Search results for: online trust
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3339

Search results for: online trust

1989 The Development of a Cyber Violence Measurement Tool for Youths: A Multi-Reporting of Ecological Factors

Authors: Jong-Hyo Park, Eunyoung Choi, Jae-Yeon Lim, Seon-Suk Lee, Yeong-Rong Koo, Ji-Ung Kwon, Kyung-Sung Kim, Jong-Ik Lee, Juhan Park, Hyun-Kyu Lee, Won-Kyoung Oh, Jisang Lee, Jiwon Choe

Abstract:

Due to COVID-19, cyber violence among youths has soared as they spend more time online than before. In contrast to the deepening concerns, measurement tools that can assess the vulnerability of cyber violence in individual youths still need to be supplemented. The measurement tools lack consideration of various factors related to cyber violence among youths. Most of the tools are self-report questionnaires, and these adolescents' self-report questionnaire forms can underestimate the harmful behavior and overestimate the damage experience. Therefore, this study aims to develop a multi-report measurement tool for youths that can reliably measure individuals' ecological factors related to cyber violence. The literature review explored factors related to cyber violence, and the questions were constructed. The face validity of the questions was confirmed by conducting focus group interviews. Exploratory and confirmatory factor analyses (N=671) were also conducted for statistical validation. This study developed a multi-report measurement tool for cyber violence with 161 questions, consisting of six domains: online behavior, cyber violence awareness, victimization-perpetration-witness experience, coping efficacy (individuals, peers, teachers, and parents), psychological characteristics, and pro-social capabilities. In addition to self-report from a youth respondent, this measurement tool includes peers, teachers, and parents reporting for the respondent. It is possible to reliably measure the ecological factors of individual youths who are vulnerable or highly resistant to cyber violence. In schools, teachers could refer to the measurement results for guiding students, better understanding their cyber violence conditions, and assessing their pro-social capabilities. With the measurement results, teachers and police officers could detect perpetrators or victims and intervene immediately. In addition, this measurement tool could analyze the effects of the prevention and intervention programs for cyber violence and draw appropriate suggestions.

Keywords: adolescents, cyber violence, cyber violence measurement tool, measurement tool, multi-report measurement tool, youths

Procedia PDF Downloads 101
1988 Psychological Indices and Sporting Performance among Elite Athletes in Football in South-South Region, Nigeria

Authors: Simon Bullem, Ukkpata Mathias Oko

Abstract:

The trust of this study will investigate the psychological indices and sporting performance among elite athletes in football in 32 teams in the south-south region, of Nigeria. To achieve the aim of the study, five research questions and five hypotheses shall be tested at a 0.05 level of significance that will guide the study. Literature shall be reviewed in line with the sub-independent variables of sporting psychological indices and the dependent variables of elite athlete achievement reactions towards the psychological indices. The ex.post facto survey designed shall be adapted for the study. The population of the study shall be 768 elite athletes from 32 clubs across the south-south region in Nigeria. A sample of 300 elite athletes shall be sampled using a simple random and stratified sampling technique. The questionnaire titled Psychological Indices and Sporting Performance among Elite Athletes in Football (PISPAEAF) will be the mean instrument for data collection. The research question shall be analyzed using the main and standard deviation statistics while the hypotheses shall use the person product moment correlation analysis at 0.5 level of significance finding for implications in sporting psychological indices and elite athletes' performance, which will emanate from the study. Based on the findings, recommendations shall be made.

Keywords: psychological indices, performance, elite athletes, sports, football

Procedia PDF Downloads 60
1987 A System For A Sustainable Electronic Waste Marketplace

Authors: Arya Sarukkai

Abstract:

Due to increased technological advances and the high use of phones, tablets, computers, and other electronics, we continue to see rapid growth in the volume of e-waste. There are millions just throwing out their old devices, millions who have many devices and don’t know what to do with them, and there are millions who would benefit from receiving those devices. The thesis of this paper is that by creating an ecosystem of donors and recipients and providing the right incentives, we can reduce e-waste. We discuss a system for sustainable e-waste by building a marketplace between donors and recipients. We also summarize experimental results comparing different incentives and present a live web service that allows for e-waste supplies to reach schools and nonprofit institutions.

Keywords: E-waste ecosystems, marketplaces, e-waste web app, online services

Procedia PDF Downloads 197
1986 Farmers’ Perceptions of Extension Personnel’s Technical Capabilities: Evidence from India

Authors: Ankit Nagar, Dinesh Kumar Nauriyal, S. P. Singh

Abstract:

This paper examines farmers' perceptions of the efficacy of extension services in equipping them with the necessary information and skills required to maximise agricultural productivity. It is based on primary data collected through an interview schedule in India's Western Uttar Pradesh region. It uses descriptive statistics, factor analysis, and MANOVA to determine the typical farmer's view of an extension worker's technical prowess and behavioural traits, as well as the key factors associated with farmers' perception and the demographic characteristics that affect farmer's perception variations. The vast majority of farmers appear to consider extension personnel's efficiency and accessibility unfavourably. Farmers feel that extension personnel are well-trained notwithstanding their disagreements on the viability of their technical advice. Small and marginal farmers view the effectiveness, objectivity, and cooperativeness of extension agents less favourably than large farmers. This study proposes strategies such as routine follow-ups, practical demonstrations, and regular extension professional training camps as part of a holistic plan to increase farmer trust in the agricultural extension system. In addition, it proposes ensuring their accountability.

Keywords: agriculture extension, farmers’ perception, extension agents, factor analysis

Procedia PDF Downloads 105
1985 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 191
1984 Blended Learning through Google Classroom

Authors: Lee Bih Ni

Abstract:

This paper discusses that good learning involves all academic groups in the school. Blended learning is learning outside the classroom. Google Classroom is a free service learning app for schools, non-profit organizations and anyone with a personal Google account. Facilities accessed through computers and mobile phones are very useful for school teachers and students. Blended learning classrooms using both traditional and technology-based methods for teaching have become the norm for many educators. Using Google Classroom gives students access to online learning. Even if the teacher is not in the classroom, the teacher can provide learning. This is the supervision of the form of the teacher when the student is outside the school.

Keywords: blended learning, learning app, google classroom, schools

Procedia PDF Downloads 146
1983 Electricity Services and COVID-19: Understanding the Role of Infrastructure Improvements and Institutional Innovations

Authors: Javed Younas

Abstract:

Fiscal challenges pervade the electricity sector in many developing countries. Low bill payment and high theft mean utility customers have little incentive to conserve. It also means electricity distribution companies have less to invest in infrastructure maintenance, modernization, and technical upgrades. The low-quality electricity services can result impair the economic benefits from connections to the electrical grid. We study the impacts of two interventions implemented in Karachi, Pakistan, with the goal of reducing distribution losses and increasing revenue recovery: infrastructure improvements that made illegal connections physically more difficult and institutional innovations designed to increase communities’ trust in and cooperation with the utility. Using differences in implementation timing across space, we estimate the interventions’ impacts before the COVID-19 pandemic and their role in mitigating the pandemic’s effects on electricity services. Results indicate that the infrastructure improvements reduced losses, as well as the electricity delivered to the distribution system, a proxy for a generation. The institutional innovations significantly impacted revenue recovery, but not losses in their initial months; however, the efforts mitigated the pandemic’s negative effect on the utility finances.

Keywords: electricity, infrastructure, losses, revenue recovery

Procedia PDF Downloads 197
1982 Students Perception of a Gamified Student Engagement Platform as Supportive Technology in Learning

Authors: Pinn Tsin Isabel Yee

Abstract:

Students are increasingly turning towards online learning materials to supplement their education. One such approach would be the gamified student engagement platforms (GSEPs) to instill a new learning culture. Data was collected from closed-ended questions via content analysis techniques. About 81.8% of college students from the Monash University Foundation Year agreed that GSEPs (Quizizz) was an effective tool for learning. Approximately 85.5% of students disagreed that games were a waste of time. GSEPs were highly effective among students to facilitate the learning process.

Keywords: engagement, gamified, Quizizz, technology

Procedia PDF Downloads 108
1981 Humanising Digital Healthcare to Build Capacity by Harnessing the Power of Patient Data

Authors: Durhane Wong-Rieger, Kawaldip Sehmi, Nicola Bedlington, Nicole Boice, Tamás Bereczky

Abstract:

Patient-generated health data should be seen as the expression of the experience of patients, including the outcomes reflecting the impact a treatment or service had on their physical health and wellness. We discuss how the healthcare system can reach a place where digital is a determinant of health - where data is generated by patients and is respected and which acknowledges their contribution to science. We explore the biggest barriers facing this. The International Experience Exchange with Patient Organisation’s Position Paper is based on a global patient survey conducted in Q3 2021 that received 304 responses. Results were discussed and validated by the 15 patient experts and supplemented with literature research. Results are a subset of this. Our research showed patient communities want to influence how their data is generated, shared, and used. Our study concludes that a reasonable framework is needed to protect the integrity of patient data and minimise abuse, and build trust. Results also demonstrated a need for patient communities to have more influence and control over how health data is generated, shared, and used. The results clearly highlight that the community feels there is a lack of clear policies on sharing data.

Keywords: digital health, equitable access, humanise healthcare, patient data

Procedia PDF Downloads 82
1980 Little Girls and Big Stories: A Thematic Analysis of Gender Representations in Selected Asian Room to Read Storybooks

Authors: Cheeno Marlo Sayuno

Abstract:

Room to Read is an international nonprofit organization aimed at empowering young readers through literature and literacy education. In particular, the organization is focused on girls’ education in schools and bettering their social status through crafting stories and making sure that these stories are accessible to them. In 2019, Room to Read visited the Philippines and partnered with Philippine children’s literature publishers Adarna House, Lampara Books, Anvil Publishing, and OMF-Hiyas with the goal of producing contextualized stories that Filipino children can read. The result is a set of 20 storybooks developed by Filipino writers and illustrators, the author of this paper included. The project led to narratives of experiences in storybook production from conceptualization to publication, towards translations and reimagining in online repository, storytelling, and audiobook formats. During the production process, we were particularly reminded of gender representations, child’s rights, and telling stories that can empower the children in vulnerable communities, who are the beneficiaries of the project. The storybooks, along with many others produced in Asia and the world, are available online through the literacycloud.org website of Room to Read. In this study, the goal is to survey the stories produced in Asia and look at how gender is represented in the storybooks. By analyzing both the texts and the illustrations of the storybooks produced across Asian countries, themes of portrayals of young boys and girls, their characteristics and narratives, and how they are empowered in the stories are identified, with the goal of mapping how Room to Read is able to address the problem of access to literacy among young girls and ensuring them that they can do anything, the way they are portrayed in the stories. The paper hopes to determine how gender is represented in Asian storybooks produced by the international nonprofit organization Room to Read. Thematic textual analysis was used as methodology, where the storybooks are analyzed qualitatively to identify arising themes of gender representation. This study will shed light on the importance of responsible portrayal of gender in storybooks and how it can impact and empower children. The results of the study can also aid writers and illustrators in developing gender-sensitive storybooks.

Keywords: room to read, asian storybooks, young girls, thematic analysis, child empowerment, literacy, education

Procedia PDF Downloads 79
1979 Simon Says: What Should I Study?

Authors: Fonteyne Lot

Abstract:

SIMON (Study capacities and Interest Monitor is a freely accessible online self-assessment tool that allows secondary education pupils to evaluate their interests and capacities in order to choose a post-secondary major that maximally suits their potential. The tool consists of two broad domains that correspond with two general questions pupils ask: 'What study fields interest me?' and 'Am I capable to succeed in this field of study?'. The first question is addressed by a RIASEC-type interest inventory that links personal interests to post-secondary majors. Pupils are provided with a personal profile and an overview of majors with their degree of congruence. The output is dynamic: respondents can manipulate their score and they can compare their results to the profile of all fields of study. That way they are stimulated to explore the broad range of majors. To answer whether pupils are capable of succeeding in a preferred major, a battery of tests is provided. This battery comprises a range of factors that are predictive of academic success. Traditional predictors such as (educational) background and cognitive variables (mathematical and verbal skills) are included. Moreover, non-cognitive predictors of academic success (such as 'motivation', 'test anxiety', 'academic self-efficacy' and 'study skills') are assessed. These non-cognitive factors are generally not included in admission decisions although research shows they are incrementally predictive of success and are less discriminating. These tests inform pupils on potential causes of success and failure. More important, pupils receive their personal chances of success per major. These differential probabilities are validated through the underlying research on academic success of students. For example, the research has shown that we can identify 22 % of the failing students in psychology and educational sciences. In this group, our prediction is 95% accurate. SIMON leads more students to a suitable major which in turn alleviates student success and retention. Apart from these benefits, the instrument grants insight into risk factors of academic failure. It also supports and fosters the development of evidence-based remedial interventions and therefore gives way to a more efficient use of means.

Keywords: academic success, online self-assessment, student retention, vocational choice

Procedia PDF Downloads 404
1978 The Effectiveness of E-Training on the Attitude and Skill Competencies of Vocational High School Teachers during Covid-19 Pandemic in Indonesia

Authors: Sabli, Eddy Rismunandar, Akhirudin, Nana Halim, Zulfikar, Nining Dwirosanti, Wila Ningsih, Pipih Siti Sofiah, Danik Dania Asadayanti, Dewi Eka Arini Algozi, Gita Mahardika Pamuji, Ajun, Mangasa Aritonang, Nanang Rukmana, Arief Rachman Wonodhipo, Victor Imanuel Nahumury, Lili Husada, Wawan Saepul Irwan, Al Mukhlas Fikri

Abstract:

Covid-19 pandemic has widely impacted the lives. An adaptive strategy must be quickly formulated to maintain the quality of education, especially by vocational school which technical skill competencies are highly needed. This study aimed to evaluate the effectiveness of e-training on the attitude and skill competencies of vocational high school teachers in Indonesia. A total of 720 Indonesian vocational high school teachers with various programs, including hospitality, administration, online business and marketing, culinary arts, fashion, cashier, tourism, haircut, and accounting participated e-training for a month. The training used electronic learning management system to provide materials (modules, presentation slides, and tutorial videos), tasks, and evaluations. Tutorial class was carried out by video conference meeting. Attitude and skill competencies were evaluated before and after the training. Meanwhile, the teachers also gave satisfactory feedback on the quality of the organizer and tutors. Data analysis used paired sample t-test and Anova with Tukey’s post hoc test. The results showed that e-training significantly increased the score of attitude and skill competencies of the teachers (p <0,05). Moreover, the remarkable increase was found among hospitality (57,5%), cashier (50,1%), and online business and marketing (48,7%) teachers. However, the effect among fashion, tourism and haircut teachers was less obvious. In addition, the satisfactory score on the quality of the organizer and tutors were 88,9 (very good), and 93,5 (excellence), respectively. The study concludes that a well-organized e-training could increase the attitude and skill competencies of Indonesian vocational high school teachers during Covid-19 pandemic.

Keywords: E-training, skill, teacher, vocational high school

Procedia PDF Downloads 151
1977 Medical Aspects, Professionalism, and Bioethics of Anesthesia in Caesarean Section on Self-Request

Authors: Nasrudin Andi Mappaware, Muh. Wirawan Harahap, Erlin Syahril, Farah Ekawati Mulyadi

Abstract:

The increasing trend of cesarean sections, especially those performed on self-request without medical indications, presents complex dilemmas related to medical aspects, professionalism, and bioethics. This study aims to investigate the medical, professional, and bioethical considerations surrounding anesthesia in cesarean sections performed on self-request without medical indications. We report the case of a 27-year-old woman, G1P0A0 gravid 38 weeks, admitted to the hospital for a planned cesarean section on request for the reason that she could not tolerate pain and requested on a date that corresponded to the date and month of her mother's birth. Cesarean section on patient request fulfills the principle of autonomy, which states that patients have the right to themselves. However, this medical procedure is still considered no safer and riskier even though medical technology has developed rapidly. Furthermore, anesthesia during cesarean section at self-request without medical indications is a dilemma for anesthesiologists considering the risks and complications of anesthesia for both the fetus and the mother. The trend in increasing the number of cesarean sections is influenced by patient reasons such as not being able to tolerate pain, trust factors, and worry about damage to the birth canal.

Keywords: anesthesia, bioethics, cesarean section, self-request, professionalism

Procedia PDF Downloads 53
1976 An Analysis of Brand-Building Characteristics in the Iran Airline Websites

Authors: Pedram Behyar, Zahra Bayat

Abstract:

The internet and web are changing ways of “far reaching scope and potential for transformation of the marketing functions”. The web is developing in a faster rate than any previous new communication medium. The website of destination has become a crucial branding channel, that is why all businesses are changing their way to communicate with their customers to encounter their needs and wants in better ways. Website provides numerous opportunities for businesses to strengthen their relationship with their customers. One of these opportunities is website component that enables internet users to make two-way communication with the businesses.

Keywords: marketing communication, brand image, usability, privacy and security, personalization and customization, responsiveness, customer online web experience

Procedia PDF Downloads 504
1975 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery

Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman

Abstract:

Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.

Keywords: CGA, IPv6, NDP, SEND

Procedia PDF Downloads 385
1974 The Increasing of Perception of Consumers’ Awareness about Sustainability Brands during Pandemic: A Multi Mediation Model

Authors: Silvia Platania, Martina Morando, Giuseppe Santisi

Abstract:

Introduction: In the last thirty years, there is constant talk of sustainable consumption and a "transition" of consumer lifestyles towards greater awareness of consumer choices (United Nation, 1992). The 2019 coronavirus (COVID-19) epidemic that has hit the world population since 2020 has had significant consequences in all areas of people's lives; individuals have been forced to change their behaviors, to redefine their owngoals, priorities, practices, and lifestyles, to rebuild themselves in the new situation dictated by the pandemic. Method(Participants and procedure ): The data were collected through an online survey; moreover, we used convenience sampling from the general population. The participants were 669 Italians consumers (Female= 514, 76.8%; Male=155, 23.2%) that choice sustainability brands, aged between 18 and 65 years (Mₐ𝓰ₑ = 35.45; Standard Deviation, SD = 9.51).(Measure ): The following measures were used: The Muncy–Vitell Consumer Ethics Scale; Attitude Toward Business Scale; Perceived Consumer Effectiveness Scale; Consumers Perception on Sustainable Brand Attitudes. Results: Preliminary analyses were conducted to test our model. Pearson's bivariate correlation between variables shows that all variables of our model correlate significantly and positively, PCE with CPSBA (r = .56, p <.001). Furthermore, a CFA, according to Harman's single-factor test, was used to diagnose the extent to which common-method variance was a problem. A comparison between the hypothesised model and a model with one factor (with all items loading on a unique factor) revealed that the former provided a better fit for the data in all the CFA fit measures [χ² [6, n = 669] = 7.228, p = 0.024, χ² / df = 1.20, RMSEA = 0.07 (CI = 0.051-0.067), CFI = 0.95, GFI = 0.95, SRMR = 0.04, AIC = 66.501; BIC = 132,150). Next, amulti mediation was conducted to test our hypotheses. The results show that there is a direct effect of PCE on ethical consumption behavior (β = .38) and on ATB (β = .23); furthermore, there is a direct effect on the CPSBA outcome (β = .34). In addition, there is a mediating effect by ATB (C.I. =. 022-.119, 95% interval confidence) and by CES (C.I. =. 136-.328, 95% interval confidence). Conclusion: The spread of the COVID-19 pandemic has affected consumer consumption styles and has led to an increase in online shopping and purchases of sustainable products. Several theoretical and practical considerations emerge from the results of the study.

Keywords: decision making, sustainability, pandemic, multimediation model

Procedia PDF Downloads 110
1973 A Two-Step Framework for Unsupervised Speaker Segmentation Using BIC and Artificial Neural Network

Authors: Ahmad Alwosheel, Ahmed Alqaraawi

Abstract:

This work proposes a new speaker segmentation approach for two speakers. It is an online approach that does not require a prior information about speaker models. It has two phases, a conventional approach such as unsupervised BIC-based is utilized in the first phase to detect speaker changes and train a Neural Network, while in the second phase, the output trained parameters from the Neural Network are used to predict next incoming audio stream. Using this approach, a comparable accuracy to similar BIC-based approaches is achieved with a significant improvement in terms of computation time.

Keywords: artificial neural network, diarization, speaker indexing, speaker segmentation

Procedia PDF Downloads 502
1972 Let’s talk about it! Increasing Advance Directives and End-of-Life Planning Awareness & Acceptance in Multi-Cultural Population with Low Health Literacy in a Faith-Based Setting

Authors: Tonya P. Bowers

Abstract:

Background: The community/patient-focused quality improvement (QI) project has resolved a clinical problem using a quantitative design evaluating behavior change practices in a convenience sample from a multi-cultural congregation in a faith-based setting. AD is a legal document that speaks for the patient when they are unable to speak for themselves. The AD provides detailed information regarding critical medical decisions on behalf of the patient if they’re unable to make decisions themselves. The goal of an AD is to improve EOL care renderings that align with the patient’s desires. The AD diminishes anxiety and stress associated with making difficult EOL care decisions for patients and their families. Method: The project has two intervention strategies: pre-intervention and post-intervention formative surveys and a final summative survey. Most of the data collection takes place during implementation. The Let’s Talk About It Program utilized an online meeting platform for presentation. Participants were asked to complete informed consent and surveys via an online portal. Education included slide presentation, Advance Directive demonstration, video clips, discussions and 1:1 assistance with AD completion with a project manager. Results: Considering the overwhelming likelihood responses where 87.5% identified they “definitely would” hold an End-Of-Life conversation with their healthcare provider or family, and 81.25% indicated their likelihood that they “definitely would” complete an advance directive. In addition, the final summative post-intervention survey (n-14) also demonstrated an overwhelming 93% positive response. Which undoubtedly demonstrates favorable outcomes for the project. Conclusion: the Let’s Talk About It Program demonstrated effectiveness in improving participants' attitudes and acceptance towards Advance Directives and expanding End-of-Life care discussions. Emphasis on program sustainment within the church is imperative in fostering continued awareness and improved health outcomes for the local community with low health literacy.

Keywords: advance directive, end of life, advance care planning, palliative care, low health literacy, faith-based

Procedia PDF Downloads 211
1971 Insider Fraud and its Risks to FinTechs

Authors: Claire Maillet

Abstract:

Insider fraud, including its various forms such as employee fraud or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective or past employer. ‘Employee’ covers anyone employed by the company, including contractors, agency workers, directors and part time staff. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic and the cost-of-living crisis, which have generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime; Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud. Given that the number of FinTechs is on the rise and there is a significant lack of empirically based solutions for reducing insider fraud, these are gaps in the research space that this thesis aims to fill. Finally, Kassem (2022) notes that “academic research plays a crucial role in raising awareness about fraud and researching effective methods for countering it”. Thus, this thesis may be used as an opportune tool to provide an extensive list of controls spanning detection, deterrence and prevention, that are recommended to be implemented to help combat the insider threat.

Keywords: insider fraud, internal fraud, pandemic, Covid-19

Procedia PDF Downloads 22
1970 A Bayesian Network Approach to Customer Loyalty Analysis: A Case Study of Home Appliances Industry in Iran

Authors: Azam Abkhiz, Abolghasem Nasir

Abstract:

To achieve sustainable competitive advantage in the market, it is necessary to provide and improve customer satisfaction and Loyalty. To reach this objective, companies need to identify and analyze their customers. Thus, it is critical to measure the level of customer satisfaction and Loyalty very carefully. This study attempts to build a conceptual model to provide clear insights of customer loyalty. Using Bayesian networks (BNs), a model is proposed to evaluate customer loyalty and its consequences, such as repurchase and positive word-of-mouth. BN is a probabilistic approach that predicts the behavior of a system based on observed stochastic events. The most relevant determinants of customer loyalty are identified by the literature review. Perceived value, service quality, trust, corporate image, satisfaction, and switching costs are the most important variables that explain customer loyalty. The data are collected by use of a questionnaire-based survey from 1430 customers of a home appliances manufacturer in Iran. Four scenarios and sensitivity analyses are performed to run and analyze the impact of different determinants on customer loyalty. The proposed model allows businesses to not only set their targets but proactively manage their customer behaviors as well.

Keywords: customer satisfaction, customer loyalty, Bayesian networks, home appliances industry

Procedia PDF Downloads 140
1969 Audit on the Use of T-MACS Decision Aid for Patients Presenting to ED with Chest Pain

Authors: Saurav Dhawan, Sanchit Bansal

Abstract:

Background T-MACS is a computer-based decision aid that ‘rules in’ and ‘rules out’ ACS using a combination of the presence or absence of six clinical features with only one biomarker measured on arrival: hs-cTnT. T-MACS had 99.3% negative predictive value and 98.7% sensitivity for ACS, ‘ruling out’ ACS in 40% of patients while ‘ruling in’ 5% at the highest risk. We aim at benchmarking the use of T-MACS which could help to conserve healthcare resources, facilitate early discharges, and ensure safe practice. Methodology Randomized retrospective data collection (n=300) was done from ED electronic records across 3 hospital sites within MFT over a period of 2 months. Data was analysed and compared by percentage for the usage of T-MACS, number of admissions/discharges, and in days for length of stay in hospital. Results MRI A&E had the maximum compliance with the use of T-MACS in the trust at 66%, with minimum admissions (44%) and an average length of stay of 1.825 days. NMG A&E had an extremely low compliance rate (8 %), with 75% admission and 3.387 days as the average length of stay. WYT A&E had no TMACS recorded, with a maximum of 79% admissions and the longest average length of stay at 5.07 days. Conclusion All three hospital sites had a RAG rating of ‘RED’ as per the compliance levels. The assurance level was calculated as ‘Very Limited’ across all sites. There was a positive correlation observed between compliance with TMACS and direct discharges from ED, thereby reducing the average length of stay for patients in the hospital.

Keywords: ACS, discharges, ED, T-MACS

Procedia PDF Downloads 58
1968 The X-Ray Response Team: Building a National Health Pre-Hospital Service

Authors: Julian Donovan, Jessica Brealey, Matthew Bowker, Marianne Feghali, Gregory Smith, Lee Thompson, Deborah Henderson

Abstract:

This article details the development of the X-ray response team (XRT), a service that utilises innovative technology to safely deliver acute and elective imaging and medical assessment service in the pre-hospital and community setting. This involves a partnership between Northumbria Healthcare NHS Foundation Trust’s Radiology and Emergency Medicine departments and the North East Ambulance Service to create a multidisciplinary prehospital team. The team committed to the delivery of a two-day acute service every week, alongside elective referrals, starting in November 2020. The service was originally made available to a 15-mile radius surrounding the Northumbria Hospital. Due to demand, this was expanded to include the North Tyneside and Northumberland regions. The target population was specified as frail and vulnerable patients, as well as those deemed to benefit from staying in their own environment. Within the first two months, thirty-six percent of patients assessed were able to stay at home due to the provision of off-site imaging. In the future, this service aims to allow patient transfer directly to an appropriate ward or clinic, bypassing the emergency department to improve the patient journey and reduce emergency care pressures.

Keywords: frailty, imaging, pre-hospital, X-ray

Procedia PDF Downloads 201
1967 Knowledge Transfer in Industrial Clusters

Authors: Ana Paula Lisboa Sohn, Filipa Dionísio Vieria, Nelson Casarotto, Idaulo José Cunha

Abstract:

This paper aims at identifying and analyzing the knowledge transmission channels in textile and clothing clusters located in Brazil and in Europe. Primary data was obtained through interviews with key individuals. The collection of primary data was carried out based on a questionnaire with ten categories of indicators of knowledge transmission. Secondary data was also collected through a literature review and through international organizations sites. Similarities related to the use of the main transmission channels of knowledge are observed in all cases. The main similarities are: influence of suppliers of machinery, equipment and raw materials; imitation of products and best practices; training promoted by technical institutions and businesses; and cluster companies being open to acquire new knowledge. The main differences lie in the relationship between companies, where in Europe the intensity of this relationship is bigger when compared to Brazil. The differences also occur in importance and frequency of the relationship with the government, with the cultural environment, and with the activities of research and development. It is also found factors that reduce the importance of geographical proximity in transmission of knowledge, and in generating trust and the establishment of collaborative behavior.

Keywords: industrial clusters, interorganizational learning, knowledge transmission channels, textile and clothing industry

Procedia PDF Downloads 366
1966 Development of Monitoring Blood Bank Center Based PIC Microcontroller Using CAN Communication

Authors: Kaiwan S. Ismael, Ergun Ercelebi, Majeed Nader

Abstract:

This paper describes the design and implementation of a hardware setup for online monitoring of 24 refrigerators inside blood bank center using the microcontroller and CAN bus for communications between each node. Due to the security of locations in the blood bank hall and difficulty of monitoring of each refrigerator separately, this work proposes a solution to monitor all the blood bank refrigerators in one location. CAN-bus system is used because it has many applications and advantages, especially for this system due to easy in use, low cost, providing a reduction in wiring, fast to repair and easily expanding the project without a problem.

Keywords: control area network (CAN), monitoring blood bank center, PIC microcontroller, MPLAB IDE

Procedia PDF Downloads 483
1965 Entrepreneurship under the Effect of Information Technology

Authors: Mohammad Hadi Khorashadi Zadeh ‎

Abstract:

An entrepreneur is a manager or the owner of the commercial company that creates resources and money by risking and initiative. The Netpreneur is the capability to run an online business. It needs only the Connectivity. An Entrepreneur, as long as he has a service which the market demands can set up a feasible and viable trade with his Intellectual Capital as the principle input and the Connectivity Infrastructure as the only physical input. The internet is possibly the most significant revolution in science and technology that our generation could fantasize or imagine. It has introduced in various benefits to the society, culture, economics and politics. The entrepreneur is a premium member in the community. She/he provides services to the society and community including employment.

Keywords: entrepreneur, Netpreneur, intellectual capital, infrastructure

Procedia PDF Downloads 327
1964 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 134
1963 Learners' Perception of Digitalization of Medical Education in a Low Middle-Income Country – A Case Study of the Lecturio Platform

Authors: Naomi Nathan

Abstract:

Introduction Digitalization of medical education can revolutionize how medical students learn and interact with the medical curriculum across contexts. With the increasing availability of the internet and mobile connectivity in LMICs, online medical education platforms and digital learning tools are becoming more widely available, providing new opportunities for learners to access high-quality medical education and training. However, the adoption and integration of digital technologies in medical education in LMICs is a complex process influenced by various factors, including learners' perceptions and attitudes toward digital learning. In Ethiopia, the adoption of digital platforms for medical education has been slow, with traditional face-to-face teaching methods still being the norm. However, as access to technology improves and more universities adopt digital platforms, it is crucial to understand how medical students perceive this shift. Methodology This study investigated medical students' perception of the digitalization of medical education in relation to their access to the Lecturio Digital Medical Education Platform through a capacity-building project. 740 medical students from over 20 medical universities participated in the study. The students were surveyed using a questionnaire that included their attitudes toward the digitalization of medical education, their frequency of use of the digital platform, and their perceived benefits and challenges. Results The study results showed that most medical students had a positive attitude toward digitalizing medical education. The most commonly cited benefit was the convenience and flexibility of accessing course material/curriculum online. Many students also reported that they found the platform more interactive and engaging, leading to a more meaningful learning experience. The study also identified several challenges medical students faced when using the platform. The most commonly reported challenge was the need for more reliable internet access, which made it difficult for students to access content consistently. Overall, the results of this study suggest that medical students in Ethiopia have a positive perception of the digitalization of medical education. Over 97% of students continuously expressed a need for access to the Lecturio platform throughout their studies. Conclusion Significant challenges still need to be addressed to fully realize the Lecturio digital platform's benefits. Universities, relevant ministries, and various stakeholders must work together to address these challenges to ensure that medical students fully participate in and benefit from digitalized medical education - sustainably and effectively.

Keywords: digital medical education, EdTech, LMICs, e-learning

Procedia PDF Downloads 92
1962 Erotic Subversions: Male Masochism, Power, and the Politics of Desire in Hong Kong’s BDSM Landscape

Authors: Maari Sugawara

Abstract:

This research critically engages with the erotic and political entanglements of male clientele of Dominatrices who identify as submissives (hereafter referred to as submissives) within Hong Kong's BDSM scene. Employing masochism as an analytical framework, it interrogates the intersections of capitalism, heteropatriarchy, postcolonialism, and commodified desire. BDSM (Bondage and Discipline, Dominance and Submission, Sadism and Masochism) encompasses practices that explore power, control, and subordination through both physical and psychological role-play, predicated on consent, negotiation, and boundary delineation. This makes BDSM a fertile site for examining how dominance and submission are mobilized, challenged, and reiterated. This study focuses on the dynamics between thirty male submissives and three professional Dominatrices active in Hong Kong since 2019. The predominance of male interviewees reflects the demographic reality that most clients engaging with professional Dominatrices are male. These submissives—men who willfully relinquish control—offer a critical lens for exploring how BDSM, as both practice and market, mirrors and destabilizes dominant power structures. BDSM relationships occasionally replicate the hierarchical logics of heterosexual marriage, particularly in the expectation that submissives engage exclusively with a single Dominatrix, reflecting a dynamic of devotion and fidelity akin to traditional marital structures. However, these relationships also function as counter-normative spaces where care and control are reconfigured, enabling the negotiation of alternative power configurations. By centering BDSM work rather than broader kink practices, this study foregrounds the commodification of intimacy as a key site where suppressed desires, economic forces, and political tensions converge. The submissives in this study are predominantly affluent, cisgender men, underscoring the socio-economic asymmetries in the BDSM market. Furthermore, the research examines how Hong Kong’s political turbulence—particularly the 2019 Yellow Umbrella Movement and the COVID-19 pandemic—has reverberated through the BDSM scene, reshaping the contours of desire, trust, and power in these intimate transactions. The increasing tensions with mainland China, alongside the erosion of public trust in state institutions, form a critical backdrop to this evolving landscape. Grounded in gender and sexuality theories, this research interrogates how the desires of male submissives are constructed within and resist heteronormative frameworks. BDSM practices, far from existing outside capitalist and colonial logics, often act as both a mirror and critique of these systems, revealing complex ways in which power is commodified, enacted, and contested. In their pursuit of emotional care and alternative forms of control, male submissives navigate a paradoxical terrain where their masochistic desires both subvert and perpetuate the socio-political status quo. By examining the intersections of desire, commodification, and the shifting socio-political landscape, this research provides a nuanced understanding of how BDSM functions as a site of negotiation for those navigating the turbulent crosscurrents of capitalist and colonial legacies. Ultimately, it uncovers the complex interplay between erotic practices and the structures of power and identity in a city undergoing profound transformation.

Keywords: masochism, Hong Kong, identity, BDSM, dominatrix, masculinity, gender studies

Procedia PDF Downloads 20
1961 Building Information Modeling-Based Approach for Automatic Quantity Take-off and Cost Estimation

Authors: Lo Kar Yin, Law Ka Mei

Abstract:

Architectural, engineering, construction and operations (AECO) industry practitioners have been well adapting to the dynamic construction market from the fundamental training of its discipline. As further triggered by the pandemic since 2019, great steps are taken in virtual environment and the best collaboration is strived with project teams without boundaries. With adoption of Building Information Modeling-based approach and qualitative analysis, this paper is to review quantity take-off and cost estimation process through modeling techniques in liaison with suppliers, fabricators, subcontractors, contractors, designers, consultants and services providers in the construction industry value chain for automatic project cost budgeting, project cost control and cost evaluation on design options of in-situ reinforced-concrete construction and Modular Integrated Construction (MiC) at design stage, variation of works and cash flow/spending analysis at construction stage as far as practicable, with a view to sharing the findings for enhancing mutual trust and co-operation among AECO industry practitioners. It is to foster development through a common prototype of design and build project delivery method in NEC Engineering and Construction Contract (ECC) Options A and C.

Keywords: building information modeling, cost estimation, quantity take-off, modeling techniques

Procedia PDF Downloads 188
1960 Educational System in Developing Countries and E-learning Evaluation in the Face of COVID Pandemic

Authors: Timothy Wale Olaosebikan

Abstract:

The adverse effect of the Covid-19 outbreak and lock-downs on the world economy has coursed a major disrupt in mostly all sectors. The educational sector is not exempted from this disruption as it is one of the most affected sectors in the world. Similarly, most developing countries are still struggling to adopt/ adapt with the 21st-century advancement of technology, which includes e-learning/ e-education. Furthermore, one is left to wonder of the possibility of these countries surviving this disruption on their various educational systems that may no longer be business as usual after the Covid Pandemic era. This study evaluates the e-learning process of educational systems, especially in developing countries. The collection of data for the study was effected through the use of questionnaires with sampling drawn by stratified random sampling. The data was analyzed using descriptive and inferential statistics. The findings of the study show that about 30% of developing countries have fully adopted the e-learning system, about 45% of these countries are still struggling to upgrade while about 25% of these countries are yet to adopt the e-learning system of education. The study concludes that the sudden closure of educational institutions around the world during the Covid Pandemic period should facilitate a teaching pedagogy of e-learning and virtual delivery of courses and programmes in these developing countries. If this approach can be fully adopted, schools might have to grapple with the initial teething problems, given the sudden transition just in order to preserve the welfare of students. While progress should be made to transit as the case may be, lectures and seminars can be delivered through the web conferencing site-zoom. Interestingly, this can be done on a mobile phone. The demands of this approach would equally allow lecturers to make major changes to their work habits, uploading their teaching materials online, and get to grips with what online lecturing entails. Consequently, the study recommends that leaders of developing countries, regulatory authorities, and heads of educational institutions must adopt e-learning into their educational system. Also, e-learning should be adopted into the educational curriculum of students, especially from elementary school up to tertiary level. Total compliance to the e-learning system must be ensured on the part of both the institutions, stake holders, lecturers, tutors, and students. Finally, collaborations with developed countries and effective funding for e-learning integration must form the heart of their cardinal mission.

Keywords: Covid pandemic, developing countries, educational system, e-learning

Procedia PDF Downloads 102