Search results for: information society
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13679

Search results for: information society

12329 Influence of the Popularity of Opera during Risorgimento on Foreign Presence in Italy

Authors: Andrew Wee

Abstract:

As a result of the Italian Independence Wars starting in 1848, Italy began to change through unification. People gradually moved away from some of their traditional practices and values, such as the long-held belief that women were inferior to men, as part of the Risorgimento. Italians began to take interest in opera as a form of emotional release. As opera became more popular and prominent in their culture, it aided in the dissemination of ideas, especially stimulating the spread of imperialism, in the late 19th century, as Italy began extending its presence to other countries. In order to collect the information needed to analyze Italy’s foreign presence, it was necessary to consult texts concerning the culture of the Risorgimento. These texts included primary sources from operatic composers and contemporary recorded accounts. Letters from Giuseppe Verdi, a leader in opera during the Risorgimento, have been scrutinized for indications of popular attitudes of the time. The cultural context of the Risorgimento is essential to understanding the Italian motives and attitudes towards the outside world. On the more political side, research has also entailed the study of historical data of general laws, policies, and their purposes concerning geopolitical boundaries and foreign affairs, such as Edward Said’s thesis on Orientalism. By establishing these two characteristics of Italy, the paper will thoroughly illustrate Italy’s presence in foreign affairs. Texts have been searched with the intent of using information that reveals Italian attitudes toward exotic countries to determine whether their demeanor was positive or condescending. Motives behind sources have been interpreted in context in order to form a complete picture of the Italian sentiment towards foreigners. Additionally, research pertaining to Italian nationalism and imperialism such as song and literature has been used. The primary form of research has been the division of sources that are culturally based and those that are political in nature. Opera had always been developing since its creation in the 17th century, and in the 19th century, the bel canto movement revolutionized opera and its role in Italian society. This paper uses evidence that popular sentiment was influenced by opera to support the belief that the evolution of opera was as a result of the nationalist sentiment, and in turn fueled the cultural movement known as the Risorgimento. In this way, opera proceeded to affect Italian culture by spreading the idea of imperialism.

Keywords: opera, Italian unification, music history, imperialism

Procedia PDF Downloads 351
12328 Humans Trust Building in Robots with the Help of Explanations

Authors: Misbah Javaid, Vladimir Estivill-Castro, Rene Hexel

Abstract:

The field of robotics is advancing rapidly to the point where robots have become an integral part of the modern society. These robots collaborate and contribute productively with humans and compensate some shortcomings from human abilities and complement them with their skills. Effective teamwork of humans and robots demands to investigate the critical issue of trust. The field of human-computer interaction (HCI) has already examined trust humans place in technical systems mostly on issues like reliability and accuracy of performance. Early work in the area of expert systems suggested that automatic generation of explanations improved trust and acceptability of these systems. In this work, we augmented a robot with the user-invoked explanation generation proficiency. To measure explanations effect on human’s level of trust, we collected subjective survey measures and behavioral data in a human-robot team task into an interactive, adversarial and partial information environment. The results showed that with the explanation capability humans not only understand and recognize robot as an expert team partner. But, it was also observed that human's learning and human-robot team performance also significantly improved because of the meaningful interaction with the robot in the human-robot team. Moreover, by observing distinctive outcomes, we expect our research outcomes will also provide insights into further improvement of human-robot trustworthy relationships.

Keywords: explanation interface, adversaries, partial observability, trust building

Procedia PDF Downloads 204
12327 Evidence Based Policy Studies: Examining Alternative Policy Practice towards Improving Enrolment to Higher Education in Nigeria

Authors: Muftahu Jibirin Salihu, Hazri Jamil

Abstract:

The persisting challenge of access and enrolment to higher education in commonwealth countries has been reported in several studies, including reports of the international organization such as World Bank, UNESCO among others however from the macro perspective. The overarching aim of this study is to examine alternative policy practices towards improving access to university education in Nigeria at meso level of policy practice from evidence base policy studies using one university as a case. The study adopted a qualitative approach to gain insightful understanding on the issue of the study employing a semi-structure interview and policy documents as the means for obtaining the data and other relevant information for the study. The participants of the study were purposively chosen which comprise of a number of individuals from the selected university and other related organization which responsible for the policies development and implementation of Nigerian higher education system. From the findings of the study, several initiatives have been taken at meso level to address this challenge including the introduction of the University Matriculation Program as an alternative route for enhancing to access to the university education. However, the study further provided a number of recommendations which aimed at improving access to university education such as improving the entry requirements, society orientation on university education and the issue of ranking of certificate among the Nigerian higher institutions of learning.

Keywords: policy practice, access, enrolment, university, education, Nigeria

Procedia PDF Downloads 275
12326 The Management of Company Directors Conflicts of Interest in Large Corporations and the Issue of Public Interest

Authors: Opemiposi Adegbulu

Abstract:

The research investigates the existence of a public interest consideration or rationale for the management of directors’ conflicts of interest within large public corporations. This is conducted through extensive literature review and theories on the definition of conflicts of interest, the firm and purposes of the fiduciary duty of loyalty under which the management of these conflicts of interest find their foundation. Conflicts of interest is an elusive, diverse and engaging subject, a cross-cutting problem of governance which involves all levels of governance, ranging from local to global, public to corporate or financial sectors. It is a common issue that affects corporate governance and corporate culture, having a negative impact on the reputation of corporations and their trustworthiness. It is clear that addressing this issue is imperative for good governance of corporations as they are increasingly becoming and are powerful global economies with significant power and influence in the society. Similarly, the bargaining power of these powerful corporations has been recognised by international organisations such as the UN and the OECD. This is made evident by the increasing calls and push for greater responsibility of these corporations for environmental and social disasters caused by their corporate activities and their impact in various parts of the world. Equally, in the US, the Sarbanes-Oxley Act like other legislation and regulatory efforts made to manage conflicts of interest linked to corporate governance, in many countries indicates that there is a (global) public interest in the maintenance of the orderly functioning of commerce. Consequently, the governance of these corporations is tremendously pivotal to the society as it touches upon a key aspect of the good functioning of society. This is because corporations, particularly large international corporations can be said to be the plumbing of the global economy. This study will employ theoretical, doctrinal and comparative methods. The research will make use largely of theory-guided methodology and theoretical framework – theories of the firm, public interest, regulation, conflicts of interest in general, directors’ conflicts of interest and corporate governance. Although, the research is intended to be narrowed down to the topic of conflicts of interest in corporate governance, the subject of company directors’ duty of loyalty and the management of conflicts of interest, an examination of the history, origin and typology of conflicts of interest in general will be carried out in order to identify some specific challenges to understanding and identifying these conflicts of interest; origin, diverging theories, psychological barrier to definition, similarities with public sector conflicts of interest due to the notions of corrosion of trust, the effect on decision-making and judgment, “being in a particular kind of situation”, etc. The result of this research will be useful and relevant in the identification of the rationale for the management of directors’ conflicts of interest, contributing to the understanding of conflicts of interest in the private sector and the significance of public interest in corporate governance of large corporations.

Keywords: conflicts of interest, corporate governance, corporate law, directors duty of loyalty, public interest

Procedia PDF Downloads 374
12325 Proposal of a Model Supporting Decision-Making Based on Multi-Objective Optimization Analysis on Information Security Risk Treatment

Authors: Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Moreover, risks generally have trends and it also should be considered in risk treatment. Therefore, this paper provides the extension of the model proposed in the previous study. The original model supports the selection of measures by applying a combination of weighted average method and goal programming method for multi-objective analysis to find an optimal solution. The extended model includes the notion of weights to the risks, and the larger weight means the priority of the risk.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 466
12324 Innovation in Information Technology Services: Framework to Improve the Effectiveness and Efficiency of Information Technology Service Management Processes, Projects and Decision Support Management

Authors: Pablo Cardozo Herrera

Abstract:

In a dynamic market of Information Technology (IT) Service and with high quality demands and high performance requirements in decreasing costs, it is imperative that IT companies invest organizational effort in order to increase the effectiveness of their Information Technology Service Management (ITSM) processes through the improvement of ITSM project management and through solid support to the strategic decision-making process of IT directors. In this article, the author presents an analysis of common issues of IT companies around the world, with strategic needs of information unmet that provoke their ITSM processes and projects management that do not achieve the effectiveness and efficiency expected of their results. In response to the issues raised, the author proposes a framework consisting of an innovative theoretical framework model of ITSM management and a technological solution aligned to the Information Technology Infrastructure Library (ITIL) good practices guidance and ISO/IEC 20000-1 requirements. The article describes a research that proves the proposed framework is able to integrate, manage and coordinate in a holistic way, measurable and auditable, all ITSM processes and projects of IT organization and utilize the effectiveness assessment achieved for their strategic decision-making process increasing the process maturity level and improving the capacity of an efficient management.

Keywords: innovation in IT services, ITSM processes, ITIL and ISO/IEC 20000-1, IT service management, IT service excellence

Procedia PDF Downloads 399
12323 The Perceptions of High School English Home Language Learners on Fostering 21st Century Skills Through the Use of Technology in the Classroom

Authors: Lisa Naudine Parrock, Geoffrey Lautenbach

Abstract:

The changes brought to society by the technological development in the Fourth Industrial Revolution are also reaching the sphere of education and the education system needs to respond. Students need skills such as communication, collaboration, creativity and critical thinking in order to be successful in the 21st Century, which could be developed through the meaningful use of technology. This study is theorized by the 21st Century Framework for Learning and examines the student perceptions of grade 10 and 11 English Home language learners on how the technology used in their English classroom contributes to the development of 21st Century skills. The researcher adopted a constructivist paradigm and presented findings based on a general qualitative method. The study found that students perceived the use of technology in the classroom positively contributed to their development of communication, collaboration, creativity and critical thinking. Students also perceived technology as contributing to their access to information, a positive classroom atmosphere, heightened engagement in learning and developing skills necessary for their future. In addition, this study highlighted certain pedagogical strategies and digital tools that support the development of 21st Century skills. The findings suggest that the meaningful integration of technology fosters the development of 21st Century skills in grade 10 and 11 learners.

Keywords: educational technology, 21st century skills, fourth industrial revolution, affordances of technology

Procedia PDF Downloads 138
12322 Use of Information and Communication Technology (ICT) Among Nigerian Colleges of Education Lecturers: A Gender Analysis Approach

Authors: Rasheed A. Saliu, Sunday E. Ogundipe, Oluwaseun A. Adefila

Abstract:

Information and Communication Technology (ICT) in recent time has transformed the means by which we inform ourselves, with world events and areas of personal interests, and further our learning. Today, for many, books and journals are no longer the first or primary source of information or learning. We now regularly rely on images, video, animations and sound to acquire information and to learn. Increased and improved access to the internet has accelerated this phenomenon. We now acquire and access information in ways fundamentally different from the pre-ICT era. But to what extent is academic staff in colleges of education, having access to and the utilising of ICT devices in their lecture deliveries especially in School of Science and Vocational and Technical? The main focus of this paper is to proffer solution to this salient question. It is essentially an empirical study carried out in five colleges of education in south-west zone of Nigeria. The target population was the academic staff in the selected institution. A total number of 150 male and female lecturers were contacted for the study. The main instrument was questionnaire. The finding reveals that male lecturers are much more ICT inclined than women folk in the academics. Some recommendations were made to endear academics to utilizing ICT at their disposal to foster qualitative delivery in this digital era.

Keywords: education, gender, ICT, Nigeria

Procedia PDF Downloads 303
12321 The Future of Truth and Lies in the Context of Technology-Mediated Environments

Authors: James P. Takona

Abstract:

Most of the global population has never lived through a pandemic, and thus there is so much that remains unknown about students' capacity for resiliency under such environments and circumstances and what a timeline for full recovery will look like. The session will guide participants to focus on misinformation and disinformation in the context of recent crisis events, with specific reference to how information flows across. Particular focus will be given to the flow of information in mediated technology and platforms with particular reference to K-12 and teacher preparation program environments. The paper will draw on theories and responses from the sociology of disaster, the social psychology of rumoring, and published studies on disinformation and misinformation. Applications will be identified and applied in the context of online information-sharing during crisis events. The session will offer the application of the Center for Contagious Diseases' Crisis and Emergency Risk Communication model to understand the themes and evolution of misinformation and disinformation. The paper will invite session participants to suggest and interact with raised challenges on the impact of dis-and misinformation.

Keywords: Sociology of disaster, misinformation, dis-information, Social Psychology of rumors

Procedia PDF Downloads 97
12320 Comparison of the Logistic and the Gompertz Growth Functions Considering a Periodic Perturbation in the Model Parameters

Authors: Avan Al-Saffar, Eun-Jin Kim

Abstract:

Both the logistic growth model and the gompertz growth model are used to describe growth processes. Both models driven by perturbations in different cases are investigated using information theory as a useful measure of sustainability and the variability. Specifically, we study the effect of different oscillatory modulations in the system's parameters on the evolution of the system and Probability Density Function (PDF). We show the maintenance of the initial conditions for a long time. We offer Fisher information analysis in positive and/or negative feedback and explain its implications for the sustainability of population dynamics. We also display a finite amplitude solution due to the purely fluctuating growth rate whereas the periodic fluctuations in negative feedback can lead to break down the system's self-regulation with an exponentially growing solution. In the cases tested, the gompertz and logistic systems show similar behaviour in terms of information and sustainability although they develop differently in time.

Keywords: dynamical systems, fisher information, probability density function (pdf), sustainability

Procedia PDF Downloads 434
12319 Film Review of 'Heroic Saviours and Survivors': The Representation of Sex Trafficking in Popular Films in India

Authors: Nisha James, Shubha Ranganathan

Abstract:

One of the most poignant forms of organized crime against women, which has rarely made it to the world of Indian cinema, is that of sex trafficking, i.e. the forcible involvement of women in the sex trade through fraud or coercion (Hughes, 2005). In the space of Indian cinema, much of the spotlight has been on the sensational drug trafficking and gang mafia of Bombay. During our research on sex trafficking, the rehabilitated women interviewed often expressed strong criticism about mass media’s naive portrayal of prostitutes as money-minting, happy and sexually driven women. They argued that this unrealistic portrayal ignored the fact that this was not a reality for the majority of trafficked women. Given the gravity of sex trafficking as a human rights issue, it is, therefore, refreshing to see three recent films on sex trafficking in Indian Languages – Naa Bangaaru Talli (2014, Telugu), Mardaani (2014, Hindi) and Lakshmi (2014, Hindi). This paper reviews these three films to explore the portrayal of the everyday reality of trafficking for women. Film analysis was used to understand the representation of psychological issues in the media. The strength of these movies starts with their inspirations which are of true stories and that they are all aimed at bringing awareness about the issue of sex trafficking, which is a rising social evil in Indian society though none of the three films move to portray the next phase of rehabilitation and reintegration of victims, which is a very complex and important process in the life of a survivor. According to findings, survivors of sex trafficking find the rehabilitation and reintegration into society to be a slow and tough part of their life as they continuously face stigma and social exclusion and have to strive to live against all odds of non-acceptance starting from their family.

Keywords: film review, Indian films, sex trafficking, survivors

Procedia PDF Downloads 441
12318 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces

Authors: Igor Pejic

Abstract:

The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.

Keywords: asymmetrical warfare, conventional forces, security, terrorism

Procedia PDF Downloads 266
12317 A Qualitative Exploration of How Brazilian Immigrant Mothers Living in the United States Obtain Information about Physical Activity and Screen-Viewing for Their Young Children

Authors: Ana Cristina Lindsay, Mary L. Greaney

Abstract:

Background: Racial/ethnic minority children of low-income immigrant families remain at increased risk of obesity. Consistent with high rates of childhood obesity among racial/ethnic minority children are high rates of physical inactivity and increased levels of sedentary behaviors (e.g., TV and other screen viewing). Brazilians comprise a fast-growing immigrant population group in the US, yet little research has focused on the health issues affecting Brazilian immigrant children. The purpose of this qualitative study was to explore how Brazilian-born immigrant mothers living in the United States obtain information about physical activity and screen-time for their young children. Methods: Qualitative research including focus groups with Brazilian immigrant mothers of preschool-age children living in the U.S. Results: Results revealed that Brazilian immigrant mothers obtain information on young children’s physical activity and screen-time from a variety of sources including interpersonal communication, television and magazines, government health care programs (WIC program) and professionals (e.g., nurses and pediatricians). A noteworthy finding is the significant role of foreign information sources (Brazilian TV shows and magazines) on mothers’ access to information about these early behaviors. Future research is needed to quantify and better understanding Brazilian parents’ access to accurate and sound information related to young children’s physical activity and screen-viewing behaviors. Conclusions: To our knowledge, no existing research has examined how Brazilian immigrant mothers living in the United States obtain information about these behaviors. This information is crucial for the design of culturally appropriate early childhood obesity prevention interventions tailored to the specific needs of this ethnic group.

Keywords: physical activity, scree-time, information, immigrant, mothers, Brazilian, United States

Procedia PDF Downloads 277
12316 Barriers to Marital Expectation among Individuals with Hearing Impairment in Oyo State

Authors: Adebomi M. Oyewumi, Sunday Amaize

Abstract:

The study was designed to examine the barriers to marital expectations among unmarried persons with hearing impairment in Oyo State, Nigeria. Descriptive survey research design was adopted. Purposive sampling technique was used to select one hundred participants made up forty-four (44) males and fifty-six (56) females, all with varying degrees of hearing impairment. Eight research questions were raised and answered. The instrument used was Marital Expectations Scale with reliability coefficient of 0.86. Data was analyzed using descriptive statistics tools of frequency count and simple percentage as well as inferential statistics tools of T-TEST and ANOVA. The findings revealed that there was a significant relationship existing among the main identified barriers (environmental barrier, communication barrier, hearing loss, unemployment and poor sexuality education) to the marital expectations of unmarried persons with hearing impairment. The joint contribution of the independent variables (identified barriers) to the dependent variable (marital expectations) was significant, F = 5.842, P < 0.05, accounting for about 89% of the variance. The relative contribution of the identified barriers to marital expectations of unmarried persons with hearing impairment is as follows: environmental barrier (β = 0.808, t = 5.176, P < 0.05), communication barrier (β = 0.533, t = 3.305, P < 0.05), hearing loss (β = 0.550, t = 2.233, P < 0.05), unemployment (β = 0.431, t = 2.102, P < 0.05), poor sexuality education (β = 0.361, t = 1.985, P < 0.05). Environmental barrier proved to be the most potent contributor to the poor marital expectations among unmarried persons with hearing impairment. Therefore, it is recommended that society dismantles the nagging environmental barrier through positive identification with individuals suffering from hearing impairment. In this connection, members of society should change their negative attitudes and do away with all the wrong notions about the marital ability of individuals with hearing impairment.

Keywords: environmental barrier, hearing impairment, marriage, marital expectations

Procedia PDF Downloads 373
12315 The Impact of the Core Competencies in Business Management to the Existence and Progress of Traditional Foods Business with the Case of Study: Gudeg Sagan Yogyakarta

Authors: Lutfi AuliaRahman, Hari Rizki Ananda

Abstract:

The traditional food is a typical food of a certain region that has a taste of its own unique and typically consumed by a society in certain areas, one of which is Gudeg, a regional specialties traditional food of Yogyakarta and Central Java which is made of young jackfruit cooked in coconut milk, edible with rice and served with thick coconut milk (areh), chicken, eggs, tofu and sambal goreng krecek. However, lately, the image of traditional food has declined among people, so with gudeg, which today's society, especially among young people, tend to prefer modern types of food such as fast food and some other foods that are popular. Moreover, traditional food usually only preferred by consumers of local communities and lack of demand by consumers from different areas for different tastes. Thus, the traditional food producers increasingly marginalized and their consumers are on the wane. This study aimed to evaluate the management used by producers of traditional food with a case study of Gudeg Sagan which located in the city of Yogyakarta, with the ability of their management in creating core competencies, which includes the competence of cost, competence of flexibility, competence of quality, competence of time, and value-based competence. And then, in addition to surviving and continuing to exist with the existing external environment, Gudeg Sagan can increase the number of consumers and also reach a broader segment of teenagers and adults as well as consumers from different areas. And finally, in this paper will be found positive impact on the creation of the core competencies of the existence and progress of the traditional food business based on case study of Gudeg Sagan.

Keywords: Gudeg Sagan, traditional food, core competencies, existence

Procedia PDF Downloads 256
12314 Information Theoretic Approach for Beamforming in Wireless Communications

Authors: Syed Khurram Mahmud, Athar Naveed, Shoaib Arif

Abstract:

Beamforming is a signal processing technique extensively utilized in wireless communications and radars for desired signal intensification and interference signal minimization through spatial selectivity. In this paper, we present a method for calculation of optimal weight vectors for smart antenna array, to achieve a directive pattern during transmission and selective reception in interference prone environment. In proposed scheme, Mutual Information (MI) extrema are evaluated through an energy constrained objective function, which is based on a-priori information of interference source and desired array factor. Signal to Interference plus Noise Ratio (SINR) performance is evaluated for both transmission and reception. In our scheme, MI is presented as an index to identify trade-off between information gain, SINR, illumination time and spatial selectivity in an energy constrained optimization problem. The employed method yields lesser computational complexity, which is presented through comparative analysis with conventional methods in vogue. MI based beamforming offers enhancement of signal integrity in degraded environment while reducing computational intricacy and correlating key performance indicators.

Keywords: beamforming, interference, mutual information, wireless communications

Procedia PDF Downloads 283
12313 Social Work Practice to Labour Welfare: A Proposed Model of Field Work Practicum and Role of Social Worker in India

Authors: Naeem Ahmed

Abstract:

Social work is a professional activity based on the approach of “helping people to help themselves” (Stroup). Social work education and practice both are based on humanitarian philosophy in which social workers try to increase the happiness of the society and to reduce the problems of society. Labour welfare is a specialised field of social work which especially focuses on welfare of organised and unorganised labour. In India labour is facing numerous problems in both organised and unorganised sectors because of ignorance, illiteracy, high rate of unemployment etc. In most of the Indian social work institutions we have this specialization with different names like Human Resource Management or Industrial Relation and Personnel Management or Industrial Relations and Labour Welfare or Industrial Social Work etc. Field work practice is integrated part of social work education curriculum in all specialised field. In India we have different field work practice models being followed in different institutions. The main objective of this paper is to prepare a universal field work practicum model in the field of labour welfare. This paper is exploratory in nature, researcher used personal experience and secondary data (model of field work practice in different institutions like Aligarh Muslim University, Pondicherry University, Central University of Karnataka, University of Lucknow, MJP Rohilkhand University Bareilly etc.) Researcher found that there is an immediate need to upgrade the curriculum or field work practice in this particular field, as more than 40 percent of total population engaged in either unorganised or organised sector (NSSO 2011-12) and they are not aware about their rights. In this way a social worker can play an important role in existing labour welfare facilities by making them aware.

Keywords: field work, labour welfare, organised labour, social work practice, unorganised labour

Procedia PDF Downloads 405
12312 The Professor’s Bayonet: An Educational Podcast Splicing the Literary with Social Commentary and Theology

Authors: Jason Dew

Abstract:

Podcasts are increasingly sources of intellectual content for many who desire to broaden their worldview. Topics range from sports to folklore, entertainment to spirituality. The list from which to choose is large, demonstrating the public’s interest in this medium. While traditional classrooms continue to serve the curious and upward bound, podcasts also satisfy intellectual cravings, especially for those on the go. The paper will explore how the podcast, The Professor’s Bayonet, attempts to scratch these itches by offering 4-5 minute commentaries on literary works, both classic and contemporary, through the dual lenses of current trends in society and theology. The reason for this approach is borne out of the direction many students take in exchanges of ideas. They have a sincere interest in how the books that are covered are relevant to their lives, and their questions are probing to the extent that dips into theology are helpful. Cursory examinations of whatever topic just won’t suffice. Those in Generation Z, especially, are parched for real and true answers. The paper, therefore, will share some excerpts from a selection of episodes, explaining the reasons behind why certain works were showcased. In an episode entitled “The Possibility of Evil,” for example, Shirley Jackson’s 1965 short story of the same name is explored, focusing on why the protagonist, Adela Strangeworth, leaves nasty little notes in the mailboxes of those in her small community she deems deserving of a good tongue-lashing. There is a negative result and the opportunity to make the connection to social media and how millions of individuals are guilty of the very same thing Adela Strangeworth is guilty of, making Jackson’s work somewhat prophetic. Reasons for this behavior are explored, namely what it says about how we as a society have evolved both interpersonally and spiritually.

Keywords: podcast, social commentary, theology, literary

Procedia PDF Downloads 57
12311 A Conceptual Framework for Assessing the Development of Health Information Systems Enterprise Architecture Interoperability

Authors: Prosper Tafadzwa Denhere, Ephias Ruhode, Munyaradzi Zhou

Abstract:

Health Information Systems (HISs) interoperability is emerging to be the future of modern healthcare systems Enterprise Architecture (EA), where healthcare entities are seamlessly interconnected to share healthcare data. The reality that the healthcare industry has been characterised by an influx of fragmented stand-alone e-Health systems, which present challenges of healthcare information sharing across platforms, desires much attention for systems integration efforts. The lack of an EA conceptual framework resultantly crates the need for investigating an ideal solution to the objective of Health Information Systems interoperability development assessment. The study takes a qualitative exploratory approach through a design science research context. The research aims to study the various themes withdrawn from the literature that can help in the assessment of interoperable HISs development through a literature study. Themes derived from the study include HIS needs, HIS readiness, HIS constraints, and HIS technology integration elements and standards tied to the EA development architectural layers of The Open Group Architecture Framework (TOGAF) as an EA development methodology. Eventually, the themes were conceptualised into a framework reviewed by two experts. The essence of the study was to provide a framework within which interoperable EA of HISs should be developed.

Keywords: enterprise architecture, eHealth, health information systems, interoperability

Procedia PDF Downloads 112
12310 Iot-Based Interactive Patient Identification and Safety Management System

Authors: Jonghoon Chun, Insung Kim, Jonghyun Lim, Gun Ro

Abstract:

We believe that it is possible to provide a solution to reduce patient safety accidents by displaying correct medical records and prescription information through interactive patient identification. Our system is based on the use of smart bands worn by patients and these bands communicate with the hybrid gateways which understand both BLE and Wifi communication protocols. Through the convergence of low-power Bluetooth (BLE) and hybrid gateway technology, which is one of short-range wireless communication technologies, we implement ‘Intelligent Patient Identification and Location Tracking System’ to prevent medical malfunction frequently occurring in medical institutions. Based on big data and IOT technology using MongoDB, smart band (BLE, NFC function) and hybrid gateway, we develop a system to enable two-way communication between medical staff and hospitalized patients as well as to store locational information of the patients in minutes. Based on the precise information provided using big data systems, such as location tracking and movement of in-hospital patients wearing smart bands, our findings include the fact that a patient-specific location tracking algorithm can more efficiently operate HIS (Hospital Information System) and other related systems. Through the system, we can always correctly identify patients using identification tags. In addition, the system automatically determines whether the patient is a scheduled for medical service by the system in use at the medical institution, and displays the appropriateness of the medical treatment and the medical information (medical record and prescription information) on the screen and voice. This work was supported in part by the Korea Technology and Information Promotion Agency for SMEs (TIPA) grant funded by the Korean Small and Medium Business Administration (No. S2410390).

Keywords: BLE, hybrid gateway, patient identification, IoT, safety management, smart band

Procedia PDF Downloads 313
12309 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 41
12308 Case Studies of Educational Technology Integration for Global Citizenship Development among Teacher Candidates

Authors: Erik Jon Byker

Abstract:

Government leaders and education policymakers have increasingly focused on ways that teachers can better prepare children for life in a global society. Such preparation includes the development of global citizenship among young people. Yet, scholars point out that many elementary school educators and teacher candidates have limited awareness of being global citizens in an interdependent world. More and more teacher preparation programs aim to integrate global citizenship in their program plans and use educational technology to help develop global citizenship. Many non-governmental organizations (NGOs), like the Asia Society and Partnership for 21st Century Skills, have led the way in creating global citizenship frameworks that prepare teachers and students with global competencies. The development of global citizenship among teachers needs to begin even before teachers sign their first contract. Global citizenship development should start when teacher candidates are being prepared to teach. Using the Critical Cosmopolitan Theory as a conceptual lens, this paper examines the integration of global citizenship curricula in teacher education programs in North Carolina and Texas in the United States of America. Using a case study methodology, the paper describes and compares the teacher candidates’ (n=136) perceptions of the global citizenship curricula delivered with the aid of educational technology. The study found that after participating in the global citizenship curricula, participants: (1) made conceptual leaps in their global citizenship definitions; (2) developed a stronger commitment for their future role as educators in developing global citizens; and (3) were more willing to take action for social justice-related issues in education. In sum, this paper discusses empirical findings related to the ways to integrate educational technology in preparing globally competent teachers.

Keywords: educational technology, global education, intercultural awareness, teacher candidates

Procedia PDF Downloads 212
12307 A Framework for Enhancing Mobile Development Software for Rangsit University, Thailand

Authors: Thossaporn Thossansin

Abstract:

This paper presents the developing of a mobile application for students who are studying in a Faculty of Information Technology, Rangsit University (RSU), Thailand. RSU enhanced the enrollment process by leveraging its information systems, which allows students to download RSU APP. This helps students to access RSU’s information that is important for them. The reason to have a mobile application is to give support students’ ability to access the system at anytime, anywhere and anywhere. The objective of this paper was to develop an application on iOS platform for students who are studying in Faculty of Information Technology, Rangsit University, Thailand. Studies and learns student’s perception for a new mobile app. This paper has targeted a group of students who is studied in year 1-4 in the faculty of information technology, Rangsit University. This new application has been developed by the department of information technology, Rangsit University and it has generally called as RSU APP. This is a new mobile application development for RSU, which has useful features and functionalities in giving support to students. The core module has consisted of RSU’s announcement, calendar, event, activities, and ebook. The mobile app has developed on iOS platform that is related to RSU’s policies in giving free Tablets for the first year students. The user satisfaction is analyzed from interview data that has 81 interviews and Google application such as google form is taken into account for 122 interviews. Generally, users were satisfied to-use application with the most satisfaction at the level of 4.67. SD is 0.52, which found the most satisfaction in that users can learn and use quickly. The most satisfying is 4.82 and SD is 0.71 and the lowest satisfaction rating in its modern form, apps lists. The satisfaction is 4.01, and SD is 0.45.

Keywords: mobile application, development of mobile application, framework of mobile development, software development for mobile devices

Procedia PDF Downloads 329
12306 Wolof Voice Response Recognition System: A Deep Learning Model for Wolof Audio Classification

Authors: Krishna Mohan Bathula, Fatou Bintou Loucoubar, FNU Kaleemunnisa, Christelle Scharff, Mark Anthony De Castro

Abstract:

Voice recognition algorithms such as automatic speech recognition and text-to-speech systems with African languages can play an important role in bridging the digital divide of Artificial Intelligence in Africa, contributing to the establishment of a fully inclusive information society. This paper proposes a Deep Learning model that can classify the user responses as inputs for an interactive voice response system. A dataset with Wolof language words ‘yes’ and ‘no’ is collected as audio recordings. A two stage Data Augmentation approach is adopted for enhancing the dataset size required by the deep neural network. Data preprocessing and feature engineering with Mel-Frequency Cepstral Coefficients are implemented. Convolutional Neural Networks (CNNs) have proven to be very powerful in image classification and are promising for audio processing when sounds are transformed into spectra. For performing voice response classification, the recordings are transformed into sound frequency feature spectra and then applied image classification methodology using a deep CNN model. The inference model of this trained and reusable Wolof voice response recognition system can be integrated with many applications associated with both web and mobile platforms.

Keywords: automatic speech recognition, interactive voice response, voice response recognition, wolof word classification

Procedia PDF Downloads 122
12305 Human Development and Entrepreneurship: Examining the Sources of Freedom and Unfreedom in the Realization of Entrepreneurship in Iran

Authors: Iman Shabanzadeh

Abstract:

The purpose of this research is to understand the lived experience of private sector entrepreneurs in facing the sources of freedom and unfreedom and benefiting from opportunities and basic capabilities in the process of realizing entrepreneurial ability in order to get closer to the macro situation of the narrative of human development in Iranian society. Therefore, the main question of the present research is to figure out what sources of freedom and social opportunities and unfreedom entrepreneurs in Iran's society benefit from the process of transforming their potential entrepreneurial abilities into entrepreneurial and business enterprises. In terms of methodology, the current research method will be thematic analysis in the form of semi-structured interviews with entrepreneurs active in small and medium-sized enterprises in Tehran, whose process of establishing and expanding their entrepreneurial activity has been in the last two decades. By examining the possibilities and refusals of advancing these people in the three stages of 'Idea creation and desire for entrepreneurship’, ‘Starting and creating a business’, and finally, ‘Continuing and expanding the business’, the findings of the research show the impact of five main resources for people to realize their potential talents, from the stage of creating an idea to expanding their business. These sources include' family institution,’ ‘education institution,’ ‘social norms and beliefs,’ ‘government and market,’ and ‘personality components of the entrepreneur.’ Finally, the findings are reported in three levels of basic themes (fifteen items), organizing themes (five items), and comprehensive themes (one item) and in the form of a theme network.

Keywords: entrepreneurship, human development, capability, sources of freedom

Procedia PDF Downloads 64
12304 Data Science/Artificial Intelligence: A Possible Panacea for Refugee Crisis

Authors: Avi Shrivastava

Abstract:

In 2021, two heart-wrenching scenes, shown live on television screens across countries, painted a grim picture of refugees. One of them was of people clinging onto an airplane's wings in their desperate attempt to flee war-torn Afghanistan. They ultimately fell to their death. The other scene was the U.S. government authorities separating children from their parents or guardians to deter migrants/refugees from coming to the U.S. These events show the desperation refugees feel when they are trying to leave their homes in disaster zones. However, data paints a grave picture of the current refugee situation. It also indicates that a bleak future lies ahead for the refugees across the globe. Data and information are the two threads that intertwine to weave the shimmery fabric of modern society. Data and information are often used interchangeably, but they differ considerably. For example, information analysis reveals rationale, and logic, while data analysis, on the other hand, reveals a pattern. Moreover, patterns revealed by data can enable us to create the necessary tools to combat huge problems on our hands. Data analysis paints a clear picture so that the decision-making process becomes simple. Geopolitical and economic data can be used to predict future refugee hotspots. Accurately predicting the next refugee hotspots will allow governments and relief agencies to prepare better for future refugee crises. The refugee crisis does not have binary answers. Given the emotionally wrenching nature of the ground realities, experts often shy away from realistically stating things as they are. This hesitancy can cost lives. When decisions are based solely on data, emotions can be removed from the decision-making process. Data also presents irrefutable evidence and tells whether there is a solution or not. Moreover, it also responds to a nonbinary crisis with a binary answer. Because of all that, it becomes easier to tackle a problem. Data science and A.I. can predict future refugee crises. With the recent explosion of data due to the rise of social media platforms, data and insight into data has solved many social and political problems. Data science can also help solve many issues refugees face while staying in refugee camps or adopted countries. This paper looks into various ways data science can help solve refugee problems. A.I.-based chatbots can help refugees seek legal help to find asylum in the country they want to settle in. These chatbots can help them find a marketplace where they can find help from the people willing to help. Data science and technology can also help solve refugees' many problems, including food, shelter, employment, security, and assimilation. The refugee problem seems to be one of the most challenging for social and political reasons. Data science and machine learning can help prevent the refugee crisis and solve or alleviate some of the problems that refugees face in their journey to a better life. With the explosion of data in the last decade, data science has made it possible to solve many geopolitical and social issues.

Keywords: refugee crisis, artificial intelligence, data science, refugee camps, Afghanistan, Ukraine

Procedia PDF Downloads 75
12303 Yoga for Holistic Health Wellbeing

Authors: Pothula Madhusudhan Reddy

Abstract:

Introduction: Yoga is a way of life. of uniting the mind, body and soul. It is also an art of living the right way. The techniques of Yoga are very practical, so they can always be applied. This is the reason why Yoga has been practiced for thousands of years and is still valid today. Importance of Yoga: Yoga that helps to inculcate healthy habits and adopt a healthy lifestyle to achieve good health Research Aim: The aim of this study is to explore the potential benefits of yoga for holistic health and wellbeing, both at an individual and societal level The ultimate goal of human being is to attain the state of perfect freedom from the shackles of ignorance, which is the generator of all the pangs and miseries of life. Methodology: This research follows a thematic and practical experience approach. Yoga includes body postures and movements (stretching), breathing practices, imagery, meditation, and progressive relaxation techniques. Data Collection: The data for this research is collected through a combination of literature review, expert interviews, and practical yoga sessions. The literature review provides a comprehensive understanding of the principles and practices of yoga, while expert interviews offer insights from experienced practitioners. Practical yoga sessions allow for first hand experiences and observations, facilitating a deeper understanding of the subject matter. Analysis Procedures: The collected data is analyzed thematically, where key themes and patterns related to the benefits and effects of yoga on holistic health and wellbeing are identified. The findings are then interpreted and synthesized to draw meaningful conclusions. Questions Addressed: This research addresses the following questions: What are the potential benefits of yoga for holistic health and wellbeing? How does yoga promote rejuvenate the body, mind, and senses? What are the implications of a society embracing yoga for overall societal wellbeing and happiness? Findings: The research highlights that practicing yoga can lead to increased awareness of the body, mind, and senses. It promotes overall physical and mental health, helping individuals achieve a state of happiness and contentment. Moreover, the study emphasizes that a society embracing yoga can contribute to the development of a healthy and happy community. Theoretical Importance: The study of yoga for holistic health and wellbeing holds theoretical importance as it provides insights into the science of yoga and its impact on individuals and society. It contributes to the existing body of knowledge on the subject and further establishes yoga as a potential tool for enhancing overall wellness. Conclusion: The study concludes that yoga is a powerful practice for achieving holistic health and wellbeing. This research provides valuable insights into the science of yoga and its potential as a tool for promoting overall wellness.

Keywords: yoga, asana, pranayama, meditation

Procedia PDF Downloads 89
12302 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems

Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi

Abstract:

The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.

Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks

Procedia PDF Downloads 359
12301 Information Disclosure And Financial Sentiment Index Using a Machine Learning Approach

Authors: Alev Atak

Abstract:

In this paper, we aim to create a financial sentiment index by investigating the company’s voluntary information disclosures. We retrieve structured content from BIST 100 companies’ financial reports for the period 1998-2018 and extract relevant financial information for sentiment analysis through Natural Language Processing. We measure strategy-related disclosures and their cross-sectional variation and classify report content into generic sections using synonym lists divided into four main categories according to their liquidity risk profile, risk positions, intra-annual information, and exposure to risk. We use Word Error Rate and Cosin Similarity for comparing and measuring text similarity and derivation in sets of texts. In addition to performing text extraction, we will provide a range of text analysis options, such as the readability metrics, word counts using pre-determined lists (e.g., forward-looking, uncertainty, tone, etc.), and comparison with reference corpus (word, parts of speech and semantic level). Therefore, we create an adequate analytical tool and a financial dictionary to depict the importance of granular financial disclosure for investors to identify correctly the risk-taking behavior and hence make the aggregated effects traceable.

Keywords: financial sentiment, machine learning, information disclosure, risk

Procedia PDF Downloads 96
12300 Monitoring the Responses to Nociceptive Stimuli During General Anesthesia Based on Electroencephalographic Signals in Surgical Patients Undergoing General Anesthesia with Laryngeal Mask Airway (LMA)

Authors: Ofelia Loani Elvir Lazo, Roya Yumul, Sevan Komshian, Ruby Wang, Jun Tang

Abstract:

Background: Monitoring the anti-nociceptive drug effect is useful because a sudden and strong nociceptive stimulus may result in untoward autonomic responses and muscular reflex movements. Monitoring the anti-nociceptive effects of perioperative medications has long been desiredas a way to provide anesthesiologists information regarding a patient’s level of antinociception and preclude any untoward autonomic responses and reflexive muscular movements from painful stimuli intraoperatively.To this end, electroencephalogram (EEG) based tools includingBIS and qCON were designed to provide information about the depth of sedation whileqNOXwas produced to informon the degree of antinociception.The goal of this study was to compare the reliability of qCON/qNOX to BIS asspecific indicators of response to nociceptive stimulation. Methods: Sixty-two patients undergoing general anesthesia with LMA were included in this study. Institutional Review Board(IRB) approval was obtained, and informed consent was acquired prior to patient enrollment. Inclusion criteria included American Society of Anesthesiologists (ASA) class I-III, 18 to 80 years of age, and either gender. Exclusion criteria included the inability to consent. Withdrawal criteria included conversion to endotracheal tube and EEG malfunction. BIS and qCON/qNOX electrodes were simultaneously placed o62n all patientsprior to induction of anesthesia and were monitored throughout the case, along with other perioperative data, including patient response to noxious stimuli. All intraoperative decisions were made by the primary anesthesiologist without influence from qCON/qNOX. Student’s t-distribution, prediction probability (PK), and ANOVA were used to statistically compare the relative ability to detect nociceptive stimuli for each index. Twenty patients were included for the preliminary analysis. Results: A comparison of overall intraoperative BIS, qCON and qNOX indices demonstrated no significant difference between the three measures (N=62, p> 0.05). Meanwhile, index values for qNOX (62±18) were significantly higher than those for BIS (46±14) and qCON (54±19) immediately preceding patient responses to nociceptive stimulation in a preliminary analysis (N=20, * p= 0.0408). Notably, certain hemodynamic measurements demonstrated a significant increase in response to painful stimuli (MAP increased from74±13 mm Hg at baseline to 84± 18 mm Hg during noxious stimuli [p= 0.032] and HR from 76±12 BPM at baseline to 80±13BPM during noxious stimuli[p=0.078] respectively). Conclusion: In this observational study, BIS and qCON/qNOX provided comparable information on patients’ level of sedation throughout the course of an anesthetic. Meanwhile, increases in qNOX values demonstrated a superior correlation to an imminent response to stimulation relative to all other indices.

Keywords: antinociception, bispectral index (BIS), general anesthesia, laryngeal mask airway, qCON/qNOX

Procedia PDF Downloads 94