Search results for: Internet purchases
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1726

Search results for: Internet purchases

376 Traits and Dilemma: Feminism and Multiple Demands in Young Chinese Female-Directed Films

Authors: Deng Qiaoshan

Abstract:

With the rise of feminism in the global film industry, feminist expressions in Chinese films have also evolved, reflecting societal focus on gender issues. This article focuses on young Chinese female directors such as Yang Lina, Teng Congcong, and Yang Mingming. Their films now present richer female perspectives and consciously incorporate unique female life experiences. They highlight women's real-life struggles, portraying ’struggling’ female identities—characters facing professional failures and desire identity issues, ultimately returning to family roles. These films commonly explore the ‘mother-daughter relationship’, with some using genre storytelling for commercial appeal and others deconstructing the ‘myth of motherhood’ to reflect reality, rewriting traditional maternal roles. The ‘struggling’ female identity in these directors' films shows an aesthetic of ‘pseudo-reality’, blending realistic situations with poetic, lyrical elements, reflecting their creative traits and internal conflicts. These contradictions are closely related to the unique creative context of Chinese cinema in which they operate. Emerging under China's strict film censorship system, film industrialization, consumerist culture, and internet environment, new-generation directors face multiple demands. How to ‘survive’ amidst complex commercial requirements while creating films with a clear feminist consciousness is the fundamental dilemma faced by young Chinese female directors.

Keywords: female directors, feminism film, female dilemma, film censorship system

Procedia PDF Downloads 41
375 A Basic Modeling Approach for the 3D Protein Structure of Insulin

Authors: Daniel Zarzo Montes, Manuel Zarzo Castelló

Abstract:

Proteins play a fundamental role in biology, but their structure is complex, and it is a challenge for teachers to conceptually explain the differences between their primary, secondary, tertiary, and quaternary structures. On the other hand, there are currently many computer programs to visualize the 3D structure of proteins, but they require advanced training and knowledge. Moreover, it becomes difficult to visualize the sequence of amino acids in these models, and how the protein conformation is reached. Given this drawback, a simple and instructive procedure is proposed in order to teach the protein structure to undergraduate and graduate students. For this purpose, insulin has been chosen because it is a protein that consists of 51 amino acids, a relatively small number. The methodology has consisted of the use of plastic atom models, which are frequently used in organic chemistry and biochemistry to explain the chirality of biomolecules. For didactic purposes, when the aim is to teach the biochemical foundations of proteins, a manipulative system seems convenient, starting from the chemical structure of amino acids. It has the advantage that the bonds between amino acids can be conveniently rotated, following the pattern marked by the 3D models. First, the 51 amino acids were modeled, and then they were linked according to the sequence of this protein. Next, the three disulfide bonds that characterize the stability of insulin have been established, and then the alpha-helix structure has been formed. In order to reach the tertiary 3D conformation of this protein, different interactive models available on the Internet have been visualized. In conclusion, the proposed methodology seems very suitable for biology and biochemistry students because they can learn the fundamentals of protein modeling by means of a manipulative procedure as a basis for understanding the functionality of proteins. This methodology would be conveniently useful for a biology or biochemistry laboratory practice, either at the pre-graduate or university level.

Keywords: protein structure, 3D model, insulin, biomolecule

Procedia PDF Downloads 55
374 Optimizing Data Integration and Management Strategies for Upstream Oil and Gas Operations

Authors: Deepak Singh, Rail Kuliev

Abstract:

The abstract highlights the critical importance of optimizing data integration and management strategies in the upstream oil and gas industry. With its complex and dynamic nature generating vast volumes of data, efficient data integration and management are essential for informed decision-making, cost reduction, and maximizing operational performance. Challenges such as data silos, heterogeneity, real-time data management, and data quality issues are addressed, prompting the proposal of several strategies. These strategies include implementing a centralized data repository, adopting industry-wide data standards, employing master data management (MDM), utilizing real-time data integration technologies, and ensuring data quality assurance. Training and developing the workforce, “reskilling and upskilling” the employees and establishing robust Data Management training programs play an essential role and integral part in this strategy. The article also emphasizes the significance of data governance and best practices, as well as the role of technological advancements such as big data analytics, cloud computing, Internet of Things (IoT), and artificial intelligence (AI) and machine learning (ML). To illustrate the practicality of these strategies, real-world case studies are presented, showcasing successful implementations that improve operational efficiency and decision-making. In present study, by embracing the proposed optimization strategies, leveraging technological advancements, and adhering to best practices, upstream oil and gas companies can harness the full potential of data-driven decision-making, ultimately achieving increased profitability and a competitive edge in the ever-evolving industry.

Keywords: master data management, IoT, AI&ML, cloud Computing, data optimization

Procedia PDF Downloads 70
373 Human-Centric Sensor Networks for Comfort and Productivity in Offices: Integrating Environmental, Body Area Network, and Participatory Sensing

Authors: Chenlu Zhang, Wanni Zhang, Florian Schaule

Abstract:

Indoor environment in office buildings directly affects comfort, productivity, health, and well-being of building occupants. Wireless environmental sensor networks have been deployed in many modern offices to monitor and control the indoor environments. However, indoor environmental variables are not strong enough predictors of comfort and productivity levels of every occupant due to personal differences, both physiologically and psychologically. This study proposes human-centric sensor networks that integrate wireless environmental sensors, body area network sensors and participatory sensing technologies to collect data from both environment and human and support building operations. The sensor networks have been tested in one small-size and one medium-size office rooms with 22 participants for five months. Indoor environmental data (e.g., air temperature and relative humidity), physiological data (e.g., skin temperature and Galvani skin response), and physiological responses (e.g., comfort and self-reported productivity levels) were obtained from each participant and his/her workplace. The data results show that: (1) participants have different physiological and physiological responses in the same environmental conditions; (2) physiological variables are more effective predictors of comfort and productivity levels than environmental variables. These results indicate that the human-centric sensor networks can support human-centric building control and improve comfort and productivity in offices.

Keywords: body area network, comfort and productivity, human-centric sensors, internet of things, participatory sensing

Procedia PDF Downloads 139
372 Monitor Vehicle Speed Using Internet of Things Based Wireless Sensor Network System

Authors: Akber Oumer Abdurezak

Abstract:

Road traffic accident is a major problem in Ethiopia, resulting in the deaths of many people and potential injuries and crash every year and loss of properties. According to the Federal Transport Authority, one of the main causes of traffic accident and crash in Ethiopia is over speeding. Implementation of different technologies is used to monitor the speed of vehicles in order to minimize accidents and crashes. This research aimed at designing a speed monitoring system to monitor the speed of travelling vehicles and movements, reporting illegal speeds or overspeeding vehicles to the concerned bodies. The implementation of the system is through a wireless sensor network. The proposed system can sense and detect the movement of vehicles, process, and analysis the data obtained from the sensor and the cloud system. The data is sent to the central controlling server. The system contains accelerometer and gyroscope sensors to sense and collect the data of the vehicle. Arduino to process the data and Global System for Mobile Communication (GSM) module for communication purposes to send the data to the concerned body. When the speed of the vehicle exceeds the allowable speed limit, the system sends a message to database as “over speeding”. Both accelerometer and gyroscope sensors are used to collect acceleration data. The acceleration data then convert to speed, and the corresponding speed is checked with the speed limit, and those above the speed limit are reported to the concerned authorities to avoid frequent accidents. The proposed system decreases the occurrence of accidents and crashes due to overspeeding and can be used as an eye opener for the implementation of other intelligent transport system technologies. This system can also integrate with other technologies like GPS and Google Maps to obtain better output.

Keywords: accelerometer, IOT, GSM, gyroscope

Procedia PDF Downloads 75
371 Evaluation of Digital Marketing Strategies by Behavioral Economics

Authors: Sajjad Esmaeili Aghdam

Abstract:

Economics typically conceptualizes individual behavior as the consequence of external states, for example, budgets and prices (or respective beliefs) and choices. As the main goal, we focus on the influence of a range of Behavioral Economics factors on Strategies of Digital Marketing, evaluation of strategies and deformation of it into highly prospective marketing strategies. The different forms of behavioral prospects all lead to the succeeding two main results. First, the steadiness of the economic dynamics in a currency union be contingent fatefully on the level of economic incorporation. More economic incorporation leads to more steady economic dynamics. Electronic word-of-mouth (eWOM) is “all casual communications focused at consumers through Internet-based technology connected to the usage or characteristics of specific properties and services or their venders.” eWOM can take many methods, the most significant one being online analyses. Writing this paper, 72 articles have been gathered, focusing on the title and the aim of the article from research search engines like Google Scholar, Web of Science, and PubMed. Recent research in strategic management and marketing proposes that markets should not be viewed as a given and deterministic setting, exogenous to the firm. Instead, firms are progressively abstracted as dynamic inventors of market prospects. The use of new technologies touches all spheres of the modern lifestyle. Social and economic life becomes unbearable without fast, applicable, first-class and fitting material. Psychology and economics (together known as behavioral economics) are two protruding disciplines underlying many theories in marketing. The wide marketing works papers consumers’ none balanced behavior even though behavioral biases might not continuously be steadily called or officially labeled.

Keywords: behavioral economics, digital marketing, marketing strategy, high impact strategies

Procedia PDF Downloads 183
370 The Reality of the Digital Inequality and Its Negative Impact on Virtual Learning during the COVID-19 Pandemic: The South African Perspective

Authors: Jacob Medupe

Abstract:

Life as we know it has changed since the global outbreak of Coronavirus Disease 2019 (COVID-19) and business as usual will not continue. The human impact of the COVID-19 crisis is already immeasurable. Moreover, COVID-19 has already negatively impacted economies, livelihoods and disrupted food systems around the world. The disruptive nature of the Corona virus has affected every sphere of life including the culture and teaching and learning. Right now the majority of education research is based around classroom management techniques that are no longer necessary with digital delivery. Instead there is a great need for new data about how to make the best use of the one-on-one attention that is now becoming possible (Diamandis & Kotler, 2014). The COVID-19 pandemic has necessitated an environment where the South African learners are focused to adhere to social distancing in order to minimise the wild spread of the Corona virus. This arrangement forces the student to utilise the online classroom technologies to continue with the lessons. The historical reality is that the country has not made much strides on the closing of the digital divide and this is particularly a common status quo in the deep rural areas. This will prove to be a toll order for most of the learners affected by the Corona Virus to be able to have a seamless access to the online learning facilities. The paper will seek to look deeply into this reality and how the Corona virus has brought us to the reality that South Africa remains a deeply unequal society in every sphere of life. The study will also explore the state of readiness for education system around the online classroom environment.

Keywords: virtual learning, virtual classroom, COVID-19, Corona virus, internet connectivity, blended learning, online learning, distance education, e-learning, self-regulated Learning, pedagogy, digital literacy

Procedia PDF Downloads 127
369 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 168
368 Faculty Attendance Management System (FAMS)

Authors: G. C. Almiranez, J. Mercado, L. U. Aumentado, J. M. Mahaguay, J. P. Cruz, M. L. Saballe

Abstract:

This research project focused on the development of an application that aids the university administrators to establish an efficient and effective system in managing faculty attendance and discourage unnecessary absences. The Faculty Attendance Management System (FAMS) is a web based and mobile application which is proven to be efficient and effective in handling and recording data, generating updated reports and analytics needed in managing faculty attendance. The FAMS can facilitate not only a convenient and faster way of gathering and recording of data but it can also provide data analytics, immediate feedback system mechanism and analysis. The software database architecture uses MySQL for web based and SQLite for mobile applications. The system includes different modules that capture daily attendance of faculty members, generate faculty attendance reports and analytics, absences notification system for faculty members, chairperson and dean regarding absences, and immediate communication system concerning the absences incurred. Quantitative and qualitative evaluation showed that the system satisfactory meet the stakeholder’s requirements. The functionality, usability, reliability, performance, and security all turned out to be above average. System testing, integration testing and user acceptance testing had been conducted. Results showed that the system performed very satisfactory and functions as designed. Performance of the system is also affected by Internet infrastructure or connectivity of the university. The faculty analytics generated from the system may not only be used by Deans and Chairperson in their evaluation of faculty performance but as well as the individual faculty to increase awareness on their attendance in class. Hence, the system facilitates effective communication between system stakeholders through FAMS feedback mechanism and up to date posting of information.

Keywords: faculty attendance management system, MySQL, SQLite, FAMS, analytics

Procedia PDF Downloads 436
367 Modeling Factors Influencing Online Shopping Intention among Consumers in Nigeria: A Proposed Framework

Authors: Abubakar Mukhtar Yakasai, Muhammad Tahir Jan

Abstract:

Purpose: This paper is aimed at exploring factors influencing online shopping intention among the young consumers in Nigeria. Design/Methodology/approach: The paper adopted and extended Technology Acceptance Model (TAM) as the basis for literature review. Additionally, the paper proposed a framework with the inclusion of culture as a moderating factor of consumer online shopping intention among consumers in Nigeria. Findings: Despite high rate of internet penetration in Nigerian, as well as the rapid advancement of online shopping in the world, little attention was paid to this important revolution specifically among Nigeria’s consumers. Based on the review of extant literature, the TAM extended to include perceived risk and enjoyment (PR and PE) was discovered to be a better alternative framework for predicting Nigeria’s young consumers’ online shopping intention. The moderating effect of culture in the proposed model is shown to help immensely in ascertaining differences, if any, between various cultural groups among online shoppers in Nigeria. Originality/ value: The critical analysis of different factors will assist practitioners (like online retailers, e-marketing managers, website developers, etc.) by signifying which combinations of factors can best predict consumer online shopping behaviour in particular instances, thereby resulting in effective value delivery. Online shopping is a newly adopted technology in Nigeria, hence the paper will give a clear focus for effective e-marketing strategy. In addition, the proposed framework in this paper will guide future researchers by providing a tool for systematic evaluation and testing of real empirical situation of online shopping in Nigeria.

Keywords: online shopping, perceived ease of use, perceived usefulness, perceived enjoyment, technology acceptance model, Nigeria

Procedia PDF Downloads 279
366 Social Networks Global Impact on Protest Movements and Human Rights Activism

Authors: Marcya Burden, Savonna Greer

Abstract:

In the wake of social unrest around the world, protest movements have been captured like never before. As protest movements have evolved, so too have their visibility and sources of coverage. Long gone are the days of print media as our only glimpse into the action surrounding a protest. Now, with social networks such as Facebook, Instagram and Snapchat, we have access to real-time video footage of protest movements and human rights activism that can reach millions of people within seconds. This research paper investigated various social media network platforms’ statistical usage data in the areas of human rights activism and protest movements, paralleling with other past forms of media coverage. This research demonstrates that social networks are extremely important to protest movements and human rights activism. With over 2.9 billion users across social media networks globally, these platforms are the heart of most recent protests and human rights activism. This research shows the paradigm shift from the Selma March of 1965 to the more recent protests of Ferguson in 2014, Ni Una Menos in 2015, and End Sars in 2018. The research findings demonstrate that today, almost anyone may use their social networks to protest movement leaders and human rights activists. From a student to an 80-year-old professor, the possibility of reaching billions of people all over the world is limitless. Findings show that 82% of the world’s internet population is on social networks 1 in every 5 minutes. Over 65% of Americans believe social media highlights important issues. Thus, there is no need to have a formalized group of people or even be known online. A person simply needs to be engaged on their respective social media networks (Facebook, Twitter, Instagram, Snapchat) regarding any cause they are passionate about. Information may be exchanged in real time around the world and a successful protest can begin.

Keywords: activism, protests, human rights, networks

Procedia PDF Downloads 95
365 Study and Simulation of a Dynamic System Using Digital Twin

Authors: J.P. Henriques, E. R. Neto, G. Almeida, G. Ribeiro, J.V. Coutinho, A.B. Lugli

Abstract:

Industry 4.0, or the Fourth Industrial Revolution, is transforming the relationship between people and machines. In this scenario, some technologies such as Cloud Computing, Internet of Things, Augmented Reality, Artificial Intelligence, Additive Manufacturing, among others, are making industries and devices increasingly intelligent. One of the most powerful technologies of this new revolution is the Digital Twin, which allows the virtualization of a real system or process. In this context, the present paper addresses the linear and nonlinear dynamic study of a didactic level plant using Digital Twin. In the first part of the work, the level plant is identified at a fixed point of operation, BY using the existing method of least squares means. The linearized model is embedded in a Digital Twin using Automation Studio® from Famous Technologies. Finally, in order to validate the usage of the Digital Twin in the linearized study of the plant, the dynamic response of the real system is compared to the Digital Twin. Furthermore, in order to develop the nonlinear model on a Digital Twin, the didactic level plant is identified by using the method proposed by Hammerstein. Different steps are applied to the plant, and from the Hammerstein algorithm, the nonlinear model is obtained for all operating ranges of the plant. As for the linear approach, the nonlinear model is embedded in the Digital Twin, and the dynamic response is compared to the real system in different points of operation. Finally, yet importantly, from the practical results obtained, one can conclude that the usage of Digital Twin to study the dynamic systems is extremely useful in the industrial environment, taking into account that it is possible to develop and tune controllers BY using the virtual model of the real systems.

Keywords: industry 4.0, digital twin, system identification, linear and nonlinear models

Procedia PDF Downloads 148
364 Design and Implementation of a Software Platform Based on Artificial Intelligence for Product Recommendation

Authors: Giuseppina Settanni, Antonio Panarese, Raffaele Vaira, Maurizio Galiano

Abstract:

Nowdays, artificial intelligence is used successfully in academia and industry for its ability to learn from a large amount of data. In particular, in recent years the use of machine learning algorithms in the field of e-commerce has spread worldwide. In this research study, a prototype software platform was designed and implemented in order to suggest to users the most suitable products for their needs. The platform includes a chatbot and a recommender system based on artificial intelligence algorithms that provide suggestions and decision support to the customer. The recommendation systems perform the important function of automatically filtering and personalizing information, thus allowing to manage with the IT overload to which the user is exposed on a daily basis. Recently, international research has experimented with the use of machine learning technologies with the aim to increase the potential of traditional recommendation systems. Specifically, support vector machine algorithms have been implemented combined with natural language processing techniques that allow the user to interact with the system, express their requests and receive suggestions. The interested user can access the web platform on the internet using a computer, tablet or mobile phone, register, provide the necessary information and view the products that the system deems them most appropriate. The platform also integrates a dashboard that allows the use of the various functions, which the platform is equipped with, in an intuitive and simple way. Artificial intelligence algorithms have been implemented and trained on historical data collected from user browsing. Finally, the testing phase allowed to validate the implemented model, which will be further tested by letting customers use it.

Keywords: machine learning, recommender system, software platform, support vector machine

Procedia PDF Downloads 134
363 Analysis of Municipal Solid Waste Management in Nigeria

Authors: Anisa Gumel

Abstract:

This study examines the present condition of solid waste management in Nigeria. The author explores the challenges and opportunities affecting municipal solid waste management in "Nigeria" and determines the most profound challenges by analysing the interdependence and interrelationship among identified variables. In this study, multiple stakeholders, including 15 waste management professionals interviewed online, were utilised to identify the difficulties and opportunities affecting municipal solid waste in Nigeria. The interviews were transcribed and coded using NVivo to produce pertinent variables. An online survey of Nigerian internet and social media users was done to validate statements made by experts on the identified variable. In addition, a panel of five experts participated in a focus group discussion to discover the most influential factors that influence municipal solid waste management in Nigeria by analysing the interrelationships as well as the driving and reliant power of variables. The results show significant factors affecting municipal solid waste in Nigeria, including inadequate funding, lack of knowledge, and absence of legislation, as well as behavioural, financial, technological, and legal concerns grouped into five categories. Some claims stated by experts in the interview are supported by the survey data, while others are not. In addition, the focus group reveals patterns, correlations, and driving forces between variables that have been analysed. This study will provide decision-makers with a roadmap for resolving important waste management concerns in Nigeria and managing scarce resources effectively. It will also help non-governmental organisations combat malaria in Nigeria and other underdeveloped nations. In addition, the work contributes to the literature for future scholars to consult.

Keywords: municipal solid waste, stakeholders, public, experts

Procedia PDF Downloads 79
362 Using Printouts as Social Media Evidence and Its Authentication in the Courtroom

Authors: Chih-Ping Chang

Abstract:

Different from traditional objective evidence, social media evidence has its own characteristics with easily tampering, recoverability, and cannot be read without using other devices (such as a computer). Simply taking a screenshot from social network sites must be questioned its original identity. When the police search and seizure digital information, a common way they use is to directly print out digital data obtained and ask the signature of the parties at the presence, without taking original digital data back. In addition to the issue on its original identity, this conduct to obtain evidence may have another two results. First, it will easily allege that is tampering evidence because the police wanted to frame the suspect and falsified evidence. Second, it is not easy to discovery hidden information. The core evidence associated with crime may not appear in the contents of files. Through discovery the original file, data related to the file, such as the original producer, creation time, modification date, and even GPS location display can be revealed from hidden information. Therefore, how to show this kind of evidence in the courtroom will be arguably the most important task for ruling social media evidence. This article, first, will introduce forensic software, like EnCase, TCT, FTK, and analyze their function to prove the identity with another digital data. Then turning back to the court, the second part of this article will discuss legal standard for authentication of social media evidence and application of that forensic software in the courtroom. As the conclusion, this article will provide a rethinking, that is, what kind of authenticity is this rule of evidence chase for. Does legal system automatically operate the transcription of scientific knowledge? Or furthermore, it wants to better render justice, not only under scientific fact, but through multivariate debating.

Keywords: federal rule of evidence, internet forensic, printouts as evidence, social media evidence, United States v. Vayner

Procedia PDF Downloads 290
361 Exploring Challenges Faced by People Living with HIV/AIDS After Disclosure in Sub-Saharan Countries

Authors: Veliswa Nonfundo Hoho, Jabulani Gilford Kheswa

Abstract:

HIV/AIDS has been a long-term condition worldwide, which does not only affect physical health but also causes psychological and social challenges in people living with this condition. In Sub-Saharan countries, namely; Nigeria, Uganda, Zimbabwe and South Africa, people living with HIV/AIDS come across different challenges especially after one has disclosed his/her status. They experience stigma and discrimination, isolation, lack of accessing and receiving treatment, lack of support and experience psychological distress. By using the evidence-based systematic review as a form of methodology, journal articles, dissertations, internet, and books were explored. This paper seeks to describe the challenges faced by people living with HIV/AIDS after disclosure, which forms a critical component of HIV/AIDS prevention and treatment interventions. The disclosure process model is used to underpin the study. This theory allows one to understand when and why interpersonal and verbal self-disclosure is beneficial for individuals who live with concealable stigmatized identities such as HIV/AIDS. Literature findings advocate that both negative and positive results were noted after disclosing one’s HIV status and psychosocial well-being of the majority of people living with HIV/AIDS also get affected especially in societies which subscribe HIV/AIDS pandemic to witchcraft. As for the infected homosexuals, research indicates that they suffer in silence and to cover their emotional emptiness due to ostracism, they often report low- self-efficacy with regard to condom use and become susceptible to reinfections which further place their lives at heightened risk for low immune system. In this regard, this paper challenges the policies which protect the dignity of people living with HIV/AIDS and calls for unity and financial support in favour of psychoeducational programmes and support groups aimed at curbing discrimination.

Keywords: disclosure, discrimination, homosexuality, self-efficacy

Procedia PDF Downloads 235
360 Sick Minds and Social Media: Treacherous Trends in Online Stalking, Aggression, and Murder

Authors: Amanda Maitland

Abstract:

This preliminary study has examined ways in which social media may help cause stalker murder by individuals with personality disorders and a strong sense of sexual propriety. A public display on social media by the intended victim was felt to be a trigger that instigated interpersonal violence. To identify behavioural paradigms, case studies of intimate partner murders were explored using news media sources and documentaries. In all of the case studies, social media interaction and social media postings occurred shortly before the murder. The evidence suggested a preponderance of correlations between the social media postings, stalking behaviours, personality disorders, and the murder of an intimate partner. In addition to this, a profile for of Facebook/social media murder was gleaned from the paradigms of behavior found in the case studies. The evidence showed a complex relationship between severe violence, stalking, borderline personality, and intimate partner violence was identified through the study. The struggle clients have in dealing with the: public, ambiguous and unrelenting nature of social media postings was also observed. The murderers anguish and rage appeared to be further intensified by attitudes of sexual propriety and entitlement. These attitudes were evident in all the case studies. The study concluded with further research on how the public can protect themselves from entering situations where social media postings might trigger a violent response. Further to this, psychological approaches were identified that might support client’s with personality disorders to cope with perceived provocative and distressing data on the internet. Thus, the findings of this study will be of interest to: therapists, psychologists, nurses, criminologists and social workers.

Keywords: social media, borderline personality, murder, cyberstalking, intimate partner violence, sexual propriety, Facebook

Procedia PDF Downloads 245
359 The Capabilities of New Communication Devices in Development of Informing: Case Study Mobile Functions in Iran

Authors: Mohsen Shakerinejad

Abstract:

Due to the growing momentum of technology, the present age is called age of communication and information. And With Astounding progress of Communication and information tools, current world Is likened to the "global village". That a message can be sent from one point to another point of the world in a Time scale Less than a minute. However, one of the new sociologists -Alain Touraine- in describing the destructive effects of new changes arising from the development of information appliances refers to the "new fields for undemocratic social control And the incidence of acute and unrest social and political tensions", Yet, in this era That With the advancement of the industry, the life of people has been industrial too, quickly and accurately Data Transfer, Causes Blowing new life in the Body of Society And according to the features of each society and the progress of science and technology, Various tools should be used. One of these communication tools is Mobile. Cellular phone As Communication and telecommunication revolution in recent years, Has had a great influence on the individual and collective life of societies. This powerful communication tool Have had an Undeniable effect, On all aspects of life, including social, economic, cultural, scientific, etc. so that Ignoring It in Design, Implementation and enforcement of any system is not wise. Nowadays knowledge and information are one of the most important aspects of human life. Therefore, in this article, it has been tried to introduce mobile potentials in receive and transmit News and Information. As it follows, among the numerous capabilities of current mobile phones features such as sending text, photography, sound recording, filming, and Internet connectivity could indicate the potential of this medium of communication in the process of sending and receiving information. So that nowadays, mobile journalism as an important component of citizen journalism Has a unique role in information dissemination.

Keywords: mobile, informing, receiving information, mobile journalism, citizen journalism

Procedia PDF Downloads 410
358 The Prevalence of Cardiovascular Diseases in World-Class Triathletes: An Internet-Based Study from 2006 to 2019

Authors: Lingxia Li, Frédéric Schnell, Shuzhe Ding, Solène Le Douairon Lahaye

Abstract:

Background: The prevalence of cardiovascular diseases (CVD) in different triathlon sports disciplines has not been determined. Purpose: The present study aimed to determine the prevalence of CVD in world-class triathletes according to their sex, sports disciplines (aquathlon, duathlon, triathlon…), and formats (short/medium, long, and ultra-long distance). Methods: Male and female elite athletes from eleven triathlon sport disciplines, ranked in the internationally yearly top 10 between 2006 and 2019, were included. The athlete’s name was associated in a Google search with selected key terms related to heart disease and/or cardiac abnormalities. The prevalence and the hazard function of the variation were calculated, and the differences were then compared. Results: From 1329 athletes (male 639, female 690), 13 cases of CVD (0.98%, 95% CI: [0.45-1.51]) were identified, and the mean age of their occurrence was 29±6 years. Although no sex differences were found in each sport discipline/format (p > 0.05), severe outcomes (sudden cardiac arrest/death and those who had to stop their sports practice) were only observed in males. Short-distance triathlon (5.08%, 95% CI: [1.12-9.05]) was more affected than other disciplines in short/medium, long, and ultra-long formats. The prevalence of CVD in athletes who participated in multi-type of sports disciplines (4.14%, 95% CI: [1.14-7.15]) was higher than in those who participated in one type (0.52%, 95% CI: [0.10-0.93]) (p = 0.0004). Conclusion: Athletes in short-distance triathlon were more affected than other disciplines in short/medium, long and ultra-long formats. Athletes who participate in short/medium distances and those who participate in multi-type of sports disciplines should be closely monitored regardless of sex.

Keywords: cardiovascular diseases, sudden cardiac death, triathlon sport disciplines, world-class athletes

Procedia PDF Downloads 151
357 EMS Providers' Ability and Willingness to Respond to Bioterrorism

Authors: Ryan Houser

Abstract:

Introduction: Previous studies have found that public health systems within the United States are inadequately prepared for an act of biological terrorism. As the COVID-19 pandemic continues, few studies have evaluated bioterrorism preparedness of Emergency Medical Services, even in the accelerating environment of biothreats. Methods: This study utilized an Internet-based survey to assess the level of preparedness and willingness to respond to a bioterrorism attack and identify factors that predict preparedness and willingness among Nebraska EMS (Emergency Medical Services ) providers. The survey was available for one month in 2021, during which 190 EMS providers responded to the survey. Results: Only 56.8% of providers were able to recognize an illness or injury as potentially resulting from exposure to a CBRN agent. The provider Clinical Competency levels range from a low of 13.6% (ability to initiate patient care within his/her professional scope of practice and arrange for prompt referral appropriate to the identified condition(s)) to a high of 74% (the ability to respond to an emergency within the emergency management system of his/her practice, institution and community). Only 10% of the respondents are both willing and able to effectively function in a bioterror environment. Discussion: In order to effectively prepare for and respond to a bioterrorist attack, all levels of the healthcare system need to have the clinical skills, knowledge, and abilities necessary to treat patients exposed. Policy changes and increased focus on training and drills are needed to ensure a prepared EMS system which is crucial to a resilient state. EMS entities need to be aware of the extent of their available workforce so that the country can be prepared for the increasing threat of bioterrorism or other novel emerging infectious disease outbreaks. A resilient nation relies on a prepared set of EMS providers who are willing to respond to biological terrorism events.

Keywords: bioterrorism, prehospital, EMS, disaster, emergency, medicine, preparedness, policy

Procedia PDF Downloads 156
356 Approaches to Tsunami Mitigation and Prevention: Explaining Architectural Strategies for Reducing Urban Risk

Authors: Hedyeh Gamini, Hadi Abdus

Abstract:

Tsunami, as a natural disaster, is composed of waves that are usually caused by severe movements at the sea floor. Although tsunami and its consequences cannot be prevented in any way, by examining past tsunamis and extracting key points on how to deal with this incident and learning from it, a positive step can be taken to reduce the vulnerability of human settlements and reduce the risk of this phenomenon in architecture and urbanism. The method is reviewing and has examined the documents written and valid internet sites related to managing and reducing the vulnerability of human settlements in face of tsunami. This paper has explored the tsunamis in Indonesia (2004), Sri Lanka (2004) and Japan (2011), and of the study objectives has been understanding how they dealt with tsunami and extracting key points, and the lessons from them in terms of reduction of vulnerability of human settlements in dealing with the tsunami. Finally, strategies to prevent and reduce the vulnerability of communities at risk of tsunamis have been offered in terms of architecture and urban planning. According to what is obtained from the study of the recent tsunamis, the authorities' quality of dealing with them, how to manage the crisis and the manner of their construction, it can be concluded that to reduce the vulnerability of human settlements against tsunami, there are generally four ways that are: 1-Construction of tall buildings with opening on the first floor so that water can flow easily under and the direction of the building should be in a way that water passes easily from the side. 2- The construction of multi-purpose centers, which could be used as vertical evacuation during accidents. 3- Constructing buildings in core forms with diagonal orientation of the coastline, 4- Building physical barriers (natural and synthetic) such as water dams, mounds of earth, sea walls and creating forests

Keywords: tsunami, architecture, reducing vulnerability, human settlements, urbanism

Procedia PDF Downloads 394
355 Influence of Socio-Economic Factors on Crime Perpetuation Among Inmates of Correctional Facilities in South-West Nigeria

Authors: Ebenezer Bayode Agboola

Abstract:

The study investigated the influence of socioeconomic factors on crime perpetuation among inmates of correctional facilities in South West Nigeria. A sample size of two hundred and forty-four inmates was drawn from Ado, Akure and Ilesha correctional facilities. The sample size consisted of both male and female inmates. Individual inmate was drawn through systematic sampling with the use of inmates’ register at the correctional facilities. The study employed a mixed design, which allowed the blend of both quantitative and qualitative methods. For the quantitative method, data was collected through the use of a questionnaire and for the qualitative method; data was collected with the aid of an in-depth interview (ID. Four research questions were raised for the study and analysed descriptively using simple frequency count and percentage. Five research hypotheses were formulated for the study and tested using Analysis of Variance (ANOVA) and Multiple Regressions. Based on the data analysis, findings revealed that there was a significant relationship between family history and perpetuation of crime among inmates. Though no significant relationship was found between employment and the perpetuation of crime, however, the rate of crime perpetuation by individuals was significantly found to be related to peer pressure. Also, the study further found that there was a significant relationship between the use of substances and perpetuation of crime. Lastly, it was found that there was a significant relationship between family history, employment, and peer pressure. The study recommended that Parents should pay adequate attention to their children, especially during the adolescent stage and that the Government should enact relevant laws that will checkmate the rising involvement of young people in cybercrime or internet fraud.

Keywords: crime, socio economic factor, inmates, correctional facilities, Southwest

Procedia PDF Downloads 88
354 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 141
353 WhatsApp Application and Challenges of Radio Broadcasting in Northern Nigeria: Special Interest on FRCN Kaduna

Authors: Aliyu Damri

Abstract:

This study analyzed the emergence of WhatsApp and how employees at the Federal Radio Corporation of Nigeria, Kaduna defined the concept base on their vast broadcasting experiences for over five decades and application of the phenomenon to the radio station. It also analyzed the nature, patterns, dimensions, features, challenges as well as the effects of WhatsApp as a social networking site with specific interest on the radio outlet. Also, the study identified how the radio organization responded to the challenges in an attempt to adapt to the new pattern of broadcasting characterized by many technological transformations. The study further explained in details such skills journalists need to function optimally using WhatsApp as well as the impacts of the WhatsApp on radio broadcasting. It used a combination of published materials, focus group discussion, in depth interviews and participant observation on the activities of the radio stations to address the research questions. The data generated provided insight to better understand the challenges posed to FRCN Kaduna as a result of WhatsApp application and how FRCN Kaduna responded to the challenges. It also provided information on the skills journalists need to function optimally in using WhatsApp application in the radio station. The interview and focus group discussion’s transcripts and the published materials were analyzed along thematic pattern related to the research questions in the study. The dominant response relied heavily on change in the radio station’s organizational and technical integration of newsrooms, the use of a multiskilled workforce, application of a flexible and user-friendly technology in all aspects of production, expansion of the station’s services in to new media such as internet and mobile phones as well as sharing of ideas across different units in the radio outfit.

Keywords: broadcasting, challenge, northern Nigeria, radio, WhatsApp application

Procedia PDF Downloads 129
352 Investigate the Rural Mobility and Accessibility Challenges of Seniors

Authors: Tom Ryan

Abstract:

This paper investigates the rural mobility and accessibility challenges of a specific target group - Seniors. The target group is those over 66 years of age who are entitled to use the Public Transport (PT) Free Travel Scheme in rural Ireland. The paper explores at a high level some of the projected rural PT challenges and requirements over the next 10-15 years, noting that statistical predictions show that there will be a significant population demographic shift within the Senior's age profile. Using the PESTEL framework, the literature review explored existing research concerning mobility, accessibility challenges, and the opportunities Seniors face. Twenty-seven qualitative in-depth interviews with stakeholders within the ecosystem were undertaken. The stakeholders included: rural PT customers, Local-Link managers, NTA senior management, a Minister of State, and a European parliament policymaker. Tier 1 interviewee feedback spotlights that the PT network system does not exist for rural patients to access hospital facilities. There was no evidence from the Tier 2 research findings to show that health policymakers and transport planners are working to deliver a national solution to support patients getting access to hospital appointments. Several research interviewees discussed the theme of isolation and the perceived stigma of senior males utilising PT. The findings indicated that MaaS is potentially revolutionary in the PT arena. Finally, this paper suggests several short-, medium- and long-term recommendations based on the research findings. These recommendations are a potential springboard to ensure that rural PT is suitable for future Irish generations.

Keywords: accessibility, active ageing, car dependence, isolation, seniors health issues, behavioural changes, environmental challenges, internet of things, demand responsive, mobility as a service

Procedia PDF Downloads 109
351 Antecedents of Regret and Satisfaction in Electronic Commerce

Authors: Chechen Liao, Pui-Lai To, Chuang-Chun Liu

Abstract:

Online shopping has become very popular recently. In today’s highly competitive online retail environment, retaining existing customers is a necessity for online retailers. This study focuses on the antecedents and consequences of Internet buyer regret and satisfaction in the online consumer purchasing process. This study examines the roles that online consumer’s purchasing process evaluations (i.e., search experience difficulty, service-attribute evaluations, product-attribute evaluations and post-purchase price perceptions) and alternative evaluation (i.e., alternative attractiveness) play in determining buyer regret and satisfaction in e-commerce. The study also examines the consequences of regret, satisfaction and habit in regard to repurchase intention. In addition, this study attempts to investigate the moderating role of habit in attaining a better understanding of the relationship between repurchase intention and its antecedents. Survey data collected from 431 online customers are analyzed using structural equation modeling (SEM) with partial least squares (PLS) and support provided for the hypothesized links. These results indicate that online consumer’s purchasing process evaluations (i.e., search experience difficulty, service-attribute evaluations, product-attribute evaluations and post-purchase price perceptions) have significant influences on regret and satisfaction, which in turn influences repurchase intention. In addition, alternative evaluation (i.e., alternative attractiveness) has a significant positive influence on regret. The research model can provide a richer understanding of online customers’ repurchase behavior and contribute to both research and practice.

Keywords: online shopping, purchase evaluation, regret, satisfaction

Procedia PDF Downloads 283
350 Comparison of Blockchain Ecosystem for Identity Management

Authors: K. S. Suganya, R. Nedunchezhian

Abstract:

In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.

Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity

Procedia PDF Downloads 130
349 An Exploratory Study on 'Sub-Region Life Circle' in Chinese Big Cities Based on Human High-Probability Daily Activity: Characteristic and Formation Mechanism as a Case of Wuhan

Authors: Zhuoran Shan, Li Wan, Xianchun Zhang

Abstract:

With an increasing trend of regionalization and polycentricity in Chinese contemporary big cities, “sub-region life circle” turns to be an effective method on rational organization of urban function and spatial structure. By the method of questionnaire, network big data, route inversion on internet map, GIS spatial analysis and logistic regression, this article makes research on characteristic and formation mechanism of “sub-region life circle” based on human high-probability daily activity in Chinese big cities. Firstly, it shows that “sub-region life circle” has been a new general spatial sphere of residents' high-probability daily activity and mobility in China. Unlike the former analysis of the whole metropolitan or the micro community, “sub-region life circle” has its own characteristic on geographical sphere, functional element, spatial morphology and land distribution. Secondly, according to the analysis result with Binary Logistic Regression Model, the research also shows that seven factors including land-use mixed degree and bus station density impact the formation of “sub-region life circle” most, and then analyzes the index critical value of each factor. Finally, to establish a smarter “sub-region life circle”, this paper indicates that several strategies including jobs-housing fit, service cohesion and space reconstruction are the keys for its spatial organization optimization. This study expands the further understanding of cities' inner sub-region spatial structure based on human daily activity, and contributes to the theory of “life circle” in urban's meso-scale.

Keywords: sub-region life circle, characteristic, formation mechanism, human activity, spatial structure

Procedia PDF Downloads 300
348 A Study on Hierarchy and Popularity of Foreign TV Series with Different Origin Countries among Chinese Audiences from a Uses and Gratification Perspective

Authors: Terigele

Abstract:

Cultural products are always shelved into different classes of a hierarchy that separates so-called highbrow and lowbrow cultures. This study illustrated that audiences might even construct a hierarchy according to the origin countries when consuming certain products. Chinese audiences now have access to TV series from all around the world thanks to the internet. TV series from different origin countries show some particular features in terms of length, theme, plots, accessibility, seriousness etc. Their audiences were therefore stereotyped because of what they watch. Based on in-depth interviews with 20 participants, this research has following findings: 1) Most popular origin countries of foreign TV series in China are Korea, the United States, the United Kingdom, Japan and European countries in a descending order. Korean TV series are most popular because they are less serious and more accessible compared to others. 2) In the hierarchy of the TV series, European TV series stand on the top followed by British and American TV series. Japanese TV series are also categorized into highbrow class. Korean TV series are at the bottom and always seen as lowbrow cultural products. 3) Most audiences consume TV series from more than one origin countries and have different needs when watching them. Participants reported that they watch European TV series because those TV series are more artistic than their counterparts and of great quality. They watch British and American TV series mainly to improve their English and to learn about the culture. They find Japanese TV series very enjoyable with a large variety of themes and impressive lines. Audiences watch Korean TV series mostly to entertain and kill time. 4) Audiences do care about cultural taste. Especially those who watch European, British and American TV series usually tend to consider audiences who watch nothing but Korean TV series to be shallow. On the other hand, Korean TV series’ audiences seem to care less about the hierarchy of the TV series. Even when they discuss the hierarchy, they tend to accept the judgments with ironies and jokes. Future studies can dig deeply into the genre and content of TV series with different origin countries and also investigate more about the psychology of audiences regarding the gender, age, education, socioeconomic status etc.

Keywords: foreign TV series, hierarchy, popularity, uses and gratification

Procedia PDF Downloads 243
347 Puerto Rico and Pittsburg: A Social Psychology Perspective on How Perceived Infringement on Job and Cultural Identity Unite Racially Different Working-Class Groups

Authors: Reagan Rodriguez

Abstract:

With a growing divide between political echo chambers in the United States, exacerbated by race and income inequality, it might seem to be unfathomable to draw connections that tie working class in an industrial city and a U.S. territory. Yet, in regions where either the economy has been hit due to dwindling job infrastructure or natural disasters have left indelible marks on an island already once marked by colonial imperialism, a larger social shared identity is at play. Fracking has long been an intergenerational and stable work opportunity for many in the Pittsburg PA, yet the rising severity of global climate change may soon impact the policy and even presidential elections which could result in the reduction of jobs in the industry. Cock-fighting, considered a cultural mainstay within the island of Puerto Rico, has already had legislation banning activity and thus cutting out one of the most lucrative aspects of a severely injured economy. Insecurity, infringement, and isolation while being tied to a working-class bracket with no other opportunities in proximity have left both groups expressing similar frustration and while another larger shared identity politic is giving little other options to develop social mobility. This paper utilizes a thematic analysis and compares convergent and divergent themes on internet forums amongst unionized fracking workers in Pittsburg and cockfighters in Puerto Rico. This research examines how group identity in relation to job and cultural identity is most strong and at which points its most malleable; when intergenerational job identity becomes a part of one’s cultural identity, its override may be strongest when it is perceived as threatened. Final findings and limitations were comprehensively outlined.

Keywords: identity threat, social psychology, group identity, culture and social mobility

Procedia PDF Downloads 150