information system, manual procedure, payment

Procedia PDF Downloads 151
11530 Extending the Flipped Classroom Approach: Using Technology in Module Delivery to Students of English Language and Literature at the British University in Egypt

Authors: Azza Taha Zaki

Abstract:

Technology-enhanced teaching has been in the limelight since the 90s when educators started investigating and experimenting with using computers in the classroom as a means of building 21st. century skills and motivating students. The concept of technology-enhanced strategies in education is kaleidoscopic! It has meant different things to different educators. For the purpose of this paper, however, it will be used to refer to the diverse technology-based strategies used to support and enrich the flipped learning process, in the classroom and outside. The paper will investigate how technology is put in the service of teaching and learning to improve the students’ learning experience as manifested in students’ attendance and engagement, achievement rates and finally, students’ projects at the end of the semester. The results will be supported by a student survey about relevant specific aspects of their learning experience in the modules in the study.

Keywords: attendance, British University, Egypt, flipped, student achievement, student-centred, student engagement, students’ projects

Procedia PDF Downloads 106
11529 Cyanobacterial Biofertilizer Technology for Rice Producing Farmers at Nashik District

Authors: Krishna N. Gaikwad, V. R. Kakulte

Abstract:

Rice (Oryza sativa L.) is the main cereal crop of tribal people of western part of Nasik district. There is a wide fluctuation in yield due to the factors like uncertain rains, pest diseases, socio-economic status of farmers, lack of awareness and traditional knowledge of farmers about agro-practices. In order to achieve more yield, it is a need to adopt low cost, eco-friendly blue green algal biofertilizer technology. Communication of useful information to needy people is basic need in present situation. The paper reports different communication modes of paddy technologies, adoption about BGA technology, attitudinal changes of farmers and yield of rice production during year 2011 and 2012. The results indicate that there is significant effect of communication modes of improved BGA technology on rice yield.

Keywords: rice, BGA, biofertilizer, Oryza sativa L.

Procedia PDF Downloads 469
11528 Evolution of the Environmental Justice Concept

Authors: Zahra Bakhtiari

Abstract:

This article explores the development and evolution of the concept of environmental justice, which has shifted from being dominated by white and middle-class individuals to a civil struggle by marginalized communities against environmental injustices. Environmental justice aims to achieve equity in decision-making and policy-making related to the environment. The concept of justice in this context includes four fundamental aspects: distribution, procedure, recognition, and capabilities. Recent scholars have attempted to broaden the concept of justice to include dimensions of participation, recognition, and capabilities. Focusing on all four dimensions of environmental justice is crucial for effective planning and policy-making to address environmental issues. Ignoring any of these aspects can lead to the failure of efforts and the waste of resources.

Keywords: environmental justice, distribution, procedure, recognition, capabilities

Procedia PDF Downloads 72
11527 A Pattern Practise for Awareness Educations on Information Security: Information Security Project

Authors: Fati̇h Apaydin

Abstract:

Education technology is an area which constantly changes and creates innovations. As an inevitable part of the changing circumstances, the societies who have a tendency to the improvements keep up with these innovations by using the methods and strategies which have been designed for education technology. At this point, education technology has taken the responsibility to help the individuals improve themselves and teach the effective teaching methods by filling the airs in theoretical information, information security and the practice. The technology which comes to the core of our lives by raising the importance of it day by day and it enforced its position in computer- based environments. As a result, ‘being ready for technological innovations, improvement on computer-based talent, information, ability and attitude’ doctrines have to be given. However, it is today quite hard to deal with the security and reinforcement of this information. The information which is got illegally gives harm to society from every aspect, especially education. This study includes how and to what extent to use these innovative appliances such as computers and the factor of information security of these appliances in computer-based education. As the use of computer is constantly becoming prevalent in our country, both education and computer will never become out of date, so how computer-based education affects our lives and the study of information security for this type of education are important topics.

Keywords: computer, information security, education, technology, development

Procedia PDF Downloads 579
11526 Emile Meyerson's Philosophy of Science in Lacan's Early Theories

Authors: Hugo T. Jorge, Richard T. Simanke

Abstract:

Lacan’s work addresses overarching issues concerning the scientific intelligibility of the subject in its philosophical sense. Even though his reflection is not, strictly speaking, philosophy of science, it contains many traits that are typical of this branch of philosophy. However, the relation between Lacan’s early thought and the philosophy of science of the time is often disregarded or only incompletely accounted for in Lacanian scholarship. French philosopher of science Emile Meyerson was often implicitly or explicitly referred to in Lacan’s works, yet few publications can be found on their relationship. The objective of this paper is to contribute to the analysis of this relationship, indicating some of its possible implications. For this, the convergence between Meyerson’s doctrine of science and Lacan’s works between 1936 and 1953 is discussed, as well as the conditions under which Lacan’s reception of Meyerson’s ideas take place. In conclusion, it is argued that this convergence allows for the clarification of important issues in Lacan’s early work, such as the concept of imago, his views on the nature of truth, and his thesis of the anthropomorphism of natural sciences. Meyerson’s argument for the permanence of common sense within science makes Lacan’s claims on the anthropomorphism of natural sciences more understandable. Similarly, Meyerson’s views on the epistemological shortfall of the Principle of Identity sheds some light on Lacan’s 1936 critique of associationistic concepts of engram and truth and may be at the origins of his antirealist and anti-idealist stances. Meyerson’s Principle of Identity is also related to some aspects of Lacan’s concept of imago. The imago understood as the unconscious condition for the identity in time of family figures in childhood, would be an excellent expression of the Principle of Identity. In this sense, the Principle of Identity may be linked to the concept of imaginary as developed by Lacan in the 1950s. However, Lacan considerably distorts Meyerson’s views in his 1936 critique of Freud’s concept of libido. Finally, a possible relationship between Lacan’s late concept of the real and Meyerson’s concept of the irrational is suggested.

Keywords: imaginary, Lacan, Meyerson, philosophy of science, real

Procedia PDF Downloads 159
11525 Infrastructure Investment Law Formulation to Ensure Low Transaction Cost at Policy Level: Case Study of Public Private Partnership Project at the Ministry of Public Works and Housing of the Republic of Indonesia

Authors: Yolanda Indah Permatasari, Sudarsono Hardjosoekarto

Abstract:

Public private partnership (PPP) scheme was considered as an alternative source of funding for infrastructure provision. However, the performance of PPP scheme and interest of private sector to participate in the provision of infrastructure was still practically low. This phenomenon motivates the research to reconstruct the form of collaborative governance at the policy level from the perspective of transaction cost of the PPP scheme. Soft-system methodology (SSM)-based action research was used as this research methodology. The result of this study concludes that the emergence of transaction cost sources at the policy level is caused by the absence of a law that governs infrastructure investment, especially the implementation of PPP scheme. This absence is causing the imbalance in risk allocation and risk mitigation between the public and private sector. Thus, this research recommended the formulation of infrastructure investment law that aims to minimize asymmetry information, to anticipate the principal-principal problems, and to provide legal basis that ensures risk certainty and guarantee fair risk allocation between public and private sector.

Keywords: public governance, public private partnership, soft system methodology, transaction cost

Procedia PDF Downloads 122
11524 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 347
11523 An Investigation on the Effect of Railway Track Elevation Project in Taichung Based on the Carbon Emissions

Authors: Kuo-Wei Hsu, Jen-Chih, Chao, Pei-Chen, Wu

Abstract:

With the rapid development of global economy, the increasing population, the highly industrialization, greenhouse gas emission and the ozone layer damage, the Global Warming happens. Facing the impact of global warming, the issue of “green transportation” began to be valued and promoted in each city. Taichung has been elected as the model of low-carbon city in Taiwan. To comply with international trends and the government policy, we tried to promote the energy saving and carbon reduction to create a “low-carbon Taichung with green life and eco-friendly economy”. To cooperate with the “green transportation” project, Taichung has promoted a number of public transports constructions and traffic policy in recent years like BRT, MRT, etc. The elevated railway is one of those important constructions. Cooperating with the green transport policy, elevated railway could help to achieve the carbon reduction for this low-carbon city. The current studies of the carbon emissions associated with railways and roads are focusing on the assessment on paving material, institutional policy and economic benefit. Except for changing the mode of transportation, elevated railways/roads also create space under the bridge. However, there is no research about the carbon emissions of the space underneath the elevated section up until now. This study investigated the effect of railway track elevation project in Taichung based on the carbon emissions and the factors that affect carbon emissions by research related theory and literature analysis. This study concluded that : railway track elevation increased the public transit, the bike lanes, the green areas and walking spaces. In the other hand it reduced the traffic congestions, the use of motorcycles as well as automobiles for carbon emissions.

Keywords: low-carbon city, green transportation, carbon emissions, Taichung, Taiwan

Procedia PDF Downloads 509
11522 Effective Service Provision and Multi-Agency Working in Service Providers for Children and Young People with Special Educational Needs and Disabilities: A Mixed Methods Systematic Review

Authors: Natalie Tyldesley-Marshall, Janette Parr, Anna Brown, Yen-Fu Chen, Amy Grove

Abstract:

It is widely recognised in policy and research that the provision of services for children and young people (CYP) with Special Educational Needs and Disabilities (SEND) is enhanced when health and social care, and education services collaborate and interact effectively. In the UK, there have been significant changes to policy and provisions which support and improve collaboration. However, professionals responsible for implementing these changes face multiple challenges, including a lack of specific implementation guidance or framework to illustrate how effective multi-agency working could or should work. This systematic review will identify the key components of effective multi-agency working in services for CYP with SEND; and the most effective forms of partnership working in this setting. The review highlights interventions that lead to service improvements; and the conditions in the local area that support and encourage success. A protocol was written and registered with PROSPERO registration: CRD42022352194. Searches were conducted on several health, care, education, and applied social science databases from the year 2012 onwards. Citation chaining has been undertaken, as well as broader grey literature searching to enrich the findings. Qualitative, quantitative, mixed methods studies and systematic reviews were included, assessed independently, and critically appraised or assessed for risk of bias using appropriate tools based on study design. Data were extracted in NVivo software and checked by a more experienced researcher. A convergent segregated approach to synthesis and integration was used in which the quantitative and qualitative data were synthesised independently and then integrated using a joint display integration matrix. Findings demonstrate the key ingredients for effective partnership working for services delivering SEND. Interventions deemed effective are described, and lessons learned across interventions are summarised. Results will be of interest to educators and health and social care professionals that provide services to those with SEND. These will also be used to develop policy recommendations for how UK healthcare, social care, and education services for CYP with SEND aged 0-25 can most effectively collaborate and achieve service improvement. The review will also identify any gaps in the literature to recommend areas for future research. Funding for this review was provided by the Department for Education.

Keywords: collaboration, joint commissioning, service delivery, service improvement

Procedia PDF Downloads 87
11521 A Data-Driven Agent Based Model for the Italian Economy

Authors: Michele Catalano, Jacopo Di Domenico, Luca Riccetti, Andrea Teglio

Abstract:

We develop a data-driven agent based model (ABM) for the Italian economy. We calibrate the model for the initial condition and parameters. As a preliminary step, we replicate the Monte-Carlo simulation for the Austrian economy. Then, we evaluate the dynamic properties of the model: the long-run equilibrium and the allocative efficiency in terms of disequilibrium patterns arising in the search and matching process for final goods, capital, intermediate goods, and credit markets. In this perspective, we use a randomized initial condition approach. We perform a robustness analysis perturbing the system for different parameter setups. We explore the empirical properties of the model using a rolling window forecast exercise from 2010 to 2022 to observe the model’s forecasting ability in the wake of the COVID-19 pandemic. We perform an analysis of the properties of the model with a different number of agents, that is, with different scales of the model compared to the real economy. The model generally displays transient dynamics that properly fit macroeconomic data regarding forecasting ability. We stress the model with a large set of shocks, namely interest policy, fiscal policy, and exogenous factors, such as external foreign demand for export. In this way, we can explore the most exposed sectors of the economy. Finally, we modify the technology mix of the various sectors and, consequently, the underlying input-output sectoral interdependence to stress the economy and observe the long-run projections. In this way, we can include in the model the generation of endogenous crisis due to the implied structural change, technological unemployment, and potential lack of aggregate demand creating the condition for cyclical endogenous crises reproduced in this artificial economy.

Keywords: agent-based models, behavioral macro, macroeconomic forecasting, micro data

Procedia PDF Downloads 53
11520 Internet Usage Behavior on Mobile Phones of the Faculty of Management Science Students at Suan Sunandha Rajabhat University

Authors: Arpapron Phokajang

Abstract:

The objectives of this research were to study the internet usage, including; date, time, description of using service, network service, telephone charge, and to study the internet usage behavior on mobile phones of the Faculty of Management Science students at Suan Sunandha Rajabhat University. The samples consisted of 395 students from the Faculty of Management Science. Questionnaires were used for collecting the data. Descriptive statistics used in this research including percentage, mean, and standard deviation. The findings of this research found that most respondents were female, aged between 21 and 25 years old, used the monthly AIS network service calls on Monday to Friday around 6.01-12.00 p.m., the internet usage behavior on mobile phones for entertainment was found in the highest level in all aspects, and education, business and commerce, and communication were found in the moderate level and using the internet to watch YouTube in the highest level also.

Keywords: faculty of management science, internet usage behavior, mobile phones, Suan Sunandha Rajabhat University

Procedia PDF Downloads 230
11519 An Exploration of Early Cinematic Technology (1890s-1920s) and Shifting Cinematic Styles

Authors: Adam L. Miller

Abstract:

The aim of this paper is to look back to the very beginning of cinematic history and explore the connection between the differing technology used, and the varying styles adopted by early filmmakers. The paper will be structured chronologically, first looking at the advances that predated Thomas Edison and his Kinetograph and Kinetogram. This paper will then explore how Edison’s technology and films varied from the Lumiere brothers and their Cinematograph. Finally, the paper will go on to draw parallels and differences between French filmmakers such as Alice Guy and George Melies, and American filmmakers like Edwin S. Porter and D. W. Griffith.

Keywords: film studies, early cinema, silent cinema, early cinematic technology, Thomas Edison, Alice Guy, George Melies, Edwin S. Porter, Lumiere brothers, D. W. Griffith

Procedia PDF Downloads 184
11518 New Media and Social Media Laws and Ethics in United Arab Emirates

Authors: Ahmed Farouk Radwan, Sheren Mousa

Abstract:

There are many laws and regulations governing the use of new and social media in the United Arab Emirates. During the past few years, the importance of using these platforms in the fields of media and government communication has increased, as well as at the level of individual use. In 2016, the National Media Council Law was issued to regulate traditional and new media field, and gave the council the power to oversee and undertake the media affairs in the state. NMC is mandated to: Develop the UAE’s media policy, Draft media legislation and ensure its execution and Prohibited media content ,Co-ordinate the media policy between the emirates in line with the UAE’s domestic and foreign policy, Ensure support for the federation and project national unity. All media organizations in the UAE must comply with the regulations and rules issued by council. Social media influencers have to be licensed by NMC if they accept paid ads to be published on their accounts. The study explores other laws concerning of new media and social media regulations and ethics including Combatting Cybercrimes law, Combating Discrimination and Hatred law, The Government Guidelines for social media users in the UAE, The Guidelines for the practices of electronic participation and social networking, Copyright Law, and Child Rights Law. The study clarifies the legal articles, items and standards in all these laws which related with the new media and social platforms and also determines the prohibited digital practices and the cultural norms governing it.

Keywords: media laws, media ethics, new media , UAE

Procedia PDF Downloads 148
11517 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan

Authors: Pema Choejey, David Murray, Chun Che Fung

Abstract:

Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.

Keywords: awareness and training, cybersecurity policy, risk management, security risks

Procedia PDF Downloads 322
11516 Information Construction of Higher Education in Teaching Practice

Authors: Yang Meng, James L. Patnao

Abstract:

With the rapid development of information technology and the impact of the epidemic environment, the traditional teaching model can’t longer meet the requirements of the development of the times. The development of teaching mechanism is the inevitable trend of the future development of higher education. We must further promote the informatization of higher education in teaching practice, let modern information technology penetrate and practice in classroom teaching, and provide promising opportunities for the high-quality development of higher education. This article mainly through the distribution of questionnaires to teachers of colleges and universities, so as to understand the degree of informatization in the teaching of colleges and universities. And on the basis of domestic and foreign scholars' research on higher education informatization, it analyzes the existing problems, and finds the optimal solution based on the needs of education and teaching development. According to the survey results, most college teachers will use information technology in teaching practice, but the information technology teaching tools used by teachers are relatively simple, and most of them only use slides. In addition, backward informatization infrastructure and less informatization training are the main challenges facing the current teaching informatization construction. If colleges and universities can make good use of information technology and multimedia technology and combine it with traditional teaching, it will definitely promote the development of college education and further promote the modernization and informatization of higher education.

Keywords: higher education, teaching practice, informatization construction, e-education

Procedia PDF Downloads 103
11515 Ending the Multibillionaire: A Solution to Poverty and Violations of the Right to Health

Authors: Andreanna Kalasountas

Abstract:

A rampant health crisis is facing America. That health crisis is poverty. Millions of Americans live without knowing when they will eat or where they will sleep. Meanwhile, there are over 600 multi-billionaires in the United States. “In April 2021, U.S. billionaires had nearly twice as much combined wealth than the bottom half of Americans -- $4.56 trillion vs. $2.62 trillion.” It's disturbingly ironic that we live in a country where there are people with more money than they know what to do with (or could spend in a lifetime) while simultaneously, people are losing their life because they do not have enough money to survive. Accordingly, this paper argues for the end of the multi-billionaire; that wealth be capped, captured, and redistributed to the poorest among us. To accomplish this goal, this paper begins by identifying the problem, advocating for a new measurement of poverty; and concludes with a both legal and tax policy solutions and what implementation of those solutions would look like.

Keywords: health and human rights, law and policy, poverty, wealth gap

Procedia PDF Downloads 82
11514 Augmenting History: Case Study Measuring Motivation of Students Using Augmented Reality Apps in History Classes

Authors: Kevin. S. Badni

Abstract:

Due to the rapid advances in the use of information technology and students’ familiarity with technology, learning styles in higher education are being reshaped. One of the technology developments that has gained considerable attention in recent years is Augmented Reality (AR), where technology is used to combine overlays of digital data on physical real-world settings. While AR is being heavily promoted for entertainment by mobile phone manufacturers, it has had little adoption in higher education due to the required upfront investment that an instructor needs to undertake in creating relevant AR applications. This paper discusses a case study that uses a low upfront development approach and examines the impact on generation-Z students’ motivation whilst studying design history over a four-semester period. Even though the upfront investment in creating the AR support was minimal, the results showed a noticeable increase in student motivation. The approach used in this paper can be easily transferred to other disciplines and other areas of design education.

Keywords: augmented reality, history, motivation, technology

Procedia PDF Downloads 151
11513 Improving Perceptual Reasoning in School Children through Chess Training

Authors: Ebenezer Joseph, Veena Easvaradoss, S. Sundar Manoharan, David Chandran, Sumathi Chandrasekaran, T. R. Uma

Abstract:

Perceptual reasoning is the ability that incorporates fluid reasoning, spatial processing, and visual motor integration. Several theories of cognitive functioning emphasize the importance of fluid reasoning. The ability to manipulate abstractions and rules and to generalize is required for reasoning tasks. This study, funded by the Cognitive Science Research Initiative, Department of Science and Technology, Government of India, analyzed the effect of 1-year chess training on the perceptual reasoning of children. A pretest–posttest with control group design was used, with 43 (28 boys, 15 girls) children in the experimental group and 42 (26 boys, 16 girls) children in the control group. The sample was selected from children studying in two private schools from South India (grades 3 to 9), which included both the genders. The experimental group underwent weekly 1-hour chess training for 1 year. Perceptual reasoning was measured by three subtests of WISC-IV INDIA. Pre-equivalence of means was established. Further statistical analyses revealed that the experimental group had shown statistically significant improvement in perceptual reasoning compared to the control group. The present study clearly establishes a correlation between chess learning and perceptual reasoning. If perceptual reasoning can be enhanced in children, it could possibly result in the improvement of executive functions as well as the scholastic performance of the child.

Keywords: chess, cognition, intelligence, perceptual reasoning

Procedia PDF Downloads 328