Search results for: online inquiry
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2927

Search results for: online inquiry

1217 An Exploratory Study of the Student’s Learning Experience by Applying Different Tools for e-Learning and e-Teaching

Authors: Angel Daniel Muñoz Guzmán

Abstract:

E-learning is becoming more and more common every day. For online, hybrid or traditional face-to-face programs, there are some e-teaching platforms like Google classroom, Blackboard, Moodle and Canvas, and there are platforms for full e-learning like Coursera, edX or Udemy. These tools are changing the way students acquire knowledge at schools; however, in today’s changing world that is not enough. As students’ needs and skills change and become more complex, new tools will need to be added to keep them engaged and potentialize their learning. This is especially important in the current global situation that is changing everything: the Covid-19 pandemic. Due to Covid-19, education had to make an unexpected switch from face-to-face courses to digital courses. In this study, the students’ learning experience is analyzed by applying different e-tools and following the Tec21 Model and a flexible and digital model, both developed by the Tecnologico de Monterrey University. The evaluation of the students’ learning experience has been made by the quantitative PrEmo method of emotions. Findings suggest that the quantity of e-tools used during a course does not affect the students’ learning experience as much as how a teacher links every available tool and makes them work as one in order to keep the student engaged and motivated.

Keywords: student, experience, e-learning, e-teaching, e-tools, technology, education

Procedia PDF Downloads 95
1216 Development of a Digital Healthcare Intervention to Reduce Digital and Healthcare Inequality in Rural Communities with a Focus on Hypertensive Management

Authors: Festus Adedoyin, Nana Mbeah Otoo, Sofia Meacham

Abstract:

Hypertension is one of the main health issues in Ghana, where prevalence is higher in rural than in urban areas. This is due to the challenges rural areas have in accessing technology and healthcare services for hypertension control. This study's goal is to create a digital healthcare solution to alleviate this inequality. Through an analysis of current technology and problems, using the ring onion methodology, the study determined the needs for the intervention and evaluated healthcare disparities. An online application with teleconsultation capabilities, reminder mechanisms, and clinical decision support is part of the suggested solution. In outlying areas, mobile clinics in containers with the required equipment will be established. Heuristic evaluation and think-aloud sessions were used to assess the prototype's usability and navigational problems. This study highlights the need to develop digital health interventions to help manage hypertension in rural locations and decrease healthcare disparities. To develop and improve digital healthcare solutions for rural areas worldwide and in Ghana, this study might be used as a tool for future research.

Keywords: digital health, health inequalities, hypertension management, rural areas

Procedia PDF Downloads 90
1215 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 279
1214 Determination of the Knowledge Level of Healthcare Professional's Working at the Emergency Services in Turkey about Their Approaches to Common Forensic Cases

Authors: E. Tuğba Topçu, Ebru E. Kazan, Erhan Büken

Abstract:

Emergency nurses are the first health care professional to generally observe the patients, communicate patients’ family or relatives, touch the properties of patients and contact to laboratory sample of patients. Also, they are the encounter incidents related crime, people who engage in violence or suspicious injuries frequently. So, documentation of patients’ condition came to the hospital and conservation of evidence are important in the inquiry of forensic medicine. The aim of the study was to determine the knowledge level of healthcare professional working at the emergency services regarding their approaches to common forensic cases. The study was comprised of 404 healthcare professional working (nurse, emergency medicine technician, health officer) at the emergency services of 6 state hospitals, 6 training and 6 research hospitals and 3 university hospitals in Ankara. Data was collected using questionnaire form which was developed by researches in the direction of literature. Questionnaire form is comprised of two sections. The first section includes 17 questions related demographic information about health care professional and 4 questions related Turkish laws. The second section includes 43 questions to the determination of knowledge level of health care professional’s working in the emergency department, about approaches to frequently encountered forensic cases. For the data evaluation of the study; Mann Whitney U test, Bonferroni correction Kruskal Wallis H test and Chi Square tests have been used. According to study, it’s said that there is no forensic medicine expert in the foundation by 73.4% of health care professionals. Two third (66%) of participants’ in emergency department reported daily average 7 or above forensic cases applied to the emergency department and 52.1% of participants did not evaluate incidents came to the emergency department as a forensic case. Most of the participants informed 'duty of preservation of evidence' is health care professionals duty related forensic cases. In result, we determinated that knowledge level of health care professional working in the emergency department, about approaches to frequently encountered forensic cases, is not the expected level. Because we found that most of them haven't received education about forensic nursing.Postgraduates participants, educated health professional about forensic nursing, staff who applied to sources about forensic nursing and staff who evaluated emergency department cases as forensic cases have significantly higher level of knowledge. Moreover, it’s found that forensic cases diagnosis score is the highest in health officer and university graduated. Health care professional’s deficiency in knowledge about forensic cases can cause defects in operation of the forensic process because of mistakes in collecting and conserving of evidence. It is obvious that training about the approach to forensic nursing should be arranged.

Keywords: emergency nurses, forensic case, forensic nursing, level of knowledge

Procedia PDF Downloads 276
1213 Post-traumatic Checklist-5 (PCL-5) Psychometric Properties: Across Sectional Study Among Lebanese Population

Authors: Fadwa Alhalaiqa, Othman Alfuqaha, Anas H. Khalifeh, Mahmoud Alsaraireh, Rami Masa’Deh, Natija S Manaa

Abstract:

Background: Post-traumatic stress disorders (PTSD) usually occur after traumatic occurrences that exceed the range of common human experience. This study aimed to test the psychometric properties of PCL-5 checklist for the 20 PTSD symptoms from DSM-5 among Lebanese population and to identify the prevalence of PTSD. Methods: A cross sectional survey of PCL5 among 950 Lebanese using the online survey platform by Google form was conducted. Snowball recruitment was used to identify participants for the survey. STROBE guideline was used in reporting the current study. Results: Face content, construct, discriminant, and convergent validity had been accomplished of PCL-5. The reliability by Cronbach alpha, composite, and average variance extracted were set superior. We found also that more than half of the participants (55.6%) scored 33 or above, which is the cutoff score for a likely diagnosis of PTSD. Conclusion: The current study provides further support for the Arabic version PCL-5 validity and reliability among non-Western populations. This support using this tool in the screening of PTSD.

Keywords: post traumatic stress disorder, psychometric properties, stress, adult population

Procedia PDF Downloads 87
1212 The Effects of Source and Timing on the Acceptance of New Product Recommendation: A Lab Experiment

Authors: Yani Shi, Jiaqi Yan

Abstract:

A new product is important for companies to extend consumers and manifest competitiveness. New product often involves new features that consumers might not be familiar with while it may also have a competitive advantage to attract consumers compared to established products. However, although most online retailers employ recommendation agents (RA) to influence consumers’ product choice decision, recommended new products are not accepted and chosen as expected. We argue that it might also be caused by providing a new product recommendation in the wrong way at the wrong time. This study seeks to discuss how new product evaluations sourced from third parties could be employed in RAs as evidence of the superiority for the new product and how the new product recommendation could be provided to a consumer at the right time so that it can be accepted and finally chosen during the consumer’s decision-making process. A 2*2 controlled laboratory experiment was conducted to understand the selection of new product recommendation sources and recommendation timing. Human subjects were randomly assigned to one of the four treatments to minimize the effects of individual differences on the results. Participants were told to make purchase choices from our product categories. We find that a new product recommended right after a similar existing product and with the source of the expert review will be more likely to be accepted. Based on this study, both theoretical and practical contributions are provided regarding new product recommendation.

Keywords: new product recommendation, recommendation timing, recommendation source, recommendation agents

Procedia PDF Downloads 135
1211 Impact of Belongingness, Relational Communication, Religiosity and Screen Time of College Student Levels of Anxiety

Authors: Cherri Kelly Seese, Renee Bourdeaux, Sarah Drivdahl

Abstract:

Emergent adults in the United States are currently experiencing high levels of anxiety. It is imperative to uncover insulating factors which mitigate the impact of anxiety. This study aims to explore how constructs such as belongingness, relational communication, screen time and religiosity impact anxiety levels of emerging adults. Approximately 250 college students from a small, private university on the West Coast were given an online assessment that included: the General Belongingness Scale, Relational Communication Scale, Duke University Religion Index (DUREL), a survey of screen time, and the Beck Anxiety Inventory. A MANOVA statistical test was conducted by assessing the effects of multiple dependent variables (scores on GBS, RCS, self-reported screen time and DUREL) on the four different levels of anxiety as measured on the BAI (minimal = 1, mild =2, moderate = 3, or severe = 4). Results indicated a significant relationship between one’s sense of belonging and one’s reported level of anxiety. These findings have implications for systems, like universities, churches, and corporations that want to improve young adults’ level of anxiety.

Keywords: anxiety, belongingness, relational communication, religiosity, screen time

Procedia PDF Downloads 159
1210 A Brave New World of Privacy: Empirical Insights into the Metaverse’s Personalization Dynamics

Authors: Cheng Xu

Abstract:

As the metaverse emerges as a dynamic virtual simulacrum of reality, its implications on user privacy have become a focal point of interest. While previous discussions have ventured into metaverse privacy dynamics, a glaring empirical gap persists, especially concerning the effects of personalization in the context of news recommendation services. This study stands at the forefront of addressing this void, meticulously examining how users' privacy concerns shift within the metaverse's personalization context. Through a pre-registered randomized controlled experiment, participants engaged in a personalization task across both the metaverse and traditional online platforms. Upon completion of this task, a comprehensive news recommendation service provider offers personalized news recommendations to the users. Our empirical findings reveal that the metaverse inherently amplifies privacy concerns compared to traditional settings. However, these concerns are notably mitigated when users have a say in shaping the algorithms that drive these recommendations. This pioneering research not only fills a significant knowledge gap but also offers crucial insights for metaverse developers and policymakers, emphasizing the nuanced role of user input in shaping algorithm-driven privacy perceptions.

Keywords: metaverse, privacy concerns, personalization, digital interaction, algorithmic recommendations

Procedia PDF Downloads 102
1209 A Survey on Early Screen Exposure during Infancy and Autism

Authors: I. Mahmood

Abstract:

This survey was conducted to explore the hypothesis that excessive screen exposure combined with a subsequent decrease in parent-child interaction during infancy might be associated with autism. The main questions being asked are: Were children with autism exposed to long hours of screen time during the first 2 years of life? And what was the reason(s) for exposure at such an early age? Other variables were also addressed in this survey. An Arabic questionnaire was administered online (June 2019) via a Facebook page, relatively well-known in Arab countries. 1725 parents of children diagnosed with autism participated in this survey. Results show that 80.9% of children surveyed who were diagnosed with autism had been exposed to screens for long periods of time during the first 2 years of life. It can be inferred from the results of this survey that over-exposure to screens disrupt the parent-child interaction which is shown to be associated with ASD. The results of this survey highlight the harmful effects of screen exposure during infancy and the importance of parent-child interaction during the critical period of brain development. This paper attempts to further explore the connection between parent-child interaction and ASD, as well as serve as a call for further research and investigation of the relation between screens and parent-child interactions during infancy and Autism.

Keywords: attachment disorder, autism, screen exposure, virtual autism

Procedia PDF Downloads 108
1208 Myers-Briggs Type Index Personality Type Classification Based on an Individual’s Spotify Playlists

Authors: Sefik Can Karakaya, Ibrahim Demir

Abstract:

In this study, the relationship between musical preferences and personality traits has been investigated in terms of Spotify audio analysis features. The aim of this paper is to build such a classifier capable of segmenting people into their Myers-Briggs Type Index (MBTI) personality type based on their Spotify playlists. Music takes an important place in the lives of people all over the world and online music streaming platforms make it easier to reach musical contents. In this context, the motivation to build such a classifier is allowing people to gain access to their MBTI personality type and perhaps for more reliably and more quickly. For this purpose, logistic regression and deep neural networks have been selected for classifier and their performances are compared. In conclusion, it has been found that musical preferences differ statistically between personality traits, and evaluated models are able to distinguish personality types based on given musical data structure with over %60 accuracy rate.

Keywords: myers-briggs type indicator, music psychology, Spotify, behavioural user profiling, deep neural networks, logistic regression

Procedia PDF Downloads 124
1207 Website Appeal’s Impact on Brand Outcomes: The Mediated Effect of Emotional Attractiveness in the Relationship between Consistent Image and Brand Value

Authors: Salvador Treviño-Martinez, Christian Reich-Lopez

Abstract:

This paper investigates the relationship between website appeal and brand value outcomes (brand attraction, brand loyalty, brand relationship, and brand experience), considering the mediating effect of emotional attractiveness. Data were collected from 221 customers of a quick-service restaurant in Culiacan, Mexico, using an online survey distributed via WhatsApp, following the clients' navigation of the restaurant's website. The study employed PLS-SEM to test the proposed hypotheses and performed 5,000 bootstrapping subsamples to obtain results. The findings indicate that consistent image, a key component of website appeal, has a statistically significant direct and mediated effect (through emotional attractiveness) on the aforementioned brand outcomes. The study's limitations include the convenience sampling method and the single company client database used for the sample composition. This research contributes to the branding and website quality literature by testing nine hypotheses using the Stimuli-Organism-Response theoretical approach in an underexplored context: quick-service restaurants in Latin America.

Keywords: website appeal, branding, emotional attractiveness, consistent image, website quality

Procedia PDF Downloads 77
1206 Social Media Mining with R. Twitter Analyses

Authors: Diana Codat

Abstract:

Tweets' analysis is part of text mining. Each document is a written text. It's possible to apply the usual text search techniques, in particular by switching to the bag-of-words representation. But the tweets induce peculiarities. Some may enrich the analysis. Thus, their length is calibrated (at least as far as public messages are concerned), special characters make it possible to identify authors (@) and themes (#), the tweet and retweet mechanisms make it possible to follow the diffusion of the information. Conversely, other characteristics may disrupt the analyzes. Because space is limited, authors often use abbreviations, emoticons to express feelings, and they do not pay much attention to spelling. All this creates noise that can complicate the task. The tweets carry a lot of potentially interesting information. Their exploitation is one of the main axes of the analysis of the social networks. We show how to access Twitter-related messages. We will initiate a study of the properties of the tweets, and we will follow up on the exploitation of the content of the messages. We will work under R with the package 'twitteR'. The study of tweets is a strong focus of analysis of social networks because Twitter has become an important vector of communication. This example shows that it is easy to initiate an analysis from data extracted directly online. The data preparation phase is of great importance.

Keywords: data mining, language R, social networks, Twitter

Procedia PDF Downloads 162
1205 Bedouin of Silicon Wadi: A Case Study Analysis of the Multi-Level Perspectives and Factors Affecting Bedouin Entrepreneurialism as Obstacles to Entry into the Israeli High-Tech Industry

Authors: Frazer G. Thompson

Abstract:

Israel is a nation of cultural and historical diversity, yet the success factors for a modern Bedouin-Arab high-tech entrepreneur seem to be different from those of other Jewish-Israeli citizens. The purpose of this descriptive narrative case study is to explore how an Arab-Israeli all Negev-Bedouin technology company has succeeded in the Israeli high-tech industry by utilizing technology and engineering career opportunities available to Bedouin youth for ‘Sadel Tech,’ at Be’er-Sheva, the Negev, Israel. Methods: The strategy of inquiry seeks to explore real-life contextual understandings, multi-level perspectives, and the cultural influences of personal, community, educational, and entrepreneurial factors. The research methodology includes in-depth one-on-one interviews, focus group sessions, and overt observation to explore the meaning and understanding of the constructs toward determining the effect all or a few of the elements may have on the overall success factors of the company. Results: Study results indicate that the state-run educational system in Israel fails to adequately integrate important aspects of Bedouin culture into the learning environment. However, Bedouin entrepreneurs are finding ways to compensate for these inadequacies by utilizing non-traditional methods of teaching, learning, and doing business. Government incentives for Bedouin start-ups are also recognized as contributors. Employees of Sadel live and work in the Negev, the Gaza Strip, and the West Bank, further informing the study that the traditions of tribal etiquette continue to contribute to modern Bedouin-Arab business culture. Conclusion: Bedouin's business success in Israel is a multi-dimensional concept. While cultural acumen plays a prominent and unique role for both Arab-Israelis and Jewish-Israelis in economic and entrepreneurial pursuits, the marginalization of the Bedouin continues to contribute to the lack of educational and professional opportunities for Bedouin in Israel. Although recognized as important at the government level, programs necessary to implement the infrastructure required to support Bedouin entrepreneurship in Israel remain infantile. The Israeli Government is providing opportunities through grants and other incentives for Bedouin entrepreneurial start-ups, indicating that Israel has recognized the impact of this growing demographic. However, although many Bedouin graduates from University each year with advanced degrees, opportunities for Bedouin within the Israeli high-tech sector remain scarce.

Keywords: Bedouin education, Bedouin entrepreneur, economic anthropology, ethnic business opportunities, Israeli tech, Silicon Wadi

Procedia PDF Downloads 102
1204 The Future of Adventure Tourism in a Warmer World: An Exploratory Study of Mountain Guides’ Perception of Environmental Change in Canada

Authors: Brooklyn Rushton, Michelle Rutty, Natalie Knowles, Daniel Scott

Abstract:

As people are increasingly on the search for extraordinary experiences and connections with nature, adventure tourism is experiencing significant growth and providing tourists with life-changing experiences. Unlike built attraction-based tourism, adventure tourism relies entirely on natural heritage, which leaves communities dependent on adventure tourism extremely vulnerable to environmental and climatic changes. A growing body of evidence suggests that global climate change will influence the future of adventure tourism and mountain outdoor recreation opportunities on a global scale. Across Canada, more specifically, climate change is broadly anticipated to present risks for winter-snow sports, while opportunities are anticipated to arise for green season activities. These broad seasonal shifts do not account for the indirect impacts of climate change on adventure tourism, such as the cost of adaptation or the increase of natural hazards and the associated likelihood of accidents. While some research has examined the impact of climate change on natural environments that adventure tourism relies on, a very small body of research has specifically focused on guides’ perspectives or included hard adventure tourism activities. The guiding industry is unique, as guides are trained through an elegant blend of art and science to make decisions based on experience, observation, and intuition. While quantitative research can monitor change in natural environments, guides local knowledge can provide eye-witness accounts and outline what environmental changes mean for the future sustainability of adventure tourism. This research will capture the extensive knowledge of mountain guides to better understand the implications of climate change for mountain adventure and potential adaptive responses for the adventure tourism industry. This study uses a structured online survey with open and close-ended questions that will be administered using Qualtrics (an online survey platform). This survey is disseminated to current members of the Association of Canadian Mountain Guides (ACMG). Participation in this study will be exclusive to members of the ACMG operating in the outdoor guiding streams. The 25 survey questions are organized into four sections: demographic and professional operation (9 questions), physical change (4 questions), climate change perception (6 questions), and climate change adaptation (6 questions). How mountain guides perceive and respond to climate change is important knowledge for the future of the expanding adventure tourism industry. Results from this study are expected to provide important information to mountain destinations on climate change vulnerability and adaptive capacity. Expected results of this study include guides insight into: (1) experience-safety relevant observed physical changes in guided regions (i.e. glacial coverage, permafrost coverage, precipitation, temperature, and slope instability) (2) changes in hazards within the guiding environment (i.e. avalanches, rockfall, icefall, forest fires, flooding, and extreme weather events), (3) existing and potential adaptation strategies, and (4) key information and other barriers for adaptation. By gaining insight from the knowledge of mountain guides, this research can help the tourism industry at large understand climate risk and create adaptation strategies to ensure the resiliency of the adventure tourism industry.

Keywords: adventure tourism, climate change, environmental change, mountain hazards

Procedia PDF Downloads 178
1203 Metamorphosis of Caste: An Examination of the Transformation of Caste from a Material to Ideological Phenomenon in Sri Lanka

Authors: Pradeep Peiris, Hasini Lecamwasam

Abstract:

The fluid, ambiguous, and often elusive existence of caste among the Sinhalese in Sri Lanka has inspired many scholarly endeavours. Originally, Sinhalese caste was organized according to the occupational functions assigned to various groups in society. Hence cultivators came to be known as Goyigama, washers Dobi, drummers Berava, smiths Navandanna and so on. During pre-colonial times the specialized services of various groups were deployed to build water reservoirs, cultivate the land, and/or sustain the Buddhist order by material means. However, as to how and why caste prevails today in Sinhalese society when labour is in ideal terms free to move where it wants, or in other words, occupation is no longer strictly determined or restricted by birth, is a question worth exploring. Hence this paper explores how, and perhaps more interestingly why, when the nexus between traditional occupations and caste status is fast disappearing, caste itself has managed to survive and continues to be salient in politics in Sri Lanka. In answer to this larger question, the paper looks at caste from three perspectives: 1) Buddhism, whose ethical project provides a justification of social stratifications that transcends economic bases 2) Capitalism that has reactivated and reproduced archaic relations in a process of 'accumulation by subordination', not only by reinforcing the marginality of peripheral caste groups, but also by exploiting caste divisions to hinder any realization of class interests and 3) Democracy whose supposed equalizing effect expected through its ‘one man–one vote’ approach has been subverted precisely by itself, whereby the aggregate ultimately comes down to how many such votes each ‘group’ in society has. This study draws from field work carried out in Dedigama (in the District of Kegalle, Central Province) and Kelaniya (in the District of Colombo, Western Province) in Sri Lanka over three years. The choice of field locations was encouraged by the need to capture rural and urban dynamics related to caste since caste is more apparently manifest in rural areas whose material conditions partially warrant its prevalence, whereas in urban areas it exists mostly in the ideological terrain. In building its analysis, the study has employed a combination of objectivist and subjectivist approaches to capture the material and ideological existence of caste and caste politics in Sinhalese society. Therefore, methods such as in-depth interviews, observation, and collection of demographical and interpretive data from secondary sources were used for this study. The paper has been situated in a critical theoretical framework of social inquiry in an attempt to question dominant assumptions regarding such meta-labels as ‘Capitalism’ and ‘Democracy’, and also the supposed emancipatory function of religion (focusing on Buddhism).

Keywords: Buddhism, capitalism, caste, democracy, Sri Lanka

Procedia PDF Downloads 121
1202 Identifying Effective Strategies to Promote Vietnamese Fashion Brands in an Internationally Dominated Market

Authors: Lam Hong Lan, Gabor Sarlos

Abstract:

It is hard to search for best practices in promotion for local fashion brands in Vietnam as the industry is still very young. Local fashion start-ups have grown quickly in the last five years, thanks in part to the internet and social media. However, local designer/owners can face a huge challenge when competing with international brands in the Vietnamese market – and few local case studies are available for guidance. In response, this paper studied how local small- to medium-sized enterprises (SMEs) promote to their target customers in order to compete with international brands. Knowledge of both successful and unsuccessful approaches generated by this study is intended to both contribute to the academic literature on local fashion in Vietnam as well as to help local designers to learn from and improve their brand-building strategy. The primary study featured qualitative data collection via semi-structured depth interviews. Transcription and data analysis were conducted manually in order to identify success factors that local brands should consider as part of their promotion strategy. Purposive sampling of SMEs identified five designers in Ho Chi Minh City (the biggest city in Vietnam) and three designers in Hanoi (the second biggest) as interviewees. Participant attributes included: born in the 1980s or 1990s; familiar with internet and social media; designer/owner of a successful local fashion brand in the key middle market and/or mass market segments (which are crucial to the growth of local brands). A secondary study was conducted using social listening software to gather further qualitative data on what were considered to be successful or unsuccessful approaches to local fashion brand promotion on social media. Both the primary and secondary studies indicated that local designers had maximized their promotion budget by using owned media and earned media instead of paid media. Findings from the qualitative interviews indicate that internet and social media have been used as effective promotion platforms by local fashion start-ups. Facebook and Instagram were the most popular social networks used by the SMEs interviewed, and these social platforms were believed to offer a more affordable promotional strategy than traditional media such as TV and/or print advertising. Online stores were considered an important factor in helping the SMEs to reach customers beyond the physical store. Furthermore, a successful online store allowed some SMEs to reduce their business rental costs by maintaining their physical store in a cheaper, less central city area as opposed to a more traditional city center store location. In addition, the small comparative size of the SMEs allowed them to be more attentive to their customers, leading to higher customer satisfaction and rate of return. In conclusion, this study found that these kinds of cost savings helped the SMEs interviewed to focus their scarce resources on producing unique, high-quality collections in order to differentiate themselves from international brands. Facebook and Instagram were the main platforms used for promotion and brand-building. The main challenge to this promotion strategy identified by the SMEs interviewed was to continue to find innovative ways to maximize the impact of a limited marketing budget.

Keywords: Vietnam, SMEs, fashion brands, promotion, marketing, social listening

Procedia PDF Downloads 111
1201 Attitude towards the Consumption of Social Media: Analyzing Young Consumers’ Travel Behavior

Authors: Farzana Sharmin, Mohammad Tipu Sultan, Benqian Li

Abstract:

Advancement of new media technology and consumption of social media have altered the way of communication in the tourism industry, mostly for consumers’ travel planning, online purchase, and experience sharing activity. There is an accelerating trend among young consumers’ to utilize this new media technology. This paper aims to analyze the attitude of young consumers’ about social media use for travel purposes. The convenience random sample method used to collect data from an urban area of Shanghai (China), consists of 225 young consumers’. This survey identified behavioral determinants of social media consumption by the extended theory of planned behavior (TPB). The instrument developed support on previous research to test hypotheses. The results of structural analyses indicate that attitude towards the use of social media is affected by external factors such as availability and accessibility of technology. In addition, subjective norm and perceived behavioral control have partially influenced the attitude of respondents’. The results of this study could help to improve social media travel marketing and promotional strategies for respective groups.

Keywords: social media, theory of planned behavior, travel behavior, young consumer

Procedia PDF Downloads 176
1200 The Role of Celebrity Endorser in Men's Grooming Communication

Authors: Susana Marques, Cleide Abreu

Abstract:

Presently, more than ever, men’s grooming is seen as a broad category. The problem comes when the previous research about male consumer behavior have neglected some aspects in this subject. The purpose of this investigation is to examine the role of celebrity endorsement in men’s grooming communication to Generation Y. After identifying some gaps in the literature, with regard to this contemporary subject, the most important variables were defined in order to develop the investigation and draw conclusions through statistical analysis and validation, about the role celebrity endorsement as source of credibility in men’s grooming communication. According to the design and methodology, this research was sustained through in depth marketing analysis (secondary data), and primary data collection via online questionnaire, whereby 168 male respondents, from Brazil and Portugal, were exposed to some advertisement pieces in order to express their opinion and feelings. The findings reveal all the relationships among the variables, suggested by the literature, have occurred, presenting a significant relationship in terms of Source Credibility scale dimensions – attractiveness, trustworthiness and expertise. This paper aims to contribute to the existing literature with important conclusions about the role of celebrity endorsement and its credibility in men’s grooming advertisement.

Keywords: communication, celebrity endorsement, men’s grooming, consumer behavior

Procedia PDF Downloads 227
1199 Collaborative Writing on Line with Apps During the Time of Pandemic: A Systematic Literature Review

Authors: Giuseppe Liverano

Abstract:

Today’s school iscalledupon to take the lead role in supporting students towards the formation of conscious identity and a sense of responsible citizenship, through the development of key competencies for lifelong learning A rolethatrequiresit to be ready for change and to respond to the ever new needs of students, by adopting new pedagogical and didactic models and new didactic devices. Information and Communication Technologies, in this sense, reveal themselves to be usefulresourcesthatpermit to focus attention on the learning of eachindividualstudentunderstoodas a dynamic and relational process of constructing shared and participatedmeanings. The use of collaborative writing apps represents a democratic and shared knowledge way of constructionthroughICTs. It promotes the learning of reading-writing, literacy, and the development of transversal competencies in an inclusive perspective peer-to-peer comparison and reflectionthatstimulates the transfer of thought into speech and writing, the transformation of knowledge through a trialogicalapproach to learning generates enthusiasm and strengthensmotivationItrepresents a “different” way of expressing the training needs which come from several disciplinary fields of subjects with different cultures. The contribution aims to reflect on the formative value of collaborative writing through apps and analyse some proposals on line at school during the time of pandemic in order to highlight their critical aspects and pedagogical perspectives.

Keywords: collaborative writing, formative value, online, apps, pandemic

Procedia PDF Downloads 142
1198 Empowering and Educating Young People Against Cybercrime by Playing: The Rayuela Method

Authors: Jose L. Diego, Antonio Berlanga, Gregorio López, Diana López

Abstract:

The Rayuela method is a success story, as it is part of a project selected by the European Commission to face the challenge launched by itself for achieving a better understanding of human factors, as well as social and organisational aspects that are able to solve issues in fighting against crime. Rayuela's method specifically focuses on the drivers of cyber criminality, including approaches to prevent, investigate, and mitigate cybercriminal behavior. As the internet has become an integral part of young people’s lives, they are the key target of the Rayuela method because they (as a victim or as a perpetrator) are the most vulnerable link of the chain. Considering the increased time spent online and the control of their internet usage and the low level of awareness of cyber threats and their potential impact, it is understandable the proliferation of incidents due to human mistakes. 51% of Europeans feel not well informed about cyber threats, and 86% believe that the risk of becoming a victim of cybercrime is rapidly increasing. On the other hand, Law enforcement has noted that more and more young people are increasingly committing cybercrimes. This is an international problem that has considerable cost implications; it is estimated that crimes in cyberspace will cost the global economy $445B annually. Understanding all these phenomena drives to the necessity of a shift in focus from sanctions to deterrence and prevention. As a research project, Rayuela aims to bring together law enforcement agencies (LEAs), sociologists, psychologists, anthropologists, legal experts, computer scientists, and engineers, to develop novel methodologies that allow better understanding the factors affecting online behavior related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity and technologies. Rayuela’s main goal is to better understand the drivers and human factors affecting certain relevant ways of cyber criminality, as well as empower and educate young people in the benefits, risks, and threats intrinsically linked to the use of the Internet by playing, thus preventing and mitigating cybercriminal behavior. In order to reach that goal it´s necessary an interdisciplinary consortium (formed by 17 international partners) carries out researches and actions like Profiling and case studies of cybercriminals and victims, risk assessments, studies on Internet of Things and its vulnerabilities, development of a serious gaming environment, training activities, data analysis and interpretation using Artificial intelligence, testing and piloting, etc. For facilitating the real implementation of the Rayuela method, as a community policing strategy, is crucial to count on a Police Force with a solid background in trust-building and community policing in order to do the piloting, specifically with young people. In this sense, Valencia Local Police is a pioneer Police Force working with young people in conflict solving, through providing police mediation and peer mediation services and advice. As an example, it is an official mediation institution, so agreements signed by their police mediators have once signed by the parties, the value of a judicial decision.

Keywords: fight against crime and insecurity, avert and prepare young people against aggression, ICT, serious gaming and artificial intelligence against cybercrime, conflict solving and mediation with young people

Procedia PDF Downloads 111
1197 Analysis of Big Data on Leisure Activities and Depression for the Disabled

Authors: Hee-Jung Seo, Yunjung Lee, Areum Han, Heeyoung Park, Se-Hyuk Park

Abstract:

The purpose of this study was to analyze the relationship between happiness and depression among people with disabilities and to analyze the social phenomenon of leisure activities among them to promote physical and leisure activities for people with disabilities. The research methods included analyzing differences in happiness according to depression classification. A total of 281 people with disabilities were analyzed using SPSS WIN Ver. 29.0. In addition, the SumTrend platform was used to analyze terms related to 'leisure activities for the disabled.' The findings can be summarized into two main points: First, there were significant differences in happiness according to depression classification. Second, there were 20 mentions before COVID-19, 34 mentions after COVID-19, and currently 43 mentions, with high positive rates observed in each period. Based on these results, the following conclusions were drawn: First, measures for people with disabilities include strengthening online resources and services, social distancing response policies, improving accessibility, and providing support and financial assistance. Second, measures for non-disabled individuals emphasize the need for education and information provision, promoting dialogue and interaction, ensuring accessibility, and promoting inclusive cultural awareness and attitude change.

Keywords: leisure activities, individuals with disabilities, COVID-19 pandemic, depression

Procedia PDF Downloads 23
1196 Presenting Internals of Networks Using Bare Machine Technology

Authors: Joel Weymouth, Ramesh K. Karne, Alexander L. Wijesinha

Abstract:

Bare Machine Internet is part of the Bare Machine Computing (BMC) paradigm. It is used in programming application ns to run directly on a device. It is software that runs directly against the hardware using CPU, Memory, and I/O. The software application runs without an Operating System and resident mass storage. An important part of the BMC paradigm is the Bare Machine Internet. It utilizes an Application Development model software that interfaces directly with the hardware on a network server and file server. Because it is “bare,” it is a powerful teaching and research tool that can readily display the internals of the network protocols, software, and hardware of the applications running on the Bare Server. It was also demonstrated that the bare server was accessible by laptop and by smartphone/android. The purpose was to show the further practicality of Bare Internet in Computer Engineering and Computer Science Education and Research. It was also to show that an undergraduate student could take advantage of a bare server with any device and any browser at any release version connected to the internet. This paper presents the Bare Web Server as an educational tool. We will discuss possible applications of this paradigm.

Keywords: bare machine computing, online research, network technology, visualizing network internals

Procedia PDF Downloads 153
1195 Impact of Enhanced Business Models on Technology Companies in the Pandemic: A Case Study about the Revolutionary Change in Management Styles

Authors: Murat Colak, Berkay Cakir Saridogan

Abstract:

Since the dawn of modern corporations, almost every single employee has been working in the same loop, which contains three basic steps: going to work, providing the needs for the work, and getting back home. Only a small amount of people were able to break that standard and live outside the box. As the 2019 pandemic hit the Earth and most companies shut down their physical offices, that loop had to change for everyone. This means that the old management styles had to be significantly re-arranged to the "work from home" type of business methods. The methods include online conferences and meetings, time and task tracking using algorithms, globalization of the work, and, most importantly, remote working. After the global epidemic started, even the tech giants were concerned. Now, it can be seen those technology companies have an incredible step-up in their shares compared to the other companies because they know how to manage such situations even better than every other industry. This study aims to take the old traditional management styles in big companies and compare them with the post-covid methods (2019-2022). As a result of this comparison made using the annual reports and shared statistics, this study aims to explain why the winners of this crisis are the technology companies.

Keywords: Covid-19, technology companies, business models, remote work

Procedia PDF Downloads 52
1194 An Inquiry into the Usage of Complex Systems Models to Examine the Effects of the Agent Interaction in a Political Economic Environment

Authors: Ujjwall Sai Sunder Uppuluri

Abstract:

Group theory is a powerful tool that researchers can use to provide a structural foundation for their Agent Based Models. These Agent Based models are argued by this paper to be the future of the Social Science Disciplines. More specifically, researchers can use them to apply evolutionary theory to the study of complex social systems. This paper illustrates one such example of how theoretically an Agent Based Model can be formulated from the application of Group Theory, Systems Dynamics, and Evolutionary Biology to analyze the strategies pursued by states to mitigate risk and maximize usage of resources to achieve the objective of economic growth. This example can be applied to other social phenomena and this makes group theory so useful to the analysis of complex systems, because the theory provides the mathematical formulaic proof for validating the complex system models that researchers build and this will be discussed by the paper. The aim of this research, is to also provide researchers with a framework that can be used to model political entities such as states on a 3-dimensional plane. The x-axis representing resources (tangible and intangible) available to them, y the risks, and z the objective. There also exist other states with different constraints pursuing different strategies to climb the mountain. This mountain’s environment is made up of risks the state faces and resource endowments. This mountain is also layered in the sense that it has multiple peaks that must be overcome to reach the tallest peak. A state that sticks to a single strategy or pursues a strategy that is not conducive to the climbing of that specific peak it has reached is not able to continue advancement. To overcome the obstacle in the state’s path, it must innovate. Based on the definition of a group, we can categorize each state as being its own group. Each state is a closed system, one which is made up of micro level agents who have their own vectors and pursue strategies (actions) to achieve some sub objectives. The state also has an identity, the inverse being anarchy and/or inaction. Finally, the agents making up a state interact with each other through competition and collaboration to mitigate risks and achieve sub objectives that fall within the primary objective. Thus, researchers can categorize the state as an organism that reflects the sum of the output of the interactions pursued by agents at the micro level. When states compete, they employ a strategy and that state which has the better strategy (reflected by the strategies pursued by her parts) is able to out-compete her counterpart to acquire some resource, mitigate some risk or fulfil some objective. This paper will attempt to illustrate how group theory combined with evolutionary theory and systems dynamics can allow researchers to model the long run development, evolution, and growth of political entities through the use of a bottom up approach.

Keywords: complex systems, evolutionary theory, group theory, international political economy

Procedia PDF Downloads 116
1193 An Application of Content Analysis, SWOT Analysis, and the TOPSIS Method: A Case Study of the 'Tourism Ambassador' Program in Indonesia

Authors: Gilang Maulana Majid

Abstract:

If a government program remains scientifically uncontested for a long time, it is likely that its effects will be far from expected as there is no concrete evaluation of the steps being taken. This article identifies how such a theory aptly describes the case of the 'tourism ambassador' program in Indonesia. Being set out as one of the tourism promotional means of many regional governments in Indonesia, this program is heavily criticized for being ineffective despite a large number of budgets being spent on an annual basis. Taking the program as a case study, this article applies content analysis, SWOT analysis, and TOPSIS as data analysis methods, with a total of 56 tourism ambassadors invited to become coders, respondents, and/or interviewees in this research. The study reveals the SWOT of the program, recognizes four strategies that can be taken to optimize the program's effects and prioritizes a strategy based on the preferences of the involved tourism ambassadors using TOPSIS. It is found that incorporation of technology such as the creation of an online platform is, among others, the most expected approach to be taken to solve the problems concerning tourism ambassador program. However, based on the costs and benefits of each strategy presented in the current study, each alternative appears to have trade-offs between one and another.

Keywords: Indonesia, optimization strategies, 'Tourism Ambassador' program, SWOT-TOPSIS

Procedia PDF Downloads 147
1192 Pupils´ Questions at School Attendance Beginning and Teachers´ Teaching Strategy

Authors: Marie Pavelková, Hana Lukášová

Abstract:

Pupils´ inquisitiveness at the beginning of their school attendance is reflected by characteristics of the questions they ask. Clearly most of the classroom communication sequences are initiated by the teacher. But the teaching process also includes questions initiated by pupils in the need to satisfy their need for knowledge. The purpose of our research is to present the results of our pre-research strategy of occurrence of pupil-initiated questions in math lessons at the lower elementary school level, and to reveal the extent to which they are influenced by the teacher´s teaching strategy. We used the research methods of direct and indirect observations of fifth year classes in primary school. We focused on questions asked by the pupils in their math lessons. Our research sample for the pre-research observation method was a collection of video recordings available online. We used them for analysing the nature of pupils´ questions identified there. On the basis of the analysis, we hereby present the results concerning the nature of pupils´ questions asked in math lessons on the lower elementary school level. The interpretation of the collected results will be the starting point for the selection of research strategies in the next research stages concerning pupils’ questions in the future.

Keywords: beginning of schooling, pre-research, questions of pupils, teaching strategy

Procedia PDF Downloads 359
1191 Design and Implementation of Remote Application Virtualization in Cloud Environments

Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang

Abstract:

Cloud computing is a paradigm of computing that shifts the way computing has been done in the past. The users can use cloud resources such as application software or storage space from the cloud without needing to own them. This paper is focused on solutions that are anticipated to introduce IaaS idea to build cloud base services and enable the individual remote user's applications in cloud environments, which appear as if they are running on the end user's local computer. The available features of application delivery solution have been developed based on our previous research on the virtualization technology to offer applications independent of location so that the users can work online, offline, anywhere, with appropriate device and at any time. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud service. Users no longer need to burden the system managers and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote application virtualization service represents the next significant step to the mobile workplace, and it lets users access their applications remotely through cloud services anywhere. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.

Keywords: cloud computing, IaaS, virtualization, application delivery

Procedia PDF Downloads 263
1190 Parental Negative Emotional States, Parenting Style and Child Emotional and Behavioural Problems: Australia-Indonesia Cross-Cultural Study

Authors: Yulina E. Riany, Divna Haslam, Matthew Sanders

Abstract:

This cross-cultural study aims to compare the level of parental depression and stress, parenting style use, and child emotional and behavioural problems between parents in Australia as an example of a Western country and parents in Indonesia as an example of Asian culture. A series of hierarchical regressions were undertaken to determine two models examining the factors that predict child problems residing in Australia (Model 1) and in Indonesia (Model 2). The online survey was completed by 179 parents in Australia and 448 parents in Indonesia. Results indicated that Australian parents reported higher levels of depression, authoritative parenting and higher levels of child misbehaviours compared to Indonesian parents. In comparison, Indonesian parents reported higher authoritarian parenting. Analyses performed to examine Model 1 and 2 revealed that parental negative emotional states and parenting style predicted child emotional and behavioural problems in both countries.

Keywords: cross-cutural study, parental stress, parenting, child misbehaviour

Procedia PDF Downloads 102
1189 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 192
1188 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology

Procedia PDF Downloads 444