Search results for: Privacy Preserving Data Publication (PPDP)
25842 Big Data Strategy for Telco: Network Transformation
Abstract:
Big data has the potential to improve the quality of services; enable infrastructure that businesses depend on to adapt continually and efficiently; improve the performance of employees; help organizations better understand customers; and reduce liability risks. Analytics and marketing models of fixed and mobile operators are falling short in combating churn and declining revenue per user. Big Data presents new method to reverse the way and improve profitability. The benefits of Big Data and next-generation network, however, are more exorbitant than improved customer relationship management. Next generation of networks are in a prime position to monetize rich supplies of customer information—while being mindful of legal and privacy issues. As data assets are transformed into new revenue streams will become integral to high performance.Keywords: big data, next generation networks, network transformation, strategy
Procedia PDF Downloads 36425841 Application of Federated Learning in the Health Care Sector for Malware Detection and Mitigation Using Software-Defined Networking Approach
Authors: A. Dinelka Panagoda, Bathiya Bandara, Chamod Wijetunga, Chathura Malinda, Lakmal Rupasinghe, Chethana Liyanapathirana
Abstract:
This research takes us forward with the concepts of Federated Learning and Software-Defined Networking (SDN) to introduce an efficient malware detection technique and provide a mitigation mechanism to give birth to a resilient and automated healthcare sector network system by also adding the feature of extended privacy preservation. Due to the daily transformation of new malware attacks on hospital Integrated Clinical Environment (ICEs), the healthcare industry is at an undefinable peak of never knowing its continuity direction. The state of blindness by the array of indispensable opportunities that new medical device inventions and their connected coordination offer daily, a factor that should be focused driven is not yet entirely understood by most healthcare operators and patients. This solution has the involvement of four clients in the form of hospital networks to build up the federated learning experimentation architectural structure with different geographical participation to reach the most reasonable accuracy rate with privacy preservation. While the logistic regression with cross-entropy conveys the detection, SDN comes in handy in the second half of the research to stack up the initial development phases of the system with malware mitigation based on policy implementation. The overall evaluation sums up with a system that proves the accuracy with the added privacy. It is no longer needed to continue with traditional centralized systems that offer almost everything but not privacy.Keywords: software-defined network, federated learning, privacy, integrated clinical environment, decentralized learning, malware detection, malware mitigation
Procedia PDF Downloads 19225840 Data Poisoning Attacks on Federated Learning and Preventive Measures
Authors: Beulah Rani Inbanathan
Abstract:
In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.Keywords: data poisoning, federated learning, Internet of Things, edge computing
Procedia PDF Downloads 9125839 The Regulation of Reputational Information in the Sharing Economy
Authors: Emre Bayamlıoğlu
Abstract:
This paper aims to provide an account of the legal and the regulative aspects of the algorithmic reputation systems with a special emphasis on the sharing economy (i.e., Uber, Airbnb, Lyft) business model. The first section starts with an analysis of the legal and commercial nature of the tripartite relationship among the parties, namely, the host platform, individual sharers/service providers and the consumers/users. The section further examines to what extent an algorithmic system of reputational information could serve as an alternative to legal regulation. Shortcomings are explained and analyzed with specific examples from Airbnb Platform which is a pioneering success in the sharing economy. The following section focuses on the issue of governance and control of the reputational information. The section first analyzes the legal consequences of algorithmic filtering systems to detect undesired comments and how a delicate balance could be struck between the competing interests such as freedom of speech, privacy and the integrity of the commercial reputation. The third section deals with the problem of manipulation by users. Indeed many sharing economy businesses employ certain techniques of data mining and natural language processing to verify consistency of the feedback. Software agents referred as "bots" are employed by the users to "produce" fake reputation values. Such automated techniques are deceptive with significant negative effects for undermining the trust upon which the reputational system is built. The third section is devoted to explore the concerns with regard to data mobility, data ownership, and the privacy. Reputational information provided by the consumers in the form of textual comment may be regarded as a writing which is eligible to copyright protection. Algorithmic reputational systems also contain personal data pertaining both the individual entrepreneurs and the consumers. The final section starts with an overview of the notion of reputation as a communitarian and collective form of referential trust and further provides an evaluation of the above legal arguments from the perspective of public interest in the integrity of reputational information. The paper concludes with certain guidelines and design principles for algorithmic reputation systems, to address the above raised legal implications.Keywords: sharing economy, design principles of algorithmic regulation, reputational systems, personal data protection, privacy
Procedia PDF Downloads 46925838 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract
Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala
Abstract:
Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.Keywords: blockchain, data, data marketplace, smart contract, reputation system
Procedia PDF Downloads 16125837 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis
Authors: Sarthak Mishra, Astha Sinha
Abstract:
There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats
Procedia PDF Downloads 23625836 The Publication Impact of London’s Air Ambulance on the Field of Pre-Hospital Medicine and Its Application to Air Ambulances Internationally: A Bibliometric Analysis
Authors: Maria Ahmad, Alexandra Valetopoulou, Michael D. Christian
Abstract:
Background: London’s Air Ambulance (LAA) provides advanced pre-hospital trauma care across London, bringing specialist resources and expert trauma teams to patients. Since its inception 32 years ago, LAA has treated over 40,000 pre-hospital patients and significantly contributed to pre-hospital patient care in London. To the authors’ best knowledge, this is the first analysis to quantify the magnitude of the publication impact of LAA on the international field of pre-hospital medicine. Method: We searched the Scopus, Web of Science, Google Scholar and PubMed databases to identify LAA focused articles. These were defined as articles on the topic of pre-hospital medicine which either utilised data from LAA, or focused on LAA patients, or were authored by LAA clinicians. A bibliometric analysis was conducted and the impact of each eligible article was classified as either: high (article directly influenced the change or creation of clinical guidelines); medium (the article was referenced in clinical guidelines or had >20 Google Scholar citations or >10 PubMed citations); or low impact (article had <20 Google Scholar citations or <10 PubMed citations). Results: The literature search yielded 1,120 articles in total. 198 articles met our inclusion criteria, and their full text was analysed to determine the level of impact. 19 articles were classified as high-impact, 76 as medium-impact, and 103 as low-impact. 20 of the 76 medium-impact articles were referenced in clinical guidelines but had not prompted changes to the guidelines. Conclusion: To our knowledge, this review is the first to quantify the significant publication impact of LAA within the field of pre-hospital medicine over the last 32 years. LAA publications have focused on and driven clinical innovations in trauma care, particularly in pre-hospital anaesthesia, haemorrhage control, and major incidents, with many impacting national and international guidelines. We recommend a greater emphasis on multidisciplinary pre-hospital collaboration in publications in future research and quality improvement projects across all pre-hospital services.Keywords: air ambulance, pre-hospital medicine, London’s Air Ambulance, London HEMS
Procedia PDF Downloads 7925835 The Recording of Personal Data in the Spanish Criminal Justice System and Its Impact on the Right to Privacy
Authors: Deborah García-Magna
Abstract:
When a person goes through the criminal justice system, either as a suspect, arrested, prosecuted or convicted, certain personal data are recorded, and a wide range of persons and organizations may have access to it. The recording of data can have a great impact on the daily life of the person concerned during the period of time determined by the legislation. In addition, this registered information can refer to various aspects not strictly related directly to the alleged or actually committed infraction. In some areas, the Spanish legislation does not clearly determine the cancellation period of the registers nor what happens when they are cancelled since some of the files are not really erased and remain recorded, even if their consultation is no more allowed or it is stated that they should not be taken into account. Thus, access to the recorded data of arrested or convicted persons may reduce their possibilities of reintegration into society. In this research, some of the areas in which data recording has a special impact on the lives of affected persons are analyzed in a critical manner, taking into account Spanish legislation and jurisprudence, and the influence of the European Court of Human Rights, the Council of Europe and other supranational instruments. In particular, the analysis cover the scope of video-surveillance in public spaces, the police record, the recording of personal data for the purposes of police investigation (especially DNA and psychological profiles), the registry of administrative and minor offenses (especially as they are taken into account to impose aggravating circumstaces), criminal records (of adults, minors and legal entities), and the registration of special circumstances occurred during the execution of the sentence (files of inmates under special surveillance –FIES–, disciplinary sanctions, special therapies in prison, etc.).Keywords: ECHR jurisprudence, formal and informal criminal control, privacy, disciplinary sanctions, social reintegration
Procedia PDF Downloads 14925834 Differences in Production of Knowledge between Internationally Mobile versus Nationally Mobile and Non-Mobile Scientists
Authors: Valeria Aman
Abstract:
The presented study examines the impact of international mobility on knowledge production among mobile scientists and within the sending and receiving research groups. Scientists are relevant to the dynamics of knowledge production because scientific knowledge is mainly characterized by embeddedness and tacitness. International mobility enables the dissemination of scientific knowledge to other places and encourages new combinations of knowledge. It can also increase the interdisciplinarity of research by forming synergetic combinations of knowledge. Particularly innovative ideas can have their roots in related research domains and are sometimes transferred only through the physical mobility of scientists. Diversity among scientists with respect to their knowledge base can act as an engine for the creation of knowledge. It is therefore relevant to study how knowledge acquired through international mobility affects the knowledge production process. In certain research domains, international mobility may be essential to contextualize knowledge and to gain access to knowledge located at distant places. The knowledge production process contingent on the type of international mobility and the epistemic culture of a research field is examined. The production of scientific knowledge is a multi-faceted process, the output of which is mainly published in scholarly journals. Therefore, the study builds upon publication and citation data covered in Elsevier’s Scopus database for the period of 1996 to 2015. To analyse these data, bibliometric and social network analysis techniques are used. A basic analysis of scientific output using publication data, citation data and data on co-authored publications is combined with a content map analysis. Abstracts of publications indicate whether a research stay abroad makes an original contribution methodologically, theoretically or empirically. Moreover, co-citations are analysed to map linkages among scientists and emerging research domains. Finally, acknowledgements are studied that can function as channels of formal and informal communication between the actors involved in the process of knowledge production. The results provide better understanding of how the international mobility of scientists contributes to the production of knowledge, by contrasting the knowledge production dynamics of internationally mobile scientists with those being nationally mobile or immobile. Findings also allow indicating whether international mobility accelerates the production of knowledge and the emergence of new research fields.Keywords: bibliometrics, diversity, interdisciplinarity, international mobility, knowledge production
Procedia PDF Downloads 29925833 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia
Authors: Shaya Alshahrani
Abstract:
Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection
Procedia PDF Downloads 15225832 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey
Authors: Tolga Yazıcı
Abstract:
As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey
Procedia PDF Downloads 34525831 Distributed Perceptually Important Point Identification for Time Series Data Mining
Authors: Tak-Chung Fu, Ying-Kit Hung, Fu-Lai Chung
Abstract:
In the field of time series data mining, the concept of the Perceptually Important Point (PIP) identification process is first introduced in 2001. This process originally works for financial time series pattern matching and it is then found suitable for time series dimensionality reduction and representation. Its strength is on preserving the overall shape of the time series by identifying the salient points in it. With the rise of Big Data, time series data contributes a major proportion, especially on the data which generates by sensors in the Internet of Things (IoT) environment. According to the nature of PIP identification and the successful cases, it is worth to further explore the opportunity to apply PIP in time series ‘Big Data’. However, the performance of PIP identification is always considered as the limitation when dealing with ‘Big’ time series data. In this paper, two distributed versions of PIP identification based on the Specialized Binary (SB) Tree are proposed. The proposed approaches solve the bottleneck when running the PIP identification process in a standalone computer. Improvement in term of speed is obtained by the distributed versions.Keywords: distributed computing, performance analysis, Perceptually Important Point identification, time series data mining
Procedia PDF Downloads 44025830 News Publication on Facebook: Emotional Analysis of Hooks
Authors: Gemma Garcia Lopez
Abstract:
The goal of this study is to perform an emotional analysis of the hooks used in Facebook by three of the most important daily newspapers in the USA. These hook texts are used to get the user's attention and invite him to read the news and linked contents. Thanks to the emotional analysis in text, made with the tool of IBM, Tone Analyzer, we discovered that more than 30% of the hooks can be classified emotionally as joy, sadness, anger or fear. This study gathered the publications made by The New York Times, USA Today and The Washington Post during a random day. The results show that the choice of words by the journalist, can expose the reader to different emotions before clicking on the content. In the three cases analyzed, the absence of emotions in some cases, and the presence of emotions in text in others, appear in very similar percentages. Therefore, beyond the objectivity and veracity of the content, a new factor could come into play: the emotional influence on the reader as a mediatic manipulation tool.Keywords: emotional analysis of newspapers hooks, emotions on Facebook, newspaper hooks on Facebook, news publication on Facebook
Procedia PDF Downloads 16025829 An Empirical Investigation of the Challenges of Secure Edge Computing Adoption in Organizations
Authors: Hailye Tekleselassie
Abstract:
Edge computing is a spread computing outline that transports initiative applications closer to data sources such as IoT devices or local edge servers, and possible happenstances would skull the action of new technologies. However, this investigation was attained to investigation the consciousness of technology and communications organization workers and computer users who support the service cloud. Surveys were used to achieve these objectives. Surveys were intended to attain these aims, and it is the functional using survey. Enquiries about confidence are also a key question. Problems like data privacy, integrity, and availability are the factors affecting the company’s acceptance of the service cloud.Keywords: IoT, data, security, edge computing
Procedia PDF Downloads 8725828 Cultivating Responsible AI: For Cultural Heritage Preservation in India
Authors: Varsha Rainson
Abstract:
Artificial intelligence (AI) has great potential and can be used as a powerful tool of application in various domains and sectors. But with the application of AI, there comes a wide spectrum of concerns around bias, accountability, transparency, and privacy. Hence, there is a need for responsible AI, which can uphold ethical and accountable practices to ensure that things are transparent and fair. The paper is a combination of AI and cultural heritage preservation, with a greater focus on India because of the rich cultural legacy that it holds. India’s cultural heritage in itself contributes to its identity and the economy. In this paper, along with discussing the impact culture holds on the Indian economy, we will discuss the threats that the cultural heritage is exposed to due to pollution, climate change and urbanization. Furthermore, the paper reviews some of the exciting applications of AI in cultural heritage preservation, such as 3-D scanning, photogrammetry, and other techniques which have led to the reconstruction of cultural artifacts and sites. The paper eventually moves into the potential risks and challenges that AI poses in cultural heritage preservation. These include ethical, legal, and social issues which are to be addressed by organizations and government authorities. Overall, the paper strongly argues the need for responsible AI and the important role it can play in preserving India’s cultural heritage while holding importance to value and diversity.Keywords: responsible AI, cultural heritage, artificial intelligence, biases, transparency
Procedia PDF Downloads 19525827 3D Guided Image Filtering to Improve Quality of Short-Time Binned Dynamic PET Images Using MRI Images
Authors: Tabassum Husain, Shen Peng Li, Zhaolin Chen
Abstract:
This paper evaluates the usability of 3D Guided Image Filtering to enhance the quality of short-time binned dynamic PET images by using MRI images. Guided image filtering is an edge-preserving filter proposed to enhance 2D images. The 3D filter is applied on 1 and 5-minute binned images. The results are compared with 15-minute binned images and the Gaussian filtering. The guided image filter enhances the quality of dynamic PET images while also preserving important information of the voxels.Keywords: dynamic PET images, guided image filter, image enhancement, information preservation filtering
Procedia PDF Downloads 13725826 Teaching Academic Writing for Publication: A Liminal Threshold Experience Towards Development of Scholarly Identity
Authors: Belinda du Plooy, Ruth Albertyn, Christel Troskie-De Bruin, Ella Belcher
Abstract:
In the academy, scholarliness or intellectual craftsmanship is considered the highest level of achievement, culminating in being consistently successfully published in impactful, peer-reviewed journals and books. Scholarliness implies rigorous methods, systematic exposition, in-depth analysis and evaluation, and the highest level of critical engagement and reflexivity. However, being a scholar does not happen automatically when one becomes an academic or completes graduate studies. A graduate qualification is an indication of one’s level of research competence but does not necessarily prepare one for the type of scholarly writing for publication required after a postgraduate qualification has been conferred. Scholarly writing for publication requires a high-level skillset and a specific mindset, which must be intentionally developed. The rite of passage to become a scholar is an iterative process with liminal spaces, thresholds, transitions, and transformations. The journey from researcher to published author is often fraught with rejection, insecurity, and disappointment and requires resilience and tenacity from those who eventually triumph. It cannot be achieved without support, guidance, and mentorship. In this article, the authors use collective auto-ethnography (CAE) to describe the phases and types of liminality encountered during the liminal journey toward scholarship. The authors speak as long-time facilitators of Writing for Academic Publication (WfAP) capacity development events (training workshops and writing retreats) presented at South African universities. Their WfAP facilitation practice is structured around experiential learning principles that allow them to act as critical reading partners and reflective witnesses for the writer-participants of their WfAP events. They identify three essential facilitation features for the effective holding of a generative, liminal, and transformational writing space for novice academic writers in order to enable their safe passage through the various liminal spaces they encounter during their scholarly development journey. These features are that facilitators should be agents of disruption and liminality while also guiding writers through these liminal spaces; that there should be a sense of mutual trust and respect, shared responsibility and accountability in order for writers to produce publication-worthy scholarly work; and that this can only be accomplished with the continued application of high levels of sensitivity and discernment by WfAP facilitators. These are key features for successful WfAP scholarship training events, where focused, individual input triggers personal and professional transformational experiences, which in turn translate into high-quality scholarly outputs.Keywords: academic writing, liminality, scholarship, scholarliness, threshold experience, writing for publication
Procedia PDF Downloads 4725825 Analyzing Keyword Networks for the Identification of Correlated Research Topics
Authors: Thiago M. R. Dias, Patrícia M. Dias, Gray F. Moita
Abstract:
The production and publication of scientific works have increased significantly in the last years, being the Internet the main factor of access and distribution of these works. Faced with this, there is a growing interest in understanding how scientific research has evolved, in order to explore this knowledge to encourage research groups to become more productive. Therefore, the objective of this work is to explore repositories containing data from scientific publications and to characterize keyword networks of these publications, in order to identify the most relevant keywords, and to highlight those that have the greatest impact on the network. To do this, each article in the study repository has its keywords extracted and in this way the network is characterized, after which several metrics for social network analysis are applied for the identification of the highlighted keywords.Keywords: bibliometrics, data analysis, extraction and data integration, scientometrics
Procedia PDF Downloads 26425824 Challenges in Multi-Cloud Storage Systems for Mobile Devices
Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta
Abstract:
The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices.Keywords: cloud storage, data privacy, data security, multi cloud storage, mobile devices
Procedia PDF Downloads 70425823 Scientometrics Analysis of Food Supply Chain Risk Assessment Literature: Based On Web of Science Record 1996-2014
Authors: Mohsen Shirani, Shadi Asadzandi, Micaela Demichela
Abstract:
This paper presents the results of a study to assess crucial aspects and the strength of the scientific basis of a typically interdisciplinary, applied field: food supply chain risk assessment research. Our approach is based on an advanced scientometrics analysis with novel elements to assess the influence and dissemination of research results and to measure interdisciplinary. This paper aims to describe the quantity and quality of the publication trends in food supply chain risk assessment. The population under study was composed of 266 articles from database web of science. The results were analyzed based on date of publication, type of document, language of the documents, source of publications, subject areas, authors and their affiliations, and the countries involved in developing the articles.Keywords: food supply chain, risk assessment, scientometrics, web of science
Procedia PDF Downloads 49625822 PhD Students’ Challenges with Impact-Factor in Kazakhstan
Authors: Duishon Shamatov
Abstract:
This presentation is about Kazakhstan’s PhD students’ experiences with impact-factor publication requirement. Since the break-up of the USSR, Kazakhstan has been attempting to improve its higher education system at undergraduate and graduate levels. From March, 2010 Kazakhstan joined Bologna process and entered European space of higher education. To align with the European system of higher education, three level of preparation of specialists (undergraduate, master and PhD) was adopted to replace the Soviet system. The changes were aimed at promoting high quality higher education that meets the demands of labor market and growing needs of the industrial-innovative development of the country, and meeting the international standards. The shift to the European system has brought many benefits, but there are also some serious challenges. One of those challenges is related to the requirements for the PhD candidates to publish in national and international journals. Thus, a PhD candidate should have 7 publications in total, out of which one has to be in an international impact factor journal. A qualitative research was conducted to explore the PhD students’ views of their experiences with impact-factor publications. With the help of purposeful sampling, 30 PhD students from seven universities across Kazakhstan were selected for individual and focus group interviews. The key findings of the study are as follows. While the Kazakh PhD students have no difficulties in publishing in local journals, they face great challenges in attempting to publish in impact-factor journals for a range of reasons. They include but not limited to lack of research and publication skills, poorer knowledge of academic English, not familiarity with the peer review publication processes and expectations, and very short time to get published due to their PhD programme requirements. This situation is pushing some these young scholars explore alternative ways to get published in impact factor journals and they seek to publish by any means and often by any costs (which means even paying large sum of money for a publication). This in turn, creates a myth in the scholars’ circles in Kazakhstan, that to get published in impact factor journals, one should necessarily pay much money. This paper offers some policy recommendations on how to improve preparation of future PhD candidates in Kazakhstan.Keywords: Bologna process, impact-factor publications, post-graduate education, Kazakhstan
Procedia PDF Downloads 38125821 The Impact of Cryptocurrency Classification on Money Laundering: Analyzing the Preferences of Criminals for Stable Coins, Utility Coins, and Privacy Tokens
Authors: Mohamed Saad, Huda Ismail
Abstract:
The purpose of this research is to examine the impact of cryptocurrency classification on money laundering crimes and to analyze how the preferences of criminals differ according to the type of digital currency used. Specifically, we aim to explore the roles of stablecoins, utility coins, and privacy tokens in facilitating or hindering money laundering activities and to identify the key factors that influence the choices of criminals in using these cryptocurrencies. To achieve our research objectives, we used a dataset for the most highly traded cryptocurrencies (32 currencies) that were published on the coin market cap for 2022. In addition to conducting a comprehensive review of the existing literature on cryptocurrency and money laundering, with a focus on stablecoins, utility coins, and privacy tokens, Furthermore, we conducted several Multivariate analyses. Our study reveals that the classification of cryptocurrency plays a significant role in money laundering activities, as criminals tend to prefer certain types of digital currencies over others, depending on their specific needs and goals. Specifically, we found that stablecoins are more commonly used in money laundering due to their relatively stable value and low volatility, which makes them less risky to hold and transfer. Utility coins, on the other hand, are less frequently used in money laundering due to their lack of anonymity and limited liquidity. Finally, privacy tokens, such as Monero and Zcash, are increasingly becoming a preferred choice among criminals due to their high degree of privacy and untraceability. In summary, our study highlights the importance of understanding the nuances of cryptocurrency classification in the context of money laundering and provides insights into the preferences of criminals in using digital currencies for illegal activities. Based on our findings, our recommendation to the policymakers is to address the potential misuse of cryptocurrencies for money laundering. By implementing measures to regulate stable coins, strengthening cross-border cooperation, fostering public-private partnerships, and increasing cooperation, policymakers can help prevent and detect money laundering activities involving digital currencies.Keywords: crime, cryptocurrency, money laundering, tokens.
Procedia PDF Downloads 9325820 A Statistical Approach to Classification of Agricultural Regions
Authors: Hasan Vural
Abstract:
Turkey is a favorable country to produce a great variety of agricultural products because of her different geographic and climatic conditions which have been used to divide the country into four main and seven sub regions. This classification into seven regions traditionally has been used in order to data collection and publication especially related with agricultural production. Afterwards, nine agricultural regions were considered. Recently, the governmental body which is responsible of data collection and dissemination (Turkish Institute of Statistics-TIS) has used 12 classes which include 11 sub regions and Istanbul province. This study aims to evaluate these classification efforts based on the acreage of ten main crops in a ten years time period (1996-2005). The panel data grouped in 11 subregions has been evaluated by cluster and multivariate statistical methods. It was concluded that from the agricultural production point of view, it will be rather meaningful to consider three main and eight sub-agricultural regions throughout the country.Keywords: agricultural region, factorial analysis, cluster analysis,
Procedia PDF Downloads 42025819 Evolving Jurisprudence of Rape Laws in India: A Study of Last One Decade
Authors: Drutika Upadhyay
Abstract:
Rape is one of the most heinous crimes committed against the body of a woman violating her privacy and dignity. The Right to Privacy and the Right to Live with Dignity constitute the very essence of the Right to Life and Personal Liberty, a Fundamental Right guaranteed under Article 21 of the Indian Constitution. The study is conducted with the primary objective of analyzing the efficacy of rape laws in India. The study begins by explaining the origin, meaning, and kinds of rape recognised under Indian jurisprudence. Further, it explains various statutory and penal provisions relating to rape and the loopholes in such provisions. It focuses on the procedure followed during investigation and trial and also aims at developing an understanding of the rights of the victim and the sentence in cases of rape. The study also throws some light upon the amendments made to the criminal law and the recommendations of the Law Commission of India to meet the demands of the changing criminal justice delivery system. The outcome of the study suggests that the laws relating to rape have proved to be a major failure owing to the lack of proper implementation. Also, the lack of education among the masses leads to gender biasness, which is the ultimate cause for the commission of such crime. At last, the author concludes that the present criminal law system of the country contains various lacunae that need to be filled in so as to make the criminal justice system more stringent. Further, the scope of the definition of ‘rape’ needs to be widened in order to include such other acts of non-consensual and sexual nature that are currently not included in the definition. The author has adopted a non-doctrinal and analytical approach and relied upon the secondary sources of data for the purpose of the study. The scope of the study is limited to the crime committed against women.Keywords: amendment, criminal law, fundamental right, personal liberty, privacy, rape
Procedia PDF Downloads 13225818 Ethically Integrating Robots to Assist Elders and Patients with Dementia
Authors: Suresh Lokiah
Abstract:
The emerging trend of integrating robots into elderly care, particularly for assisting patients with dementia, holds the potential to greatly transform the sector. Assisted living facilities, which house a significant number of elderly individuals and dementia patients, constantly strive to engage their residents in stimulating activities. However, due to staffing shortages, they often rely on volunteers to introduce new activities. Despite the availability of social interaction, these residents, frequently overlooked in society, are in desperate need of additional support. Robots designed for elder care are categorized based on their design and functionality. These categories include companion robots, telepresence robots, health monitoring robots, and rehab robots. However, the integration of such robots raises significant ethical concerns, notably regarding privacy, autonomy, and the risk of dehumanization. Privacy issues arise as these robots may need to continually monitor patient activities. There is also a risk of patients becoming overly dependent on these robots, potentially undermining their autonomy. Furthermore, the replacement of human touch with robotic interaction may lead to the dehumanization of care. This paper delves into the ethical considerations of incorporating robotic assistance in eldercare. It proposes a series of guidelines and strategies to ensure the ethical deployment of these robots. These guidelines suggest involving patients in the design and development process of the robots and emphasize the critical need for human oversight to respect the dignity and rights of the elderly and dementia patients. The paper also recommends implementing robust privacy measures, including secure data transmission and data anonymization. In conclusion, this paper offers a thorough examination of the ethical implications of using robotic assistance in elder care. It provides a strategic roadmap to ensure this technology is utilized ethically, thereby maximizing its potential benefits and minimizing any potential harm.Keywords: human-robot interaction, robots for eldercare, ethics, health, dementia
Procedia PDF Downloads 10425817 Secure and Privacy-Enhanced Blockchain-Based Authentication System for University User Management
Authors: Ali El Ksimi
Abstract:
In today's digital academic environment, secure authentication methods are essential for managing sensitive user data, including that of students and faculty. The rise in cyber threats and data breaches has exposed the vulnerabilities of traditional authentication systems used in universities. Passwords, often the first line of defense, are particularly susceptible to hacking, phishing, and brute-force attacks. While multi-factor authentication (MFA) provides an additional layer of security, it can still be compromised and often adds complexity and inconvenience for users. As universities seek more robust security measures, blockchain technology emerges as a promising solution. Renowned for its decentralization, immutability, and transparency, blockchain has the potential to transform how user management is conducted in academic institutions. In this article, we explore a system that leverages blockchain technology specifically for managing user accounts within a university setting. The system enables the secure creation and management of accounts for different roles, such as administrators, teachers, and students. Each user is authenticated through a decentralized application (DApp) that ensures their data is securely stored and managed on the blockchain. By eliminating single points of failure and utilizing cryptographic techniques, the system enhances the security and integrity of user management processes. We will delve into the technical architecture, security benefits, and implementation considerations of this approach. By integrating blockchain into user management, we aim to address the limitations of traditional systems and pave the way for the future of digital security in education.Keywords: blockchain, university, authentication, decentralization, cybersecurity, user management, privacy
Procedia PDF Downloads 3225816 The Role of Human Beings as Caliphs in Preserving Nature
Authors: Firdaus Khairi Abdul Kadir, Nazihah Rusli, Noor Aisyah Abdul Aziz
Abstract:
Islam is a comprehensive religion encompassing all aspects of society’s life such as social, economic, political, cultural and environmental. The environment is part of the manifestation of God’s greatness which has pearls of wisdom, bestowed upon human beings to make them realize that everything is in the hands of God (Allah SWT). However, the equilibrium of nature could be disturbed from the excessive exploitation by humans’ hands. As a caliph on this earth, it is the responsibility of human beings to look after the environment proactively. Besides, Islam calls for the execution of accountable development and respecting the principles of sustainability. Therefore, this study focuses on the role of human beings as caliphs on this earth who are responsible for nature and their acts in conserving and preserving the environment based on the approach of religious education. This study also used the research method of the survey library.Keywords: environment, human beings, caliph, tauhid, Allah SWT
Procedia PDF Downloads 13525815 Dynamics of Museum Visitors’ Experiences Studies: A Bibliometric Analysis
Authors: Tesfaye Fentaw Nigatu, Alexander Trupp, Teh Pek Yen
Abstract:
Research on museums and the experiences of visitors has flourished in recent years, especially after museums became centers of edutainment beyond preserving heritage resources. This paper aims to comprehensively understand the changes, continuities, and future research development directions of museum visitors’ experiences. To identify current research trends, the paper summarizes and analyses research article publications from 1986 to 2023 on museum visitors' experiences. Bibliometric analysis software VOSviewer and Harzing POP (Publish or Perish) were used to analyze 407 academic articles. The articles were generated from the Scopus database. The study attempted to map new insights for future scholars and academics to expand the scope of museum visitors’ experience studies by analyzing keywords, citation patterns, influential articles in the field, publication trends, collaborations between authors, institutions, and clusters of highly cited articles. Accessibility to museums, social media usage within museums, aesthetics in museum settings, mixed reality experiences, sustainability issues, and emotions have emerged as key research areas in the study of museum visitors' experiences. The results benefit stakeholders and researchers in advancing the collective progress of considering recent research trends to stay informed about the latest developments and breakthroughs in the global academic landscape and visitors’ experiences development in the museum.Keywords: bibliometric analysis, museum, network analysis, visitors’ experiences, visual analysis
Procedia PDF Downloads 7325814 Standard Languages for Creating a Database to Display Financial Statements on a Web Application
Authors: Vladimir Simovic, Matija Varga, Predrag Oreski
Abstract:
XHTML and XBRL are the standard languages for creating a database for the purpose of displaying financial statements on web applications. Today, XBRL is one of the most popular languages for business reporting. A large number of countries in the world recognize the role of XBRL language for financial reporting and the benefits that the reporting format provides in the collection, analysis, preparation, publication and the exchange of data (information) which is the positive side of this language. Here we present all advantages and opportunities that a company may have by using the XBRL format for business reporting. Also, this paper presents XBRL and other languages that are used for creating the database, such XML, XHTML, etc. The role of the AJAX complex model and technology will be explained in detail, and during the exchange of financial data between the web client and web server. Here will be mentioned basic layers of the network for data exchange via the web.Keywords: XHTML, XBRL, XML, JavaScript, AJAX technology, data exchange
Procedia PDF Downloads 39925813 Nordic Study on Public Acceptance of Drones
Authors: Virpi Oksman
Abstract:
Drones are new phenomenon in public spaces. Adoption of this kind of new technologies requires public acceptance. Drones and other unmanned aerial systems may have various impacts on people’s living environments, and the public is exposed to possible disadvantages of drones. Public acceptance may be expressed as positive or negative attitude by majority of the citizens towards the new technology or service or as rapid adoption of it in everyday life. In various parts of the globe, in cities and in rural areas, drones as emerging technologies are perceived quite differently. Public acceptance studies of drones have been conducted mostly in highly urbanized environments like in Singapore and in European cities. This paper presents results of a Nordic survey study (N=1000) conducted in Sweden and in Finland. The survey aims at understanding the level of acceptance of different uses of drones in public spaces and the main concerns and benefits related to emerging UAM technologies. The study shows that even though the general attitude towards drones is quite positive, privacy and safety, and noise levels are the main concerns by Nordic citizens. Also, for what purpose and by whom the drones are operated affects the acceptability significantly. The study concludes, that there is need for regulations that safeguard public interests. In addition, considering privacy in design, and quiet environmentally friendly drones support public acceptance of drones.Keywords: public acceptance, privacy, safety, survey
Procedia PDF Downloads 172