Search results for: personal cyber insurance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2882

Search results for: personal cyber insurance

1442 The Mentoring in Professional Development of University Teachers

Authors: Nagore Guerra Bilbao, Clemente Lobato Fraile

Abstract:

Mentoring is provided by professionals with a higher level of experience and competence as part of the professional development of a university faculty. This paper explores the characteristics of the mentoring provided by those teachers participating in the development of an active methodology program run at the University of the Basque Country: to examine and to analyze mentors’ performance with the aim of providing empirical evidence regarding its value as a lifelong learning strategy for teaching staff. A total of 183 teachers were trained during the first three programs. The analysis method uses a coding technique and is based on flexible, systematic guidelines for gathering and analyzing qualitative data. The results have confirmed the conception of mentoring as a methodological innovation in higher education. In short, university teachers in general assessed the mentoring they received positively, considering it to be a valid, useful strategy in their professional development. They highlighted the methodological expertise of their mentor and underscored how they monitored the learning process of the active method and provided guidance and advice when necessary. Finally, they also drew attention to traits such as availability, personal commitment and flexibility in. However, a minority critique is pointed to some aspects of the performance of some mentors.

Keywords: higher education, mentoring, professional development, university teachers

Procedia PDF Downloads 241
1441 An Eco-Translatology Approach to the Translation of Spanish Tourism Advertising in Digital Communication in Chinese

Authors: Mingshu Liu, Laura Santamaria, Xavier Carmaniu Mainadé

Abstract:

As one of the sectors most affected by the COVID-19 pandemic, tourism is facing challenges in revitalizing the industry. But at the same time, it would be a good opportunity to take advantage of digital communication as an effective tool for tourism promotion. Our proposal aims to verify the linguistic operations on online platforms in China. The research is carried out based on the theory of Eco-traductology put forward by Gengshen Hu, whose contribution focuses on the translator's adaptation to the ecosystem environment and the three elaborated parameters (linguistic, cultural and communicative). We also relate it to Even-Zohar's and Toury's theoretical postulates on the Polysystem to elaborate on interdisciplinary methodology. Such a methodology allows us to analyze personal treatments and phraseology in the target text. As for the corpus, we adopt the official Spanish-language website of Turismo de España as the source text and the postings on the two major social networks in China, Weibo and Wechat, in 2019. Through qualitative analysis, we conclude that, in the tourism advertising campaign on Chinese social networks, chengyu (Chinese phraseology) and honorific titles are used very frequently.

Keywords: digital communication, eco-traductology, polysystem theory, tourism advertising

Procedia PDF Downloads 227
1440 The Use of Digital Stories in the Development of Critical Literacy

Authors: Victoria Zenotz

Abstract:

For Fairclough (1989) critical literacy is a tool to enable readers and writers to build up meaning in discourse. More recently other authors (Leu et al., 2004) have included the new technology context in their definition of literacy. In their view being literate nowadays means to “successfully use and adapt to the rapidly changing information and communication technologies and contexts that continuously emerge in our world and influence all areas of our personal and professional lives.” (Leu et al., 2004: 1570). In this presentation the concept of critical literacy will be related to the creation of digital stories. In the first part of the presentation concepts such as literacy and critical literacy are examined. We consider that real social practices will help learners may improve their literacy level. Accordingly, we show some research, which was conducted at a secondary school in the north of Spain (2013-2014), to illustrate how the “writing” of digital stories may contribute to the development of critical literacy. The use of several instruments allowed the collection of data at the different stages of their creative process including watching and commenting models for digital stories, planning a storyboard, creating and selecting images, adding voices and background sounds, editing and sharing the final product. The results offer some valuable insights into learners’ literacy progress.

Keywords: literacy, computer assisted language learning, esl

Procedia PDF Downloads 399
1439 Forecasting the Influences of Information and Communication Technology on the Structural Changes of Japanese Industrial Sectors: A Study Using Statistical Analysis

Authors: Ubaidillah Zuhdi, Shunsuke Mori, Kazuhisa Kamegai

Abstract:

The purpose of this study is to forecast the influences of Information and Communication Technology (ICT) on the structural changes of Japanese economies based on Leontief Input-Output (IO) coefficients. This study establishes a statistical analysis to predict the future interrelationships among industries. We employ the Constrained Multivariate Regression (CMR) model to analyze the historical changes of input-output coefficients. Statistical significance of the model is then tested by Likelihood Ratio Test (LRT). In our model, ICT is represented by two explanatory variables, i.e. computers (including main parts and accessories) and telecommunications equipment. A previous study, which analyzed the influences of these variables on the structural changes of Japanese industrial sectors from 1985-2005, concluded that these variables had significant influences on the changes in the business circumstances of Japanese commerce, business services and office supplies, and personal services sectors. The projected future Japanese economic structure based on the above forecast generates the differentiated direct and indirect outcomes of ICT penetration.

Keywords: forecast, ICT, industrial structural changes, statistical analysis

Procedia PDF Downloads 375
1438 Grammatical and Lexical Cohesion in the Japan’s Prime Minister Shinzo Abe’s Speech Text ‘Nihon wa Modottekimashita’

Authors: Nadya Inda Syartanti

Abstract:

This research aims to identify, classify, and analyze descriptively the aspects of grammatical and lexical cohesion in the speech text of Japan’s Prime Minister Shinzo Abe entitled Nihon wa Modotte kimashita delivered in Washington DC, the United States on February 23, 2013, as a research data source. The method used is qualitative research, which uses descriptions through words that are applied by analyzing aspects of grammatical and lexical cohesion proposed by Halliday and Hasan (1976). The aspects of grammatical cohesion consist of references (personal, demonstrative, interrogative pronouns), substitution, ellipsis, and conjunction. In contrast, lexical cohesion consists of reiteration (repetition, synonym, antonym, hyponym, meronym) and collocation. Data classification is based on the 6 aspects of the cohesion. Through some aspects of cohesion, this research tries to find out the frequency of using grammatical and lexical cohesion in Shinzo Abe's speech text entitled Nihon wa Modotte kimashita. The results of this research are expected to help overcome the difficulty of understanding speech texts in Japanese. Therefore, this research can be a reference for learners, researchers, and anyone who is interested in the field of discourse analysis.

Keywords: cohesion, grammatical cohesion, lexical cohesion, speech text, Shinzo Abe

Procedia PDF Downloads 162
1437 Building User Behavioral Models by Processing Web Logs and Clustering Mechanisms

Authors: Madhuka G. P. D. Udantha, Gihan V. Dias, Surangika Ranathunga

Abstract:

Today Websites contain very interesting applications. But there are only few methodologies to analyze User navigations through the Websites and formulating if the Website is put to correct use. The web logs are only used if some major attack or malfunctioning occurs. Web Logs contain lot interesting dealings on users in the system. Analyzing web logs has become a challenge due to the huge log volume. Finding interesting patterns is not as easy as it is due to size, distribution and importance of minor details of each log. Web logs contain very important data of user and site which are not been put to good use. Retrieving interesting information from logs gives an idea of what the users need, group users according to their various needs and improve site to build an effective and efficient site. The model we built is able to detect attacks or malfunctioning of the system and anomaly detection. Logs will be more complex as volume of traffic and the size and complexity of web site grows. Unsupervised techniques are used in this solution which is fully automated. Expert knowledge is only used in validation. In our approach first clean and purify the logs to bring them to a common platform with a standard format and structure. After cleaning module web session builder is executed. It outputs two files, Web Sessions file and Indexed URLs file. The Indexed URLs file contains the list of URLs accessed and their indices. Web Sessions file lists down the indices of each web session. Then DBSCAN and EM Algorithms are used iteratively and recursively to get the best clustering results of the web sessions. Using homogeneity, completeness, V-measure, intra and inter cluster distance and silhouette coefficient as parameters these algorithms self-evaluate themselves to input better parametric values to run the algorithms. If a cluster is found to be too large then micro-clustering is used. Using Cluster Signature Module the clusters are annotated with a unique signature called finger-print. In this module each cluster is fed to Associative Rule Learning Module. If it outputs confidence and support as value 1 for an access sequence it would be a potential signature for the cluster. Then the access sequence occurrences are checked in other clusters. If it is found to be unique for the cluster considered then the cluster is annotated with the signature. These signatures are used in anomaly detection, prevent cyber attacks, real-time dashboards that visualize users, accessing web pages, predict actions of users and various other applications in Finance, University Websites, News and Media Websites etc.

Keywords: anomaly detection, clustering, pattern recognition, web sessions

Procedia PDF Downloads 288
1436 Molecular Detection of Crimean-Congo Hemorrhagic Fever in Ticks of Golestan Province, Iran

Authors: Nariman Shahhosseini, Sadegh Chinikar

Abstract:

Introduction: Crimean-Congo hemorrhagic fever virus (CCHFV) causes severe disease with fatality rates of 30%. The virus is transmitted to humans through the bite of an infected tick, direct contact with the products of infected livestock and nosocomially. The disease occurs sporadically throughout many of African, Asian, and European countries. Different species of ticks serve either as vector or reservoir for CCHFV. Materials and Methods: A molecular survey was conducted on hard ticks (Ixodidae) in Golestan province, north of Iran during 2014-2015. Samples were sent to National Reference Laboratory of Arboviruses (Pasteur Institute of Iran) and viral RNA was detected by RT-PCR. Results: Result revealed the presence of CCHFV in 5.3% of the selected ticks. The infected ticks belonged to Hy. dromedarii, Hy. anatolicum, Hy. marginatum, and Rh. sanguineus. Conclusions: These data demonstrates that Hyalomma ticks are the main vectors of CCHFV in Golestan province. Thus, preventive strategies such as using acaricides and repellents in order to avoid contact with Hyalomma ticks are proposed. Also, personal protective equipment (PPE) must be utilized at abattoirs.

Keywords: tick, CCHFV, surveillance, vector diversity

Procedia PDF Downloads 372
1435 Language Literacy Attrition: An Empirical Investigation

Authors: Ahmad Al-Issa

Abstract:

Our world is now operating under the auspices of globalization with its attendant language of ‘global English.' In many parts of the world, the need for English is often accepted without much thought given to native languages. Indeed, this is the current situation in the United Arab Emirates (UAE), with English encroaching into all areas of society, and especially forcefully into the education sector, where English as a medium of instruction (EMI) is on the rise. At the same time, Arabic literacy (i.e., the ability to read and write in Arabic) is declining among the UAE youth. Using a mixed-methods design, a study was conducted to gain insights into the use of Arabic by Emirati University students. The study examines how often Emiratis, males and females, use their native language (Arabic) in their daily lives, how they view their reading and writing skills in Arabic vis-à-vis their English literacy skills, and the extent to which they can demonstrate their literacy skills in Arabic. Clear evidence emerged showing that while Arabic as a dialect continues to be spoken on a daily basis, Arabic literacy is unquestionably losing ground. This was found to be motivated by educational, political, societal, and personal forces. These findings and their implications to language policy and existing bilingualism programs will be discussed. Suggestions for further research will also be made.

Keywords: Arabic, globalization, global English, literacy attrition, United Arab Emirates

Procedia PDF Downloads 291
1434 Analysing the Perception of Climate Hazards on Biodiversity Conservation in Mining Landscapes within Southwestern Ghana

Authors: Salamatu Shaibu, Jan Hernning Sommer

Abstract:

Integrating biodiversity conservation practices in mining landscapes ensures the continual provision of various ecosystem services to the dependent communities whilst serving as ecological insurance for corporate mining when purchasing reclamation security bonds. Climate hazards such as long dry seasons, erratic rainfall patterns, and extreme weather events contribute to biodiversity loss in addition to the impact due to mining. Both corporate mining and mine-fringe communities perceive the effect of climate on biodiversity from the context of the benefits they accrue, which motivate their conservation practices. In this study, pragmatic approaches including semi-structured interviews, field visual observation, and review were used to collect data on corporate mining employees and households of fringing communities in the southwestern mining hub. The perceived changes in the local climatic conditions and the consequences on environmental management practices that promote biodiversity conservation were examined. Using a thematic content analysis tool, the result shows that best practices such as concurrent land rehabilitation, reclamation ponds, artificial wetlands, land clearance, and topsoil management are directly affected by prolonging long dry seasons and erratic rainfall patterns. Excessive dust and noise generation directly affect both floral and faunal diversity coupled with excessive fire outbreaks in rehabilitated lands and nearby forest reserves. Proposed adaptive measures include engaging national conservation authorities to promote reforestation projects around forest reserves. National government to desist from using permit for mining concessions in forest reserves, engaging local communities through educational campaigns to control forest encroachment and burning, promoting community-based resource management to promote community ownership, and provision of stricter environmental legislation to compel corporate, artisanal, and small scale mining companies to promote biodiversity conservation.

Keywords: biodiversity conservation, climate hazards, corporate mining, mining landscapes

Procedia PDF Downloads 219
1433 The Simplicity of the Future: Plain Methods of Setting up a Company under the Freedom of Enterprise

Authors: Renata Hrecska

Abstract:

This research aims to present today's corporate law reforms in the micro, small and medium-sized enterprise sector. The UN Commission on International Trade Law (UNCITRAL) currently deals with emerging issues in the sector in its Working Group I that has specifically focused on possible company law simplifications, including the creation of a fully unique company, the UNCITRAL Limited Liability Organization. However, beyond the work at the UN, the different states has also been focusing on simplification efforts and demands in the sphere of commercial law. We can observe that e.g. Slovakia, Serbia, Poland, Croatia, Hungary, Romania and France are undergoing legal reforms aimed at restructuring the sector through simplification of registration or operation. An important objective of the research is to examine where the boundary is for the legal entity to be more transparent and accountable, while the legislator wants to bring the possibility of establishing a company closer to the citizen. The research material presents the advantages and disadvantages of different initiatives with comparative legal instruments and draws conclusions on the possible future vision. The researcher herself attended some of the meetings of the relevant UNCITRAL working group as a national delegated expert, giving her a personal insight into the UNLLO discourse.

Keywords: commercial law, company formation, MSME, UNCITRAL

Procedia PDF Downloads 118
1432 Preferred Teaching Styles of University Level Young Assistant Professors in the Faculty of Agriculture

Authors: Jaisridhar P.

Abstract:

The present study aimed to investigate preferred teaching styles of young faculties in agricultural education among 23 constituent colleges of Tamil Nadu Agricultural University (TNAU) using Staffordshire Evaluation of Teaching Styles (SETS). An onlinesurvey was conducted among 156 young faculties of 2014 Batch working in different constituent colleges of TNAU and 73 faculties respondent to the survey. The results showed that 62.53 percent preferred “The one-off teacher” stylefollowed by62.26 percent preferring “The student centered, sensitive teacher” style.“The all-round flexible and adaptable teaching style” was preferred by 61.64 percent. The Official Curriculum Teacher” with 61.23 per cent preferring this style.58.97 per cent preferred “The Big Conference Teacher” followed by 58.08 percent of the faculties preferring “The Straight Fact no Non-sense Teacher” type of teaching style. From the results, it wasconcluded that blended teaching approach can balance a teacher’s personal strengths and interest with student’s needs, and curricular requirements enables a teacher to tailor their teaching according to the student’s needs and as per subject matter.

Keywords: teaching styles, assistant professors, agriculture, tamil nadu

Procedia PDF Downloads 119
1431 Attitude Towards E-Learning: A Case of University Teachers and Students

Authors: Muhamamd Shahid Farooq, Maazan Zafar, Rizawana Akhtar

Abstract:

E-learning technologies are the blessings of advancements in science and technology. These facilitate the learners to get information at any place and any time by improving their self-confidence, self-efficacy and effectiveness in teaching learning process. E-learning provides an individualized learning experience for learners and remove barriers faced by students during new and creative ways of gaining information. It provides a wide range of facilities to enable the teachers and students for effective and purposeful learning. This study was conducted to explore the attitudes of university students and teachers towards e-learning working in a metropolitan university of Pakistan. The personal, institutional and technological characteristics of the teachers and students of higher education institution effect the adoption of e-learning. For this descriptive study 449 students and 35 university teachers were surveyed by using a Likert scale type questionnaire consisting of 52 statements relating to six factors "perceived usefulness, intention to adopt e-learning, ease of e-learning use, availability resources, e-learning stressors, and pressure to use e-learning". Data were analyzed by making comparisons on the basis of different demographic factors. The findings of the study show that both type of respondents have positive attitude towards e-learning. However, the male and female respondents differ in their opinion for e-learning implementation.

Keywords: e-learning, ICT, e-sources of learning, questionnaire

Procedia PDF Downloads 527
1430 Socioeconomic Benefits in Agroforestry Practices by Rural Community: Case Study in Paitan District, Sabah, Malaysia

Authors: J. Kodoh, H. L. Dumil, M. Maid

Abstract:

Agroforestry system has been widely documented that provide benefits to rural livelihoods and improved socioeconomic status. This study concerns on agroforestry practices in generating local socioeconomic livelihoods. The general approach is to survey local community involvement in the agroforestry activities at four selected rural villages in Paitan district, using a structured questionnaire through personal interview technique. A total of 200 respondents were interviewed where the largest age group of the respondents was more than 50 years old (31%). Almost all respondents had former education (76%), and majority of them were employed (97%) either in the government and private sectors or self-employed. All respondents (100%) were involved in agroforestry activities where agroforestry products as their source of income (Hevea brasiliensis, Durio zibethinus, Elaeis guinensis) and foods (Manihot esculenta, Mangifera sp., Musa sp.) The mean monthly income from selling agroforestry products contributed 16.6% (USD130.37) of the mean total monthly income of the respondents (r=0.407, r²=0.166, p < 0.01). This study also showed that the main driven factor for the respondents (93%) to adopt and sustain the agroforestry practices is their traditional ways of farming that transferred from generation to generation.

Keywords: agroforestry, Paitan district, rural community, socioeconomic

Procedia PDF Downloads 223
1429 Exploring the Relationship between Employer Brand and Organizational Attractiveness: The Mediating Role of Employer Image and the Moderating Role of Value Congruence

Authors: Yi Shan Wu, Ting Hsuan Wu, Li Wei Cheng, Pei Yu Guo

Abstract:

Given the fiercely competitive environment, human capital is one of the most valuable assets in a commercial enterprise. Therefore, developing strategies to acquire more talents is crucial. Talents are mainly attracted by both internal and external employer brands as well as by the messages conveyed from the employer image. This not only manifests the importance of a brand and an image of an organization but shows people might be affected by their personal values when assessing an organization as an employer. The goal of the present study is to examine the association between employer brand, employer image, and the likelihood of increasing organizational attractiveness. In addition, we draw from social identity theory to propose value congruence may affect the relationship between employer brand and employer image. Data was collected from those people who only worked less than a year in the industry via an online survey (N=209). The results show that employer image partly mediates the effect of employer brand on organizational attractiveness. In addition, the results also suggest that value congruence does not moderate the relationship between employer brand and employer image. These findings explain why building a good employer brand could enhance organization attractiveness and indicate there should be other factors that may affect employer image building, offering directions for future research.

Keywords: organizational attractiveness, employer brand, employer image, value congruence

Procedia PDF Downloads 136
1428 Psycholgical Contract Violation and Its Impact on Job Satisfaction Level: A Study on Subordinate Employees in Enterprises of Hanoi, Vietnam

Authors: Quangyen Tran, YeZhuang Tian, Chengfeng Li

Abstract:

Psychological contract violations may lead to damaging an organization through losing its potential employees; it is a very significant concept in understanding the employment relationships. The authors selected contents of psychological contract violation scale based on the nine areas of violation most relevant to managerial samples (High pay, training, job security, career development, pay based on performance, promotion, feedback, expertise and quality of co-workers and support with personal problems), using regression analysis, the degree of psychological contract violations was measured by an adaptation of a multiplicative scale with Cronbach’s alpha as a measure of reliability. Through the regression analysis, psychological contract violations was found have a positive impact on employees’ job satisfaction, the frequency of psychological contract violations was more intense among male employees particularly in terms of training, job security and pay based on performance. Job dissatisfaction will lead to a lowering of employee commitment in the job, enterprises in Hanoi, Vietnam should therefore offer lucrative jobs in terms of salary and other emoluments to their employees.

Keywords: psychological contract, psychological contract violation, job satisfaction, subordinate employees, employers’ obligation

Procedia PDF Downloads 325
1427 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 307
1426 Farmers Perception and Awareness to Climate Change in Some Selected Local Government Areas in Jigawa State, Nigeria

Authors: M. M. Ubayo, U. S. Babuga, A. Garba

Abstract:

The study examined the level of climate change awareness and perception by rice farmers in Jigawa State, Nigeria. A multi-stage and purposive sampling technique was used to select respondents. The state is divided into four agricultural zones namely Birninkudu zone, Gumel zone, Hadejia zone, and Kazaure zone. Two agricultural zones (Gumel zone and Hadejia zones) were purposively selected. Six Local Government Areas (LGAs) were randomly selected from the two zones. Also, twenty rice farmers were purposively selected from each of the LGAS. Data were analyzed using frequency and percentages. The result shows that 83.3% of the respondents are aware of the climate change impact on their rice output. Personal experience is the main sources of climate change information in the study area, another 45.6% adopted use of irrigation as the most effective measure to combating climate change, 25.5% use of early maturing variety. Further studies are needed on how to combat the threat and menace of the climate change in the study area.

Keywords: awareness, perception, climate, change, Jigawa

Procedia PDF Downloads 387
1425 Classical Myths in Modern Drama: A Study of the Vision of Jean Anouilh in Antigone

Authors: Azza Taha Zaki

Abstract:

Modern drama was characterised by realism and naturalism as dominant literary movements that focused on contemporary people and their issues to reflect the status of modern man and his environment. However, some modern dramatists have often fallen on classical mythology in ancient Greek tragedies to create a sense of the universality of the human experience. The tragic overtones of classical myths have helped modern dramatists in their attempts to create an enduring piece by evoking the majestic grandeur of the ancient myths and the heroic struggle of man against forces he cannot fight. Myths have continued to appeal to modern playwrights not only for the plot and narrative material but also for the vision and insight into the human experience and human condition. This paper intends to study how the reworking of Sophocles’ Antigone by Jean Anouilh in his Antigone, written in 1942 at the height of the Second World War and during the German occupation of his country, France, fits his own purpose and his own time. The paper will also offer an analysis of the vision in both plays to show how Anouilh has used the classical Antigone freely to produce a modern vision of the dilemma of man when faced by personal and national conflicts.

Keywords: Anouilh, Antigone, drama, Greek tragedy, modern, myth, sophocles

Procedia PDF Downloads 182
1424 Management Competency in Logistical Function: The Skills That Will Master a Logistical Manager

Authors: Fatima Ibnchahid

Abstract:

Competence approach is considered, since the early 80's as one of the major development of HR policies. Many approaches to manage the professional skills were declined. Some processes are mature whereas the others have been abandoned. Competence can be defined as the set of knowledge (theoretical and practical), know-how (experience) and life skills (personality traits) mobilized by a person in the company. The skills must master a logistics manager are divided into two main categories: depending on whether technical skills, or managerial skills and human. The firsts are broken down into skills on logistical techniques and on general skills in business, seconds in social skills (self with others) and personal (with oneself). Logisticians are faced with new challenges and new constraints that are revolutionizing the way to treat the physical movement of goods and operations related to information flows that trigger, they control and guide the physical movements of these major changes, we can mention the development of information technology and communication, the emergence of strong environmental and security constraints. These changes have important effects on the skills needs of the members of the logistical function and sensitive development for training requested by logistical managers to perform better in their job changes. In this article, we will address two main points, first, a brief overview of the management skills and secondly answer the question asked in the title of the article to know what are the skills that will master a logistical manager.

Keywords: skills, competence, management, logistical function

Procedia PDF Downloads 282
1423 A Feminist Approach to the COVID-19 Lockdown Process in Turkey

Authors: Aykut Sigin

Abstract:

In feminist theory, home is usually regarded as an unsafe place for women to be in, as it continually produces inequalities between men and women, favoring the former, and maintains the patriarchal status quo. The second-wave feminists argued that women need to raise their concerns regarding domestic problems and this eventually led to the emergence of the motto 'the personal is political', pointing out to the fact that the domestic problems one woman experienced were essentially the problems of women in general as the patriarchal ideology manifested itself at home. Although this motto was from the late 1960s, it still holds significance today. In the golden era of the Internet, women could use social media to voice their concerns more easily than ever. Following this line of thought, the aim of this study is to analyze the domestic problems of the women in Turkey during the lockdown caused by COVID-19 through social media as they find themselves at home with their fathers, husbands and/or brothers for longer periods of time than ever before. For this purpose, an investigation of the posts shared under '#EvdeKal' ('StayAtHome') was carried out. The results of the study made it clear that women find the lockdown process to be problematic, that they express their domestic concerns rather freely through social media, and that the inequalities caused by the patriarchal ideology persist in the 21st century.

Keywords: COVID-19, lockdown, home, feminism

Procedia PDF Downloads 133
1422 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 365
1421 Computational Fluid Dynamics Simulations of Thermal and Flow Fields inside a Desktop Personal Computer Cabin

Authors: Mohammad Salehi, Mohammad Erfan Doraki

Abstract:

In this paper, airflow analysis inside a desktop computer case is performed by simulating computational fluid dynamics. The purpose is to investigate the cooling process of the central processing unit (CPU) with thermal capacities of 80 and 130 watts. The airflow inside the computer enclosure, selected from the microATX model, consists of the main components of heat production such as CPU, hard disk drive, CD drive, floppy drive, memory card and power supply unit; According to the amount of thermal power produced by the CPU with 80 and 130 watts of power, two different geometries have been used for a direct and radial heat sink. First, the independence of the computational mesh and the validation of the solution were performed, and after ensuring the correctness of the numerical solution, the results of the solution were analyzed. The simulation results showed that changes in CPU temperature and other components linearly increased with increasing CPU heat output. Also, the ambient air temperature has a significant effect on the maximum processor temperature.

Keywords: computational fluid dynamics, CPU cooling, computer case simulation, heat sink

Procedia PDF Downloads 122
1420 Predicting Medical Check-Up Patient Re-Coming Using Sequential Pattern Mining and Association Rules

Authors: Rizka Aisha Rahmi Hariadi, Chao Ou-Yang, Han-Cheng Wang, Rajesri Govindaraju

Abstract:

As the increasing of medical check-up popularity, there are a huge number of medical check-up data stored in database and have not been useful. These data actually can be very useful for future strategic planning if we mine it correctly. In other side, a lot of patients come with unpredictable coming and also limited available facilities make medical check-up service offered by hospital not maximal. To solve that problem, this study used those medical check-up data to predict patient re-coming. Sequential pattern mining (SPM) and association rules method were chosen because these methods are suitable for predicting patient re-coming using sequential data. First, based on patient personal information the data was grouped into … groups then discriminant analysis was done to check significant of the grouping. Second, for each group some frequent patterns were generated using SPM method. Third, based on frequent patterns of each group, pairs of variable can be extracted using association rules to get general pattern of re-coming patient. Last, discussion and conclusion was done to give some implications of the results.

Keywords: patient re-coming, medical check-up, health examination, data mining, sequential pattern mining, association rules, discriminant analysis

Procedia PDF Downloads 640
1419 Enhancing Human Resource Development in Entrepreneurship: A Catalyst for Economic Growth and Development in Nigeria

Authors: Eli Maikoto Agison

Abstract:

The relevance of enhancing human resource development in entrepreneurship for economic growth and development cannot be overemphasized since no country can grow and developed economically above its citizenry. Africa for example and Nigeria in particular is lagging behind in terms of economic growth and development when compared with other developed countries of the world like China, Japan, Singapore, USA etc. The reason is not farfetched from these developed countries efforts in enhancing human resource development in entrepreneurship education. For Nigeria to attain this height of development, this paper discusses the meaning of human resource development in entrepreneurship as the framework for helping employees develop their personal and organizational skills knowledge and abilities as this includes employee training, career development and performance management to enable an organization achieve a set goal. While entrepreneurship education is seen as an aspect of education that is geared towards self-reliance, some of the challenges faced in the enhancement of human resource development in Nigeria include inadequate training and re-training of instructors of entrepreneurship in higher education. Insufficient funding to higher education were discussed and recommendations to include adequate funding, training and re-training of instructors of higher education be enhanced as some of the ways forward.

Keywords: economic development, economic growth, entrepreneurship education, human resource development

Procedia PDF Downloads 292
1418 Factors Leading to Teenage Pregnancy in the Selected Villages of Mopani District, in Limpopo Province

Authors: Z. N. Salim, R. T. Lebese, M. S. Maputle

Abstract:

Background: The international community has been concerned about population growth for more than a century. Teenagers in sub-Saharan Africa continue to be at high risk of HIV infection, and this is exacerbated by poverty, whereby many teenagers in Africa come from disadvantaged families/background, which leads them to engage in sexual activities at an early age for survival hence leading to increased rate of teenage pregnancy. Purpose: The study sought to explore, describe and to identify the factors that lead to teenage pregnancy in the selected villages in Mopani District. Design: The study was conducted using a qualitative, explorative, descriptive and contextual approach. A non-probability purposive sampling approach was used. Researcher collected the data with the assistance of research assistant. Participants were interviewed and information was captured on a tape recorder and analysed using open coding and thereafter collected into main themes, themes and sub-themes. The researcher conducted four focus groups, Participants aged between 10-19 years of age. Results: The finding of the study revealed that there are several factors that is contributing to teenagers falling pregnant. Personal, intuitional, and cultural were identified to be the factors leading to teenage pregnancy.

Keywords: factors, leading, pregnancy, teenage

Procedia PDF Downloads 200
1417 The Need for the Development of Entrepreneurial Skill in Benue State University Students, Makurdi

Authors: Philomena Ibuh Adzongo, Margaret U. Oluwole, Justina Nguveren Jor.

Abstract:

This paper investigated the need for the development of entrepreneurial skills for Benue State University students. The population consisted of all 1,500 final year students in Benue State University. A sample of 100 students was selected using simple random sampling. A 12-item self-constructed and content validated questionnaire by research experts titled, the Need for the Development of Entrepreneurial Skills in Benue State University Students (NDECBSUS) was used to collect the data. The questionnaire items were rated using a 4-point modified rating scale of Strongly Agree, Agree, Disagree and Strongly Disagree, assigned the following scores of 4,3,2 and 1, respectively. The questionnaire was administered by the researcher with the help of two research assistants through the primary source. Simple percentages and chi-square were used to answer the research questions and test the hypotheses, respectively. The findings revealed that in business management, business management skills, personal skills, and technical skills need to be developed in students for them to become effective and efficient entrepreneurs and concluded that the acquisition of these skills will reduce the challenge of unemployment. The study recommended that funds should be made available by all education stakeholders for such programmes to remain functional.

Keywords: entrepreneurial skill, entrepreneurship, need for development, university students

Procedia PDF Downloads 356
1416 The Most Desirable Individual Relationship

Authors: Ali Babaei

Abstract:

There is a significant relationship between Soul Faculties and human relationships. Man has at least three levels of relationship according to three levels of his Faculties: individual (with himself), dual (with another) and collective (with others). Since all human actions are organized by the type of use of their internal faculties, their "hierarchy of relations" is related to the "hierarchy of their Faculties." In the final explanation based on the ontology of Islamic wisdom, one can consider the hierarchy of human Faculties in three levels: 1. senses, 2. intellect and heart, and 3. Soul. The best relationship, in the individual one is that every human being, with healthy senses, achieves both the intellectual growth and the perfection of the heart, which we call "Clear-headed" and "Good-hearted.” The result of human evolution in this two aspects will lead to the development of a powerful personality which can be interpreted as "spiritual prosperity"; having a great soul is the result of such evolution. A smart brain without a "Good-heart"ince can lead to criminality; and mere "Good-heart"ince" without "Clear-head"ince leads to "naivety". “clear-head”ince is achieved through thoughtfulness and study, and "Good-heart"ince through love and worship. So the best way to achieve perfection in a personal relationship is to have a dependable appearance, a coherent thinking

Keywords: Ontology , good-heartince, wisdom, relationship, clear-head”ince, criminality, naivety

Procedia PDF Downloads 140
1415 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 30
1414 Evolution of Web Development Progress in Modern Information Technology

Authors: Abdul Basit Kiani

Abstract:

Web development, the art of creating and maintaining websites, has witnessed remarkable advancements. The aim is to provide an overview of some of the cutting-edge developments in the field. Firstly, the rise of responsive web design has revolutionized user experiences across devices. With the increasing prevalence of smartphones and tablets, web developers have adapted to ensure seamless browsing experiences, regardless of screen size. This progress has greatly enhanced accessibility and usability, catering to the diverse needs of users worldwide. Additionally, the evolution of web frameworks and libraries has significantly streamlined the development process. Tools such as React, Angular, and Vue.js have empowered developers to build dynamic and interactive web applications with ease. These frameworks not only enhance efficiency but also bolster scalability, allowing for the creation of complex and feature-rich web solutions. Furthermore, the emergence of progressive web applications (PWAs) has bridged the gap between native mobile apps and web development. PWAs leverage modern web technologies to deliver app-like experiences, including offline functionality, push notifications, and seamless installation. This innovation has transformed the way users interact with websites, blurring the boundaries between traditional web and mobile applications. Moreover, the integration of artificial intelligence (AI) and machine learning (ML) has opened new horizons in web development. Chatbots, intelligent recommendation systems, and personalization algorithms have become integral components of modern websites. These AI-powered features enhance user engagement, provide personalized experiences, and streamline customer support processes, revolutionizing the way businesses interact with their audiences. Lastly, the emphasis on web security and privacy has been a pivotal area of progress. With the increasing incidents of cyber threats, web developers have implemented robust security measures to safeguard user data and ensure secure transactions. Innovations such as HTTPS protocol, two-factor authentication, and advanced encryption techniques have bolstered the overall security of web applications, fostering trust and confidence among users. Hence, recent progress in web development has propelled the industry forward, enabling developers to craft innovative and immersive digital experiences. From responsive design to AI integration and enhanced security, the landscape of web development continues to evolve, promising a future filled with endless possibilities.

Keywords: progressive web applications (PWAs), web security, machine learning (ML), web frameworks, advancement responsive web design

Procedia PDF Downloads 54
1413 Mourning through Poetry: Discovering the Lost Love object and Symbolization of Desire

Authors: Galit Harel

Abstract:

Deborah was referred for psychoanalytic psychotherapy following a suicide attempt and depression. She began a fascinating journey spanning more than 10 years. During therapy, many questions arose concerning the suicidal episode, which she could not register consciously. The author tried to understand the reasons for her depression and the attempted suicide through the unconscious process in the therapeutic relationship and through the music and poetry that she brought to sessions. In this paper, the author describes the process of listening for the signifiers of semiotic and symbolic language, both metaphoric and metonymic, as revealed in poetry and music according to the theories of Kristeva and Lacan. The poetry enabled the patient to retrieve childhood memories, experience the movement from unconscious to conscious, and mourn through the experience of transference and countertransference in the therapeutic relationship. Also illustrated is the transition from singing the music to more symbolic language, turning the patient’s sensory experience into language, and connecting her personal experience with the culture of her past. The patient’s mourning and the lost love objects are discussed through the prism of classical and object relations theories.

Keywords: depression, lost love object, psychoanalytic psychotherapy, suicide attempt, symbolization of desire

Procedia PDF Downloads 92