Search results for: personnel information
9820 News Reading Practices: Traditional Media versus New Media
Authors: Nuran Öze
Abstract:
People always want to be aware of what is happening around them. The nature of man constantly triggers the need for gathering information because of curiosity. The media has emerged to save people the need for information. It is known that the media has changed with the technological developments over time, diversified and, people's information needs are provided in different ways. Today, the Internet has become an integral part of everyday life. The invasion of the Internet into everyday life practices at this level affects every aspect of life. These effects cause people to change their life practices. Technological developments have always influenced of people, the way they reach information. Looking at the history of the media, the breaking point about the dissemination of information is seen as the invention of the machine of the printing press. This adventure that started with written media has now become a multi-dimensional structure. Written, audio, visual media has now changed shape with new technologies. Especially emerging of the internet to everyday life, of course, has effects on media field. 'New media' has appeared which contains most of traditional media features in its'. While in the one hand this transformation enables captures a harmony between traditional and new media, on the other hand, new media and traditional media are rivaling each other. The purpose of this study is to examine the problematic relationship between traditional media and new media through the news reading practices of individuals. This study can be evaluated as a kind of media sociology. To reach this aim, two different field researches will be done besides literature review. The research will be conducted in Northern Cyprus. Northern Cyprus Northern Cyprus is located in the Mediterranean Sea. North Cyprus is a country which is not recognized by any country except Turkey. Despite this, takes its share from all technological developments take place in the world. One of the field researches will consist of the questionnaires to be applied on media readers' news reading practices. This survey will be conducted in a social media environment. The second field survey will be conducted in the form of interviews with general editorials or news directors in traditional media. In the second field survey, in-depth interview method will be applied. As a result of these investigations, supporting sides between the new media and the traditional media and directions which contrast with each other will be revealed. In addition to that, it will try to understand the attitudes and perceptions of readers about the traditional media and the new media in this study.Keywords: new media, news, North Cyprus, traditional media
Procedia PDF Downloads 2309819 The Imperative of Adult Education in the Knowledge Society
Authors: Najim Akorede Babalola
Abstract:
Adult Education is a multi and interdisciplinary in nature that cut across different fields of study which includes education, social sciences, engineering even information technologies that dominate the contemporary world among others. In the past, Adult Education has been used as an instrument of civilization by teaching people how to read and write as well as earning a better living. The present world has witnessed a transition from industrial age to information age which is also known as knowledge society needs Adult Education for knowledge acquisition and update of existing knowledge. An individual needs Adult Education in either of its various forms (on-the-job-training, in-service training, extramural classes, vocational education, continuing education among others) in order to develop towards the information society trends; this is because Adult Education is a process of transforming an individual through acquisition of relevant skills and knowledge for personal as well as societal development. Evidence abounds in the literature that Adult Education has not only assisted people in the medieval period but still assisting people in this modern society in changing and transforming their lives for a better living. This study, therefore, raised a salient question that with different ideas and innovations brought by the contemporary world, is Adult Education relevant? It is on this basis that this study intends to examine the relevance of Adult Education in the past and present in order to determine its future relevance.Keywords: adult education, multi and inter-disciplinary, knowledge society, skill acquisition
Procedia PDF Downloads 3509818 Qualitative and Quantitative Analysis of Motivation Letters to Model Turnover in Non-Governmental Organization
Authors: A. Porshnev, A. Zaporozhtchuk
Abstract:
Motivation regarded as a key factor of labor turnover, is especially important for volunteers working on an altruistic basis in NGO. Despite the motivational letter, candidate selection depends on the impression of the selection committee, which can be subject to human bias. We expect that structured and unstructured information provided in motivation letters could be used to improve candidate selection procedures. In our paper, we perform qualitative and quantitative analysis of 2280 motivation letters, create logistic regression, and build a decision tree to improve selection procedures. Our analysis showed that motivation factors are significant and enable human resources department to forecast labor turnover and provide extra information to demographic, professional and timing questions. In spite of the average level of accuracy the model demonstrates the selection procedures of company of under consideration can be improved. We also discuss interrelation between answers to open and closed motivation questions, recommend changes in motivational letter templates to ensure more relevant information about applicants and further steps to create more accurate model.Keywords: decision trees, logistic regression, model, motivational letter, non-governmental organization, retention, turnover
Procedia PDF Downloads 1789817 Anti-Forensic Countermeasure: An Examination and Analysis Extended Procedure for Information Hiding of Android SMS Encryption Applications
Authors: Ariq Bani Hardi
Abstract:
Empowerment of smartphone technology is growing very rapidly in various fields of science. One of the mobile operating systems that dominate the smartphone market today is Android by Google. Unfortunately, the expansion of mobile technology is misused by criminals to hide the information that they store or exchange with each other. It makes law enforcement more difficult to prove crimes committed in the judicial process (anti-forensic). One of technique that used to hide the information is encryption, such as the usages of SMS encryption applications. A Mobile Forensic Examiner or an investigator should prepare a countermeasure technique if he finds such things during the investigation process. This paper will discuss an extension procedure if the investigator found unreadable SMS in android evidence because of encryption. To define the extended procedure, we create and analyzing a dataset of android SMS encryption application. The dataset was grouped by application characteristics related to communication permissions, as well as the availability of source code and the documentation of encryption scheme. Permissions indicate the possibility of how applications exchange the data and keys. Availability of the source code and the encryption scheme documentation can show what the cryptographic algorithm specification is used, how long the key length, how the process of key generation, key exchanges, encryption/decryption is done, and other related information. The output of this paper is an extended or alternative procedure for examination and analysis process of android digital forensic. It can be used to help the investigators while they got a confused cause of SMS encryption during examining and analyzing. What steps should the investigator take, so they still have a chance to discover the encrypted SMS in android evidence?Keywords: anti-forensic countermeasure, SMS encryption android, examination and analysis, digital forensic
Procedia PDF Downloads 1289816 Entrepreneurial Leadership in a Startup Context: A Comparative Study on Two Egyptian Startup Businesses
Authors: Nada Basset
Abstract:
Problem Statement: The study examines the important role of leading change inside start-ups and highlights the challenges faced by an entrepreneur during the startup phase of the business. Research Methods/Procedures/Approaches: A qualitative research approach is taken, using the case study analysis method. A comparative study was made between two day care nurseries in Greater Cairo. Non-probability purposive sampling was used and a triangulation of semi-structured interviews, document analysis and participant-observation were applied simultaneously. The in-depth case study analysis took place over a longitudinal study of four calendar months. Results/Findings: Findings demonstrated that leading change in an entrepreneurial setup must be initiated by the entrepreneur, who must also be the owner of the change process. Another important finding showed that the culture of change, although created by the entrepreneur, needs the support and engagement of followers, who should be sharing the same value system and vision of the entrepreneur. Conclusions and Implications: An important implication suggests that during the first year of a start-up lifecycle, special emphasis must be made to the recruitment and selection of personnel, who should play a role into setting the new start-up culture and help it grow or shrink. Another drawn conclusion is that the success of the change must be measured in both quantitative and qualitative terms. Increasing revenues and customer attrition rates -as quantitative KPIs- must be aligned with other qualitative KPIs like customer satisfaction, employee satisfaction, and organizational commitment and business reputation. Originality of Paper: The paper addresses change management in an entrepreneurial concept, with an empirical application on an Egyptian start-up model providing a service to both adults and children. This privileges the research as the constructs measured merged together the level of satisfaction of employees, decision-makers (parents of children), and the users (children).Keywords: leadership, change management, entrepreneurship, startup business
Procedia PDF Downloads 1859815 Customer Segmentation Revisited: The Case of the E-Tailing Industry in Emerging Market
Authors: Sanjeev Prasher, T. Sai Vijay, Chandan Parsad, Abhishek Banerjee, Sahakari Nikhil Krishna, Subham Chatterjee
Abstract:
With rapid rise in internet retailing, the industry is set for a major implosion. Due to the little difference among competitors, companies find it difficult to segment and target the right shoppers. The objective of the study is to segment Indian online shoppers on the basis of the factors – website characteristics and shopping values. Together, these cover extrinsic and intrinsic factors that affect shoppers as they visit web retailers. Data were collected using questionnaire from 319 Indian online shoppers, and factor analysis was used to confirm the factors influencing the shoppers in their selection of web portals. Thereafter, cluster analysis was applied, and different segments of shoppers were identified. The relationship between income groups and online shoppers’ segments was tracked using correspondence analysis. Significant findings from the study include that web entertainment and informativeness together contribute more than fifty percent of the total influence on the web shoppers. Contrary to general perception that shoppers seek utilitarian leverages, the present study highlights the preference for fun, excitement, and entertainment during browsing of the website. Four segments namely Information Seekers, Utility Seekers, Value Seekers and Core Shoppers were identified and profiled. Value seekers emerged to be the most dominant segment with two-fifth of the respondents falling for hedonic as well as utilitarian shopping values. With overlap among the segments, utilitarian shopping value garnered prominence with more than fifty-eight percent of the total respondents. Moreover, a strong relation has been established between the income levels and the segments of Indian online shoppers. Web shoppers show different motives from being utility seekers to information seekers, core shoppers and finally value seekers as income levels increase. Companies can strategically use this information for target marketing and align their web portals accordingly. This study can further be used to develop models revolving around satisfaction, trust and customer loyalty.Keywords: online shopping, shopping values, effectiveness of information content, web informativeness, web entertainment, information seekers, utility seekers, value seekers, core shoppers
Procedia PDF Downloads 1959814 Risk Indicators of Massive Removal Phenomena According to the Mora - Vahrson Method, Applied in Pitalito and Campoalegre Municipalities
Authors: Laura Fernanda Pedreros Araque, Sebastian Rivera Pardo
Abstract:
The massive removal phenomena have been one of the most frequent natural disasters in the world, causing thousands of deaths, victims, damage to homes and diseases. In Pitalito, and Campoalegre department of Huila municipalities - Colombia, disasters have occurred due to various events such as high rainfall, earthquakes; it has caused landslides, floods, among others, affected the economy, the community, and transportation. For this reason, a study was carried out on the area’s most prone to suffer these phenomena to take preventive measures in favor of the protection of the population, the resources of management, and the planning of civil works. For the proposed object, the Mora-Varshon method was used, which allows classifying the degree of susceptibility to landslides in which the areas are found. Also, various factors or parameters were evaluated such as the soil moisture, lithology, slope, seismicity, and rain, each of these indicators were obtained using information from IDEAM, Servicio Geologico Colombiano (SGC) and using geographic information for geoprocessing in the Arcgis software to realize a mapping to indicate the susceptibility to landslides, classifying the areas of the municipalities such as very low, low, medium, moderate, high or very high.Keywords: geographic information system, landslide, mass removal phenomena, Mora-Varshon method
Procedia PDF Downloads 1449813 Description of a Structural Health Monitoring and Control System Using Open Building Information Modeling
Authors: Wahhaj Ahmed Farooqi, Bilal Ahmad, Sandra Maritza Zambrano Bernal
Abstract:
In view of structural engineering, monitoring of structural responses over time is of great importance with respect to recent developments of construction technologies. Recently, developments of advanced computing tools have enabled researcher’s better execution of structural health monitoring (SHM) and control systems. In the last decade, building information modeling (BIM) has substantially enhanced the workflow of planning and operating engineering structures. Typically, building information can be stored and exchanged via model files that are based on the Industry Foundation Classes (IFC) standard. In this study a modeling approach for semantic modeling of SHM and control systems is integrated into the BIM methodology using the IFC standard. For validation of the modeling approach, a laboratory test structure, a four-story shear frame structure, is modeled using a conventional BIM software tool. An IFC schema extension is applied to describe information related to monitoring and control of a prototype SHM and control system installed on the laboratory test structure. The SHM and control system is described by a semantic model applying Unified Modeling Language (UML). Subsequently, the semantic model is mapped into the IFC schema. The test structure is composed of four aluminum slabs and plate-to-column connections are fully fixed. In the center of the top story, semi-active tuned liquid column damper (TLCD) is installed. The TLCD is used to reduce effects of structural responses in context of dynamic vibration and displacement. The wireless prototype SHM and control system is composed of wireless sensor nodes. For testing the SHM and control system, acceleration response is automatically recorded by the sensor nodes equipped with accelerometers and analyzed using embedded computing. As a result, SHM and control systems can be described within open BIM, dynamic responses and information of damages can be stored, documented, and exchanged on the formal basis of the IFC standard.Keywords: structural health monitoring, open building information modeling, industry foundation classes, unified modeling language, semi-active tuned liquid column damper, nondestructive testing
Procedia PDF Downloads 1549812 The Role of Leadership in Enhancing Health Information Systems to Improve Patient Outcomes in China
Authors: Nisar Ahmad, Xuyi, Ali Akbar
Abstract:
As healthcare systems worldwide strive for improvement, the integration of advanced health information systems (HIS) has emerged as a pivotal strategy. This study aims to investigate the critical role of leadership in the implementation and enhancement of HIS in Chinese hospitals and how such leadership can drive improvements in patient outcomes and overall healthcare satisfaction. We propose a comprehensive study to be conducted across various hospitals in China, targeting healthcare professionals as the primary population. The research will leverage established theories of transformational leadership and technology acceptance to underpin the analysis. In our approach, data will be meticulously gathered through surveys and interviews, focusing on the experiences and perceptions of healthcare professionals regarding HIS implementation and its impact on patient care. The study will utilize SPSS and SmartPLS software for robust data analysis, ensuring precise and comprehensive insights into the correlation between leadership effectiveness and HIS success. We hypothesize that strong, visionary leadership is essential for the successful adoption and optimization of HIS, leading to enhanced patient outcomes and increased satisfaction with healthcare services. By applying advanced statistical methods, we aim to identify key leadership traits and practices that significantly contribute to these improvements. Our research will provide actionable insights for policymakers and healthcare administrators in China, offering evidence-based recommendations to foster leadership that champions HIS and drives continuous improvement in healthcare delivery. This study will contribute to the global discourse on health information systems, emphasizing the future role of leadership in transforming healthcare environments and outcomes.Keywords: health information systems, leadership, patient outcomes, healthcare satisfaction
Procedia PDF Downloads 379811 The Role of Virtual Geographic Environment (VGEs)
Abstract:
VGEs are a kind of typical web- and computer-based geographic environment, with aims of merging geographic knowledge, computer technology, virtual reality technology, network technology, and geographic information technology, to provide a digital mirror of physical geographic environments to allow users to ‘feel it in person’ by a means for augmenting the senses and to ‘know it beyond reality’ through geographic phenomena simulation and collaborative geographic experiments. Many achievements have appeared in this field, but further evolution should be explored. With the exploration of the conception of VGEs, and some examples, this article illustrated the role of VGEs and their contribution to currently GIScience. Based on the above analysis, questions are proposed for discussing about the future way of VGEs.Keywords: virtual geographic environments (VGEs), GIScience, virtual reality, geographic information systems
Procedia PDF Downloads 5759810 Underrepresentation of Women in Management Information Systems: Gender Differences in Key Environmental Barriers
Authors: Asli Yagmur Akbulut
Abstract:
Despite a robust and growing job market and lucrative salaries, there is a global shortage of Information Technology (IT) professionals. To make matters worse, women continue to be underrepresented in the IT workforce and among IT degree holders. In today’s knowledge based economy and society, it is extremely important to increase the presence of women in the IT field. In order to do so, it is necessary to reduce entry barriers and attract more women to pursue degrees in various IT fields including the field of Management Information Systems (MIS). Even though MIS is considered to have a more feminine nature, women still tend to avoid majoring in this field. Unfortunately, there is a lack of research that investigates the specific factors that may deter women from pursuing a degree in MIS. To address this research gap, this study examined a set of key environmental barriers that might prevent women from pursuing an MIS degree and explored whether there were any gender differences between female and male students in terms of these key barriers. Based on a survey of 280 students enrolled in an introductory level MIS course, the study empirically confirmed that there were significant differences between male and female students in terms of the key contextual barriers perceived. Female students demonstrated major concerns about gender discrimination related barriers, whereas male students were more concerned about negative social influences. Both male and female students were equally concerned about not being able to fit in well with other MIS majors. The findings have important implications for MIS programs, as the information gained can be used to design and implement specific intervention strategies to overcome the barriers and attract larger pools of women to the MIS discipline. The paper concludes with a discussion of the findings, implications, and future research directions.Keywords: gender differences, MIS major, underrepresentation, women in IT
Procedia PDF Downloads 2549809 Intelligent Recognition Tools for Industrial Automation
Authors: Amin Nazerzadeh, Afsaneh Nouri Houshyar , Azadeh Noori Hoshyar
Abstract:
With the rapid growing of information technology, the industry and manufacturing systems are becoming more automated. Therefore, achieving the highly accurate automatic systems with reliable security is becoming more critical. Biometrics that refers to identifying individual based on physiological or behavioral traits are unique identifiers provide high reliability and security in different industrial systems. As biometric cannot easily be transferred between individuals or copied, it has been receiving extensive attention. Due to the importance of security applications, this paper provides an overview on biometrics and discuss about background, types and applications of biometric as an effective tool for the industrial applications.Keywords: Industial and manufacturing applications, intelligence and security, information technology, recognition; security technology; biometrics
Procedia PDF Downloads 1569808 Promoting Affordable Housing Public-Private Partnerships (PPPs) in Nigeria: Addressing Ethical Concerns in Construction and Exploring Solutions
Authors: Shem Ikoojo Ayegba, Ye Qi
Abstract:
Public-private partnerships (PPPs) can potentially be a transformative mechanism for advancing affordable housing in Nigeria., considering the current housing deficit between 17 – 24 million. Nevertheless, their effectiveness is marred by persistent unethical practices such as corruption and the utilization of subpar materials. Through a comprehensive mixed-methods approach, this study delves into the ethical quandaries within Nigerian housing construction and their cascading effects on the success of PPPs. Semi-structured interviews encompassing seasoned construction professionals and an in-depth content analysis of ongoing housing policies and projects in Nigeria reveal a culture of corruption across the value chain. This malaise is exacerbated by glaring deficiencies in oversight and a lack of transparent practices. A robust statistical survey involving diverse professionals, including engineers, architects, and project managers, echoes these findings, emphasizing that a frail institutional framework facilitates the persistence of substandard material use, professional negligence, and rampant bribery. Such compromised construction standards place residents in potential jeopardy and impede the achievement of broader sustainability objectives. This study propounds a suite of policy interventions to pave the way for thriving affordable housing PPPs: initiating transparent bidding processes, establishing non-negotiable quality benchmarks for construction materials, and incorporating independent third-party audits throughout the building phase. Furthermore, cultivating a culture of professional integrity through targeted ethics training for all construction personnel is imperative. This research furnishes pragmatic strategies that can radically enhance the potency of housing PPPs, thereby ensuring safe, durable, and affordable housing solutions for Nigeria's underserved populace.Keywords: public-private partnerships, affordable housing, unethical practicies, housing policies, construction ethics
Procedia PDF Downloads 819807 Flow Behavior and Performances of Centrifugal Compressor Stage Vaneless Diffusers
Authors: Y.Galerkin, O. Solovieva
Abstract:
Flow parameters are calculated in vaneless diffusers with relative width 0,014 – 0,10 constant along radii. Inlet flow angles and similarity criteria were varied. Information about flow structure is presented – meridian streamlines configuration, information on flow full development, flow separation. Polytrophic efficiency, loss and recovery coefficient are used to compare diffusers’ effectiveness. The sample of narrow diffuser optimization by conical walls application is presented. Three tampered variants of a wide diffuser are compared too. The work is made in the R&D laboratory “Gas dynamics of turbo machines” of the TU SPb.Keywords: vaneless diffuser, relative width, flow angle, flow separation, loss coefficient, similarity criteria
Procedia PDF Downloads 4909806 Impact of Information and Communication Technology on Academic Performance of Senior Secondary Schools Students in Gwagwalada Area Council of Federal Capital Territory, Abuja
Authors: Suleiman Garba, Haruna Ishaku
Abstract:
Information and communication technology (ICT) includes any communication device encompassing: radio, television, cellular phones, computer, satellite systems and so on, as well as the various services and applications associated with them. The significance of ICT cannot be over-emphasized in education. The teaching and learning processes have integrated with the application of ICTs for effectiveness and enhancement of academic performance among the students. Today, as the educational sector is faced with series of changes and reforms, it was noted that the problem of information technology illiteracy was a serious one among the schools’ teachers in the country as it cuts across primary, secondary schools and tertiary institutions. This study investigated the impact of ICT on the academic performance of senior secondary schools students in Gwagwalada Area Council of Federal Capital Territory (FCT), Abuja. A sample of 120 SSS III students was involved in the study. They were selected by using simple random sampling technique. A questionnaire was developed and validated through expert judgement and reliability co-efficient of 0.81 was obtained. It was used to gather relevant data from the respondents. Findings revealed that there was positive impact of ICT on academic performance of senior secondary schools students. The findings indicated the causes of poor academic performance among the students as lack of qualified teachers to teach in schools, peer group influence, and bullying. Significantly, the findings revealed that ICT had a positive impact on students’ academic performance. The null hypotheses were tested using t-test at 0.05 level of significance. It was discovered that there was significant difference between male and female secondary schools’ students' impact of ICT on academic performance in Gwagawalada Area Council of FCT-Abuja. Based on these findings, some recommendations were made which include: adequate funds should be provided towards procurement of ICT resources, relevant textbooks to enhance students’ active participation in learning processes and students should be provided with internet accessibility at inexpensive rate so as to create a platform for accessing useful information in the pursuit of academic excellence.Keywords: academic performance, impact, information communication technology, schools, students
Procedia PDF Downloads 2199805 Decision Support System for the Management and Maintenance of Sewer Networks
Authors: A. Bouamrane, M. T. Bouziane, K. Boutebba, Y. Djebbar
Abstract:
This paper aims to develop a decision support tool to provide solutions to the problems of sewer networks management/maintenance in order to assist the manager to sort sections upon priority of intervention by taking account of the technical, economic, social and environmental standards as well as the managers’ strategy. This solution uses the Analytic Network Process (ANP) developed by Thomas Saaty, coupled with a set of tools for modelling and collecting integrated data from a geographic information system (GIS). It provides to the decision maker a tool adapted to the reality on the ground and effective in usage compared to the means and objectives of the manager.Keywords: multi-criteria decision support, maintenance, Geographic Information System, modelling
Procedia PDF Downloads 6409804 DH-Students Promoting Underage Asylum Seekers' Oral Health in Finland
Authors: Eeva Wallenius-Nareneva, Tuula Toivanen-Labiad
Abstract:
Background: Oral health promotion event was organised for forty Afghanistan, Iraqi and Bangladeshi underage asylum seekers in Finland. The invitation to arrange this coaching occasion was accepted in the Degree Programme in Oral Hygiene in Metropolia. The personnel in the reception center found the need to improve oral health among the youngsters. The purpose was to strengthen the health literacy of the boys in their oral self-care and to reduce dental fears. The Finnish studies, especially the terminology of oral health was integrated to coaching with the help of interpreters. Cooperative learning was applied. Methods: Oral health was interactively discussed in four study group sessions: 1. The importance of healthy eating habits; - Good and bad diets, - Regular meals, - Acid attack o Xylitol. 2. Oral diseases − connection to general health; - Aetiology of gingivitis, periodontitis and caries, - Harmfulness of smoking 3. Tools and techniques for oral self-care; - Brushing and inter dental cleaning. 4. Sharing earlier dental care experiences; - Cultural differences, - Dental fear, - Regular check-ups. Results: During coaching deficiencies appeared in brushing and inter dental cleaning techniques. Some boys were used to wash their mouth with salt justifying it by salt’s antiseptic properties. Many brushed their teeth by vertical movements. The boys took feedback positively when a demonstration with model jaws revealed the inefficiency of the technique. The advantages of fluoride tooth paste were advised. Dental care procedures were new and frightening for many boys. Finnish dental care system was clarified. The safety and indolence of the treatments and informed consent were highlighted. Video presentations and the dialog lowered substantially the threshold to visit dental clinic. The occasion gave the students means for meeting patients from different cultural and language backgrounds. The information hidden behind the oral health problems of the asylum seekers was valuable. Conclusions: Learning dental care practices used in different cultures is essential for dental professionals. The project was a good start towards multicultural oral health care. More experiences are needed before graduation. Health education themes should be held simple regardless of the target group. The heterogeneity of the group does not pose a problem. Open discussion with questions leading to the theme works well in clarifying the target group’s knowledge level. Sharing own experiences strengthens the sense of equality among the participants and encourages them to express own opinions. Motivational interview method turned out to be successful. In the future coaching occasions must confirm active participation of everyone. This could be realized by dividing the participants to even smaller groups. The different languages impose challenges but they can be solved by using more interpreters. Their presence ensures that everyone understands the issues properly although the use of plain and sign languages are helpful. In further development, it would be crucial to arrange a rehearsal occasion to the same participants in two/three months’ time. This would strengthen the adaption of self-care practices and give the youngsters opportunity to pose more open questions. The students would gain valuable feedback regarding the effectiveness of their work.Keywords: cooperative learning, interactive methods, motivational interviewing, oral health promotion, underage asylum seekers
Procedia PDF Downloads 2909803 Predicting the Areal Development of the City of Mashhad with the Automaton Fuzzy Cell Method
Authors: Mehran Dizbadi, Daniyal Safarzadeh, Behrooz Arastoo, Ansgar Brunn
Abstract:
Rapid and uncontrolled expansion of cities has led to unplanned aerial development. In this way, modeling and predicting the urban growth of a city helps decision-makers. In this study, the aspect of sustainable urban development has been studied for the city of Mashhad. In general, the prediction of urban aerial development is one of the most important topics of modern town management. In this research, using the Cellular Automaton (CA) model developed for geo data of Geographic Information Systems (GIS) and presenting a simple and powerful model, a simulation of complex urban processes has been done.Keywords: urban modeling, sustainable development, fuzzy cellular automaton, geo-information system
Procedia PDF Downloads 1339802 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach
Authors: Jumana Majdi Qutub
Abstract:
Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.Keywords: cloud computing, cyber crime, data protection, privacy
Procedia PDF Downloads 2629801 Information Technology and Occupational Safety and Health
Authors: Muhammad Afiq Anaqi Bin Baharudin, Muhammad Izamuddin Bin Mohd Nasir, Syarifuddin Bin Sujuanda, Muhammad Syahmi Rusyaidi Bin Sham Suddin, Danish Hakimi Bin Kamaruzaman, Muhammad Haqimi Nazim Bin Hasmanizam, Mohammad Akmal Zakwan Bin Amran, Muhammad Alparizi Bin Latif
Abstract:
By improving efficiency and production, information technology (IT) has transformed working environments, but it has also created new threats to occupational safety and health (OSH). This study evaluates the literature that has already been written on the subject of IT and OSH, identifies major findings and discussion points, and highlights gaps in the material that call for additional research. The study's findings, which look at how IT affects OSH in a sizable multinational organization, are also presented in the report. According to the report, IT poses a number of OSH problems, such as ergonomic dangers, eye strain, dangers related to cybersecurity, and psychological hazards. The report suggests using tactics like providing comfortable workstations, encouraging a healthy balance between work and life, and putting strong cybersecurity safeguards in place to reduce these dangers. The implications of these findings for OSH and IT are discussed in the paper's conclusion, and it emphasizes the need for more study and action to address these dangers and promote healthy and secure working environments in the age of digitization.Keywords: information technology, occupational safety and health (OSH), ergonomic, hazards, workplace.
Procedia PDF Downloads 1299800 Exploring the Role of Building Information Modeling for Delivering Successful Construction Projects
Authors: Muhammad Abu Bakar Tariq
Abstract:
Construction industry plays a crucial role in the progress of societies and economies. Furthermore, construction projects have social as well as economic implications, thus, their success/failure have wider impacts. However, the industry is lagging behind in terms of efficiency and productivity. Building Information Modeling (BIM) is recognized as a revolutionary development in Architecture, Engineering and Construction (AEC) industry. There are numerous interest groups around the world providing definitions of BIM, proponents describing its advantages and opponents identifying challenges/barriers regarding adoption of BIM. This research is aimed at to determine what actually BIM is, along with its potential role in delivering successful construction projects. The methodology is critical analysis of secondary data sources i.e. information present in public domain, which include peer reviewed journal articles, industry and government reports, conference papers, books, case studies etc. It is discovered that clash detection and visualization are two major advantages of BIM. Clash detection option identifies clashes among structural, architectural and MEP designs before construction actually commences, which subsequently saves time as well as cost and ensures quality during execution phase of a project. Visualization is a powerful tool that facilitates in rapid decision-making in addition to communication and coordination among stakeholders throughout project’s life cycle. By eliminating inconsistencies that consume time besides cost during actual construction, improving collaboration among stakeholders throughout project’s life cycle, BIM can play a positive role to achieve efficiency and productivity that consequently deliver successful construction projects.Keywords: building information modeling, clash detection, construction project success, visualization
Procedia PDF Downloads 2619799 Security in Resource Constraints: Network Energy Efficient Encryption
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC
Procedia PDF Downloads 1459798 Eco-Parcel As a Semi-Qualitative Approach to Support Environmental Impacts Assessments in Nature-Based Tourism Destinations
Authors: Halima Kilungu, Pantaleo, K. T. Munishi
Abstract:
Climate and land-cover change affect nature-based tourism (NBT) due to its attractions' close connection to natural environments and climate. Thus, knowledge of how each attraction reacts to the changing environments and devising simple yet science based approaches to respond to these changes from a tourism perspective in space and time is timely. Nevertheless, no specific approaches exist to address the knowledge gap. The eco-parcel approach is devised to address the gap and operationalized in Serengeti and Kilimanjaro National Parks: the most climate-sensitive NBT destinations in Africa. The approach is partly descriptive and has three simple steps: (1) to identify and define tourist attractions (i.e. biotic and abiotic attractions). This creates an important database of the most poorly kept information on attractions' types in NBT destinations. (2) To create a spatial and temporal link of each attraction and describe its characteristic environments (e.g. vegetation, soil, water and rock outcrops). This is the most limited attractions' information yet important as a proxy of changes in attractions. (3) To assess the importance of individual attractions for tourism based on tourists' preferences. This information enables an accurate assessment of the value of individual attractions for tourism. The importance of the eco-parcel approach is that it describes how each attraction emerges from and is connected to specific environments, which define its attractiveness in space and time. This information allows accurate assessment of the likely losses or gains of individual attractions when climate or environment changes in specific destinations and equips tourism stakeholders with informed responses.Keywords: climate change, environmental change, nature-based tourism, Serengeti National Park, Kilimanjaro National Park
Procedia PDF Downloads 1229797 Critical Success Factors for Sustainable Smart City Project in India
Authors: Debasis Sarkar
Abstract:
Development of a Smart City would depend upon the development of its infrastructure in a smart way. Primarily based on the ideology of the fourth industrial revolution a Smart City project should have Smart governance, smart health care, smart building, smart transportation, smart mobility, smart energy, smart technology and smart citizen. Considering the Indian scenario of current state of cities in India, it has become very essential to decide the specific parameters which would govern the development of a Smart City project. It has been observed that there are significant parameters beyond Information and Communication Technology (ICT), which govern the development of a Smart City project. This paper is an attempt to identify the Critical Success Factors (CSF) which are significantly responsible for the development of a Smart City project in Western India. Responses to questionnaire survey were analyzed on basis of Likert scale. They were further critically evaluated with help of Factor Comparison Method (FCM) and Analytical Hierarchy Process (AHP). The project authorities need to incorporate Building Information Modeling (BIM) to make the smart city project more collaborative. To make the project more sustainable, use of flyash in the concrete used, reduced usage of cement and steel, use of alternate fuels like biodiesel is recommended.Keywords: analytical hierarchical process, building information modeling, critical success factors, factor comparison method
Procedia PDF Downloads 2539796 Relationship between ICTs Application with Production and Protection Technology: Lesson from Rural Punjab-Pakistan
Authors: Tahir Munir Butt, Gao Qijie, Babar Shahbaz, Muhammad Zakaria Yousaf Hassan, Zhnag Chuanhong
Abstract:
The main objective of this paper is to identify the relationship between Information Communication Technology (ICTs) applications with Agricultural development in the process of communication at rural Punjab-Pakistan. The authors analyzed the relationship of ICTs applications with the most prominent factor for the Agricultural Information Services (AIS) in the Agricultural Extension Approaches (AEA). The data collection procedure was started from Jan. 2015 and completed in July 2015. It is the one of the part in PhD studies at China Agriculture, University Hadian-Beijng China. It was observed that on major constraint in the AIS disseminated was the limited number of farmers especially and unknown the farmers about new ICTs technology for Agriculture at rural areas. Majority of ICTs application e.g. Toll free number; Robo Calls; Text message was highly significances in the AIS approach. The recommendation is communication and capacity building one of the indispensable elements for sustainable and agricultural development and Agricultural extension should be provided training to farmer about new ICTs technologies to access and use of it for Sustainable Agriculture Development (SAD) and update the scenario of flow of information also with try to established ICTs hub at the village level.Keywords: ICTs, AEA, AIS, SAD, rural farmers
Procedia PDF Downloads 3019795 Addressing Factors Associated with Vertical HIV Transmission among Pregnant Women in Rwanda
Authors: Murorunkwere Marie Claire
Abstract:
Introduction: In Sub-Saharan Africa and specifically in Rwandan rural areas, mother-to-Child human immunodeficiency virus transmission remains a big challenge. This is mainly due to lack of awareness and ignorance among pregnant rural women, leading to neglect regular taking of prophylactic antiretroviral treatment and to persistently beliefs in traditional healers and home deliveries. This paper explores the factors associated with stagnant reduction in human immunodeficiency virus vertical transmission among pregnant rural women and provides solutions to tackle it. Methodology: The first phase of this research will be a qualitative survey was conducted to assess the knowledge, attitudes and practices towards vertical human immunodeficiency virus transmission among pregnant women in one rural district in Rwanda. The data generated from phase one of this research will be used to address the main factors revealed through community mobilization and motivation on attending required antenatal consultations and hospital deliveries, proper and regular antiretroviral treatment taking, and discouraging beliefs in traditional healers and home deliveries. Refresher training seminars will also be organized for healthcare providers qualified on conducting deliveries about current measures to maximize the reduction of chances that can lead to mother -child contamination (to avoid early rupture of membranes and to prevent any source of contamination). Results: This paper is expected to contribute in a significant reduction of the vertical human immunodeficiency virus transmission burden among pregnant rural women. Conclusion: Strong campaigns on prevention of mother- to-child human immunodeficiency virus transmission and community mobilization of pregnant rural women, and house to house education and continuous reminders as well as training seminars to health care personnel on updated measures is, key in addressing vertical human immunodeficiency virus transmission.Keywords: attitudes transformation, community mobilisation, pregnant rural women, vertical HIV transmission
Procedia PDF Downloads 809794 Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks
Authors: Parul Khanna, Pavol Zavarsky, Dale Lindskog
Abstract:
Doxing is a term derived from documents, and hence consists of collecting information on an organization or individual through social media websites, search engines, password cracking methods, social engineering tools and other sources of publicly displayed information. The main purpose of doxing attacks is to threaten, embarrass, harass and humiliate the organization or individual. Various tools are used to perform doxing. Tools such as Maltego visualize organization’s architecture which helps in determining weak links within the organization. This paper discusses limitations of Maltego Chlorine CE 3.6.0 and suggests measures as to how organizations can use these tools to protect themselves from doxing attacks.Keywords: advanced persistent threat, FOCA, OSINT, PII
Procedia PDF Downloads 2589793 Development of a Pain Detector Using Microwave Radiometry Method
Authors: Nanditha Rajamani, Anirudhaa R. Rao, Divya Sriram
Abstract:
One of the greatest difficulties in treating patients with pain is the highly subjective nature of pain sensation. The measurement of pain intensity is primarily dependent on the patient’s report, often with little physical evidence to provide objective corroboration. This is also complicated by the fact that there are only few and expensive existing technologies (Functional Magnetic Resonance Imaging-fMRI). The need is thus clear and urgent for a reliable, non-invasive, non-painful, objective, readily adoptable, and coefficient diagnostic platform that provides additional diagnostic information to supplement its current regime with more information to assist doctors in diagnosing these patients. Thus, our idea of developing a pain detector was conceived to take a step further the detection and diagnosis of chronic and acute pain.Keywords: pain sensor, microwave radiometery, pain sensation, fMRI
Procedia PDF Downloads 4579792 Empirical Study of Health Behaviors of Employees in Information Technology and Business Process Outsourcing
Authors: Yogesh Pawar
Abstract:
The purpose of this paper is to investigate the behaviors of information technology (IT) and business process outsourcing (BPO) employees in relation to diet, exercise, sleep, stress, and social habits. This was a qualitative research study, using in-depth,semi-structured interviews. Descriptive data were collected from a two-stage purposive sample of 28 IT-BPO employees from two IT companies and one BPOs in Pune. The majority of interviewees reported having an unhealthy diet and/or sedentary lifestyle. Lack of time due to demanding work schedules was the largest barrier to diet and exercise. Given the qualitative study design and limited sampling frame, results may not be generalizable. However, the qualitative data suggests that Pune’s young IT-BPO employees may be at greater risk of lifestyle-related diseases than the general population. The data also suggests that interventions incorporating social influence may be a promising solution, particularly at international call centers. The results from this study provide qualitative insight on the motives for health behaviors of IT-BPO employees, as well as the barriers and facilitators for leading a healthy lifestyle in this industry. The findings provide the framework for future workplace wellness interventions.Keywords: exercise, information technology, qualitative research, wellness
Procedia PDF Downloads 3349791 The Use of Whatsapp Platform in Spreading Fake News among Mass Communication Students of Abdu Gusau Polytechnic, Talata Mafara
Authors: Aliyu Damri
Abstract:
In every educational institution, students of mass communication receive training to report events and issues accurately and objectively in accordance with official controls. However, the complex nature of society today made it possible to use WhatsApp platform that revolutionizes the means of sharing information, ideas, and experiences. This paper examined how students in the Department of Mass Communication, Abdu Gusau Polytechnic, Talata Mafara used WhatsApp platform in spreading fake news. It used in depth interview techniques and focus group discussion with students as well as the use of published materials to gather related and relevant data. Also, the paper used procedures involved to analyze long interview content. This procedure includes observation of a useful utterance, development of expanded observation, examination of interconnection of observed comments, collective scrutiny of observation for patterns and themes, and review and analysis of the themes across all interviews for development of thesis. The result indicated that inadequate and absent of official controls guiding the conduct of online information sharing, inaccuracies and poor source verification, lack of gate keeping procedures to ensure ethical and legal provisions, bringing users into the process, sharing all information, availability of misinformation, disinformation and rumor and problem of conversation strongly encouraged the emergence of fake news. Surprisingly, the idea of information as a commodity has increased, and transparency of a source as new ethics emerged.Keywords: disinformation, fake news, group, mass communication, misinformation, WhatsApp
Procedia PDF Downloads 143