Search results for: internet ethics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2221

Search results for: internet ethics

601 Teachers’ Experiences regarding Use of Information and Communication Technology for Visually Impaired Students

Authors: Zikra Faiz, Zaheer Asghar, Nisar Abid

Abstract:

Information and Communication Technologies (ICTs) includes computers, the Internet, and electronic delivery systems such as televisions, radios, multimedia, and overhead projectors etc. In the modern world, ICTs is considered as an essential element of the teaching-learning process. The study was aimed to discover the usage of ICTs in Special Education Institutions for Visually Impaired students, Lahore, Pakistan. Objectives of the study were to explore the problems faced by teachers while using ICT in the classroom. The study was phenomenology in nature; a qualitative survey method was used through a semi-structured interview protocol developed by the researchers. The sample comprised of eighty faculty members selected through a purposive sampling technique. Data were analyzed through thematic analysis technique with the help of open coding. The study findings revealed that multimedia, projectors, computers, laptops and LEDs are used in special education institutes to enhance the teaching-learning process. Teachers believed that ICTs could enhance the knowledge of visually impaired students and every student should use these technologies in the classroom. It was concluded that multimedia, projectors and laptops are used in classroom by teachers and students. ICTs can promote effectively through the training of teachers and students. It was suggested that the government should take steps to enhance ICTs in teacher training and other institutions by pre-service and in-service training of teachers.

Keywords: information and communication technologies, in-services teachers, special education institutions

Procedia PDF Downloads 112
600 The Implementation of Entrepreneurial Marketing in Small Business Enterprise

Authors: Iin Mayasari

Abstract:

This study aims at exploring the influence of aspects of entrepreneurial marketing on a firm’s performance. Entrepreneurs are not only supported by resources control to obtain sustainable competitive advantage, but it should also be supported by intangible resources. Entrepreneurial marketing provides the opportunity for entrepreneurs to proactively find better ways to create value for desired customers, to create innovation, and to build customer equity. Entrepreneurial marketing has the medium between entrepreneurship and marketing, and serves as an umbrella for many of the emergent perspectives on marketing. It has eight underlying dimensions. They are proactiveness, calculated risk-taking, innovativeness, an opportunity focus, entrepreneurial orientation, resource leveraging, customer intensity, and value creating. The research method of the study was a qualitative study by having an interview with 8 small companies in Kudus Region, the Central Java, Indonesia. The interviewees were the owner and the manager of the company that had the scope work of small business enterprise in wood crafting industry. The interview was related to the implementation of the elements of the entrepreneurial marketing. The result showed that the small business enterprises had implemented the elements of entrepreneurial marketing in supporting their daily activities. The understanding based on the theoretical implementation was well executed by the owner and managers. The problems in managing small business enterprises were related to the full support by the government and the branding management. Furthermore, the innovation process should be improved especially the use of internet to promote the product, to expand the market and to increase the firm’s performance.

Keywords: entrepreneurial marketing, innovativeness, risk taking, opportunity focus

Procedia PDF Downloads 285
599 Representation of Islamophobia on Social Media: Facebook Comments Analysis

Authors: Nadia Syed

Abstract:

The digital age has inevitably changed the way in which hate crime is committed. The cyber world has become a highly effective means for individuals and groups to be targeted, harmed, and marginalized , largely through online medium. Facebook has become one of the fastest growing social media platforms. At the end of 2013, Facebook had 1,23bn monthly active users and 757 million daily users who log onto Facebook. Within this online space, there are also an increasing number of online virtual communities, and hate groups who are using this freedom to share a violent, Islamophobic and racist description which attempts to create a aggressive virtual environment. This paper is a research on the rise of Islamophobia and the role of media in spreading it. This paper focusing on how the media especially Facebook is portraying Islam as the religion which promotes violence and ultimately playing a significant role in the global rise of Islamophobia against Muslims. It is important to analyse these ‘new’ communities by monitoring the activities they conduct, because the material they post, potentially can have a harmful impact on community cohesion within society. Additionally, as a result of recent figures that shows an increase in online anti-Muslim abuse, there is a pertinent need to address the issue about Islamophobia on social media. On the whole, this study found Muslims being demonized and vilified online which had manifested through negative attitudes, discrimination, stereotypes, physical threats and online harassment which all had the potential to incite violence or prejudicial action because it disparages and intimidates a protected individual or group.

Keywords: Islamophobia, online, social media, facebook, internet, extremism

Procedia PDF Downloads 82
598 The Effect of Organizational Justice on Management by Values Perception and Intention to Leave: A Study among Nurses

Authors: Arzu K. Harmanci Seren, Burcu Alacam, Serap Altuntas, Ulku Baykal

Abstract:

Organizational justice has been evaluated as a concept related to rules developed with regards to distributing gains and making decisions of distribution such as duty, goods, service, reward, punishment, fee, organizational position, opportunity or role among those working in that organization, and to social norms on which these rules are based. Studies of organizational justice are crucial for analyzing the organizational life. It is considered that organization justice will be positively influential upon organizational behaviours such as employees’ level of work satisfaction, their performance, and behaviours of organization citizenship, management by values perception, tendency towards cooperation, and towards quitting their jobs. However, when the literature related to health and nurse management is examined, authors could not reach enough findings related to the influence of nurses’ perception of organizational justice upon the perception of management and the intention of quitting in accordance with the values. For that reason, this study has been carried out with the purpose of determining the influence of nurses’ perception of organizational justice upon the perception of management and the intention of quitting in accordance with the values. The study has been carried out with 176 nurses working in a university hospital in Istanbul and a private hospital who accepted to take part in the study, and it is definitive and relation-seeking. Before the data has been collected, ethics committee approval and institutional permissions have been taken, Organizational Justice Scale, Management by Values, Intention to Leave Scale with a questionnaire including 8 questions that aims at defining the personal and professional characteristics of the nurses have been used as a means of data collection. The data collected between 1 May and 20 June 2016 have been evaluated by the researchers in a computer via definitive, relation-seeking and psychometric statistic. As a result of the study, it has been determined that most of the nurses are working in a university hospital (70.5%), that they are 30 and over (49.4%), women (91.5%), single (52.8%) and have a Bachelor’s Degree (48.3%), working in a surgery unit (17.6), have 5 year or less institutional experience (44.9%), 11 year or more professional experience. Cronbach alpha values of the scales used in this study are .94, .95 and .56. Nurses’ average scores of Organizational Justice Scale is M= 3.35±.96, Management by Values Scale is M=3.30±.74, Intention to Leave Scale is M=8.36±3.14. As a result of the analysis carried out in order to determine the influence of nurses’ perception of organizational justice upon the perception of management and the intention of quitting in accordance with the values, it has been pointed out that the Perception of Organizational Justice influenced the perception of Management by Values positively, Intention to Leave negatively.

Keywords: intention to leave, management by values, nursing, organizational justice

Procedia PDF Downloads 255
597 Conflicts of Interest in the Private Sector and the Significance of the Public Interest Test

Authors: Opemiposi Adegbulu

Abstract:

Conflicts of interest is an elusive, diverse and engaging subject, a cross-cutting problem of governance; all levels of governance, ranging from local to global, public to corporate or financial sectors. In all these areas, its mismanagement could lead to the distortion of decision-making processes, corrosion of trust and the weakening of administration. According to Professor Peters, an expert in the area, conflict of interest, a problem at the root of many scandals has “become a pervasive ethical concern in our professional, organisational, and political life”. Conflicts of interest corrode trust, and like in the public sector, trust is mandatory for the market, consumers/clients, shareholders and other stakeholders in the private sector. However, conflicts of interest in the private sector are distinct and must be treated in like manner when regulatory efforts are made to address them. The research looks at identifying conflicts of interest in the private sector and differentiating them from those in the public sector. The public interest is submitted as a criterion which allows for such differentiation. This is significant because it would for the use of tailor-made or sector-specific approaches to addressing this complex issue. This is conducted through extensive review of literature and theories on the definition of conflicts of interest. This study will employ theoretical, doctrinal and comparative methods. The nature of conflicts of interest in the private sector will be explored, through an analysis of the public sector where the notion of conflicts of interest appears more clearly identified, reasons, why they are of business ethics concern, will be advanced, and then, once again, looking at public sector solutions and other solutions, the study will identify ways of mitigating and managing conflicts in the private sector. An exploration of public sector conflicts of interest and solutions will be carried out because the typologies of conflicts of interest in both sectors appear very similar at the core and thus, lessons can be learnt with regards to the management of these issues in the private sector. Conflicts of interest corrode trust, and like in the public sector, trust is mandatory for the market, consumers/clients, shareholders and other stakeholders in the private sector. This research will then focus on some specific challenges to understanding and identifying conflicts of interest in the private sector; origin, diverging theories, the psychological barrier to the definition, similarities with public sector conflicts of interest due to the notions of corrosion of trust, ‘being in a particular kind of situation,’ etc. The notion of public interest will be submitted as a key element at the heart of the distinction between public sector and private sector conflicts of interests. It will then be proposed that the appreciation of the notion of conflicts of interest differ according to sector, country to country, based on the public interest test, using the United Kingdom (UK), the United States of America (US), France and the Philippines as illustrations.

Keywords: conflicts of interest, corporate governance, global governance, public interest

Procedia PDF Downloads 380
596 The Survey of Relationship between Health Literacy and Knowledge of Heart Failure with Rehospitalization in Patients with Heart Failure Admitted to Heart Failure Clinic

Authors: Jaleh Mohammad Aliha, Rezvan Razazi, Nasim Naderi

Abstract:

Introduction: Despite the progress in new effective drugs in the treatment of heart failure, the disease still accompanied with frequent hospitalization, impaired quality of life, early mortality and significant economic burden. Patients with chronic disease and consequently patients with heart failure need the knowledge and optimal health literacy to improve the quality of life and minimize the rate of rehopitalizatio. So, considering to importance of knowledge and health literacy in this patients as well as contradictory literature, this study conducted to investigate the relationship between health literacy and Knowledge of heart failure with rehospitalization in patients with heart failure admitted to heart failure clinic in Rajai Heart center in 1394. Methods: The cross-sectional method with convenience sampling method was used in this study. After obtaining the necessary permissions from the ethics committee and the Shahid Rajai Heart center, 238 patients who were older than 18 years and had ejection fraction 35% or less with the ability to read and write and lack of psychiatric, neurological and cognitive disorders and signed the informed consent were recruited. Data collection were perfomed through demographic data questionnaire, short standard health literacy questionnaire 'Short-TOFHLA-16' and Vanderwall (2005) knowledge of heart failure questionnaire. Reliability was assessed by internal consistency method and Cronbach's alpha for both questionnaires was more than 0.7. Then data were analysed by SPSS-20 with descriptive statistic and analytical statistic such as T-test, Chi-square and ANOVA. Results: The majority of patients were male (66%), married (80%) and had age between 50 to 70 years old (42%). The majority of studied men and women have good health literacy and About half of them have adequate knowledge about heart failure. Fisher's exact test showed that there was a significant statistical correlation between health literacy and knowlegh about heart failure. In other words, higher health literacy associated with more knowledge about their condition. Also findings showed that there was no significant statistical correlation between health literacy and knowledge about heart failure and frequency of CCU and emergency admissions. Conclusion: The study results showed that the higher health literacy, associated with the greater knowledge about heart failure and patients' perception about caring recommendations and disease outcomes. Therefore, the knowledge about heart failure and factors which related to severity of the disease, is the important issue to problem identification and treatment and reduction of rehospitalization.

Keywords: health literacy, heart failure, knowlegde, rehospitalization

Procedia PDF Downloads 387
595 Design and Evaluation of a Prototype for Non-Invasive Screening of Diabetes – Skin Impedance Technique

Authors: Pavana Basavakumar, Devadas Bhat

Abstract:

Diabetes is a disease which often goes undiagnosed until its secondary effects are noticed. Early detection of the disease is necessary to avoid serious consequences which could lead to the death of the patient. Conventional invasive tests for screening of diabetes are mostly painful, time consuming and expensive. There’s also a risk of infection involved, therefore it is very essential to develop non-invasive methods to screen and estimate the level of blood glucose. Extensive research is going on with this perspective, involving various techniques that explore optical, electrical, chemical and thermal properties of the human body that directly or indirectly depend on the blood glucose concentration. Thus, non-invasive blood glucose monitoring has grown into a vast field of research. In this project, an attempt was made to device a prototype for screening of diabetes by measuring electrical impedance of the skin and building a model to predict a patient’s condition based on the measured impedance. The prototype developed, passes a negligible amount of constant current (0.5mA) across a subject’s index finger through tetra polar silver electrodes and measures output voltage across a wide range of frequencies (10 KHz – 4 MHz). The measured voltage is proportional to the impedance of the skin. The impedance was acquired in real-time for further analysis. Study was conducted on over 75 subjects with permission from the institutional ethics committee, along with impedance, subject’s blood glucose values were also noted, using conventional method. Nonlinear regression analysis was performed on the features extracted from the impedance data to obtain a model that predicts blood glucose values for a given set of features. When the predicted data was depicted on Clarke’s Error Grid, only 58% of the values predicted were clinically acceptable. Since the objective of the project was to screen diabetes and not actual estimation of blood glucose, the data was classified into three classes ‘NORMAL FASTING’,’NORMAL POSTPRANDIAL’ and ‘HIGH’ using linear Support Vector Machine (SVM). Classification accuracy obtained was 91.4%. The developed prototype was economical, fast and pain free. Thus, it can be used for mass screening of diabetes.

Keywords: Clarke’s error grid, electrical impedance of skin, linear SVM, nonlinear regression, non-invasive blood glucose monitoring, screening device for diabetes

Procedia PDF Downloads 317
594 Dental Pathologies and Diet in Pre-hispanic Populations of the Equatorial Pacific Coast: Literature Review

Authors: Ricardo Andrés Márquez Ortiz

Abstract:

Objective. The objective of this literature review is to compile updated information from studies that have addressed the association between dental pathologies and diet in prehistoric populations of the equatorial Pacific coast. Materials and method. The research carried out corresponds to a documentary study of ex post facto retrospective, historiographic and bibliometric design. A bibliographic review search was carried out in the libraries of the Colombian Institute of Anthropology and History (ICANH) and the National University of Colombia for books and articles on the archeology of the region. In addition, a search was carried out in databases and the Internet for books and articles on dental anthropology, archeology and dentistry on the relationship between dental pathologies and diet in prehistoric and current populations from different parts of the world. Conclusions. The complex societies (500 BC - 300 AD) of the equatorial Pacific coast used an agricultural system of intensive monoculture of corn (Zea mays). This form of subsistence was reflected in an intensification of dental pathologies such as dental caries, dental abscesses generated by cavities, and enamel hypoplasia associated with a lower frequency of wear. The Upper Formative period (800 A.D. -16th century A.D.) is characterized by the development of polyculture, slash-and-burn agriculture, as an adaptive agricultural strategy to the ecological damage generated by the intensive economic activity of complex societies. This process leads to a more varied diet, which generates better dental health.

Keywords: dental pathologies, nutritional diet, equatorial pacific coast, dental anthropology

Procedia PDF Downloads 40
593 The Attitudes towards English Relative to Other Languages in Indonesia: Discrepancies between Policy and Usage

Authors: Rani Silvia

Abstract:

English has surpassed other languages to become the most widely taught and studied foreign language in Indonesia. This reflects the tendency of the Indonesian public to participate in global mainstream culture, which is longstanding but has been greatly facilitated by the widespread availability of television, the traditional media, and more recently the Internet and social media. However, despite increasing exposure and a history of teaching and study, mastery of English remains low, even as interest and perceived importance continue to increase. This along with Indonesia’s extremely complex linguistic environment has increased the status and value associated with the use of English and is changing the dynamic of language use nationwide. This study investigates the use of English in public settings in Indonesia as well as the attitudes of Indonesian speakers towards English. A case study was developed to explicate this phenomenon in a major Indonesian city. Fifty individuals, including both professionals and lay people, were interviewed about their language preferences as well as their perceptions about English as compared to other languages, such as the local language, Indonesian as the national language, and other foreign languages. Observations on the use of language in the public environment in advertising, signs, and other forms of public expression were analyzed to identify language preferences at this level and their relationship to current language policy. This study has three major findings. First, Indonesian speakers have more positive attitudes towards English than other languages; second, English has encroached on domains in which Indonesian should be used; and third, perceived awareness of the importance of Indonesian as an introduced national language seems to be declining to suggest a failure of policy. The study includes several recommendations for the future development of language planning in determining and directing language use in a public context in Indonesia.

Keywords: English, Indonesia, language attitudes, language policy

Procedia PDF Downloads 99
592 A Retrospective Study of the Effects of Xenophobia on South Africa-Nigeria Relations

Authors: O. Fayomi, F. Chidozie, C. Ayo

Abstract:

The underlying causes of xenophobia are complex and varied. Xenophobia has to do with being contemptuous of that which is foreign, especially of strangers or of people from different countries or cultures. Unemployment and mounting poverty among South Africans at the bottom of the economic ladder have provoked fears of the competition that better educated and experienced migrants can represent. South Africa’s long track-record of violence as a means of protest and the targeting of foreigners in particular, and, the documented tensions over migration policy and the scale of repatriation serve a very good explanation for its xenophobia. It was clear that while most of the attacks were directed against foreign, primarily African, migrants, this was not the rule. Attacks were also noted against Chinese-speakers, Pakistani migrants as well as against South Africans from minority language groups (in the conflict areas). Settlements that have recently experienced the expression of ‘xenophobic’ violence have also been the site of violent and other forms of protest around other issues, most notably service delivery. The failure of government in service delivery was vexed on this form of xenophobia. Due to the increase in migration, this conflict is certainly not temporary in nature. Xenophobia manifests in different regions and communities with devastating effects on the affected nationals. Nigerians living in South Africa have been objects of severe attacks and assault as a result of this xenophobic attitude. It is against this background that this study seeks to investigate the xenophobic attacks against Nigerians in South Africa. The methodology is basically qualitative with the use of secondary sources such as books, journals, newspapers and internet sources.

Keywords: xenophobia, unemployment, poverty, Nigeria, South Africa

Procedia PDF Downloads 462
591 The Illegal Architecture of Apartheid in Palestine

Authors: Hala Barakat

Abstract:

Architecture plays a crucial role in the colonization and organization of spaces, as well as the preservation of cultures and history. As a result of 70 years of occupation, Palestinian land, culture, and history are endangered today. The government of Israel has used architecture to strangulate Palestinians out and seize their land. The occupation has managed to fragment the West Bank and cause sensible scars on the landscape by creating obstacles, barriers, watchtowers, checkpoints, walls, apartheid roads, border devices, and illegal settlements to unjustly claim land from its indigenous population. The apartheid architecture has divided the Palestinian social and urban fabric into pieces, similarly to the Bantustans. The architectural techniques and methods used by the occupation are evidence of prejudice, and while the illegal settlements remain to be condemned by the United Nations, little is being done to officially end this apartheid. Illegal settlements range in scale from individual units to established cities and house more than 60,000 Israeli settlers that immigrated from all over Europe and the United States. Often architecture by Israel is being directed towards expressing ideologies and serving as evidence of its political agenda. More than 78% of what was granted to Palestine after the development of the Green Line in 1948 is under Israeli occupation today. This project aims to map the illegal architecture as a criticism of governmental agendas in the West Bank and Historic Palestinian land. The paper will also discuss the resistance to the newly developed plan for the last Arab village in Jerusalem, Lifta. The illegal architecture has isolated Palestinians from each other and installed obstacles to control their movement. The architecture of occupation has no ethical or humane logic but rather entirely political, administrative, and it should not be left for the silenced architecture to tell the story. Architecture is not being used as a connecting device but rather a way to implement political injustice and spatial oppression. By narrating stories of the architecture of occupation, we can highlight the spatial injustice of the complex apartheid infrastructure. The Israeli government has managed to intoxicate architecture to serve as a divider between cultural groups, allowing the unlawful and unethical architecture to define its culture and values. As architects and designers, the roles we play in the development of illegal settlements must align with the spatial ethics we practice. Most importantly, our profession is not performing architecturally when we design a house with a particular roof color to ensure it would not be mistaken with a Palestinian house and be attacked accidentally.

Keywords: apartheid, illegal architecture, occupation, politics

Procedia PDF Downloads 144
590 Nutritional Status in Ramadan Influences Body Compositions Differently in Men and Women

Authors: Meskure Pak, Nihal Buyukuslu

Abstract:

During Ramadan Muslims refrain from eating and drinking from dawn to sunset. Transformation of the eating habits cause profound changes in body composition. This study was performed during Ramadan of June-July 2015 with the regular fasting healthy adults (15 women and 15 men). The participants who were not fasting the whole month, have chronic diseases, pregnant and lactated were excluded. All attendances were informed about study. Written informed consent was taken from the voluntary participants. The work was approved by the Ethics and Research Committee of Istanbul Medipol University, Turkey. A questionnaire was conducted to determine the nutritional status, demographic and anthropometric data at the beginning, in the middle and at the end of Ramadan. Statistical Package for Social Sciences version 18.0 (SPSS, Chicago, IL, USA) was used for analyses. The mean ages of women and men were 34.4±9.45 and 28.9±10.55 years respectively. The BMI values (kg/m2) were slightly increased in men (26.5±3.9 to 26.2±3.7) and decreased in women (22.5±3.5 to 23.3±4.5). However the differences in BMI values between genders were not significant. Waist circumferences (WC) (cm) decreased in both women (80.2±14.6 to 79.4±17.7) and men (98.9±8.4 to 95.2±11.0) through the Ramadan. Fat percentages of women (27.0±71) increased in the middle of Ramadan (28.4±7.8) and decreased at the end of Ramadan (27.8±8.3). The fat percentages of men (21.5±6.3) were not affected in the middle of Ramadan (21.5±6.4) however decreased at the end of Ramadan (20.8±6.2). The total change in fat mass from beginning to end of Ramadan was higher in women than in men. The daily energy intake was higher in men than in women during Ramadan. In the middle of Ramadan energy intake (kcal) was reached to the highest level (2057.8±693.1) and at the end of Ramadan it decreased to the beginning level (1656.7±553.2) for men. However, daily energy intake of women slightly decreased from the beginning (1410.0±359.7) to the end (1409.2±366.7) of Ramadan. The comparison of energy intake between men and women was significant in the middle of Ramadan (p < 0.05). Water consumptions for both groups were increased in Ramadan fasting period. In comparison with the beginning of Ramadan, daily carbohydrate and fat consumptions increased and the consumption of protein decreased for men and for women at the end of Ramadan. The gender comparison resulted in a significant increase for protein and carbohydrate consumption of men in the middle of Ramadan (p < 0.05). In the first two weeks, the daily energy intake, the consumption of carbohydrates and fats seemed to increase for both men and women. However the later days of Ramadan daily fat consumption decreased to the level of beginning consumption levels which may indicate the nutritional adaptation period. In spite of the consumption of protein sources such as meat, poultry and egg increased, the decrease in the total amount of protein consumed in Ramadan may be due to a decrease in the consumption of milk and dairy products. In conclusion, the nutritional habits and preferred foods changed during Ramadan as a result affected the body composition.

Keywords: body composition, fasting, nutritional status, Ramadan

Procedia PDF Downloads 212
589 The Role of Cognitive Control and Social Camouflage Associated with Social Anxiety Autism Spectrum Conditions

Authors: Siqing Guan, Fumiyo Oshima, Eiji Shimizu, Nozomi Tomita, Toru Takahashi, Hiroaki Kumano

Abstract:

Risk factors for social anxiety in autism spectrum conditions involve executive attention, emotion regulation, and thought regulation as processes of cognitive dysregulation. Social camouflaging behaviors as strategies used to mask and/or compensate for autism characteristics during social interactions in autism spectrum conditions have also been emphasized. However, the role of cognitive dysregulation and social camouflaging related to social anxiety in autism spectrum conditions has not been clarified. Whether these factors are specific to social anxiety in autism spectrum conditions or common to social anxiety independent of autism spectrum conditions needs to be clarified. Here, we explored risk factors specific to social anxiety in autism spectrum conditions and general risk factors for social anxiety independent of autism spectrum conditions. From the Japanese participants in early adulthood (age=18~39) of the online survey in Japan, those who exceeded the Japanese version Autism-Spectrum Quotient cutoff (33 points or more )were divided into the autism spectrum conditions group (ASC; N=255, mean age=32.08, SD age=5.16)and those who did not exceed the cutoff were divided into the non-autism spectrum conditions group (Non-ASC; N=255, mean age=31.70, SD age=5.09). Using the Japanese versions of the Social Phobia Scale, the Social Interaction Anxiety Scale, and the Short Fear of Negative Evaluation Scale, a composite score for social anxiety was calculated using a method of principal. We also measured emotional control difficulties using the Difficulties in Emotion Regulation Scale, executive attention using the Effortful Control Scale for Adults, rumination using the Rumination-Reflection Questionnaire, and worry using the Penn State Worry Questionnaire. This study was passed through the review of the Ethics Committee. No conflicts of interest. Multiple regression analysis with forced entry method was used to predict social anxiety in the ASC and non-ASC groups separately, based on executive attention, emotion dysregulation, worry, rumination, and social camouflage. In the ASC group, emotion dysregulation (β=.277, p<.001), worry (β=.162, p<.05), assimilation (β=.308, p<.001) and masking (β=.275, p<.001) were significant predictors of social anxiety (F (7,247) = 45.791, p <.001, R2=.565). In the non-ASC groups,emotion dysregulation (β=.171, p<.05), worry (β=.344,p <.001), assimilation (β=.366,p <.001) and executive attention (β=-.132,p <.05) were significant predictors of social anxiety (F (7,207) =47.333, p <.001, R2=.615).The findings suggest that masking was shown to be a risk factor for social anxiety specific to autism spectrum conditions, while emotion dysregulation, worry, and assimilation were shown to be common risk factors for social anxiety, regardless of autism spectrum conditions. In addition, executive attention is a risk factor for social anxiety without autism spectrum conditions.

Keywords: autism spectrum, cognitive control, social anxiety, social camouflaging

Procedia PDF Downloads 197
588 Nutrition, Dental Status and Post-Traumatic Stress Disorder among Underage Refugees in Germany

Authors: Marios Loucas, Rafael Loucas, Oliver Muensterer

Abstract:

Aim of the Study: Over the last two years, there has been a substantial rise of refugees entering Germany, of which approximately one-third are underage. Little is known about the general state of health such as nutrition, dental status and post-traumatic stress disorder among underage refugees. Our study assesses the general health status of underage refugees based on a large sample cohort. Methods: After ethics board approval, we used a structured questionnaire to collect demographic information and health-related elements in 3 large refugee accommodation centers, focusing on nutritional and dental status, as well as symptoms of posttraumatic stress disorder. Main results: A total of 461 minor refugees were included. The majority were boys (54.5%), average age was 8 years. Out of the 8 recorded countries of origin, most children came from Syria (33.6%), followed by Afghanistan (23.2%). Of the participants, 50.3% reported DSM-5 criteria of Posttraumatic stress disorder and presented mental health-related problems. The most frequently reported mental abnormalities were concentration disturbances (15.2%), sleep disorders (6.9%), unclear headaches (5.4%). The majority of the participants showed an unfavorable nutritional and dental status. According to the family, the majority of the children rarely eat healthy foods such as fruits, vegetables and fish. However, the majority of these children (over 90%) consume a large quantity of sugary foods and sweetened drinks such as soft drinks and confectionery at least daily. Caries was found in 63% of the minor children included in the study. A large proportion (47%) reported never brushing their teeth. According to the family, 78.3% of refugee children have never been evaluated by a dentist in Germany. The remainder visited a dentist mainly because of unbearable toothache. Conclusions: Minor refugees have specific psychological, nutritional and dental problems that must be considered in order to ensure appropriate medical care. Posttraumatic stress disorder is mainly caused by physical and emotional trauma suffered either during the flight or in the refugee camp in Germany. These data call for widespread screening of psychological, dental and nutritional problems in underage refugees. Dental care of this cohort is completely inadequate. Nutritional programs should focus on educating the families and providing the means to obtain healthy foods for these children.

Keywords: children, nutrition, posttraumatic stress disorder, refugee

Procedia PDF Downloads 157
587 The Strategic Entering Time of a Commerce Platform

Authors: Chia-li Wang

Abstract:

The surge of service and commerce platforms, such as e-commerce and internet-of-things, have rapidly changed our lives. How to avoid the congestion and get the job done in the platform is now a common problem that many people encounter every day. This requires platform users to make decisions about when to enter the platform. To that end, we investigate the strategic entering time of a simple platform containing random numbers of buyers and sellers of some item. Upon a trade, the buyer and the seller gain respective profits, yet they pay the cost of waiting in the platform. To maximize their expected payoffs from trading, both buyers and sellers can choose their entering times. This creates an interesting and practical framework of a game that is played among buyers, among sellers, and between them. That is, a strategy employed by a player is not only against players of its type but also a response to those of the other type, and, thus, a strategy profile is composed of strategies of buyers and sellers. The players' best response, the Nash equilibrium (NE) strategy profile, is derived by a pair of differential equations, which, in turn, are used to establish its existence and uniqueness. More importantly, its structure sheds valuable insights of how the entering strategy of one side (buyers or sellers) is affected by the entering behavior of the other side. These results provide a base for the study of dynamic pricing for stochastic demand-supply imbalances. Finally, comparisons between the social welfares (the sum of the payoffs incurred by individual participants) obtained by the optimal strategy and by the NE strategy are conducted for showing the efficiency loss relative to the socially optimal solution. That should help to manage the platform better.

Keywords: double-sided queue, non-cooperative game, nash equilibrium, price of anarchy

Procedia PDF Downloads 76
586 To Cloudify or Not to Cloudify

Authors: Laila Yasir Al-Harthy, Ali H. Al-Badi

Abstract:

As an emerging business model, cloud computing has been initiated to satisfy the need of organizations and to push Information Technology as a utility. The shift to the cloud has changed the way Information Technology departments are managed traditionally and has raised many concerns for both, public and private sectors. The purpose of this study is to investigate the possibility of cloud computing services replacing services provided traditionally by IT departments. Therefore, it aims to 1) explore whether organizations in Oman are ready to move to the cloud; 2) identify the deciding factors leading to the adoption or rejection of cloud computing services in Oman; and 3) provide two case studies, one for a successful Cloud provider and another for a successful adopter. This paper is based on multiple research methods including conducting a set of interviews with cloud service providers and current cloud users in Oman; and collecting data using questionnaires from experts in the field and potential users of cloud services. Despite the limitation of bandwidth capacity and Internet coverage offered in Oman that create a challenge in adopting the cloud, it was found that many information technology professionals are encouraged to move to the cloud while few are resistant to change. The recent launch of a new Omani cloud service provider and the entrance of other international cloud service providers in the Omani market make this research extremely valuable as it aims to provide real-life experience as well as two case studies on the successful provision of cloud services and the successful adoption of these services.

Keywords: cloud computing, cloud deployment models, cloud service models, deciding factors

Procedia PDF Downloads 283
585 Challenges for Adopting Circular Economy Toward Business Innovation and Supply Chain

Authors: Kapil Khanna, Swee Kuik, Joowon Ban

Abstract:

The current linear economic system is unsustainable due to its dependence on the uncontrolled exploitation of diminishing natural resources. The integration of business innovation and supply chain management has brought about the redesign of business processes through the implementation of a closed-loop approach. The circular economy (CE) offers a sustainable solution to improve business opportunities in the near future by following the principles of rejuvenation and reuse inspired by nature. Those business owners start to rethink and consider using waste as raw material to make new products for consumers. The implementation of CE helps organisations to incorporate new strategic plans for decreasing the use of virgin materials and nature resources. Supply chain partners that are geographically dispersed rely heavily on innovative approaches to support supply chain management. Presently, numerous studies have attempted to establish the concept of supply chain management (SCM) by integrating CE principles, which are commonly denoted as circular SCM. While many scholars have recognised the challenges of transitioning to CE, there is still a lack of consensus on business best practices that can facilitate companies in embracing CE across the supply chain. Hence, this paper strives to scrutinize the SCM practices utilised for CE, identify the obstacles, and recommend best practices that can enhance a company's ability to incorporate CE principles toward business innovation and supply chain performance. Further, the paper proposes future research in the field of using specific technologies such as artificial intelligence, Internet of Things, and blockchain as business innovation tools for supply chain management and CE adoption.

Keywords: business innovation, challenges, circular supply chain, supply chain management, technology

Procedia PDF Downloads 81
584 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 184
583 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 285
582 The Role of Nurses and Midwives’ Self-Government in Postgraduate Education in Poland

Authors: Tomasz Holecki, Hanna Dobrowolska

Abstract:

In the Polish health care system, nurses and midwives are obliged to regularly update their professional knowledge. It is all regulated by the Law on the nurse and midwife’s profession and the code of ethics. The professional self-governing body (County Chamber of Nurses and Midwives) is obliged to organize ongoing training for them so that maintaining accessibility and availability to the high quality of educational services could be possible at all levels of post-graduate education. The aim of this study is an analysis of post-graduate education organized by the County Chamber of Nurses and Midwives in the city of Katowice, Poland, as a professional self-governing body operating in the area of Silesian province inhabited by almost 5 million citizens which bring together more than 30 thousand professionally active nurses and midwives. In the years 2000-2017, the self-government of nurses and midwives trained over 50,000 people. The education and supervision system over the labour of nurses and midwives establishes exercising control by a self-governing body. In practice, this means that conducting activities aimed at creating legal regulations and organizational conditions, as well as the practical implementation of courses, belongs to the professional self-government of nurses and midwives. The most of specialization courses that were provided from their own funds came from membership fees. The biggest group was participants of specializations in the fields of cardiac, anesthesia, and preventive nursing. The smallest group of people participated in such specializations as neonatal, emergency, and obstetrics nursing. The most popular specialist courses were in the fields of the electrocardiogram and cardiopulmonary resuscitation, whereas the least popular were the ones in the fields of protective vaccinations of neonates. So-called 'soft training-courses' in the fields of improvement of social skills and management were also provided. The research shows that a vast majority of nurses and midwives are interested in raising their professional qualifications. Specialist courses and selected fields of qualification courses received the most concrete attention. In light of conducted research, one can assert that cooperation inside the community of nurses and midwives provides access to high-quality education and training services regularly used by a wide circle of them. The presented results exemplify a level of real interest in specialist and qualification training-courses and also show sources of financing them.

Keywords: nurses and midwives, ongoing training, postgraduate education, specialist training-courses

Procedia PDF Downloads 97
581 Big Data in Telecom Industry: Effective Predictive Techniques on Call Detail Records

Authors: Sara ElElimy, Samir Moustafa

Abstract:

Mobile network operators start to face many challenges in the digital era, especially with high demands from customers. Since mobile network operators are considered a source of big data, traditional techniques are not effective with new era of big data, Internet of things (IoT) and 5G; as a result, handling effectively different big datasets becomes a vital task for operators with the continuous growth of data and moving from long term evolution (LTE) to 5G. So, there is an urgent need for effective Big data analytics to predict future demands, traffic, and network performance to full fill the requirements of the fifth generation of mobile network technology. In this paper, we introduce data science techniques using machine learning and deep learning algorithms: the autoregressive integrated moving average (ARIMA), Bayesian-based curve fitting, and recurrent neural network (RNN) are employed for a data-driven application to mobile network operators. The main framework included in models are identification parameters of each model, estimation, prediction, and final data-driven application of this prediction from business and network performance applications. These models are applied to Telecom Italia Big Data challenge call detail records (CDRs) datasets. The performance of these models is found out using a specific well-known evaluation criteria shows that ARIMA (machine learning-based model) is more accurate as a predictive model in such a dataset than the RNN (deep learning model).

Keywords: big data analytics, machine learning, CDRs, 5G

Procedia PDF Downloads 126
580 Coping Strategies Used by Persons with Spinal Cord Injury: A Rehabilitation Hospital Based Qualitative Study

Authors: P. W. G. D. P. Samarasekara, S. M. K. S. Seneviratne, D. Munidasa, S. S. Williams

Abstract:

Sustaining a spinal cord injury (SCI) causes severe disruption of all aspects of a person’s life, resulting in the difficult process of coping with the distressing effects of paralysis affecting their ability to lead a meaningful life. These persons are hospitalized in the acute stage of injury and subsequently for rehabilitation and the treatment of complications. The purpose of this study was to explore coping strategies used by persons with SCI during their rehabilitation period. A qualitative study was conducted among persons with SCI, undergoing rehabilitation at the Rheumatology and Rehabilitation Hospitals, Ragama and Digana Sri Lanka. Twelve participants were selected purposively to represent both males and females, with cervical, thoracic or lumbar levels of injuries due to traumatic and non-traumatic causes as well as from different socioeconomic backgrounds. Informed consent was taken from the participants. In-depth interviews were conducted using an interview guide to collect data. Probes were used to get more information and to encourage participants. Interviews were audio taped and transcribed verbatim. Qualitative content analysis was conducted. Ethical approval for this study was obtained from the Ethics Review Committee, Faculty of Medicine, University of Kelaniya. Five themes were identified in the content analysis: social support, religious beliefs, determination, acceptance and making comparisons. Participants indicated that the support from their family members had been an essential factor in coping, after sustaining an SCI and they expressed the importance of emotional support from family members during their rehabilitation. Many participants had a strong belief towards the God, who had a personal interest in their lives, played an important role in their ability to cope with the injury. They believed that what happens to them in this life results from their actions in previous lives. They expressed that determination was essential as a factor that helps them cope with their injury. They indicated their focus on the positive aspects of the life and accepted the disability. They made comparisons to other persons who were worse off than them to help lift them out of unpleasant experience. Even some of the most severely injured and disabled participants presented evidence of using this coping strategy. Identification of coping strategies used by persons with SCI will help nurses and other health-care professionals in reinforcing the most effective coping strategies among persons with SCI. The findings recommend that engagement coping positively influences psychosocial adaptation.

Keywords: content analysis, coping strategies, rehabilitation, spinal cord injury

Procedia PDF Downloads 172
579 At the Intersection of Race and Gender in Social Work Education

Authors: LaShawnda N. Fields, Valandra

Abstract:

There remains much to learn about the experiences of Black women within social work education. Higher education, in general, has a strained relationship with this demographic and while social work has espoused a code of ethics and core values, Black women report inequitable experiences similar to those in other disciplines. Research-intensive (R-1) Carnegie-designated institutions typically have lower representation of those with historically marginalized identities; this study focuses on Black women in these schools of social work. This study presents qualitative findings from 9 in-depth interviews with Black women faculty members as well as interviews with 11 Black women doctoral students at R-1 universities. Many of the poor professional outcomes for Black women in academia are a result of their experiences with imposter syndrome and feeling as though they cannot present their authentic selves. The finding of this study highlighted the many ways imposter syndrome manifests within these study participants, from an inability to be productive to overproducing in an effort to win the respect and support of colleagues. Being scrutinized and seen as unprofessional when being authentic has led to some Black women isolating themselves and struggling to remain in academia. Other Black women have decided that regardless of the backlash they may receive, they will proudly present their authentic selves and allow their work to speak for itself rather than conform to the dominant White culture. These semi-structured, in-depth interviews shined a spotlight on the ways Black women doctoral students were denied inclusion throughout their programs. These students often believed both faculty members and peers seemed to actively work to ensure discomfort in these women. In response to these negative experiences and a lack of support, many of these Black women doctoral students created their own networks of support. These networks of support often included faculty members within social work but also beyond their discipline and outside of the academy at large. The faculty members who offered support to this demographic typically shared their race and gender identities. Both Black women faculty members and doctoral students historically have been forced to prioritize surviving, not thriving as a result of toxic environments within their schools of social work. This has negatively impacted their mental health and their levels of productivity. It is necessary for these institutions to build trust with these women by respecting their diverse backgrounds, supporting their race-related research interests, and honoring the rigor in a range of methodologies if substantial, sustainable change is to be achieved.

Keywords: education, equity, inclusion, intersectionality

Procedia PDF Downloads 70
578 Effects of E-Learning Mode of Instruction and Conventional Mode of Instruction on Student’s Achievement in English Language in Senior Secondary Schools, Ibadan Municipal, Nigeria

Authors: Ibode Osa Felix

Abstract:

The use of e-Learning is presently intensified in the academic world following the outbreak of the Covid-19 pandemic in early 2020. Hitherto, e-learning had made its debut in teaching and learning many years ago when it emerged as an aspect of Computer Based Teaching, but never before has its patronage become so important and popular as currently obtains. Previous studies revealed that there is an ongoing debate among researchers on the efficacy of the E-learning mode of instruction over the traditional teaching method. Therefore, the study examined the effect of E-learning and Conventional Mode of Instruction on Students Achievement in the English Language. The study is a quasi-experimental study in which 230 students, from three public secondary schools, were selected through a simple random sampling technique. Three instruments were developed, namely, E-learning Instructional Guide (ELIG), Conventional Method of Instructional Guide (CMIG), and English Language Achievement Test (ELAT). The result revealed that students taught through the conventional method had better results than students taught online. The result also shows that girls taught with the conventional method of teaching performed better than boys in the English Language. The study, therefore, recommended that effort should be made by the educational authorities in Nigeria to provide internet facilities to enhance practices among learners and provide electricity to power e-learning equipment in the secondary schools. This will boost e-learning practices among teachers and students and consequently overtake conventional method of teaching in due course.

Keywords: e-learning, conventional method of teaching, achievement in english, electricity

Procedia PDF Downloads 160
577 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 136
576 Associations among Fetuin A, Cortisol and Thyroid Hormones in Children with Morbid Obesity and Metabolic Syndrome

Authors: Mustafa Metin Donma, Orkide Donma

Abstract:

Obesity is a disease with an ever-increasing prevalence throughout the world. The metabolic network associated with obesity is very complicated. In metabolic syndrome (MetS), it becomes even more difficult to understand. Within this context, hormones, cytokines, and many others participate in this complex matrix. The collaboration among all of these parameters is a matter of great wonder. Cortisol, as a stress hormone, is closely associated with obesity. Thyroid hormones are involved in the regulation of energy as well as glucose metabolism with all of its associates. Fetuin A is known for years; however, the involvement of this parameter in obesity discussions is rather new. Recently, it has been defined as one of the new generation markers of obesity. In this study, the aim was to introduce complex interactions among all to be able to make clear comparisons, at least for a part of this complicated matter. Morbid obese (MO) children participated in the study. Two groups with 46 MO children and 43 with MetS were constituted. All children included in the study were above 99th age- and sex-adjusted body mass index (BMI) percentiles according to World Health Organization criteria. Forty-three morbid obese children in the second group had also MetS components. Informed consent forms were filled by the parents of the participants. The institutional ethics committee has given approval for the study protocol. Data as well as the findings of the study were evaluated from a statistical point of view. Two groups were matched for their age and gender compositions. Significantly higher body mass index (BMI), waist circumference, thyrotropin, and insulin values were observed in the MetS group. Triiodothyronine concentrations did not differ between the groups. Elevated levels for thyroxin, cortisol, and fetuin-A were detected in the MetS group compared to the first group (p > 0.05). In MO MetS- group, cortisol was correlated with thyroxin and fetuin-A (p < 0.05). In the MO MetS+ group, none of these correlations were present. Instead, a correlation between cortisol and thyrotropin was found (p < 0.05). In conclusion, findings have shown that cortisol was the key player in severely obese children. The association of this hormone with the participants of thyroid hormone metabolism was quite important. The lack of association with fetuin A in the morbid obese MetS+ group has suggested the possible interference of MetS components in the behavior of this new generation obesity marker. The most remarkable finding of the study was the unique correlation between cortisol and thyrotropin in the morbid obese MetS+ group, suggesting that thyrotropin may serve as a target along with cortisol in the morbid obese MetS+ group. This association may deserve specific attention during the development of remedies against MetS in the pediatric population.

Keywords: children, cortisol, fetuin A, morbid obesity, thyrotropin

Procedia PDF Downloads 166
575 The Experience of Gay Men Using Dating Applications in Their Emerging Adulthood

Authors: Chuang Bing-Kai, Shih Hsiang-Ju

Abstract:

Previous studies showed that emergent adults used dating applications the most since it would satisfy their needs for intimacy. It's also found that those emergent adults were mostly non-heterosexual. What’s more, in this digital era, more and more bisexuals and homosexuals choose to establish connections with others through Internet to seek a sense of belonging. However, studies rarely focused on gay men in their emergent adulthood to explore their experiences of dating applications. The purpose of this study was to explore the experience of gay men using dating applications in their emerging adulthood and to understand their self-presentations and the process of it among different relationships while interacting with others upon using dating applications. The semi-structured interview was conducted with those gay men who aged from 18 to 29, felt attracted to people with same gender physically and mentally, considered themselves homosexual from their subjective understanding and had been using dating applications for more than half a year. Research invitations were distributed with the assistance of social media platforms and LGBTQ+ friends in the community. This study adopted a qualitative research approach and applied hermeneutic phenomenology as the method to analyze the transcripts transcribed from the recorded audio, and to explore their using experiences and self-presentations while interacting with others while using dating apps. It’s expected to find out that there are four stages in the self-presentation process including establishing personal identity, self-exploration and experimentation, exploring shared interest and values, developing and maintaining connections. Plus, gay men’s motives to use dating apps play an important role in this process and thus influence how they position the apps in their life. Through this study, professional workers can better understand gay men’s considerations and strategies in their self-presentation process as well as the impact of using motives.

Keywords: dating applications, emerging adulthood, gay men, hermeneutic phenomenology

Procedia PDF Downloads 41
574 Associated Map and Inter-Purchase Time Model for Multiple-Category Products

Authors: Ching-I Chen

Abstract:

The continued rise of e-commerce is the main driver of the rapid growth of global online purchase. Consumers can nearly buy everything they want at one occasion through online shopping. The purchase behavior models which focus on single product category are insufficient to describe online shopping behavior. Therefore, analysis of multi-category purchase gets more and more popular. For example, market basket analysis explores customers’ buying tendency of the association between product categories. The information derived from market basket analysis facilitates to make cross-selling strategies and product recommendation system. To detect the association between different product categories, we use the market basket analysis with the multidimensional scaling technique to build an associated map which describes how likely multiple product categories are bought at the same time. Besides, we also build an inter-purchase time model for associated products to describe how likely a product will be bought after its associated product is bought. We classify inter-purchase time behaviors of multi-category products into nine types, and use a mixture regression model to integrate those behaviors under our assumptions of purchase sequences. Our sample data is from comScore which provides a panelist-label database that captures detailed browsing and buying behavior of internet users across the United States. Finding the inter-purchase time from books to movie is shorter than the inter-purchase time from movies to books. According to the model analysis and empirical results, this research finally proposes the applications and recommendations in the management.

Keywords: multiple-category purchase behavior, inter-purchase time, market basket analysis, e-commerce

Procedia PDF Downloads 356
573 Ecological Crisis: A Buddhist Approach

Authors: Jaharlal Debbarma

Abstract:

The ecological crisis has become a threat to earth’s well-being. Man’s ambitious desire of wealth, pleasure, fame, longevity and happiness has extracted natural resources so vastly that it is unable to sustain a healthy life. Man’s greed for wealth and power has caused the setting up of vast factories which further created the problem of air, water and noise pollution, which have adversely affected both fauna and flora.It is no secret that man uses his inherent powers of reason, intelligence and creativity to change his environment for his advantage. But man is not aware that the moral force he himself creates brings about corresponding changes in his environment to his weal or woe whether he likes it or not. As we are facing the global warming and the nature’s gift such as air and water has been so drastically polluted with disastrous consequences that man seek for a ways and means to overcome all this pollution problem as his health and life sustainability has been threaten and that is where man try to question about the moral ethics and value.It is where Buddhist philosophy has been emphasized deeply which gives us hope for overcoming this entire problem as Buddha himself emphasized in eradicating human suffering and Buddhism is the strongest form of humanism we have. It helps us to learn to live with responsibility, compassion, and loving kindness.It teaches us to be mindful in our action and thought as the environment unites every human being. If we fail to save it we will perish. If we can rise to meet the need to all which ecology binds us - humans, other species, other everything will survive together.My paper will look into the theory of Dependent Origination (Pratītyasamutpāda), Buddhist understanding of suffering (collective suffering), and Non-violence (Ahimsa) and an effort will be made to provide a new vision to Buddhist ecological perspective. The above Buddhist philosophy will be applied to ethical values and belief systems of modern society. The challenge will be substantially to transform the modern individualistic and consumeristic values. The stress will be made on the interconnectedness of the nature and the relation between human and planetary sustainability. In a way environmental crisis will be referred to “spiritual crisis” as A. Gore (1992) has pointed out. The paper will also give important to global consciousness, as well as to self-actualization and self-fulfillment. In the words of Melvin McLeod “Only when we combine environmentalism with spiritual practice, will we find the tools to make the profound personal transformations needed to address the planetary crisis?”

Keywords: dependent arising, collective ecological suffering, remediation, Buddhist approach

Procedia PDF Downloads 256
572 Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools

Authors: M. Kaya, M. Eris

Abstract:

Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors.

Keywords: block matching, digital evidence, hash list, evaluation of digital evidence

Procedia PDF Downloads 243