Search results for: opinions of users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3081

Search results for: opinions of users

1341 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model

Authors: Wang Xue, Fan Liwei

Abstract:

The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.

Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model

Procedia PDF Downloads 98
1340 Analyzing On-Line Process Data for Industrial Production Quality Control

Authors: Hyun-Woo Cho

Abstract:

The monitoring of industrial production quality has to be implemented to alarm early warning for unusual operating conditions. Furthermore, identification of their assignable causes is necessary for a quality control purpose. For such tasks many multivariate statistical techniques have been applied and shown to be quite effective tools. This work presents a process data-based monitoring scheme for production processes. For more reliable results some additional steps of noise filtering and preprocessing are considered. It may lead to enhanced performance by eliminating unwanted variation of the data. The performance evaluation is executed using data sets from test processes. The proposed method is shown to provide reliable quality control results, and thus is more effective in quality monitoring in the example. For practical implementation of the method, an on-line data system must be available to gather historical and on-line data. Recently large amounts of data are collected on-line in most processes and implementation of the current scheme is feasible and does not give additional burdens to users.

Keywords: detection, filtering, monitoring, process data

Procedia PDF Downloads 559
1339 Spirituality, Sense of Community and Economic Welfare: A Case of Mawlynnong Village, India

Authors: Ricky A. J. Syngkon, Santi Gopal Maji

Abstract:

Decent work and inclusive economic growth, social development, environmental protection, eradication of poverty and hunger as well as clean water and sanitation are the rudiments of 2030 agenda of sustainable development goals of the United Nations. On the other hand, spirituality is deeply entwined in the fabric of daily lives that helps in shaping attitudes, opinions, and behaviors of common people and ensuring quality of lives and overall sustainable development through protection of environment and natural resources. Mawlynnong, a small village in North-Eastern part of India, is a vivid example of how spirituality influences the development of sense of community leading to upliftment of the economic conditions of the people. Mawlynnong as a small hamlet has been in existence for a couple of centuries and it was acknowledged as the cleanest village of Asia in 2004 by BBC and National Geographic and subsequently endorsed by UNESCO in 2006. Consequently, it has attracted large number of tourists over the years from India and other parts of the world. This paper tries to explore how spirituality leads to a sense of community and the economic benefits for the people. Further, this paper also tries to find out the answer whether such an informal collective effort is sustainable or not for achieving solidarity economy. The study is based on both primary and secondary data collected from the local people and the State Government records. The findings of the study indicate that over the last one and a half decade the tourist footfall has increased to a great extent in Mawlynnong and this has brought about a paradigm shift in the occupational structure of its inhabitants from plantation to service sector particularly tourism and tourism related activities. As a result, from the economic standpoint, it is observed that life is much better off now as compared to before. But from the socio-cultural standpoint, the study finds a drift in terms of the cohesiveness and community bonding which was the hallmark of this village. This drift puts a question mark about the sustainability of such practices and consequently the development of solidarity economy.

Keywords: spirituality, sense of community, economic welfare, solidarity economy, Mawlynnong village

Procedia PDF Downloads 140
1338 Civil Discourse in the Digital Age: Perceptions of Age as a Barrier to Civic Engagement

Authors: Julianne Viola

Abstract:

Young people are at a critical stage in their lives, developing from young participants to adult participants in democratic society. At this time, civic engagement is crucial for young people’s sense of belonging and future participation in their communities. In adolescence, individuals form their own identities and associations with others and may accomplish this with the help of technology and social media. In the Digital Age, young people and adults use technology as a platform to discuss political issues, including human rights and social justice but do not always engage in civil discourse. There is an urgent need to investigate this complex interplay of social media, identity formation, and civil discourse as it relates to how teenagers become participants in democratic society and how they engage in civil discourse. This qualitative study draws on theories of identity formation in adolescence and is situated within the literature surrounding teen civic engagement and technology use. Through in-depth interviews with participants ages 14 through 17, this study investigates the ways in which teens conceptualize their civic identities and engagement, presence online, and civil discourse. The context in which the young people in this study have grown up has the potential to impact and inform these processes. Early results of this study illustrate what it means to be a young person in today’s world, and how perceptions of others’ opinions may influence young people’s engagement in their communities and online. Participants in this study often indicated concerns of their age as a constraint on participation in their communities and in society, and a self-imposed restriction around the people with whom they engage in conversation about political and social issues. While the participants shared common concerns and experiences, each participant’s unique perspectives and beliefs are viewed with equal importance. The results from this research will help students, teachers, and community groups learn about the reasons for engagement and disengagement among this age group, and how technology has influenced teens’ dialogue about political issues. With this knowledge, academics and school leaders can devise new ways to best teach citizenship skills and civil discourse to students in the Digital Age.

Keywords: civics, digital age, discourse, sociology of youth, youth studies

Procedia PDF Downloads 253
1337 The Use of Videoconferencing in a Task-Based Beginners' Chinese Class

Authors: Sijia Guo

Abstract:

The development of new technologies and the falling cost of high-speed Internet access have made it easier for institutes and language teachers to opt different ways to communicate with students at distance. The emergence of web-conferencing applications, which integrate text, chat, audio / video and graphic facilities, offers great opportunities for language learning to through the multimodal environment. This paper reports on data elicited from a Ph.D. study of using web-conferencing in the teaching of first-year Chinese class in order to promote learners’ collaborative learning. Firstly, a comparison of four desktop videoconferencing (DVC) tools was conducted to determine the pedagogical value of the videoconferencing tool-Blackboard Collaborate. Secondly, the evaluation of 14 campus-based Chinese learners who conducted five one-hour online sessions via the multimodal environment reveals the users’ choice of modes and their learning preference. The findings show that the tasks designed for the web-conferencing environment contributed to the learners’ collaborative learning and second language acquisition.

Keywords: computer-mediated communication (CMC), CALL evaluation, TBLT, web-conferencing, online Chinese teaching

Procedia PDF Downloads 309
1336 Customizable Sonic EEG Neurofeedback Environment to Train Self-Regulation of Momentary Mental and Emotional State

Authors: Cyril Kaplan, Nikola Jajcay

Abstract:

We developed purely sonic, musical based, highly customizable EEG neurofeedback environment designed to administer a new neurofeedback training protocol. The training protocol concentrates on improving the ability to switch between several mental states characterized by different levels of arousal, each of them correlated to specific brain wave activity patterns in several specific regions of neocortex. This paper describes the neurofeedback training environment we developed and its specificities, thus can be helpful as a manual to guide other neurofeedback users (both researchers and practitioners) interested in our editable open source program (available to download and usage under CC license). Responses and reaction of first trainees that used our environment are presented in this article. Combination of qualitative methods (thematic analysis of neurophenomenological insights of trainees and post-session semi-structured interviews) and quantitative methods (power spectra analysis of EEG recorded during the training) were employed to obtain a multifaceted view on our new training protocol.

Keywords: EEG neurofeedback, mixed methods, self-regulation, switch-between-states training

Procedia PDF Downloads 227
1335 Transient Voltage Distribution on the Single Phase Transmission Line under Short Circuit Fault Effect

Authors: A. Kojah, A. Nacaroğlu

Abstract:

Single phase transmission lines are used to transfer data or energy between two users. Transient conditions such as switching operations and short circuit faults cause the generation of the fluctuation on the waveform to be transmitted. Spatial voltage distribution on the single phase transmission line may change owing to the position and duration of the short circuit fault in the system. In this paper, the state space representation of the single phase transmission line for short circuit fault and for various types of terminations is given. Since the transmission line is modeled in time domain using distributed parametric elements, the mathematical representation of the event is given in state space (time domain) differential equation form. It also makes easy to solve the problem because of the time and space dependent characteristics of the voltage variations on the distributed parametrically modeled transmission line.

Keywords: energy transmission, transient effects, transmission line, transient voltage, RLC short circuit, single phase

Procedia PDF Downloads 223
1334 Language Use in Computer-Mediated Communication and Users’ Social Identity

Authors: Miramar Damanhouri

Abstract:

This study examines the relationship between language use in computer-mediated communication and the social identity of the user. The data were collected by surveying 298 Saudi bilingual speakers who are familiar with Arabizi, a blend of Latin characters and Arabic numerals to transliterate Arabic sounds, and then analyzed quantitatively by running tests for statistical confidence in order to determine differences in perceptions between young adults (ages 15-25 years) and middle-aged adults (ages 26-50 years). According to the findings of this study, English is the dominant language among most of the young adults surveyed, and when they do use Arabic, they use Arabizi because of its flexibility, compatibility with modern technology, and its acceptance among people of their age and sociocultural backgrounds. On the other hand, most middle-aged adults surveyed here tend to use Arabic, as they believe that they should show their loyalty to their origin. The results of the study demonstrate a mutual relationship between language use in computer-mediated communication and the user’s social identity, as language is used both to reflect and construct that identity.

Keywords: Arabizi, computer mediated communication, digital communication, language use

Procedia PDF Downloads 134
1333 Analysing Social Media Coverage of Political Speeches in Relation to Discourse and Context

Authors: Yaser Mohammed Altameemi

Abstract:

This research looks at the representation of the social media for the Saudi Government decrees regarding the developmental projects of the Saudi 2030 vision. The paper analyses a television interview with the Crown Prince Mohammed Bin Salman who talks about the progress of the Saudi vision of 2030, and how the government had acted as response to the COVID-19 pandemic. The interview was on 28/4/2021. The paper analyses the tweets on Twitter that cover the interview for the purpose of investigating the development of concepts and meanings regarding the Saudi peoples’ orientations towards the Saudi projects. The data include all related tweets from the day of the interview and the following seven days after the interview. The finding of the collocation analysis suggests that nationalism notion is explicitly expressed by users in Twitter. The main finding of this paper suggests the importance of further analyses for the concordance lines. However, the collocation network suggests that there is a clear highlight for nationalism.

Keywords: social media, twitter, political interview, prince Mohammed Bin Salman, Saudi vision 2030

Procedia PDF Downloads 191
1332 Parent’s Preferences about Technology-Based Therapy for Children and Young People on the Autism Spectrum – a UK Survey

Authors: Athanasia Kouroupa, Karen Irvine, Sivana Mengoni, Shivani Sharma

Abstract:

Exploring parents’ preferences towards technology-based interventions for children on the autism spectrum can inform future research and support technology design. The study aimed to provide a comprehensive description of parents’ knowledge and preferences about innovative technology to support children on the autism spectrum. Survey data were collected from parents (n = 267) internationally. The survey included information about the use of conventional (e.g., smartphone, iPod, tablets) and non-conventional (e.g., virtual reality, robot) technologies. Parents appeared to prefer conventional technologies such as tablets and dislike non-conventional ones. They highlighted the positive contribution technology brought to the children’s lives during the pandemic. A few parents were equally concerned that the compulsory introduction of technology during the pandemic was associated with elongated time on devices. The data suggested that technology-based interventions are not widely known, need to be financially approachable and achieve a high standard of design to engage users.

Keywords: autism, intervention, preferences, technology

Procedia PDF Downloads 133
1331 Designing an Online Case-Based Library for Technology Integration in Teacher Education

Authors: Mustafa Tevfik Hebebci, Sirin Kucuk, Ismail Celik, A. Oguz Akturk, Ismail Sahin, Fetah Eren

Abstract:

The purpose of this paper is to introduce an interactive online case-study library website developed in a national project. The design goal of the website is to provide interactive, enhanced, case-based and online educational resource for educators through the purpose and within the scope of a national project. The ADDIE instructional design model was used in the development of the website for interactive case-based library. This library is developed on a web-based platform, which is important in terms of manageability, accessibility, and updateability of data. Users are able to sort the displayed case-studies by their titles, dates, ratings, view counts, etc. The usability test is used and the expert opinion is taken for the evaluation of the website. This website is a tool to integrate technology into education. It is believed that this website will be beneficial for pre-service and in-service teachers in terms of their professional developments.

Keywords: ADDIE, case-based library, design, technology integration

Procedia PDF Downloads 445
1330 Manifestations of Moral Imagination during the COVID-19 Pandemic in the Debates of Lithuanian Parliament

Authors: Laima Zakaraite, Vaidas Morkevicius

Abstract:

The COVID-19 pandemic brought important and pressing challenges for politicians around the world. Governments, parliaments, and political leaders had to make quick decisions about containment of the pandemic, usually without clear knowledge about the factual spread of the virus, the possible expected speed of spread, and levels of mortality. Opinions of experts were also divided, as some advocated for ‘herd immunity’ without closing down the economy and public life, and others supported the idea of strict lockdown. The debates about measures of pandemic containment were heated and involved strong moral tensions with regard to the possible outcomes. This paper proposes to study the manifestations of moral imagination in the political debates regarding the COVID-19 pandemic. Importantly, moral imagination is associated with twofold abilities of a decision-making actor: the ability to discern the moral aspects embedded within a situation and the ability to envision a range of possibilities alternative solutions to the situation from a moral perspective. The concept was most thoroughly investigated in business management studies. However, its relevance for the study of political decision-making is also rather clear. The results of the study show to what extent politicians are able to discern the wide range of moral issues related to a situation (in this case, consequences of COVID-19 pandemic in a country) and how broad (especially, from a moral perspective) are discussions of the possible solutions proposed for solving the problem (situation). Arguably, political discussions and considerations are broader and affected by a wider and more varied range of actors and ideas compared to decision making in the business management sector. However, the debates and ensuing solutions may also be restricted by ideological maxims and advocacy of special interests. Therefore, empirical study of policy proposals and their debates might reveal the actual breadth of moral imagination in political discussions. For this purpose, we carried out the qualitative study of the parliamentary debates related to the COVID-19 pandemic in Lithuania during the first wave (containment of which was considered very successful) and at the beginning and consequent acceleration of the second wave (when the spread of the virus became uncontrollable).

Keywords: decision making, moral imagination, political debates, political decision

Procedia PDF Downloads 147
1329 Smart Sustainable University Campus: Aspects on Efficient Space Utilization at National Taiwan University of Science and Technology

Authors: Wei-Hwa Chiang, Yu-Ching Cheng, Pei-Hsien Kao, Yu-Chi Lai

Abstract:

A smart sustainable university campus is multi-dimensional. The success requires intensive inter-disciplinary coordination among all users and the expert group and long-term optimization. This paper reported the design and realization process of the dense and campus NTUST campus where space sharing is essential. Two-phase web-based interviews with students were conducted regarding where they study between classes as well as how they move within the campus. Efficient and active utilization of public and semi-public spaces, in particular, the ones near the ground, were progressively designed and realized where lobbies, corridors, reading rooms, and classrooms not in use were considered. Most of the spaces were equipped with smart monitoring and controls in terms of access, lighting, ceiling fans, air condition, and energy use. Mobile device apps were developed regarding the management of the spaces while information about energy use, environmental quality, and the smart sustainable campus project itself were provided to stimulate the awareness of sustainability and active participation in optimizing the campus.

Keywords: smart, sustainability, campus, space utilization

Procedia PDF Downloads 153
1328 Secure E-Voting Using Blockchain Technology

Authors: Barkha Ramteke, Sonali Ridhorkar

Abstract:

An election is an important event in all countries. Traditional voting has several drawbacks, including the expense of time and effort required for tallying and counting results, the cost of papers, arrangements, and everything else required to complete a voting process. Many countries are now considering online e-voting systems, but the traditional e-voting systems suffer a lack of trust. It is not known if a vote is counted correctly, tampered or not. A lack of transparency means that the voter has no assurance that his or her vote will be counted as they voted in elections. Electronic voting systems are increasingly using blockchain technology as an underlying storage mechanism to make the voting process more transparent and assure data immutability as blockchain technology grows in popularity. The transparent feature, on the other hand, may reveal critical information about applicants because all system users have the same entitlement to their data. Furthermore, because of blockchain's pseudo-anonymity, voters' privacy will be revealed, and third parties involved in the voting process, such as registration institutions, will be able to tamper with data. To overcome these difficulties, we apply Ethereum smart contracts into blockchain-based voting systems.

Keywords: blockchain, AMV chain, electronic voting, decentralized

Procedia PDF Downloads 137
1327 Syntactic Ambiguity and Syntactic Analysis: Transformational Grammar Approach

Authors: Olufemi Olupe

Abstract:

Within linguistics, various approaches have been adopted to the study of language. One of such approaches is the syntax. The syntax is an aspect of the grammar of the language which deals with how words are put together to form phrases and sentences and how such structures are interpreted in language. Ambiguity, which is also germane in this discourse is about the uncertainty of meaning as a result of the possibility of a phrase or sentence being understood and interpreted in more than one way. In the light of the above, this paper attempts a syntactic study of syntactic ambiguities in The English Language, using the Transformational Generative Grammar (TGG) Approach. In doing this, phrases and sentences were raised with each description followed by relevant analysis. Finding in the work reveals that ambiguity cannot always be disambiguated by the means of syntactic analysis alone without recourse to semantic interpretation. The further finding shows that some syntactical ambiguities structures cannot be analysed on two surface structures in spite of the fact that there are more than one deep structures. The paper concludes that in as much as ambiguity remains in language; it will continue to pose a problem of understanding to a second language learner. Users of English as a second language, must, however, make a conscious effort to avoid its usage to achieve effective communication.

Keywords: language, syntax, semantics, morphology, ambiguity

Procedia PDF Downloads 394
1326 Emotion Dysregulation as Mediator between Child Abuse and Opiate Use Motives

Authors: Usha Barahmand, Ali Khazaee, Goudarz Sadeghi Hashjin

Abstract:

Coping motives are considered to be indicators of problematic substance use. The present investigation examined a model with emotional abuse as an antecedent and emotional dysregulation as a mediator leading to substance use. The intent of this study was to examine the associations between various types of childhood maltreatment and motives for substance use. The sample consisted of 72 male opiate users recruited from those enrolled for Methadone Maintenance treatment. Participants responded to measures of childhood maltreatment, emotion dysregulation, and motives for opiate use. All data were analyzed using Pearson's correlation coefficients and bootstrap analysis of mediation. Results supported the hypothesis that the experience of emotional abuse in childhood is associated with problems in regulating emotions which in turn correlates with opiate use as a way to cope with negative affect, to enhance positive effect or to obtain social rewards. Bootstrap analysis confirmed the mediating role of emotion dysregulation. Findings support the potential utility of further research into emotion dysregulation and motives as antecedents of problematic opiate use.

Keywords: childhood abuse, emotion dysregulation, motives, substance use

Procedia PDF Downloads 444
1325 Benchmarking of Pentesting Tools

Authors: Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

The benchmarking of tools for dynamic analysis of vulnerabilities in web applications is something that is done periodically, because these tools from time to time update their knowledge base and search algorithms, in order to improve their accuracy. Unfortunately, the vast majority of these evaluations are made by software enthusiasts who publish their results on blogs or on non-academic websites and always with the same evaluation methodology. Similarly, academics who have carried out this type of analysis from a scientific approach, the majority, make their analysis within the same methodology as well the empirical authors. This paper is based on the interest of finding answers to questions that many users of this type of tools have been asking over the years, such as, to know if the tool truly test and evaluate every vulnerability that it ensures do, or if the tool, really, deliver a real report of all the vulnerabilities tested and exploited. This kind of questions have also motivated previous work but without real answers. The aim of this paper is to show results that truly answer, at least on the tested tools, all those unanswered questions. All the results have been obtained by changing the common model of benchmarking used for all those previous works.

Keywords: cybersecurity, IDS, security, web scanners, web vulnerabilities

Procedia PDF Downloads 319
1324 Specified Human Motion Recognition and Unknown Hand-Held Object Tracking

Authors: Jinsiang Shaw, Pik-Hoe Chen

Abstract:

This paper aims to integrate human recognition, motion recognition, and object tracking technologies without requiring a pre-training database model for motion recognition or the unknown object itself. Furthermore, it can simultaneously track multiple users and multiple objects. Unlike other existing human motion recognition methods, our approach employs a rule-based condition method to determine if a user hand is approaching or departing an object. It uses a background subtraction method to separate the human and object from the background, and employs behavior features to effectively interpret human object-grabbing actions. With an object’s histogram characteristics, we are able to isolate and track it using back projection. Hence, a moving object trajectory can be recorded and the object itself can be located. This particular technique can be used in a camera surveillance system in a shopping area to perform real-time intelligent surveillance, thus preventing theft. Experimental results verify the validity of the developed surveillance algorithm with an accuracy of 83% for shoplifting detection.

Keywords: Automatic Tracking, Back Projection, Motion Recognition, Shoplifting

Procedia PDF Downloads 333
1323 Effects and Coping Strategies of Cyber Bullying in Pakistan: A Gender Response

Authors: Rabia Qusien

Abstract:

New media has emerged as a significant force in the society which connects people across the globe. Where new media brought many advantages for its users, there is a darker aspect of new technology in the form of cyberbullying. Researcher has employed survey method to reach to its targeted audience. Sample of 604 respondents was selected from one of metropolitan city of Pakistan Lahore to collect the data. Equal sample from both genders was selected to apply gender analysis. Results of this study indicate that cyber bullying is having significant psychological and educational effects. Females face more cyber bullying incidents as compared to males so they face more severe effects of cyber bullying. A comprehensive analysis of managing strategies depicts that mostly youth tries to handle this issue personally but at times they seek the support of their family and friends when they face severe issues. Due to privacy concerns females get more upset and they are more likely to seek social support from friends and family.

Keywords: cyber bullying, cyber victims, educational impacts, psychological impacts

Procedia PDF Downloads 143
1322 Structural Analysis of Multi-Pressure Integrated Vessel for Sport-Multi-Artificial Environment System

Authors: Joon-Ho Lee, Jeong-Hwan Yoon, Jung-Hwan Yoon, Sangmo Kang, Su-Yeon Hong, Hyun-Woo Jeong, Jaeick Chae

Abstract:

There are several dedicated individual chambers for sports that are supplied and used, but none of them are multi-pressured all-in-one chambers that can provide a sports multi-environment simultaneously. In this study, we design a multi-pressure (positive/atmospheric/negative pressure) integrated vessel that can be used for the sport-multi-artificial environment system. We presented additional vessel designs with enlarged space for the tall users; with reinforcement pads added to reduce the maximum stress in the joints of its shells, and then carried out numerical analysis for the structural analysis with maximum stress and structural safety. Under the targeted allowable pressure conditions, maximum stresses occurred at the joint of the shell, and the entrance, the safety of the structure was checked with the allowable stress of its material.

Keywords: structural analysis, multi-pressure, integrated vessel, sport-multi-artificial environment

Procedia PDF Downloads 532
1321 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 151
1320 The ICC, International Criminal Justice and International Politics

Authors: Girma Y. Iyassu Menelik

Abstract:

The international community has gone through indescribable atrocities resulting from acts of war. These atrocities turned Europe and Africa into a wilderness of bloodshed and crime. In the period 1960- 1970s Africa witnessed unprecedented and well-documented assaults on life and property. This necessitated the adoption, signing and ratification of the International Criminal Court, establishment of the International Court of Justice which is a great achievement for the protection and fulfilling of human rights in the context of international political instability. The ICC came as an important opportunity to advance justice for serious crimes committed in violation of international law. Thus the Rome statute has become a formidable contribution to peace and security. There are concerns that the ICC is targeting African states. However, the ICC cannot preside over cases that are not parties to the Rome statute unless the UN Security council refers the situation or the relevant state asks the court to become involved. The instable international political situation thus deals with criminal prosecutions where amnesty is not permissible or is strongly repudiated. The court has become important justice instruments for states that are unable or unwilling to fulfill their obligation to address legacies of massive human rights violations. The ICJ as a court has a twofold role; to settle legal disputes submitted to it by states, and to give advisory opinions on legal questions referred to it by duly authorized United Nations organs and specialized agencies. All members of the UN are ipso facto parties to the statute of the ICJ. The court gives advisory opinion on any legal question. These courts are the most appropriate fora to pronounce on international crimes and are in a better position to know and apply international law. Cases that have been brought to the courts include Rwanda’s genocide, Liberia’s Charles Taylor etc. The receptiveness and cooperation of the local populations are important to the courts and if the ICC and ICJ can provide appropriate protections for the physical and economic safety of victims then peace and human rights observance can be attained. This paper will look into the effectiveness and impediments of these courts in handling criminal and injustices in international politics as while as what needs to be done to strengthen the capacity of these courts.

Keywords: ICC, international politics, justice, UN security council, violence, protection, fulfilling

Procedia PDF Downloads 449
1319 Non-Profit Organizations and the Future: Framework for the Preparation and Presentation of Annual Reports

Authors: Nadzira Yahaya, Saunah Zainon, Marshita Hashim, Ruhaya Atan

Abstract:

Non-profit organizations (NPOs) in Malaysia are diverse in their origins, structures, objectives, and stakeholders. The largest category of NPOs is from charity and religious category while many other categories such as youth, professionals, women, education and mutual benefits either operate independently or controlled by governments. NPOs have stewardship obligations to their stakeholders and other users of their annual reports, including the public at large. The existing accounting practices without the proper framework of the preparation and presentation of annual reports resulted in a lack of uniformity in the preparation and presentation of NPOs annual reports. Furthermore, a lack of awareness of the applicability of accounting standards and the adoption of different bases of accounting resulted in the need for framework in the preparation and presentation of financial statements for true and fair view of the state of affairs and the operating result of the NPOs activities. This study presents the proposed framework for the preparation and presentation of NPOs annual reports to help the organizations provide high-quality reporting for them to be accountable for good stewardship.

Keywords: annual reports, framework, NPOs, preparation and presentation

Procedia PDF Downloads 443
1318 Social Accountability: Persuasion and Debate to Contain Corruption

Authors: A. Lambert-Mogiliansky

Abstract:

In this paper, we investigate the properties of simple rules for reappointment aimed at holding a public official accountable and monitor his activity. The public official allocates budget resources to various activities which results in the delivery of public services to citizens. He has discretion over the use of resource so he can divert some of them for private ends. Because of a liability constraint, zero diversion can never be secured in all states. The optimal reappointment mechanism under complete information is shown to exhibit some leniency thus departing from the zero tolerance principle. Under asymmetric information (about the state), a rule with random verification in a pre-announced subset is shown to be optimal in a class of common rules. Surprisingly, those common rules make little use of hard information about service delivery when available. Similarly, PO's claim about his record is of no value to improve the performance of the examined rules. In contrast requesting that the PO defends his records publicly can be very useful if the service users are given the chance to refute false claims with cheap talk complaints: the first best complete information outcome can be approached in the absence of any observation by the manager of the accountability mechanism.

Keywords: accountability, corruption, persuasion, debate

Procedia PDF Downloads 380
1317 Improved Throttled Load Balancing Approach for Cloud Environment

Authors: Sushant Singh, Anurag Jain, Seema Sabharwal

Abstract:

Cloud computing is advancing with a rapid speed. Already, it has been adopted by a huge set of users. Easy to use and anywhere access like potential of cloud computing has made it more attractive relative to other technologies. This has resulted in reduction of deployment cost on user side. It has also allowed the big companies to sell their infrastructure to recover the installation cost for the organization. Roots of cloud computing have extended from Grid computing. Along with the inherited characteristics of its predecessor technologies it has also adopted the loopholes present in those technologies. Some of the loopholes are identified and corrected recently, but still some are yet to be rectified. Two major areas where still scope of improvement exists are security and performance. The proposed work is devoted to performance enhancement for the user of the existing cloud system by improving the basic throttled mapping approach between task and resources. The improved procedure has been tested using the cloud analyst simulator. The results are compared with the original and it has been found that proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, load balancing, throttled

Procedia PDF Downloads 249
1316 The Practices Perspective in Communication, Consumer and Cultural Studies: A Post-Heideggerian Narrative

Authors: Tony Wilson

Abstract:

This paper sets out a practices perspective or practices theory, which has become pervasive from business to sociological studies. In doing so, it locates the perspective historically (in the work of the philosopher Heidegger) and provides a contemporary illustration of its application to communication, consumer and cultural studies as central to this conference theme. The structured account of practices (as articulated in eight ‘axioms’) presented towards the conclusion of this paper is an initial statement - planned to encourage further detailed qualitative and systematic research in areas of interest to the conference. Practice theories of equipped and situated construction of participatory meaning (as in media and marketing consuming) are frequently characterized as lacking common ground, or core principles. This paper explores whether by retracing a journey to earlier philosophical underwriting, a shared territory promoting new research can be located as current philosophical hermeneutics. Moreover, through returning to hermeneutic first principles, the paper shows that a series of spatio-temporal metaphors become available - appropriate to analyzing communication as a process across disciplines in which it is considered. Thus one can argue, for instance, that media users engage (enter) digital text from their diverse ‘horizons of expectation’, in a productive enlarging ‘fusion’ of horizons of understanding, thereby ‘projecting’ a new narrative, integrated in a ‘hermeneutic circle’ of meaning. A politics of communication studies may contest a horizon of understanding - so engaging in critical ‘distancing’. Marketing’s consumers can occupy particular places on a horizon of understanding. Media users pass over borders of changing, revised perspectives. Practices research can now not only be discerned in multiple disciplines but equally crosses disciplines. The ubiquitous practice of media use by managers and visitors in a shopping mall - the mediatization of malls - responds to investigating not just with media study expertise, but from an interpretive marketing perspective. How have mediated identities of person or place been changed? Emphasizing understanding of entities in a material environment as ‘equipment’, practices theory enables the quantitative correlation of use and demographic variable as ‘Zeug Score’. Human behavior is fundamentally habitual - shaped by its tacit assumptions - occasionally interrupted by reflection. Practices theory acknowledges such action to be minimally monitored yet nonetheless considers it as constructing narrative. Thus presented in research, ‘storied’ behavior can then be seen to be (in)formed and shaped from a shifting hierarchy of ‘horizons’ or of perspectives - from habituated to reflective - rather than a single seamless narrative. Taking a communication practices perspective here avoids conflating tacit, transformative and theoretical understanding in research. In short, a historically grounded and unifying statement of contemporary practices theory will enhance its potential as a tool in communication, consumer and cultural research, landscaping interpretative horizons of human behaviour through exploring widely the culturally (in)formed narratives equipping and incorporated (reflectively, unreflectively) in people’s everyday lives.

Keywords: communication, consumer, cultural practices, hermeneutics

Procedia PDF Downloads 269
1315 Interruption Overload in an Office Environment: Hungarian Survey Focusing on the Factors that Affect Job Satisfaction and Work Efficiency

Authors: Fruzsina Pataki-Bittó, Edit Németh

Abstract:

On the one hand, new technologies and communication tools improve employee productivity and accelerate information and knowledge transfer, while on the other hand, information overload and continuous interruptions make it even harder to concentrate at work. It is a great challenge for companies to find the right balance, while there is also an ongoing demand to recruit and retain the talented employees who are able to adopt the modern work style and effectively use modern communication tools. For this reason, this research does not focus on the objective measures of office interruptions, but aims to find those disruption factors which influence the comfort and job satisfaction of employees, and the way how they feel generally at work. The focus of this research is on how employees feel about the different types of interruptions, which are those they themselves identify as hindering factors, and those they feel as stress factors. By identifying and then reducing these destructive factors, job satisfaction can reach a higher level and employee turnover can be reduced. During the research, we collected information from depth interviews and questionnaires asking about work environment, communication channels used in the workplace, individual communication preferences, factors considered as disruptions, and individual steps taken to avoid interruptions. The questionnaire was completed by 141 office workers from several types of workplaces based in Hungary. Even though 66 respondents are working at Hungarian offices of multinational companies, the research is about the characteristics of the Hungarian labor force. The most important result of the research shows that while more than one third of the respondents consider office noise as a disturbing factor, personal inquiries are welcome and considered useful, even if in such cases the work environment will not be convenient to solve tasks requiring concentration. Analyzing the sizes of the offices, in an open-space environment, the rate of those who consider office noise as a disturbing factor is surprisingly lower than in smaller office rooms. Opinions are more diverse regarding information communication technologies. In addition to the interruption factors affecting the employees' job satisfaction, the research also focuses on the role of the offices in the 21st century.

Keywords: information overload, interruption, job satisfaction, office environment, work efficiency

Procedia PDF Downloads 227
1314 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures

Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir

Abstract:

Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.

Keywords: Iot, DID, authorization, verifiable credentials

Procedia PDF Downloads 76
1313 The Determinants of Behavioral Intention to Use toward T-Cash Services Provider in Jakarta and Surburban Area

Authors: Stephen Coandadiputra, Chrestella Carissa

Abstract:

Technology is created to simplify human’s life. One of current technology which being called as the second wave internet generation is the internet of things. Internet of things lets thousands of devices connected each other. In today's marketing world, IOT has brought customer into the next level which helping the customer to shorten every transaction they are conducting from traditional approach to sophisticated approach. However, the implementation of technology has always obstacles. The objective of this paper is to explore the determinants of customer to accepts such technology like the internet of things within their transaction. According to TAM (Technology Acceptance Model), researcher constructs the acceptance of internet of things based on perceived usefulness, perceived ease of use and trust and social factor and the two customer characteristics: perceived enjoyment and perceived behavioral control. This research uses exploratory research design which being facilitated by spreading questionnaire to 145 T-cash users in Jakarta and in its suburban region. At least, 190 samples were observed and questioned accordingly. All the collected data will be analyzed using Lisrel.

Keywords: behavioral intention to use, internet of things, near field communication, technology acceptance model

Procedia PDF Downloads 335
1312 Gamification Using Stochastic Processes: Engage Children to Have Healthy Habits

Authors: Andre M. Carvalho, Pedro Sebastiao

Abstract:

This article is based on a dissertation that intends to analyze and make a model, intelligently, algorithms based on stochastic processes of a gamification application applied to marketing. Gamification is used in our daily lives to engage us to perform certain actions in order to achieve goals and gain rewards. This strategy is an increasingly adopted way to encourage and retain customers through game elements. The application of gamification aims to encourage children between 6 and 10 years of age to have healthy habits and the purpose of serving as a model for use in marketing. This application was developed in unity; we implemented intelligent algorithms based on stochastic processes, web services to respond to all requests of the application, a back-office website to manage the application and the database. The behavioral analysis of the use of game elements and stochastic processes in children’s motivation was done. The application of algorithms based on stochastic processes in-game elements is very important to promote cooperation and to ensure fair and friendly competition between users which consequently stimulates the user’s interest and their involvement in the application and organization.

Keywords: engage, games, gamification, randomness, stochastic processes

Procedia PDF Downloads 330